Contact information of Springer
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Content
January 2000, Volume 2, Issue 1
July 1999, Volume 1, Issue 1
Undated
- 1-1 Erratum to: A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
by Bahador Shojaiemehr & Marjan Kuchaki Rafsanjani
- 1-1 RETRACTED ARTICLE: A systematic review on post-implementation evaluation models of enterprise architecture artefacts
by Fatemeh Nikpay & Rodina Ahmad & Babak Darvish Rouhani & Shahaboddin Shamshirband
- 1-1 Erratum to: Weighted subspace modeling for semantic concept retrieval using gaussian mixture models
by Chao Chen & Mei-Ling Shyu & Shu-Ching Chen
- 1-1 Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis
by Mohammad Soltani Delgosha & Tahereh Saheb & Nastaran Hajiheydari
- 1-1 Erratum to: A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
by Michaela Sprenger & Tobias Mettler & Robert Winter
- 1-2 Professor Kenneth Arrow and Information Systems Frontiers: In memoriam
by Ram Ramesh & H. Raghav Rao
- 1-4 Being (more) Human in a Digitized World
by Priya Seetharaman & Saji K. Mathew & Maung K. Sein & Ravindra Babu Tallamraju
- 1-6 The Search for Smartness in Working, Living and Organising: Beyond the ‘Technomagic’
by Amany Elbanna & Yogesh Dwivedi & Deborah Bunker & David Wastell
- 1-7 Driving public sector innovation using big and open linked data (BOLD)
by Marijn Janssen & David Konopnicki & Jane L. Snowdon & Adegboyega Ojo
- 1-8 Developing an employee turnover risk evaluation model using case-based reasoning
by Xin Wang & Li Wang & Li Zhang & Xiaobo Xu & Weiyong Zhang & Yingcheng Xu
- 1-9 Product recommendation with latent review topics
by Juheng Zhang & Selwyn Piramuthu
- 1-9 A rapid maneuver path planning method with complex sensor pointing constraints in the attitude space
by Rui Xu & Changqing Wu & Shengying Zhu & Baodong Fang & Wei Wang & Lida Xu & Wu He
- 1-9 Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions
by Narges Manouchehri & Hieu Nguyen & Pantea Koochemeshkian & Nizar Bouguila & Wentao Fan
- 1-10 A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles
by Jorge Martinez-Gil & Alejandra Lorena Paoletti & Mario Pichler
- 1-10 Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition
by Aria Ghora Prabono & Bernardo Nugroho Yahya & Seok-Lyong Lee
- 1-10 Conceptual foundations of a landmark personality scale based on a destination personality scale: Text mining of online reviews
by Seung-Hun Shin & Sung-Byung Yang & Kichan Nam & Chulmo Koo
- 1-10 Building spatial temporal relation graph of concepts pair using web repository
by Zheng Xu & Junyu Xuan & Yunhuai Liu & Kim-Kwang Raymond Choo & Lin Mei & Chuanping Hu
- 1-10 An evolutionary system for ozone concentration forecasting
by Mauro Castelli & Ivo Gonçalves & Leonardo Trujillo & Aleš Popovič
- 1-10 Do big data support TV viewing rate forecasting? A case study of a Korean TV drama
by Jongchang Ahn & Kyungran Ma & Ook Lee & Suaini Sura
- 1-10 The resource allocation model for multi-process instances based on particle swarm optimization
by Weidong Zhao & Qingfeng Zeng & Guangjian Zheng & Liu Yang
- 1-11 A review of audio guides in the era of smart tourism
by Seung Jae Lee
- 1-11 Timely vs. delayed CEO turnover
by Kuntara Pukthuanthong & Saif Ullah & Thomas J. Walker & Xuan Wu
- 1-11 An event based approach for quantifying the effects of securities fraud in the IT industry
by Lorne N. Switzer & Jun Wang
- 1-11 A Hybrid Bi-level Metaheuristic for Credit Scoring
by Doruk Şen & Cem Çağrı Dönmez & Umman Mahir Yıldırım
- 1-11 Incentive Mechanism for Rational Miners in Bitcoin Mining Pool
by Gang Xue & Jia Xu & Hanwen Wu & Weifeng Lu & Lijie Xu
- 1-12 Uncovering the effect of dominant attributes on community topology: A case of facebook networks
by Yi-Shan Sung & Dashun Wang & Soundar Kumara
- 1-12 Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital
by Bendik Bygstad & Egil Øvrelid & Thomas Lie & Magnus Bergquist
- 1-12 Dynamic network analysis of online interactive platform
by Mehmet N. Aydin & N. Ziya Perdahci
- 1-12 Predicting movie success with machine learning techniques: ways to improve accuracy
by Kyuhan Lee & Jinsoo Park & Iljoo Kim & Youngseok Choi
- 1-12 Performance measurement of e-learning using student satisfaction analysis
by Miroslava Raspopovic & Aleksandar Jankulovic
- 1-12 The effects of ubiquitous healthcare service on the south Korean Economy: using input–output analysis
by Yong Jin Kim & Chan Young Kim & Yong Jae Shin
- 1-12 Enhancing the smart tourism experience through geotag
by Namho Chung & Inessa Tyan & Heejeong Han
- 1-13 Dependency modelling for inconsistency management in Digital Preservation – The PERICLES approach
by Nikolaos Lagos & Marina Riga & Panagiotis Mitzias & Jean-Yves Vion-Dury & Efstratios Kontopoulos & Simon Waddington & Pip Laurenson & Georgios Meditskos & Ioannis Kompatsiaris
- 1-13 Motivations for 21st century school children to bring their own device to school
by Nathan Hopkins & Mary Tate & Allan Sylvester & David Johnstone
- 1-13 Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication
by Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel
- 1-13 The effect of malicious manipulations on prediction market accuracy
by Patrick Buckley & Fergal O’Brien
- 1-13 Institutional Perspectives on the Process of Enterprise Architecture Adoption
by Duong Dang & Samuli Pekkola
- 1-13 Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods
by Mohammed Kuko & Mohammad Pourhomayoun
- 1-13 The acceptance of ‘intelligent trade shows’: Visitors’ evaluations of IS innovation
by Sunyoung Hlee & Jimin Lee & Daeseop Moon & Changsok Yoo
- 1-13 Making Sense of Smartness in the Context of Smart Devices and Smart Systems
by Steven Alter
- 1-13 Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation
by Kai Klinker & Manuel Wiesche & Helmut Krcmar
- 1-13 Pair programming teams and high-quality knowledge sharing: A comparative study of coopetitive reward structures
by Shahla Ghobadi & John Campbell & Stewart Clegg
- 1-13 A comparative analysis of semi-supervised learning: The case of article selection for medical systematic reviews
by Jun Liu & Prem Timsina & Omar El-Gayar
- 1-14 Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs
by Xiongfei Cao & Ali Nawaz Khan & Ahsan Ali & Naseer Abbas Khan
- 1-14 Integrating data from user activities of social networks into public administrations
by Marcel Rosenberger & Christiane Lehrer & Reinhard Jung
- 1-14 Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study
by Patrick Mikalef & Kshitij Sharma & Ilias O. Pappas & Michail Giannakos
- 1-14 Non-addictive Information Systems
by Simon Kloker
- 1-14 Leveraging clustering to improve collaborative filtering
by Nima Mirbakhsh & Charles X. Ling
- 1-14 Fraud detection using fraud triangle risk factors
by Shaio Yan Huang & Chi-Chen Lin & An-An Chiu & David C. Yen
- 1-14 TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition
by DunLu Peng & YinRui Wang & Cong Liu & Zhang Chen
- 1-14 LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling
by Bin Xia & Yuxuan Bai & Junjie Yin & Yun Li & Jian Xu
- 1-14 The contributing factors of continuance usage of social media: An empirical analysis
by Efosa Carroll Idemudia & Mahesh S. Raisinghani & Olusola Samuel-Ojo
- 1-14 A conceptual framework for quality healthcare accessibility: a scalable approach for big data technologies
by Miloslava Plachkinova & Au Vo & Rahul Bhaskar & Brian Hilton
- 1-14 Enabling self-service BI: A methodology and a case study for a model management warehouse
by David Schuff & Karen Corral & Robert D. St. Louis & Greg Schymik
- 1-14 Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective
by Emmanuel W. Ayaburi & Jaeung Lee & Michele Maasberg
- 1-14 Interactive UHF/UWB RFID tag for mass customization
by Jue Shen & Baghaei-Nejad Majid & Li Xie & Jia Mao & Zhibo Pang & Yi Feng & Lida Xu & Hannu Tenhunen & Zhuo Zou & Lirong Zheng
- 1-14 The impact of big data analytics on firms’ high value business performance
by Aleš Popovič & Ray Hackney & Rana Tassabehji & Mauro Castelli
- 1-14 Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter
by Eleanna Kafeza & Christos Makris & Gerasimos Rompolas & Feras Al-Obeidat
- 1-14 Geometry-based propagation of temporal constraints
by Zhaoyu Li & Rui Xu & Pingyuan Cui & Lida Xu & Wu He
- 1-14 Doctor-patient interaction in telemedicine: Logic of choice and logic of care perspectives
by Rajesh Chandwani & Rahul De’
- 1-14 Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification
by Haiman Tian & Shu-Ching Chen & Mei-Ling Shyu
- 1-15 Behavioral data mining to produce novel and serendipitous friend recommendations in a social bookmarking system
by Matteo Manca & Ludovico Boratto & Salvatore Carta
- 1-15 Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques
by Sebastian Büsch & Volker Nissen & Arndt Wünscher
- 1-15 Predictive maintenance: strategic use of IT in manufacturing organizations
by Salvatore T. March & Gary D. Scudder
- 1-15 Discovering composable web services using functional semantics and service dependencies based on natural language requests
by Sowmya Kamath S & Ananthanarayana V. S.
- 1-15 Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework
by Ahmet Bulent Ozturk & Khaldoon Nusair & Fevzi Okumus & Dipendra Singh
- 1-15 An examination of the long-term business value of investments in information technology
by Vincent J. Shea & Kevin E. Dow & Alain Yee-Loong Chong & Eric W. T. Ngai
- 1-15 HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
by Xin Huang & Fei Yan & Liqiang Zhang & Kai Wang
- 1-15 A cultural theory analysis of e-government: Insights from a local government council in Malaysia
by Stephen Jackson & Meng Seng Wong
- 1-15 Predicting Sports Injuries with Wearable Technology and Data Analysis
by Amir Zadeh & David Taylor & Margaret Bertsos & Timothy Tillman & Nasim Nosoudi & Scott Bruce
- 1-15 Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union
by Anca Elena-Bucea & Frederico Cruz-Jesus & Tiago Oliveira & Pedro Simões Coelho
- 1-15 Building Consumers’ Trust in Electronic Retail Platforms in the Sub-Saharan Context: an exploratory study on Drivers and Impact on Continuance Intention
by Kayode Odusanya & Olu Aluko & Banita Lal
- 1-15 IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea
by Sojung Lucia Kim & Thompson S.H. Teo & Anol Bhattacherjee & Kichan Nam
- 1-15 Empirical assessment of the accuracy of an interoperability prediction language
by Johan Ullberg & Pontus Johnson
- 1-15 The role of civil society groups in improving access to the DC-CAN
by Siddhartha Menon
- 1-15 A Twitter-Based Study of the European Internet of Things
by Funda Ustek-Spilda & Davide Vega & Matteo Magnani & Luca Rossi & Irina Shklovski & Sebastian Lehuede & Alison Powell
- 1-15 Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services
by Ramzi El-Haddadeh
- 1-15 Data Governance as a Collective Action Problem
by Olivia Benfeldt & John Stouby Persson & Sabine Madsen
- 1-15 Online Review Consistency Matters: An Elaboration Likelihood Model Perspective
by Navid Aghakhani & Onook Oh & Dawn G. Gregg & Jahangir Karimi
- 1-16 A fast and scalable approach for IoT service selection based on a physical service model
by Xiongnan Jin & Sejin Chun & Jooik Jung & Kyong-Ho Lee
- 1-16 Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective
by Fereshteh Ghahramani & Jingguo Wang
- 1-16 Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling
by Yogesh K. Dwivedi & Marijn Janssen & Emma L. Slade & Nripendra P. Rana & Vishanth Weerakkody & Jeremy Millard & Jan Hidders & Dhoya Snijders
- 1-16 Information fusion-based meta-classification predictive modeling for ETF performance
by Asil Oztekin
- 1-16 The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance
by Tung-Hsien Wu & Shi-Ming Huang & Shaio Yan Huang & David C. Yen
- 1-16 A game-theoretic evaluation of an ISP business model in caching
by Jörn Künsemöller & Nan Zhang & Kimmo Berg & João Soares
- 1-16 Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman
by Khalid Alzadjali & Amany Elbanna
- 1-16 Project description and crowdfunding success: an exploratory study
by Mi (Jamie) Zhou & Baozhou Lu & Weiguo (Patrick) Fan & G. Alan Wang
- 1-16 A little Birdie told me: Social media, organizational legitimacy, and underpricing in initial public offerings
by Leif W. Lundmark & Chong Oh & J. Cameron Verhaal
- 1-16 Open data and its usability: an empirical view from the Citizen’s perspective
by Vishanth Weerakkody & Zahir Irani & Kawal Kapoor & Uthayasankar Sivarajah & Yogesh K. Dwivedi
- 1-16 How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics
by Matti Mäntymäki & Sami Hyrynsalmi & Antti Koskenvoima
- 1-16 Challenges and opportunities in renovating public sector information by enabling linked data and analytics
by Spiros Mouzakitis & Dimitris Papaspyros & Michael Petychakis & Sotiris Koussouris & Anastasios Zafeiropoulos & Eleni Fotopoulou & Lena Farid & Fabrizio Orlandi & Judie Attard & John Psarras
- 1-16 Improving the freshness of the search engines by a probabilistic approach based incremental crawler
by G. Pavai & T. V. Geetha
- 1-16 A multi-objective model for discovering high-quality knowledge based on data quality and prior knowledge
by Qi Liu & Gengzhong Feng & Nengmin Wang & Giri Kumar Tayi
- 1-16 Index partitioning through a bipartite graph model for faster similarity search in recommendation systems
by Ali Cevahir
- 1-16 Middleware for mobile medical data management with minimal latency
by Richard K. Lomotey & Ralph Deters
- 1-16 Organizational information security as a complex adaptive system: insights from three agent-based models
by A. J. Burns & Clay Posey & James F. Courtney & Tom L. Roberts & Prabhashi Nanayakkara
- 1-16 Factors affecting the performance of internal control task team in high-tech firms
by Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja
- 1-17 Multi-view Latent Learning Applied to Fashion Industry
by Giovanni Battista Gardino & Rosa Meo & Giuseppe Craparotta
- 1-17 Interactive Topic Search System Based on Topic Cluster Technology
by Lin-Chih Chen
- 1-17 Exploring knowledge management software implementation from a knowing-in-practice perspective
by Khuong Le-Nguyen & Romano Dyerson & G. Harindranath
- 1-17 WebMAC: A web based clinical expert system
by Saba Bashir & Usman Qamar & Farhan Hassan Khan
- 1-17 Delivering public value through open government data initiatives in a Smart City context
by Gabriela Viale Pereira & Marie Anne Macadar & Edimara M. Luciano & Maurício Gregianin Testa
- 1-17 Who can get money? Evidence from the Chinese peer-to-peer lending platform
by Qizhi Tao & Yizhe Dong & Ziming Lin
- 1-17 Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender
by Samar Mouakket & Yuan Sun
- 1-17 DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification
by Krishna Chandra Roy & Qian Chen
- 1-17 An approach to evaluate large-scale ICT training interventions
by Silvana Rossy Brito & Aleksandra Socorro da Silva & Eulália Carvalho Mata & Nandamudi Lankalapalli Vijaykumar & Cláudio Alex Jorge Rocha & Maurílio Abreu Monteiro & João Crisóstomo Weyl Albuquerque Costa & Carlos Renato Lisboa Francês
- 1-17 Beyond utilitarian factors: User experience and travel company website successes
by Marya Wani & Vishnupriya Raghavan & Dolphy Abraham & Virginia Kleist
- 1-17 Big data in the public sector: Uncertainties and readiness
by Bram Klievink & Bart-Jan Romijn & Scott Cunningham & Hans Bruijn
- 1-17 Crowdsourcing roles, methods and tools for data-intensive disaster management
by Marta Poblet & Esteban García-Cuesta & Pompeu Casanovas
- 1-17 Robust and simple database evolution
by Kai Herrmann & Hannes Voigt & Jonas Rausch & Andreas Behrend & Wolfgang Lehner
- 1-17 Event Study and Principal Component Analysis Based on Sentiment Analysis – A Combined Methodology to Study the Stock Market with an Empirical Study
by Qianwen Xu & Victor Chang & Ching-Hsien Hsu
- 1-17 A fuzzy long-term investment planning model for a GenCo in a hybrid electricity market considering climate change impacts
by Berna Tektas Sivrikaya & Ferhan Cebi & Hasan Hüseyin Turan & Nihat Kasap & Dursun Delen
- 1-17 Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK
by Roya Gholami & Alemayehu Molla & Suparna Goswami & Christopher Brewster
- 1-17 Consumer decision support systems for novice buyers – a design science approach
by Heng Tang & Chang Boon Patrick Lee & Kwee Keong Choong
- 1-18 A model of biomimetic process assets to simulate their impact on strategic goals
by Maria-Isabel Sanchez-Segura & German-Lenin Dugarte-Peña & Fuensanta Medina-Dominguez & Alejandro Ruiz-Robles
- 1-18 A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce
by Bahador Shojaiemehr & Marjan Kuchaki Rafsanjani
- 1-18 Designing a goal-oriented smart-home environment
by Javier Palanca & Elena del Val & Ana Garcia-Fornes & Holger Billhardt & Juan Manuel Corchado & Vicente Julián
- 1-18 Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities
by Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li
- 1-18 An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm)
by Abhishek Majumdar & Tapas Debnath & Arpita Biswas & Sandeep K. Sood & Krishna Lal Baishnab
- 1-18 Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems
by Peter M. Bednar & Christine Welch
- 1-18 An enhanced text detection technique for the visually impaired to read text
by S. P. Faustina Joan & S. Valli
- 1-18 Adaptive approach to restraining content pollution in peer-to-peer networks
by Mohammed Hawa & Raed Al-Zubi & Khalid A. Darabkh & Ghazi Al-Sukkar
- 1-18 It governance in the public sector: a conceptual model
by Adriano Olímpio Tonelli & Paulo Henrique Souza Bermejo & Pâmela Aparecida dos Santos & Larissa Zuppo & André Luiz Zambalde
- 1-19 The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data
by Justin M. Johnson & Taghi M. Khoshgoftaar
- 1-19 Keep the conversations going: engagement-based customer segmentation on online social service platforms
by Nripesh Trivedi & Daniel Adomako Asamoah & Derek Doran
- 1-19 Task scheduling algorithms for multi-cloud systems: allocation-aware approach
by Sanjaya K. Panda & Indrajeet Gupta & Prasanta K. Jana
- 1-19 Estimating participants for knowledge-intensive tasks in a network of crowdsourcing marketplaces
by Yiwei Gong
- 1-19 Ontology-based data mining model management for self-service knowledge discovery
by Yan Li & Manoj A. Thomas & Kweku-Muata Osei-Bryson
- 1-19 An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain
by Juan Du & Hengqing Jing & Kim-Kwang Raymond Choo & Vijayan Sugumaran & Daniel Castro-Lacouture
- 1-19 Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing
by Yong Sun & Wenan Tan
- 1-19 Peas and carrots just because they are green? Operational fit between green supply chain management and green information system
by Zhaojun Yang & Jun Sun & Yali Zhang & Ying Wang
- 1-19 Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2
by Kuttimani Tamilmani & Nripendra P. Rana & Yogesh K. Dwivedi
- 1-20 Data properties and the performance of sentiment classification for electronic commerce applications
by Youngseok Choi & Habin Lee
- 1-20 A Predictive Analytics-Based Decision Support System for Drug Courts
by Hamed M. Zolbanin & Dursun Delen & Durand Crosby & David Wright
- 1-20 Citizens’ adoption of an electronic government system: towards a unified view
by Nripendra P. Rana & Yogesh K. Dwivedi & Banita Lal & Michael D. Williams & Marc Clement
- 1-20 Integrating switching costs to information systems adoption: An empirical study on learning management systems
by Yan Mandy Dang & Yulei Gavin Zhang & James Morgan
- 1-20 Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations
by M Vimalkumar & Jang Bahadur Singh & Sujeet Kumar Sharma
- 1-20 Leader’s dilemma game: An experimental design for cyber insider threat research
by Shuyuan Mary Ho & Merrill Warkentin
- 1-20 Practical parallel string matching framework for RDF entailments with GPUs
by Chidchanok Choksuchat & Chantana Chantrapornchai
- 1-20 Assessing the pattern between economic and digital development of countries
by Frederico Cruz-Jesus & Tiago Oliveira & Fernando Bacao & Zahir Irani
- 1-20 Privacy and biometrics: An empirical examination of employee concerns
by Darrell Carpenter & Alexander McLeod & Chelsea Hicks & Michele Maasberg
- 1-20 What could possibly go wrong? A multi-panel Delphi study of organizational social media risk
by Paul M. Gangi & Allen C. Johnston & James L. Worrell & Samuel C. Thompson
- 1-20 An Approach to Extracting Topic-guided Views from the Sources of a Data Lake
by Claudia Diamantini & Paolo Lo Giudice & Domenico Potena & Emanuele Storti & Domenico Ursino
- 1-20 Understanding Factors Influencing Employees’ Consumptive and Contributive Use of Enterprise Social Networks
by Pei Yee Chin & Nina Evans & Charles Zhechao Liu & Kim-Kwang Raymond Choo
- 1-20 OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs
by Amit V. Deokar & Jie Tao
- 1-21 Design it like Darwin - A value-based application of evolutionary algorithms for proper and unambiguous business process redesign
by Patrick Afflerbach & Martin Hohendorf & Jonas Manderscheid
- 1-21 Examining the infusion of mobile technology by healthcare practitioners in a hospital setting
by Yvonne O’ Connor & Philip O’ Reilly
- 1-21 Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India
by Linus Kendall & Bidisha Chaudhuri & Apoorva Bhalla
- 1-21 Facilitating resource sharing and selection in ubiquitous multi-user environments
by Kimberly García & Sonia Mendoza & Dominique Decouchant & Patrick Brézillon
- 1-21 What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the “Digital Service Usage Satisfaction Model”
by Arpan Kumar Kar
- 1-21 Mining variable fragments from process event logs
by Asef Pourmasoumi & Mohsen Kahani & Ebrahim Bagheri
- 1-21 Harnessing the social web to enhance insights into people’s opinions in business, government and public administration
by Aaron W. Baur
- 1-21 Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis
by Mohammad Soltani Delgosha & Tahereh Saheb & Nastaran Hajiheydari
- 1-22 Social Commerce in Emerging Markets and its Impact on Online Community Engagement
by Raed S. Algharabat & Nripendra P. Rana
- 1-22 An impactful crowdsourcing intermediary design - a case of a service imagery crowdsourcing system
by Soe-Tsyr Daphne Yuan & Ching-Fang Hsieh
- 1-22 Multimode co-clustering for analyzing terrorist networks
by Ahmed Aleroud & Aryya Gangopadhyay
- 1-22 MobileCDP: A mobile framework for the consumer decision process
by Suleyman Ozarslan & P. Erhan Eren
- 1-22 An information integration and transmission model of multi-source data for product quality and safety
by Yingcheng Xu & Li Wang & Bo Xu & Wei Jiang & Chaoqun Deng & Fang Ji & Xiaobo Xu
- 1-23 Eliciting Process Knowledge Through Process Stories
by Pedro Antunes & Jose A. Pino & Mary Tate & Alistair Barros
- 1-23 Citizen Science: An Information Quality Research Frontier
by Roman Lukyanenko & Andrea Wiggins & Holly K. Rosser
- 1-23 ETL workflow reparation by means of case-based reasoning
by Artur Wojciechowski
- 1-23 Business-to-business e-commerce adoption: An empirical investigation of business factors
by Narasimhaiah Gorla & Ananth Chiravuri & Ravi Chinta
- 1-23 Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing
by Prabhsimran Singh & Yogesh K. Dwivedi & Karanjeet Singh Kahlon & Ravinder Singh Sawhney & Ali Abdallah Alalwan & Nripendra P. Rana
- 1-24 A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness
by Hwee-Joo Kam & Thomas Mattson & Sanjay Goel
- 1-24 Economic valuation for information security investment: a systematic literature review
by Daniel Schatz & Rabih Bashroush
- 1-24 A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa
by Humphrey M. Sabi & Faith-Michael E. Uzoka & Kehbuma Langmia & Felix N. Njeh & Clive K. Tsuma
- 1-24 Open data value capability architecture
by Fatemeh Ahmadi Zeleti & Adegboyega Ojo
- 1-24 Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending?
by Qun Chen & Ji-Wen Li & Jian-Guo Liu & Jing-Ti Han & Yun Shi & Xun-Hua Guo
- 1-24 The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis
by Elvira Ismagilova & Emma L. Slade & Nripendra P. Rana & Yogesh K. Dwivedi
- 1-24 A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
by Michaela Sprenger & Tobias Mettler & Robert Winter
- 1-24 Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation
by Lingling Gao & Kerem Aksel Waechter
- 1-25 Quarry: A User-centered Big Data Integration Platform
by Petar Jovanovic & Sergi Nadal & Oscar Romero & Alberto Abelló & Besim Bilalli
- 1-25 A model to analyze the challenge of using cyber insurance
by Tridib Bandyopadhyay & Vijay Mookerjee
- 1-26 A structural-semantic web service selection approach to improve retrievability of web services
by Martin Garriga & Alan De Renzis & Ignacio Lizarralde & Andres Flores & Cristian Mateos & Alejandra Cechich & Alejandro Zunino
- 1-27 Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic
by Ameni Hbaieb & Mahdi Khemakhem & Maher Ben Jemaa
- 1-27 Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment
by Sanjaya K. Panda & Prasanta K. Jana
- 1-27 Enhancing service system design: An entity interaction pattern approach
by Soe-Tsyr Daphne Yuan & Shiou-Tian Hsu
- 1-27 Scaling for agility: A reference model for hybrid traditional-agile software development methodologies
by Asif Qumer Gill & Brian Henderson-Sellers & Mahmood Niazi
- 1-28 Evaluating Queries and Updates on Big XML Documents
by Nicole Bidoit & Dario Colazzo & Noor Malla & Carlo Sartiani
- 1-28 Fostering distributed business logic in Open Collaborative Networks: an integrated approach based on semantic and swarm coordination
by Francesco P. Appio & Mario G. C. A. Cimino & Alessandro Lazzeri & Antonella Martini & Gigliola Vaglini
- 1-29 Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML
by Ting Li & Zongmin Ma
- 1-29 Business process flexibility - a systematic literature review with a software systems perspective
by Riccardo Cognini & Flavio Corradini & Stefania Gnesi & Andrea Polini & Barbara Re
- 1-29 A Hybrid Genetic Algorithm for Software Architecture Re-Modularization
by Lifeng Mu & Vijayan Sugumaran & Fangyuan Wang
- 1-40 Enterprise security investment through time when facing different types of vulnerabilities
by Yosra Miaoui & Noureddine Boudriga
- 1-42 RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers
by Lawrence Bunnell & Kweku-Muata Osei-Bryson & Victoria Y. Yoon