Content
February 2019, Volume 21, Issue 1
- 163-174 Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules
by Chichang Jou - 175-189 Discovering composable web services using functional semantics and service dependencies based on natural language requests
by Sowmya Kamath S & Ananthanarayana V. S. - 191-212 An information integration and transmission model of multi-source data for product quality and safety
by Yingcheng Xu & Li Wang & Bo Xu & Wei Jiang & Chaoqun Deng & Fang Ji & Xiaobo Xu - 213-227 An examination of the long-term business value of investments in information technology
by Vincent J. Shea & Kevin E. Dow & Alain Yee-Loong Chong & Eric W. T. Ngai
December 2018, Volume 20, Issue 6
- 1153-1156 Guest Editorial: Behavioral-Data Mining in Information Systems and the Big Data Era
by Ludovico Boratto & Salvatore Carta & Andreas Kaltenbrunner & Matteo Manca - 1157-1171 TV-Program Retrieval and Classification: A Comparison of Approaches based on Machine Learning
by Fedelucio Narducci & Cataldo Musto & Marco Gemmis & Pasquale Lops & Giovanni Semeraro - 1173-1189 User Personality and User Satisfaction with Recommender Systems
by Tien T. Nguyen & F. Maxwell Harper & Loren Terveen & Joseph A. Konstan - 1191-1202 Scaling Up Integrated Structural and Content-Based Network Analysis
by Jennifer Golbeck & Jeff Gerhard & Farrah O’Colman & Ryan O’Colman - 1203-1218 The Impact of Geographic Distance on Online Social Interactions
by David Laniado & Yana Volkovich & Salvatore Scellato & Cecilia Mascolo & Andreas Kaltenbrunner - 1219-1240 Inducing Personalities and Values from Language Use in Social Network Communities
by Upendra Kumar & Aishwarya N. Reganti & Tushar Maheshwari & Tanmoy Chakroborty & Björn Gambäck & Amitava Das - 1241-1265 Personality, User Preferences and Behavior in Recommender systems
by Raghav Pavan Karumur & Tien T. Nguyen & Joseph A. Konstan - 1267-1280 The contributing factors of continuance usage of social media: An empirical analysis
by Efosa Carroll Idemudia & Mahesh S. Raisinghani & Olusola Samuel-Ojo - 1281-1296 Middleware for mobile medical data management with minimal latency
by Richard K. Lomotey & Ralph Deters - 1297-1317 Examining the infusion of mobile technology by healthcare practitioners in a hospital setting
by Yvonne O’ Connor & Philip O’ Reilly - 1319-1344 A structural-semantic web service selection approach to improve retrievability of web services
by Martin Garriga & Alan De Renzis & Ignacio Lizarralde & Andres Flores & Cristian Mateos & Alejandra Cechich & Alejandro Zunino - 1345-1361 Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK
by Roya Gholami & Alemayehu Molla & Suparna Goswami & Christopher Brewster - 1363-1379 Crowdsourcing roles, methods and tools for data-intensive disaster management
by Marta Poblet & Esteban García-Cuesta & Pompeu Casanovas - 1381-1404 A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa
by Humphrey M. Sabi & Faith-Michael E. Uzoka & Kehbuma Langmia & Felix N. Njeh & Clive K. Tsuma
October 2018, Volume 20, Issue 5
- 901-907 Exploitation of Social Media for Emergency Relief and Preparedness: Recent Research and Trends
by Saptarshi Ghosh & Kripabandhu Ghosh & Debasis Ganguly & Tanmoy Chakraborty & Gareth J. F. Jones & Marie-Francine Moens & Muhammad Imran - 909-923 Emergency Vocabulary
by Dávid Márk Nemeskey & András Kornai - 925-932 An Embedding Based IR Model for Disaster Situations
by Ayan Bandyopadhyay & Debasis Ganguly & Mandar Mitra & Sanjoy Kumar Saha & Gareth J.F. Jones - 933-948 Classifying and Summarizing Information from Microblogs During Epidemics
by Koustav Rudra & Ashish Sharma & Niloy Ganguly & Muhammad Imran - 949-959 Weakly Supervised and Online Learning of Word Models for Classification to Detect Disaster Reporting Tweets
by Girish Keshav Palshikar & Manoj Apte & Deepak Pandita - 961-979 Analysis and Early Detection of Rumors in a Post Disaster Scenario
by Tamal Mondal & Prithviraj Pramanik & Indrajit Bhattacharya & Naiwrita Boral & Saptarshi Ghosh - 981-992 A New Mashup Based Method for Event Detection from Social Media
by Abir Troudi & Corinne Amel Zayani & Salma Jamoussi & Ikram Amous Ben Amor - 993-1011 CrisMap: a Big Data Crisis Mapping System Based on Damage Detection and Geoparsing
by Marco Avvenuti & Stefano Cresci & Fabio Del Vigna & Tiziano Fagni & Maurizio Tesconi - 1013-1025 Regional Sentiment Bias in Social Media Reporting During Crises
by Karin Sim Smith & Richard McCreadie & Craig Macdonald & Iadh Ounis - 1027-1039 Information Needs and Communication Gaps between Citizens and Local Governments Online during Natural Disasters
by Lingzi Hong & Cheng Fu & Jiahui Wu & Vanessa Frias-Martinez - 1041-1052 Uncovering the effect of dominant attributes on community topology: A case of facebook networks
by Yi-Shan Sung & Dashun Wang & Soundar Kumara - 1053-1074 Multimode co-clustering for analyzing terrorist networks
by Ahmed Aleroud & Aryya Gangopadhyay - 1075-1095 Facilitating resource sharing and selection in ubiquitous multi-user environments
by Kimberly García & Sonia Mendoza & Dominique Decouchant & Patrick Brézillon - 1097-1116 What could possibly go wrong? A multi-panel Delphi study of organizational social media risk
by Paul M. Gangi & Allen C. Johnston & James L. Worrell & Samuel C. Thompson - 1117-1133 Exploring knowledge management software implementation from a knowing-in-practice perspective
by Khuong Le-Nguyen & Romano Dyerson & G. Harindranath - 1135-1151 WebMAC: A web based clinical expert system
by Saba Bashir & Usman Qamar & Farhan Hassan Khan
August 2018, Volume 20, Issue 4
- 649-652 Disaster Management and Information Systems: Insights to Emerging Challenges
by Ghassan Beydoun & Sergiu Dascalu & Dale Dominey-Howes & Andrew Sheehan - 653-667 A Capability Assessment Model for Emergency Management Organizations
by Xinzhi Wang & Vijayan Sugumaran & Hui Zhang & Zheng Xu - 669-692 Is the Frontier Shifting into the Right Direction? A Qualitative Analysis of Acceptance Factors for Novel Firefighter Information Technologies
by Julian Weidinger & Sebastian Schlauderer & Sven Overhage - 693-711 Social Roles and Consequences in Using Social Media in Disasters: a Structurational Perspective
by Fang Liu & Dongming Xu - 713-728 Participation Patterns and Reliability of Human Sensing in Crowd-Sourced Disaster Management
by Robert I. Ogie & Hugh Forehead & Rodney J. Clarke & Pascal Perez - 729-740 Institutional vs. Non-institutional use of Social Media during Emergency Response: A Case of Twitter in 2014 Australian Bush Fire
by Babak Abedin & Abdul Babar - 741-757 Modeling human behavior during emergency evacuation using intelligent agents: A multi-agent simulation approach
by Sharad Sharma & Kola Ogunlana & David Scribner & Jock Grynovicki - 759-782 Robust Platelet Logistics Planning in Disaster Relief Operations Under Uncertainty: a Coordinated Approach
by Afshin Kamyabniya & M. M. Lotfi & Mohsen Naderpour & Yuehwern Yih - 783-802 Agent-Based Knowledge Analysis Framework in Disaster Management
by Dedi Iskandar Inan & Ghassan Beydoun & Simon Opper - 803-824 MobileCDP: A mobile framework for the consumer decision process
by Suleyman Ozarslan & P. Erhan Eren - 825-839 Behavioral data mining to produce novel and serendipitous friend recommendations in a social bookmarking system
by Matteo Manca & Ludovico Boratto & Salvatore Carta - 841-862 An impactful crowdsourcing intermediary design - a case of a service imagery crowdsourcing system
by Soe-Tsyr Daphne Yuan & Ching-Fang Hsieh - 863-882 Practical parallel string matching framework for RDF entailments with GPUs
by Chidchanok Choksuchat & Chantana Chantrapornchai - 883-899 An approach to evaluate large-scale ICT training interventions
