


default search action
Decision Support Systems, Volume 48
Volume 48, Number 1, December 2009
- Karl Reiner Lang, Eric A. Walden:

Introduction to the special section on information product markets. 1-2 - Robert J. Kauffman, Trent J. Spaulding, Charles A. Wood:

Are online auction markets efficient? An empirical study of market liquidity and abnormal returns. 3-13 - Chong (Alex) Wang

, Xiaoquan (Michael) Zhang:
Sampling of information goods. 14-22 - Nitin Aggarwal, Eric A. Walden:

Intellectual Property Bundle (IPB) theory: Managing transaction costs in technology development through network governance. 23-32 - Karl Reiner Lang, Richard D. Shang, Roumen Vragov:

Designing markets for co-production of digital culture goods. 33-45 - Eric K. Clemons:

The complex problem of monetizing virtual electronic social networks. 46-56
- Hua Yuan, Guoqing Chen, Junjie Wu, Hui Xiong:

Towards controlling virus propagation in information systems with point-to-group information sharing. 57-68 - Hoi-Ming Chi, Herbert Moskowitz, Okan K. Ersoy, Kemal Altinkemer, Peter F. Gavin, Bret E. Huff, Bernard A. Olsen:

Machine learning and genetic algorithms in pharmaceutical development and manufacturing processes. 69-80 - Feng-Yang Kuo, Chiung-Wen Hsu, Rong-Fuh Day:

An exploratory study of cognitive effort involved in decision under Framing - an application of the eye-tracking technology. 81-91 - Jingguo Wang

, Rui Chen, Tejaswini C. Herath, H. Raghav Rao:
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. 92-102 - Murat Köksalan, Riikka-Leena Leskelä

, Hannele Wallenius, Jyrki Wallenius:
Improving efficiency in multiple-unit combinatorial auctions: Bundling bids from multiple bidders. 103-111 - Hailiang Chen

, Hongyan Liu, Jiawei Han, Xiaoxin Yin, Jun He:
Exploring optimization of semantic relationship graph for multi-relational Bayesian classification. 112-121 - Seokjoo Andrew Chang, Giri Kumar Tayi:

An analytical approach to bundling in the presence of customer transition effects. 122-132 - Dan Zhu, Xiao-Bai Li, Shuning Wu:

Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining. 133-140 - Sudip Bhattacharjee, Ram D. Gopal

, James R. Marsden, Ramesh Sankaranarayanan, Rahul Telang
:
To theme or not to theme: Can theme strength be the music industry's "killer app"? 141-149 - A. R. Hatami, Hossein Seifi, Mohammad Kazem Sheikh-El-Eslami

:
Hedging risks with interruptible load programs for a load serving entity. 150-157 - Indranil Bose, Xi Chen

:
A framework for context sensitive services: A knowledge discovery based approach. 158-168 - Wei Zhou

, Yu-Ju Tu
, Selwyn Piramuthu:
RFID-enabled item-level retail pricing. 169-179 - Basilio Sierra

, Elena Lazkano, Ekaitz Jauregi, Itziar Irigoien
:
Histogram distance-based Bayesian Network structure learning: A supervised classification specific approach. 180-190 - Aixin Sun

, Ee-Peng Lim
, Ying Liu
:
On strategies for imbalanced text classification using SVM: A comparative study. 191-201 - Stephanie Watts, Ganesan Shankaranarayanan, Adir Even:

Data quality assessment in context: A cognitive perspective. 202-211 - Sara Casolari, Michele Colajanni

:
Short-term prediction models for server management in Internet-based contexts. 212-223 - Jose M. Cruz

:
The impact of corporate social responsibility in supply chain management: Multicriteria decision-making approach. 224-236 - Lu Zhen, George Q. Huang, Zuhua Jiang:

Recommender system based on workflow. 237-245 - Kwai-Sang Chin

, Ying-Ming Wang, Gary Ka Kwai Poon, Jian-Bo Yang
:
Failure mode and effects analysis by data envelopment analysis. 246-256 - Barry R. Cobb:

Efficiency of influence diagram models with continuous decision variables. 257-266 - Harry Jiannan Wang, J. Leon Zhao, Liang-Jie Zhang

:
Policy-Driven Process Mapping (PDPM): Discovering process models from business policies. 267-281 - Vasco Furtado

, Adriano Melo, André L. V. Coelho
, Ronaldo Menezes
, Ricardo Perrone:
A bio-inspired crime simulation model. 282-292 - Pei-Chen Sun, Hsing Kenneth Cheng, Glenn Finger:

Critical functionalities of a successful e-learning system - An analysis from instructors' cognitive structure toward system usage. 293-302
- Paul Michael Di Gangi, Molly Wasko

:
Steal my idea! Organizational adoption of user innovations from a user innovation community: A case study of Dell IdeaStorm. 303-312
Volume 48, Number 2, January 2010
- Hyung-Su Kim, Young-Gul Kim, Chan-Wook Park:

Integration of firm's resource and capability to implement enterprise CRM: A case study of a retail bank in Korea. 313-322 - Fu-Shiung Hsieh:

Combinatorial reverse auction based on revelation of Lagrangian multipliers. 323-330 - Hing Kai Chan

