Content
August 2016, Volume 18, Issue 4
- 717-734 Properties that influence business process management maturity and its effect on organizational performance
by Remco Dijkman & Sander Vincent Lammers & Ad Jong - 735-764 A formulation of computational trust based on quantum decision theory
by Mehrdad Ashtiani & Mohammad Abdollahi Azgomi - 765-780 A complex event processing approach to detect abnormal behaviours in the marine environment
by Fernando Terroso-Saenz & Mercedes Valdes-Vela & Antonio F. Skarmeta-Gomez - 781-818 CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises
by Maxime Bernaert & Geert Poels & Monique Snoeck & Manu Backer
June 2016, Volume 18, Issue 3
- 407-411 Emerging service orientations and transformations (SOT)
by Haluk Demirkan & James C. Spohrer - 413-428 Smart CloudBench—A framework for evaluating cloud infrastructure performance
by Mohan Baruwal Chhetri & Sergei Chichin & Quoc Bao Vo & Ryszard Kowalczyk - 429-455 Normative requirements for regulatory compliance: An abstract formal framework
by Mustafa Hashmi & Guido Governatori & Moe Thandar Wynn - 457-478 iSIM: An integrated design method for commercializing service innovation
by Eng K. Chew - 479-497 From product-centric to customer-centric services in a financial institution – exploring the organizational challenges of the transition process
by Olivera Marjanovic & Vijaya Murthy - 499-510 SOA in practice – a study of governance aspects
by George Joukhadar & Fethi Rabhi - 511-528 Enabling user-driven rule management in event data analysis
by Weisi Chen & Fethi A. Rabhi - 529-540 An awareness-based meta-mechanism for e-commerce buyer coalitions
by Laor Boongasame & Farhad Daneshgar - 541-564 A theory building study of enterprise architecture practices and benefits
by Ralph Foorthuis & Marlies Steenbergen & Sjaak Brinkkemper & Wiel A. G. Bruls - 565-578 A new method to identify collaborative partners in social service provider networks
by Yong Sun & Wenan Tan & Lingxia Li & Weiming Shen & Zhuming Bi & Xiaoming Hu - 579-595 Web personalization for user acceptance of technology: An empirical investigation of E-government services
by Vinodh Krishnaraju & Saji K Mathew & Vijayan Sugumaran - 597-619 Persuasive narrative advertisement generator: A microenterprise service innovation perspective
by Soe-Tsyr Daphne Yuan & Peng-Wei Chiu - 621-638 Information and Knowledge Leakage in Supply Chain
by Kim Hua Tan & W. P. Wong & Leanne Chung
April 2016, Volume 18, Issue 2
- 233-235 Big data and analytics in healthcare: Introduction to the special section
by Atreyi Kankanhalli & Jungpil Hahn & Sharon Tan & Gordon Gao - 237-252 Advanced analytics for the automation of medical systematic reviews
by Prem Timsina & Jun Liu & Omar El-Gayar - 253-263 A study on the antecedents of healthcare information protection intention
by Chang-Gyu Yang & Hee-Jun Lee - 265-275 Examining online consumers’ initial trust building from an elaboration likelihood model perspective
by Tao Zhou & Yaobin Lu & Bin Wang - 277-292 Engineering of web services for internet of things applications
by Evelina Pencheva & Ivaylo Atanasov - 293-314 Consumer adoption of RFID-enabled services. Applying an extended UTAUT model
by Herbjørn Nysveen & Per Egil Pedersen - 315-332 Service delivery through mobile-government (mGov): Driving factors and cultural impacts
by Mahmud Akhter Shareef & Vinod Kumar & Yogesh K. Dwivedi & Uma Kumar - 333-348 Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency
by Kishor Vaidya & John Campbell - 349-358 Computationally efficient ontology selection in software requirement planning
by R. B. K. Brown & G. Beydoun & G. Low & W. Tibben & R. Zamani & F. García-Sánchez & R. Martinez-Bejar - 359-405 Business process compliance checking – applying and evaluating a generic pattern matching approach for conceptual models in the financial sector
