Content
February 2017, Volume 19, Issue 1
- 109-127 Extracting the patterns of truthfulness from political information systems in Serbia
by Nenad Tomašev - 129-148 OptiPres: a distributed mobile agent decision support system for optimal patient drug prescription
by Kevin Miller & Gunjan Mansingh - 149-163 A hybrid approach for personalized service staff recommendation
by Wei-Lun Chang & Chien-Fang Jung - 165-185 New knowledge in strategic management through visually mining semantic networks
by Gürdal Ertek & Gül Tokdemir & Mete Sevinç & Murat Mustafa Tunç
December 2016, Volume 18, Issue 6
- 1035-1039 A special issue on knowledge and competence management: Developing Enterprise solutions
by José Braga Vasconcelos & Chris Kimble & Álvaro Rocha - 1041-1049 Uncovering hidden process assets: A case study
by Maria-Isabel Sánchez-Segura & Alejandro Ruiz-Robles & Fuensanta Medina-Dominguez - 1051-1061 Information management model for competencies and learning outcomes in an educational context
by Maria José Angélico Gonçalves & Álvaro Rocha & Manuel Pérez Cota - 1063-1084 A system framework for gamified Cost Engineering
by Eric Zimmerling & Patrick J. Höflinger & Philipp G. Sandner & Isabell M. Welpe - 1085-1102 Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS
by Mohammed Nassim Lacheheub & Ramdane Maamri - 1103-1117 Employee knowledge profiles – a mixed-research methods approach
by Maria José Sousa & Miguel González-Loureiro - 1119-1130 Competence management in knowledge intensive organizations using consensual knowledge and ontologies
by Chris Kimble & José Braga Vasconcelos & Álvaro Rocha - 1131-1151 Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research
by Yeganeh Charband & Nima Jafari Navimipour - 1153-1163 Using serious games to manage knowledge and competencies: The seven-step development process
by Oihab Allal-Chérif & Marc Bidan & Mohamed Makhlouf - 1165-1189 Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD
by Hsin Hsin Chang & Yao-Chuan Tsai & Chen-Su Fu & Shu-Hui Chen & Yao Peng - 1191-1203 Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds
by Ikram Bououd & Sana Rouis Skandrani & Imed Boughzala & Mohamed MAKHLOUF - 1205-1215 The value of the CIO in the top management team on performance in the case of information security breaches
by Humayun Zafar & Myung S. Ko & Kweku-Muata Osei-Bryson - 1217-1231 The development and application of e-Geoscience in China
by Yunqiang Zhu & Peng Pan & Shifeng Fang & Li Xu & Jia Song & Jinqu Zhang & Min Feng - 1233-1249 XHQE: A hybrid system for scalable selectivity estimation of XML queries
by E.-S. M. El-Alfy & S. Mohammed & A. F. Barradah - 1251-1263 Understanding governance, risk and compliance information systems (GRC IS): The experts view
by Anastasia Papazafeiropoulou & Konstantina Spanaki - 1265-1283 Correlates of using the billing system of a mobile network operator to pay for digital goods and services
by Torsten J. Gerpott & Phil Meinert
October 2016, Volume 18, Issue 5
- 819-823 Towards common reusable semantics
by Thouraya Bouabana-Tebibel & Stuart H. Rubin - 825-853 Ranking software components for reuse based on non-functional properties
by Marcus Kessel & Colin Atkinson - 855-875 Investigation of feature run-time conflicts on goal model-based reuse
by Mustafa Berk Duran & Gunter Mussbacher - 877-889 Weighted subspace modeling for semantic concept retrieval using gaussian mixture models
by Chao Chen & Mei-Ling Shyu & Shu-Ching Chen - 891-908 Semantic weaving of configuration fragments into a consistent system configuration
by Azadeh Jahanbanifar & Ferhat Khendek & Maria Toeroe - 909-925 Formal modelling and analysis of Bitflips in ARM assembly code
by René Rydhof Hansen & Kim Guldstrand Larsen & Mads Chr. Olesen & Erik Ramsgaard Wognsen - 927-952 Two CEGAR-based approaches for the safety verification of PLC-controlled plants
by Johanna Nellen & Kai Driessen & Martin Neuhäußer & Erika Ábrahám & Benedikt Wolters - 953-965 Foundations of reusable and interoperable facet models using category theory
by Daniel R. Harris - 967-980 An algebra of temporal faults
by André Didier & Alexandre Mota - 981-994 On the empirical justification of theoretical heuristic transference and learning
by Stuart H. Rubin & Thouraya Bouabana-Tebibel & Yasmine Hoadjli - 995-1020 Compliance management ontology – a shared conceptualization for research and practice in compliance management
by Norris Syed Abdullah & Marta Indulska & Shazia Sadiq - 1021-1034 Drivers of mobile payment acceptance: The impact of network externalities
by Ajao Qasim & Emad Abu-Shanab
August 2016, Volume 18, Issue 4
- 639-643 Guest editorial: web of things
by Quan Z. Sheng & Xue Li & Anne H.H. Ngu & Yongrui Qin & Dong Xie - 645-663 Developing and validating a model explaining the assimilation process of RFID: An empirical study
by Mohammad Alamgir Hossain & Mohammed Quaddus & Nazrul Islam - 665-677 A security-and quality-aware system architecture for Internet of Things
by Sabrina Sicari & Cinzia Cappiello & Francesco Pellegrini & Daniele Miorandi & Alberto Coen-Porisini - 679-691 Semantic catalog of things, services, and data to support a wind data management facility
by E. G. Stephan & T. O. Elsethagen & L. K. Berg & M. C. Macduff & P. R. Paulson & W. J. Shaw & C. Sivaraman & W. P. Smith & A. Wynne - 693-710 Assessing the role of IT-enabled process virtualization on green IT adoption
by Manoj Thomas & Daniela Costa & Tiago Oliveira - 711-716 Identity management based on PCA and SVM
by Lixin Shen & Hong Wang & Li Da Xu & Xue Ma & Sohail Chaudhry & Wu He - 717-734 Properties that influence business process management maturity and its effect on organizational performance
by Remco Dijkman & Sander Vincent Lammers & Ad Jong - 735-764 A formulation of computational trust based on quantum decision theory
by Mehrdad Ashtiani & Mohammad Abdollahi Azgomi - 765-780 A complex event processing approach to detect abnormal behaviours in the marine environment
by Fernando Terroso-Saenz & Mercedes Valdes-Vela & Antonio F. Skarmeta-Gomez - 781-818 CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises
by Maxime Bernaert & Geert Poels & Monique Snoeck & Manu Backer
June 2016, Volume 18, Issue 3
- 407-411 Emerging service orientations and transformations (SOT)
by Haluk Demirkan & James C. Spohrer - 413-428 Smart CloudBench—A framework for evaluating cloud infrastructure performance
by Mohan Baruwal Chhetri & Sergei Chichin & Quoc Bao Vo & Ryszard Kowalczyk - 429-455 Normative requirements for regulatory compliance: An abstract formal framework
by Mustafa Hashmi & Guido Governatori & Moe Thandar Wynn - 457-478 iSIM: An integrated design method for commercializing service innovation
by Eng K. Chew - 479-497 From product-centric to customer-centric services in a financial institution – exploring the organizational challenges of the transition process
by Olivera Marjanovic & Vijaya Murthy - 499-510 SOA in practice – a study of governance aspects
by George Joukhadar & Fethi Rabhi - 511-528 Enabling user-driven rule management in event data analysis
by Weisi Chen & Fethi A. Rabhi - 529-540 An awareness-based meta-mechanism for e-commerce buyer coalitions
by Laor Boongasame & Farhad Daneshgar - 541-564 A theory building study of enterprise architecture practices and benefits
by Ralph Foorthuis & Marlies Steenbergen & Sjaak Brinkkemper & Wiel A. G. Bruls - 565-578 A new method to identify collaborative partners in social service provider networks
by Yong Sun & Wenan Tan & Lingxia Li & Weiming Shen & Zhuming Bi & Xiaoming Hu - 579-595 Web personalization for user acceptance of technology: An empirical investigation of E-government services
by Vinodh Krishnaraju & Saji K Mathew & Vijayan Sugumaran - 597-619 Persuasive narrative advertisement generator: A microenterprise service innovation perspective
by Soe-Tsyr Daphne Yuan & Peng-Wei Chiu - 621-638 Information and Knowledge Leakage in Supply Chain
by Kim Hua Tan & W. P. Wong & Leanne Chung
April 2016, Volume 18, Issue 2
- 233-235 Big data and analytics in healthcare: Introduction to the special section
by Atreyi Kankanhalli & Jungpil Hahn & Sharon Tan & Gordon Gao - 237-252 Advanced analytics for the automation of medical systematic reviews
by Prem Timsina & Jun Liu & Omar El-Gayar - 253-263 A study on the antecedents of healthcare information protection intention
by Chang-Gyu Yang & Hee-Jun Lee - 265-275 Examining online consumers’ initial trust building from an elaboration likelihood model perspective
by Tao Zhou & Yaobin Lu & Bin Wang - 277-292 Engineering of web services for internet of things applications
by Evelina Pencheva & Ivaylo Atanasov - 293-314 Consumer adoption of RFID-enabled services. Applying an extended UTAUT model
by Herbjørn Nysveen & Per Egil Pedersen - 315-332 Service delivery through mobile-government (mGov): Driving factors and cultural impacts
by Mahmud Akhter Shareef & Vinod Kumar & Yogesh K. Dwivedi & Uma Kumar - 333-348 Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency
by Kishor Vaidya & John Campbell - 349-358 Computationally efficient ontology selection in software requirement planning
by R. B. K. Brown & G. Beydoun & G. Low & W. Tibben & R. Zamani & F. García-Sánchez & R. Martinez-Bejar - 359-405 Business process compliance checking – applying and evaluating a generic pattern matching approach for conceptual models in the financial sector
by Jörg Becker & Patrick Delfmann & Hanns-Alexander Dietrich & Matthias Steinhorst & Mathias Eggert
February 2016, Volume 18, Issue 1
- 1-6 Collaboration technology in teams and organizations: Introduction to the special issue
by Gert-Jan Vreede & Pedro Antunes & Julita Vassileva & Marco Aurélio Gerosa & Kewen Wu - 7-21 Understanding student participation in undergraduate course communities: A case study
by Francisco J. Gutierrez & Sergio F. Ochoa & Gustavo Zurita & Nelson Baloian - 23-46 A dependency taxonomy for agile software development projects
by Diane E. Strode - 47-68 Factors influencing the decision to crowdsource: A systematic literature review
by Nguyen Hoang Thuan & Pedro Antunes & David Johnstone - 69-84 Creating a family of collaborative applications for emergency management in the firefighting sub-domain
by Pedro O. Rossel & Valeria Herskovic & Erika Ormeño - 85-102 Boundary objects in collaborative work and learning
by Mikhail Fominykh & Ekaterina Prasolova-Førland & Monica Divitini & Sobah Abbas Petersen - 103-123 Designing for geo-referenced in-situ therapeutic scenarios
by Luís Duarte & Luís Carriço - 125-144 Achieving better usability of software supporting learning activities of large groups
by Nelson Baloian & Gustavo Zurita - 145-158 Providing awareness, explanation and control of personalized filtering in a social networking site
by Sayooran Nagulendra & Julita Vassileva - 159-170 A survey of edge-preserving image denoising methods
by Paras Jain & Vipin Tyagi - 171-204 Using model transformation to refactor use case models based on antipatterns
by Yasser A. Khan & Mohamed El-Attar - 205-231 Optimization of generic progressive queries based on dependency analysis and materialized views
by Chao Zhu & Qiang Zhu & Calisto Zuzarte & Wenbin Ma
December 2015, Volume 17, Issue 6
- 1191-1194 Special section on business process analytics
by Karl R. Lang & Vojislav B. Misic & Leon J. Zhao - 1195-1208 An intelligent approach to data extraction and task identification for process mining
by Jiexun Li & Harry Jiannan Wang & Xue Bai - 1209-1226 Semantics-based event log aggregation for process mining and analytics
by Amit V. Deokar & Jie Tao - 1227-1238 Examining micro-level knowledge sharing discussions in online communities
