Information systems frontiers: Keyword analysis and classification (original) (raw)
References
Barki, H., Rivard, S., & Talbot, J. (1988). An information systems keyword classification scheme. MIS Quarterly, 12(2), 299–322. Google Scholar
Barki, H., Rivard, S., & Talbot, J. (1993). A keyword classification scheme for IS research literature: an update. MIS Quarterly, 209–226.
Cohen, E. (1999). Reconceptualizing information systems as a field of the transdiscipline. Journal of Computing and Information Technology, 7(3), 213–219. Google Scholar
Dwivedi, Y. K., Lal, B., Mustafee, N., & Williams, M. D. (2009). Profiling a decade of information systems Frontiers’ research. Information Systems Frontiers, 11(1), 87–102. Google Scholar
Levy, Y., & Ellis, T. J. (2006). A systems approach to conduct an effective literature review in support of information systems research. Informing Science: International Journal of an Emerging Transdiscipline, 9(1), 181–212. Google Scholar
Sage, A. P., & Rouse, W. B. (1999). Information systems frontiers in knowledge management. Information Systems Frontiers, 1(3), 205–219. Google Scholar
Vessey, I., Ramesh, V., & Glass, R. L. (2002). Research in information systems: an empirical study of diversity in the discipline and its journals. Journal of Management Information Systems, 19(2), 129–174. Google Scholar
Vessey, I., Ramesh, V., & Glass, R. L. (2005). A unified classification system for research in the computing disciplines. Information and Software Technology, 47(4), 245–255. Google Scholar
Woelfel, J. (1993). Artificial neurol networks in policy research: a current assessment. Journal of Communication, 43(1), 63–80. Google Scholar
Woelfel, J. (1998). CATPAC user’s manual: Catpac II, Version.
Woelfel, J. K. (1998). User’s Guide Catpac II: version 2.0: Kah Press.
Woelfel, J., & Stoyanoff, N. (1993). CATPAC: A neural network for qualitative analysis of text. Paper presented at the annual meeting of the Australian Marketing Association, Melbourne, Australia.
Further reading
Adiele, C. (2011). Towards promoting interactivity in a B2B web community. Information Systems Frontiers, 13(2), 237–249. Google Scholar
Afsarmanesh, H., Msanjila, S. S., & Camarinha-Matos, L. M. (2012). Technological research plan for active ageing. Information Systems Frontiers, 14(3), 669–692. Google Scholar
Ahmed, F., & Capretz, L. F. (2011). A business maturity model of software product line engineering. Information Systems Frontiers, 13(4), 543–560. Google Scholar
Ahmed, M. A., & van den Hoven, J. (2010). Agents of responsibility—freelance web developers in web applications development. Information Systems Frontiers, 12(4), 415–424. Google Scholar
Alaranta, M., & Henningsson, S. (2008). An approach to analyzing and planning post-merger IS integration: Insights from two field studies. Information Systems Frontiers, 10(3), 307–319. Google Scholar
Ali, S., & Green, P. (2012). Effective information technology (IT) governance mechanisms: an IT outsourcing perspective. Information Systems Frontiers, 14(2), 179–193. Google Scholar
Almeida, J. P. A., Iacob, M.-E., & Van Eck, P. (2007). Requirements traceability in model-driven development: applying model and transformation conformance. Information Systems Frontiers, 9(4), 327–342. Google Scholar
Alvarez-Suescun, E. (2010). Combining transaction cost and resource-based insights to explain IT implementation outsourcing. Information Systems Frontiers, 12(5), 631–645. Google Scholar
Andoh-Baidoo, F. K., Osei-Bryson, K.-M., & Amoako-Gyampah, K. (2012). Effects of firm and IT characteristics on the value of e-commerce initiatives: an inductive theoretical framework. Information Systems Frontiers, 14(2), 237–259. Google Scholar
Arora, A., Nandkumar, A., & Telang, R. (2006). Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers, 8(5), 350–362. Google Scholar
Ashraf, M., Hanisch, J., & Swatman, P. (2009). ICT intervention in the ‘Chandanbari’Village of Bangladesh: results from a field study. Information Systems Frontiers, 11(2), 155–166. Google Scholar
Aubert, B. A., Beaurivage, G., Croteau, A.-M., & Rivard, S. (2008). Firm strategic profile and IT outsourcing. Information Systems Frontiers, 10(2), 129–143. Google Scholar
Awan, I. (2006). Mobility management for m-commerce requests in wireless cellular networks. Information Systems Frontiers, 8(4), 285–295. Google Scholar
Aydin, M. N., & Bakker, M. E. (2008). Analyzing IT maintenance outsourcing decision from a knowledge management perspective. Information Systems Frontiers, 10(3), 293–305. Google Scholar
Baghdadi, Y. (2006). Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing. Information Systems Frontiers, 8(5), 395–410. Google Scholar
Bagheri, E., & Ghorbani, A. A. (2010). UML-CI: a reference model for profiling critical infrastructure systems. Information Systems Frontiers, 12(2), 115–139. Google Scholar
Baker, C. J., & Witte, R. (2006). Mutation mining—a prospector’s tale. Information Systems Frontiers, 8(1), 47–57. Google Scholar
Balka, E., Whitehouse, S., Coates, S. T., & Andrusiek, D. (2012). Ski hill injuries and ghost charts: socio-technical issues in achieving e-Health interoperability across jurisdictions. Information Systems Frontiers, 14(1), 19–42. Google Scholar
Barclay, C. (2008). Towards an integrated measurement of IS project performance: the project performance scorecard. Information Systems Frontiers, 10(3), 331–345. Google Scholar
Barjis, J., Gupta, A., & Sharda, R. (2011). Knowledge work and communication challenges in networked enterprises. Information Systems Frontiers, 13(5), 615–619. Google Scholar
Barolli, L., Koyama, A., Durresi, A., & De Marco, G. (2006). A web-based e-learning system for increasing study efficiency by stimulating learner’s motivation. Information Systems Frontiers, 8(4), 297–306. Google Scholar
Beck, R., Beimborn, D., Weitzel, T., & König, W. (2008). Network effects as drivers of individual technology adoption: analyzing adoption and diffusion of mobile communication services. Information Systems Frontiers, 10(4), 415–429. Google Scholar
Beer, M., Slack, F., & Armitt, G. (2005). Collaboration and teamwork: immersion and presence in an online learning environment. Information Systems Frontiers, 7(1), 27–37. Google Scholar
Begier, B. (2010). Users’ involvement may help respect social and ethical values and improve software quality. Information Systems Frontiers, 12(4), 389–397. Google Scholar
Bell, D., De Cesare, S., Iacovelli, N., Lycett, M., & Merico, A. (2007). A framework for deriving semantic web services. Information Systems Frontiers, 9(1), 69–84. Google Scholar
Bharosa, N., Lee, J., & Janssen, M. (2010). Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: propositions from field exercises. Information Systems Frontiers, 12(1), 49–65. Google Scholar
Bog, A., Plattner, H., & Zeier, A. (2011). A mixed transaction processing and operational reporting benchmark. Information Systems Frontiers, 13(3), 321–335. Google Scholar
Book, M., & Gruhn, V. (2007). Specifying and controlling multi-channel web interfaces for enterprise applications. Information Systems Frontiers, 9(2–3), 137–150. Google Scholar