by Silvana Rossy Brito & Aleksandra Socorro da Silva & Eulália Carvalho Mata & Nandamudi Lankalapalli Vijaykumar & Cláudio Alex Jorge Rocha & Maurílio Abreu Monteiro & João Crisóstomo Weyl Albuquerque Costa & Carlos Renato Lisboa Francês
June 2018, Volume 20, Issue 3
- 419-423 Social Media: The Good, the Bad, and the Ugly
by Yogesh K. Dwivedi & Gerald Kelly & Marijn Janssen & Nripendra P. Rana & Emma L. Slade & Marc Clement - 425-437 The Perils and Promises of Self-Disclosure on Social Media
by Michelle Richey & Aparna Gonibeed & M. N. Ravishankar - 439-456 Enhancing Organisational Competitiveness Via Social Media - a Strategy as Practice Perspective
by Shirumisha Kwayu & Banita Lal & Mumin Abubakre - 457-469 A Process Pattern Model for Tackling and Improving Big Data Quality
by Agung Wahyudi & George Kuk & Marijn Janssen - 471-483 Sharing of Sponsored Advertisements on Social Media: A Uses and Gratifications Perspective
by Cherniece J. Plume & Emma L. Slade - 485-501 Sharing Political Content in Online Social Media: A Planned and Unplanned Behaviour Approach
by Mohammad Alamgir Hossain & Yogesh K. Dwivedi & Caroline Chan & Craig Standing & Abdus-Samad Olanrewaju - 503-514 The Impact of Social Media on Consumers’ Acculturation and Purchase Intentions
by Hatice Kizgin & Ahmad Jamal & Bidit Lal Dey & Nripendra P. Rana - 515-530 Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing
by Reema Aswani & Arpan Kumar Kar & P. Vigneswara Ilavarasan - 531-558 Advances in Social Media Research: Past, Present and Future
by Kawaljeet Kaur Kapoor & Kuttimani Tamilmani & Nripendra P. Rana & Pushp Patil & Yogesh K. Dwivedi & Sridhar Nerur - 559-576 Analysis of Factors that Influence Customers’ Willingness to Leave Big Data Digital Footprints on Social Media: A Systematic Review of Literature
by Syed Sardar Muhammad & Bidit Lal Dey & Vishanth Weerakkody - 577-588 Predicting movie success with machine learning techniques: ways to improve accuracy
by Kyuhan Lee & Jinsoo Park & Iljoo Kim & Youngseok Choi - 589-616 Fostering distributed business logic in Open Collaborative Networks: an integrated approach based on semantic and swarm coordination
by Francesco P. Appio & Mario G. C. A. Cimino & Alessandro Lazzeri & Antonella Martini & Gigliola Vaglini - 617-625 Product recommendation with latent review topics
by Juheng Zhang & Selwyn Piramuthu - 627-645 Peas and carrots just because they are green? Operational fit between green supply chain management and green information system
by Zhaojun Yang & Jun Sun & Yali Zhang & Ying Wang - 647-647 Correction to: Reliable and efficient big service selection
by Lin Huang & Qinglin Zhao & Yan Li & Shangguang Wang & Lei Sun & Wu Chou
April 2018, Volume 20, Issue 2
- 185-194 Big Data & Analytics for Societal Impact: Recent Research and Trends
by Ashish Gupta & Amit Deokar & Lakshmi Iyer & Ramesh Sharda & Dave Schrader - 195-207 A comparative analysis of semi-supervised learning: The case of article selection for medical systematic reviews
by Jun Liu & Prem Timsina & Omar El-Gayar - 209-222 The impact of big data analytics on firms’ high value business performance
by Aleš Popovič & Ray Hackney & Rana Tassabehji & Mauro Castelli - 223-238 Information fusion-based meta-classification predictive modeling for ETF performance
by Asil Oztekin - 239-257 Keep the conversations going: engagement-based customer segmentation on online social service platforms
by Nripesh Trivedi & Daniel Adomako Asamoah & Derek Doran - 259-274 Project description and crowdfunding success: an exploratory study
by Mi (Jamie) Zhou & Baozhou Lu & Weiguo (Patrick) Fan & G. Alan Wang - 275-288 Enabling self-service BI: A methodology and a case study for a model management warehouse
by David Schuff & Karen Corral & Robert D. St. Louis & Greg Schymik - 289-302 A conceptual framework for quality healthcare accessibility: a scalable approach for big data technologies
