Economics at your fingertips  

Information Systems Frontiers

1999 - 2023

Current editor(s): Ram Ramesh and Raghav Rao

From Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

2011, volume 13, articles 5

Knowledge work and communication challenges in networked enterprises pp. 615-619 Downloads
Joseph Barjis, Ashish Gupta and Ramesh Sharda
SimKnowledge—Analyzing impact of knowledge management measures on team organizations with multi agent-based simulation pp. 621-636 Downloads
René Peinl and Ronald Maier
You’ve got email! Does it really matter to process emails now or later? pp. 637-653 Downloads
Ashish Gupta, Ramesh Sharda and Robert A. Greve
Decision-enabled dynamic process management for networked enterprises pp. 655-668 Downloads
Amit V. Deokar and Omar F. El-Gayar
Modeling the dynamic interactions of agents in the provision of network infrastructure pp. 669-680 Downloads
Kurt DeMaagd and Johannes M. Bauer
Strategic choices of inter-organizational information systems: A network perspective pp. 681-692 Downloads
Daning Hu, Sherry X. Sun, J. Leon Zhao and Xinlei Zhao
The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry pp. 693-706 Downloads
Samuel Fosso Wamba and Akemi Takeoka Chatfield
An aggregate inventory-based model for predicting redemption and liability in loyalty reward programs industry pp. 707-719 Downloads
Aaron Luntala Nsakanda, Moustapha Diaby and Yuheng Cao

2011, volume 13, articles 4

Editorial pp. 451-452 Downloads
R. Ramesh and H. Raghav Rao
Impacts of navigation structure, task complexity, and users’ domain knowledge on Web site usability—an empirical study pp. 453-469 Downloads
Xiang Fang and Clyde W. Holsapple
Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems pp. 471-480 Downloads
Ching-Hsien Hsu, Han-Chieh Chao and Jong Hyuk Park
TMS-RFID: Temporal management of large-scale RFID applications pp. 481-500 Downloads
Xue Li, Jing Liu, Quan Z. Sheng, Sherali Zeadally and Weicai Zhong
A user-centric evaluation of the readability of privacy policies in popular web sites pp. 501-514 Downloads
Ravi Inder Singh, Manasa Sumeeth and James Miller
Semantic business process space for intelligent management of sales order business processes pp. 515-542 Downloads
Gunwoo Kim and Yongmoo Suh
A business maturity model of software product line engineering pp. 543-560 Downloads
Faheem Ahmed and Luiz Fernando Capretz
Determinants of self-report and system-captured measures of mobile Internet use intensity pp. 561-578 Downloads
Torsten J. Gerpott
Information systems resources and information security pp. 579-593 Downloads
Kuo-chung Chang and Chih-ping Wang
RiskM: A multi-perspective modeling method for IT risk assessment pp. 595-611 Downloads
Stefan Strecker, David Heise and Ulrich Frank
Erratum to: Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes pp. 613-613 Downloads
Young Mee Shin, Seung Chang Lee, Bongsik Shin and Ho Geun Lee

2011, volume 13, articles 3

Global IT and IT-enabled services pp. 301-304 Downloads
Michael Chau, George L. Ball, Jinghua Huang, Jian Chen and J. Leon Zhao
Derivation of trust federation for collaborative business processes pp. 305-319 Downloads
Ji Hu
A mixed transaction processing and operational reporting benchmark pp. 321-335 Downloads
Anja Bog, Hasso Plattner and Alexander Zeier
GIS enabled service site selection: Environmental analysis and beyond pp. 337-348 Downloads
JunJie Wu, Jian Chen and Yili Ren
Efficient storage and fast querying of source code pp. 349-357 Downloads
Oleksandr Panchenko, Hasso Plattner and Alexander B. Zeier
Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems pp. 359-370 Downloads
Noyan Ilk, J. Leon Zhao, Paulo Goes and Paul Hofmann
A process mining based approach to knowledge maintenance pp. 371-380 Downloads
Ming Li, Lu Liu, Lu Yin and Yanqiu Zhu
Why adoption and use behavior of IT/IS cannot last?—two studies in China pp. 381-395 Downloads
Nan Zhang, Xunhua Guo and Guoqing Chen
Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm pp. 397-405 Downloads
Amar Gupta, Igor Crk and Rajdeep Bondade
Combining query-by-example and query expansion for simplifying web service discovery pp. 407-428 Downloads
Marco Crasso, Alejandro Zunino and Marcelo Campo
An ERP system performance assessment model development based on the balanced scorecard approach pp. 429-450 Downloads
She-I Chang, David C. Yen, Celeste See-Pui Ng, I-Cheng Chang and Sheng-Yu Yu