by G. Alan Wang & Xiaomo Liu & Jianling Wang & Min Zhang & Weiguo Fan - 1239-1251 The classification of hackers by knowledge exchange behaviors
by Xiong Zhang & Alex Tsang & Wei T. Yue & Michael Chau - 1253-1264 Workflow-aware attention tracking to enhance collaboration management
by Shaokun Fan & Lele Kang & J. Leon Zhao - 1265-1282 Collaborative personal profiling for web service ranking and recommendation
by Wenge Rong & Baolin Peng & Yuanxin Ouyang & Kecheng Liu & Zhang Xiong - 1283-1299 E-commerce web site loyalty: A cross cultural comparison
by Jengchung Victor Chen & David C. Yen & Wannasri Pornpriphet & Andree E. Widjaja - 1301-1311 Rough set based classification of real world Web services
by Hala S. Own & Hamdi Yahyaoui - 1313-1333 The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis
by Pekka Kekolahti & Juuso Karikoski & Antti Riikonen - 1335-1352 Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations
by Heng-Li Yang & August F. Y. Chao - 1353-1367 Diffusion of deception in social media: Social contagion effects and its antecedents
by Arun Vishwanath - 1369-1380 RFID in production and service systems: Technology, applications and issues
by Nilgun Fescioglu-Unver & Sung Hee Choi & Dongmok Sheen & Soundar Kumara - 1381-1400 Estimating trust value: A social network perspective
by Wei-Lun Chang & Arleen N. Diaz & Patrick C. K. Hung - 1401-1425 The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling
by Jan Claes & Irene Vanderfeesten & Frederik Gailly & Paul Grefen & Geert Poels
October 2015, Volume 17, Issue 5
- 983-986 Advances in secure knowledge management in the big data era
by Chittaranjan Hota & Shambhu Upadhyaya & Jamal Nazzal Al-Karaki - 987-995 Surviving advanced persistent threats in a distributed environment – Architecture and analysis
by Ruchika Mehresh & Shambhu Upadhyaya - 997-1005 Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013
by Jaeung Lee & Manish Agrawal & H. R. Rao - 1007-1015 Secure and privacy preserving data processing support for active authentication
by Yan Sun & Shambhu Upadhyaya - 1017-1028 Game-theoretic strategies for IDS deployment in peer-to-peer networks
by Pratik Narang & Chittaranjan Hota - 1029-1037 Analysis of a multistage attack embedded in a video file
by Hiran V. Nath & B. M. Mehtre - 1039-1056 Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service
by Kawaljeet Kaur Kapoor & Yogesh K. Dwivedi & Michael D. Williams - 1057-1076 Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts
by Mohammad Alamgir Hossain & Mohammed Quaddus - 1077-1095 Social balance in signed networks
by Xiaolong Zheng & Daniel Zeng & Fei-Yue Wang - 1097-1110 Does better Internet access lead to more adoption? A new empirical study using household relocation
by Junzhao Ma & Qingyi Huang - 1111-1132 Measurements of mislead threshold of company graph distortion
by Shaio Yan Huang & Tung-Hsien Wu & An-An Chiu & David C. Yen - 1133-1144 How business process reengineering affects information technology investment and employee performance under different performance measurement
by Shaio Yan Huang & Chao-Hsiung Lee & An-An Chiu & David C. Yen - 1145-1160 Addressing the valuation problem in multi-round combinatorial auctions
by Soumyakanti Chakraborty & Anup K. Sen & Amitava Bagchi - 1161-1176 IPTV parental control: A collaborative model for the Social Web
by Ana Fernández-Vilas & Rebeca P. Díaz-Redondo & Sandra Servia-Rodríguez - 1177-1190 Understanding health information technology adoption: A synthesis of literature from an activity perspective
by Jun Sun & Zhe Qu
August 2015, Volume 17, Issue 4
- 707-711 Special issue on agreement technologies
by Carlos Iván Chesñevar & Eva Onaindia & Sascha Ossowski & George Vouros - 713-724 Reasoning about reasons behind preferences using modal logic
by Truls Pedersen & Sjur Dyrkolbotn & Thomas Ågotnes - 725-742 Reasoning about the impacts of information sharing
by Yuqing Tang & Federico Cerutti & Nir Oren & Chatschik Bisdikian - 743-762 Subjective logic operators in trust assessment: an empirical study
