2017 | Decision Support Systems | Citations: 3
Authors: Figini, Silvia; Bonelli, Federico; Giovannini, Emanuele
Abstract: This paper describes novel approaches to predict default for SMEs. Multivariate ... Expand
Semantic filters: extreme value analysis
Topics: logistics management missing data
Methods: logistic regression random forest classification machine learning ensemble learning regression analysis method
2016 | Americas Conference on Information Systems | Citations: 0
Authors: Zhang, Jie; Lee, Gene; Wang, Jingguo
Abstract: Spam has been one of the most difficult problems to be addressed since the inven ... Expand
Semantic filters: extreme value analysis
Topics: email spam denial of service attack spamming computer crime electronic mail
Methods: time series analysis longitudinal research artificial neural network autoregressive integrated moving average descriptive statistic
2014 | International Conference on Information Systems | Citations: 0
Authors: Han, Sang Pil
Abstract: Using a unique panel data set detailing individual-level mobile app consumption, ... Expand
Semantic filters: extreme value analysis
Topics: mobile application big data social network mobile system Facebook
Methods: longitudinal research descriptive statistic design artifact econometric modeling extreme value analysis
Theories: utility theory
2013 | European Conference On Information Systems | Citations: 0
Authors: Argyrou, Argyris
Abstract: While a wealth of statutory and auditing pronouncements attest to the importance ... Expand
Semantic filters: extreme value analysis
Topics: accounting database system
Methods: extreme value analysis anomaly detection Bayesian analysis reference modelling experiment
2013 | Electronic Markets | Citations: 17
Authors: Daas, Dave; Hurkmans, Toine; Overbeek, Sietse; Bouwman, Harry
Abstract: Software vendors increasingly offer web-based services (SaaS) at a subscription ... Expand
Semantic filters: extreme value analysis
Topics: decision support system software as a service business model price management willingness to pay
Methods: case study design framework qualitative interview design process design methodology
2008 | Information Systems Research | Citations: 0
Authors: Wang, Jingguo; Chaudhury, Aby; Rao, H. Raghav
Abstract: Information security investment has been getting increasing attention in recent ... Expand
Semantic filters: extreme value analysis
Topics: data security website security policy IT security enterprise information system
Methods: extreme value analysis augmented Dickey–Fuller test qualitative interview sensitivity analysis descriptive statistic
Theories: decision theory
2005 | International Conference on Information Systems | Citations: 0
Authors: Wang, Jingguo; Chaudhury, Abhijit; Rao, Raghav
Abstract: Information technology security investment is receiving increasing attention in ... Expand
Semantic filters: extreme value analysis
Topics: IT security IS failure email spam internet technology electronic business
Methods: extreme value analysis regression analysis method sensitivity analysis survival function literature study