Content
December 2022, Volume 24, Issue 6
- 1865-1886 Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?
by Jeewon Cho & Insu Park - 1887-1904 The Dark Side of Mobile Learning via Social Media: How Bad Can It Get?
by Xiu-Kin Loh & Voon-Hsien Lee & Xiu-Ming Loh & Garry Wei-Han Tan & Keng-Boon Ooi & Yogesh K. Dwivedi - 1905-1928 The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries
by Xiong Zhang & Xin Zhang & Xuechen Luo & Wei T. Yue - 1929-1948 Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment
by A. F. Salam & Hua Dai & Lei Wang - 1949-1969 Multi-level Team Assignment in Social Business Processes: An Algorithm and Simulation Study
by Rong Liu & Akhil Kumar & Juhnyoung Lee - 1971-1988 Understanding the Order Effect of Online Reviews: A Text Mining Perspective
by Sambit Tripathi & Amit V. Deokar & Haya Ajjan - 1989-2006 iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation
by Kane J. Smith & Gurpreet Dhillon & Brigid A. Otoo - 2007-2025 The Engagement of Complementors and the Role of Platform Boundary Resources in e-Commerce Platform Ecosystems
by Martin Engert & Julia Evers & Andreas Hein & Helmut Krcmar - 2027-2051 A Techno-Business Platform to Improve Customer Experience Following the Brand Crisis Recovery: A B2B Perspective
by Rajat Kumar Behera & Pradip Kumar Bala & Nripendra P. Rana & Hatice Kizgin - 2053-2076 Organizational Structure for the IT Department: Profit Center or Cost Center?
by Joseph Vithayathil & Vidyanand Choudhary - 2077-2097 Disaster Management Knowledge Analysis Framework Validated
by Dedi I. Inan & Ghassan Beydoun & Biswajeet Pradhan - 2099-2122 Antecedents to the Adoption of Mobile Payment in China and Italy: an Integration of UTAUT2 and Innovation Resistance Theory
by Giacomo Migliore & Ralf Wagner & Felipe Schneider Cechella & Francisco Liébana-Cabanillas - 2123-2138 The Co-construct/ Co-evolving Process between Organization’s Absorptive Capacity and Enterprise System Practice under Changing Context: The Case of ERP Practice
by Kai Wu & Ghassan Beydoun & Osama Sohaib & Asif Gill - 2139-2158 Smart Tourism Technologies’ Ambidexterity: Balancing Tourist’s Worries and Novelty Seeking for Travel Satisfaction
by Jahyun Goo & C. Derrick Huang & Chul Woo Yoo & Chulmo Koo
October 2022, Volume 24, Issue 5
- 1-18 Operational Performance Evaluation of E-government Microblogs Under Emergencies Based on a DEA Method
by Qingqi Long & Ke Song - 1393-1394 Introducing the Special Topic on “Mitigating Cyber Threats and Defense in Data Intensive Smart Cities”
by Kim-Kwang Raymond Choo & Deepak Puthal & Charles Zhechao Liu & Chonggang Wang - 1395-1416 An Examination of Gain- and Loss-Framed Messaging on Smart Home Security Training Programs
by Miloslava Plachkinova & Philip Menard - 1417-1434 Assessing Privacy and Security of Information Systems from Audit Data
by J. Christopher Westland - 1435-1450 The Optimal Configuration of IT-Enabled Dynamic Capabilities in a firm’s Capabilities Portfolio: a Strategic Alignment Perspective
by Siddharth Gaurav Majhi & Ambuj Anand & Arindam Mukherjee & Nripendra P. Rana - 1451-1463 Using the Anchoring Effect and the Cultural Dimensions Theory to Study Customers’ Online Rating Behaviors
by Qian Wang & Michael Chau & Chih-Hung Peng & Eric W. T. Ngai - 1465-1481 Questioning Racial and Gender Bias in AI-based Recommendations: Do Espoused National Cultural Values Matter?
by Manjul Gupta & Carlos M. Parra & Denis Dennehy - 1483-1496 Sustaining Patient Portal Continuous Use Intention and Enhancing Deep Structure Usage: Cognitive Dissonance Effects of Health Professional Encouragement and Security Concerns
by Murad Moqbel & Barbara Hewitt & Fiona Fui-Hoon Nah & Rosann M. McLean - 1497-1513 Information Privacy Assimilation in IT Organizations
by V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran - 1515-1528 Cashless Japan: Unlocking Influential Risk on Mobile Payment Service
by Wei-Lun Chang & Li-Ming Chen & Takako Hashimoto - 1547-1562 Predicting Blood Donors Using Machine Learning Techniques
by Christian Kauten & Ashish Gupta & Xiao Qin & Glenn Richey - 1563-1575 A System to Access Online Services with Minimal Personal Information Disclosure
by Antonia Russo & Gianluca Lax & Baptiste Dromard & Menad Mezred - 1577-1584 On Group Ownership Delegate Protocol for RFID Systems
by Yu-Ju Tu & Gaurav Kapoor & Selwyn Piramuthu - 1585-1599 Examining Client-Vendor Relationship in the Outsourcing of a Work Environment Virtualisation: An Activity Theory Perspective
by John Effah & Ibrahim Osman Adam - 1601-1634 On the Popularity of Internet of Things Projects in Online Communities
by Taher Ahmed Ghaleb & Daniel Alencar da Costa & Ying Zou - 1635-1646 A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter
by Irina Wedel & Michael Palk & Stefan Voß - 1647-1665 A Conceptualisation of Crowd Knowledge
by Till Blesik & Markus Bick & Tyge-F. Kummer - 1667-1688 A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level
by Yang Zhao & Yixuan Li & Ning Wang & Ruoxin Zhou & Xin (Robert) Luo - 1689-1707 Ontology-Based Approach for the Measurement of Privacy Disclosure
by Nafei Zhu & Baocun Chen & Siyu Wang & Da Teng & Jingsha He - 1709-1734 Artificial Intelligence and Business Value: a Literature Review
by Ida Merete Enholm & Emmanouil Papagiannidis & Patrick Mikalef & John Krogstie - 1735-1751 Identifying Structural Holes for Sentiment Classification
by Zheng Xie & Guannan Liu & Jinming Qu & Junjie Wu & Hong Li
August 2022, Volume 24, Issue 4
- 1055-1060 Innovative Technologies and Small-Medium Sized Enterprises in Times of Crisis
by Nisreen Ameen & Jyoti Choudrie & Paul Jones & Amitabh Anand - 1061-1079 Let’s Connect to Keep the Distance: How SMEs Leverage Information and Communication Technologies to Address the COVID-19 Crisis
by Charlotte Wendt & Martin Adam & Alexander Benlian & Sascha Kraus - 1081-1105 Technological Innovation, Sustainable Green Practices and SMEs Sustainable Performance in Times of Crisis (COVID-19 pandemic)
by Mansour Naser Alraja & Rabia Imran & Basel M. Khashab & Mahmood Shah - 1107-1123 Disruptive Technologies for Achieving Supply Chain Resilience in COVID-19 Era: An Implementation Case Study of Satellite Imagery and Blockchain Technologies in Fish Supply Chain
by Tuhin Sengupta & Gopalakrishnan Narayanamurthy & Roger Moser & Vijay Pereira & Devleena Bhattacharjee - 1125-1143 Blockchain for SME Clusters: An Ideation using the Framework of Ostrom Commons Governance
by Geetika Jain & Archana Shrivastava & Justin Paul & Ronak Batra - 1145-1166 Using Business Analytics for SME Business Model Transformation under Pandemic Time Pressure
