Content
June 2017, Volume 19, Issue 3
- 669-697 Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML
by Ting Li & Zongmin Ma
April 2017, Volume 19, Issue 2
- 187-188 Professor Kenneth Arrow and Information Systems Frontiers: In memoriam
by Ram Ramesh & H. Raghav Rao - 189-195 Driving public sector innovation using big and open linked data (BOLD)
by Marijn Janssen & David Konopnicki & Jane L. Snowdon & Adegboyega Ojo - 197-212 Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling
by Yogesh K. Dwivedi & Marijn Janssen & Emma L. Slade & Nripendra P. Rana & Vishanth Weerakkody & Jeremy Millard & Jan Hidders & Dhoya Snijders - 213-229 Delivering public value through open government data initiatives in a Smart City context
by Gabriela Viale Pereira & Marie Anne Macadar & Edimara M. Luciano & Maurício Gregianin Testa - 231-251 Harnessing the social web to enhance insights into people’s opinions in business, government and public administration
by Aaron W. Baur - 253-266 Integrating data from user activities of social networks into public administrations
by Marcel Rosenberger & Christiane Lehrer & Reinhard Jung - 267-283 Big data in the public sector: Uncertainties and readiness
by Bram Klievink & Bart-Jan Romijn & Scott Cunningham & Hans Bruijn - 285-300 Open data and its usability: an empirical view from the Citizen’s perspective
by Vishanth Weerakkody & Zahir Irani & Kawal Kapoor & Uthayasankar Sivarajah & Yogesh K. Dwivedi - 301-319 Estimating participants for knowledge-intensive tasks in a network of crowdsourcing marketplaces
by Yiwei Gong - 321-336 Challenges and opportunities in renovating public sector information by enabling linked data and analytics
by Spiros Mouzakitis & Dimitris Papaspyros & Michael Petychakis & Sotiris Koussouris & Anastasios Zafeiropoulos & Eleni Fotopoulou & Lena Farid & Fabrizio Orlandi & Judie Attard & John Psarras - 337-360 Open data value capability architecture
by Fatemeh Ahmadi Zeleti & Adegboyega Ojo - 361-375 The role of civil society groups in improving access to the DC-CAN
by Siddhartha Menon - 377-396 Leader’s dilemma game: An experimental design for cyber insider threat research
by Shuyuan Mary Ho & Merrill Warkentin - 397-409 Pair programming teams and high-quality knowledge sharing: A comparative study of coopetitive reward structures
by Shahla Ghobadi & John Campbell & Stewart Clegg - 411-420 Do big data support TV viewing rate forecasting? A case study of a Korean TV drama
by Jongchang Ahn & Kyungran Ma & Ook Lee & Suaini Sura
February 2017, Volume 19, Issue 1
- 1-12 Optimal scheduling across public and private clouds in complex hybrid cloud environment
by Li Chunlin & Li LaYuan - 13-30 Antecedents of ERP assimilation and its impact on ERP value: A TOE-based model and empirical test
by Wenjuan Xu & Peiyu Ou & Weiguo Fan - 31-56 What you think and what I think: Studying intersubjectivity in knowledge artifacts evaluation
by Dmytro Babik & Rahul Singh & Xia Zhao & Eric W. Ford - 57-73 Organizational implications of a comprehensive approach for cloud-storage sourcing
by Venkataraghavan Krishnaswamy & R. P. Sundarraj - 75-89 Integrating implicit feedbacks for time-aware web service recommendations
by Gang Tian & Jian Wang & Keqing He & Chengai Sun & Yuan Tian - 91-107 Supply chain intelligence for electricity markets: A smart grid perspective
by Jelena Lukić & Miloš Radenković & Marijana Despotović-Zrakić & Aleksandra Labus & Zorica Bogdanović - 109-127 Extracting the patterns of truthfulness from political information systems in Serbia
by Nenad Tomašev - 129-148 OptiPres: a distributed mobile agent decision support system for optimal patient drug prescription
by Kevin Miller & Gunjan Mansingh - 149-163 A hybrid approach for personalized service staff recommendation
by Wei-Lun Chang & Chien-Fang Jung - 165-185 New knowledge in strategic management through visually mining semantic networks
by Gürdal Ertek & Gül Tokdemir & Mete Sevinç & Murat Mustafa Tunç
December 2016, Volume 18, Issue 6
- 1035-1039 A special issue on knowledge and competence management: Developing Enterprise solutions
by José Braga Vasconcelos & Chris Kimble & Álvaro Rocha - 1041-1049 Uncovering hidden process assets: A case study
by Maria-Isabel Sánchez-Segura & Alejandro Ruiz-Robles & Fuensanta Medina-Dominguez - 1051-1061 Information management model for competencies and learning outcomes in an educational context
by Maria José Angélico Gonçalves & Álvaro Rocha & Manuel Pérez Cota - 1063-1084 A system framework for gamified Cost Engineering
by Eric Zimmerling & Patrick J. Höflinger & Philipp G. Sandner & Isabell M. Welpe - 1085-1102 Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS
by Mohammed Nassim Lacheheub & Ramdane Maamri - 1103-1117 Employee knowledge profiles – a mixed-research methods approach
by Maria José Sousa & Miguel González-Loureiro - 1119-1130 Competence management in knowledge intensive organizations using consensual knowledge and ontologies
by Chris Kimble & José Braga Vasconcelos & Álvaro Rocha - 1131-1151 Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research
by Yeganeh Charband & Nima Jafari Navimipour - 1153-1163 Using serious games to manage knowledge and competencies: The seven-step development process
by Oihab Allal-Chérif & Marc Bidan & Mohamed Makhlouf - 1165-1189 Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD
by Hsin Hsin Chang & Yao-Chuan Tsai & Chen-Su Fu & Shu-Hui Chen & Yao Peng - 1191-1203 Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds
by Ikram Bououd & Sana Rouis Skandrani & Imed Boughzala & Mohamed MAKHLOUF - 1205-1215 The value of the CIO in the top management team on performance in the case of information security breaches
by Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson - 1217-1231 The development and application of e-Geoscience in China
by Yunqiang Zhu & Peng Pan & Shifeng Fang & Li Xu & Jia Song & Jinqu Zhang & Min Feng - 1233-1249 XHQE: A hybrid system for scalable selectivity estimation of XML queries
by E.-S. M. El-Alfy & S. Mohammed & A. F. Barradah - 1251-1263 Understanding governance, risk and compliance information systems (GRC IS): The experts view
by Anastasia Papazafeiropoulou & Konstantina Spanaki - 1265-1283 Correlates of using the billing system of a mobile network operator to pay for digital goods and services
by Torsten J. Gerpott & Phil Meinert
October 2016, Volume 18, Issue 5
- 819-823 Towards common reusable semantics
by Thouraya Bouabana-Tebibel & Stuart H. Rubin - 825-853 Ranking software components for reuse based on non-functional properties
by Marcus Kessel & Colin Atkinson - 855-875 Investigation of feature run-time conflicts on goal model-based reuse
by Mustafa Berk Duran & Gunter Mussbacher - 877-889 Weighted subspace modeling for semantic concept retrieval using gaussian mixture models
by Chao Chen & Mei-Ling Shyu & Shu-Ching Chen - 891-908 Semantic weaving of configuration fragments into a consistent system configuration
by Azadeh Jahanbanifar & Ferhat Khendek & Maria Toeroe - 909-925 Formal modelling and analysis of Bitflips in ARM assembly code
by René Rydhof Hansen & Kim Guldstrand Larsen & Mads Chr. Olesen & Erik Ramsgaard Wognsen - 927-952 Two CEGAR-based approaches for the safety verification of PLC-controlled plants
by Johanna Nellen & Kai Driessen & Martin Neuhäußer & Erika Ábrahám & Benedikt Wolters - 953-965 Foundations of reusable and interoperable facet models using category theory
by Daniel R. Harris - 967-980 An algebra of temporal faults
by André Didier & Alexandre Mota - 981-994 On the empirical justification of theoretical heuristic transference and learning
by Stuart H. Rubin & Thouraya Bouabana-Tebibel & Yasmine Hoadjli - 995-1020 Compliance management ontology – a shared conceptualization for research and practice in compliance management
by Norris Syed Abdullah & Marta Indulska & Shazia Sadiq - 1021-1034 Drivers of mobile payment acceptance: The impact of network externalities
