Skip to main content

previous disabled Page of 2
and
  1. Chapter and Conference Paper

    Pattern Discovery from Big Data of Food Sampling Inspections Based on Extreme Learning Machine

    Food sampling programs are implemented from time to time in local areas or throughout the country in order to guarantee food safety and to improve food quality. The hidden patterns in the accumulated huge amou...

    Yi Liu, **n Li, Jianxin Wang, Feng Chen in Research and Practical Issues of Enterpris… (2018)

  2. No Access

    Chapter and Conference Paper

    SIRPSS - Sustainable Industrial Site Redevelopment Planning Support System

    Abandoned industrial sites should be redeveloped in a sustainable way to reduce waste land. Planning support systems (PSSs) can help in the early planning phase by presenting possible outcomes of various redev...

    Tong Wang, Qi Han, Bauke de Vries in Decision Support Systems VIII: Sustainable… (2018)

  3. No Access

    Chapter and Conference Paper

    Business Process and Rule Integration Approaches - An Empirical Analysis

    Modeling landscapes in organizations suffer from the problem of information silos, where a number of process models, business rule repositories and other information artefacts may exist concurrently for the sa...

    Tianwa Chen, Wei Wang, Marta Indulska, Shazia Sadiq in Business Process Management Forum (2018)

  4. No Access

    Chapter and Conference Paper

    A Fuzzy Logic Approach to Modeling Brand Value: Evidence from Taiwan’s Banking Industry

    With the growing recognition that brands are valuable assets to organizations, the measurement of brand equity has thus been of interest to the academic and practice communities. Various approaches to measurin...

    David Han-Min Wang, Tiffany Hui-Kuang Yu in New Information and Communication Technolo… (2015)

  5. No Access

    Chapter and Conference Paper

    Multiple Attribute Group Decision Making Under Hesitant Fuzzy Environment

    Hesitant fuzzy set is a very useful means to depict the decision information in the process of decision making. In this paper, motivated by the extension principle of hesitant fuzzy sets, we export Einstein op...

    Weize Wang, Qi-An Lu, Li Yang in Outlooks and Insights on Group Decision and Negotiation (2015)

  6. No Access

    Chapter and Conference Paper

    Mixed Method for New Scholars with Intrusive, Emerging and Complex Socio-Technical Topics

    The literature on security research, such as information security and supply chain security, informs that it is highly intrusive in nature. This creates hindrances to researchers on develo** or testing theor...

    Ibrahim Shafiu, William Yu Chung Wang in Knowledge Management in Organizations (2014)

  7. No Access

    Chapter and Conference Paper

    What Can We Learn from the Legal Provisions in Judgment Documents?

    So far, more than 2 million judgment documents represented in the same pattern and standard have come up in China, which can be viewed as a huge knowledge base. From 150 thousands judgment documents in 2012, a...

    Jianlin Zhu, ** Yang, **gqiao Peng in Business Information Systems Workshops (2014)

  8. No Access

    Book and Conference Proceedings

    Business Process Management

    11th International Conference, BPM 2013, Bei**g, China, August 26-30, 2013. Proceedings

    Florian Daniel, Jianmin Wang, Barbara Weber in Lecture Notes in Computer Science (2013)

  9. Chapter and Conference Paper

    Mass Customization Oriented and Cost-Effective Service Network

    Traditional service composition approaches face the significant challenge of how to deal with massive individualized requirements. Such challenges include how to reach a tradeoff between one generalized soluti...

    Zhongjie Wang, **aofei Xu, **anzhi Wang in Enterprise Interoperability (2013)

  10. No Access

    Chapter

    Enabling Smart Logistics for Service Operations

    Efficient and on-time execution of field tasks has been found to rely heavily on internal availability of inventories. However, the lack of flexibility in the way information flows along the logistics chain ha...

