Phd theses

Publicado em Agosto 2017

I develop a theoretical model which proposes that when a hybrid organization combining two logics is dominated by a logic that is negatively valenced (i. Microfinance is an industry where small, "micro" loans are given to borrowers in extremely low income situations, often with the intent to lift the recipient out of poverty. Chapter 2 describes the development of a phd theses system of technology diffusion constraints that endogenously respects empirically observed spatial diffusion patterns. While the research presented in this dissertation advances the modeling of technological change, a number of formidable challenges remain. Additional analytical and empirical results demonstrate the extension of the model to handling a range of practical network security applications, including sensitivity analysis to organization-specific security factors, settings with dynamic or dependent rates of attack, or handling defense teams as imperfect detectors of cyberattacks. This dissertation examines the internationalization of business groups in developing countries and the importance of institutional settings. Scholarship in political science and corporate political activity has primarily examined the influence of private organizations via lobbying, campaign donations and the "revolving door. Therefore, CIOs currently have difficulty in assessing the risk reduction associated with different cyber security investments, possibly resulting in a poor allocation of resources. For the particular settings of point processes with stochastic intensities, this dissertation develops a simulation and estimation methodologies. With the fitted model, I further explore the relationship between foreclosure discount and other variables such as the underlying house price, the age of the house and the neighborhood house price, which couldn't be fully characterized by previous linear models. Technologies diffuse from an advanced core to less technologically adept regions, with adoption experiences in the former determining adoption possibilities in the latter. Taken together, I examine the antecedents and consequences of the strategies that low-powered actors can use to compete in intermediated markets. Technologies diffuse from an advanced core to less technologically adept regions, with adoption experiences in the former determining adoption possibilities in the latter. The "Big Data" revolution is spawning systems term papers on police brutality designed to make decisions from data. The policymaker (outer agent) seeks to identify the combination of policies that induces the firms to reach an equilibrium with the highest possible expected welfare. Previous approaches to deep exploration have not been computationally tractable beyond small scale problems. The majority of the previous empirical studies comparing performance between for-profit and nonprofit healthcare providers suggested that nonprofit providers were superior. The final chapter discusses some of these challenges and ideas for future research to address them. The proposed computational approach is based on dynamic importance sampling, and the design of the estimators extends past literature to accommodate the point process settings. In the case of large or rare cyber incidents where sufficient data do not exist, scenario analysis is used to obtain probabilistic assessments. Next, the rate and consequences of each scenario are assessed, drawing heavily from historical data at organizations, academic literature, publicly available data, and expert knowledge. Component) affects firms' ability to create and capture value in nascent ecosystems. How do private organizations influence public policy, particularly through non-economic means? Over 60,000 cyber security incidents from that organization are analyzed and used to initialize the model to determine the cost-effectiveness of security safeguards including full disk encryption, two-factor authentication, and network segmentation. Enterprise infrastructure software firms, I examine attention to competitions in three empirical papers. Chapter 2 describes the development of a system of technology diffusion constraints that endogenously respects empirically observed spatial diffusion patterns. 5 billion by preventing downstream transmission. This new technique, which by similarity we call "multi-node bandits, " takes a dynamic approach to cybersecurity investment, exploring how network defenders can optimally allocate cyber defense teams among nodes in their network. However, as more firms have successfully internationalized in recent years, there is a need for better understanding why, how, and where they choose to internationalize. This effect I demonstrate through a statistical analysis of the relationship between representation on committees and the receipt of policy-related grants from related agencies. Policies that use new rapid diagnostics may interrupt the transmission pathway, but their effectiveness may be undercut by inaccurate diagnosis and care inaccessibility in India. The third moves from nascent to evolving ecosystems, and presents a cooperative game theory model that examines how and when firms can collaboratively resolve technological constraints that inhibit their ability to jointly create and capture value. These data provide useful statistics for low and medium level incidents, but some incidents may be absent from the data because large incidents have not yet occurred, or have occurred too rarely to obtain good estimates for the probabilities. Significant uncertainty surrounds cyber security investments. We study the impact of team formation and the team formation process in massive open online classes. In Chapter 3, learning-by-doing is formulated as a firm-level rather than an industry-level phenomenon. Endogenous diffusion constraints are incorporated into the MESSAGE framework and results suggest that IAMs based on standard exogenous diffusion formulations are overly optimistic about technology leapfrogging potential in developing countries. We complement our analysis with extensive empirical experiments; these include several didactic examples as well as a recommendation system, Tetris, and essay writing services in uk Atari 2600 games. As a whole, my dissertation suggests that executives can be strategic in how they think about competition, with tangible benefits for firm performance. This dissertation focuses on examining questions surrounding drug resistance and technology adoption in the context of the Indian TB epidemic. The first approach, flash teams, is a framework for dynamically assembling and computationally managing crowdsourced expert teams. This multi-pronged approach provides a framework for scholars to better understand the internationalization and associated strategic motives. This study contributes to the theory of internationalization and to the ongoing research of culture in the field of international business. We develop a dynamic transmission microsimulation model of TB in India. We develop a framework for computing a dynamic strategy for therapy choice in a large class of breast cancer patients, as an example of approaches to personalize therapies for individual characteristics and each patient's response to therapy. In this industry, two types of hybrid and two types of non-hybrid organizations regularly report both their social and financial performance. Can be adapted to the different cultural and social backgrounds in developing countries such as China, which is emerging as an aging society and has recently started planning and building its senior care infrastructure. We use this algorithm to recommend teams to learners. The first path is to enter other institutionally close developing countries by exploiting the firm's existing resources and know-how. E. Next, safeguards are considered that change the rate or impact of the scenarios. House price prediction has been increasingly important to many sectors of the economy, such as real estate, mortgage investment and risk management, and government property tax collection. In this dissertation, I investigate executives' attention to competitors and the implications for firm innovation. Significant uncertainty surrounds cyber security investments. These data provide useful statistics for low and medium level incidents, but some incidents may be absent from the data because large incidents have not yet occurred, or have occurred too rarely to obtain good estimates for the probabilities. In the second paper, I examine how sellers resolve the "big fish, big pond" dilemma in their choice of intermediaries. When a hybrid organization is dominated by a logic that is positively valenced (i. The final chapter discusses some of these challenges and ideas for future research to address them. I find significant regional differences as well as universal patterns across different areas. The data driven model is combined with the scenario based model by overlapping the two cost curves to ensure that incidents are not double counted, resulting in do book report analysis a complete and comprehensive assessment of cyber risk at the organization. E. Goals of this nature require deep knowledge of the subject matter and cannot be decomposed into independent microtasks for anyone to complete. Goals of this nature require deep knowledge of the subject matter and cannot be decomposed into independent microtasks for anyone to complete. Within these networks, often termed ecosystems, firms depend on one another to create value, but simultaneously compete with one another to capture value. E. We find that the optimal timing of DST is influenced by availability of TB test results, level of TB transmission, and prevalence of DR TB. In effect, this strategy involves taking teams that traditionally respond to cyber breaches after they occur, and instead employing them in a proactive manner for defensive and information gathering purposes. S. We find that India should revise the testing protocol in its first-line national TB treatment program to provide DST during the first month of treatment in areas of average or high DR TB prevalence and transmission. This dissertation addresses this gap through three linked studies. In the third paper, I conduct an empirical analysis of how competition in the intermediary portfolio affects the success of employees' intra- and entrepreneurial activities. Stochastic models of event timing are popular in many applications because of their ability to capture random event arrivals and their impacts. This dissertation extends the technology adoption literature to consider technology decisions with adversaries in conflict scenarios where technology determines outcomes for the decision makers. The second path is to enter institutionally close developed countries to acquire technological sophistication and improve their organizational learning capabilities through long-term investments. Sensitivity analysis can also be performed to identify the important uncertainties and the robustness of different safeguard implementation decisions. From 2004 to 2014. To analyze energy and climate policy remedies, researchers have developed a diverse collection of integrated assessment models (IAMs) that represent the linked energy, economic, and earth systems in an interdisciplinary framework. We observe that learners prefers team members with similar location, age range and education level. We test robustness of our model with sensitivity analysis on key model parameters, seeing how the optimal dynamic strategy changes when patient characteristics differ. We provide insight into why this algorithm can be simultaneously more statistically efficient and more computationally efficient than existing approaches. Next, safeguards are considered that change the rate or impact of the scenarios. Prior work suggests that when organizations are faced with multiple performance demands, performance is diminished unless it is concentrated on only one set of those demands. Finally, we investigate the design of an optimal reward program for a merchant competing against a traditional pricing merchant, for varying customer populations, where customers measure their utility in rational economic terms. Our model maintains a Markov belief about the effectiveness of the different therapies and updates it as therapies are administered and tumor images are observed. Additional analytical and empirical results demonstrate the extension of the model to handling a range of practical network security applications, including sensitivity analysis to organization-specific security factors, settings with dynamic or dependent rates of attack, or handling defense teams as imperfect detectors of cyberattacks. My dissertation addresses these limitations through a mixed-methods study combining interviews and a multi-year analysis of how organizations participate in federal advisory committees as a means of influencing regulation (rather than legislation). As a whole, my dissertation suggests that executives can be strategic in how they think about competition, with tangible benefits for firm performance. Firms (inner agents) solve a two-stage stochastic profit maximization problem in which they choose process and product R& D investments in the first stage, then choose output levels in the second stage. Even worse, drug-resistant (DR) and multidrug-resistant (MDR) forms of TB are becoming more predominant. Transaction times and their bid-ask spreads are modeled by arrivals and marks of a marked point process so that bond illiquidity is estimated by an effective bid-ask spread and a certain function of its intensity. This motivates researchers to investigate how foreclosure impacts house prices and by which channels it happens. Additionally, this dissertation establishes accurate estimators of bond illiquidity from bond transaction records. Presently, cyber risk is managed qualitatively in most organizations. Lastly, this study makes valuable recommendations to managers and government policymakers on how to optimize the resources and capabilities of business groups to support their domestic markets. We show that for the reward program to phd theses perform better, it is necessary for a minimum fraction of the customer population to be strategic, and the loyalty bias distribution to be within an optimal range. We show that our bargaining model produces networks that are close to optimal in terms of social welfare, in addition to cohering with empirical observations. For quantitative analysis, I compare the performance of non-hybrid and hybrid organizations relative to two types of demands (social and financial), by analyzing 10,069 firm years of data from 1,640 organizations in the microfinance industry over the past fifteen years. To date, however, most research has focused on microtask platforms, such as Amazon Mechanical Turk. E. Few changes in the organization of healthcare in the United States have stimulated more interest and alarm than the rise of a new form of entrepreneurism -- Investor-owned, for-profit organizations that provide health services as a business. How do low-power actors compete in intermediated markets? We compare three different approximate methods to solve our analytical model against standard medical practice and show significant potential benefit of the computed dynamic strategies to limit tumor growth and to reduce the number of time periods patients are given chemotherapy, with its attendant side effects. The policymaker (outer agent) seeks to identify the combination of policies that induces the firms to reach an equilibrium with the highest possible expected welfare. The proposed computational approach is based on dynamic importance sampling, and the design of the estimators extends past literature to accommodate the point process settings. We first conduct an empirical investigation of existing coalitions, and formulate an analytical model of bargaining for merchant partners to agree upon the exchange rate and payment parameters. The model follows individuals by age, sex, TB status, drug resistance status, and treatment status and is calibrated to Indian demographic and epidemiological TB time trends. Reinforcement learning builds upon learning from datasets, but also addresses the issues of partial feedback and long term consequences. In this dissertation, we present both practical and methodological contributions in the area of health policy modeling. I develop a theoretical model which proposes that when a hybrid organization combining two logics is dominated by a logic that is negatively valenced (i. How do low-power actors compete in intermediated markets? When the real estate bubble burst after the 2008 subprime crisis, there has been a significant portion of sales being foreclosed. In this empirical study, I collect data from the California Department of Social Services (CDSS) and on-site interviews in 26 Continuing Care Retirement Communities (CCRCs) in California. Planning for treatment of cancer is challenging due to the complexity of the disease. Therefore, CIOs currently have difficulty in assessing the risk reduction associated with different cyber security investments, possibly resulting in a poor allocation of resources. Finally, we investigate the design of an optimal reward program for a merchant competing against a traditional pricing merchant, for varying customer populations, where customers measure their utility in rational economic terms. Then we use the model to answer contemporary risk management questions in two diverse fields: cyber operations phd theses (a high-obsolescence technology field) and synthetic biology (a case study on dual-use influenza viral research). This thesis shifts away from paid microtask work and introduces diverse expert crowds as a core component of crowdsourcing systems. We find that the optimal timing of DST is influenced by availability of TB test results, level of TB transmission, and prevalence of DR TB. Therefore as transmission-generated DR TB becomes a larger driver of the DR TB epidemic in India, rapid and accurate DR TB diagnosis and treatment will become increasingly effective in reducing DR TB cases compared to non-DR TB treatment improvements. In this dissertation, I take the perspective of low-power actors and examine how they compete. Our work is inspired by the Thompson sampling heuristic for multi-armed bandits which suggests, at a high level, to "randomly select a policy according to the probability that it is optimal". The second path is to enter institutionally close developed countries to acquire technological sophistication and improve their organizational learning capabilities through long-term investments. Central to this approach is a new Bayes-adaptive network security model based on a reformulation of the classic "multi-armed bandits" problem, where instead of projects with uncertain probabilities of success, a network defender faces network nodes that can be attacked at uncertain Poisson-distributed rates. This dissertation focuses on examining questions surrounding drug resistance and technology adoption in the context of the Indian TB epidemic. For example, laptops