Content
February 2015, Volume 17, Issue 1
- 31-50 Technology assimilation through conjunctures – a look at IS use in retail
by Ravi Anand Rao & Rahul De’ - 51-65 Repertoires of collaboration for common operating pictures of disasters and extreme events
by Deborah Bunker & Linda Levine & Carol Woody - 67-77 Knowledge transfer planning and execution in offshore outsourcing: An applied approach
by Sabine Madsen & Keld Bødker & Thomas Tøth - 79-93 Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER)
by Laurence Brooks & M. Shahanoor Alam - 95-108 The formation of technology mental models: the case of voluntary use of technology in organizational setting
by Amany Elbanna & Henrik C. J. Linderoth - 109-125 Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by Mohammad Alamgir Hossain & Mohammed Quaddus - 127-142 Investigating success of an e-government initiative: Validation of an integrated IS success model
by Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams & Vishanth Weerakkody - 143-157 Research on information systems failures and successes: Status update and future directions
by Yogesh K. Dwivedi & David Wastell & Sven Laumer & Helle Zinner Henriksen & Michael D. Myers & Deborah Bunker & Amany Elbanna & M. N. Ravishankar & Shirish C. Srivastava - 159-175 Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty
by Jung Lee & Jae-Nam Lee & Bernard C. Y. Tan - 177-191 Lemon complaints: When online auctions go sour
by Judy E. Scott & Dawn G. Gregg & Jae Hoon Choi - 193-215 Profiling internet banking users: A knowledge discovery in data mining process model based approach
by Gunjan Mansingh & Lila Rao & Kweku-Muata Osei-Bryson & Annette Mills - 217-237 Information systems frontiers: Keyword analysis and classification
by Chulhwan Chris Bang
November 2014, Volume 16, Issue 5
- 749-752 Guest editorial: Information reuse, integration, and reusable systems
by Chengcui Zhang & Elisa Bertino & Bhavani Thuraisingham & James Joshi - 753-769 Finding story chains in newswire articles using random walks
by Xianshu Zhu & Tim Oates - 771-785 An FAR-SW based approach for webpage information extraction
by Zhan Bu & Chengcui Zhang & Zhengyou Xia & Jiandong Wang - 787-799 Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection
by Tao Meng & Mei-Ling Shyu - 801-822 A comparative study of iterative and non-iterative feature selection techniques for software defect prediction
by Taghi M. Khoshgoftaar & Kehan Gao & Amri Napolitano & Randall Wald - 823-834 A unified framework for evaluating test criteria in model-checking-assisted test case generation
by Bolong Zeng & Li Tan - 835-851 Aspectualization of code clones—an algorithmic approach
by Samuel A. Ajila & Angad S. Gakhar & Chung‐Horng Lung - 853-866 Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures
by Chung-Horng Lung & Samuel A. Ajila & Wen-Lin Liu - 867-885 A methodology for the evaluation of high response time on E-commerce users and sales
by Nicolas Poggi & David Carrera & Ricard Gavaldà & Eduard Ayguadé & Jordi Torres - 887-908 A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives
by Wei-Tsong Wang & Wen-Hung Chang - 909-922 Understanding the IT/business partnership: A business process perspective
by Artur Siurdyban - 923-937 A methodological approach to optimizing RFID deployment
by Benny C. F. Cheung & S. L. Ting & Albert H. C. Tsang & W. B. Lee - 939-951 Service-oriented intelligent group decision support system: Application in transportation management
by Shiwei He & Rui Song & Sohail S. Chaudhry - 953-977 A new methodology to support group decision-making for IoT-based emergency response systems
by Ni Li & Minghui Sun & Zhuming Bi & Zeya Su & Chao Wang
September 2014, Volume 16, Issue 4
- 523-542 Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform
by Mohammad Mehedi Hassan & M. Shamim Hossain & A. M. Jehad Sarkar & Eui-Nam Huh - 543-556 Algebraic operations in fuzzy object-oriented databases
by Li Yan & Z. M. Ma & Fu Zhang - 557-570 Patterns of news dissemination through online news media: A case study in China
by Youzhong Wang & Daniel Zeng & Bin Zhu & Xiaolong Zheng & Feiyue Wang - 571-589 Using conceptual graphs for clinical guidelines representation and knowledge visualization
by Bernard Kamsu-Foguem & Germaine Tchuenté-Foguem & Clovis Foguem - 591-605 Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories
by Placide Poba-Nzaou & Sylvestre Uwizeyemungu & Louis Raymond & Guy Paré - 607-625 I-Competere: Using applied intelligence in search of competency gaps in software project managers
by Ricardo Colomo-Palacios & Israel González-Carrasco & Jose Luis López-Cuadrado & Antonio Trigo & Joao Eduardo Varajao - 627-641 Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community
by Hung-Pin Shih & Echo Huang - 643-661 Dynamic competition in IT security: A differential games approach
by Tridib Bandyopadhyay & Dengpan Liu & Vijay S. Mookerjee & Allen W. Wilhite - 663-696 Efficient adaptation of XML data using a conceptual model
by Jakub Malý & Martin Nečaský & Irena Mlýnková - 697-713 Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers
by Yen-Hao Hsieh & Soe-Tsyr Yuan & Hsiao-Chen Liu - 715-727 Harnessing global expertise: A comparative study of expertise profiling methods for online communities
by Xiaomo Liu & G. Alan Wang & Aditya Johri & Mi Zhou & Weiguo Fan - 729-747 Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption
by Oluwasola Oni & Anastasia Papazafeiropoulou
July 2014, Volume 16, Issue 3
- 337-345 Using scenarios to understand the frontiers of IS
by Paul Gray & Anat Hovav - 347-352 Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)
by Anat Hovav - 353-368 Foresight for a responsible future with ICT
by M. Lynne Markus & Kevin Mentzer - 369-382 Mobile technology utilization for social development in developing countries: An ethnographic futures research study
by Phillip Olla & Jyoti Choudrie - 383-397 Tomorrow’s ethics and today’s response: An investigation into the ways information systems professionals perceive and address emerging ethical issues
by Kutoma J. Wakunuma & Bernd Carsten Stahl - 399-416 An economic mechanism to manage operational security risks for inter-organizational information systems
by Fang Fang & Manoj Parameswaran & Xia Zhao & Andrew B. Whinston - 417-434 Evaluation on crowdsourcing research: Current status and future direction
by Yuxiang Zhao & Qinghua Zhu - 435-452 Everything-as-a-service platform for on-demand virtual enterprises
by Gang Li & Mingchuan Wei - 453-471 A schema aware ETL workflow generator
by Naiqiao Du & Xiaojun Ye & Jianmin Wang - 473-490 Network mining: Applications to business data
by Fatih Cavdur & Soundar Kumara - 491-507 Usage of established and novel mobile communication services: Substitutional, independent or complementary?
by Torsten J. Gerpott & Sandra Thomas & Michael Weichert - 509-521 A comparison of improving multi-class imbalance for internet traffic classification
by Qiong Liu & Zhen Liu
April 2014, Volume 16, Issue 2
- 163-167 Advances in infrastructures and tools for multiagent systems
by Juan M. Alberola & Vicent Botti & Jose M. Such - 169-182 Beast methodology: An agile testing methodology for multi-agent systems based on behaviour driven development
by Álvaro Carrera & Carlos A. Iglesias & Mercedes Garijo - 183-199 A MAS-based infrastructure for negotiation and its application to a water-right market
by Bexy Alfonso & Vicente Botti & Antonio Garrido & Adriana Giret - 201-223 Norm reasoning services
by N. Criado & J.M. Such & V. Botti - 225-237 BFF: A tool for eliciting tie strength and user communities in social networking services
by Ricard L. Fogués & Jose M. Such & Agustin Espinosa & Ana Garcia-Fornes - 239-256 An adaptive framework for monitoring agent organizations
by Juan M. Alberola & Luis Búrdalo & Vicente Julián & Andrés Terrasa & Ana García-Fornes - 257-272 Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures
by P. Bharati & C. Zhang & A. Chaudhury - 273-289 Assessing and managing e-commerce service convenience
by Jung-Yu Lai & Khire Rushikesh Ulhas & Jian-Da Lin - 291-302 Collaborative service system design for music content creation
by Wei-Feng Tung & Soe-Tsyr Yuan & Yen-Cheng Wu & Patrick Hung - 303-327 Enhancing visitors’ experience in art museums using mobile technologies
by R. Tesoriero & J. A. Gallud & M. Lozano & V. M. R. Penichet - 329-336 Returns to information security investment: Endogenizing the expected loss
by Kjell Hausken
March 2014, Volume 16, Issue 1
- 1-5 Dynamic intelligence towards merging cloud and communication services
by Ching-Hsien Hsu & Jianhua Ma & Mohammad S. Obaidat - 7-18 A cost-aware auto-scaling approach using the workload prediction in service clouds
by Jingqi Yang & Chuanchang Liu & Yanlei Shang & Bo Cheng & Zexiang Mao & Chunhong Liu & Lisha Niu & Junliang Chen - 19-34 Scalable and leaderless Byzantine consensus in cloud computing environments
by JongBeom Lim & Taeweon Suh & JoonMin Gil & Heonchang Yu - 35-44 IDTCP: An effective approach to mitigating the TCP incast problem in data center networks
by Guodong Wang & Yongmao Ren & Ke Dou & Jun Li - 45-58 A self-similar super-peer overlay construction scheme for super large-scale P2P applications
by Hung-Yi Teng & Chien-Nan Lin & Ren-Hung Hwang - 59-75 MPaaS: Mobility prediction as a service in telecom cloud
by Haoyi Xiong & Daqing Zhang & Daqiang Zhang & Vincent Gauthier & Kun Yang & Monique Becker - 77-93 Fully automated resource retrieval in telecommunications and internet converged environments
by Luis Javier Suarez-Meza & Julián Andrés Zúñiga & Edgar Camilo Pedraza & Juan Carlos Corrales - 95-111 Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing
by Feng Xia & Fangwei Ding & Jie Li & Xiangjie Kong & Laurence T. Yang & Jianhua Ma - 113-127 Enhanced Dynamic Authentication Scheme (EDAS)
by Toan-Thinh Truong & Minh-Triet Tran & Anh-Duc Duong - 129-141 A scalable approach for content based image retrieval in cloud datacenter
by Jianxin Liao & Di Yang & Tonghong Li & Jingyu Wang & Qi Qi & Xiaomin Zhu - 143-152 Multi-user web service selection based on multi-QoS prediction
by Shangguang Wang & Ching-Hsien Hsu & Zhongjun Liang & Qibo Sun & Fangchun Yang - 153-162 A network view of business systems
by Fatih Cavdur & Soundar Kumara
November 2013, Volume 15, Issue 5
- 695-704 Green information systems & technologies – this generation and beyond: Introduction to the special issue
by Joseph Sarkis & Chulmo Koo & Richard T. Watson - 705-723 Identifying IT sustainability performance drivers: Instrument development and validation
by Alemayehu Molla - 725-745 Towards a reference architecture for fuel-based carbon management systems in the logistics industry
by M. E. Iacob & M. J. Sinderen & M. Steenwijk & P. Verkroost - 747-760 Using information systems to improve energy efficiency: Do smart meters make a difference?