by Jörg Becker & Patrick Delfmann & Hanns-Alexander Dietrich & Matthias Steinhorst & Mathias Eggert
February 2016, Volume 18, Issue 1
- 1-6 Collaboration technology in teams and organizations: Introduction to the special issue
by Gert-Jan Vreede & Pedro Antunes & Julita Vassileva & Marco Aurélio Gerosa & Kewen Wu - 7-21 Understanding student participation in undergraduate course communities: A case study
by Francisco J. Gutierrez & Sergio F. Ochoa & Gustavo Zurita & Nelson Baloian - 23-46 A dependency taxonomy for agile software development projects
by Diane E. Strode - 47-68 Factors influencing the decision to crowdsource: A systematic literature review
by Nguyen Hoang Thuan & Pedro Antunes & David Johnstone - 69-84 Creating a family of collaborative applications for emergency management in the firefighting sub-domain
by Pedro O. Rossel & Valeria Herskovic & Erika Ormeño - 85-102 Boundary objects in collaborative work and learning
by Mikhail Fominykh & Ekaterina Prasolova-Førland & Monica Divitini & Sobah Abbas Petersen - 103-123 Designing for geo-referenced in-situ therapeutic scenarios
by Luís Duarte & Luís Carriço - 125-144 Achieving better usability of software supporting learning activities of large groups
by Nelson Baloian & Gustavo Zurita - 145-158 Providing awareness, explanation and control of personalized filtering in a social networking site
by Sayooran Nagulendra & Julita Vassileva - 159-170 A survey of edge-preserving image denoising methods
by Paras Jain & Vipin Tyagi - 171-204 Using model transformation to refactor use case models based on antipatterns
by Yasser A. Khan & Mohamed El-Attar - 205-231 Optimization of generic progressive queries based on dependency analysis and materialized views
by Chao Zhu & Qiang Zhu & Calisto Zuzarte & Wenbin Ma
December 2015, Volume 17, Issue 6
- 1191-1194 Special section on business process analytics
by Karl R. Lang & Vojislav B. Misic & Leon J. Zhao - 1195-1208 An intelligent approach to data extraction and task identification for process mining
by Jiexun Li & Harry Jiannan Wang & Xue Bai - 1209-1226 Semantics-based event log aggregation for process mining and analytics
by Amit V. Deokar & Jie Tao - 1227-1238 Examining micro-level knowledge sharing discussions in online communities
by G. Alan Wang & Xiaomo Liu & Jianling Wang & Min Zhang & Weiguo Fan - 1239-1251 The classification of hackers by knowledge exchange behaviors
by Xiong Zhang & Alex Tsang & Wei T. Yue & Michael Chau - 1253-1264 Workflow-aware attention tracking to enhance collaboration management
by Shaokun Fan & Lele Kang & J. Leon Zhao - 1265-1282 Collaborative personal profiling for web service ranking and recommendation
by Wenge Rong & Baolin Peng & Yuanxin Ouyang & Kecheng Liu & Zhang Xiong - 1283-1299 E-commerce web site loyalty: A cross cultural comparison
by Jengchung Victor Chen & David C. Yen & Wannasri Pornpriphet & Andree E. Widjaja - 1301-1311 Rough set based classification of real world Web services
by Hala S. Own & Hamdi Yahyaoui - 1313-1333 The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis
by Pekka Kekolahti & Juuso Karikoski & Antti Riikonen - 1335-1352 Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations
by Heng-Li Yang & August F. Y. Chao - 1353-1367 Diffusion of deception in social media: Social contagion effects and its antecedents
by Arun Vishwanath - 1369-1380 RFID in production and service systems: Technology, applications and issues
by Nilgun Fescioglu-Unver & Sung Hee Choi & Dongmok Sheen & Soundar Kumara - 1381-1400 Estimating trust value: A social network perspective
by Wei-Lun Chang & Arleen N. Diaz & Patrick C. K. Hung - 1401-1425 The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling
by Jan Claes & Irene Vanderfeesten & Frederik Gailly & Paul Grefen & Geert Poels
October 2015, Volume 17, Issue 5
- 983-986 Advances in secure knowledge management in the big data era
by Chittaranjan Hota & Shambhu Upadhyaya & Jamal Nazzal Al-Karaki - 987-995 Surviving advanced persistent threats in a distributed environment – Architecture and analysis
by Ruchika Mehresh & Shambhu Upadhyaya - 997-1005 Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013
by Jaeung Lee & Manish Agrawal & H. R. Rao - 1007-1015 Secure and privacy preserving data processing support for active authentication
by Yan Sun & Shambhu Upadhyaya - 1017-1028 Game-theoretic strategies for IDS deployment in peer-to-peer networks
by Pratik Narang & Chittaranjan Hota - 1029-1037 Analysis of a multistage attack embedded in a video file
by Hiran V. Nath & B. M. Mehtre - 1039-1056 Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service
by Kawaljeet Kaur Kapoor & Yogesh K. Dwivedi & Michael D. Williams - 1057-1076 Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts
by Mohammad Alamgir Hossain & Mohammed Quaddus - 1077-1095 Social balance in signed networks
by Xiaolong Zheng & Daniel Zeng & Fei-Yue Wang - 1097-1110 Does better Internet access lead to more adoption? A new empirical study using household relocation
by Junzhao Ma & Qingyi Huang - 1111-1132 Measurements of mislead threshold of company graph distortion
by Shaio Yan Huang & Tung-Hsien Wu & An-An Chiu & David C. Yen - 1133-1144 How business process reengineering affects information technology investment and employee performance under different performance measurement
by Shaio Yan Huang & Chao-Hsiung Lee & An-An Chiu & David C. Yen - 1145-1160 Addressing the valuation problem in multi-round combinatorial auctions
by Soumyakanti Chakraborty & Anup K. Sen & Amitava Bagchi - 1161-1176 IPTV parental control: A collaborative model for the Social Web
by Ana Fernández-Vilas & Rebeca P. Díaz-Redondo & Sandra Servia-Rodríguez - 1177-1190 Understanding health information technology adoption: A synthesis of literature from an activity perspective
by Jun Sun & Zhe Qu
August 2015, Volume 17, Issue 4
- 707-711 Special issue on agreement technologies
by Carlos Iván Chesñevar & Eva Onaindia & Sascha Ossowski & George Vouros - 713-724 Reasoning about reasons behind preferences using modal logic
by Truls Pedersen & Sjur Dyrkolbotn & Thomas Ågotnes - 725-742 Reasoning about the impacts of information sharing
by Yuqing Tang & Federico Cerutti & Nir Oren & Chatschik Bisdikian - 743-762 Subjective logic operators in trust assessment: an empirical study
by Federico Cerutti & Lance M. Kaplan & Timothy J. Norman & Nir Oren & Alice Toniolo - 763-778 From roles to standards: a dynamic maintenance approach using incentives
by Ramón Hermoso & Henrique Lopes Cardoso & Maria Fasli - 779-798 An ontological-based knowledge-representation formalism for case-based argumentation
by Stella Heras & Vicente Botti & Vicente Julián - 799-808 Service discovery acceleration with hierarchical clustering
by Zijie Cong & Alberto Fernandez & Holger Billhardt & Marin Lujak - 809-825 On the inaccuracy of numerical ratings: dealing with biased opinions in social networks
by Roberto Centeno & Ramón Hermoso & Maria Fasli - 827-844 Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory
by Ping Wang & Kuo-Ming Chao & Chi-Chun Lo - 845-856 A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research
by Kweku-Muata Osei-Bryson - 857-869 Event-cloud platform to support decision-making in emergency management
by Matthieu Lauras & Frédérick Benaben & Sébastien Truptil & Aurélie Charles - 871-887 Networked enterprise business model alignment: A case study on smart living
