Content
March 2014, Volume 16, Issue 1
- 7-18 A cost-aware auto-scaling approach using the workload prediction in service clouds
by Jingqi Yang & Chuanchang Liu & Yanlei Shang & Bo Cheng & Zexiang Mao & Chunhong Liu & Lisha Niu & Junliang Chen - 19-34 Scalable and leaderless Byzantine consensus in cloud computing environments
by JongBeom Lim & Taeweon Suh & JoonMin Gil & Heonchang Yu - 35-44 IDTCP: An effective approach to mitigating the TCP incast problem in data center networks
by Guodong Wang & Yongmao Ren & Ke Dou & Jun Li - 45-58 A self-similar super-peer overlay construction scheme for super large-scale P2P applications
by Hung-Yi Teng & Chien-Nan Lin & Ren-Hung Hwang - 59-75 MPaaS: Mobility prediction as a service in telecom cloud
by Haoyi Xiong & Daqing Zhang & Daqiang Zhang & Vincent Gauthier & Kun Yang & Monique Becker - 77-93 Fully automated resource retrieval in telecommunications and internet converged environments
by Luis Javier Suarez-Meza & Julián Andrés Zúñiga & Edgar Camilo Pedraza & Juan Carlos Corrales - 95-111 Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing
by Feng Xia & Fangwei Ding & Jie Li & Xiangjie Kong & Laurence T. Yang & Jianhua Ma - 113-127 Enhanced Dynamic Authentication Scheme (EDAS)
by Toan-Thinh Truong & Minh-Triet Tran & Anh-Duc Duong - 129-141 A scalable approach for content based image retrieval in cloud datacenter
by Jianxin Liao & Di Yang & Tonghong Li & Jingyu Wang & Qi Qi & Xiaomin Zhu - 143-152 Multi-user web service selection based on multi-QoS prediction
by Shangguang Wang & Ching-Hsien Hsu & Zhongjun Liang & Qibo Sun & Fangchun Yang - 153-162 A network view of business systems
by Fatih Cavdur & Soundar Kumara
November 2013, Volume 15, Issue 5
- 695-704 Green information systems & technologies – this generation and beyond: Introduction to the special issue
by Joseph Sarkis & Chulmo Koo & Richard T. Watson - 705-723 Identifying IT sustainability performance drivers: Instrument development and validation
by Alemayehu Molla - 725-745 Towards a reference architecture for fuel-based carbon management systems in the logistics industry
by M. E. Iacob & M. J. Sinderen & M. Steenwijk & P. Verkroost - 747-760 Using information systems to improve energy efficiency: Do smart meters make a difference?
by Jacqueline Corbett - 761-778 Small business in a small country: Attitudes to “Green” IT
by Philip Coffey & Mary Tate & Janet Toland - 779-797 Understanding the beliefs, actions and outcomes of sustainability reporting: An experimental approach
by Matthias Gräuler & Michael Freundlieb & Kerstin Ortwerth & Frank Teuteberg - 799-814 Green practices-IS alignment and environmental performance: The mediating effects of coordination
by Sung Yul Ryoo & Chulmo Koo - 815-829 Investments in information systems: A contribution towards sustainability
by Michael Hertel & Julia Wiesent - 831-847 Green information technology strategic justification and evaluation
by Chunguang Bai & Joseph Sarkis - 849-871 Ontology-based data access: An application to intermodal logistics
by Matteo Casu & Giuseppe Cicala & Armando Tacchella - 873-888 The role of algorithmic trading systems on stock market efficiency
by Ji-Yong Seo & Sangmi Chai
September 2013, Volume 15, Issue 4
- 521-523 Information and knowledge management in online rich presence services
by Casey K. Fung & Patrick C. K. Hung - 525-532 Feasibility and a case study on content optimization services on cloud
by Raymond K. Wong - 533-551 Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm
by Chen Wei & Richard Khoury & Simon Fong - 553-567 QoS-aware and multi-granularity service composition
by Zaiwen Feng & Rong Peng & Raymond K. Wong & Keqing He & Jian Wang & Songlin Hu & Bing Li - 569-588 Optimizing dynamic supply chain formation in supply mesh using CSET model
by Hang Yang & Simon Fong - 589-598 A reliable scheduling method in equipment grid using provenance information
by Yuexuan Wang & Jie Yin - 599-612 A collaborative food safety service agent architecture with alerts and trust
by Woodas W. K. Lai & Dickson K. W. Chiu & Zaiwen Feng - 613-625 Improving efficiency of service discovery using Linked data-based service publication
by Wuhui Chen & Incheon Paik - 627-635 Rank-mediated collaborative tagging recommendation service using video-tag relationship prediction
by Wei-Feng Tung & Ting-Yu Lee - 637-651 Theory-generating design science research
by Roman Beck & Sven Weber & Robert Wayne Gregory - 653-676 Concept learning games
by Arman Didandeh & Nima Mirbakhsh & Mohsen Afsharchi - 677-694 Communication in virtual world: Second life and business opportunities
by Gajendra Sharma & Ye Qiang & Sun Wenjun & Lu Qi
July 2013, Volume 15, Issue 3
- 307-309 Business Intelligence and the Web
by Malu Castellanos & Florian Daniel & Irene Garrigós & Jose-Norberto Mazón - 311-329 Beyond search: Retrieving complete tuples from a text-database
by Alexander Löser & Christoph Nagel & Stephan Pieper & Christoph Boden - 331-349 Storing and analysing voice of the market data in the corporate data warehouse
by Lisette García-Moya & Shahad Kudama & María José Aramburu & Rafael Berlanga - 351-370 A multidimensional data model using the fuzzy model based on the semantic translation
by Ramón A. Carrasco & Francisco Muñoz-Leiva & Miguel J. Hornos - 371-398 Active XML-based Web data integration
by Rashed Salem & Omar Boussaïd & Jérôme Darmont - 399-410 Semantic similarity measurement using historical google search patterns
by Jorge Martinez-Gil & José F. Aldana-Montes - 411-431 Applying model-driven engineering to the development of Rich Internet Applications for Business Intelligence
by Jesús M. Hermida & Santiago Meliá & Andrés Montoyo & Jaime Gómez - 433-445 Capturing data quality requirements for web applications by means of DQ_WebRE
by César Guerra-García & Ismael Caballero & Mario Piattini - 447-463 A virtual mart for knowledge discovery in databases
by Claudia Diamantini & Domenico Potena & Emanuele Storti - 465-479 Personalized web feeds based on ontology technologies
by I-Ching Hsu - 481-495 The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs
by Qiu-Hong Wang & Viktor Mayer-Schönberger & Xue Yang - 497-509 Prototype system for pursuing firm’s core capability
by Chinho Lin & Ming-Lung Hsu & David C. Yen & Ping-Jung Hsieh & Hua-Ling Tsai & Tsung-Hsien Kuo - 511-520 Similarity reasoning for the semantic web based on fuzzy concept lattices: An informal approach
by Anna Formica
April 2013, Volume 15, Issue 2
- 151-157 Special issue on Semantic Information Management guest editorial
by Gabriele Kotsis & Ismail Khalil - 159-165 Collaborative learning in the clouds
by Hajar Mousannif & Ismail Khalil & Gabriele Kotsis - 167-192 Semantic information and knowledge integration through argumentative reasoning to support intelligent decision making
by Naeem Khalid Janjua & Farookh Khadeer Hussain & Omar Khadeer Hussain - 193-202 Estimation algorithm for counting periodic orbits in complex social networks
by Ibrahim Sorkhoh & Khaled A. Mahdi & Maytham Safar - 203-222 On the improvement of active XML (AXML) representation and query evaluation
by Binh Viet Phan & Eric Pardede & Wenny Rahayu - 223-233 Mitigation Efforts Calculator (MEC)
by Thanh Binh Nguyen & Lena Hoeglund-Isaksson & Fabian Wagner & Wolfgang Schoepp - 235-248 Indexing moving objects for directions and velocities queries
by Sultan Alamri & David Taniar & Maytham Safar - 249-268 Semantic-based transaction model for web service
by Shing-Han Li & Shi-Ming Huang & David C. Yen & Jui-Chang Sun - 269-278 Self-disclosure at social networking sites: An exploration through relational capitals
by Rui Chen & Sushil K. Sharma - 279-292 Privacy policies and national culture on the internet