are lost or stolen, websites are defaced, phishing emails attempt to steal employee credentials, and malware infects machines via web browsing. The second approach, flash organizations, is a framework for creating rapidly assembled and reconfigurable organizations composed of large groups of expert crowd workers. In this case, classes of scenarios are modeled and initialized with conditional probabilities elicited from experts. Although IAM representations of technological change are critical determinants of model outcomes, underlying processes are poorly understood and models typically feature fairly crude formulations. We test robustness of our model with sensitivity phd theses analysis on key model parameters, seeing how the optimal dynamic strategy changes when patient characteristics differ. We present structural properties of the model and analytical results. Here I use an unprecedented dataset provided by the data vendor CoreLogic of over 100 million housing transactions across the U. We observe that learners prefers team members with similar location, age range and education level. Cyber security continues to be a rapidly evolving domain, but risk quantification illuminates the cyber landscape and enables defenders to improve resource allocation and optimize decision making. We show that team recommendations increase the percentage of learners who finish the class. Within these networks, often termed ecosystems, firms depend on one another to create value, but simultaneously compete with one another to capture value. We show that team recommendations increase the percentage of learners who finish the class. S. In the first paper, I show that attending to competitors that activate opportunity-based rather than threat-based views of competition has a positive relationship with product innovation. S. Strategies that disrupt DR TB transmission are projected to provide greater reductions in DR TB prevalence compared with improving non-DR treatment quality. Our model has three interesting properties -- it is decentralized, arbitrage-proof, and fair against market power concentration -- which make it a real alternative to how settlements happen in coalition loyalty programs. The model follows individuals by age, sex, TB status, drug resistance status, and treatment status and is calibrated to Indian demographic and epidemiological TB time trends. In support of this thesis, I incorporate several prior theories on the liability of foreignness and institutional theory; investigate the role of culture in the internationalization of business groups; and analyze two in-depth case studies. Decision makers in government, industry, and academia need to consider adversaries with harmful intentions when planning the development and adoption of some new technologies. Nonprofit ─ on occupancy rate, price, and quality of service in the continuing care industry through an empirical study in California. Less is known about firm strategy in early-stage ecosystems, which are those that are in an early state of emergence or evolution. Hundreds of thousands of patients begin first-line TB treatment in India each year. Microfinance is an industry where small, "micro" loans are given to borrowers in extremely low income situations, often with the intent to lift the recipient out of poverty. The bilevel modeling framework of Chapter 4 is built to determine the optimal combination of technology-push and demand-pull subsidies for a given technology policy application. Tuberculosis (TB) is a complex infectious disease that kills millions of people every year despite effective existing treatments. This motivates researchers to investigate how foreclosure impacts house prices and by which channels it happens. My dissertation addresses these limitations through a mixed-methods study combining interviews and a multi-year analysis of how organizations participate in federal advisory committees as a means of influencing regulation (rather than legislation). We also demonstrate the scalability of our model and recommended algorithm, showing that it has potential of providing real time advice to patients and oncologists. Specifically, this dissertation constructs efficient importance sampling estimators of certain rare-event probabilities involving affine point processes under a large pool regime. We introduce an online learning platform that scales collaborative learning. However, as more firms have successfully internationalized in recent years, there is a need for better understanding why, how, and where they choose to internationalize. And second, we conduct a model based comparison of a standalone loyalty reward program against traditional pricing - we theoretically characterize the conditions under which it is better to run a reward program within a competitive environment. Coalition loyalty programs are agreements between merchants allowing their customers to exchange reward points from one merchant to another at agreed upon exchange rates. For this reason, most practical implementations use statistically inefficient methods for exploration such as epsilon-greedy dithering, which can lead to exponentially slower learning. Although IAM representations of technological change are critical determinants of model outcomes, underlying processes are poorly understood and models typically feature fairly crude formulations. , a bid-ask spread, and a carrying cost. In this dissertation study, I use quantitative and qualitative methods to address the question of hybrid organizational performance in the context of microfinance. In this dissertation, I first examine the impact of ownership status ─ for-profit vs. The first is an inductive multiple-case study of five firms in the nascent US residential solar ecosystem as it emerged from 2007 to 2014. In this dissertation, I investigate executives' attention to competitors and the implications for firm innovation. We evaluate the cost-effectiveness of policies that use rapid diagnostics, transfer patients to clinics that use WHO-approved TB treatment regimens, or combinations of these policies in Chapter 3. In a reinforcement learning problem the decisions you make may affect the data you get, and even alter the underlying system for future timesteps. While microtask platforms have enabled non-expert workers to complete goals like text shortening and image labeling, highly complex and interdependent goals, such as web development and design, remain out of reach. Cyber security continues to be a rapidly evolving domain, but risk quantification illuminates the cyber landscape and enables defenders to improve resource allocation and optimize decision making. Enterprise infrastructure software firms, I examine attention to competitions in three empirical papers. We also observe that team members in more successful teams have diverse skill sets. However, few studies focus specifically on the continuing care providers. In this case, classes of scenarios are modeled and initialized with conditional probabilities elicited from experts. First, we discuss the design of coalition loyalty programs - schemes where customers can earn and spend reward points across multiple merchant partners. We also observe that team members in more successful teams have diverse skill sets. How should resource-constrained countries implement policies to combat TB, particularly as new diagnostic technology becomes available? Taken together, this thesis envisions a future of work in which digitally networked teams and organizations dynamically assemble from a globally distributed online workforce and computationally orchestrate their efforts to accomplish complex work. We apply this model to a case study of an electric utility considering the degree to which to integrate demand response technology into their smart grid network, jointly identifying both the optimal level of connectivity and the optimal strategy for the sequential allocation of cybersecurity resources. Online crowdsourcing marketplaces provide access to millions of individuals with a range of expertise and experiences. S. A lack of real-world data and massive uncertainty about cyber impacts has limited progress, but organizations can now be armed with the information and tools needed to measure cyber risk. In effect, this strategy involves taking teams that traditionally respond to cyber breaches after they occur, and instead employing them in a proactive manner for defensive and information gathering purposes. Specifically, this thesis introduces and evaluates two generalizable approaches for crowdsourcing complex work with experts. Mirrors) the experience of the CEO. We leverage these insights to establish several state of the art theoretical results and performance guarantees. However, if you want to learn to take actions where your choices can affect both the underlying system and the data you observe, you need reinforcement learning. CCRCs serve as platforms that link together residents on one side and service providers on the other side. Moreover, cancer varies with different patient characteristics and past treatment history. Technology R& D, conflict events, and external random events are modeled as stochastic processes for each player. In a reinforcement learning problem the decisions you make may affect the data you get, and even alter the underlying system for future timesteps. Therefore, decision makers must ask: how smart is smart enough? Prior research on how firms in developing countries undergo internationalization has been limited. Taken together, this thesis envisions a future of work in which digitally