default search action
Shue Mei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Lei Yan, Yuxiang Zhang, Shue Mei, Weijun Zhong:
Personalized pricing with persuasive advertising and the value of consumer information: a duopoly framework. Electron. Commer. Res. 24(3): 1533-1562 (2024) - [j16]Xueyu Liu, Shue Mei, Weijun Zhong:
Video platforms' advertising and pricing decisions in the presence of derivative videos. Electron. Commer. Res. Appl. 65: 101405 (2024) - [j15]Mingyue Zhong, Yan Cheng, Shu-e Mei, Weijun Zhong:
Information Collection and Personalized Service Strategy of Monopoly under Consumer Misrepresentation. J. Theor. Appl. Electron. Commer. Res. 19(2): 1321-1336 (2024) - 2023
- [j14]Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao:
Managing consumer privacy risk: The effects of privacy breach insurance. Electron. Commer. Res. 23(2): 807-841 (2023) - [j13]Yuxiang Zhang, Weijun Zhong, Shu-e Mei:
Supply chain coordination by manufacturer reward contract. Oper. Res. Lett. 51(4): 432-438 (2023) - [c5]Fan Wu, Shue Mei, Haiying Xu:
Research on Urban Construction Waste Recycling Route Based on MATLAB. ICKII 2023: 604-607 - 2020
- [j12]Fenfen Jiang, Shue Mei, Weijun Zhong:
Impact of Customer's Social Value on Optimizing Referral Reward Programs. J. Organ. Comput. Electron. Commer. 30(3): 279-295 (2020) - [c4]Yuxiang Zhang, Weijun Zhong, Shu-e Mei:
Two Dimensional Targeted Coupon Strategy in Competition. EBIMCS 2020: 67-72 - [c3]Lijiang Bao, Weijun Zhong, Shu-e Mei:
Analysis of Advertising Strategy of Enterprises and Advertising Platforms under Clicking Fraud. EBIMCS 2020: 73-78
2010 – 2019
- 2019
- [j11]Chuanxi Cai, Shue Mei, Weijun Zhong:
Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems. Inf. Technol. Manag. 20(2): 55-71 (2019) - 2018
- [c2]Lei Yan, Shu-e Mei, Weijun Zhong:
The Effect of Consumer Anti-Advertising Behaviors to Media Platform Competition. EBIMCS 2018: 28-33 - 2015
- [j10]Xing Gao, Weijun Zhong, Shue Mei:
Security investment and information sharing under an alternative security breach probability function. Inf. Syst. Frontiers 17(2): 423-438 (2015) - [j9]Jiang Zhao, Shue Mei, Weijun Zhong:
Bidirectional Role of Accuracy and Recognition in Internet-Based Targeted Advertising. J. Electron. Commer. Organ. 13(1): 50-66 (2015) - 2014
- [j8]Xing Gao, Weijun Zhong, Shue Mei:
A game-theoretic analysis of information sharing and security investment for complementary firms. J. Oper. Res. Soc. 65(11): 1682-1691 (2014) - [c1]Shuting Zhu, Weijun Zhong, Shue Mei:
Value Creation through Inter-Organizational Systems (iOS): from Governance Process View. PACIS 2014: 304 - 2013
- [j7]Xing Gao, Weijun Zhong, Shue Mei:
Information Security Investment When Hackers Disseminate Knowledge. Decis. Anal. 10(4): 352-368 (2013) - [j6]Yanfang Zhang, Shue Mei, Weijun Zhong:
Should R&D risk always be preferable? Oper. Res. Lett. 41(2): 147-149 (2013) - [j5]Xing Gao, Weijun Zhong, Shue Mei:
A differential game approach to information security investment under hackers' knowledge dissemination. Oper. Res. Lett. 41(5): 421-425 (2013) - [j4]Xing Gao, Weijun Zhong, Shue Mei:
A game-theory approach to configuration of detection software with decision errors. Reliab. Eng. Syst. Saf. 119: 35-43 (2013) - 2012
- [j3]Jianqiang Zhang, Weijun Zhong, Shue Mei:
Competitive Effects of Purchase-Based Targeted Advertising. J. Electron. Commer. Organ. 10(4): 71-84 (2012) - [j2]Xing Gao, Weijun Zhong, Shue Mei:
Equilibrium stability of a nonlinear heterogeneous duopoly game with extrapolative foresight. Math. Comput. Simul. 82(11): 2069-2078 (2012) - [j1]Xing Gao, Weijun Zhong, Shue Mei:
On local stability of Cournot models with simultaneous and sequential decisions. Math. Soc. Sci. 63(3): 207-212 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint