Content
June 2021, Volume 23, Issue 3
- 561-573 Interactions between Analysts in Developing Collaborative Conceptual Models
by Palash Bera - 575-595 An Architecture Framework Approach for Complex Transport Projects
by Farid Shirvani & Ghassan Beydoun & Pascal Perez & William Scott & Peter Campbell - 597-597 Correction to: An Architecture Framework Approach for Complex Transport Projects
by Farid Shirvani & Ghassan Beydoun & Pascal Perez & William Scott & Peter Campbell - 599-605 Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices’ Workflow
by Kim Fecher & Lauren McCarthy & Daniel E. Porreca & Niam Yaraghi - 607-626 Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context
by Mengyue Wang & Xin Li & Patrick Y. K. Chau - 627-647 Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process
by Mahesh Balan U & Saji K. Mathew - 649-661 Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance
by Hung-Pin Shih & Pei-Chen Sung - 663-680 From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs
by Federico Iannacci & Colm Fearon & Kristine Pole - 681-694 Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing
by Yen-Chun Chou & Benjamin B. M. Shao - 695-707 Vector Gravitation Clustering Networks
by Zong-chang Yang - 709-722 Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters
by Adarsh Anand & Navneet Bhatt & Omar H. Alhazmi - 723-751 Reddit: Affordances as an Enabler for Shifting Loyalties
by Naveena Prakasam & Louisa Huxtable-Thomas - 753-772 OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs
by Amit V. Deokar & Jie Tao - 773-790 Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
by Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li - 791-805 An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis
by A. Geethapriya & S. Valli
April 2021, Volume 23, Issue 2
- 263-267 Seeking Foundations for the Science of Cyber Security
by Shouhuai Xu & Moti Yung & Jingguo Wang - 269-283 HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
by Xin Huang & Fei Yan & Liqiang Zhang & Kai Wang - 285-298 LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling
by Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu - 299-315 DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification
by Krishna Chandra Roy & Qian Chen - 317-327 Incentive Mechanism for Rational Miners in Bitcoin Mining Pool
by Gang Xue & Jia Xu & Hanwen Wu & Weifeng Lu & Lijie Xu - 329-341 Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
by Mario Silic & Paul Benjamin Lowry - 343-360 Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity
by A. J. Burns & Clay Posey & Tom L. Roberts - 361-373 The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
by Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo - 375-389 Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach
by Qi Liu & Gengzhong Feng & Giri Kumar Tayi & Jun Tian - 391-414 Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems
by Stephan Berger & Björn Häckel & Lukas Häfner - 415-433 Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?
by Tan Trung Luong & Uthayasankar Sivarajah & Vishanth Weerakkody - 435-452 The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation
by Supavich Fone Pengnate & Rathindra Sarathy & Todd J. Arnold - 453-475 Accommodating Practices During Episodes of Disillusionment with Mobile IT
by Efpraxia D. Zamani & Nancy Pouloudi & George Giaglis & Jonathan Wareham - 477-494 Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets
by Benjamin Clapham & Michael Siering & Peter Gomber - 495-513 Towards Increased Understanding of Open Data Use for Software Development
by Maciej Grzenda & Jaroslaw Legierski
February 2021, Volume 23, Issue 1
- 1-7 Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science
by Silvia Chiusano & Tania Cerquitelli & Robert Wrembel & Daniele Quercia - 9-33 Quarry: A User-centered Big Data Integration Platform
by Petar Jovanovic & Sergi Nadal & Oscar Romero & Alberto Abelló & Besim Bilalli - 35-51 Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks
by Pietro Michiardi & Damiano Carra & Sara Migliorini - 53-69 Multi-view Latent Learning Applied to Fashion Industry
by Giovanni Battista Gardino & Rosa Meo & Giuseppe Craparotta - 71-80 Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition
by Aria Ghora Prabono & Bernardo Nugroho Yahya & Seok-Lyong Lee - 81-100 TextBenDS: a Generic Textual Data Benchmark for Distributed Systems
by Ciprian-Octavian Truică & Elena-Simona Apostol & Jérôme Darmont & Ira Assent - 101-114 GarNLP: A Natural Language Processing Pipeline for Garnishment Documents
by Ilaria Bordino & Andrea Ferretti & Francesco Gullo & Stefano Pascolutti - 115-134 Mining Social Networks to Detect Traffic Incidents
