


default search action
Decision Support Systems, Volume 50
Volume 50, Number 1, December 2010
- Yuh-Jen Chen:

Development of a method for ontology-based empirical knowledge representation and reasoning. 1-20 - Wei T. Yue

, Metin Çakanyildirim
:
A cost-based analysis of intrusion detection system configuration under active or passive response. 21-31 - Parviz Ghandforoush, Tarun K. Sen

:
A DSS to manage platelet production supply chain for regional blood centers. 32-42 - Omar F. El-Gayar

, Brian D. Fritz:
A web-based multi-perspective decision support system for information security planning. 43-54 - Michael Doumpos, Constantin Zopounidis:

A multicriteria decision support system for bank rating. 55-63 - Mounir Ben Ayed, Hela Ltifi, Christophe Kolski

, Adel M. Alimi
:
A user-centered approach for the design and implementation of KDD-based DSS: A case study in the healthcare domain. 64-78 - Ravindra Mantena

, Ramesh Sankaranarayanan, Siva Viswanathan
:
Platform-based information goods: The economics of exclusivity. 79-92 - Der-Chiang Li

, Yao-Hwei Fang
, Y. M. Frank Fang:
The data complexity index to construct an efficient cross-validation method. 93-102 - Ing-Long Wu, Cheng-Hung Chuang:

Examining the diffusion of electronic supply chain management with external antecedents and firm performance: A multi-stage analysis. 103-115 - Evelyn H. Thrasher, Christopher W. Craighead

, Terry Anthony Byrd:
An empirical investigation of integration in healthcare alliance networks. 116-127 - Stéphane Meng-Feng Yen, Ying-Lin Hsu

:
Profitability of technical analysis in financial and commodity futures markets - A reality check. 128-139 - Mark J. Keith

, Haluk Demirkan
, Michael Goul:
The influence of collaborative technology knowledge on advice network structures. 140-151 - Adir Even, Ganesan Shankaranarayanan, Paul D. Berger:

Evaluating a model for cost-effective data quality management in a real-world CRM setting. 152-163 - Mark Cecchini, Haldun Aytug, Gary J. Koehler, Praveen Pathak:

Making words work: Using financial text as a predictor of financial events. 164-175 - Thierry Moyaux, Peter McBurney

, Michael J. Wooldridge:
A supply chain as a network of auctions. 176-190 - Akhilesh Bajaj, Robert Russell:

AWSM: Allocation of workflows utilizing social network metrics. 191-202 - Vincent S. Lai, Connie K. W. Liu, Fujun Lai, Jian Wang:

What influences ERP beliefs - Logical evaluation or imitation? 203-212 - Ohbyung Kwon:

A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce. 213-221 - Wei Zhou

, Selwyn Piramuthu:
Framework, strategy and evaluation of health care processes with RFID. 222-233 - Mary E. Schramm, Kevin J. Trainor, Murali S. Shanker, Michael Y. Hu:

An agent-based diffusion model with consumer and brand agents. 234-242 - Yung-Ming Li:

Pricing digital content distribution over heterogeneous channels. 243-257 - Chih-Fong Tsai, Yu-Chieh Hsiao:

Combining multiple feature selection methods for stock prediction: Union, intersection, and multi-intersection approaches. 258-269 - Hongyan Liu, Fangzhou Lin, Jun He, Yunjue Cai:

New approach for the sequential pattern mining of high-dimensional sequence databases. 270-280 - Maurizio Naldi

, Andrea Pacifici
:
Optimal sequence of free traffic offers in mixed fee-consumption pricing packages. 281-291 - Harris Wu, Michael D. Gordon, Weiguo Fan

:
Collective taxonomizing: A collaborative approach to organizing document repositories. 292-303 - Hina Arora, T. S. Raghu, Ajay S. Vinze:

Resource allocation for demand surge mitigation during disaster response. 304-315 - Peter Bajcsy, Rob Kooper

, Sang-Chul Lee
:
Understanding documentation and reconstruction requirements for computer-assisted decision processes. 316-324 - Chin-Sheng Yang, Chih-Ping Wei, Chi-Chuan Yuan, Jen-Yu Schoung:

Predicting the length of hospital stay of burn patients: Comparisons of prediction accuracy among different clinical stages. 325-335 - Hangjung Zo

, Derek L. Nazareth, Hemant K. Jain:
Security and performance in service-oriented applications: Trading off competing objectives. 336-346
- Jongsawas Chongwatpol

, Ramesh Sharda
:
SNAP: A DSS to analyze network service pricing for state networks. 347-359
- Deqiang Han, Yong Deng

, Qi Liu:
Erratum to "Combining belief functions based on distance of evidence" [Decision Support Systems Volume(38/3)489-493]. 360
Volume 50, Number 2, January 2011
- Younghwa Lee:

Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. 361-369 - Duen-Ren Liu, Chin-Hui Lai:

Mining group-based knowledge flows for sharing task knowledge. 370-386 - Selwyn Piramuthu:

RFID mutual authentication protocols. 387-393 - Christopher W. Zobel:

Representing perceived tradeoffs in defining disaster resilience. 394-403 - JinKyu Lee, Nitesh Bharosa

, Jing Yang, Marijn Janssen
, H. Raghav Rao:
Group value and intention to use - A study of multi-agency disaster management information systems for public safety. 404-414 - Yan Dang, Yulei Zhang, Paul Jen-Hwa Hu, Susan A. Brown