Brenner, D., Atkinson, C., Malaka, R., Merdes, M., Paech, B., & Suliman, D. (2007). Reducing verification effort in component-based software engineering through built-in testing. Information Systems Frontiers, 9(2–3), 151–162. Google Scholar
Brown, S. A. (2008). Household technology adoption, use, and impacts: past, present, and future. Information Systems Frontiers, 10(4), 397–402. Google Scholar
Burgess, S., Sellitto, C., Cox, C., & Buultjens, J. (2011). Trust perceptions of online travel information by different content creators: some social and legal implications. Information Systems Frontiers, 13(2), 221–235. Google Scholar
Butler, T., & McGovern, D. (2012). A conceptual model and IS framework for the design and adoption of environmental compliance management systems. Information Systems Frontiers, 14(2), 221–235. Google Scholar
Bygstad, B., & Aanby, H.-P. (2010). ICT infrastructure for innovation: a case study of the enterprise service bus approach. Information Systems Frontiers, 12(3), 257–265. Google Scholar
Calzarossa, M. C., De Lotto, I., & Rogerson, S. (2010). Ethics and information systems—Guest editors’ introduction. Information Systems Frontiers, 12(4), 357–359. Google Scholar
Carchiolo, V., D’Ambra, S., Longheu, A., & Malgeri, M. (2010). Object-oriented re-engineering of manufacturing models: a case study. Information Systems Frontiers, 12(2), 97–114. Google Scholar
Carter, L., & Weerakkody, V. (2008). E-government adoption: a cultural comparison. Information Systems Frontiers, 10(4), 473–482. Google Scholar
Cazier, J. A., Shao, B. B., & Louis, R. D. S. (2007). Sharing information and building trust through value congruence. Information Systems Frontiers, 9(5), 515–529. Google Scholar
Chalasani, S., & Boppana, R. V. (2005). Adaptive multimodule routers for multiprocessor architectures. Information Systems Frontiers, 7(3), 317–327. Google Scholar
Chan, K., & Poernomo, I. (2007). QoS-aware model driven architecture through the UML and CIM. Information Systems Frontiers, 9(2–3), 209–224. Google Scholar
Chang, K.-C., & Wang, C.-P. (2011). Information systems resources and information security. Information Systems Frontiers, 13(4), 579–593. Google Scholar
Chang, R.-I., Wang, T.-C., Wang, C.-H., Liu, J.-C., & Ho, J.-M. (2012). Effective distributed service architecture for ubiquitous video surveillance. Information Systems Frontiers, 14(3), 499–515. Google Scholar
Chang, S.-I., Yen, D. C., Chang, I.-C., & Chou, J.-C. (2012). Study of the digital divide evaluation model for government agencies—a Taiwanese local government’s perspective. Information Systems Frontiers, 14(3), 693–709. Google Scholar
Chang, S.-I., Yen, D. C., Ng, C. S.-P., Chang, I.-C., & Yu, S.-Y. (2011). An ERP system performance assessment model development based on the balanced scorecard approach. Information Systems Frontiers, 13(3), 429–450. Google Scholar
Chang, S. A. (2012). Time dynamics of overlapping e-auction mechanisms: information transfer, strategic user behavior and auction revenue. Information Systems Frontiers, 14(2), 331–342. Google Scholar
Chang, Y.-S., Sheu, R.-K., Yuan, S.-M., & Hsu, J.-J. (2012). Scaling database performance on GPUs. Information Systems Frontiers, 14(4), 909–924. Google Scholar
Chau, M., Ball, G. L., Huang, J., Chen, J., & Zhao, J. L. (2011). Global IT and IT-enabled services. Information Systems Frontiers, 13(3), 301–304. Google Scholar
Chebotko, A., Chang, S., Lu, S., & Fotouhi, F. (2012). Secure XML querying based on authorization graphs. Information Systems Frontiers, 14(3), 617–632. Google Scholar
Chen, H., Zhou, Y., Reid, E. F., & Larson, C. A. (2011). Introduction to special issue on terrorism informatics. Information Systems Frontiers, 13(1), 1–3. Google Scholar
Chen, J.-H., Chao, K.-M., Godwin, N., & Soo, V.-W. (2005). Combining cooperative and non-cooperative automated negotiations. Information Systems Frontiers, 7(4–5), 391–404. Google Scholar
Chen, L., L’Abbate, M., Thiel, U., & Neuhold, E. J. (2005). The layer-seeds term clustering method: enabling proactive situation-aware product recommendations in E-commerce dialogues. Information Systems Frontiers, 7(4–5), 405–419. Google Scholar
Chen, X., Zheng, Q., & Guan, X. (2008). An OVAL-based active vulnerability assessment system for enterprise computer networks. Information Systems Frontiers, 10(5), 573–588. Google Scholar
Cheong, M., & Lee, V. C. (2011). A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via twitter. Information Systems Frontiers, 13(1), 45–59. Google Scholar
Chiu, D. K., Kafeza, E., & Hung, P. C. (2011). ISF special issue on emerging social and legal aspects of information systems with Web 2.0. Information Systems Frontiers, 13(2), 153–155. Google Scholar
Chiu, D. K., Lin, D. T., Kafeza, E., Wang, M., Hu, H., Hu, H., & Zhuang, Y. (2010). Alert based disaster notification and resource allocation. Information Systems Frontiers, 12(1), 29–47. Google Scholar
Choe, Y. C., Park, J., Chung, M., & Moon, J. (2009). Effect of the food traceability system for building trust: price premium and buying behavior. Information Systems Frontiers, 11(2), 167–179. Google Scholar
Choi, J.-W., & Oh, D.-I. (2011). Tag-only aging-counter localization for the R-LIM2 system. Information Systems Frontiers, 13(1), 127–137. Google Scholar
Costa, G. J. M., & Silva, N. S. A. (2010). Knowledge versus content in e-learning: a philosophical discussion. Information Systems Frontiers, 12(4), 399–413. Google Scholar
Crasso, M., Zunino, A., & Campo, M. (2011). Combining query-by-example and query expansion for simplifying Web Service discovery. Information Systems Frontiers, 13(3), 407–428. Google Scholar
De Laat, M., & Lally, V. (2005). Investigating group structure in CSCL: some new approaches. Information Systems Frontiers, 7(1), 13–25. Google Scholar
DeMaagd, K., & Bauer, J. M. (2011). Modeling the dynamic interactions of agents in the provision of network infrastructure. Information Systems Frontiers, 13(5), 669–680. Google Scholar
Demirkan, H., Sen, S., Goul, M., & Nichols, J. (2012). Ensuring reliability in B2B services: fault tolerant inter-organizational workflows. Information Systems Frontiers, 14(3), 765–788. Google Scholar
Deokar, A. V., & El-Gayar, O. F. (2011). Decision-enabled dynamic process management for networked enterprises. Information Systems Frontiers, 13(5), 655–668. Google Scholar
Destro-Filho, J.-B. (2005). Performance comparison of several Non-linear equalizers in the context of mobile telecommunications. Information Systems Frontiers, 7(2), 113–128. Google Scholar
Dijkman, R. M., Dirgahayu, T., & Quartel, D. A. (2007). The adequacy of languages for representing interaction mechanisms. Information Systems Frontiers, 9(4), 359–373. Google Scholar
Dong, Y., & Lian, S. (2012). Automatic and fast temporal segmentation for personalized news consuming. Information Systems Frontiers, 14(3), 517–526. Google Scholar
Dwivedi, Y. K., Papazafeiropoulou, A., Brinkman, W.-P., & Lal, B. (2010). Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider. Information Systems Frontiers, 12(2), 207–217. Google Scholar
