Content
2019, Volume 21, Issue 1
- 89-100 Reduction of overhead in routing protocols for MANET using fuzzy set-based decision making
by K.G. Preetha & A. Unnikrishnan - 101-111 Performance measure of routing protocol with angular coordinates and distinctive transmissions in wireless networks
by M. Vanitha & T.R. Ganesh Babu - 112-126 Scalability assurance process in replication and migration using cloud simulator
by P. Deivendran & Ealai Rengasari Naganathan - 127-159 Efficient network coding-based data transfer framework for multihop wireless communication
by Nyan Lin & Yasuo Tan & Yuto Lim
2019, Volume 20, Issue 4
- 319-339 Stochastic demand side management in smart grid system
by Manish Kumar & Cherian Samuel - 340-355 PTRE: a probabilistic two-phase replication elimination policy in large-scale distributed storage platforms
by Ning Han & Dongbo Liu - 356-376 Topology-aware approach for reducing power consumption in backbone networks
by Mohammed Hussein & Abdallatif Abu-Issa - 377-399 (De)Mystifying the information and communication technology business model concept
by Trevor Clohessy & Thomas Acton & Lorraine Morgan - 400-417 Mobile learning adoption in Jordan: technology influencing factors
by Mohammad K. Al-Nawayseh & Aladdin Hussein Baarah & Sultan A. Al-Masaeed & Mohammad M. Alnabhan
2019, Volume 20, Issue 3
- 195-214 Driving factors of digital strategic actions in competitive dynamics
by LeWei Hu & Jing Zhao & Jiao Huang & Yajing Li - 215-244 Study on core essential elements for O2O business model with value net theory
by Jiang Ping Wan & Ya Hui Zhu & Qiao Wen Jiang - 245-264 Motivation, governance, efficacy and contribution: a social practice model of commons-based peer production
by Rong Wang - 265-283 A novel QoS negotiation model based on intelligent learning technique in clouds
by Dongbo Liu & Yongjian Li - 284-300 A novel scheduling algorithm for data-intensive workflow in virtualised clouds
by Feng Li - 301-317 An efficient replication scheme based on living-replicas estimation for distributed storage platforms
by Ying Hu
2019, Volume 20, Issue 2
- 105-126 Privacy-invading mechanisms in e-commerce - a case study on German tourism websites
by Tatiana Ermakova & Anke Hohensee & Ines Orlamünde & Benjamin Fabian - 127-142 An efficient adaptive genetic algorithm technique to improve the neural network performance with aid of adaptive GA operators
by Katha Kishor Kumar & Suresh Pabboju - 143-167 A survey on data stream, big data and real-time
by Eliza H.A. Gomes & Patrícia D.M. Plentz & Carlos R. De Rolt & Mario A.R. Dantas - 168-183 An adaptive redundant reservation admission in virtual cloud environment
by Dongbo Liu & Yongjian Li - 184-194 Energy efficient-dynamic and self-optimised routing in wireless sensor network based on ant colony optimisation
by Arindam Debnath & Mrinal Kanti Debbarma
2019, Volume 20, Issue 1
- 1-13 The measurement of gas solid two-phase flow parameters based on electrical capacitance tomography technology
by Haijun Tian & Yunlong Zhou & Ting Yang & Yanghui Zhao - 14-34 IT-enabled inter-organisational relationships and collaborative innovation: integration of IT design and relationships governance
by Fei Wang & Jing Zhao & LeWei Hu - 35-43 Construction of distance teaching platform based on mobile communication technology
by Hongxia Li - 44-52 Prediction in mobile ad hoc network based on fuzzy time series
by Chunyu Yang - 53-72 Priority-based bandwidth allocation and load balancing for multipath IP networks
by V. Rekha & M. Indiramma - 73-89 Adaptive priority-based fair-resource allocation for MIMO-OFDM multicast networks
by Voruganti Hindumathi & Katta Rama Linga Reddy - 90-103 A novel replication scheme based on prediction technology in virtual P2P storage platform
by Peng Xiao & Tienan Zhang
2018, Volume 19, Issue 2/3/4
- 105-132 A full-featured efficient clustering mechanism for improving QoS in MANETs
by Gatete Marcel & A. Kovalan - 133-152 ASD: emotions and behavioural-based interventions through social sensor networks
by Uwizeyimana Faustin & A. Kovalan & Rajkumar Kannan - 153-175 Malicious node identification routing and protection mechanism for vehicular ad-hoc network against various attacks
by Zaid A. Abdulkader & Azizol Abdullah & Mohd Taufik Abdullah & Zuriati Ahmad Zukarnain - 176-186 Relay node selection with energy efficient routing using hidden Markov model in wireless sensor networks
by J. Martin Sahayaraj & J.M. Ganaseakar - 187-195 Network lifetime estimation of wireless sensor networks using communication protocols with non-parametric models
by Govindarajan Saravanan & M.J.S. Rangachar - 196-208 Combined vibration and RF harvester technique for energy management in sensor device
by C. Padmavathy & L.S. Jayashree & A. Rosario - 209-233 DTCF: deadline task consolidation first for energy minimisation in cloud data centres
by P. Sanjeevi & P. Viswanathan - 234-256 SIP-based VoIP anomaly detection engine using DTV and ONR
by Saira Banu & K.M. Mehata - 257-269 Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm
by B.P. Sreejith Vignesh & M. Rajesh Babu - 270-288 Hybrid model for enhancement of passenger information management system
by Munir Kolapo Yahya-Imam & Sellappan Palaniappan & Seyed Mohammadreza Ghadiri - 289-304 Energy-based efficient authenticated routing protocol for MANETs for DDOS attacks with minimised power consumption
by M. Savithri & M. Rajesh Babu - 305-320 Energy aware clustered load balancing in cloud computing environment
by K.R. Remesh Babu & Philip Samuel - 321-340 Semantic clustering approach for documents in distributed system framework with multi-node setup
by R. Priyadarshini & Latha Tamilselvan - 341-356 Research on the intellectual traffic flow control system based on multi-agent along with self-governing vehicle and system of wireless sensor network
by Chengtao Cao - 357-372 A novel framework for very high resolution remote sensing image change detection
by Jie Li & Ning Sun & Jianlong Zhang - 373-384 Certain investigations on effective rate adaptation in cognitive radio with channel characteristics
by B. Suseela & D. Sivakumar - 385-394 A secure communication over wireless sensor devices using intelligent arrival estimation algorithm
by J. Vijitha Ananthi & H. James Deva Koresh & S. Vengatesan & Y. Blessina Anet Glorita
2018, Volume 19, Issue 1
- 1-20 Contemporary digital business model decision making: a cloud computing supply-side perspective
by Trevor Clohessy & Thomas Acton & Lorraine Morgan - 21-33 Smart phones and surgeons: privacy and legal issues in Australian healthcare
by Victoria Garwood & Damian Claydon-Platt & Nilmini Wickramasinghe & John Mackay & Philip J. Smart - 34-49 Location-based clustering and collaborative filtering for mobile learning
by Mohammad M. Alnabhan - 50-71 Cloud computing security: attacks, threats, risk and solutions
by Shweta Kaushik & Charu Gandhi - 72-86 Research on network design and analysis of TGO topology
by Shanmuk Srinivas Amiripalli & Veeramallu Bobba - 87-102 A multi-policy adaptive scheduling framework in virtual clouds
by Changsong Liu
2018, Volume 18, Issue 4
- 265-278 Ant-based self-healing routing for enhancing lifetime of wireless sensor networks
by Chaganti B.N. Lakshmi & S. Krishna Mohan Rao - 279-293 A novel virtual machine scheduling policy based on performance prediction model
by Dongbo Liu & Yongjian Li - 294-306 An accuracy-enhanced cost model for virtual machine migration
by Tienan Zhang - 307-322 Improving scheduling efficiency by probabilistic execution time model in cloud environments
by Peng Xiao & Dongbo Liu & Kaijian Liang - 323-337 Fuzzy logic-based optimised algorithm for mobility robustness and load-balancing in LTE/4G networks
by Tanu Goyal & Sakshi Kaushal & Arun Kumar Sangaiah - 338-356 Optimal neural network to enhance classification accuracy for mining online reviews and opinions using improved PSO
by B. Dhanalakshmi & Arumugam Chandra Sekar
2018, Volume 18, Issue 3
- 183-195 Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN
by G. Lakshmi Vara Prasad & T. Nalini & Rajendran Sugumar - 183-195 Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN
by G. Lakshmi Vara Prasad & T. Nalini & Rajendran Sugumar - 196-210 EVRC: an economic-based virtual resource co-allocation middleware for clouds
by Tienan Zhang - 196-210 EVRC: an economic-based virtual resource co-allocation middleware for clouds
by Tienan Zhang - 211-226 Fuzzy-based trusted security for mobile grid systems
by Kavitha Bharathi Shanmugam & S. Vengataasalam - 211-226 Fuzzy-based trusted security for mobile grid systems
by Kavitha Bharathi Shanmugam & S. Vengataasalam - 227-245 Does social networking ultimately sustain organisational performance?
