Information Systems Frontiers, Volume 23 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 23, Number 1, February 2021
Special Issue on Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science

Silvia Chiusano, Tania Cerquitelli, Robert Wrembel
, Daniele Quercia
:
Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science. 1-7

Petar Jovanovic
, Sergi Nadal
, Oscar Romero
, Alberto Abelló, Besim Bilalli
:
Quarry: A User-centered Big Data Integration Platform. 9-33

Pietro Michiardi, Damiano Carra
, Sara Migliorini:
Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks. 35-51

Giovanni Battista Gardino, Rosa Meo
, Giuseppe Craparotta:
Multi-view Latent Learning Applied to Fashion Industry. 53-69

Aria Ghora Prabono
, Bernardo Nugroho Yahya, Seok-Lyong Lee:
Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition. 71-80

Ciprian-Octavian Truica
, Elena Simona Apostol
, Jérôme Darmont, Ira Assent
:
TextBenDS: a Generic Textual Data Benchmark for Distributed Systems. 81-100

Ilaria Bordino, Andrea Ferretti, Francesco Gullo
, Stefano Pascolutti:
GarNLP: A Natural Language Processing Pipeline for Garnishment Documents. 101-114

Sebastián Vallejos
, Diego Gabriel Alonso, Brian Caimmi, Luis Berdún, Marcelo Gabriel Armentano, Álvaro Soria:
Mining Social Networks to Detect Traffic Incidents. 115-134

Funda Ustek-Spilda, Davide Vega
, Matteo Magnani
, Luca Rossi, Irina Shklovski
, Sebastián Lehuedé
, Alison Powell
:
A Twitter-Based Study of the European Internet of Things. 135-149

Davy Preuveneers
, Giuseppe Garofalo
, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. 151-164

Abdallah Khelil, Amin Mesmoudi
, Jorge Galicia, Ladjel Bellatreche, Mohand-Saïd Hacid, Emmanuel Coquery:
Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing. 165-183

José Paredes, Gerardo I. Simari, Maria Vanina Martinez, Marcelo A. Falappa
:
NetDER: An Architecture for Reasoning About Malicious Behavior. 185-201

Amine Ghrab
, Oscar Romero
, Sabri Skhiri, Esteban Zimányi:
TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes. 203-226

Ekaterina Loginova
, Stalin Varanasi, Günter Neumann:
Towards End-to-End Multilingual Question Answering. 227-241

Claudia Diamantini, Paolo Lo Giudice, Domenico Potena, Emanuele Storti
, Domenico Ursino:
An Approach to Extracting Topic-guided Views from the Sources of a Data Lake. 243-262
Volume 23, Number 2, April 2021
Special Section on Seeking Foundations for the Science of Cyber Security

Shouhuai Xu, Moti Yung, Jingguo Wang
:
Seeking Foundations for the Science of Cyber Security. 263-267

Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang:
HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks. 269-283

Bin Xia
, Yuxuan Bai, Junjie Yin, Yun Li, Jian Xu:
LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling. 285-298

Krishna Chandra Roy
, Qian Chen
:
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification. 299-315

Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu:
Incentive Mechanism for Rational Miners in Bitcoin Mining Pool. 317-327

Mario Silic
, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. 329-341

A. J. Burns
, Clay Posey, Tom L. Roberts:
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity. 343-360

Eunkyung Kweon, Hansol Lee, Sangmi Chai, Kyeongwon Yoo:
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence. 361-373

Qi Liu, Gengzhong Feng, Giri Kumar Tayi, Jun Tian:
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach. 375-389

Stephan Berger, Björn Häckel, Lukas Häfner
:
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems. 391-414

Tan Trung Luong
, Uthayasankar Sivarajah
, Vishanth Weerakkody:
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence? 415-433

Supavich (Fone) Pengnate, Rathindra Sarathy
, Todd J. Arnold:
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation. 435-452

Efpraxia D. Zamani
, Nancy Pouloudi
, George M. Giaglis, Jonathan Wareham:
Accommodating Practices During Episodes of Disillusionment with Mobile IT. 453-475

Benjamin Clapham
, Michael Siering
, Peter Gomber:
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets. 477-494