by Federico Cerutti & Lance M. Kaplan & Timothy J. Norman & Nir Oren & Alice Toniolo - 763-778 From roles to standards: a dynamic maintenance approach using incentives
by Ramón Hermoso & Henrique Lopes Cardoso & Maria Fasli - 779-798 An ontological-based knowledge-representation formalism for case-based argumentation
by Stella Heras & Vicente Botti & Vicente Julián - 799-808 Service discovery acceleration with hierarchical clustering
by Zijie Cong & Alberto Fernandez & Holger Billhardt & Marin Lujak - 809-825 On the inaccuracy of numerical ratings: dealing with biased opinions in social networks
by Roberto Centeno & Ramón Hermoso & Maria Fasli - 827-844 Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory
by Ping Wang & Kuo-Ming Chao & Chi-Chun Lo - 845-856 A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research
by Kweku-Muata Osei-Bryson - 857-869 Event-cloud platform to support decision-making in emergency management
by Matthieu Lauras & Frédérick Benaben & Sébastien Truptil & Aurélie Charles - 871-887 Networked enterprise business model alignment: A case study on smart living
by Sam Solaimani & Harry Bouwman & Timo Itälä - 889-915 E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks
by Vishanth Weerakkody & Zahir Irani & Habin Lee & Ibrahim Osman & Nitham Hindi - 917-946 Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron
by Jakub Malý & Martin Nečaský - 947-960 Intelligent drowsy eye detection using image mining
by Ahmed Emam - 961-981 VXQ: A visual query language for XML data
by Ryan H. Choi & Raymond K. Wong
June 2015, Volume 17, Issue 3
- 471-474 Special section on the role of information technology in service delivery
by Jaeki Song & Jeff Baker & Fred D. Davis - 475-492 Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs)
by Ravi Seethamraju - 493-511 Improving service of online health information provision: A case of usage-driven design for health information portals
by Bang Viet Nguyen & Frada Burstein & Julie Fisher - 513-532 Categorizing consumer behavioral responses and artifact design features: The case of online advertising
by Jian Tang & Ping Zhang & Philip Fei Wu - 533-546 Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach
by Miri Kim & Jaeki Song & Jason Triche - 547-563 A meta-analysis of existing research on citizen adoption of e-government
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams - 565-589 Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs
by Seokho Son & Kwang Mong Sim - 591-600 Smart grid data analytics for digital protective relay event recordings
by Tomo Popovic & Mladen Kezunovic & Bozo Krstajic - 601-617 Examining the antecedent factors of online microsourcing
by Baozhou Lu & Rudy Hirschheim & Andrew Schwarz - 619-628 Comparative study of large information systems’ CSFs during their life cycle
by Mojtaba Ashja & Akram Hadizadeh Moghadam & Hamid Bidram - 629-644 An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries
by Vincent Cho & Aman Chan - 645-657 Customer revisit intention to restaurants: Evidence from online reviews
by Xiangbin Yan & Jing Wang & Michael Chau - 659-672 Investments in enterprise integration technology: An event study
by Narcyz Roztocki & Heinz Roland Weistroffer - 673-689 Failure recovery in distributed model composition with intelligent assistance
by Hui Huang & Xueguang Chen & Zhiwu Wang - 691-705 On achieving secure collaboration in supply chains
by Sharad Barkataki & Hassan Zeineddine
April 2015, Volume 17, Issue 2
- 239-241 Introduction: Advances in IoT research and applications
by Pan Wang & Ricardo Valerdi & Shangming Zhou & Ling Li - 243-259 The internet of things: a survey
by Shancang Li & Li Da Xu & Shanshan Zhao - 261-274 The Internet of Things—A survey of topics and trends
by Andrew Whitmore & Anurag Agarwal & Li Xu - 275-287 The design of an electronic pedigree system for food safety