by Efpraxia D. Zamani & Anastasia Griva & Kieran Conboy - 1167-1187 The Source of SMEs’ Competitive Performance in COVID-19: Matching Big Data Analytics Capability to Business Models
by Jianmin Song & Senmao Xia & Demetris Vrontis & Arun Sukumar & Bing Liao & Qi Li & Kun Tian & Nengzhi Yao - 1189-1208 Bringing Smart Home Technology to Peer-to-Peer Accommodation: Exploring the Drivers of Intention to Stay in Smart Accommodation
by Savvas Papagiannidis & Dinara Davlembayeva - 1209-1221 The Interplay of E-commerce, Resilience and Exports in the Context of COVID-19
by Adah-Kole Emmanuel Onjewu & Sundas Hussain & Mohamed Yacine Haddoud - 1223-1247 Artificial Intelligence and Reduced SMEs’ Business Risks. A Dynamic Capabilities Analysis During the COVID-19 Pandemic
by Nick Drydakis - 1249-1264 Design of an Intelligent Patient Decision aid Based on Individual Decision-Making Styles and Information Need Preferences
by Sergey Motorny & Surendra Sarnikar & Cherie Noteboom - 1265-1285 Cross-Category Defect Discovery from Online Reviews: Supplementing Sentiment with Category-Specific Semantics
by Nohel Zaman & David M. Goldberg & Richard J. Gruss & Alan S. Abrahams & Siriporn Srisawas & Peter Ractham & Michelle M.H. Şeref - 1287-1303 The Interplay Between Investor Activity on Virtual Investment Community and the Trading Dynamics: Evidence From the Bitcoin Market
by Peng Xie - 1305-1329 Mobile Broadband for Inclusive Connectivity: What Deters the High-Capacity Deployment of 4G-LTE Innovation in India?
by Ashutosh Jha & Debashis Saha - 1331-1354 The Role of Online Misinformation and Fake News in Ideological Polarization: Barriers, Catalysts, and Implications
by Cheuk Hang Au & Kevin K. W. Ho & Dickson K.W. Chiu - 1355-1375 Bridging the Digital Divide in Ethnic Minority Older Adults: an Organisational Qualitative Study
by Jyoti Choudrie & Efpraxia Zamani & Chike Obuekwe - 1377-1377 Correction to: Bridging the Digital Divide in Ethnic Minority Older Adults: an Organisational Qualitative Study
by Jyoti Choudrie & Efpraxia Zamani & Chikelue Chike-Obuekwe - 1379-1392 3D Printing Technology and the Market Value of the Firm
by David M. Goldberg & Jason K. Deane & Terry R. Rakes & Loren Paul Rees
June 2022, Volume 24, Issue 3
- 691-697 Designing and Managing Human-AI Interactions
by Babak Abedin & Christian Meske & Iris Junglas & Fethi Rabhi & Hamid R. Motahari-Nezhad - 699-730 Understanding the Design Elements Affecting User Acceptance of Intelligent Agents: Past, Present and Future
by Edona Elshan & Naim Zierau & Christian Engel & Andreas Janson & Jan Marco Leimeister - 731-744 Organizational Learning for Intelligence Amplification Adoption: Lessons from a Clinical Decision Support System Adoption Project
by Fons Wijnhoven - 745-770 Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution
by Stefan Stieglitz & Milad Mirbabaie & Nicholas R. J. Möllmann & Jannik Rzyski - 771-796 Design and Evaluation of a Conversational Agent for Facilitating Idea Generation in Organizational Innovation Processes
by Mathis Poser & Gerrit C. Küstermann & Navid Tavanapour & Eva A. C. Bittner - 797-838 “Don’t Neglect the User!” – Identifying Types of Human-Chatbot Interactions and their Associated Characteristics
by Thai Ha Nguyen & Lena Waizenegger & Angsana A. Techatassanasoontorn - 839-856 Voice Assistant vs. Chatbot – Examining the Fit Between Conversational Agents’ Interaction Modalities and Information Search Tasks
by Christine Rzepka & Benedikt Berger & Thomas Hess - 857-875 AI Decision Making with Dignity? Contrasting Workers’ Justice Perceptions of Human and AI Decision Making in a Human Resource Management Context
by Sarah Bankins & Paul Formosa & Yannick Griep & Deborah Richards - 877-895 Designing Transparency for Effective Human-AI Collaboration
by Michael Vössing & Niklas Kühl & Matteo Lind & Gerhard Satzger - 897-922 Paradoxical Tensions Related to AI-Powered Evaluation Systems in Competitive Sports
by Elena Mazurova & Willem Standaert & Esko Penttinen & Felix Ter Chian Tan - 923-943 Designing Personality-Adaptive Conversational Agents for Mental Health Care
by Rangina Ahmad & Dominik Siemon & Ulrich Gnewuch & Susanne Robra-Bissantz - 945-964 Assessing Consumers’ Co‐production and Future Participation On Value Co‐creation and Business Benefit: an F-P-C-B Model Perspective
by Sheshadri Chatterjee & Nripendra P. Rana & Yogesh K. Dwivedi - 965-982 Risk Taking Behaviors Using Public Wi-Fi™
by Hoon S. Choi & Darrell Carpenter & Myung S. Ko - 983-1007 Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision
by Ming Yang & Jinglu Jiang & Melody Kiang & Fangyun Yuan - 1009-1026 The Impact of IoT Smart Home Services on Psychological Well-Being
by Helder Sequeiros & Tiago Oliveira & Manoj A. Thomas - 1027-1039 E-Government and Entrepreneurship: Online Government Services and the Ease of Starting Business
by Amit Das & Shobha S. Das - 1041-1054 Exploring a Convergence Technique on Ideation Artifacts in Crowdsourcing
by Gert-Jan Vreede & Robert O. Briggs & Triparna Vreede
April 2022, Volume 24, Issue 2
- 371-373 Editorial: Special Issue on “Bright ICT: Security, Privacy and Risk Issues”
by Emmanuel W. Ayaburi & Francis Kofi Andoh-Baidoo & Yogesh K. Dwivedi & Banita Lal - 375-375 Correction to: Editorial: Special Issue on “Bright ICT: Security, Privacy and Risk Issues”
by Emmanuel W. Ayaburi & Francis Kofi Andoh‑Baidoo & Yogesh K. Dwivedi & Banita Lal - 377-391 Building Consumers’ Trust in Electronic Retail Platforms in the Sub-Saharan Context: an exploratory study on Drivers and Impact on Continuance Intention
by Kayode Odusanya & Olu Aluko & Banita Lal - 393-414 Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework
by Elvira Ismagilova & Laurie Hughes & Nripendra P. Rana & Yogesh K. Dwivedi - 415-440 The Role of ICT Laws and National Culture in Determining ICT Diffusion and Well-Being: A Cross-Country Examination
by Anupriya Khan & Satish Krishnan & Jithesh Arayankalam - 441-457 Digital Platforms of Work and the Crafting of Career Path: The Crowdworkers’ Perspective
by Ayomikun Idowu & Amany Elbanna - 459-474 Attention-Based LSTM Network for Rumor Veracity Estimation of Tweets
by Jyoti Prakash Singh & Abhinav Kumar & Nripendra P. Rana & Yogesh K. Dwivedi - 475-491 How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?