Maciej Grzenda
, Jaroslaw Legierski:
Towards Increased Understanding of Open Data Use for Software Development. 495-513
Volume 23, Number 3, June 2021

Zhen Zhao, Zong Min Ma
, Li Yan:
An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM. 515-530

Sahar Karimi
:
Cross-visiting Behaviour of Online Consumers Across Retailers' and Comparison Sites, a Macro-Study. 531-542

Mohammad Alamgir Hossain
, Shams Rahman
:
Investigating the Success of OGB in China: The Influence of Personality Traits. 543-559

Palash Bera
:
Interactions between Analysts in Developing Collaborative Conceptual Models. 561-573

Farid Shirvani, Ghassan Beydoun
, Pascal Perez
, William Scott, Peter Campbell:
An Architecture Framework Approach for Complex Transport Projects. 575-595

Farid Shirvani, Ghassan Beydoun
, Pascal Perez
, William Scott, Peter Campbell:
Correction to: An Architecture Framework Approach for Complex Transport Projects. 597

Kim Fecher, Lauren McCarthy, Daniel E. Porreca, Niam Yaraghi
:
Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices' Workflow. 599-605

Mengyue Wang
, Xin Li
, Patrick Y. K. Chau:
Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context. 607-626

Mahesh Balan U, Saji K. Mathew:
Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process. 627-647

Hung-Pin Shih
, Pei-Chen Sung:
Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance. 649-661

Federico Iannacci
, Colm Fearon, Kristine Pole:
From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs. 663-680

Yen-Chun Chou, Benjamin B. M. Shao
:
Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing. 681-694

Zong-Chang Yang
:
Vector Gravitation Clustering Networks. 695-707

Adarsh Anand
, Navneet Bhatt
, Omar Hussain Alhazmi:
Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters. 709-722

Naveena Prakasam
, Louisa Huxtable-Thomas
:
Reddit: Affordances as an Enabler for Shifting Loyalties. 723-751

Amit V. Deokar
, Jie Tao:
OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs. 753-772

Chenglong Zhang, Nan Feng, Jianjian Chen, Dahui Li
, Minqiang Li:
Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities. 773-790

A. Geethapriya, S. Valli
:
An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis. 791-805
Volume 23, Number 4, August 2021
Special Issue on Secure Knowledge Management in the Artificial Intelligence Era

Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. 807-810

R. K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal, Aniket Kuiri:
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models. 811-833

Trupil Limbasiya
, Sanjay Kumar Sahay, Bharath Sridharan:
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. 835-848

Samir Talegaon
, Ram Krishnan
:
A Formal Specification of Access Control in Android with URI Permissions. 849-866

Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak:
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning. 867-882

Md. Farhan Haque
, Ram Krishnan
:
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. 883-896

Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats. 897-913

Rajesh Kumar Shrivastava
, Chittaranjan Hota
:
UnderTracker: Generating Robust Binaries Using Execution Flow Traces. 915-930

Thi Tran
, Rohit Valecha, Paul Rad, H. Raghav Rao:
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises. 931-939

Abhipsa Pal
, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage. 941-961

Qun Chen, Ji-Wen Li, Jian-Guo Liu
, Jingti Han, Yun Shi, Xunhua Guo
:
Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending? 963-986

Kuttimani Tamilmani, Nripendra P. Rana, Yogesh K. Dwivedi
:
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2. 987-1005

Anca Elena-Bucea, Frederico Cruz-Jesus
, Tiago Oliveira
, Pedro Simões Coelho
:
Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union. 1007-1021

Amir Hassan Zadeh
, David Taylor, Margaret Bertsos, Timothy Tillman, Nasim Nosoudi
, Scott Bruce
:
Predicting Sports Injuries with Wearable Technology and Data Analysis. 1023-1037

Abhishek Majumdar
, Tapas Debnath
, Arpita Biswas, Sandeep K. Sood
, Krishna Lal Baishnab:
An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm). 1039-1056

M. Vimalkumar
, Jang Bahadur Singh, Sujeet Kumar Sharma
:
Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations. 1057-1076
Volume 23, Number 5, September 2021
Special Issue on IT in Disaster Risk Reduction: Issues and Challenges

Yuko Murayama, Hans Jochen Scholl, Dimiter Velev:
Information Technology in Disaster Risk Reduction. 1077-1081

