Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Library and Information Science

A Framework For Personalized Dynamic Cross-Selling In E-Commerce Retailing, Arun K. Timalsina Jan 2012

A Framework For Personalized Dynamic Cross-Selling In E-Commerce Retailing, Arun K. Timalsina

Wayne State University Dissertations

Cross-selling and product bundling are prevalent strategies in the retail sector. Instead of static bundling offers, i.e. giving the same offer to everyone, personalized dynamic cross-selling generates targeted bundle offers and can help maximize revenues and profits. In resolving the two basic problems of dynamic cross-selling, which involves selecting the right complementary products and optimizing the discount, the issue of computational complexity becomes central as the customer base and length of the product list grows. Traditional recommender systems are built upon simple collaborative filtering techniques, which exploit the informational cues gained from users in the form of product ratings and …


Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen Jan 2012

Ensuring The Effectiveness Of Information Security Policy : The Development And Validation Of An Information Security Policy Model, Vivid Vicki Chen

Legacy Theses & Dissertations (2009 - 2024)

The purpose of this dissertation is to develop and test a conceptual model of an Information Security Policy (ISP) and to measure the benefits that accrue to organizations that implement and deploy such policies. As a result of rapid changes in technology, the importance of computer Information Security Policy (ISP) has increased dramatically. In recent decades, governments and private enterprises have increasingly come to store ever greater amounts of information on computers and on networks. Unfortunately, storing information in this manner not only makes firms engaged in cutting-edge technology vulnerable to hackers, but may also jeopardize customer / employee relations, …