EconPapers    
Economics at your fingertips  
 

Information Systems Frontiers

1999 - 2025

Current editor(s): Ram Ramesh and Raghav Rao

From Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


2010, volume 12, articles 5

Guest editorial: Advances in RFID technology pp. 481-483 Downloads
Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung and Zakaria Maamar
Ubiquitous RFID: Where are we? pp. 485-490 Downloads
Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung and Zakaria Maamar
Classifying RFID attacks and defenses pp. 491-505 Downloads
Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum
Secure and private search protocols for RFID systems pp. 507-519 Downloads
Yanjun Zuo
A lightweight anti-desynchronization RFID authentication protocol pp. 521-528 Downloads
Shijie Zhou, Zhen Zhang, Zongwei Luo and Edward C. Wong
ID-Services: an RFID middleware architecture for mobile applications pp. 529-539 Downloads
Joachim Schwieren and Gottfried Vossen
Sharing RFID and complex event data among organizations pp. 541-549 Downloads
Holger Ziekow and Oliver Günther
FlexRFID: A design, development and deployment framework for RFID-based business applications pp. 551-562 Downloads
Arijit Sengupta and Shu Z. Schiller
Automated management of assets based on RFID triggered alarm messages pp. 563-578 Downloads
Shengguang Meng, Dickson K. W. Chiu, Eleanna Kafeza, Liu Wenyin and Qing Li
An empirical investigation into the effects of web search characteristics on decisions associated with impression formation pp. 579-593 Downloads
Shailaja Venkatsubramanyan and Timothy R. Hill
Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes pp. 595-606 Downloads
Young Mee Shin, Seung Chang Lee, Bongsik Shin and Ho Geun Lee
Personalisation in web computing and informatics: Theories, techniques, applications, and future research pp. 607-629 Downloads
Min Gao, Kecheng Liu and Zhongfu Wu
Combining transaction cost and resource-based insights to explain IT implementation outsourcing pp. 631-645 Downloads
Emilio Alvarez-Suescun

2010, volume 12, articles 4

Ethics and information systems — Guest editors’ introduction pp. 357-359 Downloads
Maria Carla Calzarossa, Ivo Lotto and Simon Rogerson
Analysis of MySpace user profiles pp. 361-367 Downloads
Luisa Massari
The ethics of video games: Mayhem, death, and the training of the next generation pp. 369-377 Downloads
Don Gotterbarn
Expanding ethical vistas of IT professionals pp. 379-387 Downloads
Ian Stoodley, Christine Bruce and Sylvia Edwards
Users’ involvement may help respect social and ethical values and improve software quality pp. 389-397 Downloads
Barbara Begier
Knowledge versus content in e-learning: A philosophical discussion pp. 399-413 Downloads
Gonçalo Jorge Morais Costa and Nuno Sotero Alves Silva
Agents of responsibility—freelance web developers in web applications development pp. 415-424 Downloads
Malik Aleem Ahmed and Jeroen Hoven
Hacker Taggers: A new type of hackers pp. 425-431 Downloads
Matthew Warren and Shona Leitch
Ethical implications of internet monitoring: A comparative study pp. 433-441 Downloads
Frances S. Grodzinsky, Andra Gumbus and Stephen Lilley
Increasing the efficiency of business processes using a theory of constraints pp. 443-455 Downloads
Seung-Hyun Rhee, Nam Wook Cho and Hyerim Bae
Specification and verification of harmonized business-process collaborations pp. 457-479 Downloads
Alex Norta and Rik Eshuis

2010, volume 12, articles 3

Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage” pp. 235-237 Downloads
Devaki Rau, Thorvald Haerem, Gautam Ray and Wei Zheng
From IT deployment capabilities to competitive advantage: An exploratory study in China pp. 239-255 Downloads
Jun Tian, Kanliang Wang, Yan Chen and Björn Johansson
ICT infrastructure for innovation: A case study of the enterprise service bus approach pp. 257-265 Downloads
Bendik Bygstad and Hans-Petter Aanby
Knowledge management technology for organized crime risk assessment pp. 267-275 Downloads
Petter Gottschalk
Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages? pp. 277-285 Downloads
Jeanine Warisse Turner and N. Lamar Reinsch
Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research pp. 287-297 Downloads
Devaki Rau and Thorvald Haerem
The impact of trust, risk and optimism bias on E-file adoption pp. 299-309 Downloads
Ludwig Christian Schaupp and Lemuria Carter
Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance pp. 311-322 Downloads
Xin Xu, Will Wai Kit Ma and Eric Wing Kuen See-To
An empirical study of IT as a factor of production: The case of Net-enabled IT assets pp. 323-335 Downloads
Saggi Nevo, Michael Wade and Wade D. Cook
An ontological modelling of user requirements for personalised information provision pp. 337-356 Downloads
Lily Sun, Khadidjatou Ousmanou and Matthew Cross

