Information Systems Frontiers, Volume 17 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 17, Number 1, February 2015
Special Issue on IS/IT Success and Failure

Ram Ramesh, H. Raghav Rao:
Foreword: Information Systems Frontiers - Volume 17, Number 1, 2015. 1-2

Kenneth J. Arrow:
Microeconomics and operations research: Their interactions and differences. 3-9

Yogesh Kumar Dwivedi
, David Graham Wastell, Helle Zinner Henriksen, Rahul De':
Guest editorial: Grand successes and failures in IT: Private and public sectors. 11-14

Marijn Janssen
, Haiko Van Der Voort, Anne Fleur van Veenstra:
Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics. 15-29

Ravi Anand Rao, Rahul De':
Technology assimilation through conjunctures - a look at IS use in retail. 31-50

Deborah Bunker, Linda Levine, Carol Woody:
Repertoires of collaboration for common operating pictures of disasters and extreme events. 51-65

Sabine Madsen, Keld Bødker
, Thomas Tøth:
Knowledge transfer planning and execution in offshore outsourcing: An applied approach. 67-77

Laurence D. Brooks
, Muhammad Shahanoor Alam:
Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER). 79-93

Amany R. Elbanna, Henrik C. J. Linderoth:
The formation of technology mental models: the case of voluntary use of technology in organizational setting. 95-108

Mohammad Alamgir Hossain
, Mohammed Quaddus:
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology. 109-125

Nripendra P. Rana
, Yogesh Kumar Dwivedi
, Michael D. Williams
, Vishanth Weerakkody:
Investigating success of an e-government initiative: Validation of an integrated IS success model. 127-142

Yogesh Kumar Dwivedi
, David Graham Wastell, Sven Laumer, Helle Zinner Henriksen, Michael D. Myers
, Deborah Bunker, Amany R. Elbanna, M. N. Ravishankar
, Shirish C. Srivastava:
Research on information systems failures and successes: Status update and future directions. 143-157

Jung Lee
, Jae-Nam Lee, Bernard C. Y. Tan:
Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty. 159-175

Judy E. Scott, Dawn G. Gregg
, Jae Hoon Choi:
Lemon complaints: When online auctions go sour. 177-191

Gunjan Mansingh, Lila Rao, Kweku-Muata Osei-Bryson, Annette Mills:
Profiling internet banking users: A knowledge discovery in data mining process model based approach. 193-215

Chulhwan Chris Bang
:
Information systems frontiers: Keyword analysis and classification. 217-237
Volume 17, Number 2, April 2015
Special Issue on Internet of Things (IoT) and Applications

Pan Wang, Ricardo Valerdi, Shang-Ming Zhou
, Ling Li:
Introduction: Advances in IoT research and applications. 239-241

Shancang Li, Li Da Xu, Shanshan Zhao:
The internet of things: a survey. 243-259

Andrew Whitmore
, Anurag Agarwal, Li Da Xu:
The Internet of Things - A survey of topics and trends. 261-274

Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Li-Rong Zheng:
The design of an electronic pedigree system for food safety. 275-287

Zhibo Pang, Qiang Chen, Weili Han, Li-Rong Zheng:
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion. 289-319

Shifeng Fang, Lida Xu, Yunqiang Zhu, Yongqiang Liu, Zhihui Liu, Huan Pei, Jianwu Yan, Huifang Zhang:
An integrated information system for snowmelt flood early-warning based on internet of things. 321-335

Fang Liu, Zhuming Bi, Eric L. Xu, Qin Ga, Quanyu Yang, Yingzhong Yang, Lan Ma, Tana Wuren, Rili Ge:
An integrated systems approach to plateau ecosystem management - a scientific application in Qinghai and Tibet plateau. 337-350

Xiongfei Cao, Xitong Guo
, Hefu Liu
, Jibao Gu:
The role of social media in supporting knowledge integration: A social capital analysis. 351-362

Ni Li, Xiang Li, Yuzhong Shen, Zhuming Bi, Minghui Sun:
Risk assessment model based on multi-agent systems for complex product design. 363-385

Janice Lo:
The information technology workforce: A review and assessment of voluntary turnover research. 387-411

Tao Zhou:
Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors. 413-422

Xing Gao, Weijun Zhong, Shue Mei:
Security investment and information sharing under an alternative security breach probability function. 423-438

Monica S. Johar, Vijay S. Mookerjee, Suresh P. Sethi:
Optimal software design reuse policies: A control theoretic approach. 439-453

