nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A local social network approach for research management
|
Liu, Xiaoyan |
|
2013 |
56 |
C |
p. 427-438 12 p. |
artikel |
2 |
A machine learning-based usability evaluation method for eLearning systems
|
Oztekin, Asil |
|
2013 |
56 |
C |
p. 63-73 11 p. |
artikel |
3 |
An auction design for local reserve energy markets
|
Rosen, C. |
|
2013 |
56 |
C |
p. 168-179 12 p. |
artikel |
4 |
A prediction framework based on contextual data to support Mobile Personalized Marketing
|
Tang, Heng |
|
2013 |
56 |
C |
p. 234-246 13 p. |
artikel |
5 |
A risk oriented model to assess strategic decisions in new product development projects
|
Marmier, F. |
|
2013 |
56 |
C |
p. 74-82 9 p. |
artikel |
6 |
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed reserve
|
Murillo-Sánchez, Carlos E. |
|
2013 |
56 |
C |
p. 1-10 10 p. |
artikel |
7 |
A study of mobile user engagement (MoEN): Engagement motivations, perceived value, satisfaction, and continued engagement intention
|
Kim, Young Hoon |
|
2013 |
56 |
C |
p. 361-370 10 p. |
artikel |
8 |
A sustainable and affordable support system for rural healthcare delivery
|
Barjis, Joseph |
|
2013 |
56 |
C |
p. 223-233 11 p. |
artikel |
9 |
Bidding behaviors for a keyword auction in a sealed-bid environment
|
Kamijo, Y. |
|
2013 |
56 |
C |
p. 371-378 8 p. |
artikel |
10 |
Can online trading survive bad-mouthing? An experimental investigation
|
Du, Ninghua |
|
2013 |
56 |
C |
p. 419-426 8 p. |
artikel |
11 |
Capital markets valuation and accounting performance of Most Admired Knowledge Enterprise (MAKE) award winners
|
DeFond, Mark L. |
|
2013 |
56 |
C |
p. 348-360 13 p. |
artikel |
12 |
Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approach
|
Zheng, Xiaolin |
|
2013 |
56 |
C |
p. 211-222 12 p. |
artikel |
13 |
Cognitive-based evaluation of consumption fads: An analytical approach
|
Hu, Hao |
|
2013 |
56 |
C |
p. 83-91 9 p. |
artikel |
14 |
Cost escalation in information technology outsourcing: A moderated mediation study
|
Bahli, Bouchaïb |
|
2013 |
56 |
C |
p. 37-47 11 p. |
artikel |
15 |
Cyber-risk decision models: To insure IT or not?
|
Mukhopadhyay, Arunabha |
|
2013 |
56 |
C |
p. 11-26 16 p. |
artikel |
16 |
DEA analysis of FDI attractiveness for sustainable development: Evidence from Chinese provinces
|
Lei, Ming |
|
2013 |
56 |
C |
p. 406-418 13 p. |
artikel |
17 |
Detection of naming convention violations in process models for different languages
|
Leopold, Henrik |
|
2013 |
56 |
C |
p. 310-325 16 p. |
artikel |
18 |
Determinants of end-user acceptance of biometrics: Integrating the “Big 3” of technology acceptance with privacy context
|
Lancelot Miltgen, Caroline |
|
2013 |
56 |
C |
p. 103-114 12 p. |
artikel |
19 |
Editorial Board
|
|
|
2013 |
56 |
C |
p. IFC- 1 p. |
artikel |
20 |
Evaluation and aggregation of pay-as-you-drive insurance rate factors: A classification analysis approach
|
Paefgen, Johannes |
|
2013 |
56 |
C |
p. 192-201 10 p. |
artikel |
21 |
Examining the effects of malfunctioning personalized services on online users' distrust and behaviors
|
Chau, Patrick Y.K. |
|
2013 |
56 |
C |
p. 180-191 12 p. |
artikel |
22 |
Experience information goods: “Version-to-upgrade”
|
Wei, Xueqi (David) |
|
2013 |
56 |
C |
p. 494-501 8 p. |
artikel |
23 |
Exploring the effect of boundary objects on knowledge interaction
|
Huang, Eugenia Y. |
|
2013 |
56 |
C |
p. 140-147 8 p. |
artikel |
24 |
Formal correctness of supply chain design
|
Leukel, Joerg |
|
2013 |
56 |
C |
p. 288-299 12 p. |
artikel |
25 |
From clicking to consideration: A business intelligence approach to estimating consumers' consideration probabilities
|
Wang, Hao |
|
2013 |
56 |
C |
p. 397-405 9 p. |
artikel |
26 |
How do competitive environments moderate CRM value?