, Hsinchun Chen:
Knowledge mapping for rapidly evolving domains: A design science approach. 415-427 - Shiu-Li Huang, Yu-Hsiang Tsai:

Designing a cross-language comparison-shopping agent. 428-438 - Jinn-Yi Yeh, Tai-Hsi Wu

, Chuan-Wei Tsao:
Using data mining techniques to predict hospitalization of hemodialysis patients. 439-448 - Réal André Carbonneau, Gregory E. Kersten

, Rustam M. Vahidov:
Pairwise issue modeling for negotiation counteroffer prediction using neural networks. 449-459 - Halasya Siva Subramania, Vineet R. Khare:

Pattern classification driven enhancements for human-in-the-loop decision support systems. 460-468 - Peng Zhang, Xingquan Zhu

, Yong Shi, Li Guo, Xindong Wu:
Robust ensemble learning for mining noisy data streams. 469-479 - Wen-Hsien Tsai, Michael J. Shaw, Yi-Wen Fan, Jau-Yang Liu, Kuen-Chang Lee, Hui-Chiao Chen:

An empirical investigation of the impacts of internal/external facilitators on the project success of ERP: A structural equation model. 480-490 - Pediredla Ravisankar, Vadlamani Ravi, G. Raghava Rao, Indranil Bose:

Detection of financial statement fraud and feature selection using data mining techniques. 491-500 - Shin-Yuan Hung, She-I Chang

, David C. Yen
, Tsan-Ching Kang, Chien-Pang Kuo:
Successful implementation of collaborative product commerce: An organizational fit perspective. 501-510 - Qing Cao, Wenjing Duan, Qiwei Gan

:
Exploring determinants of voting for the "helpfulness" of online user reviews: A text mining approach. 511-521 - Takashi Mihara:

Information sharing using entangled states and its applications to quantum card tricks. 522-528 - Yong Lu, Dan Yang:

Information exchange in virtual communities under extreme disaster conditions. 529-538 - Shib Sankar Sana

:
A production-inventory model of imperfect quality products in a three-layer supply chain. 539-547 - Wei-Pang Liao, Tom M. Y. Lin, Shu-Hsien Liao

:
Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008. 548-556
Volume 50, Number 3, February 2011
- E. W. T. Ngai

, Yong Hu, Y. H. Wong, Yijun Chen, Xin Sun:
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. 559-569 - Wei Zhou

, Gaurav Kapoor:
Detecting evolutionary financial statement fraud. 570-575 - Sukanto Bhattacharya, Dongming Xu, Kuldeep Kumar

:
An ANN-based auditor decision support system using Benford's law. 576-584 - Sean L. Humpherys, Kevin C. Moffitt, Mary B. Burns, Judee K. Burgoon, William F. Felix:

Identification of fraudulent financial statements using linguistic credibility analysis. 585-594 - Fletcher H. Glancy, Surya B. Yadav:

A computational model for financial reporting fraud detection. 595-601 - Siddhartha Bhattacharyya, Sanjeev Jha, Kurian K. Tharakunnel, J. Christopher Westland:

Data mining for credit card fraud: A comparative study. 602-613 - Nan Hu, Ling Liu, Vallabh Sambamurthy:

Fraud detection in online consumer reviews. 614-626 - Nan Hu, Indranil Bose, Yunjun Gao, Ling Liu:

Manipulation in digital word-of-mouth: A reality check for book reviews. 627-635 - Wil M. P. van der Aalst

, Kees M. van Hee
, Jan Martijn E. M. van der Werf
, Akhil Kumar, Marc Verdonk:
Conceptual model for online auditing. 636-647
Volume 50, Number 4, March 2011
- Hsinchun Chen, Michael Chau

, Shu-Hsing Li:
Enterprise risk and security management: Data, text and Web mining. 649-650 - Sangmi Chai, Minkyun Kim, H. Raghav Rao:

Firms' information security investment decisions: Stock market evidence of investors' behavior. 651-661 - Xi Chen

, Indranil Bose, Alvin Chung Man Leung
, Chenhui (Julian) Guo:
Assessing the severity of phishing attacks: A hybrid data mining approach. 662-672 - Kuo-Tay Chen, Hsin-Min Lu

, Tsai-Jyh Chen, Shu-Hsing Li, Jian-Shuen Lian, Hsinchun Chen:
Giving context to accounting numbers: The role of news coverage. 673-679 - Sven S. Groth, Jan Muntermann:

An intraday market risk management approach based on textual analysis. 680-691 - Shi-Ming Huang, Wei-Hsi Hung, David C. Yen

, I-Cheng Chang, Dino Jiang:
Building the evaluation model of the IT general control for CPAs under enterprise risk management. 692-701 - Sigi Goode

, David Lacey
:
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls. 702-714 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. 715-731 - Xue Bai:

Predicting consumer sentiments from online text. 732-742 - Kaiquan Xu, Stephen Shaoyi Liao

, Jiexun Li, Yuxia Song:
Mining comparative opinions from customer reviews for Competitive Intelligence. 743-754 - Chien Chin Chen

, You-De Tseng:
Quality evaluation of product reviews using an information quality framework. 755-768 - Benjamin Ngugi, Marilyn Tremaine, Peter Tarasewich:

Biometric keypads: Improving accuracy through optimal PIN selection. 769-776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