by I. Reay & P. Beatty & S. Dick & J. Miller - 293-306 Distributed control for the networks of adaptive software components
by Seokcheon Lee
March 2013, Volume 15, Issue 1
- 1-4 Guest editorial: A brief overview of data leakage and insider threats
by Carly L. Huth & David W. Chadwick & William R. Claycomb & Ilsun You - 5-15 Understanding insiders: An analysis of risk-taking behavior
by Fariborz Farahmand & Eugene H. Spafford - 17-34 Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
by Howard Chivers & John A. Clark & Philip Nobles & Siraj A. Shaikh & Hao Chen - 35-53 Two-stage database intrusion detection by combining multiple evidence and belief update
by Suvasini Panigrahi & Shamik Sural & Arun K. Majumdar - 55-65 Application of density-based outlier detection to database activity monitoring
by Seung Kim & Nam Wook Cho & Young Joo Lee & Suk-Ho Kang & Taewan Kim & Hyeseon Hwang & Dongseop Mun - 67-88 Investigating the role of an enterprise architecture project in the business-IT alignment in Iran
by Morteza Alaeddini & Sepideh Salekfard - 89-98 A collaborative platform for buyer coalition: Introducing the Awareness-based Buyer Coalition (ABC) system
by Laor Boongasame & Farhad Daneshgar - 99-110 “Padding” bitmaps to support similarity and mining
by Roy Gelbard - 111-132 PadSpace: A new framework for the service federation of web resources
by Damdinsuren Lkhamsuren & Yuzuru Tanaka - 133-139 Comment on Lee et al.’s group signature and e-auction scheme
by Yanbin Sun & Yan Sun & Mingxing Luo & Lize Gu & Shihui Zheng & Yixian Yang - 141-150 Examining continuous usage of location-based services from the perspective of perceived justice
by Tao Zhou
December 2012, Volume 14, Issue 5
- 963-965 Information systems frontiers editorial December 2012
by R. Ramesh & H. Raghav Rao - 967-970 Economic theory and the financial crisis
by Kenneth Joseph Arrow - 971-986 End-to-end reliability of service oriented applications
by Hangjung Zo & Derek L. Nazareth & Hemant K. Jain - 987-998 An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment
by Chunlin Li & Layuan Li - 999-1017 FAST: Fundamental Analysis Support for Financial Statements. Using semantics for trading recommendations
by Alejandro Rodríguez-González & Ricardo Colomo-Palacios & Fernando Guldris-Iglesias & Juan Miguel Gómez-Berbís & Angel García-Crespo - 1019-1032 Applying ontology-based blog to detect information system post-development change requests conflicts
by Chi-Lun Liu & Heng-Li Yang - 1033-1046 Routinisation of B2B E-commerce by small firms: A process perspective
by Probir Kumar Banerjee & Louis C. Ma - 1047-1060 Entrepreneurship, knowledge integration capability, and firm performance: An empirical study
by Yong Jin Kim & Seokwoo Song & V. Sambamurthy & Young Lyoul Lee - 1061-1077 Using time-driven activity-based costing to manage digital forensic readiness in large organisations
by K. Reddy & H. S. Venter & M. S. Olivier - 1079-1094 Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process
by Barry A. Cumbie & Chetan S. Sankar - 1095-1095 Erratum to: A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
by Namho Lee & Jae Kwon Bae & Chulmo Koo
September 2012, Volume 14, Issue 4
- 823-825 Advances in intelligent grid and cloud computing
by Jason J. Jung & Yue-Shan Chang & Ying Liu & Chao-Chin Wu - 827-843 Economic model of a Cloud provider operating in a federated Cloud
by Íñigo Goiri & Jordi Guitart & Jordi Torres - 845-869 Economic aspects of hybrid cloud infrastructure: User organization perspective
by Oleksiy Mazhelis & Pasi Tyrväinen - 871-893 Decision-making in cloud computing environments: A cost and risk based approach
by Benedikt Martens & Frank Teuteberg - 895-908 A scalable multi-attribute hybrid overlay for range queries on the cloud
by Kuan-Chou Lai & You-Fu Yu - 909-924 Scaling database performance on GPUs