by Lobel Trong-Thuy Tran & Wan-Tran Huang - 227-245 Does social networking ultimately sustain organisational performance?
by Lobel Trong-Thuy Tran & Wan-Tran Huang - 246-264 Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks
by Ali Mundeth Ahmed & Erakkath Abdu Jasmin - 246-264 Adaptive modulation and interference cancellation techniques for MIMO-OFDM wireless networks
by Ali Mundeth Ahmed & Erakkath Abdu Jasmin
2018, Volume 18, Issue 2
- 97-111 A lightweight mutual authentication approach for RFID tags in IoT devices
by Aakanksha Tewari & B.B. Gupta - 97-111 A lightweight mutual authentication approach for RFID tags in IoT devices
by Aakanksha Tewari & B.B. Gupta - 112-129 Parallel AES algorithm for performance improvement in data analytics security for IoT
by Narayanan Manikandan & Srinivasan Subha - 112-129 Parallel AES algorithm for performance improvement in data analytics security for IoT
by Narayanan Manikandan & Srinivasan Subha - 130-143 Particle swarm optimisation-based DWT for symbol detection in MIMO-OFDM system
by Asma Bouhlel & Anis Sakly & Mohamed Nejib Mansouri - 130-143 Particle swarm optimisation-based DWT for symbol detection in MIMO-OFDM system
by Asma Bouhlel & Anis Sakly & Mohamed Nejib Mansouri - 144-165 Optimal cluster head selection framework to support energy aware routing protocols of wireless sensor network
by Achyut Shankar & N. Jaisankar - 144-165 Optimal cluster head selection framework to support energy aware routing protocols of wireless sensor network
by Achyut Shankar & N. Jaisankar - 166-181 An energy-efficient frequency scaling technique for virtualised memory in clouds
by Peng Xiao & Yuan Tian - 166-181 An energy-efficient frequency scaling technique for virtualised memory in clouds
by Peng Xiao & Yuan Tian
2018, Volume 18, Issue 1
- 1-29 The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers
by Shan Wang & Youwei Wang & Norm Archer - 1-29 The co-evolution of IT competence, organisational agility and entrepreneurial action: a case study of entrepreneurial e-tailers
by Shan Wang & Youwei Wang & Norm Archer - 30-50 Data analysis to uncover critical parameters for performance appraisal of students in higher education
by Raju Ranjan & Jayanthi Ranjan - 30-50 Data analysis to uncover critical parameters for performance appraisal of students in higher education
by Raju Ranjan & Jayanthi Ranjan - 51-66 Examining users' switch from online banking to mobile banking
by Tao Zhou - 51-66 Examining users' switch from online banking to mobile banking
by Tao Zhou - 67-79 Virtual resource pricing scheme in cloud platforms
by Ying Hu & Ze Xiao - 67-79 Virtual resource pricing scheme in cloud platforms
by Ying Hu & Ze Xiao - 80-96 The application of analytic hierarchy process and fuzzy comprehensive evaluation in the evaluation of ecological security in coal mine areas
by Xiaoling Ke & Min Feng & Meng Xiang - 80-96 The application of analytic hierarchy process and fuzzy comprehensive evaluation in the evaluation of ecological security in coal mine areas
by Xiaoling Ke & Min Feng & Meng Xiang
2017, Volume 17, Issue 4
- 317-340 Perceived value of smartphones and tablets for mobile business in small and medium enterprises
by Michael H. Quade & Uwe Leimstoll - 341-353 Improving employee health; lessons from an RCT
by Luuk P.A. Simons & Maurits P.J. Hafkamp & David Van Bodegom & Adrie Dumaij & Catholijn M. Jonker - 354-370 The expected and perceived well-being effects of short-term self-tracking technology use
by Tuomas Kari & Sanna Koivunen & Lauri Frank & Markus Makkonen & Panu Moilanen - 371-391 To sit or to stand, that is the question: examining the effects of work posture change on the well-being at work of software professionals
by Markus Makkonen & Minna Silvennoinen & Tuula Nousiainen & Arto J. Pesola & Mikko Vesisenaho - 392-409 Employee profile configurator: a tool to improve effectiveness of a virtual team