Eileen Young
, Benigno Aguirre:
PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation. 1083-1096

Milad Mirbabaie
, Christian Ehnis, Stefan Stieglitz, Deborah Bunker, Tanja Rose:
Digital Nudging in Social Media Disaster Communication. 1097-1113

Osamu Uchida
, Sachi Tajima, Yoshitaka Kajita, Keisuke Utsu, Yuji Murakami, Sanetoshi Yamada:
Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation. 1115-1125

Stathis G. Arapostathis
:
A Methodology for Automatic Acquisition of Flood-event Management Information From Social Media: the Flood in Messinia, South Greece, 2016. 1127-1144

Shalak Mendon, Pankaj Dutta
, Abhishek Behl
, Stefan Lessmann
:
A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters. 1145-1168

Ahmed Abouzeid
, Ole-Christoffer Granmo, Christian Webersik, Morten Goodwin:
Learning Automata-based Misinformation Mitigation via Hawkes Processes. 1169-1188

Tullio Tanzi, Matteo Bertolino:
Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation. 1189-1202

Jun Sasaki, Makoto Kitsuya:
Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction. 1203-1211

Terje Gjøsæter
, Jaziar Radianti
, Weiqin Chen:
Universal Design of ICT for Emergency Management from Stakeholders' Perspective. 1213-1225

Lin-Chih Chen:
Interactive Topic Search System Based on Topic Cluster Technology. 1227-1243

Ameni Hbaieb, Mahdi Khemakhem
, Maher Ben Jemaa:
Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic. 1245-1271

Patrick Mikalef
, Kshitij Sharma, Ilias O. Pappas
, Michail N. Giannakos:
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study. 1273-1286

Navid Aghakhani, Onook Oh
, Dawn G. Gregg
, Jahangir Karimi:
Online Review Consistency Matters: An Elaboration Likelihood Model Perspective. 1287-1301

Eleanna Kafeza
, Christos Makris
, Gerasimos Rompolas
, Feras N. Al-Obeidat
:
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter. 1303-1316

Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari
:
Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1317-1337

Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari
:
Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1339

Arpan Kumar Kar
:
What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the "Digital Service Usage Satisfaction Model". 1341-1361
Volume 23, Number 6, December 2021
Special Issue on Machine Learning, AI and Big Data Methods and Findings for COVID-19

Victor Chang
, Carole A. Goble, Muthu Ramachandran, Lazarus Jegatha Deborah, Reinhold Behringer:
Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19. 1363-1367

R. Elakkiya
, Pandi Vijayakumar
, Marimuthu Karuppiah
:
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking. 1369-1383

Prabhdeep Singh
, Rajbir Kaur, Kiran Deep Singh
, Gaurav Dhiman
:
A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients. 1385-1401

Longling Zhang, Bochen Shen
, Ahmed Barnawi, Shan Xi, Neeraj Kumar
, Yi Wu
:
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia. 1403-1415

Harleen Kaur
, Shafqat Ul Ahsaan
, Bhavya Alankar, Victor Chang
:
A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets. 1417-1429

Jyoti Choudrie
, Shruti Patil, Ketan Kotecha, Nikhil Matta, Ilias O. Pappas
:
Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study. 1431-1465

Francesco Piccialli
, Vincenzo Schiano Di Cola
, Fabio Giampaolo, Salvatore Cuomo
:
The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic. 1467-1497

Raed Salah Algharabat
, Nripendra P. Rana
:
Social Commerce in Emerging Markets and its Impact on Online Community Engagement. 1499-1520

Neeru Malhotra
, Sunil Sahadev
, P. S. H. Leeflang, Keyoor Purani
:
New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis. 1521-1536

Grace Fox, Tabitha L. James
:
Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study. 1537-1562

Daniel Chandran
, Abdullah Alammari:
Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia. 1563-1572

Cancan Wang
, Rony Medaglia, Tina Blegind Jensen:
When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology. 1573-1591

Ashish Kumar Jha
, Indranil Bose
:
Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships. 1593-1607

Kjell Hausken
, Jonathan W. Welburn:
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. 1609-1620

Steven D. Silver:
Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS. 1621-1642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