by Yue-Shan Chang & Ruey-Kai Sheu & Shyan-Ming Yuan & Jyn-Jie Hsu - 925-951 GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications
by J. Octavio Gutierrez-Garcia & Kwang Mong Sim - 953-961 ContextGrid: A contextual mashup-based collaborative browsing system
by Jason J. Jung
July 2012, Volume 14, Issue 3
- 477-479 Special issue on ubiquitous multimedia services
by Shiguo Lian & Jean-Henry Morin & Stefanos Gritzalis & Gregory L. Heileman - 481-497 MILC: A secure and privacy-preserving mobile instant locator with chatting
by Athanasios Loukas & Dimitrios Damopoulos & Sofia A. Menesidou & Maria E. Skarkala & Georgios Kambourakis & Stefanos Gritzalis - 499-515 Effective distributed service architecture for ubiquitous video surveillance
by Ray-I Chang & Te-Chih Wang & Chia-Hui Wang & Jen-Chang Liu & Jan-Ming Ho - 517-526 Automatic and fast temporal segmentation for personalized news consuming
by Yuan Dong & Shiguo Lian - 527-540 Advanced secure multimedia services for digital homes
by Rodrigo Roman & Javier Lopez & Olivier Dugeon & Marc Lacoste & Pierre Yves Plaza & Marta Bel - 541-553 Security model for emergency real-time communications in autonomous networks
by Emmanouil A. Panaousis & Christos Politis & Konstantinos Birkos & Christos Papageorgiou & Tasos Dagiuklas - 555-569 Third party application control on quality of service in IP based multimedia networks
by Evelina Pencheva & Ivaylo Atanasov - 571-584 Modeling the influence of network delay on the user experience in distributed home-automation networks
by Mark Umberger & Satja Lumbar & Iztok Humar - 585-600 Resource management activities in healthcare information systems: A process perspective
by Say Yen Teoh & Shan L. Pan & Anand M. Ramchand - 601-616 Efficient category-based service discovery on multi-agent platform
by Seungwok Han & Hee Yong Youn & Ohyoung Song - 617-632 Secure XML querying based on authorization graphs
by Artem Chebotko & Seunghan Chang & Shiyong Lu & Farshad Fotouhi - 633-645 Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost
by Yung-Ming Li & Jhih-Hua Jhang-Li & Ting-Kai Hwang & Ping-Wen Chen - 647-651 Vulnerabilities of RFID protocols proposed in ISF
by Selwyn Piramuthu - 653-668 A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
by Namho Lee & Jae Kwon Bae & Chulmo Koo - 669-692 Technological research plan for active ageing
by Hamideh Afsarmanesh & Simon Samwel Msanjila & Luis M. Camarinha-Matos - 693-709 Study of the digital divide evaluation model for government agencies–a Taiwanese local government’s perspective
by She-I Chang & David C. Yen & I-Cheng Chang & Jung-Chu Chou - 711-723 Collaboration among mobile agents for efficient energy allocation in mobile grid
by Chunlin Li & Layuan Li - 725-739 Intelligent forest fire monitoring system
by Maja Stula & Damir Krstinic & Ljiljana Seric - 741-764 CASE-mediated organizational and deutero learning at NASA
by Gary F. Templeton & James F. Dowdy - 765-788 Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows
by Haluk Demirkan & Sagnika Sen & Michael Goul & Jason Nichols - 789-808 Agile test framework for business-to-business interoperability
by Jungyub Woo & Nenad Ivezic & Hyunbo Cho - 809-822 A role-involved purpose-based access control model
by Md. Enamul Kabir & Hua Wang & Elisa Bertino
April 2012, Volume 14, Issue 2
- 119-121 Preface
by Shazia Sadiq & Michael Muehlen & Marta Indulska - 123-124 Governance, risk and compliance: Applications in information systems
by Shazia Sadiq & Michael zur Muehlen & Marta Indulska - 125-141 The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry
by Susan Scott & Nicholas Perry - 143-154 Managing license compliance in free and open source software development
by G. R. Gangadharan & Vincenzo D’Andrea & Stefano Paoli & Michael Weiss - 155-177 On compliance checking for clausal constraints in annotated process models