Dwivedi, Y. K., Williams, M. D., & Venkatesh, V. (2008). Guest editorial: a profile of adoption of Information & Communication Technologies (ICT) research in the household context. Information Systems Frontiers, 10(4), 385–390. Google Scholar
Enzmann, M., & Schneider, M. (2005). Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system. Information Systems Frontiers, 7(4–5), 359–370. Google Scholar
Fang, X., & Holsapple, C. W. (2011). Impacts of navigation structure, task complexity, and users’ domain knowledge on Web site usability—an empirical study. Information Systems Frontiers, 13(4), 453–469. Google Scholar
Fatolahi, A., & Shams, F. (2006). An investigation into applying UML to the Zachman framework. Information Systems Frontiers, 8(2), 133–143. Google Scholar
Fedorowicz, J., & Gogan, J. L. (2010). Reinvention of interorganizational systems: a case analysis of the diffusion of a bio-terror surveillance system. Information Systems Frontiers, 12(1), 81–95. Google Scholar
Fernando, S., Choudrie, J., Lycett, M., & de Cesare, S. (2012). Hidden assumptions and their influence on clinicians’ acceptance of new IT systems in the NHS. Information Systems Frontiers, 14(2), 279–299. Google Scholar
Fisher, J., Hirschheim, R., & Jacobs, R. (2008). Understanding the outsourcing learning curve: a longitudinal analysis of a large Australian company. Information Systems Frontiers, 10(2), 165–178. Google Scholar
Gangadharan, G., D’andrea, V., De Paoli, S., & Weiss, M. (2012). Managing license compliance in free and open source software development. Information Systems Frontiers, 14(2), 143–154. Google Scholar
Gao, M., Liu, K., & Wu, Z. (2010). Personalisation in web computing and informatics: theories, techniques, applications, and future research. Information Systems Frontiers, 12(5), 607–629. Google Scholar
Gencer, C., Aydogan, E. K., & Celik, C. (2008). A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers, 10(1), 111–124. Google Scholar
Gerpott, T. J. (2011). Determinants of self-report and system-captured measures of mobile Internet use intensity. Information Systems Frontiers, 13(4), 561–578. Google Scholar
Glasgow, J., Kuo, T., & Davies, J. (2006). Protein structure from contact maps: a case-based reasoning approach. Information Systems Frontiers, 8(1), 29–36. Google Scholar
Goethals, F. G., Snoeck, M., Lemahieu, W., & Vandenbulcke, J. (2006). Management and enterprise architecture click: The FAD (E) E framework. Information Systems Frontiers, 8(2), 67–79. Google Scholar
Goiri, Í., Guitart, J., & Torres, J. (2012). Economic model of a Cloud provider operating in a federated Cloud. Information Systems Frontiers, 14(4), 827–843. Google Scholar
Goldschmidt, P. (2007). Managing the false alarms: a framework for assurance and verification of surveillance monitoring. Information Systems Frontiers, 9(5), 541–556. Google Scholar
Goles, T., Hawk, S., & Kaiser, K. M. (2008). Information technology workforce skills: the software and IT services provider perspective. Information Systems Frontiers, 10(2), 179–194. Google Scholar
Goo, J. (2010). Structure of service level agreements (SLA) in IT outsourcing: the construct and its measurement. Information Systems Frontiers, 12(2), 185–205. Google Scholar
Gordon, L. A., & Loeb, M. P. (2006). Economic aspects of information security: an emerging field of research. Information Systems Frontiers, 8(5), 335–337. Google Scholar
Gosain, S. (2007). Realizing the vision for web services: strategies for dealing with imperfect standards. Information Systems Frontiers, 9(1), 53–67. Google Scholar
Gotterbarn, D. (2010). The ethics of video games: Mayhem, death, and the training of the next generation. Information Systems Frontiers, 12(4), 369–377. Google Scholar
Gottschalk, P. (2010). Knowledge management technology for organized crime risk assessment. Information Systems Frontiers, 12(3), 267–275. Google Scholar
Goul, M., Corral, K., & Demirkan, H. (2005). Database schema design for a web services supply chain manager: requirements and proposed infrastructure. Information Systems Frontiers, 7(3), 257–271. Google Scholar
Greefhorst, D., Koning, H., & Van Vliet, H. (2006). The many faces of architectural descriptions. Information Systems Frontiers, 8(2), 103–113. Google Scholar
Griffiths, M., & Light, B. (2008). Social networking and digital gaming media convergence: classification and its consequences for appropriation. Information Systems Frontiers, 10(4), 447–459. Google Scholar
Grodzinsky, F. S., Gumbus, A., & Lilley, S. (2010). Ethical implications of internet monitoring: a comparative study. Information Systems Frontiers, 12(4), 433–441. Google Scholar
Gruźdź, A., Ihnatowicz, A., & Ślʁzak, D. (2006). Interactive gene clustering—a case study of breast cancer microarray data. Information Systems Frontiers, 8(1), 21–27. Google Scholar
Guajardo, J., Škorić, B., Tuyls, P., Kumar, S. S., Bel, T., Blom, A. H., & Schrijen, G.-J. (2009). Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Information Systems Frontiers, 11(1), 19–41. Google Scholar
Gupta, A., Crk, I., & Bondade, R. (2011). Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm. Information Systems Frontiers, 13(3), 397–405. Google Scholar
Gupta, A., Sharda, R., & Greve, R. A. (2011). You’ve got email! Does it really matter to process emails now or later? Information Systems Frontiers, 13(5), 637–653. Google Scholar
Gutierrez-Garcia, J. O., & Sim, K. M. (2012). GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications. Information Systems Frontiers, 14(4), 925–951. Google Scholar
Han, S., Youn, H. Y., & Song, O. (2012). Efficient category-based service discovery on multi-agent platform. Information Systems Frontiers, 14(3), 601–616. Google Scholar
Hausken, K. (2006). Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers, 8(5), 338–349. Google Scholar
Hayne, S. C., Troup, L. J., & McComb, S. A. (2011). “Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams. Information Systems Frontiers, 13(1), 89–100. Google Scholar
He, D. D., Yang, J., Compton, M., & Taylor, K. (2012). Authorization in cross-border eHealth systems. Information Systems Frontiers, 14(1), 43–55. Google Scholar
Hedestig, U., & Kaptelinin, V. (2005). Facilitator’s roles in a videoconference learning environment. Information Systems Frontiers, 7(1), 71–83. Google Scholar
het Veld, B. O., Hohlfeld, D., & Pop, V. (2009). Harvesting mechanical energy for ambient intelligent devices. Information Systems Frontiers, 11(1), 7–18. Google Scholar
Hill, T. R., & Roldan, M. (2005). Toward third generation threaded discussions for mobile learning: opportunities and challenges for ubiquitous collaborative environments. Information Systems Frontiers, 7(1), 55–70. Google Scholar
Hirschheim, R., Dibbern, J., & Heinzl, A. (2008). Foreword to the special issue on IS sourcing. Information Systems Frontiers, 10(2), 125–127. Google Scholar
Hoffmann, J., Weber, I., & Governatori, G. (2012). On compliance checking for clausal constraints in annotated process models. Information Systems Frontiers, 14(2), 155–177. Google Scholar
Holsapple, C. W., & Wu, J. (2008). Building effective online game websites with knowledge-based trust. Information Systems Frontiers, 10(1), 47–60. Google Scholar
Hong, D., Chiu, D. K., Shen, V. Y., Cheung, S., & Kafeza, E. (2007). Ubiquitous enterprise service adaptations based on contextual user behavior. Information Systems Frontiers, 9(4), 343–358. Google Scholar
Hong, S.-J., Thong, J. Y., Moon, J.-Y., & Tam, K.-Y. (2008). Understanding the behavior of mobile data services consumers. Information Systems Frontiers, 10(4), 431–445. Google Scholar
Horan, T. A., & Schooley, B. (2005). Inter-organizational emergency medical services: case study of rural wireless deployment and management. Information Systems Frontiers, 7(2), 155–173. Google Scholar
Hsu, C.-H., Chao, H.-C., & Park, J. H. (2011). Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. Information Systems Frontiers, 13(4), 471–480. Google Scholar
Hsu, J. Y.-J., Lin, K.-J., Chang, T.-H., Ho, C.-J., Huang, H.-S., & Jih, W.-R. (2006). Parameter learning of personalized trust models in broker-based distributed trust management. Information Systems Frontiers, 8(4), 321–333. Google Scholar
Hu, D., Sun, S. X., Zhao, J. L., & Zhao, X. (2011). Strategic choices of inter-organizational information systems: a network perspective. Information Systems Frontiers, 13(5), 681–692. Google Scholar
Hu, J. (2011). Derivation of trust federation for collaborative business processes. Information Systems Frontiers, 13(3), 305–319. Google Scholar
Hu, P., Greenwood, C. M., & Beyene, J. (2006). Statistical methods for meta-analysis of microarray data: a comparative study. Information Systems Frontiers, 8(1), 9–20. Google Scholar
Hung, P. C. (2007). Special issue on enterprise distributed computing model and implementation. Information Systems Frontiers, 9(4), 325–326. Google Scholar
Hung, P. C., Chiu, D. K., Fung, W., Cheung, W. K., Wong, R., Choi, S. P., Kafeza, E., Kwok, J., Pun, J. C., & Cheng, V. S. (2007). End-to-end privacy control in service outsourcing of human intensive processes: a multi-layered Web service integration approach. Information Systems Frontiers, 9(1), 85–101. Google Scholar
Hung, P. C., Sparrow, D., & Li, Q. (2007). ISF special issue on enterprise services computing: evolution and challenges. Information Systems Frontiers, 9(2), 135–136. Google Scholar
Hwang, Y.-C., & Yuan, S.-T. (2009). Ubiquitous collaborative iTrust service: exploring proximity collective wisdom. Information Systems Frontiers, 11(1), 43–60. Google Scholar
Hwang, Y.-C., Yuan, S.-T., & Weng, J.-H. (2011). A study of the impacts of positive/negative feedback on collective wisdom—case study on social bookmarking sites. Information Systems Frontiers, 13(2), 265–279. Google Scholar
Ilk, N., Zhao, J. L., Goes, P., & Hofmann, P. (2011). Semantic enrichment process: an approach to software component reuse in modernizing enterprise systems. Information Systems Frontiers, 13(3), 359–370. Google Scholar
Ipe, M., Raghu, T., & Vinze, A. (2010). Information intermediaries for emergency preparedness and response: a case study from public health. Information Systems Frontiers, 12(1), 67–79. Google Scholar
Janssen, M., Lee, J., Bharosa, N., & Cresswell, A. (2010). Advances in multi-agency disaster management: Key elements in disaster research. Information Systems Frontiers, 12(1), 1–7. Google Scholar
Jennex, M. E., & Zyngier, S. (2007). Security as a contributor to knowledge management success. Information Systems Frontiers, 9(5), 493–504. Google Scholar
Johnson, P., Lagerström, R., Närman, P., & Simonsson, M. (2007). Enterprise architecture analysis with extended influence diagrams. Information Systems Frontiers, 9(2–3), 163–180. Google Scholar
Jonkers, H., Lankhorst, M. M., ter Doest, H. W., Arbab, F., Bosma, H., & Wieringa, R. J. (2006). Enterprise architecture: management tool and blueprint for the organisation. Information Systems Frontiers, 8(2), 63–66. Google Scholar
Jung, J. J. (2012). ContextGrid: a contextual mashup-based collaborative browsing system. Information Systems Frontiers, 14(4), 953–961. Google Scholar
Jung, J. J., Chang, Y.-S., Liu, Y., & Wu, C.-C. (2012). Advances in intelligent grid and cloud computing. Information Systems Frontiers, 14(4), 823–825. Google Scholar
Jurisica, I., & Glasgow, J. (2006). Introduction: knowledge discovery in high-throughput biological domains. Information Systems Frontiers, 8(1), 5–7. Google Scholar
Kabir, M. E., Wang, H., & Bertino, E. (2012). A role-involved purpose-based access control model. Information Systems Frontiers, 14(3), 809–822. Google Scholar
Kalra, N., Lauwers, T., Dewey, D., Stepleton, T., & Dias, M. B. (2009). Design of a braille writing tutor to combat illiteracy. Information Systems Frontiers, 11(2), 117–128. Google Scholar
Kamis, A., Stern, T., & Ladik, D. M. (2010). A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce. Information Systems Frontiers, 12(2), 157–168. Google Scholar
Kartas, A., & Goode, S. (2012). Use, perceived deterrence and the role of software piracy in video game console adoption. Information Systems Frontiers, 14(2), 261–277. Google Scholar
Kifle, M., Mbarika, V. W., & Datta, P. (2006). Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: the case of tele-cardiology in Ethiopia. Information Systems Frontiers, 8(3), 211–223. Google Scholar
Kim, D. J., & Hwang, Y. (2012). A study of mobile internet user’s service quality perceptions from a user’s utilitarian and hedonic value tendency perspectives. Information Systems Frontiers, 14(2), 409–421. Google Scholar
Kim, G., & Suh, Y. (2011). Semantic business process space for intelligent management of sales order business processes. Information Systems Frontiers, 13(4), 515–542. Google Scholar
Kim, H., Kim, J., & Lee, Y. (2005). An empirical study of use contexts in the mobile internet, focusing on the usability of information architecture. Information Systems Frontiers, 7(2), 175–186. Google Scholar
Kotlyar, M., & Jurisica, I. (2006). Predicting protein-protein interactions by association mining. Information Systems Frontiers, 8(1), 37–47. Google Scholar
Kutvonen, L., Metso, J., & Ruohomaa, S. (2007). From trading to eCommunity management: responding to social and contractual challenges. Information Systems Frontiers, 9(2–3), 181–194. Google Scholar
Lacity, M. C., Iyer, V. V., & Rudramuniyaiah, P. S. (2008). Turnover intentions of Indian IS professionals. Information Systems Frontiers, 10(2), 225–241. Google Scholar
LaComb, C. A., Barnett, J. A., & Pan, Q. (2007). The imagination market. Information Systems Frontiers, 9(2–3), 245–256. Google Scholar
Lai, K.-C., & Yu, Y.-F. (2012). A scalable multi-attribute hybrid overlay for range queries on the cloud. Information Systems Frontiers, 14(4), 895–908. Google Scholar
Laumer, S., Eckhardt, A., & Trunk, N. (2010). Do as your parents say?—analyzing IT adoption influencing factors for full and under age applicants. Information Systems Frontiers, 12(2), 169–183. Google Scholar
Lee, C.-F., Changchien, S. W., Wang, W.-T., & Shen, J.-J. (2006). A data mining approach to database compression. Information Systems Frontiers, 8(3), 147–161. Google Scholar
Lee, H. J., Ahn, H. J., Kim, J. W., & Park, S. J. (2006). Capturing and reusing knowledge in engineering change management: a case of automobile development. Information Systems Frontiers, 8(5), 375–394. Google Scholar
