default search action
Gengzhong Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j27]Tian Bai, Gengzhong Feng, Meng Wu, Stuart X. Zhu:
A newsvendor model with multiple reference points: Target-setting for aspirational newsvendors. Eur. J. Oper. Res. 320(3): 655-669 (2025) - 2024
- [j26]Yan-Fang Ai, Jun Tian, Gengzhong Feng:
Pre-positioning and procurement strategy for relief supplies with the critical raw material participation. Comput. Ind. Eng. 187: 109780 (2024) - 2023
- [j25]Yunhao Liu, Gengzhong Feng, Yangyang Sun, Xiangyin Kong:
Jailbreaking in closed two-sided platforms. Inf. Manag. 60(8): 103859 (2023) - [j24]Jiawen Zhu, Gengzhong Feng, Huigang Liang, Kwok-Leung Tsui:
How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions. J. Assoc. Inf. Syst. 24(3): 5 (2023) - [j23]Zhu-Jun Wang, Yangyang Sun, Zhen-Song Chen, Gengzhong Feng, Qin Su:
Optimal versioning strategy of enterprise software considering the customer cost-acceptance level. Kybernetes 52(3): 997-1026 (2023) - [c3]Baozhen Zhan, Jin Li, Jiawen Zhu, Gengzhong Feng:
Will Security and Privacy Updates Affect Users' Privacy Choices of Mobile Apps. PACIS 2023: 209 - 2022
- [j22]Jiayun Wang, Stephen Shum, Gengzhong Feng:
Supplier's pricing strategy in the presence of consumer reviews. Eur. J. Oper. Res. 296(2): 570-586 (2022) - [j21]Qi Liu, Gengzhong Feng, Weibo Zheng, Jun Tian:
Managing data quality of cooperative information systems: Model and algorithm. Expert Syst. Appl. 189: 116074 (2022) - [j20]Jinpeng Xu, Yufei Huang, Emmanouil Avgerinos, Gengzhong Feng, Feng Chu:
Dual-channel competition: the role of quality improvement and price-matching. Int. J. Prod. Res. 60(12): 3705-3727 (2022) - [j19]Yangyang Sun, Chuangyin Dang, Gengzhong Feng:
SaaS or not: optimal versioning strategy of releasing enterprise software. Ind. Manag. Data Syst. 122(3): 592-621 (2022) - [j18]Yang Liu, Jun Tian, Gengzhong Feng:
Pre-positioning strategies for relief supplies in a relief supply chain. J. Oper. Res. Soc. 73(7): 1457-1473 (2022) - 2021
- [j17]Jizhou Lu, Gengzhong Feng, Stephen Shum, Kin Keung Lai:
On the value of information sharing in the presence of information errors. Eur. J. Oper. Res. 294(3): 1139-1152 (2021) - [j16]Yunhao Liu, Gengzhong Feng, Kwok-Leung Tsui, Shaolong Sun:
Forecasting influenza epidemics in Hong Kong using Google search queries data: A new integrated approach. Expert Syst. Appl. 185: 115604 (2021) - [j15]Yangyang Sun, Chuangyin Dang, Gengzhong Feng:
Optimal versioning strategies for software firms in the competitive environment. Int. J. Prod. Res. 59(22): 6881-6897 (2021) - [j14]Qi Liu, Gengzhong Feng, Giri Kumar Tayi, Jun Tian:
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach. Inf. Syst. Frontiers 23(2): 375-389 (2021) - [j13]Yong Wu, Giri Kumar Tayi, Gengzhong Feng, Richard Y. K. Fung:
Managing Information Security Outsourcing in a Dynamic Cooperation Environment. J. Assoc. Inf. Syst. 22(3): 2 (2021) - 2020
- [j12]Qi Liu, Gengzhong Feng, Xi Zhao, Wenlong Wang:
Minimizing the data quality problem of information systems: A process-based method. Decis. Support Syst. 137: 113381 (2020) - [j11]Yanxin Wang, Jian Li, Xi Zhao, Gengzhong Feng, Xin (Robert) Luo:
Using Mobile Phone Data for Emergency Management: a Systematic Literature Review. Inf. Syst. Frontiers 22(6): 1539-1559 (2020) - [j10]Xudong Cai, Shengli Li, Gengzhong Feng:
Evaluating the performance of government websites: An automatic assessment system based on the TFN-AHP methodology. J. Inf. Sci. 46(6) (2020) - [j9]Xiangyin Kong, Huihui Wang, Xi Chen, Gengzhong Feng:
Optimal policy for inventory systems with capacity commitment and fixed ordering costs. Oper. Res. Lett. 48(1): 9-17 (2020) - [i1]Shaolong Sun, Dongchuan Yang, Gengzhong Feng, Ju'e Guo:
AdaEnsemble Learning Approach for Metro Passenger Flow Forecasting. CoRR abs/2002.07575 (2020)
2010 – 2019
- 2019
- [j8]Zhongquan Hu, Jun Tian, Gengzhong Feng:
A relief supplies purchasing model based on a put option contract. Comput. Ind. Eng. 127: 253-262 (2019) - [j7]Yang Liu, Jun Tian, Gengzhong Feng, Zhongquan Hu:
A relief supplies purchasing model via option contracts. Comput. Ind. Eng. 137 (2019) - [j6]Gengzhong Feng, Jiawen Zhu, Nengmin Wang, Huigang Liang:
How Paternalistic Leadership Influences IT Security Policy Compliance: The Mediating Role of the Social Bond. J. Assoc. Inf. Syst. 20(11): 2 (2019) - [c2]Jiawen Zhu, Gengzhong Feng, Huigang Liang:
How Paternalistic Leaders Motivate Employees' Information Security Policy Compliance? Building Climate or Applying Sanctions. PACIS 2019: 42 - 2018
- [j5]Qi Liu, Gengzhong Feng, Nengmin Wang, Giri Kumar Tayi:
A multi-objective model for discovering high-quality knowledge based on data quality and prior knowledge. Inf. Syst. Frontiers 20(2): 401-416 (2018) - [j4]Yong Wu, Gengzhong Feng, Richard Y. K. Fung:
Comparison of information security decisions under different security and business environments. J. Oper. Res. Soc. 69(5): 747-761 (2018) - 2017
- [j3]Yong Wu, Richard Y. K. Fung, Gengzhong Feng, Nengmin Wang:
Decisions making in information security outsourcing: Impact of complementary and substitutable firms. Comput. Ind. Eng. 110: 1-12 (2017) - 2015
- [j2]Yong Wu, Gengzhong Feng, Nengmin Wang, Huigang Liang:
Game of information security investment: Impact of attack types and network vulnerability. Expert Syst. Appl. 42(15-16): 6132-6146 (2015) - 2012
- [j1]Jinpeng Xu, Wei Jiang, Gengzhong Feng, Jun Tian:
Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain. Eur. J. Oper. Res. 221(1): 213-221 (2012)
2000 – 2009
- 2006
- [c1]Yixue Li, Yu Xu, Gengzhong Feng, Wenqiang Dai:
On Loan-to-Value Ratios of Inventory Financing with Doubly Stochastic Poisson Default Processes. APSCC 2006: 663-666
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint