Research Fronts and Prevailing Applications in Data Envelopment Analysis
Research activities relating to data envelopment analysis (DEA) have grown at a fast rate recently. Exactly what activities have been carrying the research momentum forward is a question of particular interest to the research community. This study finds these research activities, or research fronts, as well as some facts on applications in DEA. A research front refers to a coherent topic or issue addressed by a group of research articles in recent years. The large amount of DEA literature makes it difficult to use any traditional qualitative methodology to sort out the matter. Thus, this study applies a network clustering method to group the literature through a citation network established from the DEA literature over the period 2000–2014. The keywords of the articles in each discovered group help pinpoint its research focus. The four research fronts identified are “bootstrapping and two-stage analysis”, “undesirable factors”, “cross-efficiency and ranking”, and “network DEA, dynamic DEA, and SBM”. Each research front is then examined with key-route main path analysis to uncover the elements in its core. In the end, we present the prevailing DEA applications and the observed association between DEA methodologies and applications.
KeywordsData envelopment analysis Research front Literature survey Main path analysis
The authors would like to express their gratitude Professor Joe Zhu for providing guidance and critiques in several aspect of this research project. Our gratitude extends to several reviewers for their constructive comments, which have greatly improved the accuracy and readability of this article. This work is partially supported by Taiwan’s Ministry of Science and Technology grant NSC 102-2410-H-011-008-MY3, NSC 102-2410-H-155-021-MY3, and NSC 102-2632-H-155-001-MY3.
Part of this chapter is based upon “John S. Liu, Louis Y.Y. Lu, and Wen-Min Lu, “Research fronts in data envelopment analysis”, OMEGA, Vol. 51, (2016), 33–45.”, with permission from Elsevier.
- Batagelj V, Mrvar A (1998) Pajek-program for large network analysis. Connections 21:47–57Google Scholar
- Chen Y-B, Liu JS, Lin P (2013a) Recent trend in graphene for optoelectronics. J Nanopart Res 15:1–14Google Scholar
- Cook W, Zhu J (2013) DEA Cobb-Douglas frontier and cross-efficiency. J Oper Res Soc 65:265–268Google Scholar
- Cook WD, Zhu J (2015) DEA cross efficiency. In: Zhu Joe (ed) Data envelopment analysis: a handbook of models and methods. Springer USGoogle Scholar
- Csardi G, Nepusz T (2006) The igraph software package for complex network research. InterJournal, Complex Systems 1695Google Scholar
- Doyle J, Green R (1994) Efficiency and cross-efficiency in DEA: derivations, meanings and uses. J Oper Res Soc 567–578Google Scholar
- Gattoufi S, Oral M, Kumar A, Reisman A (2004a) Epistemology of data envelopment analysis and comparison with other fields of OR/MS for relevance to applications. Socioecon Plann Sci 38:123–140Google Scholar
- Hosseinzadeh Lotfi F, Jahanshahloo GR, Khodabakhshi M, Rostamy-Malkhlifeh M, Moghaddas Z, Vaez-Ghasemi M (2013) A review of ranking models in data envelopment analysis. J Appl Math 2013Google Scholar
- Hung S-C, Liu JS, Lu LY, Tseng Y-C (2014) Technological change in lithium iron phosphate battery: the key-route main path analysis. Scientometrics 1–24Google Scholar
- Kao C (2014b) Network data envelopment analysis: a review. Eur J Oper Res 239:1–16Google Scholar
- Seiford LM, Zhu J (1999a) Infeasibility of super-efficiency data envelopment analysis models. INFOR 37:174–187Google Scholar
- Sexton TR, Silkman RH, Hogan AJ (1986) Data envelopment analysis: critique and extensions. In: Silkman Richard H (ed) Measuring efficiency: an assessment of data envelopment analysis. Jossey-Bass, San Francisco, pp 73–105Google Scholar
- Sherman HD, Zhu J (2013) Analyzing performance in service organizations. Sloan Manage Rev 54:36–42Google Scholar