default search action
Decision Support Systems, Volume 50
Volume 50, Number 1, December 2010
- Yuh-Jen Chen:
Development of a method for ontology-based empirical knowledge representation and reasoning. 1-20 - Wei T. Yue, Metin Çakanyildirim:
A cost-based analysis of intrusion detection system configuration under active or passive response. 21-31 - Parviz Ghandforoush, Tarun K. Sen:
A DSS to manage platelet production supply chain for regional blood centers. 32-42 - Omar F. El-Gayar, Brian D. Fritz:
A web-based multi-perspective decision support system for information security planning. 43-54 - Michael Doumpos, Constantin Zopounidis:
A multicriteria decision support system for bank rating. 55-63 - Mounir Ben Ayed, Hela Ltifi, Christophe Kolski, Adel M. Alimi:
A user-centered approach for the design and implementation of KDD-based DSS: A case study in the healthcare domain. 64-78 - Ravindra Mantena, Ramesh Sankaranarayanan, Siva Viswanathan:
Platform-based information goods: The economics of exclusivity. 79-92 - Der-Chiang Li, Yao-Hwei Fang, Y. M. Frank Fang:
The data complexity index to construct an efficient cross-validation method. 93-102 - Ing-Long Wu, Cheng-Hung Chuang:
Examining the diffusion of electronic supply chain management with external antecedents and firm performance: A multi-stage analysis. 103-115 - Evelyn H. Thrasher, Christopher W. Craighead, Terry Anthony Byrd:
An empirical investigation of integration in healthcare alliance networks. 116-127 - Stéphane Meng-Feng Yen, Ying-Lin Hsu:
Profitability of technical analysis in financial and commodity futures markets - A reality check. 128-139 - Mark J. Keith, Haluk Demirkan, Michael Goul:
The influence of collaborative technology knowledge on advice network structures. 140-151 - Adir Even, Ganesan Shankaranarayanan, Paul D. Berger:
Evaluating a model for cost-effective data quality management in a real-world CRM setting. 152-163 - Mark Cecchini, Haldun Aytug, Gary J. Koehler, Praveen Pathak:
Making words work: Using financial text as a predictor of financial events. 164-175 - Thierry Moyaux, Peter McBurney, Michael J. Wooldridge:
A supply chain as a network of auctions. 176-190 - Akhilesh Bajaj, Robert Russell:
AWSM: Allocation of workflows utilizing social network metrics. 191-202 - Vincent S. Lai, Connie K. W. Liu, Fujun Lai, Jian Wang:
What influences ERP beliefs - Logical evaluation or imitation? 203-212 - Ohbyung Kwon:
A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce. 213-221 - Wei Zhou, Selwyn Piramuthu:
Framework, strategy and evaluation of health care processes with RFID. 222-233 - Mary E. Schramm, Kevin J. Trainor, Murali S. Shanker, Michael Y. Hu:
An agent-based diffusion model with consumer and brand agents. 234-242 - Yung-Ming Li:
Pricing digital content distribution over heterogeneous channels. 243-257 - Chih-Fong Tsai, Yu-Chieh Hsiao:
Combining multiple feature selection methods for stock prediction: Union, intersection, and multi-intersection approaches. 258-269 - Hongyan Liu, Fangzhou Lin, Jun He, Yunjue Cai:
New approach for the sequential pattern mining of high-dimensional sequence databases. 270-280 - Maurizio Naldi, Andrea Pacifici:
Optimal sequence of free traffic offers in mixed fee-consumption pricing packages. 281-291 - Harris Wu, Michael D. Gordon, Weiguo Fan:
Collective taxonomizing: A collaborative approach to organizing document repositories. 292-303 - Hina Arora, T. S. Raghu, Ajay S. Vinze:
Resource allocation for demand surge mitigation during disaster response. 304-315 - Peter Bajcsy, Rob Kooper, Sang-Chul Lee:
Understanding documentation and reconstruction requirements for computer-assisted decision processes. 316-324 - Chin-Sheng Yang, Chih-Ping Wei, Chi-Chuan Yuan, Jen-Yu Schoung:
Predicting the length of hospital stay of burn patients: Comparisons of prediction accuracy among different clinical stages. 325-335 - Hangjung Zo, Derek L. Nazareth, Hemant K. Jain:
Security and performance in service-oriented applications: Trading off competing objectives. 336-346
- Jongsawas Chongwatpol, Ramesh Sharda:
SNAP: A DSS to analyze network service pricing for state networks. 347-359
- Deqiang Han, Yong Deng, Qi Liu:
Erratum to "Combining belief functions based on distance of evidence" [Decision Support Systems Volume(38/3)489-493]. 360
Volume 50, Number 2, January 2011
- Younghwa Lee:
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. 361-369 - Duen-Ren Liu, Chin-Hui Lai:
Mining group-based knowledge flows for sharing task knowledge. 370-386 - Selwyn Piramuthu:
RFID mutual authentication protocols. 387-393 - Christopher W. Zobel:
Representing perceived tradeoffs in defining disaster resilience. 394-403 - JinKyu Lee, Nitesh Bharosa, Jing Yang, Marijn Janssen, H. Raghav Rao:
Group value and intention to use - A study of multi-agency disaster management information systems for public safety. 404-414 - Yan Dang, Yulei Zhang, Paul Jen-Hwa Hu, Susan A. Brown, Hsinchun Chen:
Knowledge mapping for rapidly evolving domains: A design science approach. 415-427 - Shiu-Li Huang, Yu-Hsiang Tsai:
Designing a cross-language comparison-shopping agent. 428-438 - Jinn-Yi Yeh, Tai-Hsi Wu, Chuan-Wei Tsao:
Using data mining techniques to predict hospitalization of hemodialysis patients. 439-448 - Réal André Carbonneau, Gregory E. Kersten, Rustam M. Vahidov:
Pairwise issue modeling for negotiation counteroffer prediction using neural networks. 449-459 - Halasya Siva Subramania, Vineet R. Khare:
Pattern classification driven enhancements for human-in-the-loop decision support systems. 460-468 - Peng Zhang, Xingquan Zhu, Yong Shi, Li Guo, Xindong Wu:
Robust ensemble learning for mining noisy data streams. 469-479 - Wen-Hsien Tsai, Michael J. Shaw, Yi-Wen Fan, Jau-Yang Liu, Kuen-Chang Lee, Hui-Chiao Chen:
An empirical investigation of the impacts of internal/external facilitators on the project success of ERP: A structural equation model. 480-490 - Pediredla Ravisankar, Vadlamani Ravi, G. Raghava Rao, Indranil Bose:
Detection of financial statement fraud and feature selection using data mining techniques. 491-500 - Shin-Yuan Hung, She-I Chang, David C. Yen, Tsan-Ching Kang, Chien-Pang Kuo:
Successful implementation of collaborative product commerce: An organizational fit perspective. 501-510 - Qing Cao, Wenjing Duan, Qiwei Gan:
Exploring determinants of voting for the "helpfulness" of online user reviews: A text mining approach. 511-521 - Takashi Mihara:
Information sharing using entangled states and its applications to quantum card tricks. 522-528 - Yong Lu, Dan Yang:
Information exchange in virtual communities under extreme disaster conditions. 529-538 - Shib Sankar Sana:
A production-inventory model of imperfect quality products in a three-layer supply chain. 539-547 - Wei-Pang Liao, Tom M. Y. Lin, Shu-Hsien Liao:
Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008. 548-556
Volume 50, Number 3, February 2011
- E. W. T. Ngai, Yong Hu, Y. H. Wong, Yijun Chen, Xin Sun:
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. 559-569 - Wei Zhou, Gaurav Kapoor:
Detecting evolutionary financial statement fraud. 570-575 - Sukanto Bhattacharya, Dongming Xu, Kuldeep Kumar:
An ANN-based auditor decision support system using Benford's law. 576-584 - Sean L. Humpherys, Kevin C. Moffitt, Mary B. Burns, Judee K. Burgoon, William F. Felix:
Identification of fraudulent financial statements using linguistic credibility analysis. 585-594 - Fletcher H. Glancy, Surya B. Yadav:
A computational model for financial reporting fraud detection. 595-601 - Siddhartha Bhattacharyya, Sanjeev Jha, Kurian K. Tharakunnel, J. Christopher Westland:
Data mining for credit card fraud: A comparative study. 602-613 - Nan Hu, Ling Liu, Vallabh Sambamurthy:
Fraud detection in online consumer reviews. 614-626 - Nan Hu, Indranil Bose, Yunjun Gao, Ling Liu:
Manipulation in digital word-of-mouth: A reality check for book reviews. 627-635 - Wil M. P. van der Aalst, Kees M. van Hee, Jan Martijn E. M. van der Werf, Akhil Kumar, Marc Verdonk:
Conceptual model for online auditing. 636-647
Volume 50, Number 4, March 2011
- Hsinchun Chen, Michael Chau, Shu-Hsing Li:
Enterprise risk and security management: Data, text and Web mining. 649-650 - Sangmi Chai, Minkyun Kim, H. Raghav Rao:
Firms' information security investment decisions: Stock market evidence of investors' behavior. 651-661 - Xi Chen, Indranil Bose, Alvin Chung Man Leung, Chenhui (Julian) Guo:
Assessing the severity of phishing attacks: A hybrid data mining approach. 662-672 - Kuo-Tay Chen, Hsin-Min Lu, Tsai-Jyh Chen, Shu-Hsing Li, Jian-Shuen Lian, Hsinchun Chen:
Giving context to accounting numbers: The role of news coverage. 673-679 - Sven S. Groth, Jan Muntermann:
An intraday market risk management approach based on textual analysis. 680-691 - Shi-Ming Huang, Wei-Hsi Hung, David C. Yen, I-Cheng Chang, Dino Jiang:
Building the evaluation model of the IT general control for CPAs under enterprise risk management. 692-701 - Sigi Goode, David Lacey:
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls. 702-714 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. 715-731 - Xue Bai:
Predicting consumer sentiments from online text. 732-742 - Kaiquan Xu, Stephen Shaoyi Liao, Jiexun Li, Yuxia Song:
Mining comparative opinions from customer reviews for Competitive Intelligence. 743-754 - Chien Chin Chen, You-De Tseng:
Quality evaluation of product reviews using an information quality framework. 755-768 - Benjamin Ngugi, Marilyn Tremaine, Peter Tarasewich:
Biometric keypads: Improving accuracy through optimal PIN selection. 769-776
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.