    Yingli Wang, Mohamed Naim, Leighton Evans in Transforming Field and Service Operations (2013)

  11. No Access

    Chapter and Conference Paper

    Investigating Clinical Care Pathways Correlated with Outcomes

    Clinical care pathway analysis is the process of discovering how clinical activities impact patients in their care journeys, and uses the discovered knowledge for various applications including the redesign an...

    Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang in Business Process Management (2013)

  12. No Access

    Chapter and Conference Paper

    Do Hacker Forums Contribute to Security Attacks?

    There has been an increased amount of discussion about firms needing to account for the hacker’s perspective in protecting their information assets. However, we still have very little idea about how attack inf...

    Qiu-Hong Wang, Wei T. Yue, Kai-Lung Hui in E-Life: Web-Enabled Convergence of Commerc… (2012)

  13. No Access

    Chapter and Conference Paper

    Research on the Hybrid Push/Pull Production System for Mass Customization Production

    To start with, literatures of the CODP theory and the researches on the hybrid push/pull production system are reviewed. CODP is the point where push production integrate with the push production mode, therefo...

    Jie Lin, **ng Shi, Yu Wang in E-Life: Web-Enabled Convergence of Commerc… (2012)

  14. No Access

    Chapter and Conference Paper

    Consumer Segmentation and the Information Rule of Online Reviews in Horizontally Differentiated Product Markets

    Previous studies have explored the impact of online reviews on product sales at the aggregate level. This study contributes to the literature by investigating how online reviews take effect at the individual c...

    Qingliang Wang, Khim Yong Goh in E-Life: Web-Enabled Convergence of Commerc… (2012)

  15. Chapter and Conference Paper

    A Value-Oriented Iterative Service Modeling Process

    In order to help service designers build high-quality service models quickly and accurately, this paper presents a value-oriented iterative service modeling process. This modeling process combines service busi...

    **aofei Xu, Chao Ma, Zhongjie Wang in Enterprise Interoperability (2012)

  16. No Access

    Chapter and Conference Paper

    IT Governance: The Key Factor of E-Government Implementation in China

    According to E-government maturity model, Leavitt’s Diamond model, Fountain’s technology enactment framework and IT governance theory, this paper discusses the important impact that IT governance bring in the ...

    Tianmei Wang, Baowen Sun, Zhijun Yan in E-Life: Web-Enabled Convergence of Commerc… (2012)

  17. No Access

    Chapter and Conference Paper

    Distinct Impact of Information Access Patterns on Supplier’s Non-contractible Investments and Adaptation for Supply Chain Agility

    This study explores how distinct information access patterns affect a supplier’s supply chain agility. A supplier’s specific investments for IT-enabled supply chain coordination and relational adaptation in su...

    Jeffrey C. F. Tai, Eric T. G. Wang in Exploring the Grand Challenges for Next Ge… (2011)

  18. No Access

    Chapter and Conference Paper

    The Value of IT-Enabled Business Process Standardization from the Real Options Perspective

    IT-enabled business processes support firm agility, and business process standardization has become an essential part of IT architecture. Business process standardization value partly comes from the real optio...

    Qizhi Dai, Robert J. Kauffman, Bin Wang in Exploring the Grand Challenges for Next Ge… (2011)

  19. No Access

    Chapter and Conference Paper

    An Exploration of the Search for Information Security

    People use search engines to seek information. This study investigates the motives that drive the search for information security knowledge via a search engine. We empirically examine the effects of network at...

    **gguo Wang, Nan **ao, H. R. Rao in Exploring the Grand Challenges for Next Ge… (2011)

  20. No Access

    Chapter and Conference Paper

    Determinants of Customer Loyalty for Social Networking Sites

    Although customer loyalty has been widely examined in various Internet contexts, the conceptualization and empirical validation of a customer loyalty model for social networking sites (SNSs) has not been addre...

    Rui Gu, Lih-Bin Oh, Kanliang Wang in Exploring the Grand Challenges for Next Ge… (2011)

previous disabled Page of 2