|
Liu, Alfred Zhu |
|
2013 |
56 |
C |
p. 462-473 12 p. |
artikel |
27 |
How old are you really? Cognitive age in technology acceptance
|
Hong, Se-Joon |
|
2013 |
56 |
C |
p. 122-130 9 p. |
artikel |
28 |
How to preserve the conflict as an alarm in the combination of belief functions?
|
Lefèvre, Eric |
|
2013 |
56 |
C |
p. 326-333 8 p. |
artikel |
29 |
Impact of informational factors on online recommendation credibility: The moderating role of source credibility
|
Luo, Chuan |
|
2013 |
56 |
C |
p. 92-102 11 p. |
artikel |
30 |
Improving RFID adoption in Taiwan's healthcare industry based on a DEMATEL technique with a hybrid MCDM model
|
Lu, Ming-Tsang |
|
2013 |
56 |
C |
p. 259-269 11 p. |
artikel |
31 |
Including social factors in an argumentative model for Group Decision Support Systems
|
Recio-García, Juan A. |
|
2013 |
56 |
C |
p. 48-55 8 p. |
artikel |
32 |
Integrating ERP and e-business: Resource complementarity in business value creation
|
Hsu, Pei-Fang |
|
2013 |
56 |
C |
p. 334-347 14 p. |
artikel |
33 |
Introduction to the special issue on “Mechanism Design in E-commerce and Information Systems”
|
Fan, Ming |
|
2013 |
56 |
C |
p. 395-396 2 p. |
artikel |
34 |
Invariant conditions in value system simulation models
|
Laurier, Wim |
|
2013 |
56 |
C |
p. 275-287 13 p. |
artikel |
35 |
It is all about what we have: A discriminant analysis of organizations' decision to adopt open source software
|
Li, Yan |
|
2013 |
56 |
C |
p. 56-62 7 p. |
artikel |
36 |
Learning from other buyers: The effect of purchase history records in online marketplaces
|
Ye, Qiang |
|
2013 |
56 |
C |
p. 502-512 11 p. |
artikel |
37 |
Mining stable patterns in multiple correlated databases
|
Lin, Yaojin |
|
2013 |
56 |
C |
p. 202-210 9 p. |
artikel |
38 |
NegotiAuction: An experimental study
|
Pham, Long |
|
2013 |
56 |
C |
p. 300-309 10 p. |
artikel |
39 |
Online learning for auction mechanism in bandit setting
|
He, Di |
|
2013 |
56 |
C |
p. 379-386 8 p. |
artikel |
40 |
Optimal keyword auctions for optimal user experiences
|
Li, Jun |
|
2013 |
56 |
C |
p. 450-461 12 p. |
artikel |
41 |
Reliability (or “lack thereof”) of on-line preference revelation: A controlled experimental analysis
|
Chen, Li |
|
2013 |
56 |
C |
p. 270-274 5 p. |
artikel |
42 |
Scalable and noise tolerant web knowledge extraction for search task simplification
|
He, Jun |
|
2013 |
56 |
C |
p. 156-167 12 p. |
artikel |
43 |
Seller heterogeneity in electronic marketplaces: A study of new and experienced sellers in eBay
|
Goes, Paulo |
|
2013 |
56 |
C |
p. 247-258 12 p. |
artikel |
44 |
Sequential weighted combination for unreliable evidence based on evidence variance
|
Han, Deqiang |
|
2013 |
56 |
C |
p. 387-393 7 p. |
artikel |
45 |
Software project risk analysis using Bayesian networks with causality constraints
|
Hu, Yong |
|
2013 |
56 |
C |
p. 439-449 11 p. |
artikel |
46 |
Store survival in online marketplace: An empirical investigation
|
Wang, Youwei |
|
2013 |
56 |
C |
p. 482-493 12 p. |
artikel |
47 |
The impacts of information quality and system quality on users' continuance intention in information-exchange virtual communities: An empirical investigation
|
Zheng, YiMing |
|
2013 |
56 |
C |
p. 513-524 12 p. |
artikel |
48 |
The influence of online word-of-mouth on long tail formation
|
Gu, Bin |
|
2013 |
56 |
C |
p. 474-481 8 p. |
artikel |
49 |
Understanding the formation of software-as-a-service (SaaS) satisfaction from the perspective of service quality
|
Chou, Shih-Wei |
|
2013 |
56 |
C |
p. 148-155 8 p. |
artikel |
50 |
Using 3D virtual environments to facilitate students in constructivist learning
|
Chau, Michael |
|
2013 |
56 |
C |
p. 115-121 7 p. |
artikel |
51 |
Vendors' incentives to invest in software quality in enterprise systems
|
Cho, Wooje |
|
2013 |
56 |
C |
p. 27-36 10 p. |
artikel |
52 |
Will a supplier benefit from sharing good information with a retailer?
|
Choi, Tsan-Ming |
|
2013 |
56 |
C |
p. 131-139 9 p. |
artikel |