


default search action
Computational & Mathematical Organization Theory, Volume 28
Volume 28, Number 1, March 2022
- Najib Ali Mozahem

:
Social cognitive theory and women's career choices: an agent - based model simulation. 1-26 - Po-Keng Cheng

:
Transitions among states behind interactive agent model. 27-51 - Emanuele Borgonovo

, Marco Pangallo, Jan W. Rivkin, Leonardo Rizzo
, Nicolaj Siggelkow:
Sensitivity analysis of agent-based models: a new protocol. 52-94
Volume 28, Number 2, June 2022
- Vipin P. Veetil

:
Distributed knowledge and the organization of economic activity. 95-111 - Sameera Horawalavithana

, Nazim Choudhury, John Skvoretz, Adriana Iamnitchi
:
Online discussion threads as conversation pools: predicting the growth of discussion threads on reddit. 112-140 - Fanshun Zhang

, Congdong Li, Cejun Cao, Zhiwei Zhang:
Random or preferential? Evolutionary mechanism of user behavior in co-creation community. 141-177 - Junwei Zeng, Yongsheng Qian

, Fan Yin, Leipeng Zhu
, Dejie Xu:
A multi-value cellular automata model for multi-lane traffic flow under lagrange coordinate. 178-192
Volume 28, Number 3, September 2022
- Zhuang Xiong

, Pengju Wang
, Chengxia Wu:
How to encourage innovation failure knowledge sharing in virtual research organization: an incentive mechanism based on game theory. 193-213 - Álvaro Rocha

, Maria José Angélico Gonçalves
, Amélia Ferreira da Silva, Sandrina Teixeira
, Rui Silva:
Leadership challenges in the context of university 4.0. A thematic synthesis literature review. 214-246 - Vanessa Agredo Delgado, Pablo H. Ruiz, Alicia Mon

, César A. Collazos, Fernando Moreira
, Habib M. Fardoun:
Applying a process for the shared understanding construction in computer-supported collaborative work: an experiment. 247-270 - Anthony Martins, Maryam Abbasi

, Pedro Martins, Filipe Sá
:
BigData oriented to business decision making: a real case study in constructel. 271-291
Volume 28, Number 4, December 2022
- Shuyuan Mary Ho

, Wenyi Li:
"I know you are, but what am I?" Profiling cyberbullying based on charged language. 293-320 - Francesca Bolla Tripodi

:
ReOpen demands as public health threat: a sociotechnical framework for understanding the stickiness of misinformation. 321-334 - Elie Alhajjar

, Taylor Bradley:
Survival analysis for insider threat. 335-351 - Lili Wang

, Bin Hu
, Yihang Feng, Yanting Duan, Wuyi Zhang:
Food supply network disruption and mitigation: an integrated perspective of traceability technology and network structure. 352-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














