2023 | Group Decision and Negotiation | Citations: 0
Authors: Dhara, Suvojit; Goswami, Adrijit
Abstract: In the field of multi-attribute group decision-making (MAGDM), “decision-making ... Expand
Semantic filters: rank correlation coefficient
Topics: decision making
Methods: case study TOPSIS trade-off analysis method cross sectional research descriptive statistic
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Gonnermann, Jana; Teichmann, Malte
Abstract: Virtual reality can have advantages for education and learning. However, it mus ... Expand
Semantic filters: rank correlation coefficient
Topics: virtual reality usability online learning system user interface virtual world
Methods: experiment survey descriptive statistic design principle quasi experiment
2023 | European Conference On Information Systems | Citations: 0
Authors: Haase, Frederic; Rath, Oliver; Kurka, Marco; Schoder, Detlef
Abstract: This paper explores the concept of Finfluencers: financial social network actor ... Expand
Semantic filters: rank correlation coefficient
Topics: Twitter social network social influence cryptocurrency social media
Methods: longitudinal research time series analysis Granger causality descriptive statistic sentiment analysis
2023 | Organization Science | Citations: 0
Authors: Tan, David; Rider, Christopher I.
Abstract: We posit a novel mechanism—socially endogenous calibration—whereby the tendency ... Expand
Semantic filters: rank correlation coefficient
Topics: anonymity productivity
Methods: simulation survey theory development cross sectional research regression analysis method
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Wątróbski, Jarosław; Rudawska, Iga; Bączkiewicz, Aleksandra
Abstract: ... Expand
Semantic filters: rank correlation coefficient
Topics: pandemic health information system system efficiency
Methods: trade-off analysis method TOPSIS descriptive statistic survey computational algorithm
2022 | Information Systems Frontiers | Citations: 0
Authors: Jha, Ashutosh; Saha, Debashis
Abstract: The global market uptake of the fourth generation-Long-Term Evolution (4G-LTE) M ... Expand
Semantic filters: rank correlation coefficient
Topics: mobile system broadband cellular network network infrastructure service quality innovation management
Methods: sensitivity analysis theory development descriptive statistic longitudinal research linear least square
2022 | Group Decision and Negotiation | Citations: 0
Authors: Li, Liang; Liu, Yanwu; Tu, Yan; Zhou, Xiaoyang; Lev, Benjamin
Abstract: The risk of water resources has become a serious crisis threatening the human su ... Expand
Semantic filters: rank correlation coefficient
Topics: decision making risk management
Methods: trade-off analysis method sensitivity analysis TOPSIS optimization model ELECTRE
Theories: loss aversion prospect theory
2021 | Americas Conference on Information Systems | Citations: 1
Authors: Marx, Julian; Mirbabaie, Milad; Brendel, Alfred Benedikt; Zander, Kevin
Abstract: Voice-based information transfer via podcasts is increasingly taking root in ed ... Expand
Semantic filters: rank correlation coefficient
Topics: podcast usage intention digital service SoundCloud website
Methods: descriptive statistic experiment experimental group survey qualitative interview
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Iandoli, Luca; Piantedosi, Letizia; Zollo, Giuseppe
Abstract: Elegant Design is a key determinant of positive consumer experience and a diffe ... Expand
Semantic filters: rank correlation coefficient
Topics: usability user interface anonymity
Methods: descriptive statistic survey theory development usability testing Levene's test
Theories: mathematical theory of communication
2020 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Kesan, Jay P.; Zhang, Linfeng
Abstract: The fact that “cyber risk” is indeed a collective term for various distinct risk ... Expand
Semantic filters: rank correlation coefficient
Topics: privacy data breach ransomware price management IT security
Methods: cluster analysis descriptive statistic literature study k-means clustering parametric test
Theories: probability theory