Hung-Pin Shih, Kee-hung Lai
, T. C. Edwin Cheng
:
Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use. 455-470
Volume 17, Number 3, June 2015
Special section on the role of information technology in service delivery

Jaeki Song, Jeff Baker
, Fred D. Davis:
Special section on the role of information technology in service delivery. 471-474

Ravi Seethamraju
:
Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs). 475-492

Bang Viet Nguyen, Frada Burstein
, Julie Fisher:
Improving service of online health information provision: A case of usage-driven design for health information portals. 493-511

Jian Tang
, Ping Zhang
, Philip Fei Wu
:
Categorizing consumer behavioral responses and artifact design features: The case of online advertising. 513-532

Miri Kim, Jaeki Song, Jason Triche:
Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach. 533-546

Nripendra P. Rana
, Yogesh Kumar Dwivedi
, Michael D. Williams
:
A meta-analysis of existing research on citizen adoption of e-government. 547-563

Seokho Son
, Kwang Mong Sim
:
Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs. 565-589

Tomo Popovic
, Mladen Kezunovic, Bozo Krstajic:
Smart grid data analytics for digital protective relay event recordings. 591-600

Baozhou Lu, Rudy Hirschheim, Andrew Schwarz:
Examining the antecedent factors of online microsourcing. 601-617

Mojtaba Ashja
, Akram Hadizadeh Moghadam, Hamid Bidram:
Comparative study of large information systems' CSFs during their life cycle. 619-628

Vincent Cho
, Aman Chan:
An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries. 629-644

Xiangbin Yan, Jing Wang, Michael Chau
:
Customer revisit intention to restaurants: Evidence from online reviews. 645-657

Narcyz Roztocki, Heinz Roland Weistroffer
:
Investments in enterprise integration technology: An event study. 659-672

Hui Huang, Xueguang Chen, Zhiwu Wang:
Failure recovery in distributed model composition with intelligent assistance. 673-689

Sharad Barkataki, Hassan Zeineddine
:
On achieving secure collaboration in supply chains. 691-705
Volume 17, Number 4, August 2015
Special Issue on Agreement Technologies

Carlos Iván Chesñevar, Eva Onaindia, Sascha Ossowski
, George A. Vouros
:
Special issue on agreement technologies. 707-711

Truls Pedersen, Sjur K. Dyrkolbotn, Thomas Ågotnes:
Reasoning about reasons behind preferences using modal logic. 713-724

Yuqing Tang, Federico Cerutti
, Nir Oren
, Chatschik Bisdikian:
Reasoning about the impacts of information sharing. 725-742

Federico Cerutti
, Lance M. Kaplan, Timothy J. Norman
, Nir Oren
, Alice Toniolo
:
Subjective logic operators in trust assessment: an empirical study. 743-762

Ramón Hermoso
, Henrique Lopes Cardoso
, Maria Fasli:
From roles to standards: a dynamic maintenance approach using incentives. 763-778

Stella Heras
, Vicente J. Botti
, Vicente Julián
:
An ontological-based knowledge-representation formalism for case-based argumentation. 779-798

Zijie Cong, Alberto Fernández
, Holger Billhardt
, Marin Lujak
:
Service discovery acceleration with hierarchical clustering. 799-808

Roberto Centeno, Ramón Hermoso
, Maria Fasli:
On the inaccuracy of numerical ratings: dealing with biased opinions in social networks. 809-825

Ping Wang, Kuo-Ming Chao
, Chi-Chun Lo:
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory. 827-844

Kweku-Muata Osei-Bryson:
A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research. 845-856

Matthieu Lauras
, Frédérick Bénaben, Sébastien Truptil
, Aurélie Charles:
Event-cloud platform to support decision-making in emergency management. 857-869

Sam Solaimani
, Harry Bouwman
, Timo Itälä:
Networked enterprise business model alignment: A case study on smart living. 871-887

Vishanth Weerakkody, Zahir Irani, Habin Lee, Ibrahim H. Osman, Nitham Mohammed Hindi:
E-government implementation: A bird's eye view of issues relating to costs, opportunities, benefits and risks. 889-915

Jakub Malý, Martin Necaský
:
Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron. 917-946

Ahmed Z. Emam
:
Intelligent drowsy eye detection using image mining. 947-960

Ryan H. Choi, Raymond K. Wong:
VXQ: A visual query language for XML data. 961-981
Volume 17, Number 5, October 2015
Advances in secure knowledge management in the big data era