by Sebastián Vallejos & Diego G. Alonso & Brian Caimmi & Luis Berdun & Marcelo G. Armentano & Álvaro Soria - 135-149 A Twitter-Based Study of the European Internet of Things
by Funda Ustek-Spilda & Davide Vega & Matteo Magnani & Luca Rossi & Irina Shklovski & Sebastian Lehuede & Alison Powell - 151-164 Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom
by Davy Preuveneers & Giuseppe Garofalo & Wouter Joosen - 165-183 Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing
by Abdallah Khelil & Amin Mesmoudi & Jorge Galicia & Ladjel Bellatreche & Mohand-Saïd Hacid & Emmanuel Coquery - 185-201 NetDER: An Architecture for Reasoning About Malicious Behavior
by Jose N. Paredes & Gerardo I. Simari & Maria Vanina Martinez & Marcelo A. Falappa - 203-226 TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes
by Amine Ghrab & Oscar Romero & Sabri Skhiri & Esteban Zimányi - 227-241 Towards End-to-End Multilingual Question Answering
by Ekaterina Loginova & Stalin Varanasi & Günter Neumann - 243-262 An Approach to Extracting Topic-guided Views from the Sources of a Data Lake
by Claudia Diamantini & Paolo Lo Giudice & Domenico Potena & Emanuele Storti & Domenico Ursino
December 2020, Volume 22, Issue 6
- 1265-1274 A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles
by Jorge Martinez-Gil & Alejandra Lorena Paoletti & Mario Pichler - 1275-1290 Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective
by Fereshteh Ghahramani & Jingguo Wang - 1291-1304 TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition
by DunLu Peng & YinRui Wang & Cong Liu & Zhang Chen - 1305-1321 Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender
by Samar Mouakket & Yuan Sun - 1323-1342 A Predictive Analytics-Based Decision Support System for Drug Courts
by Hamed M. Zolbanin & Dursun Delen & Durand Crosby & David Wright - 1343-1356 Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs
by Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan - 1357-1376 Understanding Factors Influencing Employees’ Consumptive and Contributive Use of Enterprise Social Networks
by Pei Yee Chin & Nina Evans & Charles Zhechao Liu & Kim-Kwang Raymond Choo - 1377-1418 RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers
by Lawrence Bunnell & Kweku-Muata Osei-Bryson & Victoria Y. Yoon - 1419-1431 Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation
by Kai Klinker & Manuel Wiesche & Helmut Krcmar - 1433-1445 Institutional Perspectives on the Process of Enterprise Architecture Adoption
by Duong Dang & Samuli Pekkola - 1447-1465 Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing
by Yong Sun & Wenan Tan - 1467-1485 An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain
by Juan Du & Hengqing Jing & Kim-Kwang Raymond Choo & Vijayan Sugumaran & Daniel Castro-Lacouture - 1487-1504 Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations
by Guilherme C. Wiedenhöft & Edimara M. Luciano & Gabriela V. Pereira - 1505-1518 Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method
by Wafa Bouaynaya - 1519-1537 Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans
by Amit Rathee & Jitender Kumar Chhabra - 1539-1559 Using Mobile Phone Data for Emergency Management: a Systematic Literature Review
by Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo - 1561-1567 Quantum Secured Internet Transport
by Bernardo A. Hubermann & Bob Lund & Jing Wang
October 2020, Volume 22, Issue 5
- 1001-1007 Heuristic Acquisition for Data Science
by Lydia Bouzar-Benlabiod & Stuart H. Rubin - 1009-1019 A Hybrid Bi-level Metaheuristic for Credit Scoring
by Doruk Şen & Cem Çağrı Dönmez & Umman Mahir Yıldırım - 1021-1037 Event Study and Principal Component Analysis Based on Sentiment Analysis – A Combined Methodology to Study the Stock Market with an Empirical Study
by Qianwen Xu & Victor Chang & Ching-Hsien Hsu - 1039-1051 Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods
by Mohammed Kuko & Mohammad Pourhomayoun - 1053-1066 Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification
by Haiman Tian & Shu-Ching Chen & Mei-Ling Shyu - 1067-1083 Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE
by Salima Smiti & Makram Soui - 1085-1093 Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions
by Narges Manouchehri & Hieu Nguyen & Pantea Koochemeshkian & Nizar Bouguila & Wentao Fan - 1095-1111 An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering
by Sabin Kafle & Nisansa Silva & Dejing Dou - 1113-1131 The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data
by Justin M. Johnson & Taghi M. Khoshgoftaar - 1133-1161 A Hybrid Genetic Algorithm for Software Architecture Re-Modularization
by Lifeng Mu & Vijayan Sugumaran & Fangyuan Wang - 1163-1178 How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics
by Matti Mäntymäki & Sami Hyrynsalmi & Antti Koskenvoima - 1179-1201 Eliciting Process Knowledge Through Process Stories
by Pedro Antunes & Jose A. Pino & Mary Tate & Alistair Barros - 1203-1226 The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis
by Elvira Ismagilova & Emma L. Slade & Nripendra P. Rana & Yogesh K. Dwivedi - 1227-1240 Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective
by Emmanuel W. Ayaburi & Jaeung Lee & Michele Maasberg - 1241-1264 A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness
by Hwee-Joo Kam & Thomas Mattson & Sanjay Goel
August 2020, Volume 22, Issue 4
- 791-802 Policy and Information Systems Implementation: the Greek Property Tax Information System Case
by Dimosthenis Anagnostopoulos & Thanos Papadopoulos & Teta Stamati & Maria Elisavet Balta - 803-814 Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market
by Irfan Kanat & T. S. Raghu & Ajay Vinzé - 815-827 Information Matters: an Empirical Study of the Efficiency of On-Demand Services
by Hongyan Dai & Ling Ge & Yali Liu - 829-842 A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things
by Qinghua Zheng & Chutong Yang & Haijun Yang & Jianhe Zhou - 843-862 An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME)
by Hua Dai & A. F. Salam - 863-880 Information-Theoretic Remodularization of Object-Oriented Software Systems
by Amarjeet Prajapati & Jitender Kumar Chhabra - 881-895 Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees’ Perceptions of Presenteeism: from Both Individual and Social Perspectives
by Jinbi Yang & Chunxiao Yin - 897-909 An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407
by Rohit Valecha - 911-925 An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking
by Yulei Gavin Zhang & Mandy Yan Dang & Hsinchun Chen - 927-945 From Agile to DevOps: Smart Skills and Collaborations
by Aymeric Hemon & Barbara Lyonnet & Frantz Rowe & Brian Fitzgerald - 947-960 Optimal Piracy Control: Should a Firm Implement Digital Rights Management?
by Dan Wu & Guofang Nan & Minqiang Li - 961-983 Citizen Science: An Information Quality Research Frontier
by Roman Lukyanenko & Andrea Wiggins & Holly K. Rosser - 985-999 Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services
by Ramzi El-Haddadeh
June 2020, Volume 22, Issue 3
- 529-532 Being (more) Human in a Digitized World
by Priya Seetharaman & Saji K. Mathew & Maung K. Sein & Ravindra Babu Tallamraju - 533-547 “Can Computer Based Human-Likeness Endanger Humanness?” – A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can’t Have”
by Jaana Porra & Mary Lacity & Michael S. Parks - 549-562 Non-addictive Information Systems
by Simon Kloker - 563-583 Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users’ Perception of Group Harmony
by Kiljae Lee & Kyung Young Lee & Lorn Sheehan - 585-605 Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India
by Linus Kendall & Bidisha Chaudhuri & Apoorva Bhalla - 607-631 The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India
by Abhipsa Pal & Rahul De’ & Tejaswini Herath - 633-653 Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized
by Rishikesan Parthiban & Israr Qureshi & Somprakash Bandyopadhyay & Babita Bhatt & Saravana Jaikumar - 655-670 Information Exchange Architecture for Collaborative Industrial Ecosystem
by Petri Kannisto & David Hästbacka & Arto Marttinen - 671-671 Correction to: Information Exchange Architecture for Collaborative Industrial Ecosystem
by Petri Kannisto & David Hästbacka & Arto Marttinen - 673-695 The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study
by Jyoti Choudrie & Sutee Pheeraphuttranghkoon & Soheil Davari - 697-718 Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system
by Yan (Mandy) Dang & Yulei (Gavin) Zhang & Susan A. Brown & Hsinchun Chen - 719-734 An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management
by Chul Woo Yoo - 735-747 Clinical Decision Support System for Managing COPD-Related Readmission Risk
by C. Derrick Huang & Jahyun Goo & Ravi S. Behara & Ankur Agarwal - 749-770 Technology as a Disruptive Agent: Intergenerational Perspectives
by Kamran Mahroof & Vishanth Weerakkody & Dilek Onkal & Zahid Hussain - 771-787 Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network
by Ehsan Alirezaei & Saeed Parsa - 789-789 RETRACTED ARTICLE: A systematic review on post-implementation evaluation models of enterprise architecture artefacts
by Fatemeh Nikpay & Rodina Ahmad & Babak Darvish Rouhani & Shahaboddin Shamshirband
April 2020, Volume 22, Issue 2
- 275-280 The Search for Smartness in Working, Living and Organising: Beyond the ‘Technomagic’
by Amany Elbanna & Yogesh Dwivedi & Deborah Bunker & David Wastell - 281-298 Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems
by Peter M. Bednar & Christine Welch - 299-313 Data Governance as a Collective Action Problem
by Olivia Benfeldt & John Stouby Persson & Sabine Madsen - 315-337 Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing
by Prabhsimran Singh & Yogesh K. Dwivedi & Karanjeet Singh Kahlon & Ravinder Singh Sawhney & Ali Abdallah Alalwan & Nripendra P. Rana - 339-351 Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication
by Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel - 353-364 Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital
by Bendik Bygstad & Egil Øvrelid & Thomas Lie & Magnus Bergquist - 365-380 Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman
by Khalid Alzadjali & Amany Elbanna - 381-393 Making Sense of Smartness in the Context of Smart Devices and Smart Systems
by Steven Alter - 395-409 Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics
by Stefan Stieglitz & Christian Meske & Björn Ross & Milad Mirbabaie - 411-427 Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness
by Abdullah Mohammed Baabdullah - 429-453 Being useful: How information systems professionals influence the use of information systems in enterprises
by Hadi Karimikia & Narges Safari & Harminder Singh - 455-474 Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective
by Alan Serrano & Javier Garcia-Guzman & Georgios Xydopoulos & Ali Tarhini - 475-487 Initial Evidence on the Impact of Big Data Implementation on Firm Performance
by Cheng-Kui Huang & Tawei Wang & Tzu-Yen Huang - 489-507 Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution
by Paul Rimba & An Binh Tran & Ingo Weber & Mark Staples & Alexander Ponomarev & Xiwei Xu - 509-510 Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution
by Paul Rimba & An Binh Tran & Ingo Weber & Mark Staples & Alexander Ponomarev & Xiwei Xu - 511-528 E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives
by Thompson S. H. Teo & Sojung Lucia Kim & Li Jiang
February 2020, Volume 22, Issue 1
- 1-9 ISF Editorial 2020
by R. Ramesh & H. R. Rao - 11-15 The Productivity Vampires
by John Leslie King & Andrew J. Ehrenberg - 17-22 Analyzing Cryptocurrencies
by Xiaofan Li & Andrew B. Whinston - 23-27 Emerging Frontiers in Smart Environment and Healthcare – A Vision
by Satyen Mukherjee - 29-35 Blockchain in Context
by Andrew J. Ehrenberg & John Leslie King - 37-43 A Quantum Router For The Entangled Web
by Bernardo A. Huberman & Bob Lund - 45-57 Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
by Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim - 59-75 Presenting Cloud Business Performance for Manufacturing Organizations
by Victor Chang - 77-90 Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location
by Lina Zhou & Uchechukwuka Amadi & Dongsong Zhang - 91-111 U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality
by Ravi Thambusamy & Prashant Palvia - 113-130 Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM)
by Kichan Nam & Jeff Baker & Norita Ahmad & Jahyun Goo - 131-148 Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach
by Federico Cabitza & Angela Locoro & Carlo Batini - 149-170 Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging Services
by Xiuyuan Gong & Matthew K. O. Lee & Zhiying Liu & Xiabing Zheng - 171-185 Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by Jongwoo Kim & Richard L. Baskerville & Yi Ding - 187-201 Interdependency Analysis in Security Investment against Strategic Attacks
by Mansooreh Ezhei & Behrouz Tork Ladani - 203-219 Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives
by Andy Weeger & Xuequn Wang & Heiko Gewald & Mahesh Raisinghani & Otavio Sanchez & Gerald Grant & Siddhi Pittayachawan - 221-242 Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
by Martin (Dae Youp) Kang & Anat Hovav - 243-257 Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model
by Carlos Tam & Diogo Santos & Tiago Oliveira - 259-271 Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective
by Jun Sun - 273-273 Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules
by Chichang Jou
December 2019, Volume 21, Issue 6
- 1203-1205 Editorial: Special issue on cyber security, privacy and ethics of information systems
by Alessandro Acquisti & Tamara Dinev & Mark Keil - 1207-1212 Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith
by Mark Keil & Mary Culnan & Tamara Dinev & Heng Xu - 1213-1229 Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study
by Emmanuel W. Ayaburi & James Wairimu & Francis Kofi Andoh-Baidoo - 1231-1250 Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers
by Henner Mohr & Zhiping Walter - 1251-1264 Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development
by Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi - 1265-1284 A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
