Within the last year
Within the past 3 years
1 - 8 of 8 articles
Many service firms are pursuing electronic distribution strategies to augment existing physical infrastructure for product and service delivery. But little systematic study has been made for whether and how characteristics or behaviors might differ between customers who use electronic delivery...
Economic forces shape the behavior of individuals and institutions. Forces affecting individual behavior are attitudes about payoffs (gains and losses) and beliefs about outcomes (risk and ambiguity). Under risk, the likelihoods of alternative outcomes are fully known. Under ambiguity, these...
Over the past fifteen years, a number of studies have examined the determinants of firm R&D spending. These studies, however, almost invariably focus on the role of firm or external ownership characteristics in predicting R&D spending while overlooking the attributes of the top managers involved...
A two-person game is formulated for a queuing situation involving a pair of exponential servers competing for arriving customers. The servers have identical characteristics except for their service rates. Each server is free to select its own service rate. The objective of each server is to...
This paper presents a context-dependent theory of decision under risk. The relevant contextual factor is the presence of a riskless lottery in a preference comparison. The theory only deviates from expected utility if the set of options contains both riskless and risky lotteries. The main...
This paper investigates the impacts of a secondary market where resellers can buy and sell excess inventories. We develop a two-period model with a single manufacturer and many resellers. At the beginning of the first period resellers order and receive products from the manufacturer, but at the...
Rising levels of advertising competition have made it increasingly difficult to attract and hold consumers' attention and to establish strong memory traces for the advertised brand. A common communication strategy to break through this competitive clutter is to increase ad originality. However,...
A practical model and an associated method are developed for providing consistent, deterministically correct responses to ad-hoc queries to a database containing a field of binary confidential data. COUNT queries, i.e., the number of selected subjects whose confidential datum is positive, are to...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.