by Jörg Hoffmann & Ingo Weber & Guido Governatori - 179-193 Effective information technology (IT) governance mechanisms: An IT outsourcing perspective
by Syaiful Ali & Peter Green - 195-219 On enabling integrated process compliance with semantic constraints in process management systems
by Linh Thao Ly & Stefanie Rinderle-Ma & Kevin Göser & Peter Dadam - 221-235 A conceptual model and IS framework for the design and adoption of environmental compliance management systems
by Tom Butler & Damien McGovern - 237-259 Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework
by Francis Kofi Andoh-Baidoo & Kweku-Muata Osei-Bryson & Kwasi Amoako-Gyampah - 261-277 Use, perceived deterrence and the role of software piracy in video game console adoption
by Anastasiou Kartas & Sigi Goode - 279-299 Hidden assumptions and their influence on clinicians’ acceptance of new IT systems in the NHS
by Senaka Fernando & Jyoti Choudrie & Mark Lycett & Sergio Cesare - 301-315 Modeling the growth of complex software function dependency networks
by James Ma & Daniel Zeng & Huimin Zhao - 317-330 Modeling trade-offs in the design of sensor-based event processing infrastructures
by Agnès Voisard & Holger Ziekow - 331-342 Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue
by Seokjoo Andrew Chang - 343-361 Inter-organisational knowledge transfer in social networks: A definition of intermediate ties
by Silke Retzer & Pak Yoong & Val Hooper - 363-374 Business process design: Process comparison and integration
by Lan Xiao & Li Zheng - 375-393 The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet
by MinJae Lee & JinKyu Lee - 395-407 Organizational schemata of e-portfolios for fostering higher-order thinking
by Shouhong Wang & Hai Wang - 409-421 A study of mobile internet user’s service quality perceptions from a user’s utilitarian and hedonic value tendency perspectives
by Dan J. Kim & Yujong Hwang - 423-444 A decision support system for locating weapon and radar positions in stationary point air defence
by Türker Tanergüçlü & Hakan Maraş & Cevriye Gencer & Haluk Aygüneş - 445-455 The impact of information and communication technology on skilled labor and organization types
by Hwan-Joo Seo & Young Soo Lee & Jai-Joon Hur & Jin Ki Kim - 457-475 Determinants of relationship quality for IS/IT outsourcing success in public sector
by Bobby Swar & Junghoon Moon & Junyoung Oh & Cheul Rhee
March 2012, Volume 14, Issue 1
- 1-3 eHealth system interoperability
by Jens Weber-Jahnke & Liam Peyton & Thodoros Topaloglou - 5-18 Autonomous mapping of HL7 RIM and relational database schema
by Shagufta Umer & Muhammad Afzal & Maqbool Hussain & Khalid Latif & Hafiz Farooq Ahmad - 19-42 Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions
by Ellen Balka & Sandra Whitehouse & Shannon T. Coates & Dug Andrusiek - 43-55 Authorization in cross-border eHealth systems
by Daisy Daiqin He & Jian Yang & Michael Compton & Kerry Taylor - 57-72 A mashup based framework for multi level healthcare interoperability
by Payam Sadeghi & Morad Benyoucef & Craig E. Kuziemsky - 73-85 Interoperable support for collaborative, mobile, and accessible health care
by Alain Mouttham & Craig Kuziemsky & Dishant Langayan & Liam Peyton & Jose Pereira - 87-104 Protecting privacy during peer-to-peer exchange of medical documents
by Jens H. Weber-Jahnke & Christina Obry - 105-117 Knowledge-based clinical pathway for medical quality improvement
by Hongqiao Yang & Weizi Li & Kecheng Liu & Junping Zhang
November 2011, Volume 13, Issue 5
- 615-619 Knowledge work and communication challenges in networked enterprises
by Joseph Barjis & Ashish Gupta & Ramesh Sharda - 621-636 SimKnowledge—Analyzing impact of knowledge management measures on team organizations with multi agent-based simulation
by René Peinl & Ronald Maier - 637-653 You’ve got email! Does it really matter to process emails now or later?