by Miloslava Plachkinova & Au Vo & Rahul Bhaskar & Brian Hilton - 303-309 Comment on “A Conceptual Framework for Quality Healthcare Accessibility: a Scalable Approach for Big Data Technologies”
by Paul L. Delamater - 311-314 Response to Delamater’s Comment on “A Conceptual Framework for Quality Healthcare Accessibility: A Scalable Approach for Big Data Technologies”
by Miloslava Plachkinova & Au Vo & Brian Hilton & Rahul Bhaskar - 315-341 Scaling for agility: A reference model for hybrid traditional-agile software development methodologies
by Asif Qumer Gill & Brian Henderson-Sellers & Mahmood Niazi - 343-371 Business process flexibility - a systematic literature review with a software systems perspective
by Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re - 373-399 Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment
by Sanjaya K. Panda & Prasanta K. Jana - 401-416 A multi-objective model for discovering high-quality knowledge based on data quality and prior knowledge
by Qi Liu & Gengzhong Feng & Nengmin Wang & Giri Kumar Tayi - 417-417 Erratum to: Weighted subspace modeling for semantic concept retrieval using gaussian mixture models
by Chao Chen & Mei-Ling Shyu & Shu-Ching Chen
February 2018, Volume 20, Issue 1
- 1-6 Advances in Databases and Information Systems
by Ladjel Bellatreche & Patrick Valduriez & Tadeusz Morzy - 7-19 Dependency modelling for inconsistency management in Digital Preservation – The PERICLES approach
by Nikolaos Lagos & Marina Riga & Panagiotis Mitzias & Jean-Yves Vion-Dury & Efstratios Kontopoulos & Simon Waddington & Pip Laurenson & Georgios Meditskos & Ioannis Kompatsiaris - 21-43 ETL workflow reparation by means of case-based reasoning
by Artur Wojciechowski - 45-61 Robust and simple database evolution
by Kai Herrmann & Hannes Voigt & Jonas Rausch & Andreas Behrend & Wolfgang Lehner - 63-90 Evaluating Queries and Updates on Big XML Documents
by Nicole Bidoit & Dario Colazzo & Noor Malla & Carlo Sartiani - 91-110 Privacy and biometrics: An empirical examination of employee concerns
by Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg - 111-124 Leveraging clustering to improve collaborative filtering
by Nima Mirbakhsh & Charles X. Ling - 125-142 Designing a goal-oriented smart-home environment
by Javier Palanca & Elena del Val & Ana Garcia-Fornes & Holger Billhardt & Juan Manuel Corchado & Vicente Julián - 143-160 A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
by Bahador Shojaiemehr & Marjan Kuchaki Rafsanjani - 161-161 Erratum to: A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
by Bahador Shojaiemehr & Marjan Kuchaki Rafsanjani - 163-181 Intention to Use a Mobile-Based Information Technology Solution for Tuberculosis Treatment Monitoring – Applying a UTAUT Model
by Ravi Seethamraju & Krishna Sundar Diatha & Shashank Garg - 183-183 Erratum to: Intention to Use a Mobile-Based Information Technology Solution for Tuberculosis Treatment Monitoring – Applying a UTAUT Model
by Ravi Seethamraju & Krishna Sundar Diatha & Shashank Garg
December 2017, Volume 19, Issue 6
- 1229-1232 Big Data Analytics and Business Intelligence in Industry
by Shih-Chia Huang & Suzanne McIntosh & Stanislav Sobolevsky & Patrick C. K. Hung - 1233-1241 Revealing determinant factors for early breast cancer recurrence by decision tree
by Jimin Guo & Benjamin C. M. Fung & Farkhund Iqbal & Peter J. K. Kuppen & Rob A. E. M. Tollenaar & Wilma E. Mesker & Jean-Jacques Lebrun - 1243-1259 Grammatical facial expression recognition in sign language discourse: a study at the syntax level
by Fernando A. Freitas & Sarajane M. Peres & Clodoaldo A. M. Lima & Felipe V. Barbosa - 1261-1271 How user relationships affect user perceived value propositions of enterprises on social commerce platforms