Chittaranjan Hota
, Shambhu J. Upadhyaya, Jamal Nazzal Al-Karaki:
Advances in secure knowledge management in the big data era. 983-986

Ruchika Mehresh, Shambhu J. Upadhyaya:
Surviving advanced persistent threats in a distributed environment - Architecture and analysis. 987-995

Jaeung Lee, Manish Agrawal, H. Raghav Rao:
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013. 997-1005

Yan Sun, Shambhu J. Upadhyaya:
Secure and privacy preserving data processing support for active authentication. 1007-1015

Pratik Narang
, Chittaranjan Hota
:
Game-theoretic strategies for IDS deployment in peer-to-peer networks. 1017-1028

Hiran V. Nath
, Babu M. Mehtre:
Analysis of a multistage attack embedded in a video file. 1029-1037

Kawaljeet Kaur Kapoor, Yogesh Kumar Dwivedi
, Michael D. Williams
:
Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service. 1039-1056

Mohammad Alamgir Hossain
, Mohammed Quaddus:
Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts. 1057-1076

Xiaolong Zheng, Daniel Dajun Zeng, Fei-Yue Wang:
Social balance in signed networks. 1077-1095

Junzhao Ma, Qingyi Huang:
Does better Internet access lead to more adoption? A new empirical study using household relocation. 1097-1110

Shaio Yan Huang, Tung-Hsien Wu, An-An Chiu, David C. Yen
:
Measurements of mislead threshold of company graph distortion. 1111-1132

Shaio Yan Huang, Chao-Hsiung Lee, An-An Chiu, David C. Yen
:
How business process reengineering affects information technology investment and employee performance under different performance measurement. 1133-1144

Soumyakanti Chakraborty, Anup K. Sen, Amitava Bagchi:
Addressing the valuation problem in multi-round combinatorial auctions. 1145-1160

Ana Fernández Vilas
, Rebeca P. Díaz Redondo
, Sandra Servia Rodríguez:
IPTV parental control: A collaborative model for the Social Web. 1161-1176
Volume 17, Number 6, December 2015
Special Section on Business Process Analytics

Karl Reiner Lang, Vojislav B. Misic, J. Leon Zhao:
Special section on business process analytics. 1191-1194

Jiexun Li, Harry Jiannan Wang, Xue Bai:
An intelligent approach to data extraction and task identification for process mining. 1195-1208

Amit V. Deokar
, Jie Tao:
Semantics-based event log aggregation for process mining and analytics. 1209-1226

G. Alan Wang
, Xiaomo Liu, Jianling Wang, Min Zhang, Weiguo Fan
:
Examining micro-level knowledge sharing discussions in online communities. 1227-1238

Xiong Zhang, Alex Tsang, Wei T. Yue
, Michael Chau
:
The classification of hackers by knowledge exchange behaviors. 1239-1251

Shaokun Fan, Lele Kang, J. Leon Zhao:
Workflow-aware attention tracking to enhance collaboration management. 1253-1264

Wenge Rong, Baolin Peng, Yuanxin Ouyang, Kecheng Liu, Zhang Xiong:
Collaborative personal profiling for web service ranking and recommendation. 1265-1282

Jengchung Victor Chen
, David C. Yen
, Wannasri Pornpriphet, Andree E. Widjaja
:
E-commerce web site loyalty: A cross cultural comparison. 1283-1299

Hala S. Own, Hamdi Yahyaoui
:
Rough set based classification of real world Web services. 1301-1311

Pekka Kekolahti, Juuso Karikoski, Antti Riikonen:
The effect of an individual's age on the perceived importance and usage intensity of communications services - A Bayesian Network analysis. 1313-1333

Heng-Li Yang, August F. Y. Chao:
Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations. 1335-1352

Arun Vishwanath:
Diffusion of deception in social media: Social contagion effects and its antecedents. 1353-1367

Nilgün Fescioglu-Ünver, Sung Hee Choi, Dongmok Sheen, Soundar R. T. Kumara:
RFID in production and service systems: Technology, applications and issues. 1369-1380

Wei-Lun Chang
, Arleen N. Diaz, Patrick C. K. Hung:
Estimating trust value: A social network perspective. 1381-1400

Jan Claes
, Irene Vanderfeesten
, Frederik Gailly
, Paul Grefen, Geert Poels
:
The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling. 1401-1425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







