Zhengrui Jiang
Iowa State University
Markov decision processDistortionSoftware qualityData miningDiffusion (business)BusinessEconometricsEconomicsMarketingProfit (economics)New product developmentRevenueData qualitySoftwareDiffusion of innovationsIndustrial organizationComputer scienceProduct (business)Expert systemData integrationBig dataDatabase
42Publications
9H-index
333Citations
Publications 32
Newest
#1Haiyang FengH-Index: 5
#2Zhengrui JiangH-Index: 9
Last. Nan Feng (College of Management and Economics)H-Index: 7
view all 4 authors...
Information technology-enabled platforms are playing an increasingly important role in the global economy. While some successful platforms entered their respective markets as pioneers, others were able to achieve market dominance despite starting as followers. This study investigates the conditions under which first-mover advantage (FMA) or second-mover advantage (SMA) occurs in a platform market, and derives their equilibrium order of market entries and optimal market entry timing. The first th...
1 CitationsSource
#1Aslan LotfiH-Index: 1
#2Zhengrui JiangH-Index: 9
Last. Ali LotfiH-Index: 11
view all 3 authors...
#1Zhengrui Jiang (Iowa State University)H-Index: 9
#2Xinxue Qu (Iowa State University)H-Index: 1
Last. Dipak C. JainH-Index: 3
view all 3 authors...
Determining the optimal market entry timing for successive product generations is a critical decision for firms. Pioneering studies on market entry timing have focused on purchase-to-own (PTO) products (e.g., computers) and assumed that an old product generation can continue to be sold after the release of a new generation. In this study, both PTO products and subscribe-to-use (STU) products (e.g., Office 365) are considered, and an old generation can either coexist with or be completely replace...
4 CitationsSource
#1Haiyang Feng (College of Management and Economics)H-Index: 5
#2Zhengrui Jiang (Iowa State University)H-Index: 9
Last. Nan Feng (College of Management and Economics)H-Index: 1
view all 4 authors...
Information technology-enabled platforms are playing increasingly important roles in the global economy. While some successful platforms entered their respective markets as pioneers, others were able to achieve market dominance despite starting as followers. This study investigates the conditions under which first-mover advantage (FMA) or second-mover advantage (SMA) occurs in a platform market, and derives their equilibrium order of market entries and optimal market entry timing. The first thre...
#1M. W. Wang (ZJU: Zhejiang University)H-Index: 3
#1Mingzheng Wang (ZJU: Zhejiang University)H-Index: 1
Last. Haifang Yang (DUT: Dalian University of Technology)H-Index: 1
view all 4 authors...
Privacy-preserving data publishing has received much attention in recent years. Prior studies have developed various algorithms such as generalization, anatomy, and L-diversity slicing to protect individuals’ privacy when transactional data are published for public use. These existing algorithms, however, all have certain limitations. For instance, generalization protects identity privacy well but loses a considerable amount of information. Anatomy prevents attribute disclosure and lowers inform...
7 CitationsSource
#1Xinxue Qu (Iowa State University)H-Index: 1
#2Zhengrui Jiang (Iowa State University)H-Index: 9
Data is becoming an increasingly important asset in today’s organizations. Various challenges in the age of big data, such as high volume and high velocity, call for efficient database maintenance policies. This study focuses on deriving an optimal synchronization policy for consolidated database systems. By trading off synchronization cost with data staleness cost, we propose a time-based dynamic synchronization (TDS) policy, which evaluates the system state at predetermined checkpoints and syn...
#1M. W. Wang (ZJU: Zhejiang University)H-Index: 3
#1Mingzheng Wang (ZJU: Zhejiang University)H-Index: 20
Last. Haifang Yang (DUT: Dalian University of Technology)H-Index: 1
view all 3 authors...
Privacy-preserving data publishing has received much attention in recent years. Prior studies have developed various algorithms such as generalization, anatomy, and L-diversity slicing to protect individuals’ privacy when transactional data are published for public use. These existing algorithms, however, all have certain limitations. For instance, generalization protects identity privacy well, but loses a considerable amount of information. Anatomy prevents attribute disclosure and lowers infor...
#1Xinxue Qu (Iowa State University)H-Index: 1
view all 3 authors...
#1Haiyang Feng (College of Management and Economics)H-Index: 5
#2Zhengrui Jiang (Iowa State University)H-Index: 9
Last. Dengpan Liu (Iowa State University)H-Index: 1
view all 3 authors...
As a new software licensing model, software-as-a-service (SaaS) is gaining tremendous popularity across the globe. In this study, we investigate the competition between a new entrant and an incumbent in a SaaS market, and derive the optimal market entry strategy for the new entrant. One interesting finding is that, when the new entrant’s product is fully compatible with that of the incumbent, but has a significantly lower quality, the new entrant should adopt an instant-release strategy, i.e., r...
10 CitationsSource
#1Sudip Bhattacharjee (UConn: University of Connecticut)H-Index: 16
#2Varghese S. Jacob (UTD: University of Texas at Dallas)H-Index: 25
Last. Subodha Kumar (TU: Temple University)H-Index: 22
view all 4 authors...
Source