by Martin Offei & Francis Kofi Andoh-Baidoo & Emmanuel W. Ayaburi & David Asamoah - 493-516 Factors Affecting Customer Analytics: Evidence from Three Retail Cases
by Anastasia Griva & Cleopatra Bardaki & Katerina Pramatari & Georgios Doukidis - 517-535 How the Structures Provided by Social Media Enable Collaborative Outcomes: A Study of Service Co-creation in Nonprofits
by Fatuma Namisango & Kyeong Kang & Ghassan Beydoun - 537-548 Deepen electronic health record diffusion beyond breadth: game changers and decision drivers
by Xuan Wang & Jun Sun & Ying Wang & Yi Liu - 549-562 Understanding the Impact of Intellectual Capital on E-Business Entrepreneurial Orientation and Competitive Agility: An Empirical Study
by Khaled Saleh Al-Omoush - 563-578 Blockchain-Based Agile Supply Chain Framework with IoT
by Xiang Ning Zhu & Gabrielle Peko & David Sundaram & Selwyn Piramuthu - 579-594 Personality Antecedents and Consequences of Internet Addiction Vis-à-vis Internet Habit: a Theory and an Empirical Investigation
by Jungwon Kuem & Soumya Ray - 595-617 Assessment of Complexity in Cloud Computing Adoption: a Case Study of Local Governments in Australia
by Omar Ali & Anup Shrestha & Maryam Ghasemaghaei & Ghassan Beydoun - 619-635 Systematic Literature Review of E-Learning Capabilities to Enhance Organizational Learning
by Michail N. Giannakos & Patrick Mikalef & Ilias O. Pappas - 637-658 Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios
by Jeffrey D. Wall & Prashant Palvia & John D’Arcy - 659-676 On the Impact of Aesthetic Defects on the Maintainability of Mobile Graphical User Interfaces: An Empirical Study
by Makram Soui & Mabrouka Chouchane & Narjes Bessghaier & Mohamed Wiem Mkaouer & Marouane Kessentini - 677-690 Value Gains in Business Process Outsourcing: The Vendor Perspective
by Sukruth Suresh & T. Ravichandran
February 2022, Volume 24, Issue 1
- 1-10 Advances on Data Management and Information Systems
by Jérôme Darmont & Boris Novikov & Robert Wrembel & Ladjel Bellatreche - 11-29 Speeding Up Reachability Queries in Public Transport Networks Using Graph Partitioning
by Bezaye Tesfaye & Nikolaus Augsten & Mateusz Pawlik & Michael H. Böhlen & Christian S. Jensen - 31-48 Enhancing Cubes with Models to Describe Multidimensional Data
by Matteo Francia & Patrick Marcel & Verónika Peralta & Stefano Rizzi - 49-75 Coalitional Strategies for Efficient Individual Prediction Explanation
by Gabriel Ferrettini & Elodie Escriva & Julien Aligon & Jean-Baptiste Excoffier & Chantal Soulé-Dupuy - 77-96 Indian Travellers’ Adoption of Airbnb Platform
by Kuttimani Tamilmani & Nripendra P. Rana & Robin Nunkoo & Vishnupriya Raghavan & Yogesh K. Dwivedi - 97-119 Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet
by Efpraxia D. Zamani & Nancy Pouloudi & George M. Giaglis & Jonathan Wareham - 121-131 Impact of Provider Prior Use of HIE on System Complexity, Performance, Patient Care, Quality and System Concerns
by Sue S. Feldman & Neset Hikmet & Shikha Modi & Benjamin Schooley - 133-147 Discovering Primary Medical Procedures and their Associations with Other Procedures in HCUP Data
by Mamoun T. Mardini & Zbigniew W. Raś - 149-176 Usage Continuance in Software-as-a-Service
by Elias Baumann & Jana Kern & Stefan Lessmann - 177-194 A Deeper Look at Cloud Adoption Trajectory and Dilemma
by Pei-Fang Hsu - 195-210 Context Modeling for the Adaption of Mobile Business Processes – An Empirical Usability Evaluation
by Julian Dörndorfer & Christian Seel - 211-231 An Investigation of Peripheral and Central Cues of Online Customer Review Voting and Helpfulness through the Lens of Elaboration Likelihood Model
by Mohammadreza Mousavizadeh & Mehrdad Koohikamali & Mohammad Salehan & Dam J. Kim - 233-245 Recovering Troubled IT Projects: The Roles of Transformational Leadership and Project Complexity
by Hui Lei & Xiang Fang & T. M. Rajkumar & Clyde Holsapple - 247-266 Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective
by Lin Jia & Xiuwei Song & Dianne Hall - 267-286 Something’s Missing? A Procedure for Extending Item Content Data Sets in the Context of Recommender Systems