by Jacqueline Corbett - 761-778 Small business in a small country: Attitudes to “Green” IT
by Philip Coffey & Mary Tate & Janet Toland - 779-797 Understanding the beliefs, actions and outcomes of sustainability reporting: An experimental approach
by Matthias Gräuler & Michael Freundlieb & Kerstin Ortwerth & Frank Teuteberg - 799-814 Green practices-IS alignment and environmental performance: The mediating effects of coordination
by Sung Yul Ryoo & Chulmo Koo - 815-829 Investments in information systems: A contribution towards sustainability
by Michael Hertel & Julia Wiesent - 831-847 Green information technology strategic justification and evaluation
by Chunguang Bai & Joseph Sarkis - 849-871 Ontology-based data access: An application to intermodal logistics
by Matteo Casu & Giuseppe Cicala & Armando Tacchella - 873-888 The role of algorithmic trading systems on stock market efficiency
by Ji-Yong Seo & Sangmi Chai
September 2013, Volume 15, Issue 4
- 521-523 Information and knowledge management in online rich presence services
by Casey K. Fung & Patrick C. K. Hung - 525-532 Feasibility and a case study on content optimization services on cloud
by Raymond K. Wong - 533-551 Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm
by Chen Wei & Richard Khoury & Simon Fong - 553-567 QoS-aware and multi-granularity service composition
by Zaiwen Feng & Rong Peng & Raymond K. Wong & Keqing He & Jian Wang & Songlin Hu & Bing Li - 569-588 Optimizing dynamic supply chain formation in supply mesh using CSET model
by Hang Yang & Simon Fong - 589-598 A reliable scheduling method in equipment grid using provenance information
by Yuexuan Wang & Jie Yin - 599-612 A collaborative food safety service agent architecture with alerts and trust
by Woodas W. K. Lai & Dickson K. W. Chiu & Zaiwen Feng - 613-625 Improving efficiency of service discovery using Linked data-based service publication
by Wuhui Chen & Incheon Paik - 627-635 Rank-mediated collaborative tagging recommendation service using video-tag relationship prediction
by Wei-Feng Tung & Ting-Yu Lee - 637-651 Theory-generating design science research
by Roman Beck & Sven Weber & Robert Wayne Gregory - 653-676 Concept learning games
by Arman Didandeh & Nima Mirbakhsh & Mohsen Afsharchi - 677-694 Communication in virtual world: Second life and business opportunities
by Gajendra Sharma & Ye Qiang & Sun Wenjun & Lu Qi
July 2013, Volume 15, Issue 3
- 307-309 Business Intelligence and the Web
by Malu Castellanos & Florian Daniel & Irene Garrigós & Jose-Norberto Mazón - 311-329 Beyond search: Retrieving complete tuples from a text-database
by Alexander Löser & Christoph Nagel & Stephan Pieper & Christoph Boden - 331-349 Storing and analysing voice of the market data in the corporate data warehouse
by Lisette García-Moya & Shahad Kudama & María José Aramburu & Rafael Berlanga - 351-370 A multidimensional data model using the fuzzy model based on the semantic translation
by Ramón A. Carrasco & Francisco Muñoz-Leiva & Miguel J. Hornos - 371-398 Active XML-based Web data integration
by Rashed Salem & Omar Boussaïd & Jérôme Darmont - 399-410 Semantic similarity measurement using historical google search patterns
by Jorge Martinez-Gil & José F. Aldana-Montes - 411-431 Applying model-driven engineering to the development of Rich Internet Applications for Business Intelligence
by Jesús M. Hermida & Santiago Meliá & Andrés Montoyo & Jaime Gómez - 433-445 Capturing data quality requirements for web applications by means of DQ_WebRE
by César Guerra-García & Ismael Caballero & Mario Piattini - 447-463 A virtual mart for knowledge discovery in databases
by Claudia Diamantini & Domenico Potena & Emanuele Storti - 465-479 Personalized web feeds based on ontology technologies
by I-Ching Hsu - 481-495 The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs
by Qiu-Hong Wang & Viktor Mayer-Schönberger & Xue Yang - 497-509 Prototype system for pursuing firm’s core capability