by Chengde Zheng & Xiaofeng Yu & Qiming Jin - 1273-1282 Reliable and efficient big service selection
by Ling Huang & Qinglin Zhao & Yan Li & Shangguang Wang & Lei Sun & Wu Chou - 1283-1299 The design of a cloud-based tracker platform based on system-of-systems service architecture
by Victor W. Chu & Raymond K. Wong & Chi-Hung Chi & Wei Zhou & Ivan Ho - 1301-1309 Analyzing social choice and group ranking of online games for product mix innovation
by Wei-Feng Tung & Yu-Jei Lan - 1311-1327 Crowdsourcing social network service for social enterprise innovation
by Wei-Feng Tung & Guillaume Jordann - 1329-1342 A study on the author collaboration network in big data
by Yufang Peng & Jin Shi & Marcelo Fantinato & Jing Chen - 1343-1356 Fraud detection using fraud triangle risk factors
by Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen - 1357-1372 A fast and scalable approach for IoT service selection based on a physical service model
by Xiongnan Jin & Sejin Chun & Jooik Jung & Kyong-Ho Lee - 1373-1390 Adaptive approach to restraining content pollution in peer-to-peer networks
by Mohammed Hawa & Raed Al-Zubi & Khalid A. Darabkh & Ghazi Al-Sukkar - 1391-1405 A cultural theory analysis of e-government: Insights from a local government council in Malaysia
by Stephen Jackson & Meng Seng Wong - 1407-1422 A little Birdie told me: Social media, organizational legitimacy, and underpricing in initial public offerings
by Leif W. Lundmark & Chong Oh & J. Cameron Verhaal - 1423-1443 Mining variable fragments from process event logs
by Asef Pourmasoumi & Mohsen Kahani & Ebrahim Bagheri
October 2017, Volume 19, Issue 5
- 969-974 Guest Editorial: Computational Intelligence and Applications
by Vijayan Sugumaran & T. V. Geetha & D. Manjula & Hema Gopal - 975-991 A fuzzy long-term investment planning model for a GenCo in a hybrid electricity market considering climate change impacts
by Berna Tektas Sivrikaya & Ferhan Cebi & Hasan Hüseyin Turan & Nihat Kasap & Dursun Delen - 993-1012 Data properties and the performance of sentiment classification for electronic commerce applications
by Youngseok Choi & Habin Lee - 1013-1028 Improving the freshness of the search engines by a probabilistic approach based incremental crawler
by G. Pavai & T. V. Geetha - 1029-1038 Building spatial temporal relation graph of concepts pair using web repository
by Zheng Xu & Junyu Xuan & Yunhuai Liu & Kim-Kwang Raymond Choo & Lin Mei & Chuanping Hu - 1039-1056 An enhanced text detection technique for the visually impaired to read text
by S. P. Faustina Joan & S. Valli - 1057-1066 The resource allocation model for multi-process instances based on particle swarm optimization
by Weidong Zhao & Qingfeng Zeng & Guangjian Zheng & Liu Yang - 1067-1084 A model of biomimetic process assets to simulate their impact on strategic goals
by Maria-Isabel Sanchez-Segura & German-Lenin Dugarte-Peña & Fuensanta Medina-Dominguez & Alejandro Ruiz-Robles - 1085-1099 Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques
by Sebastian Büsch & Volker Nissen & Arndt Wünscher - 1101-1121 Design it like Darwin - A value-based application of evolutionary algorithms for proper and unambiguous business process redesign
by Patrick Afflerbach & Martin Hohendorf & Jonas Manderscheid - 1123-1132 An evolutionary system for ozone concentration forecasting
by Mauro Castelli & Ivo Gonçalves & Leonardo Trujillo & Aleš Popovič - 1133-1148 The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance
by Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen - 1149-1160 The effects of ubiquitous healthcare service on the south Korean Economy: using input–output analysis
by Yong Jin Kim & Chan Young Kim & Yong Jae Shin - 1161-1176 Index partitioning through a bipartite graph model for faster similarity search in recommendation systems
by Ali Cevahir - 1177-1190 Interactive UHF/UWB RFID tag for mass customization