by Bernd Heinrich & Marcus Hopf & Daniel Lohninger & Alexander Schiller & Michael Szubartowicz - 287-304 Using Flow Tools to Enact Control in Software Development Projects: A Cross-case Analysis
by Alex Estevam & Denis Dennehy & Kieran Conboy - 305-327 Integrated Declarative Process and Decision Discovery of the Emergency Care Process
by Steven Mertens & Frederik Gailly & Diederik Sassenbroeck & Geert Poels - 329-347 An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework
by Amita Goyal Chin & Mark A. Harris & Robert Brookshire - 349-369 Analyzing the Quality of Twitter Data Streams
by Franco Arolfo & Kevin Cortés Rodriguez & Alejandro Vaisman
December 2021, Volume 23, Issue 6
- 1363-1367 Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19
by Victor Chang & Carole Goble & Muthu Ramachandran & Lazarus Jegatha Deborah & Reinhold Behringer - 1369-1383 COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking
by R. Elakkiya & Pandi Vijayakumar & Marimuthu Karuppiah - 1385-1401 A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients
by Prabh Deep Singh & Rajbir Kaur & Kiran Deep Singh & Gaurav Dhiman - 1403-1415 FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia
by Longling Zhang & Bochen Shen & Ahmed Barnawi & Shan Xi & Neeraj Kumar & Yi Wu - 1417-1429 A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets
by Harleen Kaur & Shafqat Ul Ahsaan & Bhavya Alankar & Victor Chang - 1431-1465 Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study
by Jyoti Choudrie & Shruti Patil & Ketan Kotecha & Nikhil Matta & Ilias Pappas - 1467-1497 The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic
by Francesco Piccialli & Vincenzo Schiano Cola & Fabio Giampaolo & Salvatore Cuomo - 1499-1520 Social Commerce in Emerging Markets and its Impact on Online Community Engagement
by Raed S. Algharabat & Nripendra P. Rana - 1521-1536 New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis
by Neeru Malhotra & Sunil Sahadev & P. S. H. Leeflang & Keyoor Purani - 1537-1562 Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study
by Grace Fox & Tabitha L. James - 1563-1572 Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia
by Daniel Chandran & Abdullah M. Alammari - 1573-1591 When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology
by Cancan Wang & Rony Medaglia & Tina Blegind Jensen - 1593-1607 Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships
by Ashish Kumar Jha & Indranil Bose - 1609-1620 Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits
by Kjell Hausken & Jonathan W. Welburn - 1621-1642 Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS
by Steven D. Silver
September 2021, Volume 23, Issue 5
- 1077-1081 Information Technology in Disaster Risk Reduction
by Yuko Murayama & Hans Jochen Scholl & Dimiter Velev - 1083-1096 PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation
by Eileen Young & Benigno Aguirre - 1097-1113 Digital Nudging in Social Media Disaster Communication
by Milad Mirbabaie & Christian Ehnis & Stefan Stieglitz & Deborah Bunker & Tanja Rose - 1115-1125 Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation
by Osamu Uchida & Sachi Tajima & Yoshitaka Kajita & Keisuke Utsu & Yuji Murakami & Sanetoshi Yamada - 1127-1144 A Methodology for Automatic Acquisition of Flood‐event Management Information From Social Media: the Flood in Messinia, South Greece, 2016
by Stathis G. Arapostathis - 1145-1168 A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters
by Shalak Mendon & Pankaj Dutta & Abhishek Behl & Stefan Lessmann - 1169-1188 Learning Automata-based Misinformation Mitigation via Hawkes Processes
by Ahmed Abouzeid & Ole-Christoffer Granmo & Christian Webersik & Morten Goodwin - 1189-1202 Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation
by Tullio Tanzi & Matteo Bertolino - 1203-1211 Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction
by Jun Sasaki & Makoto Kitsuya - 1213-1225 Universal Design of ICT for Emergency Management from Stakeholders’ Perspective
by Terje Gjøsæter & Jaziar Radianti & Weiqin Chen - 1227-1243 Interactive Topic Search System Based on Topic Cluster Technology
by Lin-Chih Chen - 1245-1271 Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic
by Ameni Hbaieb & Mahdi Khemakhem & Maher Ben Jemaa - 1273-1286 Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study
by Patrick Mikalef & Kshitij Sharma & Ilias O. Pappas & Michail Giannakos - 1287-1301 Online Review Consistency Matters: An Elaboration Likelihood Model Perspective
by Navid Aghakhani & Onook Oh & Dawn G. Gregg & Jahangir Karimi - 1303-1316 Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter
by Eleanna Kafeza & Christos Makris & Gerasimos Rompolas & Feras Al-Obeidat - 1317-1337 Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis
by Mohammad Soltani Delgosha & Tahereh Saheb & Nastaran Hajiheydari - 1339-1339 Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis
by Mohammad Soltani Delgosha & Tahereh Saheb & Nastaran Hajiheydari - 1341-1361 What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the “Digital Service Usage Satisfaction Model”
by Arpan Kumar Kar
August 2021, Volume 23, Issue 4
- 807-810 Advances in Secure Knowledge Management in the Artificial Intelligence Era
by Sanjay K. Sahay & Nihita Goel & Murtuza Jadliwala & Shambhu Upadhyaya - 811-833 Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models
by R.K. Shyamasundar & Pratiksha Chaudhary & Arushi Jaiswal & Aniket Kuiri - 835-848 Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
by Trupil Limbasiya & Sanjay Kumar Sahay & Bharath Sridharan - 849-866 A Formal Specification of Access Control in Android with URI Permissions
by Samir Talegaon & Ram Krishnan - 867-882 Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
by Hemant Rathore & Sanjay K. Sahay & Piyush Nikam & Mohit Sewak - 883-896 Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
by Md. Farhan Haque & Ram Krishnan - 897-913 Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
by Rudra P. Baksi & Shambhu J. Upadhyaya - 915-930 UnderTracker: Generating Robust Binaries Using Execution Flow Traces
by Rajesh Kumar Shrivastava & Chittaranjan Hota - 931-939 An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises
by Thi Tran & Rohit Valecha & Paul Rad & H. Raghav Rao - 941-961 Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage
by Abhipsa Pal & Tejaswini Herath & Rahul De’ & H. Raghav Rao - 963-986 Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending?
by Qun Chen & Ji-Wen Li & Jian-Guo Liu & Jing-Ti Han & Yun Shi & Xun-Hua Guo - 987-1005 Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2
by Kuttimani Tamilmani & Nripendra P. Rana & Yogesh K. Dwivedi - 1007-1021 Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union
by Anca Elena-Bucea & Frederico Cruz-Jesus & Tiago Oliveira & Pedro Simões Coelho - 1023-1037 Predicting Sports Injuries with Wearable Technology and Data Analysis
by Amir Zadeh & David Taylor & Margaret Bertsos & Timothy Tillman & Nasim Nosoudi & Scott Bruce - 1039-1056 An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm)
by Abhishek Majumdar & Tapas Debnath & Arpita Biswas & Sandeep K. Sood & Krishna Lal Baishnab - 1057-1076 Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations
by M Vimalkumar & Jang Bahadur Singh & Sujeet Kumar Sharma
June 2021, Volume 23, Issue 3
- 515-530 An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM
by Zhen Zhao & Zongmin Ma & Li Yan - 531-542 Cross-visiting Behaviour of Online Consumers Across Retailers’ and Comparison Sites, a Macro-Study
by Sahar Karimi - 543-559 Investigating the Success of OGB in China: The Influence of Personality Traits
by Mohammad Alamgir Hossain & Shams Rahman - 561-573 Interactions between Analysts in Developing Collaborative Conceptual Models
by Palash Bera - 575-595 An Architecture Framework Approach for Complex Transport Projects
by Farid Shirvani & Ghassan Beydoun & Pascal Perez & William Scott & Peter Campbell - 597-597 Correction to: An Architecture Framework Approach for Complex Transport Projects
by Farid Shirvani & Ghassan Beydoun & Pascal Perez & William Scott & Peter Campbell - 599-605 Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices’ Workflow
by Kim Fecher & Lauren McCarthy & Daniel E. Porreca & Niam Yaraghi - 607-626 Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context
