|
|
Information Systems Frontiers
1999 - 2025
Current editor(s): Ram Ramesh and Raghav Rao From Springer Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
2021, volume 23, articles 6
- Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19 pp. 1363-1367

- Victor Chang, Carole Goble, Muthu Ramachandran, Lazarus Jegatha Deborah and Reinhold Behringer
- COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking pp. 1369-1383

- R. Elakkiya, Pandi Vijayakumar and Marimuthu Karuppiah
- A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients pp. 1385-1401

- Prabh Deep Singh, Rajbir Kaur, Kiran Deep Singh and Gaurav Dhiman
- FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia pp. 1403-1415

- Longling Zhang, Bochen Shen, Ahmed Barnawi, Shan Xi, Neeraj Kumar and Yi Wu
- A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets pp. 1417-1429

- Harleen Kaur, Shafqat Ul Ahsaan, Bhavya Alankar and Victor Chang
- Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study pp. 1431-1465

- Jyoti Choudrie, Shruti Patil, Ketan Kotecha, Nikhil Matta and Ilias Pappas
- The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic pp. 1467-1497

- Francesco Piccialli, Vincenzo Schiano Cola, Fabio Giampaolo and Salvatore Cuomo
- Social Commerce in Emerging Markets and its Impact on Online Community Engagement pp. 1499-1520

- Raed S. Algharabat and Nripendra P. Rana
- New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis pp. 1521-1536

- Neeru Malhotra, Sunil Sahadev, P. S. H. Leeflang and Keyoor Purani
- Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study pp. 1537-1562

- Grace Fox and Tabitha L. James
- Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia pp. 1563-1572

- Daniel Chandran and Abdullah M. Alammari
- When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology pp. 1573-1591

- Cancan Wang, Rony Medaglia and Tina Blegind Jensen
- Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships pp. 1593-1607

- Ashish Kumar Jha and Indranil Bose
- Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits pp. 1609-1620

- Kjell Hausken and Jonathan W. Welburn
- Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS pp. 1621-1642

- Steven D. Silver
2021, volume 23, articles 5
- Information Technology in Disaster Risk Reduction pp. 1077-1081

- Yuko Murayama, Hans Jochen Scholl and Dimiter Velev
- PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation pp. 1083-1096

- Eileen Young and Benigno Aguirre
- Digital Nudging in Social Media Disaster Communication pp. 1097-1113

- Milad Mirbabaie, Christian Ehnis, Stefan Stieglitz, Deborah Bunker and Tanja Rose
- Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation pp. 1115-1125

- Osamu Uchida, Sachi Tajima, Yoshitaka Kajita, Keisuke Utsu, Yuji Murakami and Sanetoshi Yamada
- A Methodology for Automatic Acquisition of Flood‐event Management Information From Social Media: the Flood in Messinia, South Greece, 2016 pp. 1127-1144

- Stathis G. Arapostathis
- A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters pp. 1145-1168

- Shalak Mendon, Pankaj Dutta, Abhishek Behl and Stefan Lessmann
- Learning Automata-based Misinformation Mitigation via Hawkes Processes pp. 1169-1188

- Ahmed Abouzeid, Ole-Christoffer Granmo, Christian Webersik and Morten Goodwin
- Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation pp. 1189-1202

- Tullio Tanzi and Matteo Bertolino
- Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction pp. 1203-1211

- Jun Sasaki and Makoto Kitsuya
- Universal Design of ICT for Emergency Management from Stakeholders’ Perspective pp. 1213-1225

- Terje Gjøsæter, Jaziar Radianti and Weiqin Chen
- Interactive Topic Search System Based on Topic Cluster Technology pp. 1227-1243

- Lin-Chih Chen
- Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic pp. 1245-1271

- Ameni Hbaieb, Mahdi Khemakhem and Maher Ben Jemaa
- Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study pp. 1273-1286

