메뉴 건너뛰기




Volumn 49, Issue 4, 2010, Pages 486-497

Using data envelopment analysis and decision trees for efficiency analysis and recommendation of B2C controls

Author keywords

B2C applications; B2C controls; Data envelopment analysis (DEA); Decision trees; Implementation of B2C applications

Indexed keywords

B2C APPLICATIONS; B2C CONTROLS; BUSINESS-TO-CONSUMER; COMMUNICATION CONTROL; DATA ENVELOPMENT; DEA MODELS; DECISION TREE MODELS; EFFICIENCY ANALYSIS; IMPLEMENTATION OF B2C APPLICATIONS; INFORMATION CONTENTS; INFORMATION SERVICE PROVIDERS; SYSTEM ENVIRONMENT; TWO-STEP PROCESS;

EID: 78049415005     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2010.06.002     Document Type: Article
Times cited : (45)

References (39)
  • 2
    • 33750966470 scopus 로고    scopus 로고
    • Exploring the characteristics of Internet security breaches that impact the market value of breached firms
    • F.K. Andoh-Baidoo, and K.-M. Osei-Bryson Exploring the characteristics of Internet security breaches that impact the market value of breached firms Expert Systems With Applications 32 2007 703 725
    • (2007) Expert Systems with Applications , vol.32 , pp. 703-725
    • Andoh-Baidoo, F.K.1    Osei-Bryson, K.-M.2
  • 3
    • 78049439161 scopus 로고    scopus 로고
    • If compliance is son critical, why are we still failing audits?
    • A. Bakman If compliance is son critical, why are we still failing audits? Information Systems Control Journal 5 2007 37 40
    • (2007) Information Systems Control Journal , vol.5 , pp. 37-40
    • Bakman, A.1
  • 4
    • 78049419974 scopus 로고    scopus 로고
    • Control self-assessment for information and related technology
    • S. Bakshi Control self-assessment for information and related technology Information Systems Control Journal 1 2004 55 62
    • (2004) Information Systems Control Journal , vol.1 , pp. 55-62
    • Bakshi, S.1
  • 6
    • 39749149995 scopus 로고    scopus 로고
    • Expert consensus on the top IT controls for a small business
    • B. Busta, and J. Strong Expert consensus on the top IT controls for a small business Information Systems Control Journal 6 2006 22 24
    • (2006) Information Systems Control Journal , vol.6 , pp. 22-24
    • Busta, B.1    Strong, J.2
  • 8
    • 48749128392 scopus 로고    scopus 로고
    • An integrated neural network and data envelopment analysis for supplier evaluation under incomplete information
    • D. Çelebi, and D. Bayraktar An integrated neural network and data envelopment analysis for supplier evaluation under incomplete information Expert Systems with Applications 35 4 2008 1698 1710
    • (2008) Expert Systems with Applications , vol.35 , Issue.4 , pp. 1698-1710
    • Çelebi, D.1    Bayraktar, D.2
  • 9
    • 78049445455 scopus 로고    scopus 로고
    • Threat assessment and security measures justification for advanced IT networks
    • M.J. Cerullo, and V. Cerullo Threat assessment and security measures justification for advanced IT networks Information Systems Control Journal 1 2005 35 43
    • (2005) Information Systems Control Journal , vol.1 , pp. 35-43
    • Cerullo, M.J.1    Cerullo, V.2
  • 11
    • 0037507339 scopus 로고    scopus 로고
    • Constructing amulti-valued and multi-labeled decision tree
    • Y.L. Chen, C.L. Hsu, and S.C. Chou Constructing amulti-valued and multi-labeled decision tree Expert Systems with Applications 25 2 2003 199 209
    • (2003) Expert Systems with Applications , vol.25 , Issue.2 , pp. 199-209
    • Chen, Y.L.1    Hsu, C.L.2    Chou, S.C.3
  • 13
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • L. Gordon, and M. Loeb The economics of information security investment ACM Transactions on IS Security 5 4 2002 438 457
    • (2002) ACM Transactions on IS Security , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.1    Loeb, M.2
  • 16
    • 78049416879 scopus 로고    scopus 로고
    • Siebel's ebusiness application and controls
    • K. Jansen Siebel's ebusiness application and controls Information Systems Control Journal 2 2002 43 50
    • (2002) Information Systems Control Journal , vol.2 , pp. 43-50
    • Jansen, K.1
  • 18
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Information & Management 41 2004 597 607
    • (2004) Information & Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 20
    • 58349117665 scopus 로고    scopus 로고
    • Using case based reasoning for the design of controls for Internet-based information systems
    • S. Lee, and K. Kim Using case based reasoning for the design of controls for Internet-based information systems Expert Systems With Applications 36 3 2009 5582 5591
    • (2009) Expert Systems with Applications , vol.36 , Issue.3 , pp. 5582-5591
    • Lee, S.1    Kim, K.2
  • 21
    • 10644254906 scopus 로고    scopus 로고
    • Efficiency analysis of controls in EDI applications
    • S. Lee, K. Lee, and I. Kang Efficiency analysis of controls in EDI applications Information & Management 42 3 2005 425 439
