Information Systems Frontiers, Volume 22 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 22, Number 1, February 2020

Ram Ramesh, H. Raghav Rao:
ISF Editorial 2020. 1-9

John Leslie King, Andrew J. Ehrenberg:
The Productivity Vampires. 11-15

Xiaofan Li, Andrew B. Whinston:
Analyzing Cryptocurrencies. 17-22

Satyen Mukherjee:
Emerging Frontiers in Smart Environment and Healthcare - A Vision. 23-27

Andrew J. Ehrenberg, John Leslie King:
Blockchain in Context. 29-35

Bernardo A. Huberman, Bob Lund:
A Quantum Router For The Entangled Web. 37-43

Jae Kyu Lee, Younghoon Chang
, Hun Yeong Kwon, Beopyeon Kim:
Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach. 45-57

Victor Chang
:
Presenting Cloud Business Performance for Manufacturing Organizations. 59-75

Lina Zhou, Uchechukwuka Amadi, Dongsong Zhang:
Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location. 77-90

Ravi Thambusamy, Prashant Palvia
:
U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality. 91-111

Kichan Nam
, Jeff Baker
, Norita B. Ahmad
, Jahyun Goo:
Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM). 113-130

Federico Cabitza
, Angela Locoro
, Carlo Batini:
Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach. 131-148

Xiuyuan Gong, Matthew K. O. Lee
, Zhiying Liu, Xiabing Zheng:
Examining the Role of Tie Strength in Users' Continuance Intention of Second-Generation Mobile Instant Messaging Services. 149-170

Jongwoo Kim, Richard L. Baskerville
, Yi Ding:
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online. 171-185

Mansooreh Ezhei
, Behrouz Tork Ladani
:
Interdependency Analysis in Security Investment against Strategic Attacks. 187-201

Andy Weeger, Xuequn Wang
, Heiko Gewald
, Mahesh S. Raisinghani, Otávio P. Sanchez
, Gerald G. Grant
, Siddhi Pittayachawan
:
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. 203-219

Martin (Dae Youp) Kang, Anat Hovav:
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation. 221-242

Carlos Tam
, Diogo Santos, Tiago Oliveira
:
Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model. 243-257

Jun Sun
:
Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective. 259-271

Chichang Jou
:
Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules. 273
Volume 22, Number 2, April 2020
Special Issue on Smart Working, Living and Organising

Amany R. Elbanna, Yogesh Dwivedi
, Deborah Bunker, David Wastell:
The Search for Smartness in Working, Living and Organising: Beyond the 'Technomagic'. 275-280

Peter M. Bednar
, Christine E. Welch
:
Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems. 281-298

Olivia Benfeldt Nielsen
, John Stouby Persson, Sabine Madsen:
Data Governance as a Collective Action Problem. 299-313

Prabhsimran Singh, Yogesh K. Dwivedi
, Karanjeet Singh Kahlon, Ravinder Singh Sawhney, Ali Abdallah Alalwan
, Nripendra P. Rana:
Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing. 315-337

Milad Mirbabaie
, Deborah Bunker, Stefan Stieglitz, Annika Deubel
:
Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication. 339-351

Bendik Bygstad, Egil Øvrelid
, Thomas Lie, Magnus Bergquist:
Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital. 353-364

Khalid Alzadjali
, Amany R. Elbanna:
Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman. 365-380

Steven Alter
:
Making Sense of Smartness in the Context of Smart Devices and Smart Systems. 381-393

Stefan Stieglitz
, Christian Meske, Björn Ross
, Milad Mirbabaie
:
Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics. 395-409

Abdullah Mohammed Baabdullah
:
Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness. 411-427

Hadi Karimikia, Narges Safari
, Harminder Singh
:
Being useful: How information systems professionals influence the use of information systems in enterprises. 429-453

Alan Serrano
, Javier García Guzmán, Georgios Xydopoulos, Ali Tarhini
:
Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective. 455-474

Cheng-Kui Huang, Tawei Wang
, Tzu-Yen Huang:
Initial Evidence on the Impact of Big Data Implementation on Firm Performance. 475-487

Paul Rimba, An Binh Tran, Ingo Weber
, Mark Staples, Alexander Ponomarev, Xiwei Xu
:
Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 489-507