2010, volume 12, articles 2

Object-oriented re-engineering of manufacturing models: A case study pp. 97-114 Downloads
Vincenza Carchiolo, Sebastiano D’Ambra, Alessandro Longheu and Michele Malgeri
UML-CI: A reference model for profiling critical infrastructure systems pp. 115-139 Downloads
Ebrahim Bagheri and Ali A. Ghorbani
An approach for moving object recognition based on BPR and CI pp. 141-148 Downloads
Li Wang, Lida Xu, Renjing Liu and Hai Hong Wang
An SVM-based machine learning method for accurate internet traffic classification pp. 149-156 Downloads
Ruixi Yuan, Zhu Li, Xiaohong Guan and Li Xu
A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce pp. 157-168 Downloads
Arnold Kamis, Tziporah Stern and Daniel M. Ladik
Do as your parents say?—Analyzing IT adoption influencing factors for full and under age applicants pp. 169-183 Downloads
Sven Laumer, Andreas Eckhardt and Natascha Trunk
Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement pp. 185-205 Downloads
Jahyun Goo
Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider pp. 207-217 Downloads
Yogesh K. Dwivedi, Anastasia Papazafeiropoulou, Willem-Paul Brinkman and Banita Lal
A socio-technical approach to improving the systems development process pp. 219-234 Downloads
Ravi Patnayakuni and Cynthia P. Ruppel

2010, volume 12, articles 1

Advances in multi-agency disaster management: Key elements in disaster research pp. 1-7 Downloads
Marijn Janssen, JinKyu Lee, Nitesh Bharosa and Anthony Cresswell
Collaborative systems development in disaster relief: The impact of multi-level governance pp. 9-27 Downloads
Edgar A. Maldonado, Carleen F. Maitland and Andrea H. Tapia
Alert based disaster notification and resource allocation pp. 29-47 Downloads
Dickson K. W. Chiu, Drake T. T. Lin, Eleanna Kafeza, Minhong Wang, Haiyang Hu, Hua Hu and Yi Zhuang
Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises pp. 49-65 Downloads
Nitesh Bharosa, JinKyu Lee and Marijn Janssen
Information intermediaries for emergency preparedness and response: A case study from public health pp. 67-79 Downloads
Minu Ipe, T. S. Raghu and Ajay Vinze
Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system pp. 81-95 Downloads
Jane Fedorowicz and Janis L. Gogan

2009, volume 11, articles 5

Intelligent systems and smart homes pp. 481-482 Downloads
Jong Hyuk Park, Ching-Hsien Hsu and Hamid R. Arabnia
Service integration with UPnP agent for an ubiquitous home environment pp. 483-490 Downloads
Wally Chen, Sy-Yen Kuo and Han-Chieh Chao
A novel memory management scheme for residential gateways pp. 491-500 Downloads
Ibrahim Kamel and Beizhong Chen
Location-aware communications in smart environments pp. 501-512 Downloads
Ichiro Satoh
T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks pp. 513-521 Downloads
Jiman Hong, Joongjin Kook, Sangjun Lee, Dongseop Kwon and Sangho Yi
A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA pp. 523-528 Downloads
Hak-Man Kim, Jong-Joo Lee, Myong-Chul Shin and Seok-Soo Kim
A ubiquitous smart home for elderly pp. 529-536 Downloads
M. W. Raad and L. T. Yang
Monitoring user activities in smart home environments pp. 537-537 Downloads
Sajid Hussain, Senol Zafer Erdogan and Jong Hyuk Park
Monitoring user activities in smart home environments pp. 539-549 Downloads
Sajid Hussain, Senol Zafer Erdogen and Jong Hyuk Park
Learning fuzzy concept hierarchy and measurement with node labeling pp. 551-559 Downloads
Been-Chian Chien, Chih-Hung Hu and Ming-Yi Ju
A study on applying context-aware technology on hypothetical shopping advertisement pp. 561-567 Downloads
Jae-gu Song and Seoksoo Kim
VO breeding environments & virtual organizations integral business process management framework pp. 569-597 Downloads
David Romero and Arturo Molina
A ‘smart house’ is not a home: The domestication of ICTs pp. 599-608 Downloads
Helen J. Richardson

2009, volume 11, articles 4

Editorial for the special issue of knowledge discovery and management in biomedical information systems pp. 345-347 Downloads
Ying Liu, Lawrence Wing-Chi Chan, Chi-Ren Shyu and Ying Liu
An automated bacterial colony counting and classification system pp. 349-368 Downloads
Wei-Bang Chen and Chengcui Zhang
Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model pp. 369-379 Downloads
Alex K. S. Wong, Lawrence W. C. Chan and Ying Liu
Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration pp. 381-389 Downloads
Fuk-hay Tang and H. S. Horace Ip
Interactive survival analysis with the OCDM system: From development to application pp. 391-403 Downloads
Sebastian Klenk, Jürgen Dippon, Peter Fritz and Gunther Heidemann
Design of an RFID-based Healthcare Management System using an Information System Design Theory pp. 405-417 Downloads
E. W. T. Ngai, J. K. L. Poon, F. F. C. Suk and C. C. Ng
Coronary artery disease prediction method using linear and nonlinear feature of heart rate variability in three recumbent postures pp. 419-431 Downloads
Heon Gyu Lee, Wuon-Shik Kim, Ki Yong Noh, Jin-Ho Shin, Unil Yun and Keun Ho Ryu
Efficient mining of multilevel gene association rules from microarray and gene ontology pp. 433-447 Downloads
Vincent S. Tseng, Hsieh-Hui Yu and Shih-Chiang Yang
Comparing data mining methods with logistic regression in childhood obesity prediction pp. 449-460 Downloads
Shaoyan Zhang, Christos Tjortjis, Xiaojun Zeng, Hong Qiao, Iain Buchan and John Keane
Proportional fault-tolerant data mining with applications to bioinformatics pp. 461-469 Downloads
Guanling Lee, Sheng-Lung Peng and Yuh-Tzu Lin
Knowledge management in biomedical libraries: A semantic web approach pp. 471-480 Downloads
Damaris Fuentes-Lorenzo, Jorge Morato and Juan Miguel Gómez