by Jue Shen & Baghaei-Nejad Majid & Li Xie & Jia Mao & Zhibo Pang & Yi Feng & Lida Xu & Hannu Tenhunen & Zhuo Zou & Lirong Zheng - 1191-1203 Motivations for 21st century school children to bring their own device to school
by Nathan Hopkins & Mary Tate & Allan Sylvester & David Johnstone - 1205-1228 Economic valuation for information security investment: a systematic literature review
by Daniel Schatz & Rabih Bashroush
August 2017, Volume 19, Issue 4
- 699-703 Special issue on smart, connected hospitality and tourism
by Chulmo Koo & Francesco Ricci & Cihan Cobanoglu & Fevzi Okumus - 705-715 A review of audio guides in the era of smart tourism
by Seung Jae Lee - 717-729 The acceptance of ‘intelligent trade shows’: Visitors’ evaluations of IS innovation
by Sunyoung Hlee & Jimin Lee & Daeseop Moon & Changsok Yoo - 731-742 Enhancing the smart tourism experience through geotag
by Namho Chung & Inessa Tyan & Heejeong Han - 743-752 Conceptual foundations of a landmark personality scale based on a destination personality scale: Text mining of online reviews
by Seung-Hun Shin & Sung-Byung Yang & Kichan Nam & Chulmo Koo - 753-767 Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework
by Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh - 769-785 Beyond utilitarian factors: User experience and travel company website successes
by Marya Wani & Vishnupriya Raghavan & Dolphy Abraham & Virginia Kleist - 787-802 Factors affecting the performance of internal control task team in high-tech firms
by Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja - 803-818 A game-theoretic evaluation of an ISP business model in caching
by Jörn Künsemöller & Nan Zhang & Kimmo Berg & João Soares - 819-833 Empirical assessment of the accuracy of an interoperability prediction language
by Johan Ullberg & Pontus Johnson - 835-854 Assessing the pattern between economic and digital development of countries
by Frederico Cruz-Jesus & Tiago Oliveira & Fernando Bacao & Zahir Irani - 855-868 Geometry-based propagation of temporal constraints
by Zhaoyu Li & Rui Xu & Pingyuan Cui & Lida Xu & Wu He - 869-880 Performance measurement of e-learning using student satisfaction analysis
by Miroslava Raspopovic & Aleksandar Jankulovic - 881-897 Consumer decision support systems for novice buyers – a design science approach
by Heng Tang & Chang Boon Patrick Lee & Kwee Keong Choong - 899-922 A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
by Michaela Sprenger & Tobias Mettler & Robert Winter - 923-923 Erratum to: A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
by Michaela Sprenger & Tobias Mettler & Robert Winter - 925-943 Ontology-based data mining model management for self-service knowledge discovery
by Yan Li & Manoj A. Thomas & Kweku-Muata Osei-Bryson - 945-953 A rapid maneuver path planning method with complex sensor pointing constraints in the attitude space
by Rui Xu & Changqing Wu & Shengying Zhu & Baodong Fang & Wei Wang & Lida Xu & Wu He - 955-968 Doctor-patient interaction in telemedicine: Logic of choice and logic of care perspectives
by Rajesh Chandwani & Rahul De’
June 2017, Volume 19, Issue 3
- 421-424 Information systems, agency problems, and fraud
by Douglas Cumming & Sofia Johan & Denis Schweizer - 425-441 Who can get money? Evidence from the Chinese peer-to-peer lending platform
by Qizhi Tao & Yizhe Dong & Ziming Lin - 443-455 Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests
by Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao - 457-467 An event based approach for quantifying the effects of securities fraud in the IT industry
by Lorne N. Switzer & Jun Wang - 469-479 Timely vs. delayed CEO turnover
by Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu - 481-507 Enhancing service system design: An entity interaction pattern approach