Lee, J.-N., Huynh, M. Q., & Hirschheim, R. (2008). An integrative model of trust on IT outsourcing: examining a bilateral perspective. Information Systems Frontiers, 10(2), 145–163. Google Scholar
Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: a study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375–393. Google Scholar
Lee, N., Bae, J. K., & Koo, C. (2012). A case-based reasoning based multi-agent cognitive map inference mechanism: an application to sales opportunity assessment. Information Systems Frontiers, 14(3), 653–668. Google Scholar
Li, C., & Li, L. (2012). Collaboration among mobile agents for efficient energy allocation in mobile grid. Information Systems Frontiers, 14(3), 711–723. Google Scholar
Li, J., Wang, G. A., & Chen, H. (2011). Identity matching using personal and social identity features. Information Systems Frontiers, 13(1), 101–113. Google Scholar
Li, L., Valerdi, R., & Warfield, J. N. (2008). Advances in enterprise information systems. Information Systems Frontiers, 10(5), 499–501. Google Scholar
Li, L., Xu, L., Jeng, H. A., Naik, D., Allen, T., & Frontini, M. (2008). Creation of environmental health information system for public health service: a pilot study. Information Systems Frontiers, 10(5), 531–542. Google Scholar
Li, M., Liu, L., Yin, L., & Zhu, Y. (2011). A process mining based approach to knowledge maintenance. Information Systems Frontiers, 13(3), 371–380. Google Scholar
Li, P., & Rao, H. R. (2007). An examination of private intermediaries’ roles in software vulnerabilities disclosure. Information Systems Frontiers, 9(5), 531–539. Google Scholar
Li, X., Liu, J., Sheng, Q. Z., Zeadally, S., & Zhong, W. (2011). TMS-RFID: temporal management of large-scale RFID applications. Information Systems Frontiers, 13(4), 481–500. Google Scholar
Li, Y.-M., Jhang-Li, J.-H., Hwang, T.-K., & Chen, P.-W. (2012). Analysis of pricing strategies for community-based group buying: the impact of competition and waiting cost. Information Systems Frontiers, 14(3), 633–645. Google Scholar
Li, Y., Lu, X., Chao, K.-M., Huang, Y., & Younas, M. (2006). The realization of service-oriented e-Marketplaces. Information Systems Frontiers, 8(4), 307–319. Google Scholar
Lian, S., Morin, J.-H., Gritzalis, S., & Heileman, G. L. (2012). Special issue on ubiquitous multimedia services. Information Systems Frontiers, 14(3), 477–479. Google Scholar
Lindström, Å., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on CIO concerns-do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90. Google Scholar
Liu, R., & Kumar, A. (2011). Leveraging information sharing to configure supply chains. Information Systems Frontiers, 13(1), 139–151. Google Scholar
López, T. S., Ranasinghe, D. C., Patkai, B., & McFarlane, D. (2011). Taxonomy, technology and applications of smart objects. Information Systems Frontiers, 13(2), 281–300. Google Scholar
Loukas, A., Damopoulos, D., Menesidou, S. A., Skarkala, M. E., Kambourakis, G., & Gritzalis, S. (2012). MILC: a secure and privacy-preserving mobile instant locator with chatting. Information Systems Frontiers, 14(3), 481–497. Google Scholar
Ly, L. T., Rinderle-Ma, S., Göser, K., & Dadam, P. (2012). On enabling integrated process compliance with semantic constraints in process management systems. Information Systems Frontiers, 14(2), 195–219. Google Scholar
Ma, J., & Orgun, M. A. (2008). Formalising theories of trust for authentication protocols. Information Systems Frontiers, 10(1), 19–32. Google Scholar
Madhusudan, T. (2007). A web services framework for distributed model management. Information Systems Frontiers, 9(1), 9–27. Google Scholar
Maldonado, E. A., Maitland, C. F., & Tapia, A. H. (2010). Collaborative systems development in disaster relief: the impact of multi-level governance. Information Systems Frontiers, 12(1), 9–27. Google Scholar
Marchesi, M., Succi, G., & Russo, B. (2007). A model of the dynamics of the market of COTS software, in the absence of new entrants. Information Systems Frontiers, 9(2–3), 257–265. Google Scholar
Martens, B., & Teuteberg, F. (2012). Decision-making in cloud computing environments: a cost and risk based approach. Information Systems Frontiers, 14(4), 871–893. Google Scholar
Massari, L. (2010). Analysis of MySpace user profiles. Information Systems Frontiers, 12(4), 361–367. Google Scholar
Masud, M. M., Khan, L., & Thuraisingham, B. (2008). A scalable multi-level feature extraction technique to detect malicious executables. Information Systems Frontiers, 10(1), 33–45. Google Scholar
Mazhelis, O., & Tyrväinen, P. (2012). Economic aspects of hybrid cloud infrastructure: user organization perspective. Information Systems Frontiers, 14(4), 845–869. Google Scholar
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Information Systems Frontiers.
Memon, N., & Daniels, T. (2007). Special issue on secure knowledge management. Information Systems Frontiers, 9(5), 449–450. Google Scholar
Meng, S., Chiu, D. K., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12(5), 563–578. Google Scholar
Mirchandani, D. A., Johnson, J. H., Jr., & Joshi, K. (2008). Perspectives of citizens towards e-government in Thailand and Indonesia: a multigroup analysis. Information Systems Frontiers, 10(4), 483–497. Google Scholar
Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505. Google Scholar
Møller, C., Chaudhry, S. S., & Jørgensen, B. (2008). Complex service design: a virtual enterprise architecture for logistics service. Information Systems Frontiers, 10(5), 503–518. Google Scholar
Mørch, A. I., Jondahl, S., & Dolonen, J. A. (2005). Supporting conceptual awareness with pedagogical agents. Information Systems Frontiers, 7(1), 39–53. Google Scholar
Morohoshi, H., Huang, R., & Ma, J. (2006). A user-friendly platform for developing and accessing grid services. Information Systems Frontiers, 8(4), 255–269. Google Scholar
Mouttham, A., Kuziemsky, C., Langayan, D., Peyton, L., & Pereira, J. (2012). Interoperable support for collaborative, mobile, and accessible health care. Information Systems Frontiers, 14(1), 73–85. Google Scholar
Mukherjee, S., Aarts, E., & Doyle, T. (2009). Special issue on ambient intelligence. Information Systems Frontiers, 11(1), 1–5. Google Scholar
Natchetoi, Y., Wu, H., Babin, G., & Dagtas, S. (2007). EXEM: efficient XML data exchange management for mobile applications. Information Systems Frontiers, 9(4), 439–448. Google Scholar
Nevo, S., Wade, M., & Cook, W. D. (2010). An empirical study of IT as a factor of production: the case of Net-enabled IT assets. Information Systems Frontiers, 12(3), 323–335. Google Scholar
Norta, A., & Eshuis, R. (2010). Specification and verification of harmonized business-process collaborations. Information Systems Frontiers, 12(4), 457–479. Google Scholar
Nowlan, M. F., & Blake, M. B. (2007). Agent-mediated knowledge sharing for intelligent services management. Information Systems Frontiers, 9(4), 411–421. Google Scholar
Nsakanda, A. L., Diaby, M., & Cao, Y. (2011). An aggregate inventory-based model for predicting redemption and liability in loyalty reward programs industry. Information Systems Frontiers, 13(5), 707–719. Google Scholar