, Felix T. S. Chan
:
Comparative study of adaptability and flexibility in distributed manufacturing supply chains. 331-341 - Matthieu Lauras

, Guillaume Marquès, Didier Gourc
:
Towards a multi-dimensional project Performance Measurement System. 342-353 - Nan Li, Desheng Dash Wu

:
Using text mining and sentiment analysis for online forums hotspot detection and forecast. 354-368 - Michael Chau

, Cho Hung Wong:
Designing the user interface and functions of a search engine development tool. 369-382 - Soussan Djamasbi

, Diane M. Strong, Mark T. Dishaw:
Affect and acceptance: Examining the effects of positive mood on the technology acceptance model. 383-394 - J. Christopher Zimmer, Riza Ergun Arsal, Mohammad AlMarzouq

, DeWayne Moore, Varun Grover
:
Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure. 395-406 - Xiaorui Hu, Guohua Wu, Yuhong Wu, Han Zhang:

The effects of Web assurance seals on consumers' initial trust in an online vendor: A functional perspective. 407-418
- Wan-Tsu Wang, Hui-Ming Wee, H.-S. Jacob Tsao:

Revisiting the note on supply chain integration in vendor-managed inventory. 419-420 - Boray Huang

, Zhisheng Ye:
The effects of lumpy demand and shipment size constraint: A response to "Revisit the note on supply chain integration in vendor-managed inventory". 421-425
Volume 48, Number 3, February 2010
- Robert G. Dyson

, Fred W. Glover, Yuji Ijiri, Andrew B. Whinston, Toshiyuki Sueyoshi:
New concepts, methodologies and algorithms for business education and research in the 21st century. 427-429 - Marco Better, Fred W. Glover, Michele Samorani

:
Classification by vertical and cutting multi-hyperplane decision tree induction. 430-436 - Chiang Kao, Shiuh-Nan Hwang

:
Efficiency measurement for network systems: IT impact on firm performance. 437-446 - Mika Goto

:
Financial performance analysis of US and world telecommunications companies: Importance of Information Technology in the telecommunications industry after the AT&T breakup and the NTT divestiture. 447-456 - Toshiyuki Sueyoshi:

Beyond economics for guiding large public policy issues: Lessons from the Bell System divestiture and the California electricity crisis. 457-469 - Yuan-Chun Jiang, Jennifer Shang, Yezheng Liu:

Maximizing customer satisfaction through an online recommendation system: A novel associative classification model. 470-479 - Dan Zhu:

A hybrid approach for efficient ensembles. 480-487 - Christos Giannoulis, Alessio Ishizaka

:
A Web-based decision support system with ELECTRE III for a personalised ranking of British universities. 488-497 - Fernando Borrajo, Yolanda Bueno

, Isidro de Pablo, Begoña Santos, Fernando Fernández
, Javier García
, Ismael Sagredo-Olivenza:
SIMBA: A simulator for business education and research. 498-506
Volume 48, Number 4, March 2010
- Irit Askira Gelman:

Setting priorities for data accuracy improvements in satisficing decision-making scenarios: A guiding theory. 507-520 - Chen-Huei Chou, Atish P. Sinha, Huimin Zhao:

Commercial Internet filters: Perils and opportunities. 521-530 - Lev Kuandykov, Maxim Sokolov:

Impact of social neighborhood on diffusion of innovation S-curve. 531-535 - Ruth C. King, Kathleen S. Hartzel, Richard A. M. Schilhavy, Nancy Paule Melone, Timothy W. McGuire:

Social responsibility and stakeholder influence: Does technology matter during stakeholder deliberation with high-impact decisions? 536-547 - Yinghui (Catherine) Yang, Balaji Padmanabhan:

Toward user patterns for online security: Observation time and online user identification. 548-558 - Meira Levy

, Nava Pliskin
, Gilad Ravid
:
Studying decision processes via a knowledge management lens: The Columbia space shuttle case. 559-567 - Yu-Jen Wu, Jiang-Liang Hou:

An employee performance estimation model for the logistics industry. 568-581 - Jyhshyan Lan, Michael Y. Hu, Butje Eddy Patuwo, G. Peter Zhang:

An investigation of neural network classifiers with unequal misclassification costs and group sizes. 582-591 - Shin-Yuan Hung, Wei-Hsi Hung, Chia-An Tsai, Shu-Chen Jiang:

Critical factors of hospital adoption on CRM system: Organizational and information system perspectives. 592-603 - Nikolaos Papakostas

, P. Papachatzakis, Vangelis Xanthakis, Dimitris Mourtzis
, George Chryssolouris:
An approach to operational aircraft maintenance planning. 604-612 - Jin-Xing Hao, Ron Chi-Wai Kwok, Raymond Yiu-Keung Lau

, Angela Yan Yu:
Predicting problem-solving performance with concept maps: An information-theoretic approach. 613-621 - Yen-Liang Chen, Li-Chen Cheng

:
An approach to group ranking decisions in a dynamic environment. 622-634 - Han Li, Jie Zhang

, Rathindra Sarathy
:
Understanding compliance with internet use policy from the perspective of rational choice theory. 635-645

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