by Weili Han & Yun Gu & Wei Wang & Yin Zhang & Yuliang Yin & Junyu Wang & Li-Rong Zheng - 289-319 Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
by Zhibo Pang & Qiang Chen & Weili Han & Lirong Zheng - 321-335 An integrated information system for snowmelt flood early-warning based on internet of things
by Shifeng Fang & Lida Xu & Yunqiang Zhu & Yongqiang Liu & Zhihui Liu & Huan Pei & Jianwu Yan & Huifang Zhang - 337-350 An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau
by Fang Liu & Zhuming Bi & Eric L. Xu & Qin Ga & Quanyu Yang & Yingzhong Yang & Lan Ma & Tana Wuren & Rili Ge - 351-362 The role of social media in supporting knowledge integration: A social capital analysis
by Xiongfei Cao & Xitong Guo & Hefu Liu & Jibao Gu - 363-385 Risk assessment model based on multi-agent systems for complex product design
by Ni Li & Xiang Li & Yuzhong Shen & Zhuming Bi & Minghui Sun - 387-411 The information technology workforce: A review and assessment of voluntary turnover research
by Janice Lo - 413-422 Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors
by Tao Zhou - 423-438 Security investment and information sharing under an alternative security breach probability function
by Xing Gao & Weijun Zhong & Shue Mei - 439-453 Optimal software design reuse policies: A control theoretic approach
by Monica Johar & Vijay Mookerjee & Suresh Sethi - 455-470 Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use
by Hung-pin Shih & Kee-hung Lai & T. C. E. Cheng
February 2015, Volume 17, Issue 1
- 1-2 Foreword: Information Systems Frontiers
by Ram Ramesh & H. Raghav Rao - 3-9 Microeconomics and operations research: Their interactions and differences
by Kenneth Arrow - 11-14 Guest editorial: Grand successes and failures in IT: Private and public sectors
by Yogesh K. Dwivedi & David Wastell & Helle Zinner Henriksen & Rahul De’ - 15-29 Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics
by Marijn Janssen & Haiko Voort & Anne Fleur Veenstra - 31-50 Technology assimilation through conjunctures – a look at IS use in retail
by Ravi Anand Rao & Rahul De’ - 51-65 Repertoires of collaboration for common operating pictures of disasters and extreme events
by Deborah Bunker & Linda Levine & Carol Woody - 67-77 Knowledge transfer planning and execution in offshore outsourcing: An applied approach
by Sabine Madsen & Keld Bødker & Thomas Tøth - 79-93 Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER)
by Laurence Brooks & M. Shahanoor Alam - 95-108 The formation of technology mental models: the case of voluntary use of technology in organizational setting
by Amany Elbanna & Henrik C. J. Linderoth - 109-125 Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by Mohammad Alamgir Hossain & Mohammed Quaddus - 127-142 Investigating success of an e-government initiative: Validation of an integrated IS success model
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams & Vishanth Weerakkody - 143-157 Research on information systems failures and successes: Status update and future directions
by Yogesh K. Dwivedi & David Wastell & Sven Laumer & Helle Zinner Henriksen & Michael D. Myers & Deborah Bunker & Amany Elbanna & M. N. Ravishankar & Shirish C. Srivastava - 159-175 Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty
by Jung Lee & Jae-Nam Lee & Bernard C. Y. Tan - 177-191 Lemon complaints: When online auctions go sour
by Judy E. Scott & Dawn G. Gregg & Jae Hoon Choi - 193-215 Profiling internet banking users: A knowledge discovery in data mining process model based approach
by Gunjan Mansingh & Lila Rao & Kweku-Muata Osei-Bryson & Annette Mills - 217-237 Information systems frontiers: Keyword analysis and classification
by Chulhwan Chris Bang
November 2014, Volume 16, Issue 5
- 749-752 Guest editorial: Information reuse, integration, and reusable systems
by Chengcui Zhang & Elisa Bertino & Bhavani Thuraisingham & James Joshi - 753-769 Finding story chains in newswire articles using random walks