by Chinho Lin & Ming-Lung Hsu & David C. Yen & Ping-Jung Hsieh & Hua-Ling Tsai & Tsung-Hsien Kuo - 511-520 Similarity reasoning for the semantic web based on fuzzy concept lattices: An informal approach
by Anna Formica
April 2013, Volume 15, Issue 2
- 151-157 Special issue on Semantic Information Management guest editorial
by Gabriele Kotsis & Ismail Khalil - 159-165 Collaborative learning in the clouds
by Hajar Mousannif & Ismail Khalil & Gabriele Kotsis - 167-192 Semantic information and knowledge integration through argumentative reasoning to support intelligent decision making
by Naeem Khalid Janjua & Farookh Khadeer Hussain & Omar Khadeer Hussain - 193-202 Estimation algorithm for counting periodic orbits in complex social networks
by Ibrahim Sorkhoh & Khaled A. Mahdi & Maytham Safar - 203-222 On the improvement of active XML (AXML) representation and query evaluation
by Binh Viet Phan & Eric Pardede & Wenny Rahayu - 223-233 Mitigation Efforts Calculator (MEC)
by Thanh Binh Nguyen & Lena Hoeglund-Isaksson & Fabian Wagner & Wolfgang Schoepp - 235-248 Indexing moving objects for directions and velocities queries
by Sultan Alamri & David Taniar & Maytham Safar - 249-268 Semantic-based transaction model for web service
by Shing-Han Li & Shi-Ming Huang & David C. Yen & Jui-Chang Sun - 269-278 Self-disclosure at social networking sites: An exploration through relational capitals
by Rui Chen & Sushil K. Sharma - 279-292 Privacy policies and national culture on the internet
by I. Reay & P. Beatty & S. Dick & J. Miller - 293-306 Distributed control for the networks of adaptive software components
by Seokcheon Lee
March 2013, Volume 15, Issue 1
- 1-4 Guest editorial: A brief overview of data leakage and insider threats
by Carly L. Huth & David W. Chadwick & William R. Claycomb & Ilsun You - 5-15 Understanding insiders: An analysis of risk-taking behavior
by Fariborz Farahmand & Eugene H. Spafford - 17-34 Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
by Howard Chivers & John A. Clark & Philip Nobles & Siraj A. Shaikh & Hao Chen - 35-53 Two-stage database intrusion detection by combining multiple evidence and belief update
by Suvasini Panigrahi & Shamik Sural & Arun K. Majumdar - 55-65 Application of density-based outlier detection to database activity monitoring
by Seung Kim & Nam Wook Cho & Young Joo Lee & Suk-Ho Kang & Taewan Kim & Hyeseon Hwang & Dongseop Mun - 67-88 Investigating the role of an enterprise architecture project in the business-IT alignment in Iran
by Morteza Alaeddini & Sepideh Salekfard - 89-98 A collaborative platform for buyer coalition: Introducing the Awareness-based Buyer Coalition (ABC) system
by Laor Boongasame & Farhad Daneshgar - 99-110 “Padding” bitmaps to support similarity and mining
by Roy Gelbard - 111-132 PadSpace: A new framework for the service federation of web resources
by Damdinsuren Lkhamsuren & Yuzuru Tanaka - 133-139 Comment on Lee et al.’s group signature and e-auction scheme
by Yanbin Sun & Yan Sun & Mingxing Luo & Lize Gu & Shihui Zheng & Yixian Yang - 141-150 Examining continuous usage of location-based services from the perspective of perceived justice
by Tao Zhou
December 2012, Volume 14, Issue 5
- 963-965 Information systems frontiers editorial December 2012
by R. Ramesh & H. Raghav Rao - 967-970 Economic theory and the financial crisis
by Kenneth Joseph Arrow - 971-986 End-to-end reliability of service oriented applications
by Hangjung Zo & Derek L. Nazareth & Hemant K. Jain - 987-998 An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment
by Chunlin Li & Layuan Li - 999-1017 FAST: Fundamental Analysis Support for Financial Statements. Using semantics for trading recommendations
by Alejandro Rodríguez-González & Ricardo Colomo-Palacios & Fernando Guldris-Iglesias & Juan Miguel Gómez-Berbís & Angel García-Crespo - 1019-1032 Applying ontology-based blog to detect information system post-development change requests conflicts
by Chi-Lun Liu & Heng-Li Yang - 1033-1046 Routinisation of B2B E-commerce by small firms: A process perspective