networked teams and organizations dynamically assemble from a globally distributed online workforce and computationally orchestrate their efforts to accomplish complex work. The carrying cost is the compound cost monetizing the waiting time for counterparties while locked in or holding a bond. Existing models do not address all cases where adversaries can co-opt or misuse even a tightly regulated technology. Numerical results illustrate the advantages of the proposed measure and volume-related trends. Three distinct papers constitute the core of this cumulative dissertation. , attracted to) its counterpart logic, then the organization will tend to achieve more comprehensive performance. Numerical results illustrate the advantages of the proposed estimators. In support of this thesis, I incorporate several prior theories on the liability of foreignness and institutional theory; investigate the role of culture in the internationalization of business groups; and analyze two in-depth case studies. In addition, my dissertation adds nuance to existing literature by showing a new pathway for corporate political activity, information sharing, that has long been the focus of organization theory in other contexts. Do hybrid organizations tend to achieve comprehensive performance on more than one demand at once? Together, the studies in this dissertation offer rich theory regarding how firms can succeed in early-stage ecosystems, despite the uncertainty and ambiguity that characterizes these settings. A lack of real-world data and massive uncertainty about cyber impacts has limited progress, but organizations can now be armed with the information and tools needed to measure cyber risk. Many industries consist of networks of interdependent firms that offer discrete products or services that together comprise a valuable solution. In this thesis, I develop a deep learning model for predicting house prices in the U. Within my deep learning framework, I handle missing data through an efficient imputation method, address spatial and temporal effects through new features created, and finally achieve a superior out-of-sample predictive performance on datasets across the country. Our model maintains a Markov belief about the effectiveness of the different therapies and updates it as therapies are administered and tumor images are observed. How should resource-constrained countries implement policies to combat TB, particularly as new diagnostic technology becomes available? Stochastic models of event timing are popular in many applications because of their ability to capture random event arrivals and their impacts. Welfare decreases with competition in the no-policy case, but increases with competition if optimal technology policies can be imposed. , attracted to) its counterpart logic, then the organization will tend to achieve more comprehensive performance. In the first paper, a conceptual analysis, I examine how complementors manage their dependence on platform owners in platform-based markets. How do private organizations influence public policy, particularly through non-economic means? These industry characteristics allow for testing hypotheses related to hybrid organizational performance and for investigation of a key contingency. With one of the largest TB burdens in the world and a limited TB budget, India is an important front in the battle to control TB. Taken together, I examine the antecedents and consequences of the strategies that low-powered actors can use to compete in intermediated markets. We find that India should revise the testing protocol in its first-line national TB treatment program to provide DST during the first month of treatment in areas of average or high DR TB prevalence and transmission. The data driven model is combined with the scenario based model by overlapping the two cost curves to ensure that incidents are not double counted, resulting in a complete and comprehensive assessment of cyber risk at the organization. Then we use the model to answer contemporary risk management questions in two diverse fields: cyber operations (a high-obsolescence technology field) and synthetic biology (a case study on dual-use influenza viral research). We propose a polynomial-time algorithm that finds a stable team allocation for a certain class of utility functions. Hundreds of thousands of patients begin first-line TB treatment in India each year. This thesis provides an in-depth analysis of two major components in the design of loyalty reward programs. This dissertation addresses this gap through three linked studies. Here I use an unprecedented dataset provided by the data vendor CoreLogic of over 100 million housing transactions across the U. Policies that sample essay use new rapid diagnostics may interrupt the transmission pathway, but their effectiveness may be undercut by inaccurate diagnosis and care inaccessibility in India. We model the team formation process as a cooperative game and prove the existence of stable team allocations. As such, these committees, and those represented on them, have the ability to affect agency decision making by influencing the information that an agency receives. Risk quantification is a critical requirement for organizations. In the case of large or rare cyber incidents where sufficient data do not exist, scenario analysis is used to obtain probabilistic assessments. This thesis is a useful read for marketers building promotional schemes within retail, researchers in the field of marketing and behavioral science, and companies investigating the resume writing service reviews monster intersection of customer behavior, loyalty, and virtual currencies. We develop a framework for computing a dynamic strategy for therapy choice in a large class of breast cancer patients, as an example of approaches to personalize therapies for individual characteristics and each patient's response to therapy. I find that agencies utilize these committees as part of an extensive information gathering network. Some IAMs are cost-benefit models designed to compute optimal policy interventions, while others are cost-effectiveness models used to determine the technology pathways that enable an emissions or climate goal to be achieved at least cost. In the first paper, a conceptual analysis, I examine how complementors manage their dependence on platform owners in platform-based markets. Such exchanges lead to transfer of liabilities between merchant partners, which need to be frequently settled using payments. Central to this approach is a new Bayes-adaptive network security model based on a reformulation of the classic "multi-armed bandits" problem, where instead of projects with uncertain probabilities of success, a network defender faces network nodes that can be attacked at uncertain Poisson-distributed rates. While combination policies would garner the most health benefits, they would also cost the most, and our results suggest that if budget constraints necessitate implementing one before the other, programs that increase the number of patients going to clinics using WHO-approved TB treatment regimens should be prioritized over rapid diagnosis policies. We estimate that using an improved testing protocol for one year could save India up to $2. Prior research on intermediated markets has often taken the perspective of powerful intermediaries. Even worse, drug-resistant (DR) and multidrug-resistant (MDR) forms of TB are becoming more predominant. For example, an organization might dedicate significant resources to detecting malicious insiders, even though its risk from website hacking is much larger. Transaction times and their bid-ask spreads are modeled by arrivals and marks of a marked point process so that bond illiquidity is estimated by an effective bid-ask spread and a certain function of its intensity. Typical decision models for technology focus on commercial applications where patent law or market economics strongly influence competition. The carrying cost is the compound cost monetizing the waiting time for counterparties while locked in or holding a bond. Additionally, this dissertation establishes accurate estimators of bond illiquidity from bond transaction records. Numerical simulation results show that technology policy can enhance welfare under a wide range of parameter settings. We first conduct an empirical investigation of existing coalitions, and formulate an analytical model of bargaining for merchant partners to agree upon the exchange rate and payment parameters. When the real estate bubble burst after the 2008 subprime crisis, there has been a significant portion of sales being foreclosed. For quantitative analysis, I compare the performance of non-hybrid and hybrid organizations relative to two types of demands (social and financial), by analyzing 10,069 firm years of data from 1,640 organizations in the microfinance industry over the past fifteen years. Among all the factors, foreclosure is believed to have a huge impact on house prices. E. Findings also demonstrate that policies phd theses which stimulate initial deployment of low-carbon technologies in advanced economies can be justified from a global common goods perspective even if they fail the cost-benefit test domestically. These industry characteristics allow for testing hypotheses related to hybrid organizational performance and for investigation of a key contingency. In this dissertation, I first examine the impact of ownership status ─ for-profit vs. We find that both types of policies (rapid diagnosis and transferring patients) and combination of policies improve health