Search

Results: 3500
Performing Locality and Identity
Lijun Zhang
Sep 21, 2016
The paper examines the fusion of narratives, time, space, and personal identity through ethnographic study of rickshaw driver’s performance in the context of “Hutong tour” as a form of urban tourism in Beijing, a cosmopolitan...
Credit Risk Models for Financial Fraud Detection
Outlier detection is currently applied in many fields, where existing research focuses on improving imbalanced data or enhancing classification accuracy. In the financial area, financial fraud detection puts higher demands on...
Similarity Discriminating Algorithm for Scientific Research Projects
An enormous challenge for project management is to identify similar research projects accurately and efficiently among numerous proposals. To address this challenge, this paper proposes an algorithm to calculate the similarity...
Deep Neural Network and Time Series Approach for Finance Systems
The stock market is an aggregation of investor sentiment that affects daily changes in stock prices. Investor sentiment remained a mystery and challenge over time, inviting researchers to comprehend the market trends. The entry...
Identification of high risk clinical and imaging features for intracranial artery dissection using high-resolution cardiovascular magnetic resonance
Abstract: Background: Intracranial artery dissection (IAD) often causes headache and cerebral vascular ischemic events. The imaging characteristics of IAD remain unclear. This study aims to characterize the appearance of culprit...
Blockchain Tokens for Enterprise Knowledge Sharing
Virtual knowledge communities have become essential platforms for enterprises to facilitate knowledge sharing. However, due to the lack of effective incentive mechanisms, the traditional virtual knowledge community is generally...
Optimal Information Acquisition and Sharing Decisions
The acquisition and sharing of reviews have significant ramifications for the selection of crowdsourcing designs before mass production. This article studies the optimal decision of a brand enterprise regarding the...
Alumni Couple Establishes New Scholarships for Computer Science Majors
Winthrop University
Jan 01, 0001
Alumni Justin Pauley and his wife, Emily Stevenson Pauley, have created two scholarships: an endowment and an annual restricted scholarship. Justin, a computer science graduate, and Emily reside in Manhattan.
Published by: Winthrop University
Spatial Patterns and Development Characteristics of China's Postgraduate Education
Using four types of publicly available datasets and ArcGIS software, the authors identify the spatial characteristics of postgraduate education in China at three scales: comprehensive economic zone, provincial, and city. They...
Uncovering the Dark Side of Artificial Intelligence in Electronic Markets
The dark sides of artificial intelligence (AI) have attracted immense attention in recent years. This study produces a synthesis of current research on six dark sides of AI in electronic markets through a systematic literature...
Trust in Cryptocurrency Payments
Although cryptocurrencies are not yet widely used as a method of payment in retail and commercial transactions, they are attracting a growing level of interest. However, if cryptocurrencies are to attract mass adoption for...
Fit by adaptation or fit by founding? A comparative study of existing and new entrepreneurial cohorts in China
Extant research provides ambiguous views on the network adaptability of existing ventures and new ventures during environmental change. Applying an institutional perspective, this research aims to provide a clearer picture by...
Predicting the Intention to Adopt Innovation in Supply Chain Finance
Based on the mixed model unified technology acceptance and utilization theory (UTAUT) and spinner innovation model (SPINNER), a theoretical model is suggested to explain the determinant of behavioral intention to predict...
Fit by adaptation or fit by founding? A comparative study of existing and new entrepreneurial cohorts in China
Extant research provides ambiguous views on the network adaptability of existing ventures and new ventures during environmental change. Applying an institutional perspective, this research aims to provide a clearer picture by...
Agility and Resilience in Information Systems Research
This research analyzes how the concepts of agility and resilience are treated in IS literature. While agility has been an object of study in IS research for many decades, resilience is a fairly new topic. Both are gaining...
Exploring the Potential of Large Language Models in Supply Chain Management
This study aims to identify emerging topics, themes, and potential areas for applying large language models (LLMs) in supply chain management through data triangulation. This study involved the synthesis of 33 published articles...
Identifying Alternative Options for Chatbots With Multi-Criteria Decision-Making
Artificial intelligence-powered chatbot usage continues to grow worldwide, and there is ongoing research to identify features that maximize the utility of chatbots. This study uses the multi-criteria decision-making (MCDM)...
Enforcing Information System Security
Every year brings numerous security breaches that lead to highly destructive ransomware attacks, data leaks, and reputational damage to governments, companies, and other organizations around the world. As a result, there is a...
First birth following spindle transfer for mitochondrial replacement therapy
In this issue, Zhang et al. (2017) report the birth of a healthy boy after mitochondrial replacement therapy (MRT) by spindle transfer to prevent transmission of mitochondrial disease from mother to child. The case was first...
Cracking the Code
With the expanding reach of the Internet of Things, information security threats are increasing, including from the very professionals tasked with defending against these threats. This study identified factors impacting...
Consumer Engagement on Social Networking Sites
In spite the significance of consumer engagement that scholars have recognized, there is a gap in understanding the influencing factors of consumer social networking engagement behaviors. In the light of social identity theory...
A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems
The COVID-19 pandemic has heightened the necessity for pervasive data and system interoperability to manage healthcare information and knowledge. There is an urgent need to better understand the role of interoperability in...

|<

<

1

2

3

4

5

>

>|