by Soe-Tsyr Daphne Yuan & Shiou-Tian Hsu - 509-524 Organizational information security as a complex adaptive system: insights from three agent-based models
by A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara - 525-548 Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation
by Lingling Gao & Kerem Aksel Waechter - 549-568 Citizens’ adoption of an electronic government system: towards a unified view
by Nripendra P. Rana & Yogesh K. Dwivedi & Banita Lal & Michael D. Williams & Marc Clement - 569-576 Developing an employee turnover risk evaluation model using case-based reasoning
by Xin Wang & Li Wang & Li Zhang & Xiaobo Xu & Weiyong Zhang & Yingcheng Xu - 577-591 IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea
by Sojung Lucia Kim & Thompson S.H. Teo & Anol Bhattacherjee & Kichan Nam - 593-610 It governance in the public sector: a conceptual model
by Adriano Olímpio Tonelli & Paulo Henrique Souza Bermejo & Pâmela Aparecida dos Santos & Larissa Zuppo & André Luiz Zambalde - 611-623 The effect of malicious manipulations on prediction market accuracy
by Patrick Buckley & Fergal O’Brien - 625-644 Integrating switching costs to information systems adoption: An empirical study on learning management systems
by Yan Mandy Dang & Yulei Gavin Zhang & James Morgan - 645-667 Business-to-business e-commerce adoption: An empirical investigation of business factors
by Narasimhaiah Gorla & Ananth Chiravuri & Ravi Chinta - 669-697 Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML
by Ting Li & Zongmin Ma
April 2017, Volume 19, Issue 2
- 187-188 Professor Kenneth Arrow and Information Systems Frontiers: In memoriam
by Ram Ramesh & H. Raghav Rao - 189-195 Driving public sector innovation using big and open linked data (BOLD)
by Marijn Janssen & David Konopnicki & Jane L. Snowdon & Adegboyega Ojo - 197-212 Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling
by Yogesh K. Dwivedi & Marijn Janssen & Emma L. Slade & Nripendra P. Rana & Vishanth Weerakkody & Jeremy Millard & Jan Hidders & Dhoya Snijders - 213-229 Delivering public value through open government data initiatives in a Smart City context
by Gabriela Viale Pereira & Marie Anne Macadar & Edimara M. Luciano & Maurício Gregianin Testa - 231-251 Harnessing the social web to enhance insights into people’s opinions in business, government and public administration
by Aaron W. Baur - 253-266 Integrating data from user activities of social networks into public administrations
by Marcel Rosenberger & Christiane Lehrer & Reinhard Jung - 267-283 Big data in the public sector: Uncertainties and readiness
by Bram Klievink & Bart-Jan Romijn & Scott Cunningham & Hans Bruijn - 285-300 Open data and its usability: an empirical view from the Citizen’s perspective
by Vishanth Weerakkody & Zahir Irani & Kawal Kapoor & Uthayasankar Sivarajah & Yogesh K. Dwivedi - 301-319 Estimating participants for knowledge-intensive tasks in a network of crowdsourcing marketplaces
by Yiwei Gong - 321-336 Challenges and opportunities in renovating public sector information by enabling linked data and analytics
by Spiros Mouzakitis & Dimitris Papaspyros & Michael Petychakis & Sotiris Koussouris & Anastasios Zafeiropoulos & Eleni Fotopoulou & Lena Farid & Fabrizio Orlandi & Judie Attard & John Psarras - 337-360 Open data value capability architecture
by Fatemeh Ahmadi Zeleti & Adegboyega Ojo - 361-375 The role of civil society groups in improving access to the DC-CAN
by Siddhartha Menon - 377-396 Leader’s dilemma game: An experimental design for cyber insider threat research
by Shuyuan Mary Ho & Merrill Warkentin - 397-409 Pair programming teams and high-quality knowledge sharing: A comparative study of coopetitive reward structures
by Shahla Ghobadi & John Campbell & Stewart Clegg - 411-420 Do big data support TV viewing rate forecasting? A case study of a Korean TV drama
by Jongchang Ahn & Kyungran Ma & Ook Lee & Suaini Sura