by Swati Kaul Bhat & Neerja Pande & Vandana Ahuja - 410-424 An empirical study of mobile social app continuance intention: integrating flow experience and switching costs
by Hong Hong & Di Xu
2017, Volume 17, Issue 2/3
- 105-125 Geocacher's co-creation to sharing their own playful treasure hunt video experiences around the world
by Pirita Ihamäki - 126-136 An intelligent network algorithm for enhanced security in a mobile ad hoc network
by M. Roopa & S. Selvakumar Raja - 137-148 FPGA realisation-based architecture for direction-of-arrival in wireless communication
by Chinnadurai Thiripurasundari & Vembu Sumathy - 149-157 Hybrid algorithm based on genetic algorithm and PSO for task scheduling in cloud computing environment
by A. Kousalya & R. Radhakrishnan - 158-169 A cluster-based network architecture scheme for QoS improvement in WLAN
by N. Arun Vignesh & P. Poongodi - 170-183 Optimisation of energy efficient cellular learning automata algorithm for heterogeneous wireless sensor networks
by C.P. Subha & S. Malarkkan - 184-201 The determinants of e-government cloud adoption: multi-case analysis of China
by Yikai Liang & Guijie Qi - 202-228 HCDA: hybrid collision aware data aggregation in wireless sensor networks
by S. Gopikrishnan & P. Priakanth - 229-251 Energy-aware and stable cluster-based multipath routing protocol for wireless ad hoc networks
by Omar Smail & Bernard Cousin & Imene Snoussaoui - 252-267 A novel high-dimensional data dimension reduction algorithm based on ameliorated supportive vector machine
by Weiting Yue & Qiaolian Shen - 268-289 Trust prediction model for certificate exchange and revocation in MANET
by Saju P. John & Philip Samuel - 290-313 Strategic IT investment in B2B e-commerce platform on user loyalty: considering variable investment cost
by Li Zhu & Li Li & Yue Zhang & Qiaosheng Shi
2017, Volume 17, Issue 1
- 3-16 Genetic-based routing algorithm with priority constraints
by Nibras Abdullah & Ola A. Al-Wesabi & Mohammed M. Kadhum & Mahmoud Baklizi - 17-31 Efficient cluster head selection method to improve the lifetime in wireless sensor networks
by Omar Fouad Mohammed & Burairah Hussin & Abd Samad Hasan Basari - 32-45 Theoretical framework of link stability-based forwarding strategy in vehicular ad hoc networks
by Sabri M. Hanshi & Mohammad M. Kadhum & Tat-Chee Wan - 46-63 More results on computation of topological indices of certain networks
by Mohamad Nazri Husin & Roslan Hasni & Muhammad Imran - 64-75 Embedding complete bipartite graph into grid with optimum congestion and wirelength
by A. Berin Greeni & Indra Rajasingh - 76-87 Exact wirelength of embedding chord graph into tree-based architectures
by N. Parthiban & Joe Ryan & Indra Rajasingh & R. Sundara Rajan & L. Nirmala Rani - 88-102 The effects of post-adoption beliefs on continuance use of a microblogging service: the role of network externalities
by Jian Xu & Xin Li & Hong Niu
2016, Volume 16, Issue 4
- 315-345 Inferring business relationships in the internet backbone
by Martin Huth & Benjamin Fabian - 346-361 Collaborative initiatives among international actors within a humanitarian setting
by Paulo Gonçalves & Mohammad Moshtari - 362-376 Drivers' evaluation to implement green marketing practices in automobile industry of China
by Xiaobing Liu & Zhijun Xu & Chunguang Bai - 377-388 An empirical study on users' adoption of MOOCs from the perspective of the institutional theory
by Shang Gao & Yuhao Yang - 389-401 Organisational management in the age of social networking sites
by Trong-Thuy Tran - 402-416 A mobility model for opportunistic networks in commercial areas
by Wanchun Yang & Shiyao Peng
2016, Volume 16, Issue 3
- 221-235 Understanding the WOM behaviour of e-service users: an empirical study in online travel services
by Hongxiu Li & Reima Suomi - 236-252 Secure multipath routing and data transmission in MANET
