


default search action
Decision Support Systems, Volume 56
Volume 56, December 2013
- Carlos Murillo-Sánchez, Ray Zimmerman, C. Lindsay Anderson

, Robert J. Thomas:
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed reserve. 1-10 - Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha

, Ambuj Mahanti, Samir K. Sadhukhan:
Cyber-risk decision models: To insure IT or not? 11-26 - Wooje Cho, Ramanath Subramanyam

, Mu Xia:
Vendors' incentives to invest in software quality in enterprise systems. 27-36 - Bouchaib Bahli, Suzanne Rivard:

Cost escalation in information technology outsourcing: A moderated mediation study. 37-47 - Juan A. Recio-García

, Lara Quijano Sánchez
, Belén Díaz-Agudo
:
Including social factors in an argumentative model for Group Decision Support Systems. 48-55 - Yan Li, Chuan-Hoo Tan

, Xue Yang:
It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software. 56-62 - Asil Oztekin, Dursun Delen

, Ali Turkyilmaz
, Selim Zaim:
A machine learning-based usability evaluation method for eLearning systems. 63-73 - François Marmier

, Didier Gourc
, Frederic Laarz:
A risk oriented model to assess strategic decisions in new product development projects. 74-82 - Hao Hu, Vincent S. Lai:

Cognitive-based evaluation of consumption fads: An analytical approach. 83-91 - Chuan Luo, Xin (Robert) Luo, Laurie Schatzberg, Choon-Ling Sia

:
Impact of informational factors on online recommendation credibility: The moderating role of source credibility. 92-102 - Caroline Lancelot Miltgen

, Ales Popovic
, Tiago Oliveira
:
Determinants of end-user acceptance of biometrics: Integrating the "Big 3" of technology acceptance with privacy context. 103-114 - Michael Chau

, Ada Wong, Minhong Wang
, Songnia Lai, Kristal W. Y. Chan, Tim M. H. Li
, Debbie Chu, Ian K. W. Chan, Wai-Ki Sung:
Using 3D virtual environments to facilitate students in constructivist learning. 115-121 - Se-Joon Hong, Carrie Siu Man Lui, Jungpil Hahn

, Jae Yun Moon, Tai Gyu Kim:
How old are you really? Cognitive age in technology acceptance. 122-130 - Tsan-Ming Choi

, Jian Li, Ying Wei:
Will a supplier benefit from sharing good information with a retailer? 131-139 - Eugenia Y. Huang, Travis K. Huang:

Exploring the effect of boundary objects on knowledge interaction. 140-147 - Shih-Wei Chou, Chun-Hsiung Chiang:

Understanding the formation of software-as-a-service (SaaS) satisfaction from the perspective of service quality. 148-155 - Jun He, Yingqin Gu, Hongyan Liu, Jun Yan, Hong Chen:

Scalable and noise tolerant web knowledge extraction for search task simplification. 156-167 - Christiane Rosen, Reinhard Madlener:

An auction design for local reserve energy markets. 168-179 - Patrick Y. K. Chau, Shuk Ying Ho, Kevin K. W. Ho

, Yihong Yao:
Examining the effects of malfunctioning personalized services on online users' distrust and behaviors. 180-191 - Johannes Paefgen, Thorsten Staake, Frédéric Thiesse:

Evaluation and aggregation of pay-as-you-drive insurance rate factors: A classification analysis approach. 192-201 - Yaojin Lin, Xuegang Hu, Xiaomei Li, Xindong Wu:

Mining stable patterns in multiple correlated databases. 202-210 - Xiaolin Zheng, Shuai Zhu, Zhangxi Lin:

Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approach. 211-222 - Joseph Barjis, Gwendolyn L. Kolfschoten, Johan Maritz:

A sustainable and affordable support system for rural healthcare delivery. 223-233 - Heng Tang

, Stephen Shaoyi Liao
, Sherry Xiaoyun Sun:
A prediction framework based on contextual data to support Mobile Personalized Marketing. 234-246 - Paulo B. Góes, Yanbin Tu, Y. Alex Tung:

Seller heterogeneity in electronic marketplaces: A study of new and experienced sellers in eBay. 247-258 - Ming-Tsang Lu, Shi-Woei Lin, Gwo-Hshiung Tzeng:

Improving RFID adoption in Taiwan's healthcare industry based on a DEMATEL technique with a hybrid MCDM model. 259-269 - Li Chen, James R. Marsden, Zhongju Zhang:

Reliability (or "lack thereof") of on-line preference revelation: A controlled experimental analysis. 270-274 - Wim Laurier

, Geert Poels
:
Invariant conditions in value system simulation models. 275-287 - Jörg Leukel

, Vijayan Sugumaran
:
Formal correctness of supply chain design. 288-299 - Long Pham, Alexander Zaitsev, Robert Steiner, Jeffrey E. Teich:

NegotiAuction: An experimental study. 300-309 - Henrik Leopold, Rami-Habib Eid-Sabbagh, Jan Mendling

, Leonardo Guerreiro Azevedo, Fernanda Araújo Baião
:
Detection of naming convention violations in process models for different languages. 310-325 - Eric Lefèvre

, Zied Elouedi
:
How to preserve the conflict as an alarm in the combination of belief functions? 326-333 - Pei-Fang Hsu:

Integrating ERP and e-business: Resource complementarity in business value creation. 334-347 - Mark L. DeFond, Yaniv Konchitchki, Jeff L. McMullin, Daniel E. O'Leary

:
Capital markets valuation and accounting performance of Most Admired Knowledge Enterprise (MAKE) award winners. 348-360 - Young Hoon Kim, Dan Jong Kim, Kathy Wachter:

A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention. 361-370 - Yoshio Kamijo

:
Bidding behaviors for a keyword auction in a sealed-bid environment. 371-378 - Di He, Wei Chen, Liwei Wang, Tie-Yan Liu:

Online learning for auction mechanism in bandit setting. 379-386 - Deqiang Han, Yong Deng

, Chongzhao Han:
Sequential weighted combination for unreliable evidence based on evidence variance. 387-393
- Ming Fan, Lingfang (Ivy) Li, De Liu

:
Introduction to the special issue on "Mechanism Design in E-commerce and Information Systems". 395-396 - Hao Wang, Qiang Wei, Guoqing Chen:

From clicking to consideration: A business intelligence approach to estimating consumers' consideration probabilities. 397-405 - Ming Lei

, Xinna Zhao, Honghui Deng, Keah-Choon Tan:
DEA analysis of FDI attractiveness for sustainable development: Evidence from Chinese provinces. 406-418 - Ninghua Du, Hailiang Huang, Lingfang (Ivy) Li:

Can online trading survive bad-mouthing? An experimental investigation. 419-426 - Xiaoyan Liu

, Zhiling Guo
, Zhenjiang Lin, Jian Ma
:
A local social network approach for research management. 427-438 - Yong Hu, Xiangzhou Zhang

, E. W. T. Ngai
, Ruichu Cai, Mei Liu:
Software project risk analysis using Bayesian networks with causality constraints. 439-449 - Jun Li, De Liu

, Shulin Liu
:
Optimal keyword auctions for optimal user experiences. 450-461 - Alfred Zhu Liu

, Hongju Liu, Sean Xin Xu:
How do competitive environments moderate CRM value? 462-473 - Bin Gu, Qian Tang

, Andrew B. Whinston:
The influence of online word-of-mouth on long tail formation. 474-481 - Youwei Wang, Shan Wang, Yulin Fang

, Patrick Y. K. Chau:
Store survival in online marketplace: An empirical investigation. 482-493 - Xueqi (David) Wei, Barrie R. Nault

:
Experience information goods: "Version-to-upgrade". 494-501 - Qiang Ye, Zhuo (June) Cheng, Bin Fang

:
Learning from other buyers: The effect of purchase history records in online marketplaces. 502-512 - YiMing Zheng, Kexin Zhao, Antonis C. Stylianou:

The impacts of information quality and system quality on users' continuance intention in information-exchange virtual communities: An empirical investigation. 513-524

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














