|
|
Information Systems Frontiers
1999 - 2025
Current editor(s): Ram Ramesh and Raghav Rao From Springer Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
2008, volume 10, articles 5
- Advances in enterprise information systems pp. 499-501

- Ling Li, Ricardo Valerdi and John N. Warfield
- Complex service design: A virtual enterprise architecture for logistics service pp. 503-518

- Charles Møller, Sohail S. Chaudhry and Bent Jørgensen
- Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies pp. 519-529

- WenAn Tan, ChuanQun Jiang, Ling Li and Zhenhong Lv
- Creation of environmental health information system for public health service: A pilot study pp. 531-542

- Ling Li, Li Xu, Hueiwang Anna Jeng, Dayanand Naik, Thomas Allen and Maria Frontini
- Architecture, implementation and application of complex event processing in enterprise information systems based on RFID pp. 543-553

- Chuanzhen Zang, Yushun Fan and Renjing Liu
- A literature review of electronic marketplace research: Themes, theories and an integrative framework pp. 555-571

- Shan Wang, Shi Zheng, Lida Xu, Dezheng Li and Huan Meng
- An OVAL-based active vulnerability assessment system for enterprise computer networks pp. 573-588

- Xiuzhen Chen, Qinghua Zheng and Xiaohong Guan
- Parameter mapping and data transformation for engineering application integration pp. 589-600

- Chengen Wang and Lida Xu
- The concept and theory of material flow pp. 601-609

- Shoubo Xu
- An approach to enterprise process dynamic modeling supporting enterprise process evolution pp. 611-624

- Lida Xu, WenAn Tan, Hongyuan Zhen and Weiming Shen
2008, volume 10, articles 4
- Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context pp. 385-390

- Yogesh K. Dwivedi, Michael D. Williams and Viswanath Venkatesh
- Digital home technologies and transformation of households pp. 391-395

- Alladi Venkatesh
- Household technology adoption, use, and impacts: Past, present, and future pp. 397-402

- Susan A. Brown
- Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values pp. 403-413

- Xiaojun Zhang and Likoebe M. Maruping
- Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services pp. 415-429

- Roman Beck, Daniel Beimborn, Tim Weitzel and Wolfgang König
- Understanding the behavior of mobile data services consumers pp. 431-445

- Se-Joon Hong, James Y. L. Thong, Jae-Yun Moon and Kar-Yan Tam
- Social networking and digital gaming media convergence: Classification and its consequences for appropriation pp. 447-459

- Marie Griffiths and Ben Light
- Affective e-Learning in residential and pervasive computing environments pp. 461-472

- Liping Shen, Victor Callaghan and Ruimin Shen
- E-government adoption: A cultural comparison pp. 473-482

- Lemuria Carter and Vishanth Weerakkody
- Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis pp. 483-497

- Dinesh A. Mirchandani, Julius H. Johnson and Kailash Joshi
2008, volume 10, articles 3
- Decision models for information systems management pp. 277-279

- Kweku-Muata Osei-Bryson and Ojelanki Ngwenyama
- Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories pp. 281-292

- Sergey Samoilenko
- Analyzing IT maintenance outsourcing decision from a knowledge management perspective pp. 293-305

- Mehmet N. Aydin and Mark E. Bakker
- An approach to analyzing and planning post-merger IS integration: Insights from two field studies pp. 307-319

- Maria Alaranta and Stefan Henningsson
- A process-focused decision framework for analyzing the business value potential of IT investments pp. 321-330

- Helana Scheepers and Rens Scheepers
- Towards an integrated measurement of IS project performance: The project performance scorecard pp. 331-345

- Corlane Barclay
- Team performance and information system implementation pp. 347-359

- Malgorzata Plaza
- An approach for incorporating quality-based cost–benefit analysis in data warehouse design pp. 361-373

- Lila Rao and Kweku-Muata Osei-Bryson
- Is your back-up IT infrastructure in a safe location? pp. 375-383

- Ozgur Turetken
2008, volume 10, articles 2
- Foreword to the special issue on IS sourcing pp. 125-127

- Rudy Hirschheim, Jens Dibbern and Armin Heinzl
- Firm strategic profile and IT outsourcing pp. 129-143