by Simon Trang & Benedikt Brendel - 1285-1305 Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments
by Margareta Heidt & Jin P. Gerlach & Peter Buxmann - 1307-1324 How Data Protection Regulation Affects Startup Innovation
by Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind - 1325-1344 Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation
by Venugopal Gopalakrishna-Remani & Robert Paul Jones & Kerri M. Camp - 1345-1355 An AHP-IFT Integrated Model for Performance Evaluation of E-Commerce Web Sites
by Babak Daneshvar Rouyendegh & Kazim Topuz & Ali Dag & Asil Oztekin - 1357-1368 Assimilation of Big Data Innovation: Investigating the Roles of IT, Social Media, and Relational Capital
by Pratyush Bharati & Abhijit Chaudhury - 1369-1384 Individual Decision-Performance Using Spatial Decision Support Systems: A Geospatial Reasoning Ability and Perceived Task-Technology Fit Perspective
by Michael A. Erskine & Dawn G. Gregg & Jahangir Karimi & Judy E. Scott - 1385-1419 Do we Fully Understand Information Systems Failure? An Exploratory Study of the Cognitive Schema of IS Professionals
by Jong Uk Kim & Rajiv Kishore
October 2019, Volume 21, Issue 5
- 959-977 A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
by Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan - 979-995 DPRel: A Meta-Path Based Relevance Measure for Mining Heterogeneous Networks
by Mukul Gupta & Pradeep Kumar & Bharat Bhasker - 997-1018 Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance
by Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla - 1019-1030 Don’t Disturb Me! Understanding the Impact of Interruptions on Knowledge Work: an Exploratory Neuroimaging Study
by Pankush Kalgotra & Ramesh Sharda & Roger McHaney - 1031-1043 Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective
by Mousa Albashrawi & Luvai Motiwalla - 1045-1068 Examining Consumers’ Behavioral Intention in O2O Commerce from a Relational Perspective: an Exploratory Study
by Lin Xiao & Chuanmin Mi & Yucheng Zhang & Jing Ma - 1069-1083 Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect
by Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang - 1085-1110 Real World User Model: Evolution of User Modeling Triggered by Advances in Wearable and Ubiquitous Computing
by Federica Cena & Silvia Likavec & Amon Rapp - 1111-1135 An Empirical Review of the Connection Between Model Viewer Characteristics and the Comprehension of Conceptual Process Models
by Jan Mendling & Jan Recker & Hajo A. Reijers & Henrik Leopold - 1137-1151 The Impact of Emotion: A Blended Model to Estimate Influence on Social Media
by Wei-Lun Chang - 1153-1166 A Novel Group Ownership Delegate Protocol for RFID Systems
by Cheng-Chi Lee & Chun-Ta Li & Chung-Lun Cheng & Yan-Ming Lai & Athanasios V. Vasilakos - 1167-1185 Formal Model of Business Processes Integrated with Business Rules
by Krzysztof Kluza & Grzegorz J. Nalepa - 1187-1201 Exploring Gender Differences in Online Consumer Purchase Decision Making: An Online Product Presentation Perspective
by Xiaolin Lin & Mauricio Featherman & Stoney L. Brooks & Nick Hajli
August 2019, Volume 21, Issue 4
- 735-742 Leveraging Data Analytics for Behavioral Research
by Luvai Motiwalla & Amit V. Deokar & Surendra Sarnikar & Angelika Dimoka - 743-760 Social Media for Nowcasting Flu Activity: Spatio-Temporal Big Data Analysis
by Amir Hassan Zadeh & Hamed M. Zolbanin & Ramesh Sharda & Dursun Delen - 761-772 Investigating Users’ Tagging Behavior in Online Academic Community Based on Growth Model: Difference between Active and Inactive Users
by Yunhong Xu & Dehu Yin & Duanning Zhou - 773-790 Self-Reported and Computer-Recorded Experience in Mobile Banking: a Multi-Phase Path Analytic Approach
by Mousa Albashrawi & Hasan Kartal & Asil Oztekin & Luvai Motiwalla - 791-814 Understanding the Impact of Immersion and Authenticity on Satisfaction Behavior in Learning Analytics Tasks
by Suning Zhu & Ashish Gupta & David Paradice & Casey Cegielski - 815-827 Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling
by Sujeet Kumar Sharma - 829-844 The Economic Value of Online User Reviews with Ad Spending on Movie Box-Office Sales
by Young-Jin Lee & Kellie B. Keeling & Andrew Urbaczewski - 845-860 Exploring the Contingent Effect of Community Equity on Users’ Intention to Share Information
by Kristijan Mirkovski & Chunxiao Yin & Libo Liu & Jinbi Yang - 861-875 Differential cloud adoption: A comparative case study of large enterprises and SMEs in Germany
by Surya Karunagaran & Saji K Mathew & Franz Lehner - 877-908 Lack of Communication and Collaboration in Enterprise Architecture Development
by Negin Banaeianjahromi & Kari Smolander - 909-924 Digital Occupational Health Systems: What Do Employees Think about it?