Paul Rimba, An Binh Tran, Ingo Weber
, Mark Staples, Alexander Ponomarev, Xiwei Xu:
Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 509-510

Thompson S. H. Teo, Sojung Lucia Kim, Li Jiang:
E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives. 511-528
Volume 22, Number 3, June 2020
Special Issue on Being (more) Human in a Digitized World

Priya Seetharaman
, Saji K. Mathew, Maung K. Sein, Ravindra Babu Tallamraju:
Being (more) Human in a Digitized World. 529-532

Jaana Porra, Mary C. Lacity, Michael S. Parks:
"Can Computer Based Human-Likeness Endanger Humanness?" - A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can't Have". 533-547

Simon Kloker:
Non-addictive Information Systems. 549-562

Kiljae K. Lee
, Kyung Young Lee, Lorn Sheehan:
Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users' Perception of Group Harmony. 563-583

Linus Kendall
, Bidisha Chaudhuri
, Apoorva Bhalla:
Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India. 585-605

Abhipsa Pal
, Rahul De', Tejaswini C. Herath:
The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India. 607-631

Rishikesan Parthiban, Israr Qureshi
, Somprakash Bandyopadhyay, Babita Bhatt
, Saravana Jaikumar
:
Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized. 633-653

Petri Kannisto
, David Hästbacka, Arto Marttinen:
Information Exchange Architecture for Collaborative Industrial Ecosystem. 655-670

Petri Kannisto
, David Hästbacka, Arto Marttinen:
Correction to: Information Exchange Architecture for Collaborative Industrial Ecosystem. 671

Jyoti Choudrie
, Sutee Pheeraphuttharangkoon, Soheil Davari
:
The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study. 673-695

Mandy Yan Dang, Gavin Yulei Zhang, Susan A. Brown
, Hsinchun Chen:
Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system. 697-718

Chul Woo Yoo
:
An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management. 719-734

C. Derrick Huang, Jahyun Goo
, Ravi S. Behara
, Ankur Agarwal:
Clinical Decision Support System for Managing COPD-Related Readmission Risk. 735-747

Kamran Mahroof
, Vishanth Weerakkody, Dilek Önkal-Atay
, Zahid Hussain:
Technology as a Disruptive Agent: Intergenerational Perspectives. 749-770

Ehsan Alirezaei, Saeed Parsa
:
Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network. 771-787
Volume 22, Number 4, August 2020

Dimosthenis Anagnostopoulos
, Thanos Papadopoulos, Teta Stamati, Maria Elisavet Balta:
Policy and Information Systems Implementation: the Greek Property Tax Information System Case. 791-802

Irfan Kanat
, T. S. Raghu, Ajay S. Vinze:
Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market. 803-814

Hongyan Dai, Ling Ge
, Yali Liu:
Information Matters: an Empirical Study of the Efficiency of On-Demand Services. 815-827

Qinghua Zheng, Chutong Yang, Haijun Yang, Jianhe Zhou:
A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things. 829-842

Hua Dai, Al F. Salam
:
An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME). 843-862

Amarjeet Prajapati
, Jitender Kumar Chhabra
:
Information-Theoretic Remodularization of Object-Oriented Software Systems. 863-880

Jinbi Yang, Chunxiao Yin:
Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees' Perceptions of Presenteeism: from Both Individual and Social Perspectives. 881-895

Rohit Valecha:
An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407. 897-909

Gavin Yulei Zhang, Mandy Yan Dang, Hsinchun Chen:
An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking. 911-925

Aymeric Hemon
, Barbara Lyonnet
, Frantz Rowe, Brian Fitzgerald:
From Agile to DevOps: Smart Skills and Collaborations. 927-945

Dan Wu, Guofang Nan
, Minqiang Li:
Optimal Piracy Control: Should a Firm Implement Digital Rights Management? 947-960

Roman Lukyanenko, Andrea Wiggins
, Holly K. Rosser:
Citizen Science: An Information Quality Research Frontier. 961-983

Ramzi El-Haddadeh
:
Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services. 985-999
Volume 22, Number 5, October 2020
Special Issue on Heuristic Acquisition for Data Science

