Content
November 2010, Volume 12, Issue 5
- 541-549 Sharing RFID and complex event data among organizations
by Holger Ziekow & Oliver Günther - 551-562 FlexRFID: A design, development and deployment framework for RFID-based business applications
by Arijit Sengupta & Shu Z. Schiller - 563-578 Automated management of assets based on RFID triggered alarm messages
by Shengguang Meng & Dickson K. W. Chiu & Eleanna Kafeza & Liu Wenyin & Qing Li - 579-593 An empirical investigation into the effects of web search characteristics on decisions associated with impression formation
by Shailaja Venkatsubramanyan & Timothy R. Hill - 595-606 Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes
by Young Mee Shin & Seung Chang Lee & Bongsik Shin & Ho Geun Lee - 607-629 Personalisation in web computing and informatics: Theories, techniques, applications, and future research
by Min Gao & Kecheng Liu & Zhongfu Wu - 631-645 Combining transaction cost and resource-based insights to explain IT implementation outsourcing
by Emilio Alvarez-Suescun
September 2010, Volume 12, Issue 4
- 357-359 Ethics and information systems — Guest editors’ introduction
by Maria Carla Calzarossa & Ivo Lotto & Simon Rogerson - 361-367 Analysis of MySpace user profiles
by Luisa Massari - 369-377 The ethics of video games: Mayhem, death, and the training of the next generation
by Don Gotterbarn - 379-387 Expanding ethical vistas of IT professionals
by Ian Stoodley & Christine Bruce & Sylvia Edwards - 389-397 Users’ involvement may help respect social and ethical values and improve software quality
by Barbara Begier - 399-413 Knowledge versus content in e-learning: A philosophical discussion
by Gonçalo Jorge Morais Costa & Nuno Sotero Alves Silva - 415-424 Agents of responsibility—freelance web developers in web applications development
by Malik Aleem Ahmed & Jeroen Hoven - 425-431 Hacker Taggers: A new type of hackers
by Matthew Warren & Shona Leitch - 433-441 Ethical implications of internet monitoring: A comparative study
by Frances S. Grodzinsky & Andra Gumbus & Stephen Lilley - 443-455 Increasing the efficiency of business processes using a theory of constraints
by Seung-Hyun Rhee & Nam Wook Cho & Hyerim Bae - 457-479 Specification and verification of harmonized business-process collaborations
by Alex Norta & Rik Eshuis
July 2010, Volume 12, Issue 3
- 235-237 Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage”
by Devaki Rau & Thorvald Haerem & Gautam Ray & Wei Zheng - 239-255 From IT deployment capabilities to competitive advantage: An exploratory study in China
by Jun Tian & Kanliang Wang & Yan Chen & Björn Johansson - 257-265 ICT infrastructure for innovation: A case study of the enterprise service bus approach
by Bendik Bygstad & Hans-Petter Aanby - 267-275 Knowledge management technology for organized crime risk assessment
by Petter Gottschalk - 277-285 Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages?
by Jeanine Warisse Turner & N. Lamar Reinsch - 287-297 Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research
by Devaki Rau & Thorvald Haerem - 299-309 The impact of trust, risk and optimism bias on E-file adoption
by Ludwig Christian Schaupp & Lemuria Carter - 311-322 Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance
by Xin Xu & Will Wai Kit Ma & Eric Wing Kuen See-To - 323-335 An empirical study of IT as a factor of production: The case of Net-enabled IT assets
by Saggi Nevo & Michael Wade & Wade D. Cook - 337-356 An ontological modelling of user requirements for personalised information provision
by Lily Sun & Khadidjatou Ousmanou & Matthew Cross
April 2010, Volume 12, Issue 2
- 97-114 Object-oriented re-engineering of manufacturing models: A case study
by Vincenza Carchiolo & Sebastiano D’Ambra & Alessandro Longheu & Michele Malgeri - 115-139 UML-CI: A reference model for profiling critical infrastructure systems
by Ebrahim Bagheri & Ali A. Ghorbani - 141-148 An approach for moving object recognition based on BPR and CI
by Li Wang & Lida Xu & Renjing Liu & Hai Hong Wang - 149-156 An SVM-based machine learning method for accurate internet traffic classification
by Ruixi Yuan & Zhu Li & Xiaohong Guan & Li Xu - 157-168 A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce
by Arnold Kamis & Tziporah Stern & Daniel M. Ladik - 169-183 Do as your parents say?—Analyzing IT adoption influencing factors for full and under age applicants
by Sven Laumer & Andreas Eckhardt & Natascha Trunk - 185-205 Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement
by Jahyun Goo - 207-217 Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider
by Yogesh K. Dwivedi & Anastasia Papazafeiropoulou & Willem-Paul Brinkman & Banita Lal - 219-234 A socio-technical approach to improving the systems development process
by Ravi Patnayakuni & Cynthia P. Ruppel
March 2010, Volume 12, Issue 1
- 1-7 Advances in multi-agency disaster management: Key elements in disaster research
by Marijn Janssen & JinKyu Lee & Nitesh Bharosa & Anthony Cresswell - 9-27 Collaborative systems development in disaster relief: The impact of multi-level governance
by Edgar A. Maldonado & Carleen F. Maitland & Andrea H. Tapia - 29-47 Alert based disaster notification and resource allocation
by Dickson K. W. Chiu & Drake T. T. Lin & Eleanna Kafeza & Minhong Wang & Haiyang Hu & Hua Hu & Yi Zhuang - 49-65 Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises
by Nitesh Bharosa & JinKyu Lee & Marijn Janssen - 67-79 Information intermediaries for emergency preparedness and response: A case study from public health
by Minu Ipe & T. S. Raghu & Ajay Vinze - 81-95 Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system
by Jane Fedorowicz & Janis L. Gogan
November 2009, Volume 11, Issue 5
- 481-482 Intelligent systems and smart homes
by Jong Hyuk Park & Ching-Hsien Hsu & Hamid R. Arabnia - 483-490 Service integration with UPnP agent for an ubiquitous home environment
by Wally Chen & Sy-Yen Kuo & Han-Chieh Chao - 491-500 A novel memory management scheme for residential gateways
by Ibrahim Kamel & Beizhong Chen - 501-512 Location-aware communications in smart environments
by Ichiro Satoh - 513-521 T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks
by Jiman Hong & Joongjin Kook & Sangjun Lee & Dongseop Kwon & Sangho Yi - 523-528 A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA
by Hak-Man Kim & Jong-Joo Lee & Myong-Chul Shin & Seok-Soo Kim - 529-536 A ubiquitous smart home for elderly
by M. W. Raad & L. T. Yang - 537-537 Monitoring user activities in smart home environments
by Sajid Hussain & Senol Zafer Erdogan & Jong Hyuk Park - 539-549 Monitoring user activities in smart home environments
by Sajid Hussain & Senol Zafer Erdogen & Jong Hyuk Park - 551-559 Learning fuzzy concept hierarchy and measurement with node labeling
by Been-Chian Chien & Chih-Hung Hu & Ming-Yi Ju - 561-567 A study on applying context-aware technology on hypothetical shopping advertisement
by Jae-gu Song & Seoksoo Kim - 569-597 VO breeding environments & virtual organizations integral business process management framework
by David Romero & Arturo Molina - 599-608 A ‘smart house’ is not a home: The domestication of ICTs
by Helen J. Richardson
September 2009, Volume 11, Issue 4
- 345-347 Editorial for the special issue of knowledge discovery and management in biomedical information systems
by Ying Liu & Lawrence Wing-Chi Chan & Chi-Ren Shyu & Ying Liu - 349-368 An automated bacterial colony counting and classification system
by Wei-Bang Chen & Chengcui Zhang - 369-379 Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model
by Alex K. S. Wong & Lawrence W. C. Chan & Ying Liu - 381-389 Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration
by Fuk-hay Tang & H. S. Horace Ip - 391-403 Interactive survival analysis with the OCDM system: From development to application
by Sebastian Klenk & Jürgen Dippon & Peter Fritz & Gunther Heidemann - 405-417 Design of an RFID-based Healthcare Management System using an Information System Design Theory
by E. W. T. Ngai & J. K. L. Poon & F. F. C. Suk & C. C. Ng - 419-431 Coronary artery disease prediction method using linear and nonlinear feature of heart rate variability in three recumbent postures
by Heon Gyu Lee & Wuon-Shik Kim & Ki Yong Noh & Jin-Ho Shin & Unil Yun & Keun Ho Ryu - 433-447 Efficient mining of multilevel gene association rules from microarray and gene ontology
by Vincent S. Tseng & Hsieh-Hui Yu & Shih-Chiang Yang - 449-460 Comparing data mining methods with logistic regression in childhood obesity prediction
by Shaoyan Zhang & Christos Tjortjis & Xiaojun Zeng & Hong Qiao & Iain Buchan & John Keane - 461-469 Proportional fault-tolerant data mining with applications to bioinformatics
by Guanling Lee & Sheng-Lung Peng & Yuh-Tzu Lin - 471-480 Knowledge management in biomedical libraries: A semantic web approach
by Damaris Fuentes-Lorenzo & Jorge Morato & Juan Miguel Gómez
July 2009, Volume 11, Issue 3
- 201-209 Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue
by Chengfei Liu & Qing Li & Xiaohui Zhao - 211-225 Evie - A developer toolkit for encoding service interaction patterns
by Anthony M. J. O’Hagan & Shazia Sadiq & Wasim Sadiq - 227-239 Quality analysis of composed services through fault injection
by Maria Grazia Fugini & Barbara Pernici & Filippo Ramoni - 241-256 Towards ubiquitous tourist service coordination and process integration: A collaborative travel agent system architecture with semantic web services
by Dickson K. W. Chiu & Yves T. F. Yueh & Ho-fung Leung & Patrick C. K. Hung - 257-272 CoBTx-Net: A model for business collaboration reliability verification
by Haiyang Sun & Jian Yang & Lai Xu - 273-291 Evaluation of inter-organizational business process solutions: A conceptual model-based approach
by Johny Ghattas & Pnina Soffer - 293-305 Delegating revocations and authorizations in collaborative business environments
by Hua Wang & Jinli Cao & Yanchun Zhang - 307-322 Analysis of a collaborative workflow process with distributed actors
by Hajo A. Reijers & Minseok Song & Byungduk Jeong - 323-333 Investigating mobile wireless technology adoption: An extension of the technology acceptance model
by Sanghyun Kim & Gary Garrison - 335-343 A secure e-auction scheme based on group signatures
by Cheng-Chi Lee & Pi-Fang Ho & Min-Shiang Hwang
April 2009, Volume 11, Issue 2
- 103-104 Guest editorial: Information and communications technology for development
by Balaji Parthasarathy & Krithi Ramamritham - 105-116 If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India
by Joyojeet Pal - 117-128 Design of a braille writing tutor to combat illiteracy
by N. Kalra & T. Lauwers & D. Dewey & T. Stepleton & M. B. Dias - 129-144 “My child will be respected”: Parental perspectives on computers and education in Rural India
by Joyojeet Pal & Meera Lakshmanan & Kentaro Toyama - 145-154 Advancement through interactive radio
by S. Revi Sterling & John O’Brien & John K. Bennett - 155-166 ICT intervention in the ‘Chandanbari’ Village of Bangladesh: Results from a field study
by Mahfuz Ashraf & Jo Hanisch & Paul Swatman - 167-179 Effect of the food traceability system for building trust: Price premium and buying behavior
by Young Chan Choe & Joowon Park & Miri Chung & Junghoon Moon - 181-188 Managing cooperation in e-business systems
by Pradeep Ray & Lundy Lewis - 189-200 Managing the diffusion of organizational learning behavior
by Gary F. Templeton & Mark B. Schmidt & G. Stephen Taylor
March 2009, Volume 11, Issue 1
- 1-5 Special issue on Ambient Intelligence
by Satyen Mukherjee & Emile Aarts & Terry Doyle - 7-18 Harvesting mechanical energy for ambient intelligent devices
by Bert Op het Veld & Dennis Hohlfeld & Valer Pop - 19-41 Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
by Jorge Guajardo & Boris Škorić & Pim Tuyls & Sandeep S. Kumar & Thijs Bel & Antoon H. M. Blom & Geert-Jan Schrijen - 43-60 Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom
by Yuan-Chu Hwang & Soe-Tsyr Yuan - 61-73 Distributed network intelligence: A prerequisite for adaptive and personalised service delivery
by M. J. O’Grady & G. M. P. O’Hare & J. Chen & D. Phelan - 75-86 Method of design and specification of web services based on quality system documentation
by Miladin Stefanovic & Milan Matijević & Milan Erić & Visnja Simic - 87-102 Profiling a decade of Information Systems Frontiers’ research
by Yogesh K. Dwivedi & Banita Lal & Navonil Mustafee & Michael D. Williams
November 2008, Volume 10, Issue 5
- 499-501 Advances in enterprise information systems
by Ling Li & Ricardo Valerdi & John N. Warfield - 503-518 Complex service design: A virtual enterprise architecture for logistics service
by Charles Møller & Sohail S. Chaudhry & Bent Jørgensen - 519-529 Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies
by WenAn Tan & ChuanQun Jiang & Ling Li & Zhenhong Lv - 531-542 Creation of environmental health information system for public health service: A pilot study
by Ling Li & Li Xu & Hueiwang Anna Jeng & Dayanand Naik & Thomas Allen & Maria Frontini - 543-553 Architecture, implementation and application of complex event processing in enterprise information systems based on RFID
by Chuanzhen Zang & Yushun Fan & Renjing Liu - 555-571 A literature review of electronic marketplace research: Themes, theories and an integrative framework
by Shan Wang & Shi Zheng & Lida Xu & Dezheng Li & Huan Meng - 573-588 An OVAL-based active vulnerability assessment system for enterprise computer networks
by Xiuzhen Chen & Qinghua Zheng & Xiaohong Guan - 589-600 Parameter mapping and data transformation for engineering application integration
by Chengen Wang & Lida Xu - 601-609 The concept and theory of material flow
by Shoubo Xu - 611-624 An approach to enterprise process dynamic modeling supporting enterprise process evolution
by Lida Xu & WenAn Tan & Hongyuan Zhen & Weiming Shen
September 2008, Volume 10, Issue 4
- 385-390 Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context
by Yogesh K. Dwivedi & Michael D. Williams & Viswanath Venkatesh - 391-395 Digital home technologies and transformation of households
by Alladi Venkatesh - 397-402 Household technology adoption, use, and impacts: Past, present, and future
by Susan A. Brown - 403-413 Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values
by Xiaojun Zhang & Likoebe M. Maruping - 415-429 Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services
by Roman Beck & Daniel Beimborn & Tim Weitzel & Wolfgang König - 431-445 Understanding the behavior of mobile data services consumers
by Se-Joon Hong & James Y. L. Thong & Jae-Yun Moon & Kar-Yan Tam - 447-459 Social networking and digital gaming media convergence: Classification and its consequences for appropriation
by Marie Griffiths & Ben Light - 461-472 Affective e-Learning in residential and pervasive computing environments
by Liping Shen & Victor Callaghan & Ruimin Shen - 473-482 E-government adoption: A cultural comparison
by Lemuria Carter & Vishanth Weerakkody - 483-497 Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis
by Dinesh A. Mirchandani & Julius H. Johnson Jr. & Kailash Joshi
July 2008, Volume 10, Issue 3
- 277-279 Decision models for information systems management
by Kweku-Muata Osei-Bryson & Ojelanki Ngwenyama - 281-292 Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories
by Sergey Samoilenko - 293-305 Analyzing IT maintenance outsourcing decision from a knowledge management perspective
by Mehmet N. Aydin & Mark E. Bakker - 307-319 An approach to analyzing and planning post-merger IS integration: Insights from two field studies
by Maria Alaranta & Stefan Henningsson - 321-330 A process-focused decision framework for analyzing the business value potential of IT investments
by Helana Scheepers & Rens Scheepers - 331-345 Towards an integrated measurement of IS project performance: The project performance scorecard
by Corlane Barclay - 347-359 Team performance and information system implementation
by Malgorzata Plaza - 361-373 An approach for incorporating quality-based cost–benefit analysis in data warehouse design
by Lila Rao & Kweku-Muata Osei-Bryson - 375-383 Is your back-up IT infrastructure in a safe location?
by Ozgur Turetken
April 2008, Volume 10, Issue 2
- 125-127 Foreword to the special issue on IS sourcing
by Rudy Hirschheim & Jens Dibbern & Armin Heinzl - 129-143 Firm strategic profile and IT outsourcing
by Benoit A. Aubert & Guillaume Beaurivage & Anne-Marie Croteau & Suzanne Rivard - 145-163 An integrative model of trust on IT outsourcing: Examining a bilateral perspective
by Jae-Nam Lee & Minh Q. Huynh & Rudy Hirschheim - 165-178 Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company
by Julie Fisher & Rudy Hirschheim & Robert Jacobs - 179-194 Information technology workforce skills: The software and IT services provider perspective
by Tim Goles & Stephen Hawk & Kate M. Kaiser - 195-210 Strategic dependence on the IT resource and outsourcing: A test of the strategic control model
by Detmar Straub & Peter Weill & Kathy S. Schwaig - 211-224 The impact of process standardization on business process outsourcing success
by Kim Wüllenweber & Daniel Beimborn & Tim Weitzel & Wolfgang König - 225-241 Turnover intentions of Indian IS professionals
by Mary C. Lacity & Vidya V. Iyer & Prasad S. Rudramuniyaiah - 243-258 The impact of cultural differences in offshore outsourcing—Case study results from German–Indian application development projects
by Jessica K. Winkler & Jens Dibbern & Armin Heinzl - 259-275 A US Client’s learning from outsourcing IT work offshore
by Joseph W. Rottman & Mary C. Lacity
March 2008, Volume 10, Issue 1
- 1-2 Editorial
by R. Ramesh & H. R. Rao - 3-18 Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation
by Janice C. Sipior & Burke T. Ward - 19-32 Formalising theories of trust for authentication protocols
by Ji Ma & Mehmet A. Orgun - 33-45 A scalable multi-level feature extraction technique to detect malicious executables
by Mohammad M. Masud & Latifur Khan & Bhavani Thuraisingham - 47-60 Building effective online game websites with knowledge-based trust
by Clyde W. Holsapple & Jiming Wu - 61-75 Market reaction to patent infringement litigations in the information technology industry
by T. S. Raghu & Wonseok Woo & S. B. Mohan & H. Raghav Rao - 77-102 Spectrum acquisition strategies adopted by wireless carriers in the USA
by Hemant K. Sabat - 103-110 Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading
by Borka Jerman-Blažič - 111-124 A decision support system for locating VHF/UHF radio jammer systems on the terrain
by Cevriye Gencer & Emel Kizilkaya Aydogan & Coskun Celik
November 2007, Volume 9, Issue 5
- 449-450 Special issue on secure knowledge management
by Nasir Memon & Thomas Daniels - 451-467 Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system
by Yanjun Zuo & Timothy O’Keefe - 469-479 An interorganizational knowledge-sharing security model with breach propagation detection
by Daniel S. Soper & Haluk Demirkan & Michael Goul - 481-492 Overcoming organizational challenges to secure knowledge management
by Finn Olav Sveen & Eliot Rich & Matthew Jager - 493-504 Security as a contributor to knowledge management success
by Murray E. Jennex & Suzanne Zyngier - 505-514 Virtual organization security policies: An ontology-based integration approach
by Saravanan Muthaiyah & Larry Kerschberg - 515-529 Sharing information and building trust through value congruence
by Joseph A. Cazier & Benjamin B. M. Shao & Robert D. St. Louis - 531-539 An examination of private intermediaries’ roles in software vulnerabilities disclosure
by Pu Li & H. Raghav Rao - 541-556 Managing the false alarms: A framework for assurance and verification of surveillance monitoring
by Peter Goldschmidt
September 2007, Volume 9, Issue 4
- 325-326 Special issue on enterprise distributed computing model and implementation
by Patrick C. K. Hung - 327-342 Requirements traceability in model-driven development: Applying model and transformation conformance
by João Paulo A. Almeida & Maria-Eugenia Iacob & Pascal Eck - 343-358 Ubiquitous enterprise service adaptations based on contextual user behavior
by Dan Hong & Dickson K. W. Chiu & Vincent Y. Shen & S. C. Cheung & Eleanna Kafeza - 359-373 The adequacy of languages for representing interaction mechanisms
by Remco M. Dijkman & Teduh Dirgahayu & Dick A. C. Quartel - 375-389 WS-CDL+ for web service collaboration
by Zuling Kang & Hongbing Wang & Patrick C. K. Hung - 391-409 A model-driven development framework for enterprise Web services
by Xiaofeng Yu & Yan Zhang & Tian Zhang & Linzhang Wang & Jun Hu & JianHua Zhao & Xuandong Li - 411-421 Agent-mediated knowledge sharing for intelligent services management
by Michael F. Nowlan & M. Brian Blake - 423-437 VsLattice: A vector-based conceptual index structure for web service retrieval
by Dunlu Peng & Xiaoling Wang & Aoying Zhou - 439-448 EXEM: Efficient XML data exchange management for mobile applications
by Yuri Natchetoi & Huaigu Wu & Gilbert Babin & Serhan Dagtas
July 2007, Volume 9, Issue 2
- 135-136 ISF special issue on enterprise services computing: Evolution and challenges
by Patrick C. K. Hung & Don Sparrow & Qing Li - 137-150 Specifying and controlling multi-channel web interfaces for enterprise applications
by Matthias Book & Volker Gruhn - 151-162 Reducing verification effort in component-based software engineering through built-in testing
by Daniel Brenner & Colin Atkinson & Rainer Malaka & Matthias Merdes & Barbara Paech & Dima Suliman - 163-180 Enterprise architecture analysis with extended influence diagrams
by Pontus Johnson & Robert Lagerström & Per Närman & Mårten Simonsson - 181-194 From trading to eCommunity management: Responding to social and contractual challenges
by Lea Kutvonen & Janne Metso & Sini Ruohomaa - 195-208 Integrated model-driven dashboard development
by Themis Palpanas & Pawan Chowdhary & George Mihaila & Florian Pinel - 209-224 QoS-aware model driven architecture through the UML and CIM
by Kenneth Chan & Iman Poernomo - 225-244 COSMO: A conceptual framework for service modelling and refinement
by Dick A. C. Quartel & Maarten W. A. Steen & Stanislav Pokraev & Marten J. Sinderen - 245-256 The imagination market
by Christina Ann LaComb & Janet Arlie Barnett & Qimei Pan - 257-265 A model of the dynamics of the market of COTS software, in the absence of new entrants
by Michele Marchesi & Giancarlo Succi & Barbara Russo - 267-282 A model for a web-based learning system
by Vincenza Carchiolo & Alessandro Longheu & Michele Malgeri & Giuseppe Mangioni - 283-296 Do e-business strategies matter? The antecedents and relationship with firm performance
by Chulmo Koo & Jaeki Song & Yong Jin Kim & Kichan Nam - 297-308 Assessing the UK policies for broadband adoption
by Jyoti Choudrie & Anastasia Papazafeiropoulou - 309-324 Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements
by Y. I. Song & W. Woo & H. R. Rao
March 2007, Volume 9, Issue 1
- 1-8 Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue
by J. Leon Zhao & Mohan Tanniru & Liang-Jie Zhang - 9-27 A web services framework for distributed model management
by Therani Madhusudan - 29-51 Guided interaction: A mechanism to enable ad hoc service interaction
by Phillipa Oaks & Arthur Hofstede - 53-67 Realizing the vision for web services: Strategies for dealing with imperfect standards
by Sanjay Gosain - 69-84 A framework for deriving semantic web services
by David Bell & Sergio Cesare & Nicola Iacovelli & Mark Lycett & Antonio Merico - 85-101 End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach
by Patrick C. K. Hung & Dickson K. W. Chiu & W. W. Fung & William K. Cheung & Raymond Wong & Samuel P. M. Choi & Eleanna Kafeza & James Kwok & Joshua C. C. Pun & Vivying S. Y. Cheng - 103-118 Enhancing the efficiency of supply chain processes through web services
by Seung-Hyun Rhee & Hyerim Bae & Yongsun Choi - 119-134 A theoretical investigation of the emerging standards for web services
by Karthikeyan Umapathy & Sandeep Purao
December 2006, Volume 8, Issue 5
- 335-337 Economic aspects of information security: An emerging field of research
by Lawrence A. Gordon & Martin P. Loeb - 338-349 Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
by Kjell Hausken - 350-362 Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
by Ashish Arora & Anand Nandkumar & Rahul Telang - 363-374 An experimental economics approach toward quantifying online privacy choices
by J. C. Poindexter & Julia B. Earp & David L. Baumer - 375-394 Capturing and reusing knowledge in engineering change management: A case of automobile development
by Hong Joo Lee & Hyung Jun Ahn & Jong Woo Kim & Sung Joo Park - 395-410 Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing
by Youcef Baghdadi
September 2006, Volume 8, Issue 4
- 253-254 Web and distributed information systems: Special issue of the journal of information systems frontiers
by Muhammad Younas & Kuo-Ming Chao & Ying Huang - 255-269 A user-friendly platform for developing and accessing grid services
by Hiroyuki Morohoshi & Runhe Huang & Jianhua Ma - 271-284 Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
by Kenichi Watanabe & Tomoya Enokido & Makoto Takizawa - 285-295 Mobility management for m-commerce requests in wireless cellular networks
by Irfan Awan - 297-306 A web-based e-learning system for increasing study efficiency by stimulating learner’s motivation
by Leonard Barolli & Akio Koyama & Arjan Durresi & Giuseppe Marco - 307-319 The realization of service-oriented e-Marketplaces
by Yinsheng Li & Xiaohua Lu & Kuo-Ming Chao & Ying Huang & Muhammad Younas - 321-333 Parameter learning of personalized trust models in broker-based distributed trust management
by Jane Yung-jen Hsu & Kwei-Jay Lin & Tsung-Hsiang Chang & Chien-ju Ho & Han-Shen Huang & Wan-rong Jih
July 2006, Volume 8, Issue 3
- 147-161 A data mining approach to database compression
by Chin-Feng Lee & S. Wesley Changchien & Wei-Tse Wang & Jau-Ji Shen - 163-177 An attack-norm separation approach for detecting cyber attacks
by Nong Ye & Toni Farley & Deepak Lakshminarasimhan - 179-194 Optimum design of electronic communities as economic entities
by Levent V. Orman - 195-209 Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families
by Kweku-Muata Osei-Bryson & Kendall Giles