and increase costs relative to the status quo, and all but the rapid diagnosis policies alone would be cost-effective according to WHO thresholds for cost-effectiveness. In particular, the state-dependent change of measure is performed not at event arrivals but over a deterministic time grid. Then, we introduce a novel alternate methodology for settling the transferred liabilities between merchants participating in a coalition. Over 60,000 cyber security incidents from that organization are analyzed and used to initialize the model to determine the cost-effectiveness of security safeguards including full disk encryption, two-factor authentication, and network segmentation. We show that for the reward program to perform better, it is necessary for a minimum fraction of the customer population to be strategic, and the loyalty bias distribution to be within an optimal range. Scenario analyses based on these representations reveal their implications for energy and climate policy, as well as technology transitions this century. To analyze energy and climate policy remedies, researchers have developed a diverse collection of integrated assessment models (IAMs) that represent the linked energy, economic, and earth systems in an interdisciplinary framework. Endogenous diffusion constraints are incorporated into the MESSAGE framework and results suggest that IAMs based on standard exogenous diffusion formulations are overly optimistic about technology leapfrogging potential in developing countries. Tuberculosis (TB) is a complex infectious disease that kills millions of people every year despite effective existing treatments. This study's findings have implications for hybrid organizations combining multiple logics, for organizations reconciling social and financial performance, and for organizations dealing with various other combinations of multiple, concurrent demands. The methods we develop can be adapted to other diseases and settings and can be useful for informing other policy decisions surrounding the control of infectious disease in resource-constrained settings. Findings also demonstrate that policies which stimulate initial deployment of low-carbon technologies in advanced economies can be justified from a global common goods perspective even if they fail the cost-benefit test domestically. When a hybrid organization is dominated by a logic that is positively valenced (i. Specifically, this thesis introduces and evaluates two generalizable approaches for crowdsourcing complex work with experts. We study the impact of team formation and the team formation process in massive open online classes. The result is that cyber security safeguards can be valued and prioritized. We provide insight into why this algorithm can be simultaneously more statistically efficient and more computationally efficient than existing approaches. The process described above is a framework for the quantitative assessment of cyber risk in dollar terms. S. Overall, this research contributes to the literatures on strategy, organizations theory, and entrepreneurship. For qualitative study, I review secondary resources and perform numerous informal interviews with industry affiliates, complete semi-structured interviews with 38 industry affiliates, and analyze keyword frequency patterns in 1,339 organizational mission statements. The third moves from nascent to evolving ecosystems, and presents a cooperative game theory model that examines how and when firms can collaboratively resolve technological constraints that inhibit their ability to jointly create and capture value. This new technique, which by similarity we call "multi-node bandits, " takes a dynamic approach to cybersecurity investment, exploring how network defenders can optimally allocate cyber defense teams among nodes in their network. In the second paper, I show that executives are more attentive to competitors at the periphery of an industry when the experience of the executive team amplifies (i. Scholarship in political science and corporate political activity has primarily examined the influence of private organizations via lobbying, campaign donations and the "revolving door. Specifically, this dissertation constructs efficient importance sampling estimators of certain rare-event probabilities involving affine point processes under a large pool regime. For this reason, most practical implementations use statistically inefficient methods for exploration such as epsilon-greedy dithering, which can lead to exponentially slower learning. Findings illustrate that the most ambitious emissions reduction pathways include widespread solar PV diffusion, which only occurs if competitive markets and spillovers combine to reduce prices sufficiently. Mirrors) the experience of the CEO. We complement our analysis with extensive empirical experiments; these include several didactic examples as well as a recommendation system, Tetris, and Atari 2600 games. Typical decision models for technology focus on commercial applications where patent law or market economics strongly influence competition. Our work is inspired by the Thompson sampling heuristic for multi-armed bandits which suggests, at a high level, to "randomly select a policy according to the probability that it is optimal". For qualitative study, I review secondary resources and perform numerous informal interviews with industry affiliates, complete semi-structured interviews with 38 industry affiliates, and analyze keyword frequency patterns in 1,339 organizational mission statements. Numerical simulation results show that technology policy can enhance welfare under a wide range of parameter settings. While combination policies would garner the most health benefits, they would also cost the most, and our results suggest that if budget constraints necessitate implementing one before the other, programs that increase the number of do cover sheet term paper patients going to clinics using WHO-approved TB treatment regimens should be phd theses prioritized over rapid diagnosis policies. Chief information officers (CIOs) operate with limited resources and typically do not know the relative risk of different cyber attack vectors, such as malicious email, website attacks, or lost laptops. We evaluate the cost-effectiveness of policies that use rapid diagnostics, transfer patients to clinics that use WHO-approved TB treatment regimens, or combinations of these policies in Chapter 3. Spillovers reduce product R& D expenditures but generally improve welfare by making R& D more effective. Importantly, and unlike previous approaches to deep exploration, this approach also scales gracefully to complex domains with generalization. Strategies that disrupt DR TB transmission are projected to provide greater reductions in DR TB prevalence compared with improving non-DR treatment quality. This dual approach enables business groups to survive economic downturns and outperform established industry leaders as seen during the recent financial crisis. E. , repulsed by) its counterpart logics, then hybrid organizational performance will tend to be diminished. , a bid-ask spread, and a carrying cost. We introduce an online learning platform that scales collaborative learning. Our model has three interesting properties -- it is decentralized, arbitrage-proof, and fair against market power concentration -- which make it a real alternative to how settlements happen in coalition loyalty programs. In Chapter 4, we design a partially observed Markov decision process (POMDP) model for determining when rapid diagnostics should be used for drug sensitivity testing (DST) in first-line TB treatment in India, should it be adopted nationwide. We find that the proportion of transmission-generated DR TB will continue rise over time. This dissertation presents a probabilistic risk analysis (PRA) framework to this problem, involving systems analysis, stochastic modeling, economic analysis, and decision analysis to quantify the overall benefit and risk facing the network and ultimately help decision makers formally assess tradeoffs and set priorities given limited resources. The process described above is a framework for the quantitative assessment of cyber risk in dollar terms. CCRCs serve as platforms that link together residents on one side and service providers on the other side. Decision makers in government, industry, and academia need to consider adversaries with harmful intentions when planning the development and adoption of some new technologies. The relationship between price and cumulative capacity is similar to that between unit cost and cumulative capacity under competitive markets, but a combination of market power, strong climate policy, and weak spillovers can cause prices to rise with cumulative capacity even though unit costs decline. Oncologists have to select and switch therapies considering the trade-off between treatment efficacy and therapy sides effects for an increasing number of therapies and combinations. Oncologists have to select and switch therapies considering the trade-off between treatment efficacy and therapy sides effects for an increasing number of therapies and combinations. The goal of the three projects that constitute this dissertation is to develop more advanced representations of technological change that capture a wider range of endogenous drivers. This dissertation discusses the application of probabilistic risk analysis (PRA) to cyber systems, which allows decision makers to rigorously assess the value of cyber security safeguards. Some IAMs are cost-benefit models designed to compute