by Mengyue Wang & Xin Li & Patrick Y. K. Chau - 627-647 Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process
by Mahesh Balan U & Saji K. Mathew - 649-661 Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance
by Hung-Pin Shih & Pei-Chen Sung - 663-680 From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs
by Federico Iannacci & Colm Fearon & Kristine Pole - 681-694 Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing
by Yen-Chun Chou & Benjamin B. M. Shao - 695-707 Vector Gravitation Clustering Networks
by Zong-chang Yang - 709-722 Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters
by Adarsh Anand & Navneet Bhatt & Omar H. Alhazmi - 723-751 Reddit: Affordances as an Enabler for Shifting Loyalties
by Naveena Prakasam & Louisa Huxtable-Thomas - 753-772 OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs
by Amit V. Deokar & Jie Tao - 773-790 Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
by Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li - 791-805 An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis
by A. Geethapriya & S. Valli
April 2021, Volume 23, Issue 2
- 263-267 Seeking Foundations for the Science of Cyber Security
by Shouhuai Xu & Moti Yung & Jingguo Wang - 269-283 HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
by Xin Huang & Fei Yan & Liqiang Zhang & Kai Wang - 285-298 LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling
by Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu - 299-315 DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification
by Krishna Chandra Roy & Qian Chen - 317-327 Incentive Mechanism for Rational Miners in Bitcoin Mining Pool
by Gang Xue & Jia Xu & Hanwen Wu & Weifeng Lu & Lijie Xu - 329-341 Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
by Mario Silic & Paul Benjamin Lowry - 343-360 Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity
by A. J. Burns & Clay Posey & Tom L. Roberts - 361-373 The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
by Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo - 375-389 Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach
by Qi Liu & Gengzhong Feng & Giri Kumar Tayi & Jun Tian - 391-414 Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems
by Stephan Berger & Björn Häckel & Lukas Häfner - 415-433 Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?
by Tan Trung Luong & Uthayasankar Sivarajah & Vishanth Weerakkody - 435-452 The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation
by Supavich Fone Pengnate & Rathindra Sarathy & Todd J. Arnold - 453-475 Accommodating Practices During Episodes of Disillusionment with Mobile IT
by Efpraxia D. Zamani & Nancy Pouloudi & George Giaglis & Jonathan Wareham - 477-494 Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets
by Benjamin Clapham & Michael Siering & Peter Gomber - 495-513 Towards Increased Understanding of Open Data Use for Software Development
by Maciej Grzenda & Jaroslaw Legierski
February 2021, Volume 23, Issue 1
- 1-7 Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science
by Silvia Chiusano & Tania Cerquitelli & Robert Wrembel & Daniele Quercia - 9-33 Quarry: A User-centered Big Data Integration Platform
by Petar Jovanovic & Sergi Nadal & Oscar Romero & Alberto Abelló & Besim Bilalli - 35-51 Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks
by Pietro Michiardi & Damiano Carra & Sara Migliorini - 53-69 Multi-view Latent Learning Applied to Fashion Industry
by Giovanni Battista Gardino & Rosa Meo & Giuseppe Craparotta - 71-80 Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition
by Aria Ghora Prabono & Bernardo Nugroho Yahya & Seok-Lyong Lee - 81-100 TextBenDS: a Generic Textual Data Benchmark for Distributed Systems
by Ciprian-Octavian Truică & Elena-Simona Apostol & Jérôme Darmont & Ira Assent - 101-114 GarNLP: A Natural Language Processing Pipeline for Garnishment Documents
by Ilaria Bordino & Andrea Ferretti & Francesco Gullo & Stefano Pascolutti - 115-134 Mining Social Networks to Detect Traffic Incidents
by Sebastián Vallejos & Diego G. Alonso & Brian Caimmi & Luis Berdun & Marcelo G. Armentano & Álvaro Soria