Journal: Decision Support Systems

Volume 46, Issue 4

753 -- 754James Y. L. Thong, Felix B. Tan. Introduction to the PACIS2007 special issue for decision support systems
755 -- 762Seungwoo Kwon, Byungjoon Yoo, Jinbae Kim, Wei Shang, Gunwoong Lee. Reservation price reporting mechanisms for online negotiations
763 -- 773Jeevan Jaisingh. Impact of piracy on innovation at software firms and implications for piracy policy
774 -- 785Fu-ren Lin, Jen-Hung Yu. Visualized cognitive knowledge map integration for P2P networks
786 -- 802Angela Liew, David Sundaram. Flexible modelling and support of interrelated decisions
803 -- 814Frank K. Y. Chan, James Y. L. Thong. Acceptance of agile methodologies: A critical review and conceptual framework
815 -- 825Boon-Yuen Ng, Atreyi Kankanhalli, Yunjie Calvin Xu. Studying users computer security behavior: A health belief perspective
826 -- 838Wei He, Kwok Kee Wei. What drives continued knowledge sharing? An investigation of knowledge-contribution and -seeking beliefs
839 -- 851Weiling Ke, Hefu Liu, Kwok Kee Wei, Jibao Gu, Huaping Chen. How do mediated and non-mediated power affect electronic supply chain management system adoption? The mediating effects of trust and institutional pressures
853 -- 864Carolyn F. Holton. Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem
865 -- 874Winston T. Lin. The business value of information technology as measured by technical efficiency: Evidence from country-level data
875 -- 881Frank Witlox, Marc Antrop, Peter Bogaert, Philippe De Maeyer, Ben Derudder, Tijs Neutens, Veronique Van Acker, Nico Van de Weghe. Introducing functional classification theory to land use planning by means of decision tables
882 -- 894Hak-Jin Kim, Wooju Kim, Myungjin Lee. Semantic Web Constraint Language and its application to an intelligent shopping agent
895 -- 901Stefan Koch, Johann Mitlöhner. Software project effort estimation with voting rules
902 -- 912Joseph S. Valacich, Saonee Sarker, Jamie Pratt, Mike Groomer. Understanding risk-taking behavior of groups: A decision analysis perspective

Volume 46, Issue 3

605 -- 0Upkar Varshney. Guest editorial: Wireless in the healthcare
606 -- 619Sweta Sneha, Upkar Varshney. Enabling ubiquitous patient monitoring: Model, decision protocols, opportunities and challenges
620 -- 633Sutirtha Chatterjee, Suranjan Chakraborty, Saonee Sarker, Suprateek Sarker, Francis Y. Lau. Examining the success factors for mobile work in healthcare: A deductive study
634 -- 647Iris A. Junglas, Chon Abraham, Blake Ives. Mobile technology at the frontlines of patient care: Understanding fit and human drives in utilization decisions and performance
649 -- 659Laureano F. Escudero, Mercedes Landete, Alfredo Marín. A branch-and-cut algorithm for the Winner Determination Problem
660 -- 672Norman A. Johnson, Randolph B. Cooper, Wynne W. Chin. Anger and flaming in computer-mediated negotiation among strangers
673 -- 684Norman A. Johnson, Randolph B. Cooper. Media, affect, concession, and agreement in negotiation: IM versus telephone
685 -- 694Dimitris A. Papakiriakopoulos, Katerina Pramatari, Georgios I. Doukidis. A decision support system for detecting products missing from the shelf based on heuristic rules
695 -- 703Christie M. Fuller, David P. Biros, Rick L. Wilson. Decision support for determining veracity via linguistic-based cues
704 -- 716Fenghui Ren, Minjie Zhang, Kwang Mong Sim. Adaptive conceding strategies for automated trading agents in dynamic, open markets
717 -- 729Boris Galitsky, María Paula González, Carlos Iván Chesñevar. A novel approach for classifying customer complaints through graphs similarities in argumentative dialogues
730 -- 742Jorge E. Mendoza, Andrés L. Medaglia, Nubia Velasco. An evolutionary-based decision support system for vehicle routing: The case of a public utility
743 -- 751Michael Mannino, Yanjuan Yang, Young Ryu. Classification algorithm sensitivity to training data with non representative attribute noise

Volume 46, Issue 2

451 -- 467Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen. Avatar e-mail versus traditional e-mail: Perceptual difference and media selection difference
468 -- 480Hakan Tarakci, Zafer D. Ozdemir, Moosa Sharafali. On the staffing policy and technology investment in a specialty hospital offering telemedicine
481 -- 491Enes Eryarsoy, Gary J. Koehler, Haldun Aytug. Using domain-specific knowledge in generalization error bounds for support vector machine learning
492 -- 500Chetan Kumar. Performance evaluation for implementations of a network of proxy caches
501 -- 511Chieh-Yuan Tsai, Yu-Chen Shieh. A change detection method for sequential patterns
512 -- 521Jian Cai, Xiangdong Liu, Zhihui Xiao, Jin Liu. Improving supply chain performance management: A systematic approach to analyzing iterative KPI accomplishment
522 -- 531Yoshinori Suzuki. A decision support system of dynamic vehicle refueling
532 -- 541Jing Wang, Kholekile Gwebu, Murali S. Shanker, Marvin D. Troutt. An application of agent-based simulation to knowledge sharing
542 -- 551Punit Ahluwalia, Upkar Varshney. Composite quality of service and decision making perspectives in wireless networks
552 -- 561Vidyanand Choudhary, Rajeev K. Tyagi. Economic incentives to adopt electronic payment schemes under competition
562 -- 575Ned Kock, Jacques Verville, Azim Danesh-Pajou, Dorrie DeLuca. Communication flow orientation in business process modeling and its effect on redesign success: Results from a field study
576 -- 585Chandrasekar Subramaniam, Ravi Sen, Matthew L. Nelson. Determinants of open source software project success: A longitudinal study
586 -- 593Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu. Identifying RFID-embedded objects in pervasive healthcare applications
594 -- 603Cuneyd C. Kaya, Guoying Zhang, Yong Tan, Vijay S. Mookerjee. An admission-control technique for delay reduction in proxy caching

Volume 46, Issue 1

1 -- 13Jennifer Shang, Pandu R. Tadikamalla, Laurie J. Kirsch, Lawrence Brown. A decision support system for managing inventory at GlaxoSmithKline
14 -- 28Stephen Russell, Aryya Gangopadhyay, Victoria Y. Yoon. Assisting decision making in the event-driven enterprise using wavelets
29 -- 40Munir Mandviwalla, Ravi Patnayakuni, David Schuff. Improving the peer review process with information technology
41 -- 51Ying Sai. Transparent Safe
52 -- 60Chetan Kumar, John B. Norris. A new approach for a proxy-level web caching mechanism
61 -- 69Robert S. Garfinkel, Ram D. Gopal, Bhavik Pathak, Fang Yin. Shopbot 2.0: Integrating recommendations and promotions with comparison shopping
70 -- 83Shi-Ming Huang, David C. Yen, Luen-Wei Yang, Jing-Shiuan Hua. An investigation of Zipf s Law for fraud detection (DSS#06-10-1826R(2))
84 -- 100Beatriz Abdul-Jalbar, José M. Gutiérrez, Joaquin Sicilia. Policies for a single-vendor multi-buyer system with finite production rate
101 -- 114Riyaz T. Sikora, Vishal Sachdev. Learning bidding strategies with autonomous agents in environments with unstable equilibrium
115 -- 127David Dreyfus, Bala Iyer. Managing architectural emergence: A conceptual model and simulation
128 -- 138Stephen G. Powell, Kenneth R. Baker, Barry Lawson 0002. A critical review of the literature on spreadsheet errors
139 -- 148Sang-Won Yoon, Juan D. Velásquez, B. K. Partridge, Shimon Y. Nof. Transportation security decision support system for emergency response: A training prototype
149 -- 157Shih-Wei Chou, Yu-Chieh Chang. The implementation factors that influence the ERP (enterprise resource planning) benefits
158 -- 172Daniel G. Conway, Gary J. Koehler. Caveat mercator in electronic commerce: An update
173 -- 186Ramanath Subramanyam, Mu Xia. Free/Libre Open Source Software development in developing and developed countries: A conceptual framework with an exploratory study
187 -- 205Adrian Paschke, Martin Bichler. Knowledge representation concepts for automated SLA management
206 -- 215Zhiping D. Walter, Melissa Succi Lopez. Physician acceptance of information technologies: Role of perceived threat to professional autonomy
216 -- 232Jahyun Goo, C. Derrick Huang. Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory
233 -- 253Christine Kiss, Martin Bichler. Identification of influencers - Measuring influence in customer networks
254 -- 264Nanda Kumar, Kannan Mohan, Richard D. Holowczak. Locking the door but leaving the computer vulnerable: Factors inhibiting home users adoption of software firewalls
265 -- 276Martijn Kagie, Michiel C. van Wezel, Patrick J. F. Groenen. A graphical shopping interface based on product attributes
277 -- 286K. O. Willis, D. F. Jones. Multi-objective simulation optimization through search heuristics and relational database analysis
287 -- 299Atish P. Sinha, Huimin Zhao. Incorporating domain knowledge into data mining classifiers: An application in indirect lending
300 -- 317Minseok Song, Wil M. P. van der Aalst. Towards comprehensive support for organizational mining
318 -- 332Hong Guo, Juheng Zhang, Gary J. Koehler. A survey of quantum games
333 -- 343Juheng Zhang, Subhajyoti Bandyopadhyay, Selwyn Piramuthu. Real option valuation on grid computing
344 -- 355Cocky Hilhorst, Pieter M. A. Ribbers, Eric van Heck, Martin Smits. Using Dempster-Shafer theory and real options theory to assess competing strategies for implementing IT infrastructures: A case study
356 -- 365Upkar Varshney. A middleware framework for managing transactions in group-oriented mobile commerce services
366 -- 375Rui Borges Lopes, Sérgio Barreto, Carlos Ferreira, Beatriz Sousa Santos. A decision-support tool for a capacitated location-routing problem
376 -- 387Geoffrey Lamptey, Samuel Labi, Zongzhi Li. Decision support for optimal scheduling of highway pavement preventive maintenance within resurfacing cycle
388 -- 398Ye Chen, Divakaran Liginlal. A maximum entropy approach to feature selection in knowledge-based authentication
399 -- 410Gokul Bhandari, Khaled Hassanein, Richard Deaves. Debiasing investors with decision support systems: An experimental investigation
411 -- 419Zhan-Li Sun, Tsan-Ming Choi, Kin-Fan Au, Yong Yu. Sales forecasting using extreme learning machine with applications in fashion retailing
420 -- 428Pier Luigi Conti, Maurizio Naldi. Detection of anomalous bids in procurement auctions
429 -- 439Navin Kumar, Aryya Gangopadhyay, Sanjay Bapna, George Karabatis, Zhiyuan Chen. Measuring interestingness of discovered skewed patterns in data cubes
440 -- 449Zhe Qu, Han Zhang, Haizheng Li. Determinants of online merchant rating: Content analysis of consumer comments about Yahoo merchants