by Probir Kumar Banerjee & Louis C. Ma - 1047-1060 Entrepreneurship, knowledge integration capability, and firm performance: An empirical study
by Yong Jin Kim & Seokwoo Song & V. Sambamurthy & Young Lyoul Lee - 1061-1077 Using time-driven activity-based costing to manage digital forensic readiness in large organisations
by K. Reddy & H. S. Venter & M. S. Olivier - 1079-1094 Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process
by Barry A. Cumbie & Chetan S. Sankar - 1095-1095 Erratum to: A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
by Namho Lee & Jae Kwon Bae & Chulmo Koo
September 2012, Volume 14, Issue 4
- 823-825 Advances in intelligent grid and cloud computing
by Jason J. Jung & Yue-Shan Chang & Ying Liu & Chao-Chin Wu - 827-843 Economic model of a Cloud provider operating in a federated Cloud
by Íñigo Goiri & Jordi Guitart & Jordi Torres - 845-869 Economic aspects of hybrid cloud infrastructure: User organization perspective
by Oleksiy Mazhelis & Pasi Tyrväinen - 871-893 Decision-making in cloud computing environments: A cost and risk based approach
by Benedikt Martens & Frank Teuteberg - 895-908 A scalable multi-attribute hybrid overlay for range queries on the cloud
by Kuan-Chou Lai & You-Fu Yu - 909-924 Scaling database performance on GPUs
by Yue-Shan Chang & Ruey-Kai Sheu & Shyan-Ming Yuan & Jyn-Jie Hsu - 925-951 GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications
by J. Octavio Gutierrez-Garcia & Kwang Mong Sim - 953-961 ContextGrid: A contextual mashup-based collaborative browsing system
by Jason J. Jung
July 2012, Volume 14, Issue 3
- 477-479 Special issue on ubiquitous multimedia services
by Shiguo Lian & Jean-Henry Morin & Stefanos Gritzalis & Gregory L. Heileman - 481-497 MILC: A secure and privacy-preserving mobile instant locator with chatting
by Athanasios Loukas & Dimitrios Damopoulos & Sofia A. Menesidou & Maria E. Skarkala & Georgios Kambourakis & Stefanos Gritzalis - 499-515 Effective distributed service architecture for ubiquitous video surveillance
by Ray-I Chang & Te-Chih Wang & Chia-Hui Wang & Jen-Chang Liu & Jan-Ming Ho - 517-526 Automatic and fast temporal segmentation for personalized news consuming
by Yuan Dong & Shiguo Lian - 527-540 Advanced secure multimedia services for digital homes
by Rodrigo Roman & Javier Lopez & Olivier Dugeon & Marc Lacoste & Pierre Yves Plaza & Marta Bel - 541-553 Security model for emergency real-time communications in autonomous networks
by Emmanouil A. Panaousis & Christos Politis & Konstantinos Birkos & Christos Papageorgiou & Tasos Dagiuklas - 555-569 Third party application control on quality of service in IP based multimedia networks
by Evelina Pencheva & Ivaylo Atanasov - 571-584 Modeling the influence of network delay on the user experience in distributed home-automation networks
by Mark Umberger & Satja Lumbar & Iztok Humar - 585-600 Resource management activities in healthcare information systems: A process perspective
by Say Yen Teoh & Shan L. Pan & Anand M. Ramchand - 601-616 Efficient category-based service discovery on multi-agent platform
by Seungwok Han & Hee Yong Youn & Ohyoung Song - 617-632 Secure XML querying based on authorization graphs
by Artem Chebotko & Seunghan Chang & Shiyong Lu & Farshad Fotouhi - 633-645 Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost
by Yung-Ming Li & Jhih-Hua Jhang-Li & Ting-Kai Hwang & Ping-Wen Chen - 647-651 Vulnerabilities of RFID protocols proposed in ISF
by Selwyn Piramuthu - 653-668 A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
by Namho Lee & Jae Kwon Bae & Chulmo Koo - 669-692 Technological research plan for active ageing
by Hamideh Afsarmanesh & Simon Samwel Msanjila & Luis M. Camarinha-Matos - 693-709 Study of the digital divide evaluation model for government agencies–a Taiwanese local government’s perspective
by She-I Chang & David C. Yen & I-Cheng Chang & Jung-Chu Chou - 711-723 Collaboration among mobile agents for efficient energy allocation in mobile grid
by Chunlin Li & Layuan Li - 725-739 Intelligent forest fire monitoring system