February 2017, Volume 19, Issue 1
- 1-12 Optimal scheduling across public and private clouds in complex hybrid cloud environment
by Li Chunlin & Li LaYuan - 13-30 Antecedents of ERP assimilation and its impact on ERP value: A TOE-based model and empirical test
by Wenjuan Xu & Peiyu Ou & Weiguo Fan - 31-56 What you think and what I think: Studying intersubjectivity in knowledge artifacts evaluation
by Dmytro Babik & Rahul Singh & Xia Zhao & Eric W. Ford - 57-73 Organizational implications of a comprehensive approach for cloud-storage sourcing
by Venkataraghavan Krishnaswamy & R. P. Sundarraj - 75-89 Integrating implicit feedbacks for time-aware web service recommendations
by Gang Tian & Jian Wang & Keqing He & Chengai Sun & Yuan Tian - 91-107 Supply chain intelligence for electricity markets: A smart grid perspective
by Jelena Lukić & Miloš Radenković & Marijana Despotović-Zrakić & Aleksandra Labus & Zorica Bogdanović - 109-127 Extracting the patterns of truthfulness from political information systems in Serbia
by Nenad Tomašev - 129-148 OptiPres: a distributed mobile agent decision support system for optimal patient drug prescription
by Kevin Miller & Gunjan Mansingh - 149-163 A hybrid approach for personalized service staff recommendation
by Wei-Lun Chang & Chien-Fang Jung - 165-185 New knowledge in strategic management through visually mining semantic networks
by Gürdal Ertek & Gül Tokdemir & Mete Sevinç & Murat Mustafa Tunç
December 2016, Volume 18, Issue 6
- 1035-1039 A special issue on knowledge and competence management: Developing Enterprise solutions
by José Braga Vasconcelos & Chris Kimble & Álvaro Rocha - 1041-1049 Uncovering hidden process assets: A case study
by Maria-Isabel Sánchez-Segura & Alejandro Ruiz-Robles & Fuensanta Medina-Dominguez - 1051-1061 Information management model for competencies and learning outcomes in an educational context
by Maria José Angélico Gonçalves & Álvaro Rocha & Manuel Pérez Cota - 1063-1084 A system framework for gamified Cost Engineering
by Eric Zimmerling & Patrick J. Höflinger & Philipp G. Sandner & Isabell M. Welpe - 1085-1102 Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS
by Mohammed Nassim Lacheheub & Ramdane Maamri - 1103-1117 Employee knowledge profiles – a mixed-research methods approach
by Maria José Sousa & Miguel González-Loureiro - 1119-1130 Competence management in knowledge intensive organizations using consensual knowledge and ontologies
by Chris Kimble & José Braga Vasconcelos & Álvaro Rocha - 1131-1151 Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research
by Yeganeh Charband & Nima Jafari Navimipour - 1153-1163 Using serious games to manage knowledge and competencies: The seven-step development process
by Oihab Allal-Chérif & Marc Bidan & Mohamed Makhlouf - 1165-1189 Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD
by Hsin Hsin Chang & Yao-Chuan Tsai & Chen-Su Fu & Shu-Hui Chen & Yao Peng - 1191-1203 Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds
by Ikram Bououd & Sana Rouis Skandrani & Imed Boughzala & Mohamed MAKHLOUF - 1205-1215 The value of the CIO in the top management team on performance in the case of information security breaches
by Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson - 1217-1231 The development and application of e-Geoscience in China
by Yunqiang Zhu & Peng Pan & Shifeng Fang & Li Xu & Jia Song & Jinqu Zhang & Min Feng - 1233-1249 XHQE: A hybrid system for scalable selectivity estimation of XML queries
by E.-S. M. El-Alfy & S. Mohammed & A. F. Barradah - 1251-1263 Understanding governance, risk and compliance information systems (GRC IS): The experts view
by Anastasia Papazafeiropoulou & Konstantina Spanaki - 1265-1283 Correlates of using the billing system of a mobile network operator to pay for digital goods and services
by Torsten J. Gerpott & Phil Meinert