O’Grady, M. J., O’Hare, G. M., Chen, J., & Phelan, D. (2009). Distributed network intelligence: a prerequisite for adaptive and personalised service delivery. Information Systems Frontiers, 11(1), 61–73. Google Scholar
Oaks, P., & ter Hofstede, A. (2007). Guided interaction: a mechanism to enable ad hoc service interaction. Information Systems Frontiers, 9(1), 29–51. Google Scholar
Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers, 13(1), 33–43. Google Scholar
Orman, L. V. (2006). Optimum design of electronic communities as economic entities. Information Systems Frontiers, 8(3), 179–194. Google Scholar
Osei-Bryson, K.-M., & Giles, K. (2006). Splitting methods for decision tree induction: an exploration of the relative performance of two entropy-based families. Information Systems Frontiers, 8(3), 195–209. Google Scholar
Osei-Bryson, K.-M., & Ngwenyama, O. (2008). Decision models for information systems management. Information Systems Frontiers, 10(3), 277–279. Google Scholar
Pal, J. (2009). If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India. Information Systems Frontiers, 11(2), 105–116. Google Scholar
Pal, J., Lakshmanan, M., & Toyama, K. (2009). “My child will be respected”: Parental perspectives on computers and education in Rural India. Information Systems Frontiers, 11(2), 129–144. Google Scholar
Palpanas, T., Chowdhary, P., Mihaila, G., & Pinel, F. (2007). Integrated model-driven dashboard development. Information Systems Frontiers, 9(2–3), 195–208. Google Scholar
Panaousis, E. A., Politis, C., Birkos, K., Papageorgiou, C., & Dagiuklas, T. (2012). Security model for emergency real-time communications in autonomous networks. Information Systems Frontiers, 14(3), 541–553. Google Scholar
Panchenko, O., Plattner, H., & Zeier, A. B. (2011). Efficient storage and fast querying of source code. Information Systems Frontiers, 13(3), 349–357. Google Scholar
Parthasarathy, B., & Ramamritham, K. (2009). Guest editorial: information and communications technology for development. Information Systems Frontiers, 11(2), 103–104. Google Scholar
Patil, V., & Shyamasundar, R. (2005). E-coupons: an efficient, secure and delegable micro-payment system. Information Systems Frontiers, 7(4–5), 371–389. Google Scholar
Patnayakuni, R., & Ruppel, C. P. (2010). A socio-technical approach to improving the systems development process. Information Systems Frontiers, 12(2), 219–234. Google Scholar
Peinl, R., & Maier, R. (2011). SimKnowledge—analyzing impact of knowledge management measures on team organizations with multi agent-based simulation. Information Systems Frontiers, 13(5), 621–636. Google Scholar
Pencheva, E., & Atanasov, I. (2012). Third party application control on quality of service in IP based multimedia networks. Information Systems Frontiers, 14(3), 555–569. Google Scholar
Peng, D., Wang, X., & Zhou, A. (2007). VsLattice: a vector-based conceptual index structure for web service retrieval. Information Systems Frontiers, 9(4), 423–437. Google Scholar
Piramuthu, S. (2012). Vulnerabilities of RFID protocols proposed in ISF. Information Systems Frontiers, 14(3), 647–651. Google Scholar
Plaza, M. (2008). Team performance and information system implementation. Information Systems Frontiers, 10(3), 347–359. Google Scholar
Poindexter, J., Earp, J. B., & Baumer, D. L. (2006). An experimental economics approach toward quantifying online privacy choices. Information Systems Frontiers, 8(5), 363–374. Google Scholar
Prentice, S., Taylor, P. J., Rayson, P., Hoskins, A., & O’Loughlin, B. (2011). Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. Information Systems Frontiers, 13(1), 61–73. Google Scholar
Qin, J., Zhou, Y., & Chen, H. (2011). A multi-region empirical study on the internet presence of global extremist organizations. Information Systems Frontiers, 13(1), 75–88. Google Scholar
Quartel, D. A., Steen, M. W., Pokraev, S., & Van Sinderen, M. J. (2007). COSMO: a conceptual framework for service modelling and refinement. Information Systems Frontiers, 9(2–3), 225–244. Google Scholar
Ramesh, R., & Rao, H. R. (2005). Foreword design science and information systems. Information Systems Frontiers, 7(3), 215–215. Google Scholar
Rao, L., & Osei-Bryson, K.-M. (2008). An approach for incorporating quality-based cost–benefit analysis in data warehouse design. Information Systems Frontiers, 10(3), 361–373. Google Scholar
Rau, D., & Haerem, T. (2010). Applying an organizational learning perspective to new technology deployment by technological gatekeepers: a theoretical model and key issues for future research. Information Systems Frontiers, 12(3), 287–297. Google Scholar
Rau, D., Haerem, T., Ray, G., & Zheng, W. (2010). Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage”. Information Systems Frontiers, 12(3), 235–237. Google Scholar
Ray, P., & Lewis, L. (2009). Managing cooperation in e-business systems. Information Systems Frontiers, 11(2), 181–188. Google Scholar
Ray, P., Shahrestani, S. A., & Daneshgar, F. (2005). The role of fuzzy awareness modelling in cooperative management. Information Systems Frontiers, 7(3), 299–316. Google Scholar
Retzer, S., Yoong, P., & Hooper, V. (2012). Inter-organisational knowledge transfer in social networks: a definition of intermediate ties. Information Systems Frontiers, 14(2), 343–361. Google Scholar
Rhee, S.-H., Bae, H., & Choi, Y. (2007). Enhancing the efficiency of supply chain processes through web services. Information Systems Frontiers, 9(1), 103–118. Google Scholar
Rhee, S.-H., Cho, N. W., & Bae, H. (2010). Increasing the efficiency of business processes using a theory of constraints. Information Systems Frontiers, 12(4), 443–455. Google Scholar
Roberts, N. C. (2011). Tracking and disrupting dark networks: challenges of data collection and analysis. Information Systems Frontiers, 13(1), 5–19. Google Scholar
Roman, R., Lopez, J., Dugeon, O., Lacoste, M., Plaza, P. Y., & Bel, M. (2012). Advanced secure multimedia services for digital homes. Information Systems Frontiers, 14(3), 527–540. Google Scholar
Romano, N. C., Jr., Sharda, R., & Lucca, J. (2005). Computer-supported collaborative learning requiring immersive presence (CSCLIP): an introduction. Information Systems Frontiers, 7(1), 5–12. Google Scholar
Rottman, J. W., & Lacity, M. C. (2008). A US Client’s learning from outsourcing IT work offshore. Information Systems Frontiers, 10(2), 259–275. Google Scholar
Sabat, H. K. (2005). The network investment economics of the mobile wireless industry. Information Systems Frontiers, 7(2), 187–206. Google Scholar
Sabat, H. K. (2008). Spectrum acquisition strategies adopted by wireless carriers in the USA. Information Systems Frontiers, 10(1), 77–102. Google Scholar
Sadeghi, P., Benyoucef, M., & Kuziemsky, C. E. (2012). A mashup based framework for multi level healthcare interoperability. Information Systems Frontiers, 14(1), 57–72. Google Scholar
Sadiq, S., Zur Muehlen, M., & Indulska, M. (2012). Governance, risk and compliance: applications in information systems. Information Systems Frontiers, 14(2), 123–124. Google Scholar