by Xianshu Zhu & Tim Oates - 771-785 An FAR-SW based approach for webpage information extraction
by Zhan Bu & Chengcui Zhang & Zhengyou Xia & Jiandong Wang - 787-799 Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection
by Tao Meng & Mei-Ling Shyu - 801-822 A comparative study of iterative and non-iterative feature selection techniques for software defect prediction
by Taghi M. Khoshgoftaar & Kehan Gao & Amri Napolitano & Randall Wald - 823-834 A unified framework for evaluating test criteria in model-checking-assisted test case generation
by Bolong Zeng & Li Tan - 835-851 Aspectualization of code clones—an algorithmic approach
by Samuel A. Ajila & Angad S. Gakhar & Chung‐Horng Lung - 853-866 Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures
by Chung-Horng Lung & Samuel A. Ajila & Wen-Lin Liu - 867-885 A methodology for the evaluation of high response time on E-commerce users and sales
by Nicolas Poggi & David Carrera & Ricard Gavaldà & Eduard Ayguadé & Jordi Torres - 887-908 A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives
by Wei-Tsong Wang & Wen-Hung Chang - 909-922 Understanding the IT/business partnership: A business process perspective
by Artur Siurdyban - 923-937 A methodological approach to optimizing RFID deployment
by Benny C. F. Cheung & S. L. Ting & Albert H. C. Tsang & W. B. Lee - 939-951 Service-oriented intelligent group decision support system: Application in transportation management
by Shiwei He & Rui Song & Sohail S. Chaudhry - 953-977 A new methodology to support group decision-making for IoT-based emergency response systems
by Ni Li & Minghui Sun & Zhuming Bi & Zeya Su & Chao Wang
September 2014, Volume 16, Issue 4
- 523-542 Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform
by Mohammad Mehedi Hassan & M. Shamim Hossain & A. M. Jehad Sarkar & Eui-Nam Huh - 543-556 Algebraic operations in fuzzy object-oriented databases
by Li Yan & Z. M. Ma & Fu Zhang - 557-570 Patterns of news dissemination through online news media: A case study in China
by Youzhong Wang & Daniel Zeng & Bin Zhu & Xiaolong Zheng & Feiyue Wang - 571-589 Using conceptual graphs for clinical guidelines representation and knowledge visualization
by Bernard Kamsu-Foguem & Germaine Tchuenté-Foguem & Clovis Foguem - 591-605 Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories
by Placide Poba-Nzaou & Sylvestre Uwizeyemungu & Louis Raymond & Guy Paré - 607-625 I-Competere: Using applied intelligence in search of competency gaps in software project managers
by Ricardo Colomo-Palacios & Israel González-Carrasco & Jose Luis López-Cuadrado & Antonio Trigo & Joao Eduardo Varajao - 627-641 Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community
by Hung-Pin Shih & Echo Huang - 643-661 Dynamic competition in IT security: A differential games approach
by Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite - 663-696 Efficient adaptation of XML data using a conceptual model
by Jakub Malý & Martin Nečaský & Irena Mlýnková - 697-713 Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers
by Yen-Hao Hsieh & Soe-Tsyr Yuan & Hsiao-Chen Liu - 715-727 Harnessing global expertise: A comparative study of expertise profiling methods for online communities
by Xiaomo Liu & G. Alan Wang & Aditya Johri & Mi Zhou & Weiguo Fan - 729-747 Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption
by Oluwasola Oni & Anastasia Papazafeiropoulou
July 2014, Volume 16, Issue 3
- 337-345 Using scenarios to understand the frontiers of IS
by Paul Gray & Anat Hovav - 347-352 Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)
by Anat Hovav - 353-368 Foresight for a responsible future with ICT
by M. Lynne Markus & Kevin Mentzer - 369-382 Mobile technology utilization for social development in developing countries: An ethnographic futures research study
by Phillip Olla & Jyoti Choudrie