default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 71 matches
- 2011
- Wil M. P. van der Aalst, Kees M. van Hee, Jan Martijn E. M. van der Werf, Akhil Kumar, Marc Verdonk:
Conceptual model for online auditing. Decis. Support Syst. 50(3): 636-647 (2011) - Xue Bai:
Predicting consumer sentiments from online text. Decis. Support Syst. 50(4): 732-742 (2011) - Sukanto Bhattacharya, Dongming Xu, Kuldeep Kumar:
An ANN-based auditor decision support system using Benford's law. Decis. Support Syst. 50(3): 576-584 (2011) - Siddhartha Bhattacharyya, Sanjeev Jha, Kurian K. Tharakunnel, J. Christopher Westland:
Data mining for credit card fraud: A comparative study. Decis. Support Syst. 50(3): 602-613 (2011) - Qing Cao, Wenjing Duan, Qiwei Gan:
Exploring determinants of voting for the "helpfulness" of online user reviews: A text mining approach. Decis. Support Syst. 50(2): 511-521 (2011) - Réal André Carbonneau, Gregory E. Kersten, Rustam M. Vahidov:
Pairwise issue modeling for negotiation counteroffer prediction using neural networks. Decis. Support Syst. 50(2): 449-459 (2011) - Sangmi Chai, Minkyun Kim, H. Raghav Rao:
Firms' information security investment decisions: Stock market evidence of investors' behavior. Decis. Support Syst. 50(4): 651-661 (2011) - Xi Chen, Indranil Bose, Alvin Chung Man Leung, Chenhui (Julian) Guo:
Assessing the severity of phishing attacks: A hybrid data mining approach. Decis. Support Syst. 50(4): 662-672 (2011) - Hsinchun Chen, Michael Chau, Shu-Hsing Li:
Enterprise risk and security management: Data, text and Web mining. Decis. Support Syst. 50(4): 649-650 (2011) - Kuo-Tay Chen, Hsin-Min Lu, Tsai-Jyh Chen, Shu-Hsing Li, Jian-Shuen Lian, Hsinchun Chen:
Giving context to accounting numbers: The role of news coverage. Decis. Support Syst. 50(4): 673-679 (2011) - Chien Chin Chen, You-De Tseng:
Quality evaluation of product reviews using an information quality framework. Decis. Support Syst. 50(4): 755-768 (2011) - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A new role mining framework to elicit business roles and to mitigate enterprise risk. Decis. Support Syst. 50(4): 715-731 (2011) - Yan Dang, Yulei Zhang, Paul Jen-Hwa Hu, Susan A. Brown, Hsinchun Chen:
Knowledge mapping for rapidly evolving domains: A design science approach. Decis. Support Syst. 50(2): 415-427 (2011) - Fletcher H. Glancy, Surya B. Yadav:
A computational model for financial reporting fraud detection. Decis. Support Syst. 50(3): 595-601 (2011) - Sigi Goode, David Lacey:
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls. Decis. Support Syst. 50(4): 702-714 (2011) - Sven S. Groth, Jan Muntermann:
An intraday market risk management approach based on textual analysis. Decis. Support Syst. 50(4): 680-691 (2011) - Nan Hu, Indranil Bose, Yunjun Gao, Ling Liu:
Manipulation in digital word-of-mouth: A reality check for book reviews. Decis. Support Syst. 50(3): 627-635 (2011) - Nan Hu, Ling Liu, Vallabh Sambamurthy:
Fraud detection in online consumer reviews. Decis. Support Syst. 50(3): 614-626 (2011) - Shi-Ming Huang, Wei-Hsi Hung, David C. Yen, I-Cheng Chang, Dino Jiang:
Building the evaluation model of the IT general control for CPAs under enterprise risk management. Decis. Support Syst. 50(4): 692-701 (2011) - Shiu-Li Huang, Yu-Hsiang Tsai:
Designing a cross-language comparison-shopping agent. Decis. Support Syst. 50(2): 428-438 (2011) - Sean L. Humpherys, Kevin C. Moffitt, Mary B. Burns, Judee K. Burgoon, William F. Felix:
Identification of fraudulent financial statements using linguistic credibility analysis. Decis. Support Syst. 50(3): 585-594 (2011) - Shin-Yuan Hung, She-I Chang, David C. Yen, Tsan-Ching Kang, Chien-Pang Kuo:
Successful implementation of collaborative product commerce: An organizational fit perspective. Decis. Support Syst. 50(2): 501-510 (2011) - Younghwa Lee:
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decis. Support Syst. 50(2): 361-369 (2011) - JinKyu Lee, Nitesh Bharosa, Jing Yang, Marijn Janssen, H. Raghav Rao:
Group value and intention to use - A study of multi-agency disaster management information systems for public safety. Decis. Support Syst. 50(2): 404-414 (2011) - Wei-Pang Liao, Tom M. Y. Lin, Shu-Hsien Liao:
Contributions to Radio Frequency Identification (RFID) research: An assessment of SCI-, SSCI-indexed papers from 2004 to 2008. Decis. Support Syst. 50(2): 548-556 (2011) - Duen-Ren Liu, Chin-Hui Lai:
Mining group-based knowledge flows for sharing task knowledge. Decis. Support Syst. 50(2): 370-386 (2011) - Yong Lu, Dan Yang:
Information exchange in virtual communities under extreme disaster conditions. Decis. Support Syst. 50(2): 529-538 (2011) - Takashi Mihara:
Information sharing using entangled states and its applications to quantum card tricks. Decis. Support Syst. 50(2): 522-528 (2011) - E. W. T. Ngai, Yong Hu, Y. H. Wong, Yijun Chen, Xin Sun:
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decis. Support Syst. 50(3): 559-569 (2011) - Benjamin Ngugi, Marilyn Tremaine, Peter Tarasewich:
Biometric keypads: Improving accuracy through optimal PIN selection. Decis. Support Syst. 50(4): 769-776 (2011)
skipping 41 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 17:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint