Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 02 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Online to offline (O2O) service recommendation method based on multi-dimensional similarity measurement

With the rapid development of information technology, consumers are able to search for and buy services or products online, and then consume them in an offline store. This emerging ecommerce model is called online to offline (O2O) service, which has ...

research-article
An analytic approach to assessing organizational citizenship behavior

This study examines the organizational citizenship behavior (OCB) of employees by designing and developing an analytic network process (ANP) methodology. The viability of the proposed methodology is demonstrated via the sales representatives of Beko, a ...

research-article
A game theoretic analysis of multichannel retail in the context of showrooming

Showrooming as a market phenomenon in multichannel retailing has grown in importance over the last few years. Consumers nowadays use the brick-and-mortar store to research about a product before purchasing it online. This leads to the offline stores ...

research-article
A context-aware researcher recommendation system for university-industry collaboration on R&D projects

University-industry collaboration plays an important role in the success of R&D projects. One of the main challenges of university-industry collaboration is the identification of suitable partners. Due to the information asymmetry problem, it is ...

research-article
Improving cognitive effectiveness of business process diagrams with opacity-driven graphical highlights

In order to facilitate the communication between the stakeholders, business process diagrams must be easy to understand. This is challenging to achieve, since they can become large and complex. In our previous work, we proposed Opacity-Driven Graphical ...

research-article
Getting phished on social media

The study experimentally simulated a level-1 social networking-based phishing (SNP) attack, where a phisher using a phony profile attempts to friend an individual on Facebook, and a level-2 SNP attack, where a phisher attempts to extract information ...

research-article
Development and evaluation of a continuous-time Markov chain model for detecting and handling data currency declines

Data currency declines, caused by recorded data values becoming outdated, can damage the usability and accountability of data resources. Detecting and updating outdated values may improve data currency and reduce the associated damage, but such efforts ...

research-article
Information representation in decision making

Although the literature on information representation in decision support has argued for a long time that the way in which information is presented to decision makers should fit both task characteristics and the cognitive style of decision makers, the ...

research-article
Test sequencing for sequential system diagnosis with precedence constraints and imperfect tests

We study sequential system testing with the objective of minimizing the total expected testing costs. The goal is to discover the state of a system that consists of a set of independent components. The state of the system depends on the states of the ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.