Samoilenko, S. (2008). Information systems fitness and risk in IS development: insights and implications from chaos and complex systems theories. Information Systems Frontiers, 10(3), 281–292. Google Scholar
Sasaki, H. (2011). A computing theory for collaborative and transparent decision making under time constraint. Information Systems Frontiers, 13(2), 207–220. Google Scholar
Schaupp, L. C., & Carter, L. (2010). The impact of trust, risk and optimism bias on e-file adoption. Information Systems Frontiers, 12(3), 299–309. Google Scholar
Scheepers, H., & Scheepers, R. (2008). A process-focused decision framework for analyzing the business value potential of IT investments. Information Systems Frontiers, 10(3), 321–330. Google Scholar
Schwieren, J., & Vossen, G. (2010). ID-Services: an RFID middleware architecture for mobile applications. Information Systems Frontiers, 12(5), 529–539. Google Scholar
Scott, S., & Perry, N. (2012). The enactment of risk categories: the role of information systems in organizing and re-organizing risk management practices in the energy industry. Information Systems Frontiers, 14(2), 125–141. Google Scholar
Sengupta, A., & Schiller, S. Z. (2010). FlexRFID: a design, development and deployment framework for RFID-based business applications. Information Systems Frontiers, 12(5), 551–562. Google Scholar
Shen, A. X., Cheung, C. M., Lee, M. K., & Chen, H. (2011). How social influence affects we-intention to use instant messaging: the moderating effect of usage experience. Information Systems Frontiers, 13(2), 157–169. Google Scholar
Shen, L., Callaghan, V., & Shen, R. (2008). Affective e-Learning in residential and pervasive computing environments. Information Systems Frontiers, 10(4), 461–472. Google Scholar
Sheng, Q. Z., Zeadally, S., Luo, Z., Chung, J.-Y., & Maamar, Z. (2010). Guest editorial: advances in RFID technology. Information Systems Frontiers, 12(5), 481–483. Google Scholar
Sheng, Q. Z., Zeadally, S., Luo, Z., Chung, J.-Y., & Maamar, Z. (2010). Ubiquitous RFID: Where are we? Information Systems Frontiers, 12(5), 485–490. Google Scholar
Shin, Y. M., Lee, S. C., Shin, B., & Lee, H. G. (2010). Examining influencing factors of post-adoption usage of mobile internet: focus on the user perception of supplier-side attributes. Information Systems Frontiers, 12(5), 595–606. Google Scholar
Singh, R. I., Sumeeth, M., & Miller, J. (2011). A user-centric evaluation of the readability of privacy policies in popular web sites. Information Systems Frontiers, 13(4), 501–514. Google Scholar
Sipior, J. C., & Ward, B. T. (2008). Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: an empirical evaluation. Information Systems Frontiers, 10(1), 3–18. Google Scholar
Skillicorn, D. B. (2011). Computational approaches to suspicion in adversarial settings. Information Systems Frontiers, 13(1), 21–31. Google Scholar
Song, J., & Kim, Y. J. (2006). Social influence process in the acceptance of a virtual community service. Information Systems Frontiers, 8(3), 241–252. Google Scholar
Soper, D. S., Demirkan, H., & Goul, M. (2007). An interorganizational knowledge-sharing security model with breach propagation detection. Information Systems Frontiers, 9(5), 469–479. Google Scholar
Stefanovic, M., Matijević, M., Erić, M., & Simic, V. (2009). Method of design and specification of web services based on quality system documentation. Information Systems Frontiers, 11(1), 75–86. Google Scholar
Sterling, S. R., O’Brien, J., & Bennett, J. K. (2009). Advancement through interactive radio. Information Systems Frontiers, 11(2), 145–154. Google Scholar
Stoodley, I., Bruce, C., & Edwards, S. (2010). Expanding ethical vistas of IT professionals. Information Systems Frontiers, 12(4), 379–387. Google Scholar
Straub, D., Weill, P., & Schwaig, K. S. (2008). Strategic dependence on the IT resource and outsourcing: a test of the strategic control model. Information Systems Frontiers, 10(2), 195–210. Google Scholar
Strecker, S., Heise, D., & Frank, U. (2011). RiskM: A multi-perspective modeling method for IT risk assessment. Information Systems Frontiers, 13(4), 595–611. Google Scholar
Stula, M., Krstinic, D., & Seric, L. (2012). Intelligent forest fire monitoring system. Information Systems Frontiers, 14(3), 725–739. Google Scholar
Stylianides, N. V., Stephanopoulos, G. V., Tselikis, G. S., & Dopher, M. (2005). Signaling performance trials and evaluation results on a GPRS platform. Information Systems Frontiers, 7(2), 129–140. Google Scholar
Sun, L., Ousmanou, K., & Cross, M. (2010). An ontological modelling of user requirements for personalised information provision. Information Systems Frontiers, 12(3), 337–356. Google Scholar
Sun, Y., Huang, J. Z., & Meng, X. (2011). Integrating constraints to support legally flexible business processes. Information Systems Frontiers, 13(2), 171–189. Google Scholar
Sveen, F. O., Rich, E., & Jager, M. (2007). Overcoming organizational challenges to secure knowledge management. Information Systems Frontiers, 9(5), 481–492. Google Scholar
Swar, B., Moon, J., Oh, J., & Rhee, C. (2012). Determinants of relationship quality for IS/IT outsourcing success in public sector. Information Systems Frontiers, 14(2), 457–475. Google Scholar
Tan, W., Jiang, C., Li, L., & Lv, Z. (2008). Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies. Information Systems Frontiers, 10(5), 519–529. Google Scholar
Tanergüçlü, T., Maraş, H., Gencer, C., & Aygüneş, H. (2012). A decision support system for locating weapon and radar positions in stationary point air defence. Information Systems Frontiers, 14(2), 423–444. Google Scholar
Templeton, G. F., & Dowdy, J. F., Jr. (2012). CASE-mediated organizational and deutero learning at NASA. Information Systems Frontiers, 14(3), 741–764. Google Scholar
Templeton, G. F., Schmidt, M. B., & Taylor, G. S. (2009). Managing the diffusion of organizational learning behavior. Information Systems Frontiers, 11(2), 189–200. Google Scholar
Teoh, S. Y., Pan, S. L., & Ramchand, A. M. (2012). Resource management activities in healthcare information systems: a process perspective. Information Systems Frontiers, 14(3), 585–600. Google Scholar
Tian, J., Wang, K., Chen, Y., & Johansson, B. (2010). From IT deployment capabilities to competitive advantage: an exploratory study in China. Information Systems Frontiers, 12(3), 239–255. Google Scholar
Turetken, O. (2008). Is your back-up IT infrastructure in a safe location? Information Systems Frontiers, 10(3), 375–383. Google Scholar
Turetken, O., & Sharda, R. (2005). Clustering-based visual interfaces for presentation of web search results: an empirical investigation. Information Systems Frontiers, 7(3), 273–297. Google Scholar
Turner, J. W., & Reinsch, N. L., Jr. (2010). Successful and unsuccessful multicommunication episodes: engaging in dialogue or juggling messages? Information Systems Frontiers, 12(3), 277–285. Google Scholar
Umapathy, K., & Purao, S. (2007). A theoretical investigation of the emerging standards for web services. Information Systems Frontiers, 9(1), 119–134. Google Scholar
Umar, A. (2005). IT infrastructure to enable next generation enterprises. Information Systems Frontiers, 7(3), 217–256. Google Scholar