by Sam Solaimani & Harry Bouwman & Timo Itälä - 889-915 E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks
by Vishanth Weerakkody & Zahir Irani & Habin Lee & Ibrahim Osman & Nitham Hindi - 917-946 Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron
by Jakub Malý & Martin Nečaský - 947-960 Intelligent drowsy eye detection using image mining
by Ahmed Emam - 961-981 VXQ: A visual query language for XML data
by Ryan H. Choi & Raymond K. Wong
June 2015, Volume 17, Issue 3
- 471-474 Special section on the role of information technology in service delivery
by Jaeki Song & Jeff Baker & Fred D. Davis - 475-492 Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs)
by Ravi Seethamraju - 493-511 Improving service of online health information provision: A case of usage-driven design for health information portals
by Bang Viet Nguyen & Frada Burstein & Julie Fisher - 513-532 Categorizing consumer behavioral responses and artifact design features: The case of online advertising
by Jian Tang & Ping Zhang & Philip Fei Wu - 533-546 Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach
by Miri Kim & Jaeki Song & Jason Triche - 547-563 A meta-analysis of existing research on citizen adoption of e-government
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams - 565-589 Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs
by Seokho Son & Kwang Mong Sim - 591-600 Smart grid data analytics for digital protective relay event recordings
by Tomo Popovic & Mladen Kezunovic & Bozo Krstajic - 601-617 Examining the antecedent factors of online microsourcing
by Baozhou Lu & Rudy Hirschheim & Andrew Schwarz - 619-628 Comparative study of large information systems’ CSFs during their life cycle
by Mojtaba Ashja & Akram Hadizadeh Moghadam & Hamid Bidram - 629-644 An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries
by Vincent Cho & Aman Chan - 645-657 Customer revisit intention to restaurants: Evidence from online reviews
by Xiangbin Yan & Jing Wang & Michael Chau - 659-672 Investments in enterprise integration technology: An event study
by Narcyz Roztocki & Heinz Roland Weistroffer - 673-689 Failure recovery in distributed model composition with intelligent assistance
by Hui Huang & Xueguang Chen & Zhiwu Wang - 691-705 On achieving secure collaboration in supply chains
by Sharad Barkataki & Hassan Zeineddine
April 2015, Volume 17, Issue 2
- 239-241 Introduction: Advances in IoT research and applications
by Pan Wang & Ricardo Valerdi & Shangming Zhou & Ling Li - 243-259 The internet of things: a survey
by Shancang Li & Li Da Xu & Shanshan Zhao - 261-274 The Internet of Things—A survey of topics and trends
by Andrew Whitmore & Anurag Agarwal & Li Xu - 275-287 The design of an electronic pedigree system for food safety
by Weili Han & Yun Gu & Wei Wang & Yin Zhang & Yuliang Yin & Junyu Wang & Li-Rong Zheng - 289-319 Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
by Zhibo Pang & Qiang Chen & Weili Han & Lirong Zheng - 321-335 An integrated information system for snowmelt flood early-warning based on internet of things
by Shifeng Fang & Lida Xu & Yunqiang Zhu & Yongqiang Liu & Zhihui Liu & Huan Pei & Jianwu Yan & Huifang Zhang - 337-350 An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau
by Fang Liu & Zhuming Bi & Eric L. Xu & Qin Ga & Quanyu Yang & Yingzhong Yang & Lan Ma & Tana Wuren & Rili Ge - 351-362 The role of social media in supporting knowledge integration: A social capital analysis
by Xiongfei Cao & Xitong Guo & Hefu Liu & Jibao Gu - 363-385 Risk assessment model based on multi-agent systems for complex product design
by Ni Li & Xiang Li & Yuzhong Shen & Zhuming Bi & Minghui Sun - 387-411 The information technology workforce: A review and assessment of voluntary turnover research
by Janice Lo - 413-422 Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors
by Tao Zhou - 423-438 Security investment and information sharing under an alternative security breach probability function
by Xing Gao & Weijun Zhong & Shue Mei - 439-453 Optimal software design reuse policies: A control theoretic approach
by Monica Johar & Vijay Mookerjee & Suresh Sethi - 455-470 Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use
by Hung-pin Shih & Kee-hung Lai & T. C. E. Cheng
February 2015, Volume 17, Issue 1
- 1-2 Foreword: Information Systems Frontiers
by Ram Ramesh & H. Raghav Rao - 3-9 Microeconomics and operations research: Their interactions and differences
by Kenneth Arrow - 11-14 Guest editorial: Grand successes and failures in IT: Private and public sectors
by Yogesh K. Dwivedi & David Wastell & Helle Zinner Henriksen & Rahul De’ - 15-29 Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics
by Marijn Janssen & Haiko Voort & Anne Fleur Veenstra - 31-50 Technology assimilation through conjunctures – a look at IS use in retail
by Ravi Anand Rao & Rahul De’ - 51-65 Repertoires of collaboration for common operating pictures of disasters and extreme events
by Deborah Bunker & Linda Levine & Carol Woody - 67-77 Knowledge transfer planning and execution in offshore outsourcing: An applied approach
by Sabine Madsen & Keld Bødker & Thomas Tøth - 79-93 Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER)
by Laurence Brooks & M. Shahanoor Alam - 95-108 The formation of technology mental models: the case of voluntary use of technology in organizational setting
by Amany Elbanna & Henrik C. J. Linderoth - 109-125 Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by Mohammad Alamgir Hossain & Mohammed Quaddus - 127-142 Investigating success of an e-government initiative: Validation of an integrated IS success model
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams & Vishanth Weerakkody - 143-157 Research on information systems failures and successes: Status update and future directions
by Yogesh K. Dwivedi & David Wastell & Sven Laumer & Helle Zinner Henriksen & Michael D. Myers & Deborah Bunker & Amany Elbanna & M. N. Ravishankar & Shirish C. Srivastava - 159-175 Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty
by Jung Lee & Jae-Nam Lee & Bernard C. Y. Tan - 177-191 Lemon complaints: When online auctions go sour
by Judy E. Scott & Dawn G. Gregg & Jae Hoon Choi - 193-215 Profiling internet banking users: A knowledge discovery in data mining process model based approach
by Gunjan Mansingh & Lila Rao & Kweku-Muata Osei-Bryson & Annette Mills - 217-237 Information systems frontiers: Keyword analysis and classification
by Chulhwan Chris Bang
November 2014, Volume 16, Issue 5
- 749-752 Guest editorial: Information reuse, integration, and reusable systems
by Chengcui Zhang & Elisa Bertino & Bhavani Thuraisingham & James Joshi - 753-769 Finding story chains in newswire articles using random walks
by Xianshu Zhu & Tim Oates - 771-785 An FAR-SW based approach for webpage information extraction
by Zhan Bu & Chengcui Zhang & Zhengyou Xia & Jiandong Wang - 787-799 Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection
by Tao Meng & Mei-Ling Shyu - 801-822 A comparative study of iterative and non-iterative feature selection techniques for software defect prediction
by Taghi M. Khoshgoftaar & Kehan Gao & Amri Napolitano & Randall Wald - 823-834 A unified framework for evaluating test criteria in model-checking-assisted test case generation
by Bolong Zeng & Li Tan - 835-851 Aspectualization of code clones—an algorithmic approach
by Samuel A. Ajila & Angad S. Gakhar & Chung‐Horng Lung - 853-866 Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures
by Chung-Horng Lung & Samuel A. Ajila & Wen-Lin Liu - 867-885 A methodology for the evaluation of high response time on E-commerce users and sales