by Banoth Rajkumar & Gugulothu Narsimha - 253-264 A novel power control framework in virtual resource environments
by Ying Hu - 265-282 Visual fusion of multi-source network security data based on labelled treemap
by Sheng Zhang & Ronghua Shi - 283-297 A survey on end-to-end performance metrics of QoS-aware multicast routing protocols for mobile ad hoc networks
by Senthil Prakash Kuppusamy & Sasikala Ramasamy & Guna Sekar Thangamuthu - 298-313 Differences in motivational mindset affecting collaboration of virtual research organisation
by Erno Salmela & Pasi Juvonen
2016, Volume 16, Issue 2
- 124-142 Evaluating the feasibility of using tablets in emergency departments
by Ela Israeli & Danit Ribak & Tsipi Heart - 143-156 Mobile healthcare services adoption
by Genet Shanko & Solomon Negash & Tridib Bandyopadhyay - 157-170 The connection between viewing medical historical information and using-clinical tests
by Itamar Shabtai & Ofir Ben-Assuli & Moshe Leshno - 171-190 Exploring the possibilities for intelligent risk detection in healthcare contexts
by Hoda Moghimi & Jonathan L. Schaffer & Nilmini Wickramasinghe - 191-203 Tailoring patient information to encourage patient engagement
by Reeva Lederman & Stephen Smith & Suelette Dreyfus & Basil Alzougool - 204-220 An investigation of the benefit of using IT in the context of university students with ADHD
by Bader Binhadyan & Nilmini Wickramasinghe
2016, Volume 16, Issue 1
- 8-24 Communicating diabetes and diets on Twitter - a semantic content analysis
by Kristina Eriksson-Backa & Kim Holmberg & Stefan Ek - 25-37 The influence process of electronic word-of-mouth on traveller's visit intention: a conceptual framework
by Ping Wang - 38-71 The creation of inter-organisational IT governance for social welfare and healthcare IT - lessons from a case study
by Tomi Dahlberg - 72-85 Information flow and situational awareness in emergency medical dispatch
by Teija Norri-Sederholm & Juhani Seppälä & Kaija Saranto & Heikki Paakkonen - 86-102 FirstAED emergency dispatch, global positioning of community first responders with distinct roles - a solution to reduce the response times and ensuring an AED to early defibrillation in the rural area Langeland
by Finn Lund Henriksen & Per Schorling & Bruno Hansen & Henrik Schakow & Mogens Lytken Larsen - 103-120 Serious games and active healthy ageing: a pilot usability testing of existing games
by Aung Pyae & Reetta Raitoharju & Mika Luimula & Paula Pitkäkangas & Jouni Smed
2015, Volume 15, Issue 4
- 277-298 Managing barriers of virtual communication in global new product development projects
by Päivi Lohikoski & Jaakko Kujala & Harri Haapasalo & Janne Härkönen & Leena Ala-Mursula - 299-318 Designing network-based business model ontology
by Ali Reza Hashemi Nekoo & Shayegheh Ashourizadeh & Behrouz Zarei - 319-335 Evaluative index system of coal mine ecological security based on SEM modelling - an empirical study of China coal mine company
by Xiaoling Ke & Amal Mougharbel & Min Feng - 336-358 Study of various routing protocols in MANETs
by V. Saranya & S. Shankar & P. Nandhini & R. Jayanthi & R. Julliat Cessily - 359-375 Virtual resource provision with enhanced QoS in cloud platforms
by Dongbo Liu & Gaobo Yang
2015, Volume 15, Issue 2/3
- 102-119 Factors affecting university students' intention to adopt e-learning systems: a case study in Jiujiang University
by Zhuo Dai - 120-135 A comparative analysis on the effects of perceived enjoyment and perceived risk on hedonic/utilitarian smartphone applications
by Jun Yong Xiang & Lin Bo Jing & Hyun Soo Lee & Il Young Choi - 136-151 Examining mobile payment user adoption from the perspective of trust transfer
by Hong Yan & Kailing Pan - 152-167 The usability evaluation of website interface for mobile commerce website
by Tsung-Yin Ou & Chyuan Perng & Shih-Peng Hsu & Wen-Chih Chiou - 168-184 A review of researches on internet finance