Umberger, M., Lumbar, S., & Humar, I. (2012). Modeling the influence of network delay on the user experience in distributed home-automation networks. Information Systems Frontiers, 14(3), 571–584. Google Scholar
Umer, S., Afzal, M., Hussain, M., Latif, K., & Ahmad, H. F. (2012). Autonomous mapping of HL7 RIM and relational database schema. Information Systems Frontiers, 14(1), 5–18. Google Scholar
Venkatesh, A. (2008). Digital home technologies and transformation of households. Information Systems Frontiers, 10(4), 391–395. Google Scholar
Venkatsubramanyan, S., & Hill, T. R. (2010). An empirical investigation into the effects of web search characteristics on decisions associated with impression formation. Information Systems Frontiers, 12(5), 579–593. Google Scholar
Versteeg, G., & Bouwman, H. (2006). Business architecture: a new paradigm to relate business strategy to ICT. Information Systems Frontiers, 8(2), 91–102. Google Scholar
Voisard, A., & Ziekow, H. (2012). Modeling trade-offs in the design of sensor-based event processing infrastructures. Information Systems Frontiers, 14(2), 317–330. Google Scholar
Wamba, S. F., & Chatfield, A. T. (2011). The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry. Information Systems Frontiers, 13(5), 693–706. Google Scholar
Wang, C., & Xu, L. (2008). Parameter mapping and data transformation for engineering application integration. Information Systems Frontiers, 10(5), 589–600. Google Scholar
Wang, L., Xu, L., Liu, R., & Wang, H. H. (2010). An approach for moving object recognition based on BPR and CI. Information Systems Frontiers, 12(2), 141–148. Google Scholar
Wang, M. (2011). Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning. Information Systems Frontiers, 13(2), 191–205. Google Scholar
Wang, S., Zheng, S., Xu, L., Li, D., & Meng, H. (2008). A literature review of electronic marketplace research: themes, theories and an integrative framework. Information Systems Frontiers, 10(5), 555–571. Google Scholar
Warren, M., & Leitch, S. (2010). Hacker Taggers: a new type of hackers. Information Systems Frontiers, 12(4), 425–431. Google Scholar
Watanabe, K., Enokido, T., & Takizawa, M. (2006). Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks. Information Systems Frontiers, 8(4), 271–284. Google Scholar
Weber-Jahnke, J., Peyton, L., & Topaloglou, T. (2012). eHealth system interoperability. Information Systems Frontiers, 14(1), 1–3. Google Scholar
Weber-Jahnke, J. H., & Obry, C. (2012). Protecting privacy during peer-to-peer exchange of medical documents. Information Systems Frontiers, 14(1), 87–104. Google Scholar
Winkler, J. K., Dibbern, J., & Heinzl, A. (2008). The impact of cultural differences in offshore outsourcing—case study results from German–Indian application development projects. Information Systems Frontiers, 10(2), 243–258. Google Scholar
Woo, J., Ivezic, N., & Cho, H. (2012). Agile test framework for business-to-business interoperability. Information Systems Frontiers, 14(3), 789–808. Google Scholar
Wu, J., Chen, J., & Ren, Y. (2011). GIS enabled service site selection: environmental analysis and beyond. Information Systems Frontiers, 13(3), 337–348. Google Scholar
Wu, K.-L., Chen, S.-K., & Philip, S. Y. (2005). Efficient processing of continual range queries for location-aware mobile services. Information Systems Frontiers, 7(4–5), 435–448. Google Scholar
Wüllenweber, K., Beimborn, D., Weitzel, T., & König, W. (2008). The impact of process standardization on business process outsourcing success. Information Systems Frontiers, 10(2), 211–224. Google Scholar
Xiao, L., & Zheng, L. (2012). Business process design: process comparison and integration. Information Systems Frontiers, 14(2), 363–374. Google Scholar
Xu, L., Tan, W., Zhen, H., & Shen, W. (2008). An approach to enterprise process dynamic modeling supporting enterprise process evolution. Information Systems Frontiers, 10(5), 611–624. Google Scholar
Xu, S. (2008). The concept and theory of material flow. Information Systems Frontiers, 10(5), 601–609. Google Scholar
Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and Computer-Integrated Manufacturing, 28(1), 75–86. Google Scholar
Xu, X., Ma, W. W. K., & See-To, E. W. K. (2010). Will mobile video become the killer application for 3G mobile Internet? A model of media convergence acceptance. Information Systems Frontiers, 12(3), 311–322. Google Scholar
Yang, H., Li, W., Liu, K., & Zhang, J. (2012). Knowledge-based clinical pathway for medical quality improvement. Information Systems Frontiers, 14(1), 105–117. Google Scholar
Ye, N., Farley, T., & Lakshminarasimhan, D. (2006). An attack-norm separation approach for detecting cyber attacks. Information Systems Frontiers, 8(3), 163–177. Google Scholar
Yu, X., Zhang, Y., Zhang, T., Wang, L., Hu, J., Zhao, J., & Li, X. (2007). A model-driven development framework for enterprise Web services. Information Systems Frontiers, 9(4), 391–409. Google Scholar
Yuan, R., Li, Z., Guan, X., & Xu, L. (2010). An SVM-based machine learning method for accurate internet traffic classification. Information Systems Frontiers, 12(2), 149–156. Google Scholar
Yuan, S.-T., & Liu, J. (2005). Guest editors: special issue in advances in e-technology and e-services. Information Systems Frontiers, 7(4), 335–336. Google Scholar
Zang, C., Fan, Y., & Liu, R. (2008). Architecture, implementation and application of complex event processing in enterprise information systems based on RFID. Information Systems Frontiers, 10(5), 543–553. Google Scholar
Zeng, D., Wei, D., Chau, M., & Wang, F. (2011). Domain-specific Chinese word segmentation using suffix tree and mutual information. Information Systems Frontiers, 13(1), 115–125. Google Scholar
Zhang, J., Akula, K., Karim, M., & Ariga, R. K. R. (2011). A university-oriented Web 2.0 services portal. Information Systems Frontiers, 13(2), 251–264. Google Scholar
Zhang, N., Guo, X., & Chen, G. (2011). Why adoption and use behavior of IT/IS cannot last?—two studies in China. Information Systems Frontiers, 13(3), 381–395. Google Scholar
Zhang, X., & Maruping, L. M. (2008). Household technology adoption in a global marketplace: incorporating the role of espoused cultural values. Information Systems Frontiers, 10(4), 403–413. Google Scholar
Zhao, J. L., Tanniru, M., & Zhang, L.-J. (2007). Services computing as the foundation of enterprise agility: overview of recent advances and introduction to the special issue. Information Systems Frontiers, 9(1), 1–8. Google Scholar
Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers, 12(5), 521–528. Google Scholar
Ziekow, H., & Günther, O. (2010). Sharing RFID and complex event data among organizations. Information Systems Frontiers, 12(5), 541–549. Google Scholar
Zunino, A., Campo, M., & Mateos, C. (2005). Reactive mobility by failure: When fail means move. Information Systems Frontiers, 7(2), 141–154. Google Scholar
Zuo, Y. (2010). Secure and private search protocols for RFID systems. Information Systems Frontiers, 12(5), 507–519. Google Scholar
Zuo, Y., & O’Keefe, T. (2007). Post-release information privacy protection: a framework and next-generation privacy-enhanced operating system. Information Systems Frontiers, 9(5), 451–467. Google Scholar