by Nicolas Poggi & David Carrera & Ricard Gavaldà & Eduard Ayguadé & Jordi Torres - 887-908 A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives
by Wei-Tsong Wang & Wen-Hung Chang - 909-922 Understanding the IT/business partnership: A business process perspective
by Artur Siurdyban - 923-937 A methodological approach to optimizing RFID deployment
by Benny C. F. Cheung & S. L. Ting & Albert H. C. Tsang & W. B. Lee - 939-951 Service-oriented intelligent group decision support system: Application in transportation management
by Shiwei He & Rui Song & Sohail S. Chaudhry - 953-977 A new methodology to support group decision-making for IoT-based emergency response systems
by Ni Li & Minghui Sun & Zhuming Bi & Zeya Su & Chao Wang
September 2014, Volume 16, Issue 4
- 523-542 Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform
by Mohammad Mehedi Hassan & M. Shamim Hossain & A. M. Jehad Sarkar & Eui-Nam Huh - 543-556 Algebraic operations in fuzzy object-oriented databases
by Li Yan & Z. M. Ma & Fu Zhang - 557-570 Patterns of news dissemination through online news media: A case study in China
by Youzhong Wang & Daniel Zeng & Bin Zhu & Xiaolong Zheng & Feiyue Wang - 571-589 Using conceptual graphs for clinical guidelines representation and knowledge visualization
by Bernard Kamsu-Foguem & Germaine Tchuenté-Foguem & Clovis Foguem - 591-605 Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories
by Placide Poba-Nzaou & Sylvestre Uwizeyemungu & Louis Raymond & Guy Paré - 607-625 I-Competere: Using applied intelligence in search of competency gaps in software project managers
by Ricardo Colomo-Palacios & Israel González-Carrasco & Jose Luis López-Cuadrado & Antonio Trigo & Joao Eduardo Varajao - 627-641 Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community
by Hung-Pin Shih & Echo Huang - 643-661 Dynamic competition in IT security: A differential games approach
by Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite - 663-696 Efficient adaptation of XML data using a conceptual model
by Jakub Malý & Martin Nečaský & Irena Mlýnková - 697-713 Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers
by Yen-Hao Hsieh & Soe-Tsyr Yuan & Hsiao-Chen Liu - 715-727 Harnessing global expertise: A comparative study of expertise profiling methods for online communities
by Xiaomo Liu & G. Alan Wang & Aditya Johri & Mi Zhou & Weiguo Fan - 729-747 Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption
by Oluwasola Oni & Anastasia Papazafeiropoulou
July 2014, Volume 16, Issue 3
- 337-345 Using scenarios to understand the frontiers of IS
by Paul Gray & Anat Hovav - 347-352 Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)
by Anat Hovav - 353-368 Foresight for a responsible future with ICT
by M. Lynne Markus & Kevin Mentzer - 369-382 Mobile technology utilization for social development in developing countries: An ethnographic futures research study
by Phillip Olla & Jyoti Choudrie - 383-397 Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues
by Kutoma J. Wakunuma & Bernd Carsten Stahl - 399-416 An economic mechanism to manage operational security risks for inter-organizational information systems
by Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston - 417-434 Evaluation on crowdsourcing research: Current status and future direction
by Yuxiang Zhao & Qinghua Zhu - 435-452 Everything-as-a-service platform for on-demand virtual enterprises
by Gang Li & Mingchuan Wei - 453-471 A schema aware ETL workflow generator
by Naiqiao Du & Xiaojun Ye & Jianmin Wang - 473-490 Network mining: Applications to business data
by Fatih Cavdur & Soundar Kumara - 491-507 Usage of established and novel mobile communication services: Substitutional, independent or complementary?
