|
|
Information Systems Frontiers
1999 - 2025
Current editor(s): Ram Ramesh and Raghav Rao From Springer Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
2010, volume 12, articles 5
- Guest editorial: Advances in RFID technology pp. 481-483

- Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung and Zakaria Maamar
- Ubiquitous RFID: Where are we? pp. 485-490

- Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung and Zakaria Maamar
- Classifying RFID attacks and defenses pp. 491-505

- Aikaterini Mitrokotsa, Melanie R. Rieback and Andrew S. Tanenbaum
- Secure and private search protocols for RFID systems pp. 507-519

- Yanjun Zuo
- A lightweight anti-desynchronization RFID authentication protocol pp. 521-528

- Shijie Zhou, Zhen Zhang, Zongwei Luo and Edward C. Wong
- ID-Services: an RFID middleware architecture for mobile applications pp. 529-539

- Joachim Schwieren and Gottfried Vossen
- Sharing RFID and complex event data among organizations pp. 541-549

- Holger Ziekow and Oliver Günther
- FlexRFID: A design, development and deployment framework for RFID-based business applications pp. 551-562

- Arijit Sengupta and Shu Z. Schiller
- Automated management of assets based on RFID triggered alarm messages pp. 563-578

- Shengguang Meng, Dickson K. W. Chiu, Eleanna Kafeza, Liu Wenyin and Qing Li
- An empirical investigation into the effects of web search characteristics on decisions associated with impression formation pp. 579-593

- Shailaja Venkatsubramanyan and Timothy R. Hill
- Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes pp. 595-606

- Young Mee Shin, Seung Chang Lee, Bongsik Shin and Ho Geun Lee
- Personalisation in web computing and informatics: Theories, techniques, applications, and future research pp. 607-629

- Min Gao, Kecheng Liu and Zhongfu Wu
- Combining transaction cost and resource-based insights to explain IT implementation outsourcing pp. 631-645

- Emilio Alvarez-Suescun
2010, volume 12, articles 4
- Ethics and information systems — Guest editors’ introduction pp. 357-359

- Maria Carla Calzarossa, Ivo Lotto and Simon Rogerson
- Analysis of MySpace user profiles pp. 361-367

- Luisa Massari
- The ethics of video games: Mayhem, death, and the training of the next generation pp. 369-377

- Don Gotterbarn
- Expanding ethical vistas of IT professionals pp. 379-387

- Ian Stoodley, Christine Bruce and Sylvia Edwards
- Users’ involvement may help respect social and ethical values and improve software quality pp. 389-397

- Barbara Begier
- Knowledge versus content in e-learning: A philosophical discussion pp. 399-413

- Gonçalo Jorge Morais Costa and Nuno Sotero Alves Silva
- Agents of responsibility—freelance web developers in web applications development pp. 415-424

- Malik Aleem Ahmed and Jeroen Hoven
- Hacker Taggers: A new type of hackers pp. 425-431

- Matthew Warren and Shona Leitch
- Ethical implications of internet monitoring: A comparative study pp. 433-441

- Frances S. Grodzinsky, Andra Gumbus and Stephen Lilley
- Increasing the efficiency of business processes using a theory of constraints pp. 443-455

- Seung-Hyun Rhee, Nam Wook Cho and Hyerim Bae
- Specification and verification of harmonized business-process collaborations pp. 457-479

- Alex Norta and Rik Eshuis
2010, volume 12, articles 3
- Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage” pp. 235-237

- Devaki Rau, Thorvald Haerem, Gautam Ray and Wei Zheng
- From IT deployment capabilities to competitive advantage: An exploratory study in China pp. 239-255

- Jun Tian, Kanliang Wang, Yan Chen and Björn Johansson
- ICT infrastructure for innovation: A case study of the enterprise service bus approach pp. 257-265

- Bendik Bygstad and Hans-Petter Aanby
- Knowledge management technology for organized crime risk assessment pp. 267-275

- Petter Gottschalk
- Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages? pp. 277-285

- Jeanine Warisse Turner and N. Lamar Reinsch
- Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research pp. 287-297

- Devaki Rau and Thorvald Haerem
- The impact of trust, risk and optimism bias on E-file adoption pp. 299-309

- Ludwig Christian Schaupp and Lemuria Carter
- Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance pp. 311-322

- Xin Xu, Will Wai Kit Ma and Eric Wing Kuen See-To
- An empirical study of IT as a factor of production: The case of Net-enabled IT assets pp. 323-335

- Saggi Nevo, Michael Wade and Wade D. Cook
- An ontological modelling of user requirements for personalised information provision pp. 337-356

- Lily Sun, Khadidjatou Ousmanou and Matthew Cross
2010, volume 12, articles 2
- Object-oriented re-engineering of manufacturing models: A case study pp. 97-114

- Vincenza Carchiolo, Sebastiano D’Ambra, Alessandro Longheu and Michele Malgeri
- UML-CI: A reference model for profiling critical infrastructure systems pp. 115-139

- Ebrahim Bagheri and Ali A. Ghorbani
- An approach for moving object recognition based on BPR and CI pp. 141-148

- Li Wang, Lida Xu, Renjing Liu and Hai Hong Wang
- An SVM-based machine learning method for accurate internet traffic classification pp. 149-156

- Ruixi Yuan, Zhu Li, Xiaohong Guan and Li Xu
- A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce pp. 157-168

- Arnold Kamis, Tziporah Stern and Daniel M. Ladik
- Do as your parents say?—Analyzing IT adoption influencing factors for full and under age applicants pp. 169-183

- Sven Laumer, Andreas Eckhardt and Natascha Trunk
- Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement pp. 185-205

- Jahyun Goo
- Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider pp. 207-217

- Yogesh K. Dwivedi, Anastasia Papazafeiropoulou, Willem-Paul Brinkman and Banita Lal
- A socio-technical approach to improving the systems development process pp. 219-234

- Ravi Patnayakuni and Cynthia P. Ruppel
2010, volume 12, articles 1
- Advances in multi-agency disaster management: Key elements in disaster research pp. 1-7

- Marijn Janssen, JinKyu Lee, Nitesh Bharosa and Anthony Cresswell
- Collaborative systems development in disaster relief: The impact of multi-level governance pp. 9-27

- Edgar A. Maldonado, Carleen F. Maitland and Andrea H. Tapia
- Alert based disaster notification and resource allocation pp. 29-47

- Dickson K. W. Chiu, Drake T. T. Lin, Eleanna Kafeza, Minhong Wang, Haiyang Hu, Hua Hu and Yi Zhuang
- Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises pp. 49-65

- Nitesh Bharosa, JinKyu Lee and Marijn Janssen
- Information intermediaries for emergency preparedness and response: A case study from public health pp. 67-79

- Minu Ipe, T. S. Raghu and Ajay Vinze
- Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system pp. 81-95

- Jane Fedorowicz and Janis L. Gogan
2009, volume 11, articles 5
- Intelligent systems and smart homes pp. 481-482

- Jong Hyuk Park, Ching-Hsien Hsu and Hamid R. Arabnia
- Service integration with UPnP agent for an ubiquitous home environment pp. 483-490

- Wally Chen, Sy-Yen Kuo and Han-Chieh Chao
- A novel memory management scheme for residential gateways pp. 491-500

- Ibrahim Kamel and Beizhong Chen
- Location-aware communications in smart environments pp. 501-512

- Ichiro Satoh
- T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks pp. 513-521

- Jiman Hong, Joongjin Kook, Sangjun Lee, Dongseop Kwon and Sangho Yi
- A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA pp. 523-528

- Hak-Man Kim, Jong-Joo Lee, Myong-Chul Shin and Seok-Soo Kim
- A ubiquitous smart home for elderly pp. 529-536

- M. W. Raad and L. T. Yang
- Monitoring user activities in smart home environments pp. 537-537

- Sajid Hussain, Senol Zafer Erdogan and Jong Hyuk Park
- Monitoring user activities in smart home environments pp. 539-549

- Sajid Hussain, Senol Zafer Erdogen and Jong Hyuk Park
- Learning fuzzy concept hierarchy and measurement with node labeling pp. 551-559

- Been-Chian Chien, Chih-Hung Hu and Ming-Yi Ju
- A study on applying context-aware technology on hypothetical shopping advertisement pp. 561-567

- Jae-gu Song and Seoksoo Kim
- VO breeding environments & virtual organizations integral business process management framework pp. 569-597

- David Romero and Arturo Molina
- A ‘smart house’ is not a home: The domestication of ICTs pp. 599-608

- Helen J. Richardson
2009, volume 11, articles 4
- Editorial for the special issue of knowledge discovery and management in biomedical information systems pp. 345-347

- Ying Liu, Lawrence Wing-Chi Chan, Chi-Ren Shyu and Ying Liu
- An automated bacterial colony counting and classification system pp. 349-368

- Wei-Bang Chen and Chengcui Zhang
- Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model pp. 369-379

- Alex K. S. Wong, Lawrence W. C. Chan and Ying Liu
- Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration pp. 381-389

- Fuk-hay Tang and H. S. Horace Ip
- Interactive survival analysis with the OCDM system: From development to application pp. 391-403

- Sebastian Klenk, Jürgen Dippon, Peter Fritz and Gunther Heidemann
- Design of an RFID-based Healthcare Management System using an Information System Design Theory pp. 405-417

- E. W. T. Ngai, J. K. L. Poon, F. F. C. Suk and C. C. Ng
- Coronary artery disease prediction method using linear and nonlinear feature of heart rate variability in three recumbent postures pp. 419-431

- Heon Gyu Lee, Wuon-Shik Kim, Ki Yong Noh, Jin-Ho Shin, Unil Yun and Keun Ho Ryu
- Efficient mining of multilevel gene association rules from microarray and gene ontology pp. 433-447

- Vincent S. Tseng, Hsieh-Hui Yu and Shih-Chiang Yang
- Comparing data mining methods with logistic regression in childhood obesity prediction pp. 449-460

- Shaoyan Zhang, Christos Tjortjis, Xiaojun Zeng, Hong Qiao, Iain Buchan and John Keane
- Proportional fault-tolerant data mining with applications to bioinformatics pp. 461-469

- Guanling Lee, Sheng-Lung Peng and Yuh-Tzu Lin
- Knowledge management in biomedical libraries: A semantic web approach pp. 471-480

- Damaris Fuentes-Lorenzo, Jorge Morato and Juan Miguel Gómez
2009, volume 11, articles 3
- Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue pp. 201-209

- Chengfei Liu, Qing Li and Xiaohui Zhao
- Evie - A developer toolkit for encoding service interaction patterns pp. 211-225

- Anthony M. J. O’Hagan, Shazia Sadiq and Wasim Sadiq
- Quality analysis of composed services through fault injection pp. 227-239

- Maria Grazia Fugini, Barbara Pernici and Filippo Ramoni
- Towards ubiquitous tourist service coordination and process integration: A collaborative travel agent system architecture with semantic web services pp. 241-256

- Dickson K. W. Chiu, Yves T. F. Yueh, Ho-fung Leung and Patrick C. K. Hung
- CoBTx-Net: A model for business collaboration reliability verification pp. 257-272

- Haiyang Sun, Jian Yang and Lai Xu
- Evaluation of inter-organizational business process solutions: A conceptual model-based approach pp. 273-291

- Johny Ghattas and Pnina Soffer
- Delegating revocations and authorizations in collaborative business environments pp. 293-305

- Hua Wang, Jinli Cao and Yanchun Zhang
- Analysis of a collaborative workflow process with distributed actors pp. 307-322

- Hajo A. Reijers, Minseok Song and Byungduk Jeong
- Investigating mobile wireless technology adoption: An extension of the technology acceptance model pp. 323-333

- Sanghyun Kim and Gary Garrison
- A secure e-auction scheme based on group signatures pp. 335-343

- Cheng-Chi Lee, Pi-Fang Ho and Min-Shiang Hwang
2009, volume 11, articles 2
- Guest editorial: Information and communications technology for development pp. 103-104

- Balaji Parthasarathy and Krithi Ramamritham
- If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India pp. 105-116

- Joyojeet Pal
- Design of a braille writing tutor to combat illiteracy pp. 117-128

- N. Kalra, T. Lauwers, D. Dewey, T. Stepleton and M. B. Dias
- “My child will be respected”: Parental perspectives on computers and education in Rural India pp. 129-144

- Joyojeet Pal, Meera Lakshmanan and Kentaro Toyama
- Advancement through interactive radio pp. 145-154

- S. Revi Sterling, John O’Brien and John K. Bennett
- ICT intervention in the ‘Chandanbari’ Village of Bangladesh: Results from a field study pp. 155-166

- Mahfuz Ashraf, Jo Hanisch and Paul Swatman
- Effect of the food traceability system for building trust: Price premium and buying behavior pp. 167-179

- Young Chan Choe, Joowon Park, Miri Chung and Junghoon Moon
- Managing cooperation in e-business systems pp. 181-188

- Pradeep Ray and Lundy Lewis
- Managing the diffusion of organizational learning behavior pp. 189-200

- Gary F. Templeton, Mark B. Schmidt and G. Stephen Taylor
2009, volume 11, articles 1
- Special issue on Ambient Intelligence pp. 1-5

- Satyen Mukherjee, Emile Aarts and Terry Doyle
- Harvesting mechanical energy for ambient intelligent devices pp. 7-18

- Bert Op het Veld, Dennis Hohlfeld and Valer Pop
- Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions pp. 19-41

- Jorge Guajardo, Boris Škorić, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom and Geert-Jan Schrijen
- Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom pp. 43-60

- Yuan-Chu Hwang and Soe-Tsyr Yuan
- Distributed network intelligence: A prerequisite for adaptive and personalised service delivery pp. 61-73

- M. J. O’Grady, G. M. P. O’Hare, J. Chen and D. Phelan
- Method of design and specification of web services based on quality system documentation pp. 75-86

- Miladin Stefanovic, Milan Matijević, Milan Erić and Visnja Simic
- Profiling a decade of Information Systems Frontiers’ research pp. 87-102

- Yogesh K. Dwivedi, Banita Lal, Navonil Mustafee and Michael D. Williams
|
On this page- 2010, volume 12
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
- 2009, volume 11
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
On this page- 2010, volume 12
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
- 2009, volume 11
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
|