2009, volume 11, articles 3

Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue pp. 201-209 Downloads
Chengfei Liu, Qing Li and Xiaohui Zhao
Evie - A developer toolkit for encoding service interaction patterns pp. 211-225 Downloads
Anthony M. J. O’Hagan, Shazia Sadiq and Wasim Sadiq
Quality analysis of composed services through fault injection pp. 227-239 Downloads
Maria Grazia Fugini, Barbara Pernici and Filippo Ramoni
Towards ubiquitous tourist service coordination and process integration: A collaborative travel agent system architecture with semantic web services pp. 241-256 Downloads
Dickson K. W. Chiu, Yves T. F. Yueh, Ho-fung Leung and Patrick C. K. Hung
CoBTx-Net: A model for business collaboration reliability verification pp. 257-272 Downloads
Haiyang Sun, Jian Yang and Lai Xu
Evaluation of inter-organizational business process solutions: A conceptual model-based approach pp. 273-291 Downloads
Johny Ghattas and Pnina Soffer
Delegating revocations and authorizations in collaborative business environments pp. 293-305 Downloads
Hua Wang, Jinli Cao and Yanchun Zhang
Analysis of a collaborative workflow process with distributed actors pp. 307-322 Downloads
Hajo A. Reijers, Minseok Song and Byungduk Jeong
Investigating mobile wireless technology adoption: An extension of the technology acceptance model pp. 323-333 Downloads
Sanghyun Kim and Gary Garrison
A secure e-auction scheme based on group signatures pp. 335-343 Downloads
Cheng-Chi Lee, Pi-Fang Ho and Min-Shiang Hwang

2009, volume 11, articles 2

Guest editorial: Information and communications technology for development pp. 103-104 Downloads
Balaji Parthasarathy and Krithi Ramamritham
If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India pp. 105-116 Downloads
Joyojeet Pal
Design of a braille writing tutor to combat illiteracy pp. 117-128 Downloads
N. Kalra, T. Lauwers, D. Dewey, T. Stepleton and M. B. Dias
“My child will be respected”: Parental perspectives on computers and education in Rural India pp. 129-144 Downloads
Joyojeet Pal, Meera Lakshmanan and Kentaro Toyama
Advancement through interactive radio pp. 145-154 Downloads
S. Revi Sterling, John O’Brien and John K. Bennett
ICT intervention in the ‘Chandanbari’ Village of Bangladesh: Results from a field study pp. 155-166 Downloads
Mahfuz Ashraf, Jo Hanisch and Paul Swatman
Effect of the food traceability system for building trust: Price premium and buying behavior pp. 167-179 Downloads
Young Chan Choe, Joowon Park, Miri Chung and Junghoon Moon
Managing cooperation in e-business systems pp. 181-188 Downloads
Pradeep Ray and Lundy Lewis
Managing the diffusion of organizational learning behavior pp. 189-200 Downloads
Gary F. Templeton, Mark B. Schmidt and G. Stephen Taylor

2009, volume 11, articles 1

Special issue on Ambient Intelligence pp. 1-5 Downloads
Satyen Mukherjee, Emile Aarts and Terry Doyle
Harvesting mechanical energy for ambient intelligent devices pp. 7-18 Downloads
Bert Op het Veld, Dennis Hohlfeld and Valer Pop
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions pp. 19-41 Downloads
Jorge Guajardo, Boris Škorić, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom and Geert-Jan Schrijen
Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom pp. 43-60 Downloads
Yuan-Chu Hwang and Soe-Tsyr Yuan
Distributed network intelligence: A prerequisite for adaptive and personalised service delivery pp. 61-73 Downloads
M. J. O’Grady, G. M. P. O’Hare, J. Chen and D. Phelan
Method of design and specification of web services based on quality system documentation pp. 75-86 Downloads
Miladin Stefanovic, Milan Matijević, Milan Erić and Visnja Simic
Profiling a decade of Information Systems Frontiers’ research pp. 87-102 Downloads
Yogesh K. Dwivedi, Banita Lal, Navonil Mustafee and Michael D. Williams
Page updated 2025-04-16