by Ajao Qasim & Emad Abu-Shanab
August 2016, Volume 18, Issue 4
- 639-643 Guest editorial: web of things
by Quan Z. Sheng & Xue Li & Anne H.H. Ngu & Yongrui Qin & Dong Xie - 645-663 Developing and validating a model explaining the assimilation process of RFID: An empirical study
by Mohammad Alamgir Hossain & Mohammed Quaddus & Nazrul Islam - 665-677 A security-and quality-aware system architecture for Internet of Things
by Sabrina Sicari & Cinzia Cappiello & Francesco Pellegrini & Daniele Miorandi & Alberto Coen-Porisini - 679-691 Semantic catalog of things, services, and data to support a wind data management facility
by E. G. Stephan & T. O. Elsethagen & L. K. Berg & M. C. Macduff & P. R. Paulson & W. J. Shaw & C. Sivaraman & W. P. Smith & A. Wynne - 693-710 Assessing the role of IT-enabled process virtualization on green IT adoption
by Manoj Thomas & Daniela Costa & Tiago Oliveira - 711-716 Identity management based on PCA and SVM
by Lixin Shen & Hong Wang & Li Da Xu & Xue Ma & Sohail Chaudhry & Wu He - 717-734 Properties that influence business process management maturity and its effect on organizational performance
by Remco Dijkman & Sander Vincent Lammers & Ad Jong - 735-764 A formulation of computational trust based on quantum decision theory
by Mehrdad Ashtiani & Mohammad Abdollahi Azgomi - 765-780 A complex event processing approach to detect abnormal behaviours in the marine environment
by Fernando Terroso-Saenz & Mercedes Valdes-Vela & Antonio F. Skarmeta-Gomez - 781-818 CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises
by Maxime Bernaert & Geert Poels & Monique Snoeck & Manu Backer
June 2016, Volume 18, Issue 3
- 407-411 Emerging service orientations and transformations (SOT)
by Haluk Demirkan & James C. Spohrer - 413-428 Smart CloudBench—A framework for evaluating cloud infrastructure performance
by Mohan Baruwal Chhetri & Sergei Chichin & Quoc Bao Vo & Ryszard Kowalczyk - 429-455 Normative requirements for regulatory compliance: An abstract formal framework
by Mustafa Hashmi & Guido Governatori & Moe Thandar Wynn - 457-478 iSIM: An integrated design method for commercializing service innovation
by Eng K. Chew - 479-497 From product-centric to customer-centric services in a financial institution – exploring the organizational challenges of the transition process
by Olivera Marjanovic & Vijaya Murthy - 499-510 SOA in practice – a study of governance aspects
by George Joukhadar & Fethi Rabhi - 511-528 Enabling user-driven rule management in event data analysis
by Weisi Chen & Fethi A. Rabhi - 529-540 An awareness-based meta-mechanism for e-commerce buyer coalitions
by Laor Boongasame & Farhad Daneshgar - 541-564 A theory building study of enterprise architecture practices and benefits
by Ralph Foorthuis & Marlies Steenbergen & Sjaak Brinkkemper & Wiel A. G. Bruls - 565-578 A new method to identify collaborative partners in social service provider networks
by Yong Sun & Wenan Tan & Lingxia Li & Weiming Shen & Zhuming Bi & Xiaoming Hu - 579-595 Web personalization for user acceptance of technology: An empirical investigation of E-government services
by Vinodh Krishnaraju & Saji K Mathew & Vijayan Sugumaran - 597-619 Persuasive narrative advertisement generator: A microenterprise service innovation perspective
by Soe-Tsyr Daphne Yuan & Peng-Wei Chiu - 621-638 Information and Knowledge Leakage in Supply Chain
by Kim Hua Tan & W. P. Wong & Leanne Chung
April 2016, Volume 18, Issue 2
- 233-235 Big data and analytics in healthcare: Introduction to the special section
by Atreyi Kankanhalli & Jungpil Hahn & Sharon Tan & Gordon Gao - 237-252 Advanced analytics for the automation of medical systematic reviews
by Prem Timsina & Jun Liu & Omar El-Gayar - 253-263 A study on the antecedents of healthcare information protection intention
by Chang-Gyu Yang & Hee-Jun Lee - 265-275 Examining online consumers’ initial trust building from an elaboration likelihood model perspective