optimal policy interventions, while others are cost-effectiveness models used to determine the technology pathways that enable an emissions or climate goal to be achieved at least cost. Prior research on how firms in developing countries undergo internationalization has been limited. We develop a general framework and model that is intended to capture strategic issues in technology decision making using a Markov game. We apply this model to a case study of an electric utility considering the degree to which to integrate demand response technology into their smart grid network, jointly identifying both the optimal level of connectivity and the optimal strategy for the sequential allocation of cybersecurity resources. Three distinct papers constitute the core of this cumulative dissertation. Although ours is a predominantly capitalistic society, there have long been concerns about the possible adverse or pernicious effects of profit motivations in healthcare. Prior research on ecosystems has generally examined firm strategy in established ecosystems, in which the identity and relationships between firms and components are known. This game-theoretic representation of renewable technology markets is coupled to MESSAGE so that the energy system planner can only invest in wind and solar PV capacity at the equilibrium prices the market would charge for the desired quantities. In the second paper, I show that executives are more attentive to competitors at the periphery of an industry when the experience of the executive team amplifies (i. First, different classes of attack scenarios are modeled. Together, the studies in this dissertation offer rich theory regarding how firms can succeed in early-stage ecosystems, despite the uncertainty and ambiguity that characterizes these settings. Spillovers reduce product R& D expenditures but generally improve welfare by making R& D more effective. Each of the three projects focuses on a distinct aspect of technological change, but the formulations developed for these studies reflect several important themes: endogenous mechanisms, multiple decision-making agents, game-theoretic interactions, market power, spillovers, regional heterogeneity, and uncertainty. These cases seem unrelated—but they share mathematical features that benefit from analysis with our model. The second is a formal mathematical model that examines how the level of competition (ecosystem vs. The first path is to enter other institutionally close developing countries by exploiting the firm's existing resources and know-how. The methods we develop can be adapted to other diseases and settings and can be useful for informing other policy decisions surrounding the control of infectious disease in resource-constrained settings. While the research presented in this dissertation advances the modeling of technological change, a number of formidable challenges remain. Component) affects firms' ability to create and capture value in nascent ecosystems. Using a hand-collected dataset on competition, innovation, and executive experience in the full population of public U. As electric sector stakeholders make the decision to upgrade traditional power grid architectures by incorporating smart grid technologies and new intelligent components, the benefits of added connectivity must be weighed against the risk of increased exposure to cyberattacks. We propose a polynomial-time algorithm that finds a stable team allocation for a certain class of utility functions. In this thesis, I develop a deep learning model for predicting house prices in the U. To demonstrate this framework in action, this dissertation describes a general model combined with a detailed case study of cyber risk quantification at a large organization. Statistics and machine learning has made great strides in prediction and estimation from any fixed dataset. Findings illustrate that the most ambitious emissions reduction pathways include widespread solar PV diffusion, which only occurs if competitive markets and spillovers combine to reduce prices sufficiently. Based on this examination, this dissertation advances the thesis that business groups have two paths that need to be balanced in order for business groups to thrive. I find that agencies utilize these committees as part of an extensive information gathering network. Overall, this research contributes to the literatures on strategy, organizations theory, and entrepreneurship. Prior research on intermediated markets has often taken the perspective of powerful intermediaries. This effect I demonstrate through a statistical analysis of the relationship between representation on committees and the receipt of policy-related grants from related agencies. With the fitted model, I further explore the relationship between foreclosure discount and other variables such as the underlying house price, the age of the house and the neighborhood house price, which couldn't be fully characterized by previous linear models. Statistically efficient reinforcement learning requires "deep exploration" or the ability to plan to learn. By highlighting this two-sided market structure, my model provides new insights to understand the increase in for-profit CCRC's market shares observed in the last decade in the US. We extend the microsimulation model developed in Chapter 2 and additionally evaluate lifetime costs and health outcomes for each of the policies considered. This study contributes to the theory of internationalization and to the ongoing research of culture in the field of international business. , repulsed by) its counterpart logics, then hybrid organizational performance will tend to be diminished. We show that our bargaining model produces networks that are close to optimal in terms of social welfare, in addition to cohering with empirical observations. These cases phd theses seem unrelated—but they share mathematical features that benefit from analysis with our model. This dissertation presents a probabilistic risk analysis (PRA) framework to this problem, involving systems analysis, stochastic modeling, economic analysis, and decision analysis to quantify the overall benefit and risk facing the network and ultimately help decision makers formally assess tradeoffs and set priorities given limited resources. First, different classes of attack scenarios are modeled. In this empirical study, I collect data from the California Department of Social Services (CDSS) and on-site interviews in 26 Continuing Care Retirement Communities (CCRCs) in California. From 2004 to 2014. In this dissertation we present an alternative approach to deep exploration through the use of randomized value functions. First, we discuss the design of coalition loyalty programs - schemes where customers can earn and spend reward points across multiple merchant partners. To date, however, most research has focused on microtask platforms, such as Amazon Mechanical Turk. Risk quantification is a critical requirement for organizations. Lastly, this study makes valuable recommendations to managers and government policymakers on how to optimize the resources and capabilities of business groups to support their domestic markets. In the final chapter of the dissertation, I investigate how these phd theses lessons learned from the senior care industry in the U. However, recent scholarship on "hybrid" organizations describes organizations that arrange to simultaneously fulfill multiple types of demands. This dissertation extends the technology adoption literature to consider technology decisions with adversaries in conflict scenarios where technology determines outcomes for the decision makers. These data initialize a Monte Carlo simulation to calculate probability distributions of monetary losses resulting from cyber incidents at the organization. In the final chapter of the dissertation, I investigate how these lessons learned from the senior care industry in the U. Welfare decreases with competition in the no-policy case, but increases with competition if optimal technology policies can be imposed. The measure of bond illiquidity is defined as the sum of a round-trip transaction cost, i. In this industry, two types of hybrid and two types of non-hybrid organizations regularly report both their social and financial performance. Technology R& D, conflict events, and external random events are modeled as stochastic processes for each player. This dual approach enables business groups to survive economic downturns and outperform established industry leaders as seen during the recent financial crisis. As such, these committees, and those represented on them, have the ability to affect agency decision making by influencing the information that an agency receives. There is a strong consensus that the climate is changing, that human activities are the dominant cause of this change, and that continued climate change will have negative impacts on human societies. In regions with low DR TB prevalence and transmission, individually tailored testing regimens can reduce cost while maintaining health benefits of treatment. The result is that cyber security safeguards can be valued and prioritized. Prior work suggests that when organizations are faced with multiple performance demands, performance is diminished unless it is concentrated on only one set of those demands. We develop a dynamic transmission microsimulation model of TB in India. The first approach, flash teams, is a framework for dynamically assembling and computationally managing crowdsourced expert teams. Advisory committees are a common tool federal agencies use