by Ashish Gupta & Ramesh Sharda & Robert A. Greve - 655-668 Decision-enabled dynamic process management for networked enterprises
by Amit V. Deokar & Omar F. El-Gayar - 669-680 Modeling the dynamic interactions of agents in the provision of network infrastructure
by Kurt DeMaagd & Johannes M. Bauer - 681-692 Strategic choices of inter-organizational information systems: A network perspective
by Daning Hu & Sherry X. Sun & J. Leon Zhao & Xinlei Zhao - 693-706 The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry
by Samuel Fosso Wamba & Akemi Takeoka Chatfield - 707-719 An aggregate inventory-based model for predicting redemption and liability in loyalty reward programs industry
by Aaron Luntala Nsakanda & Moustapha Diaby & Yuheng Cao
September 2011, Volume 13, Issue 4
- 451-452 Editorial
by R. Ramesh & H. Raghav Rao - 453-469 Impacts of navigation structure, task complexity, and users’ domain knowledge on Web site usability—an empirical study
by Xiang Fang & Clyde W. Holsapple - 471-480 Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems
by Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park - 481-500 TMS-RFID: Temporal management of large-scale RFID applications
by Xue Li & Jing Liu & Quan Z. Sheng & Sherali Zeadally & Weicai Zhong - 501-514 A user-centric evaluation of the readability of privacy policies in popular web sites
by Ravi Inder Singh & Manasa Sumeeth & James Miller - 515-542 Semantic business process space for intelligent management of sales order business processes
by Gunwoo Kim & Yongmoo Suh - 543-560 A business maturity model of software product line engineering
by Faheem Ahmed & Luiz Fernando Capretz - 561-578 Determinants of self-report and system-captured measures of mobile Internet use intensity
by Torsten J. Gerpott - 579-593 Information systems resources and information security
by Kuo-chung Chang & Chih-ping Wang - 595-611 RiskM: A multi-perspective modeling method for IT risk assessment
by Stefan Strecker & David Heise & Ulrich Frank - 613-613 Erratum to: Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes
by Young Mee Shin & Seung Chang Lee & Bongsik Shin & Ho Geun Lee
July 2011, Volume 13, Issue 3
- 301-304 Global IT and IT-enabled services
by Michael Chau & George L. Ball & Jinghua Huang & Jian Chen & J. Leon Zhao - 305-319 Derivation of trust federation for collaborative business processes
by Ji Hu - 321-335 A mixed transaction processing and operational reporting benchmark
by Anja Bog & Hasso Plattner & Alexander Zeier - 337-348 GIS enabled service site selection: Environmental analysis and beyond
by Junjie Wu & Jian Chen & Yili Ren - 349-357 Efficient storage and fast querying of source code
by Oleksandr Panchenko & Hasso Plattner & Alexander B. Zeier - 359-370 Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems
by Noyan Ilk & J. Leon Zhao & Paulo Goes & Paul Hofmann - 371-380 A process mining based approach to knowledge maintenance
by Ming Li & Lu Liu & Lu Yin & Yanqiu Zhu - 381-395 Why adoption and use behavior of IT/IS cannot last?—two studies in China
by Nan Zhang & Xunhua Guo & Guoqing Chen - 397-405 Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm
by Amar Gupta & Igor Crk & Rajdeep Bondade - 407-428 Combining query-by-example and query expansion for simplifying web service discovery
by Marco Crasso & Alejandro Zunino & Marcelo Campo - 429-450 An ERP system performance assessment model development based on the balanced scorecard approach
by She-I Chang & David C. Yen & Celeste See-Pui Ng & I-Cheng Chang & Sheng-Yu Yu
April 2011, Volume 13, Issue 2