by Shuyan Cao & Liang Chang & Yuanyuan Yu & Xuan Yang - 185-199 Empirical research on the impact of network externalities on online loyalty in B2B platforms
by Li Li & Xiaoli Wu & Yue Zhang & Jie Zhao - 200-214 The creative process of business value of IT in dynamic environment: the mediating effect of firm agility
by Yi Jiang & Jing Zhao - 215-241 From digital business strategy to e-business value creation: a three-stage process model
by Jing Zhao & Maomao Chi & Zhen Zhu & Lewei Hu - 242-255 The trustworthiness of reference group and cooperative quality: implications for online crowdsourcing market
by Xiaoling Li & Qian Tian & Hui Yan & Xinjian Li - 256-276 Measuring virtuality in an organisational context: a quantitative study of Brazilian manufacturing companies
by Claudia Aparecida De Mattos & Fernando José Barbin Laurindo
2015, Volume 15, Issue 1
- 1-29 Supply chain strategies in the boatbuilding industry - different ways to cope with change
by Tero Vuorinen - 30-47 Virtual resource provision based on elastic reservation in cloud computing
by Hong He - 48-64 Design and implementation of performance monitor and evaluation middleware in virtual clouds
by Dongbo Liu - 65-79 A contemporary team process management model to enhance multicultural and multidisciplinary virtual team performance
by Kerstin Siakas & Errikos Siakas - 80-98 Find relationship among applications
by Lei Chen & Chong Wu & Yilan Dai
2014, Volume 14, Issue 4
- 299-318 A survey into performance and energy efficiency in HPC, cloud and big data environments
by Eduardo Camilo Inacio & Mario A.R. Dantas - 319-339 Virtual business process management within collaborative manufacturing network: an implementation case
by Ahm Shamsuzzoha & Petri T. Helo - 340-354 A survey on performance analysis of energy aware multicast routing protocols in mobile ad hoc network
by Mahendrakumar Subramaniam & Sasikala Ramasamy - 355-376 European firm networks and competition - theoretical background and empirical evidence
by Achim Buchwald - 377-387 A methodical study of the role of trust at various development stages of virtual organisations
by Muhammad Yasir & Abdul Majid & Phil Johnson
2014, Volume 14, Issue 3
- 221-238 L2CAP-based prototype media streaming via Bluetooth technology
by Ebaa Fayyoumi & Sahar Idwan & Hiba A. Muhared & Izzeddin Matar & Obaidah A. Rawashdeh - 239-265 A simulation-based framework of performance monitoring and incentive mechanism for successful interactions in virtual environment
by Olivia Fachrunnisa - 266-279 An energy-efficient enhanced virtual resource provision middleware in clouds
by Dongbo Liu - 280-297 A snapshot of data quality issues in Indonesian community health
by Maulidyati Aisyah & Sophie Cockcroft
2014, Volume 14, Issue 1/2
- 4-24 The impact of boundary spanning capability, cultural differences on success of offshore information system outsourcing - from the vendors' perspective
by Bo Yang & Yuan Yuan & Mingzhu Liu - 25-39 A resource mapping framework for value co-creation in social media
by Qian Yuan & Shuqin Cai & Peng Zhou - 40-56 A pricing model for governments' subsidy in the green supply chain
by Ai Xu & Zongqing Zhou - 57-73 An empirical study on user acceptance of healthcare website
by Jianbin Sun & Jiaojiao Lu - 74-90 The model of making a price match based on automatic negotiated price for electronic commerce
by Yong Zhang & Weijun Wang & Lihong Xu & Lulu Zheng - 91-110 Opportunistic claiming behaviour in two-sided markets
by Zhihao Chen & Wenyan Zhou - 111-128 E-marketing under the adverse selection environment: model and case study
by Yong Pan - 129-145 An empirical research of the factors affecting users to follow companies' microblogs
by Kem Z.K. Zhang & Sesia J. Zhao & Hong Zhang & Matthew K.O. Lee - 146-159 Assessing multi-channel consumers' convenience expectations of online order/in-store pickup service
by Hao Ma & Yong Su & Lih-Bin Oh - 160-175 Does online video-sharing advertising have diffusion gene?