    • (2005) Information & Management , vol.42 , Issue.3 , pp. 425-439
    • Lee, S.1    Lee, K.2    Kang, I.3
  • 22
    • 23344453209 scopus 로고    scopus 로고
    • Investigating factors affecting the adoption of anti-spyware systems
    • Y. Lee, and K.A. Kozar Investigating factors affecting the adoption of anti-spyware systems Communication of the ACM 48 8 2005 72 78
    • (2005) Communication of the ACM , vol.48 , Issue.8 , pp. 72-78
    • Lee, Y.1    Kozar, K.A.2
  • 23
    • 0041050969 scopus 로고    scopus 로고
    • Measuring productivity of software projects: A data envelopment analysis approach
    • M.A. Mahmood, K.J. Pettingell, and A.I. Shaskevich Measuring productivity of software projects: a data envelopment analysis approach Decision Sciences 27 1 1996 57 80
    • (1996) Decision Sciences , vol.27 , Issue.1 , pp. 57-80
    • Mahmood, M.A.1    Pettingell, K.J.2    Shaskevich, A.I.3
  • 25
    • 0141855285 scopus 로고    scopus 로고
    • Decision tree classification of proteins identified by mass spectrometry of blood serum samples from people with and without lung cancer
    • M.K. Markey, G.D. Tourassi, and C.E. Floyd Decision tree classification of proteins identified by mass spectrometry of blood serum samples from people with and without lung cancer Proteomics 3 2003 1678 1679
    • (2003) Proteomics , vol.3 , pp. 1678-1679
    • Markey, M.K.1    Tourassi, G.D.2    Floyd, C.E.3
  • 26
    • 78049423762 scopus 로고    scopus 로고
    • Computer-assisted audit techniques: Value of data mining for corporate auditors
    • J. Ott, A. MacLeod, and K.M. Fan Computer-assisted audit techniques: value of data mining for corporate auditors Information Systems Control Journal 3 2008 45 48
    • (2008) Information Systems Control Journal , vol.3 , pp. 45-48
    • Ott, J.1    MacLeod, A.2    Fan, K.M.3
  • 27
    • 69849109894 scopus 로고    scopus 로고
    • Optimizing controls to test as part of a risk-based audit strategy
    • M. Pareek Optimizing controls to test as part of a risk-based audit strategy Information Systems Control Journal 2 2006 39 41
    • (2006) Information Systems Control Journal , vol.2 , pp. 39-41
    • Pareek, M.1
  • 30
    • 36148967741 scopus 로고    scopus 로고
    • Increasing the discriminatory power of DEA in the presence of the sample heterogeneity with cluster analysis and decision trees
    • S. Samoilenko, and K.-M. Osei-Bryson Increasing the discriminatory power of DEA in the presence of the sample heterogeneity with cluster analysis and decision trees Expert Systems with Applications 34 2 2008 1568 1581
    • (2008) Expert Systems with Applications , vol.34 , Issue.2 , pp. 1568-1581
    • Samoilenko, S.1    Osei-Bryson, K.-M.2
  • 31
    • 33750468638 scopus 로고    scopus 로고
    • A framework for benchmarking service process using data envelopment analysis and decision tree
    • H. Seol, J. Choi, G. Park, and Y. Park A framework for benchmarking service process using data envelopment analysis and decision tree Expert Systems with Applications 32 2 2007 432 440
    • (2007) Expert Systems with Applications , vol.32 , Issue.2 , pp. 432-440
    • Seol, H.1    Choi, J.2    Park, G.3    Park, Y.4
  • 33
    • 0036497748 scopus 로고    scopus 로고
    • Technical efficiency analysis of information technology investments: A two-stage empirical investigation
    • B.B.M. Shao, and W.T. Lin Technical efficiency analysis of information technology investments: a two-stage empirical investigation Information & Management 39 5 2002 391 401
    • (2002) Information & Management , vol.39 , Issue.5 , pp. 391-401
    • Shao, B.B.M.1    Lin, W.T.2
  • 34
    • 0346331362 scopus 로고    scopus 로고
    • Decision Tree based on data envelopment analysis for effective technology commercialization
    • S.Y. Sohn, and T.H. Moon Decision Tree based on data envelopment analysis for effective technology commercialization Expert Systems with Applications 26 2 2004 279 284
    • (2004) Expert Systems with Applications , vol.26 , Issue.2 , pp. 279-284
    • Sohn, S.Y.1    Moon, T.H.2
  • 37
    • 33644770285 scopus 로고    scopus 로고
    • Using DEA-neural network approach to evaluate branch efficiency of a large Canadian bank
    • D. Wu, Z. Yang, and L. Liang Using DEA-neural network approach to evaluate branch efficiency of a large Canadian bank Expert Systems with Applications 31 1 2006 108 115
    • (2006) Expert Systems with Applications , vol.31 , Issue.1 , pp. 108-115
    • Wu, D.1    Yang, Z.2    Liang, L.3
  • 38
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: A cross-industry study
    • Q.-J. Yeh, and A.J.-T. Chang Threats and countermeasures for information system security: a cross-industry study Information & Management 44 5 2007 480 491
    • (2007) Information & Management , vol.44 , Issue.5 , pp. 480-491
    • Yeh, Q.-J.1    Chang, A.J.-T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.