- Benoit A. Aubert, Guillaume Beaurivage, Anne-Marie Croteau and Suzanne Rivard
- An integrative model of trust on IT outsourcing: Examining a bilateral perspective pp. 145-163

- Jae-Nam Lee, Minh Q. Huynh and Rudy Hirschheim
- Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company pp. 165-178

- Julie Fisher, Rudy Hirschheim and Robert Jacobs
- Information technology workforce skills: The software and IT services provider perspective pp. 179-194

- Tim Goles, Stephen Hawk and Kate M. Kaiser
- Strategic dependence on the IT resource and outsourcing: A test of the strategic control model pp. 195-210

- Detmar Straub, Peter Weill and Kathy S. Schwaig
- The impact of process standardization on business process outsourcing success pp. 211-224

- Kim Wüllenweber, Daniel Beimborn, Tim Weitzel and Wolfgang König
- Turnover intentions of Indian IS professionals pp. 225-241

- Mary C. Lacity, Vidya V. Iyer and Prasad S. Rudramuniyaiah
- The impact of cultural differences in offshore outsourcing—Case study results from German–Indian application development projects pp. 243-258

- Jessica K. Winkler, Jens Dibbern and Armin Heinzl
- A US Client’s learning from outsourcing IT work offshore pp. 259-275

- Joseph W. Rottman and Mary C. Lacity
2008, volume 10, articles 1
- Editorial pp. 1-2

- R. Ramesh and H. R. Rao
- Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation pp. 3-18

- Janice C. Sipior and Burke T. Ward
- Formalising theories of trust for authentication protocols pp. 19-32

- Ji Ma and Mehmet A. Orgun
- A scalable multi-level feature extraction technique to detect malicious executables pp. 33-45

- Mohammad M. Masud, Latifur Khan and Bhavani Thuraisingham
- Building effective online game websites with knowledge-based trust pp. 47-60

- Clyde W. Holsapple and Jiming Wu
- Market reaction to patent infringement litigations in the information technology industry pp. 61-75

- T. S. Raghu, Wonseok Woo, S. B. Mohan and H. Raghav Rao
- Spectrum acquisition strategies adopted by wireless carriers in the USA pp. 77-102

- Hemant K. Sabat
- Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading pp. 103-110

- Borka Jerman-Blažič
- A decision support system for locating VHF/UHF radio jammer systems on the terrain pp. 111-124

- Cevriye Gencer, Emel Kizilkaya Aydogan and Coskun Celik
2007, volume 9, articles 5
- Special issue on secure knowledge management pp. 449-450

- Nasir Memon and Thomas Daniels
- Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system pp. 451-467

- Yanjun Zuo and Timothy O’Keefe
- An interorganizational knowledge-sharing security model with breach propagation detection pp. 469-479

- Daniel S. Soper, Haluk Demirkan and Michael Goul
- Overcoming organizational challenges to secure knowledge management pp. 481-492

- Finn Olav Sveen, Eliot Rich and Matthew Jager
- Security as a contributor to knowledge management success pp. 493-504

- Murray E. Jennex and Suzanne Zyngier
- Virtual organization security policies: An ontology-based integration approach pp. 505-514

- Saravanan Muthaiyah and Larry Kerschberg
- Sharing information and building trust through value congruence pp. 515-529

- Joseph A. Cazier, Benjamin B. M. Shao and Robert D. St. Louis
- An examination of private intermediaries’ roles in software vulnerabilities disclosure pp. 531-539

- Pu Li and H. Raghav Rao
- Managing the false alarms: A framework for assurance and verification of surveillance monitoring pp. 541-556

- Peter Goldschmidt
2007, volume 9, articles 4
- Special issue on enterprise distributed computing model and implementation pp. 325-326

- Patrick C. K. Hung
- Requirements traceability in model-driven development: Applying model and transformation conformance pp. 327-342

- João Paulo A. Almeida, Maria-Eugenia Iacob and Pascal Eck
- Ubiquitous enterprise service adaptations based on contextual user behavior pp. 343-358

- Dan Hong, Dickson K. W. Chiu, Vincent Y. Shen, S. C. Cheung and Eleanna Kafeza
- The adequacy of languages for representing interaction mechanisms pp. 359-373

- Remco M. Dijkman, Teduh Dirgahayu and Dick A. C. Quartel
- WS-CDL+ for web service collaboration pp. 375-389