by Tao Zhou & Yaobin Lu & Bin Wang - 277-292 Engineering of web services for internet of things applications
by Evelina Pencheva & Ivaylo Atanasov - 293-314 Consumer adoption of RFID-enabled services. Applying an extended UTAUT model
by Herbjørn Nysveen & Per Egil Pedersen - 315-332 Service delivery through mobile-government (mGov): Driving factors and cultural impacts
by Mahmud Akhter Shareef & Vinod Kumar & Yogesh K. Dwivedi & Uma Kumar - 333-348 Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency
by Kishor Vaidya & John Campbell - 349-358 Computationally efficient ontology selection in software requirement planning
by R. B. K. Brown & G. Beydoun & G. Low & W. Tibben & R. Zamani & F. García-Sánchez & R. Martinez-Bejar - 359-405 Business process compliance checking – applying and evaluating a generic pattern matching approach for conceptual models in the financial sector
by Jörg Becker & Patrick Delfmann & Hanns-Alexander Dietrich & Matthias Steinhorst & Mathias Eggert
February 2016, Volume 18, Issue 1
- 1-6 Collaboration technology in teams and organizations: Introduction to the special issue
by Gert-Jan Vreede & Pedro Antunes & Julita Vassileva & Marco Aurélio Gerosa & Kewen Wu - 7-21 Understanding student participation in undergraduate course communities: A case study
by Francisco J. Gutierrez & Sergio F. Ochoa & Gustavo Zurita & Nelson Baloian - 23-46 A dependency taxonomy for agile software development projects
by Diane E. Strode - 47-68 Factors influencing the decision to crowdsource: A systematic literature review
by Nguyen Hoang Thuan & Pedro Antunes & David Johnstone - 69-84 Creating a family of collaborative applications for emergency management in the firefighting sub-domain
by Pedro O. Rossel & Valeria Herskovic & Erika Ormeño - 85-102 Boundary objects in collaborative work and learning
by Mikhail Fominykh & Ekaterina Prasolova-Førland & Monica Divitini & Sobah Abbas Petersen - 103-123 Designing for geo-referenced in-situ therapeutic scenarios
by Luís Duarte & Luís Carriço - 125-144 Achieving better usability of software supporting learning activities of large groups
by Nelson Baloian & Gustavo Zurita - 145-158 Providing awareness, explanation and control of personalized filtering in a social networking site
by Sayooran Nagulendra & Julita Vassileva - 159-170 A survey of edge-preserving image denoising methods
by Paras Jain & Vipin Tyagi - 171-204 Using model transformation to refactor use case models based on antipatterns
by Yasser A. Khan & Mohamed El-Attar - 205-231 Optimization of generic progressive queries based on dependency analysis and materialized views
by Chao Zhu & Qiang Zhu & Calisto Zuzarte & Wenbin Ma
December 2015, Volume 17, Issue 6
- 1191-1194 Special section on business process analytics
by Karl R. Lang & Vojislav B. Misic & Leon J. Zhao - 1195-1208 An intelligent approach to data extraction and task identification for process mining
by Jiexun Li & Harry Jiannan Wang & Xue Bai - 1209-1226 Semantics-based event log aggregation for process mining and analytics
by Amit V. Deokar & Jie Tao - 1227-1238 Examining micro-level knowledge sharing discussions in online communities
by G. Alan Wang & Xiaomo Liu & Jianling Wang & Min Zhang & Weiguo Fan - 1239-1251 The classification of hackers by knowledge exchange behaviors
by Xiong Zhang & Alex Tsang & Wei T. Yue & Michael Chau - 1253-1264 Workflow-aware attention tracking to enhance collaboration management
by Shaokun Fan & Lele Kang & J. Leon Zhao - 1265-1282 Collaborative personal profiling for web service ranking and recommendation
by Wenge Rong & Baolin Peng & Yuanxin Ouyang & Kecheng Liu & Zhang Xiong - 1283-1299 E-commerce web site loyalty: A cross cultural comparison
by Jengchung Victor Chen & David C. Yen & Wannasri Pornpriphet & Andree E. Widjaja - 1301-1311 Rough set based classification of real world Web services
by Hala S. Own & Hamdi Yahyaoui - 1313-1333 The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis
by Pekka Kekolahti & Juuso Karikoski & Antti Riikonen - 1335-1352 Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations
by Heng-Li Yang & August F. Y. Chao - 1353-1367 Diffusion of deception in social media: Social contagion effects and its antecedents
by Arun Vishwanath - 1369-1380 RFID in production and service systems: Technology, applications and issues
by Nilgun Fescioglu-Unver & Sung Hee Choi & Dongmok Sheen & Soundar Kumara - 1381-1400 Estimating trust value: A social network perspective
by Wei-Lun Chang & Arleen N. Diaz & Patrick C. K. Hung - 1401-1425 The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling
by Jan Claes & Irene Vanderfeesten & Frederik Gailly & Paul Grefen & Geert Poels
October 2015, Volume 17, Issue 5
- 983-986 Advances in secure knowledge management in the big data era
by Chittaranjan Hota & Shambhu Upadhyaya & Jamal Nazzal Al-Karaki - 987-995 Surviving advanced persistent threats in a distributed environment – Architecture and analysis
by Ruchika Mehresh & Shambhu Upadhyaya - 997-1005 Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013
by Jaeung Lee & Manish Agrawal & H. R. Rao - 1007-1015 Secure and privacy preserving data processing support for active authentication
by Yan Sun & Shambhu Upadhyaya - 1017-1028 Game-theoretic strategies for IDS deployment in peer-to-peer networks
by Pratik Narang & Chittaranjan Hota - 1029-1037 Analysis of a multistage attack embedded in a video file
by Hiran V. Nath & B. M. Mehtre - 1039-1056 Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service
by Kawaljeet Kaur Kapoor & Yogesh K. Dwivedi & Michael D. Williams - 1057-1076 Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts
by Mohammad Alamgir Hossain & Mohammed Quaddus - 1077-1095 Social balance in signed networks
by Xiaolong Zheng & Daniel Zeng & Fei-Yue Wang - 1097-1110 Does better Internet access lead to more adoption? A new empirical study using household relocation
by Junzhao Ma & Qingyi Huang - 1111-1132 Measurements of mislead threshold of company graph distortion
by Shaio Yan Huang & Tung-Hsien Wu & An-An Chiu & David C. Yen - 1133-1144 How business process reengineering affects information technology investment and employee performance under different performance measurement
by Shaio Yan Huang & Chao-Hsiung Lee & An-An Chiu & David C. Yen - 1145-1160 Addressing the valuation problem in multi-round combinatorial auctions
by Soumyakanti Chakraborty & Anup K. Sen & Amitava Bagchi - 1161-1176 IPTV parental control: A collaborative model for the Social Web
by Ana Fernández-Vilas & Rebeca P. Díaz-Redondo & Sandra Servia-Rodríguez - 1177-1190 Understanding health information technology adoption: A synthesis of literature from an activity perspective
by Jun Sun & Zhe Qu
August 2015, Volume 17, Issue 4
- 707-711 Special issue on agreement technologies
by Carlos Iván Chesñevar & Eva Onaindia & Sascha Ossowski & George Vouros - 713-724 Reasoning about reasons behind preferences using modal logic
by Truls Pedersen & Sjur Dyrkolbotn & Thomas Ågotnes - 725-742 Reasoning about the impacts of information sharing
by Yuqing Tang & Federico Cerutti & Nir Oren & Chatschik Bisdikian - 743-762 Subjective logic operators in trust assessment: an empirical study
by Federico Cerutti & Lance M. Kaplan & Timothy J. Norman & Nir Oren & Alice Toniolo - 763-778 From roles to standards: a dynamic maintenance approach using incentives
by Ramón Hermoso & Henrique Lopes Cardoso & Maria Fasli - 779-798 An ontological-based knowledge-representation formalism for case-based argumentation
by Stella Heras & Vicente Botti & Vicente Julián - 799-808 Service discovery acceleration with hierarchical clustering
by Zijie Cong & Alberto Fernandez & Holger Billhardt & Marin Lujak - 809-825 On the inaccuracy of numerical ratings: dealing with biased opinions in social networks
by Roberto Centeno & Ramón Hermoso & Maria Fasli - 827-844 Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory
by Ping Wang & Kuo-Ming Chao & Chi-Chun Lo - 845-856 A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research
by Kweku-Muata Osei-Bryson - 857-869 Event-cloud platform to support decision-making in emergency management
by Matthieu Lauras & Frédérick Benaben & Sébastien Truptil & Aurélie Charles - 871-887 Networked enterprise business model alignment: A case study on smart living
by Sam Solaimani & Harry Bouwman & Timo Itälä - 889-915 E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks
by Vishanth Weerakkody & Zahir Irani & Habin Lee & Ibrahim Osman & Nitham Hindi - 917-946 Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron
by Jakub Malý & Martin Nečaský - 947-960 Intelligent drowsy eye detection using image mining
by Ahmed Emam - 961-981 VXQ: A visual query language for XML data
by Ryan H. Choi & Raymond K. Wong
June 2015, Volume 17, Issue 3
- 471-474 Special section on the role of information technology in service delivery
by Jaeki Song & Jeff Baker & Fred D. Davis - 475-492 Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs)
by Ravi Seethamraju - 493-511 Improving service of online health information provision: A case of usage-driven design for health information portals
by Bang Viet Nguyen & Frada Burstein & Julie Fisher - 513-532 Categorizing consumer behavioral responses and artifact design features: The case of online advertising
by Jian Tang & Ping Zhang & Philip Fei Wu - 533-546 Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach
by Miri Kim & Jaeki Song & Jason Triche - 547-563 A meta-analysis of existing research on citizen adoption of e-government
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams - 565-589 Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs
by Seokho Son & Kwang Mong Sim - 591-600 Smart grid data analytics for digital protective relay event recordings
by Tomo Popovic & Mladen Kezunovic & Bozo Krstajic - 601-617 Examining the antecedent factors of online microsourcing
by Baozhou Lu & Rudy Hirschheim & Andrew Schwarz - 619-628 Comparative study of large information systems’ CSFs during their life cycle
by Mojtaba Ashja & Akram Hadizadeh Moghadam & Hamid Bidram - 629-644 An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries
by Vincent Cho & Aman Chan - 645-657 Customer revisit intention to restaurants: Evidence from online reviews
by Xiangbin Yan & Jing Wang & Michael Chau - 659-672 Investments in enterprise integration technology: An event study
by Narcyz Roztocki & Heinz Roland Weistroffer - 673-689 Failure recovery in distributed model composition with intelligent assistance
by Hui Huang & Xueguang Chen & Zhiwu Wang - 691-705 On achieving secure collaboration in supply chains
by Sharad Barkataki & Hassan Zeineddine
April 2015, Volume 17, Issue 2
- 239-241 Introduction: Advances in IoT research and applications
by Pan Wang & Ricardo Valerdi & Shangming Zhou & Ling Li - 243-259 The internet of things: a survey
by Shancang Li & Li Da Xu & Shanshan Zhao - 261-274 The Internet of Things—A survey of topics and trends
by Andrew Whitmore & Anurag Agarwal & Li Xu - 275-287 The design of an electronic pedigree system for food safety
by Weili Han & Yun Gu & Wei Wang & Yin Zhang & Yuliang Yin & Junyu Wang & Li-Rong Zheng - 289-319 Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
by Zhibo Pang & Qiang Chen & Weili Han & Lirong Zheng - 321-335 An integrated information system for snowmelt flood early-warning based on internet of things
by Shifeng Fang & Lida Xu & Yunqiang Zhu & Yongqiang Liu & Zhihui Liu & Huan Pei & Jianwu Yan & Huifang Zhang - 337-350 An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau
by Fang Liu & Zhuming Bi & Eric L. Xu & Qin Ga & Quanyu Yang & Yingzhong Yang & Lan Ma & Tana Wuren & Rili Ge - 351-362 The role of social media in supporting knowledge integration: A social capital analysis
by Xiongfei Cao & Xitong Guo & Hefu Liu & Jibao Gu - 363-385 Risk assessment model based on multi-agent systems for complex product design
