default search action
Decision Support Systems, Volume 56
Volume 56, December 2013
- Carlos Murillo-Sánchez, Ray Zimmerman, C. Lindsay Anderson, Robert J. Thomas:
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed reserve. 1-10 - Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan:
Cyber-risk decision models: To insure IT or not? 11-26 - Wooje Cho, Ramanath Subramanyam, Mu Xia:
Vendors' incentives to invest in software quality in enterprise systems. 27-36 - Bouchaib Bahli, Suzanne Rivard:
Cost escalation in information technology outsourcing: A moderated mediation study. 37-47 - Juan A. Recio-García, Lara Quijano Sánchez, Belén Díaz-Agudo:
Including social factors in an argumentative model for Group Decision Support Systems. 48-55 - Yan Li, Chuan-Hoo Tan, Xue Yang:
It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. 56-62 - Asil Oztekin, Dursun Delen, Ali Turkyilmaz, Selim Zaim:
A machine learning-based usability evaluation method for eLearning systems. 63-73 - François Marmier, Didier Gourc, Frederic Laarz:
A risk oriented model to assess strategic decisions in new product development projects. 74-82 - Hao Hu, Vincent S. Lai:
Cognitive-based evaluation of consumption fads: An analytical approach. 83-91 - Chuan Luo, Xin (Robert) Luo, Laurie Schatzberg, Choon-Ling Sia:
Impact of informational factors on online recommendation credibility: The moderating role of source credibility. 92-102 - Caroline Lancelot Miltgen, Ales Popovic, Tiago Oliveira:
Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context. 103-114 - Michael Chau, Ada Wong, Minhong Wang, Songnia Lai, Kristal W. Y. Chan, Tim M. H. Li, Debbie Chu, Ian K. W. Chan, Wai-Ki Sung:
Using 3D virtual environments to facilitate students in constructivist learning. 115-121 - Se-Joon Hong, Carrie Siu Man Lui, Jungpil Hahn, Jae Yun Moon, Tai Gyu Kim:
How old are you really? Cognitive age in technology acceptance. 122-130 - Tsan-Ming Choi, Jian Li, Ying Wei:
Will a supplier benefit from sharing good information with a retailer? 131-139 - Eugenia Y. Huang, Travis K. Huang:
Exploring the effect of boundary objects on knowledge interaction. 140-147 - Shih-Wei Chou, Chun-Hsiung Chiang:
Understanding the formation of software-as-a-service (SaaS) satisfaction from the perspective of service quality. 148-155 - Jun He, Yingqin Gu, Hongyan Liu, Jun Yan, Hong Chen:
Scalable and noise tolerant web knowledge extraction for search task simplification. 156-167 - Christiane Rosen, Reinhard Madlener:
An auction design for local reserve energy markets. 168-179 - Patrick Y. K. Chau, Shuk Ying Ho, Kevin K. W. Ho, Yihong Yao:
Examining the effects of malfunctioning personalized services on online users' distrust and behaviors. 180-191 - Johannes Paefgen, Thorsten Staake, Frédéric Thiesse:
Evaluation and aggregation of pay-as-you-drive insurance rate factors: A classification analysis approach. 192-201 - Yaojin Lin, Xuegang Hu, Xiaomei Li, Xindong Wu:
Mining stable patterns in multiple correlated databases. 202-210 - Xiaolin Zheng, Shuai Zhu, Zhangxi Lin:
Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approach. 211-222 - Joseph Barjis, Gwendolyn L. Kolfschoten, Johan Maritz:
A sustainable and affordable support system for rural healthcare delivery. 223-233 - Heng Tang, Stephen Shaoyi Liao, Sherry Xiaoyun Sun:
A prediction framework based on contextual data to support Mobile Personalized Marketing. 234-246 - Paulo B. Góes, Yanbin Tu, Y. Alex Tung:
Seller heterogeneity in electronic marketplaces: A study of new and experienced sellers in eBay. 247-258 - Ming-Tsang Lu, Shi-Woei Lin, Gwo-Hshiung Tzeng:
Improving RFID adoption in Taiwan's healthcare industry based on a DEMATEL technique with a hybrid MCDM model. 259-269 - Li Chen, James R. Marsden, Zhongju Zhang:
Reliability (or "lack thereof") of on-line preference revelation: A controlled experimental analysis. 270-274 - Wim Laurier, Geert Poels:
Invariant conditions in value system simulation models. 275-287 - Jörg Leukel, Vijayan Sugumaran:
Formal correctness of supply chain design. 288-299 - Long Pham, Alexander Zaitsev, Robert Steiner, Jeffrey E. Teich:
NegotiAuction: An experimental study. 300-309 - Henrik Leopold, Rami-Habib Eid-Sabbagh, Jan Mendling, Leonardo Guerreiro Azevedo, Fernanda Araújo Baião:
Detection of naming convention violations in process models for different languages. 310-325 - Eric Lefèvre, Zied Elouedi:
How to preserve the conflict as an alarm in the combination of belief functions? 326-333 - Pei-Fang Hsu:
Integrating ERP and e-business: Resource complementarity in business value creation. 334-347 - Mark L. DeFond, Yaniv Konchitchki, Jeff L. McMullin, Daniel E. O'Leary:
Capital markets valuation and accounting performance of Most Admired Knowledge Enterprise (MAKE) award winners. 348-360 - Young Hoon Kim, Dan Jong Kim, Kathy Wachter:
A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention. 361-370 - Yoshio Kamijo:
Bidding behaviors for a keyword auction in a sealed-bid environment. 371-378 - Di He, Wei Chen, Liwei Wang, Tie-Yan Liu:
Online learning for auction mechanism in bandit setting. 379-386 - Deqiang Han, Yong Deng, Chongzhao Han:
Sequential weighted combination for unreliable evidence based on evidence variance. 387-393
- Ming Fan, Lingfang (Ivy) Li, De Liu:
Introduction to the special issue on "Mechanism Design in E-commerce and Information Systems". 395-396 - Hao Wang, Qiang Wei, Guoqing Chen:
From clicking to consideration: A business intelligence approach to estimating consumers' consideration probabilities. 397-405 - Ming Lei, Xinna Zhao, Honghui Deng, Keah-Choon Tan:
DEA analysis of FDI attractiveness for sustainable development: Evidence from Chinese provinces. 406-418 - Ninghua Du, Hailiang Huang, Lingfang (Ivy) Li:
Can online trading survive bad-mouthing? An experimental investigation. 419-426 - Xiaoyan Liu, Zhiling Guo, Zhenjiang Lin, Jian Ma:
A local social network approach for research management. 427-438 - Yong Hu, Xiangzhou Zhang, E. W. T. Ngai, Ruichu Cai, Mei Liu:
Software project risk analysis using Bayesian networks with causality constraints. 439-449 - Jun Li, De Liu, Shulin Liu:
Optimal keyword auctions for optimal user experiences. 450-461 - Alfred Zhu Liu, Hongju Liu, Sean Xin Xu:
How do competitive environments moderate CRM value? 462-473 - Bin Gu, Qian Tang, Andrew B. Whinston:
The influence of online word-of-mouth on long tail formation. 474-481 - Youwei Wang, Shan Wang, Yulin Fang, Patrick Y. K. Chau:
Store survival in online marketplace: An empirical investigation. 482-493 - Xueqi (David) Wei, Barrie R. Nault:
Experience information goods: "Version-to-upgrade". 494-501 - Qiang Ye, Zhuo (June) Cheng, Bin Fang:
Learning from other buyers: The effect of purchase history records in online marketplaces. 502-512 - YiMing Zheng, Kexin Zhao, Antonis C. Stylianou:
The impacts of information quality and system quality on users' continuance intention in information-exchange virtual communities: An empirical investigation. 513-524
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.