2011, volume 13, articles 2

ISF special issue on emerging social and legal aspects of information systems with Web 2.0 pp. 153-155 Downloads
Dickson K. W. Chiu, Eleanna Kafeza and Patrick C. K. Hung
How social influence affects we-intention to use instant messaging: The moderating effect of usage experience pp. 157-169 Downloads
Aaron X. L. Shen, Christy M. K. Cheung, Matthew K. O. Lee and Huaping Chen
Integrating constraints to support legally flexible business processes pp. 171-189 Downloads
Yuqing Sun, Joshua Zhexue Huang and Xiangxu Meng
Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning pp. 191-205 Downloads
Minhong Wang
A computing theory for collaborative and transparent decision making under time constraint pp. 207-220 Downloads
Hideyasu Sasaki
Trust perceptions of online travel information by different content creators: Some social and legal implications pp. 221-235 Downloads
Stephen Burgess, Carmine Sellitto, Carmen Cox and Jeremy Buultjens
Towards promoting interactivity in a B2B web community pp. 237-249 Downloads
Chima Adiele
A university-oriented Web 2.0 services portal pp. 251-264 Downloads
Jia Zhang, Karthik Akula, Momtazul Karim and Raghu Kumar Reddy Ariga
A study of the impacts of positive/negative feedback on collective wisdom—case study on social bookmarking sites pp. 265-279 Downloads
Yuan-Chu Hwang, Soe-Tsyr Yuan and Jung-Hui Weng
Taxonomy, technology and applications of smart objects pp. 281-300 Downloads
Tomás Sánchez López, Damith Chinthana Ranasinghe, Bela Patkai and Duncan McFarlane

2011, volume 13, articles 1

Introduction to special issue on terrorism informatics pp. 1-3 Downloads
Hsinchun Chen, Yilu Zhou, Edna F. Reid and Catherine A. Larson
Tracking and disrupting dark networks: Challenges of data collection and analysis pp. 5-19 Downloads
Nancy C. Roberts
Computational approaches to suspicion in adversarial settings pp. 21-31 Downloads
David B. Skillicorn
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter pp. 33-43 Downloads
Onook Oh, Manish Agrawal and H. Raghav Rao
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter pp. 45-59 Downloads
Marc Cheong and Vincent C. S. Lee
Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict pp. 61-73 Downloads
Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins and Ben O’Loughlin
A multi-region empirical study on the internet presence of global extremist organizations pp. 75-88 Downloads
Jialun Qin, Yilu Zhou and Hsinchun Chen
“Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams pp. 89-100 Downloads
Stephen C. Hayne, Lucy J. Troup and Sara A. McComb
Identity matching using personal and social identity features pp. 101-113 Downloads
Jiexun Li, G. Alan Wang and Hsinchun Chen
Domain-specific Chinese word segmentation using suffix tree and mutual information pp. 115-125 Downloads
Daniel Zeng, Donghua Wei, Michael Chau and Feiyue Wang
Tag-only aging-counter localization for the R-LIM2 system pp. 127-137 Downloads
Jung-Wook Choi and Dong-Ik Oh
Leveraging information sharing to configure supply chains pp. 139-151 Downloads
Rong Liu and Akhil Kumar
Page updated 2023-02-04