Lydia Bouzar-Benlabiod, Stuart H. Rubin:
Heuristic Acquisition for Data Science. 1001-1007

Doruk Sen
, Cem Çagri Dönmez, Umman Mahir Yildirim:
A Hybrid Bi-level Metaheuristic for Credit Scoring. 1009-1019

Qianwen Xu
, Victor Chang
, Ching-Hsien Hsu:
Event Study and Principal Component Analysis Based on Sentiment Analysis - A Combined Methodology to Study the Stock Market with an Empirical Study. 1021-1037

Mohammed Kuko
, Mohammad Pourhomayoun:
Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods. 1039-1051

Haiman Tian
, Shu-Ching Chen, Mei-Ling Shyu:
Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification. 1053-1066

Salima Smiti, Makram Soui:
Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE. 1067-1083

Narges Manouchehri
, Hieu Nguyen, Pantea Koochemeshkian, Nizar Bouguila, Wentao Fan
:
Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions. 1085-1093

Sabin Kafle
, Nisansa de Silva, Dejing Dou:
An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering. 1095-1111

Justin M. Johnson
, Taghi M. Khoshgoftaar:
The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data. 1113-1131

Lifeng Mu, Vijayan Sugumaran
, Fangyuan Wang:
A Hybrid Genetic Algorithm for Software Architecture Re-Modularization. 1133-1161

Matti Mäntymäki
, Sami Hyrynsalmi
, Antti Koskenvoima:
How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics. 1163-1178

Pedro Antunes
, José A. Pino, Mary Tate
, Alistair Barros
:
Eliciting Process Knowledge Through Process Stories. 1179-1201

Elvira Ismagilova
, Emma L. Slade
, Nripendra P. Rana
, Yogesh K. Dwivedi
:
The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis. 1203-1226

Emmanuel W. Ayaburi, Jaeung Lee, Michele Maasberg:
Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective. 1227-1240

Hwee-Joo Kam
, Thomas Mattson
, Sanjay Goel:
A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. 1241-1264
Volume 22, Number 6, December 2020

Jorge Martinez-Gil
, Alejandra Lorena Paoletti, Mario Pichler:
A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles. 1265-1274

Fereshteh Ghahramani, Jingguo Wang
:
Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective. 1275-1290

Dunlu Peng
, Yinrui Wang, Cong Liu, Zhang Chen:
TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition. 1291-1304

Samar Mouakket
, Yuan Sun
:
Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender. 1305-1321

Hamed Majidi Zolbanin, Dursun Delen, Durand Crosby, David Wright:
A Predictive Analytics-Based Decision Support System for Drug Courts. 1323-1342

Xiongfei Cao, Ali Nawaz Khan, Ahsan Ali
, Naseer Abbas Khan
:
Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users' Discontinuous Usage Behavior in SNSs. 1343-1356

Christie Pei-Yee Chin
, Nina Evans
, Charles Zhechao Liu, Kim-Kwang Raymond Choo
:
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks. 1357-1376

Lawrence Bunnell
, Kweku-Muata Osei-Bryson, Victoria Y. Yoon:
RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers. 1377-1418

Kai Klinker, Manuel Wiesche
, Helmut Krcmar:
Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation. 1419-1431

Duong Dang
, Samuli Pekkola:
Institutional Perspectives on the Process of Enterprise Architecture Adoption. 1433-1445

Juan Du, Hengqing Jing, Kim-Kwang Raymond Choo
, Vijayan Sugumaran
, Daniel Castro-Lacouture
:
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain. 1467-1485

Guilherme Costa Wiedenhöft
, Edimara M. Luciano
, Gabriela Viale Pereira:
Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations. 1487-1504

Wafa Bouaynaya
:
Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method. 1505-1518

Amit Rathee
, Jitender Kumar Chhabra
:
Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans. 1519-1537

Yanxin Wang, Jian Li, Xi Zhao, Gengzhong Feng, Xin (Robert) Luo
:
Using Mobile Phone Data for Emergency Management: a Systematic Literature Review. 1539-1559

Bernardo A. Huberman
, Bob Lund, Jing Wang:
Quantum Secured Internet Transport. 1561-1567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