by Torsten J. Gerpott & Sandra Thomas & Michael Weichert - 509-521 A comparison of improving multi-class imbalance for internet traffic classification
by Qiong Liu & Zhen Liu
April 2014, Volume 16, Issue 2
- 163-167 Advances in infrastructures and tools for multiagent systems
by Juan M. Alberola & Vicent Botti & Jose M. Such - 169-182 Beast methodology: An agile testing methodology for multi-agent systems based on behaviour driven development
by Álvaro Carrera & Carlos A. Iglesias & Mercedes Garijo - 183-199 A MAS-based infrastructure for negotiation and its application to a water-right market
by Bexy Alfonso & Vicente Botti & Antonio Garrido & Adriana Giret - 201-223 Norm reasoning services
by N. Criado & J.M. Such & V. Botti - 225-237 BFF: A tool for eliciting tie strength and user communities in social networking services
by Ricard L. Fogués & Jose M. Such & Agustin Espinosa & Ana Garcia-Fornes - 239-256 An adaptive framework for monitoring agent organizations
by Juan M. Alberola & Luis Búrdalo & Vicente Julián & Andrés Terrasa & Ana García-Fornes - 257-272 Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures
by P. Bharati & C. Zhang & A. Chaudhury - 273-289 Assessing and managing e-commerce service convenience
by Jung-Yu Lai & Khire Rushikesh Ulhas & Jian-Da Lin - 291-302 Collaborative service system design for music content creation
by Wei-Feng Tung & Soe-Tsyr Yuan & Yen-Cheng Wu & Patrick Hung - 303-327 Enhancing visitors’ experience in art museums using mobile technologies
by R. Tesoriero & J. A. Gallud & M. Lozano & V. M. R. Penichet - 329-336 Returns to information security investment: Endogenizing the expected loss
by Kjell Hausken
March 2014, Volume 16, Issue 1
- 1-5 Dynamic intelligence towards merging cloud and communication services
by Ching-Hsien Hsu & Jianhua Ma & Mohammad S. Obaidat - 7-18 A cost-aware auto-scaling approach using the workload prediction in service clouds
by Jingqi Yang & Chuanchang Liu & Yanlei Shang & Bo Cheng & Zexiang Mao & Chunhong Liu & Lisha Niu & Junliang Chen - 19-34 Scalable and leaderless Byzantine consensus in cloud computing environments
by JongBeom Lim & Taeweon Suh & JoonMin Gil & Heonchang Yu - 35-44 IDTCP: An effective approach to mitigating the TCP incast problem in data center networks
by Guodong Wang & Yongmao Ren & Ke Dou & Jun Li - 45-58 A self-similar super-peer overlay construction scheme for super large-scale P2P applications
by Hung-Yi Teng & Chien-Nan Lin & Ren-Hung Hwang - 59-75 MPaaS: Mobility prediction as a service in telecom cloud
by Haoyi Xiong & Daqing Zhang & Daqiang Zhang & Vincent Gauthier & Kun Yang & Monique Becker - 77-93 Fully automated resource retrieval in telecommunications and internet converged environments
by Luis Javier Suarez-Meza & Julián Andrés Zúñiga & Edgar Camilo Pedraza & Juan Carlos Corrales - 95-111 Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing
by Feng Xia & Fangwei Ding & Jie Li & Xiangjie Kong & Laurence T. Yang & Jianhua Ma - 113-127 Enhanced Dynamic Authentication Scheme (EDAS)
by Toan-Thinh Truong & Minh-Triet Tran & Anh-Duc Duong - 129-141 A scalable approach for content based image retrieval in cloud datacenter
by Jianxin Liao & Di Yang & Tonghong Li & Jingyu Wang & Qi Qi & Xiaomin Zhu - 143-152 Multi-user web service selection based on multi-QoS prediction
by Shangguang Wang & Ching-Hsien Hsu & Zhongjun Liang & Qibo Sun & Fangchun Yang - 153-162 A network view of business systems
by Fatih Cavdur & Soundar Kumara
November 2013, Volume 15, Issue 5
- 695-704 Green information systems & technologies – this generation and beyond: Introduction to the special issue
by Joseph Sarkis & Chulmo Koo & Richard T. Watson - 705-723 Identifying IT sustainability performance drivers: Instrument development and validation
by Alemayehu Molla - 725-745 Towards a reference architecture for fuel-based carbon management systems in the logistics industry
by M. E. Iacob & M. J. Sinderen & M. Steenwijk & P. Verkroost - 747-760 Using information systems to improve energy efficiency: Do smart meters make a difference?
by Jacqueline Corbett - 761-778 Small business in a small country: Attitudes to “Green” IT
by Philip Coffey & Mary Tate & Janet Toland - 779-797 Understanding the beliefs, actions and outcomes of sustainability reporting: An experimental approach
by Matthias Gräuler & Michael Freundlieb & Kerstin Ortwerth & Frank Teuteberg - 799-814 Green practices-IS alignment and environmental performance: The mediating effects of coordination
by Sung Yul Ryoo & Chulmo Koo