by Ni Li & Xiang Li & Yuzhong Shen & Zhuming Bi & Minghui Sun - 387-411 The information technology workforce: A review and assessment of voluntary turnover research
by Janice Lo - 413-422 Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors
by Tao Zhou - 423-438 Security investment and information sharing under an alternative security breach probability function
by Xing Gao & Weijun Zhong & Shue Mei - 439-453 Optimal software design reuse policies: A control theoretic approach
by Monica Johar & Vijay Mookerjee & Suresh Sethi - 455-470 Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use
by Hung-pin Shih & Kee-hung Lai & T. C. E. Cheng
February 2015, Volume 17, Issue 1
- 1-2 Foreword: Information Systems Frontiers
by Ram Ramesh & H. Raghav Rao - 3-9 Microeconomics and operations research: Their interactions and differences
by Kenneth Arrow - 11-14 Guest editorial: Grand successes and failures in IT: Private and public sectors
by Yogesh K. Dwivedi & David Wastell & Helle Zinner Henriksen & Rahul De’ - 15-29 Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics
by Marijn Janssen & Haiko Voort & Anne Fleur Veenstra - 31-50 Technology assimilation through conjunctures – a look at IS use in retail
by Ravi Anand Rao & Rahul De’ - 51-65 Repertoires of collaboration for common operating pictures of disasters and extreme events
by Deborah Bunker & Linda Levine & Carol Woody - 67-77 Knowledge transfer planning and execution in offshore outsourcing: An applied approach
by Sabine Madsen & Keld Bødker & Thomas Tøth - 79-93 Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER)
by Laurence Brooks & M. Shahanoor Alam - 95-108 The formation of technology mental models: the case of voluntary use of technology in organizational setting
by Amany Elbanna & Henrik C. J. Linderoth - 109-125 Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by Mohammad Alamgir Hossain & Mohammed Quaddus - 127-142 Investigating success of an e-government initiative: Validation of an integrated IS success model
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams & Vishanth Weerakkody - 143-157 Research on information systems failures and successes: Status update and future directions
by Yogesh K. Dwivedi & David Wastell & Sven Laumer & Helle Zinner Henriksen & Michael D. Myers & Deborah Bunker & Amany Elbanna & M. N. Ravishankar & Shirish C. Srivastava - 159-175 Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty
by Jung Lee & Jae-Nam Lee & Bernard C. Y. Tan - 177-191 Lemon complaints: When online auctions go sour
by Judy E. Scott & Dawn G. Gregg & Jae Hoon Choi - 193-215 Profiling internet banking users: A knowledge discovery in data mining process model based approach
by Gunjan Mansingh & Lila Rao & Kweku-Muata Osei-Bryson & Annette Mills - 217-237 Information systems frontiers: Keyword analysis and classification
by Chulhwan Chris Bang
November 2014, Volume 16, Issue 5
- 749-752 Guest editorial: Information reuse, integration, and reusable systems
by Chengcui Zhang & Elisa Bertino & Bhavani Thuraisingham & James Joshi - 753-769 Finding story chains in newswire articles using random walks
by Xianshu Zhu & Tim Oates - 771-785 An FAR-SW based approach for webpage information extraction
by Zhan Bu & Chengcui Zhang & Zhengyou Xia & Jiandong Wang - 787-799 Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection
by Tao Meng & Mei-Ling Shyu - 801-822 A comparative study of iterative and non-iterative feature selection techniques for software defect prediction
by Taghi M. Khoshgoftaar & Kehan Gao & Amri Napolitano & Randall Wald - 823-834 A unified framework for evaluating test criteria in model-checking-assisted test case generation
by Bolong Zeng & Li Tan - 835-851 Aspectualization of code clones—an algorithmic approach
by Samuel A. Ajila & Angad S. Gakhar & Chung‐Horng Lung - 853-866 Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures
by Chung-Horng Lung & Samuel A. Ajila & Wen-Lin Liu