- Zuling Kang, Hongbing Wang and Patrick C. K. Hung
- A model-driven development framework for enterprise Web services pp. 391-409

- Xiaofeng Yu, Yan Zhang, Tian Zhang, Linzhang Wang, Jun Hu, JianHua Zhao and Xuandong Li
- Agent-mediated knowledge sharing for intelligent services management pp. 411-421

- Michael F. Nowlan and M. Brian Blake
- VsLattice: A vector-based conceptual index structure for web service retrieval pp. 423-437

- Dunlu Peng, Xiaoling Wang and Aoying Zhou
- EXEM: Efficient XML data exchange management for mobile applications pp. 439-448

- Yuri Natchetoi, Huaigu Wu, Gilbert Babin and Serhan Dagtas
2007, volume 9, articles 2
- ISF special issue on enterprise services computing: Evolution and challenges pp. 135-136

- Patrick C. K. Hung, Don Sparrow and Qing Li
- Specifying and controlling multi-channel web interfaces for enterprise applications pp. 137-150

- Matthias Book and Volker Gruhn
- Reducing verification effort in component-based software engineering through built-in testing pp. 151-162

- Daniel Brenner, Colin Atkinson, Rainer Malaka, Matthias Merdes, Barbara Paech and Dima Suliman
- Enterprise architecture analysis with extended influence diagrams pp. 163-180

- Pontus Johnson, Robert Lagerström, Per Närman and Mårten Simonsson
- From trading to eCommunity management: Responding to social and contractual challenges pp. 181-194

- Lea Kutvonen, Janne Metso and Sini Ruohomaa
- Integrated model-driven dashboard development pp. 195-208

- Themis Palpanas, Pawan Chowdhary, George Mihaila and Florian Pinel
- QoS-aware model driven architecture through the UML and CIM pp. 209-224

- Kenneth Chan and Iman Poernomo
- COSMO: A conceptual framework for service modelling and refinement pp. 225-244

- Dick A. C. Quartel, Maarten W. A. Steen, Stanislav Pokraev and Marten J. Sinderen
- The imagination market pp. 245-256

- Christina Ann LaComb, Janet Arlie Barnett and Qimei Pan
- A model of the dynamics of the market of COTS software, in the absence of new entrants pp. 257-265

- Michele Marchesi, Giancarlo Succi and Barbara Russo
- A model for a web-based learning system pp. 267-282

- Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri and Giuseppe Mangioni
- Do e-business strategies matter? The antecedents and relationship with firm performance pp. 283-296

- Chulmo Koo, Jaeki Song, Yong Jin Kim and Kichan Nam
- Assessing the UK policies for broadband adoption pp. 297-308

- Jyoti Choudrie and Anastasia Papazafeiropoulou
- Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements pp. 309-324

- Y. I. Song, W. Woo and H. R. Rao
2007, volume 9, articles 1
- Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue pp. 1-8

- J. Leon Zhao, Mohan Tanniru and Liang-Jie Zhang
- A web services framework for distributed model management pp. 9-27

- Therani Madhusudan
- Guided interaction: A mechanism to enable ad hoc service interaction pp. 29-51

- Phillipa Oaks and Arthur Hofstede
- Realizing the vision for web services: Strategies for dealing with imperfect standards pp. 53-67

- Sanjay Gosain
- A framework for deriving semantic web services pp. 69-84

- David Bell, Sergio Cesare, Nicola Iacovelli, Mark Lycett and Antonio Merico
- End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach pp. 85-101

- Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung, Raymond Wong, Samuel P. M. Choi, Eleanna Kafeza, James Kwok, Joshua C. C. Pun and Vivying S. Y. Cheng
- Enhancing the efficiency of supply chain processes through web services pp. 103-118

- Seung-Hyun Rhee, Hyerim Bae and Yongsun Choi
- A theoretical investigation of the emerging standards for web services pp. 119-134

- Karthikeyan Umapathy and Sandeep Purao
|
On this page- 2008, volume 10
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
- 2007, volume 9
-
Articles 5
Articles 4 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
On this page- 2008, volume 10
-
Articles 5
Articles 4 Articles 3 Articles 2 Articles 1
- 2007, volume 9
-
Articles 5
Articles 4 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
|