by Maja Stula & Damir Krstinic & Ljiljana Seric - 741-764 CASE-mediated organizational and deutero learning at NASA
by Gary F. Templeton & James F. Dowdy - 765-788 Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows
by Haluk Demirkan & Sagnika Sen & Michael Goul & Jason Nichols - 789-808 Agile test framework for business-to-business interoperability
by Jungyub Woo & Nenad Ivezic & Hyunbo Cho - 809-822 A role-involved purpose-based access control model
by Md. Enamul Kabir & Hua Wang & Elisa Bertino
April 2012, Volume 14, Issue 2
- 119-121 Preface
by Shazia Sadiq & Michael Muehlen & Marta Indulska - 123-124 Governance, risk and compliance: Applications in information systems
by Shazia Sadiq & Michael zur Muehlen & Marta Indulska - 125-141 The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry
by Susan Scott & Nicholas Perry - 143-154 Managing license compliance in free and open source software development
by G. R. Gangadharan & Vincenzo D’Andrea & Stefano Paoli & Michael Weiss - 155-177 On compliance checking for clausal constraints in annotated process models
by Jörg Hoffmann & Ingo Weber & Guido Governatori - 179-193 Effective information technology (IT) governance mechanisms: An IT outsourcing perspective
by Syaiful Ali & Peter Green - 195-219 On enabling integrated process compliance with semantic constraints in process management systems
by Linh Thao Ly & Stefanie Rinderle-Ma & Kevin Göser & Peter Dadam - 221-235 A conceptual model and IS framework for the design and adoption of environmental compliance management systems
by Tom Butler & Damien McGovern - 237-259 Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework
by Francis Kofi Andoh-Baidoo & Kweku-Muata Osei-Bryson & Kwasi Amoako-Gyampah - 261-277 Use, perceived deterrence and the role of software piracy in video game console adoption
by Anastasiou Kartas & Sigi Goode - 279-299 Hidden assumptions and their influence on clinicians’ acceptance of new IT systems in the NHS
by Senaka Fernando & Jyoti Choudrie & Mark Lycett & Sergio Cesare - 301-315 Modeling the growth of complex software function dependency networks
by James Ma & Daniel Zeng & Huimin Zhao - 317-330 Modeling trade-offs in the design of sensor-based event processing infrastructures
by Agnès Voisard & Holger Ziekow - 331-342 Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue
by Seokjoo Andrew Chang - 343-361 Inter-organisational knowledge transfer in social networks: A definition of intermediate ties
by Silke Retzer & Pak Yoong & Val Hooper - 363-374 Business process design: Process comparison and integration
by Lan Xiao & Li Zheng - 375-393 The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet
by MinJae Lee & JinKyu Lee - 395-407 Organizational schemata of e-portfolios for fostering higher-order thinking
by Shouhong Wang & Hai Wang - 409-421 A study of mobile internet user’s service quality perceptions from a user’s utilitarian and hedonic value tendency perspectives
by Dan J. Kim & Yujong Hwang - 423-444 A decision support system for locating weapon and radar positions in stationary point air defence
by Türker Tanergüçlü & Hakan Maraş & Cevriye Gencer & Haluk Aygüneş - 445-455 The impact of information and communication technology on skilled labor and organization types
by Hwan-Joo Seo & Young Soo Lee & Jai-Joon Hur & Jin Ki Kim - 457-475 Determinants of relationship quality for IS/IT outsourcing success in public sector
by Bobby Swar & Junghoon Moon & Junyoung Oh & Cheul Rhee
March 2012, Volume 14, Issue 1
- 1-3 eHealth system interoperability
by Jens Weber-Jahnke & Liam Peyton & Thodoros Topaloglou - 5-18 Autonomous mapping of HL7 RIM and relational database schema
by Shagufta Umer & Muhammad Afzal & Maqbool Hussain & Khalid Latif & Hafiz Farooq Ahmad - 19-42 Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions
by Ellen Balka & Sandra Whitehouse & Shannon T. Coates & Dug Andrusiek - 43-55 Authorization in cross-border eHealth systems
by Daisy Daiqin He & Jian Yang & Michael Compton & Kerry Taylor