- 153-155 ISF special issue on emerging social and legal aspects of information systems with Web 2.0
by Dickson K. W. Chiu & Eleanna Kafeza & Patrick C. K. Hung - 157-169 How social influence affects we-intention to use instant messaging: The moderating effect of usage experience
by Aaron X. L. Shen & Christy M. K. Cheung & Matthew K. O. Lee & Huaping Chen - 171-189 Integrating constraints to support legally flexible business processes
by Yuqing Sun & Joshua Zhexue Huang & Xiangxu Meng - 191-205 Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning
by Minhong Wang - 207-220 A computing theory for collaborative and transparent decision making under time constraint
by Hideyasu Sasaki - 221-235 Trust perceptions of online travel information by different content creators: Some social and legal implications
by Stephen Burgess & Carmine Sellitto & Carmen Cox & Jeremy Buultjens - 237-249 Towards promoting interactivity in a B2B web community
by Chima Adiele - 251-264 A university-oriented Web 2.0 services portal
by Jia Zhang & Karthik Akula & Momtazul Karim & Raghu Kumar Reddy Ariga - 265-279 A study of the impacts of positive/negative feedback on collective wisdom—case study on social bookmarking sites
by Yuan-Chu Hwang & Soe-Tsyr Yuan & Jung-Hui Weng - 281-300 Taxonomy, technology and applications of smart objects
by Tomás Sánchez López & Damith Chinthana Ranasinghe & Bela Patkai & Duncan McFarlane
March 2011, Volume 13, Issue 1
- 1-3 Introduction to special issue on terrorism informatics
by Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson - 5-19 Tracking and disrupting dark networks: Challenges of data collection and analysis
by Nancy C. Roberts - 21-31 Computational approaches to suspicion in adversarial settings
by David B. Skillicorn - 33-43 Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
by Onook Oh & Manish Agrawal & H. Raghav Rao - 45-59 A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter
by Marc Cheong & Vincent C. S. Lee - 61-73 Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict
by Sheryl Prentice & Paul J. Taylor & Paul Rayson & Andrew Hoskins & Ben O’Loughlin - 75-88 A multi-region empirical study on the internet presence of global extremist organizations
by Jialun Qin & Yilu Zhou & Hsinchun Chen - 89-100 “Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams
by Stephen C. Hayne & Lucy J. Troup & Sara A. McComb - 101-113 Identity matching using personal and social identity features
by Jiexun Li & G. Alan Wang & Hsinchun Chen - 115-125 Domain-specific Chinese word segmentation using suffix tree and mutual information
by Daniel Zeng & Donghua Wei & Michael Chau & Feiyue Wang - 127-137 Tag-only aging-counter localization for the R-LIM2 system
by Jung-Wook Choi & Dong-Ik Oh - 139-151 Leveraging information sharing to configure supply chains
by Rong Liu & Akhil Kumar
November 2010, Volume 12, Issue 5
- 481-483 Guest editorial: Advances in RFID technology
by Quan Z. Sheng & Sherali Zeadally & Zongwei Luo & Jen-Yao Chung & Zakaria Maamar - 485-490 Ubiquitous RFID: Where are we?
by Quan Z. Sheng & Sherali Zeadally & Zongwei Luo & Jen-Yao Chung & Zakaria Maamar - 491-505 Classifying RFID attacks and defenses
by Aikaterini Mitrokotsa & Melanie R. Rieback & Andrew S. Tanenbaum - 507-519 Secure and private search protocols for RFID systems
by Yanjun Zuo - 521-528 A lightweight anti-desynchronization RFID authentication protocol
by Shijie Zhou & Zhen Zhang & Zongwei Luo & Edward C. Wong - 529-539 ID-Services: an RFID middleware architecture for mobile applications
by Joachim Schwieren & Gottfried Vossen