by Maedeh Yassaee & Tobias Mettler - 925-939 GLORY: Exploration and integration of global and local correlations to improve personalized online social recommendations
by Mingxin Gan & Lily Sun & Rui Jiang - 941-955 Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis
by Duy Dang-Pham & Siddhi Pittayachawan & Vince Bruno & Karlheinz Kautz - 957-957 Erratum to: Online knowledge sharing mechanisms: A systematic review of the state of the art literature and recommendations for future research
by Yeganeh Charband & Nima Jafari Navimipour
June 2019, Volume 21, Issue 3
- 495-501 Moving beyond Smart Cities: Digital Nations for Social Innovation & Sustainability
by Arpan Kumar Kar & Vigneswara Ilavarasan & M. P. Gupta & Marijn Janssen & Ravi Kothari - 503-525 Barriers to the Development of Smart Cities in Indian Context
by Nripendra P. Rana & Sunil Luthra & Sachin Kumar Mangla & Rubina Islam & Sian Roderick & Yogesh K. Dwivedi - 527-545 Value Co-Creation as a Dialectical Process: Study in Bangladesh and Indian Province of West Bengal
by Mizan Rahman & Sunny Bose & Mujahid Mohiuddin Babu & Bidit Lal Dey & Sanjit Kumar Roy & Ben Binsardi - 547-564 Leveraging Smart Supply Chain and Information System Agility for Supply Chain Flexibility
by Shivam Gupta & Vinayak A. Drave & Surajit Bag & Zongwei Luo - 565-580 Farmer Cooperatives’ Intention to Adopt Agricultural Information Technology—Mediating Effects of Attitude
by Ya-na Wang & Lifu Jin & Hanping Mao - 581-604 Assessing the Gap between Technology and the Environmental Sustainability of European Cities
by Adeoluwa Akande & Pedro Cabral & Sven Casteleyn - 605-620 Design of an O2O Citizen Participation Ecosystem for Sustainable Governance
by Jingrui Ju & Luning Liu & Yuqiang Feng - 621-634 Transnational Digital Identity as an Instrument for Global Digital Citizenship: The Case of Estonia’s E-Residency
by Piia Tammpuu & Anu Masso - 635-659 Balancing Digital-By-Default with Inclusion: A Study of the Factors Influencing E-Inclusion in the UK
by Ahlam Al-Muwil & Vishanth Weerakkody & Ramzi El-haddadeh & Yogesh Dwivedi - 661-685 Classification of Smart City Research - a Descriptive Literature Review and Future Research Agenda
by Parul Gupta & Sumedha Chauhan & M. P. Jaiswal - 687-702 Composing Scientific Collaborations Based on Scholars’ Rank in Hypergraph
by Fahimeh Ghasemian & Kamran Zamanifar & Nasser Ghasem-Aghaee - 703-718 Applying Social Interaction Theory to Negotiation Modeling: Design of E-negotiation System
by Bo Yu & Rustam Vahidov - 719-734 Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model
by Yogesh K. Dwivedi & Nripendra P. Rana & Anand Jeyaraj & Marc Clement & Michael D. Williams
April 2019, Volume 21, Issue 2
- 229-240 Dynamic network analysis of online interactive platform
by Mehmet N. Aydin & N. Ziya Perdahci - 241-259 Task scheduling algorithms for multi-cloud systems: allocation-aware approach
by Sanjaya K. Panda & Indrajeet Gupta & Prasanta K. Jana - 261-300 Enterprise security investment through time when facing different types of vulnerabilities
by Yosra Miaoui & Noureddine Boudriga