to solicit feedback and gather expert advice from non-governmental sources. E. Planning for treatment of cancer is challenging due to the complexity of the disease. Also, the modeling results can help the management in for-profit and nonprofit CCRCs better understand their different strategic positions and assist in their decision-making for market competition and collaboration. This thesis provides an in-depth analysis of two major components in the design of loyalty reward programs. These data initialize a Monte Carlo simulation to calculate probability distributions of monetary losses resulting from cyber incidents at the organization. Numerical results illustrate the advantages of the proposed measure and volume-related trends. We find that both types of policies (rapid diagnosis and transferring patients) and combination of policies improve health and increase costs relative to the status quo, and all but the rapid diagnosis policies alone would be cost-effective according to WHO thresholds for cost-effectiveness. Nonprofit ─ on occupancy rate, price, and quality of service in the continuing care industry through an empirical study in California. Empirical study of informal interviews, semi-structured interviews, mission statements, and annual performance data largely corroborate the theoretical model. As electric sector stakeholders make the decision to upgrade traditional power grid architectures by incorporating smart grid technologies and new intelligent components, the benefits of added connectivity must be weighed against the risk of increased exposure to cyberattacks. Current best practices rarely incorporate quantitative risk tools and instead largely advocate the use of risk matrices, which are ambiguous and lack the ability to incorporate system dependencies. In the first paper, I show that attending to competitors that activate opportunity-based rather than threat-based views of competition has a positive relationship with product innovation. In Chapter 3, learning-by-doing is formulated as a firm-level rather than an industry-level phenomenon. Such exchanges lead to transfer of liabilities between merchant partners, which need to be frequently settled using payments. Sensitivity analysis can also be performed to identify the important uncertainties and the robustness of different safeguard implementation decisions. To demonstrate this framework in action, this dissertation describes a general model combined with a detailed case study of cyber risk quantification at a large organization. Therefore as transmission-generated DR TB becomes a larger driver of the DR TB epidemic in India, rapid and accurate DR TB diagnosis and treatment will become increasingly effective in reducing DR TB cases compared to non-DR TB treatment improvements. Several common criteria for optimality of the estimators under limited computational resources are analyzed. For example, an organization might dedicate significant resources to detecting malicious insiders, even though its risk from website hacking is much larger. E. In this dissertation, we present both practical and methodological contributions in the area of health policy modeling. Numerical results illustrate the advantages of the proposed estimators. We use this algorithm to recommend teams to learners. In this dissertation we present an alternative approach to deep exploration through the use of randomized value functions. Current best practices rarely incorporate quantitative risk tools and instead largely advocate the use of risk matrices, which are ambiguous and lack the ability to incorporate system dependencies. Statistically efficient reinforcement learning requires "deep exploration" or the ability to plan to learn. This thesis is a useful read for marketers building promotional schemes within retail, researchers in the field of marketing and behavioral science, and companies investigating the intersection of customer behavior, loyalty, and virtual currencies. We assume customers are either myopic or strategic, and have a prior loyalty bias toward the reward program merchant, drawn from a known distribution. However, recent scholarship on "hybrid" organizations describes organizations that arrange to simultaneously fulfill multiple types of demands. S. This dissertation discusses the application of probabilistic risk analysis (PRA) to cyber systems, which allows decision makers to rigorously assess the value of cyber security safeguards. Changing the model structure or the model inputs shows how each safeguard affects the consequence distribution, essentially demonstrating the value of each safeguard. In this dissertation, I take the perspective of low-power actors and examine how they compete. Although ours is a predominantly capitalistic society, there have long been concerns about the possible adverse or pernicious effects of profit motivations in healthcare. The second is a formal mathematical model that examines how the level of competition (ecosystem vs. Based on this examination, this dissertation advances the thesis that business groups have two paths that need to be balanced in order for business groups to thrive. We compare three different approximate methods to solve our analytical model against standard medical practice and show significant potential benefit of the computed dynamic strategies to limit tumor growth and to reduce the number of time periods patients are given chemotherapy, with its attendant side effects. We find that the proportion of transmission-generated DR TB will continue rise over time. We estimate that using an improved testing protocol for one year could save India up to $2. Advisory committees are a common tool federal agencies use to solicit feedback and gather expert advice from non-governmental sources. Less is known technology in business essay about firm strategy in early-stage ecosystems, which are those that are in an early state of emergence or evolution. We develop a general framework and model that is intended to capture strategic issues in technology decision making using a Markov game. Within my deep learning framework, I handle missing data through an efficient imputation method, address spatial and temporal effects through new features created, and finally achieve a superior out-of-sample predictive performance on datasets across the country. By highlighting this two-sided market structure, my model provides new insights to understand the increase in for-profit CCRC's market shares observed in the last decade in the US. Both of these approaches for interdependent expert crowd work are manifested in Foundry, which is a computational platform we have built for authoring and managing teams of expert crowd workers. In addition, my dissertation adds nuance to existing literature by showing a new pathway for corporate political activity, information sharing, that has long been the focus of organization theory in other contexts. Importantly, and unlike previous approaches to deep exploration, this approach also scales gracefully to complex domains with generalization. In this dissertation study, I use quantitative and qualitative methods to address the question of hybrid organizational performance in the context of microfinance. Wind and solar PV manufacturers strategically choose output levels in an oligopoly game with learning and inter-firm spillovers. However, few studies focus specifically on the continuing care providers. Changing the model structure or the model inputs shows how each safeguard affects the consequence distribution, essentially demonstrating the value of each safeguard. Previous approaches to deep exploration have not been computationally tractable beyond small scale problems. In the third paper, I use social network analysis to show that personal similarities between CEOs can influence competition between firms. S. In the third paper, I conduct an empirical analysis of how competition in the intermediary portfolio affects the success of employees' intra- and entrepreneurial activities. We assume customers are either myopic or strategic, and have a prior loyalty bias toward the reward program merchant, drawn from a known distribution. Scenario analyses based on these representations reveal their implications for energy and climate policy, as well as technology transitions this century. Coalition loyalty programs are agreements between merchants allowing their customers to exchange reward points from one merchant to another at agreed upon exchange rates. We present structural properties of the model and analytical results. These findings demonstrate the importance of studying regulation, not legislation, as the "hand of government" that most frequently interacts with organizations and the ability of private organizations to influence regulation. And second, we conduct a model based comparison of a standalone loyalty reward program against traditional pricing - we theoretically characterize the conditions under which it is better to run a reward program within a competitive environment. Empirical study of informal interviews, semi-structured interviews, mission statements, and annual performance data largely corroborate the theoretical model. While microtask platforms have enabled non-expert workers to complete goals like text shortening and image labeling, highly complex and interdependent goals, such as web development and design, remain out of reach. With one of the largest TB burdens in the world and a limited TB budget, India is an important front in the battle to control TB. In Chapter 4, we design a partially observed Markov decision process (POMDP) model for determining when rapid diagnostics should be used for drug sensitivity testing (DST) in first-line TB treatment in India, should it be adopted nationwide. Chief information officers (CIOs) operate with limited resources and typically do not know the relative risk of different cyber attack vectors, such as malicious email, website attacks, or lost laptops. Using a hand-collected dataset on competition, innovation, and executive experience in the full population of public U. In the second part of this dissertation, I set up a two-sided market framework to model the competition between for-profit and nonprofit CCRCs. Also, the modeling results can help the management in for-profit and nonprofit CCRCs better understand their different strategic positions and term paper on nursing assist in their decision-making for market competition and collaboration. There is a strong consensus that the climate is changing, that human activities are the dominant cause of this change, and that continued climate change will have negative impacts on human societies. Firms (inner agents) solve a two-stage stochastic profit maximization problem in which they choose process and product R& D investments in the first stage, then choose output levels in the second stage. Can be adapted to the different cultural and social backgrounds in developing countries such as China, which is emerging as an aging society and has recently started planning and building its senior care infrastructure. We model the team formation process as a cooperative game and prove the existence of stable team allocations. In the second paper, I examine how sellers resolve the "big fish, big pond" dilemma in their choice of intermediaries. Existing models do not address all cases where adversaries can co-opt or misuse even a tightly regulated technology. The majority of the previous empirical studies comparing performance between for-profit and nonprofit healthcare providers suggested that nonprofit providers were superior. The second approach, flash organizations, is a framework for creating rapidly assembled and reconfigurable organizations composed of large groups of expert crowd workers. This multi-pronged approach provides a framework for scholars to better understand the internationalization and associated strategic motives. Statistics and machine learning has made great strides in prediction and estimation from any fixed dataset. In Chapter 2, we examine the relationship between treatment-generated and transmission-generated DR TB, and we evaluate the potential effectiveness of the following two disease control strategies in reducing the prevalence of DR TB: a) improving treatment of non-DR TB; b) shortening the infectious period between the activation of DR TB and initiation of effective DR treatment. In Chapter 2, we examine the relationship between treatment-generated and transmission-generated DR TB, and we evaluate the potential effectiveness of the following two disease control strategies in reducing the prevalence of DR TB: a) improving treatment of non-DR TB; b) shortening the infectious period between the activation of DR TB and initiation of effective DR treatment. This study's findings have implications for hybrid organizations combining multiple logics, for organizations reconciling social and financial performance, and for organizations dealing with various phd theses other combinations of multiple, concurrent demands. Therefore, decision makers must ask: how smart is smart enough? Many industries consist of networks of interdependent firms that offer discrete products or services that together comprise a valuable solution. For the particular settings of point processes with stochastic intensities, this dissertation develops a simulation and estimation methodologies. S. Next, the rate and consequences of each scenario are assessed, drawing heavily from historical data at organizations, academic literature, publicly available data, and expert knowledge. We extend the microsimulation model developed in Chapter 2 and additionally evaluate lifetime costs and health outcomes for each of the policies considered. " These studies are inherently limited by a perspective that views legislation as the outcome of the market for dollars and votes and by focusing on legislation almost exclusively. Presently, cyber risk is managed qualitatively in most organizations. Wind and solar PV manufacturers strategically choose output levels in an oligopoly game with learning and inter-firm spillovers. For example, laptops are lost or stolen, websites are defaced, phishing emails attempt to steal employee credentials, and malware infects machines via web browsing. " These studies are inherently limited by a perspective that views legislation as the outcome of the market for dollars and votes and by focusing on legislation almost exclusively. We leverage these insights to establish several state of the art theoretical results and performance guarantees. The bilevel modeling framework of Chapter 4 is built to determine the optimal combination of technology-push and demand-pull subsidies for a given technology policy application. Reinforcement learning builds upon learning from datasets, but also addresses the issues of partial feedback and long term consequences. Few changes in the organization of healthcare in the United States have stimulated more interest and alarm than the rise of a new form of entrepreneurism -- Investor-owned, for-profit organizations that provide health services as a business. Several common criteria for optimality of the estimators under limited computational resources are analyzed. Do hybrid organizations tend to achieve comprehensive performance on more than one demand at once? This thesis shifts away from paid microtask work and introduces diverse expert crowds as a core component of crowdsourcing systems. Among all the factors, foreclosure is believed to have a huge impact on house prices. Prior research on ecosystems has generally examined firm strategy in established ecosystems, in which the identity and relationships between firms and components are known. These findings demonstrate the importance of studying regulation, not legislation, as the "hand of government" that most frequently interacts with organizations and the ability of private organizations to influence regulation. Then, we introduce a novel alternate methodology for settling the transferred liabilities between merchants participating in a coalition. The measure of bond illiquidity is defined as the sum of a round-trip transaction cost, i. Online crowdsourcing marketplaces provide access to millions of individuals with a range of expertise and experiences. This dissertation examines the internationalization of business groups in developing countries and the importance of institutional settings. In particular, the state-dependent change of measure is performed not at event arrivals but over a deterministic time grid. Both of these approaches for interdependent expert crowd work are manifested in Foundry, which is a computational platform we have built for authoring and managing teams of expert crowd workers. House price prediction has been increasingly important to many sectors of the economy, such as real estate, mortgage investment and risk management, and government property tax collection. Each of the three projects focuses on a distinct aspect of technological change, but the formulations developed for these studies reflect several important themes: endogenous mechanisms, multiple decision-making agents, game-theoretic interactions, market power, spillovers, regional heterogeneity, and uncertainty. We also demonstrate the scalability of our model and recommended algorithm, showing that it has potential of providing real time advice to patients and oncologists. The first is an inductive multiple-case study of five firms in the nascent US residential solar ecosystem as it emerged from 2007 to 2014. The relationship between price and cumulative capacity is similar to that between unit cost and cumulative capacity under competitive markets, but a combination of market power, strong climate policy, and weak spillovers can cause prices to rise with cumulative capacity even though unit costs decline. I find significant regional differences as well as universal patterns across different areas. 5 billion by preventing downstream transmission. The goal of the three projects that constitute this dissertation is to develop more advanced representations of technological change that capture a wider range of endogenous drivers. In the second part of this dissertation, I set up a two-sided market framework to model the competition between for-profit and nonprofit CCRCs. In the third paper, I use social network analysis to show that personal similarities between CEOs can influence competition between firms. This game-theoretic representation of renewable technology markets is coupled to MESSAGE so that the energy system planner can only invest in wind and solar PV capacity at the equilibrium prices the market would charge for the desired quantities. Moreover, cancer varies with different patient characteristics and past treatment history. However, if you want to learn to take actions where your choices can affect both the underlying system and the data you observe, you need reinforcement learning. The "Big Data" revolution is spawning systems designed to make decisions from data. In regions with low DR TB prevalence and transmission, individually tailored testing regimens can reduce cost while maintaining health benefits of treatment.