by Yichen Liao & Jing Zhu & Qinli Zhai - 176-196 Research of instrument to measure customer perceived service quality of mobile data services
by Qian Su - 197-220 Customer engagement behaviour in online social networks - the Facebook perspective
by Sofie Bitter & Sonja Grabner-Kräuter & Robert J. Breitenecker
2013, Volume 13, Issue 4
- 297-310 Price competition and coordination of dual-channel supply chains
by Chunhua Tang & Taosheng Wang - 311-326 An energy-efficient virtual machine scheduler with I/O collective mechanism in resource virtualisation environments
by Peng Xiao & Dongbo Liu - 327-350 Location aware and energy efficient routing protocol for long distance MANETs
by Syed Jalal Ahmad & V.S.K. Reddy & A. Damodaram & P. Radha Krishna - 351-364 User QoS enhanced web service composition framework in cloud platforms
by Peng Xiao & Dongbo Liu - 365-384 Towards measuring the geographic and political resilience of the internet
by Annika Baumann & Benjamin Fabian
2013, Volume 13, Issue 3
- 209-223 Risks and benefits of knowledge sharing in co-opetitive knowledge networks
by Ilona Ilvonen & Vilma Vuori - 224-244 Benefits and challenges of knowledge creation in concurrent virtual professional organisation formation and operation
by Erno Salmela & Kyllikki Taipale-Erävala - 245-262 Managing knowledge in smart networks
by Marco Bettiol & Valentina De Marchi & Eleonora Di Maria & Roberto Grandinetti - 263-281 Characterisation of knowledge-based networking strategies: insights from the KIBS sector
by Marco Paiola & Ettore Bolisani & Enrico Scarso - 282-295 International inter-organisational religious knowledge transfer
by Julio Araujo Carneiro-da-Cunha & Flavio Romero Macau & Nawfal Assa Mossa Alssabak
2013, Volume 13, Issue 2
- 101-128 Weighted graph-based methods for identifying the most influential actors in trust social networks
by Nassira Chekkai & Salim Chikhi & Hamamache Kheddouci - 129-145 Challenges of implementing innovation contests to facilitate radical innovation
by Björn Remneland Wikhamn - 146-158 A cloud architecture for dynamic virtual organisations in transport logistics
by Bill Karakostas - 159-175 Developers' social networks - tools analysis based on the 3Cs model
by Hani Bani-Salameh & Clinton Jeffery & Maen Hammad - 176-201 An information security-based literature survey and classification framework of data storage in DNA
by Shipra Jain & Himanshu Chaudhary & Vishal Bhatnagar
2013, Volume 13, Issue 1
- 5-23 The role of online health information in the lives of Finns aged 65 to 79 years
by Kristina Eriksson-Backa - 24-41 Virtual health coaching for consumers: a persuasive systems design perspective
by Tuomas Lehto & Harri Oinas-Kukkonen & Timo Pätiälä & Osmo Saarelma - 42-65 Participatory networks for place safety and livability: organisational success factors
by Francesca Ricciardi & Cecilia Rossignoli & Marco De Marco - 66-80 Using cluster analysis to identify weak signals of lethal trends in aviation and healthcare documentation
by Olli Sjöblom & Laura-Maria Murtola & Juho Heimonen & Lotta Kauhanen & Veronika Laippala & Heljä Lundgren-Laine & Tapio Salakoski & Sanna Salanterä - 81-100 Information systems in hospitals: a review article from a nursing management perspective
by Laura-Maria Murtola & Heljä Lundgrén-Laine & Sanna Salanterä
2013, Volume 12, Issue 4
- 283-309 VE architect-driven partner selection: ontology-based approach
by Alireza Khoshkbarforoushha & Masoumeh Tajvidi & Mehrnoush Shamsfard & Mohammad Aghdasi - 310-330 A conceptual meta-framework for managing multicultural global virtual teams
by M. Reza Hosseini & Jian Zuo & Nicholas Chileshe & Bassam Baroudi