- Patrick Mikalef, Kshitij Sharma, Ilias O. Pappas and Michail Giannakos
- Online Review Consistency Matters: An Elaboration Likelihood Model Perspective pp. 1287-1301

- Navid Aghakhani, Onook Oh, Dawn G. Gregg and Jahangir Karimi
- Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter pp. 1303-1316

- Eleanna Kafeza, Christos Makris, Gerasimos Rompolas and Feras Al-Obeidat
- Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis pp. 1317-1337

- Mohammad Soltani Delgosha, Tahereh Saheb and Nastaran Hajiheydari
- Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis pp. 1339-1339

- Mohammad Soltani Delgosha, Tahereh Saheb and Nastaran Hajiheydari
- What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the “Digital Service Usage Satisfaction Model” pp. 1341-1361

- Arpan Kumar Kar
2021, volume 23, articles 4
- Advances in Secure Knowledge Management in the Artificial Intelligence Era pp. 807-810

- Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
- Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models pp. 811-833

- R.K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal and Aniket Kuiri
- Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System pp. 835-848

- Trupil Limbasiya, Sanjay Kumar Sahay and Bharath Sridharan
- A Formal Specification of Access Control in Android with URI Permissions pp. 849-866

- Samir Talegaon and Ram Krishnan
- Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning pp. 867-882

- Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak
- Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence pp. 883-896

- Md. Farhan Haque and Ram Krishnan
- Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats pp. 897-913

- Rudra P. Baksi and Shambhu J. Upadhyaya
- UnderTracker: Generating Robust Binaries Using Execution Flow Traces pp. 915-930

- Rajesh Kumar Shrivastava and Chittaranjan Hota
- An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises pp. 931-939

- Thi Tran, Rohit Valecha, Paul Rad and H. Raghav Rao
- Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage pp. 941-961

- Abhipsa Pal, Tejaswini Herath, Rahul De’ and H. Raghav Rao
- Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending? pp. 963-986

- Qun Chen, Ji-Wen Li, Jian-Guo Liu, Jing-Ti Han, Yun Shi and Xun-Hua Guo
- Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2 pp. 987-1005

- Kuttimani Tamilmani, Nripendra P. Rana and Yogesh K. Dwivedi
- Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union pp. 1007-1021

- Anca Elena-Bucea, Frederico Cruz-Jesus, Tiago Oliveira and Pedro Simões Coelho
- Predicting Sports Injuries with Wearable Technology and Data Analysis pp. 1023-1037

- Amir Zadeh, David Taylor, Margaret Bertsos, Timothy Tillman, Nasim Nosoudi and Scott Bruce
- An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm) pp. 1039-1056

- Abhishek Majumdar, Tapas Debnath, Arpita Biswas, Sandeep K. Sood and Krishna Lal Baishnab
- Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations pp. 1057-1076

- M Vimalkumar, Jang Bahadur Singh and Sujeet Kumar Sharma
2021, volume 23, articles 3
- An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM pp. 515-530

- Zhen Zhao, Zongmin Ma and Li Yan
- Cross-visiting Behaviour of Online Consumers Across Retailers’ and Comparison Sites, a Macro-Study pp. 531-542

- Sahar Karimi
- Investigating the Success of OGB in China: The Influence of Personality Traits pp. 543-559

- Mohammad Alamgir Hossain and Shams Rahman
- Interactions between Analysts in Developing Collaborative Conceptual Models pp. 561-573

- Palash Bera
- An Architecture Framework Approach for Complex Transport Projects pp. 575-595

- Farid Shirvani, Ghassan Beydoun, Pascal Perez, William Scott and Peter Campbell
- Correction to: An Architecture Framework Approach for Complex Transport Projects pp. 597-597

- Farid Shirvani, Ghassan Beydoun, Pascal Perez, William Scott and Peter Campbell
- Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices’ Workflow pp. 599-605

- Kim Fecher, Lauren McCarthy, Daniel E. Porreca and Niam Yaraghi
- Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context pp. 607-626

- Mengyue Wang, Xin Li and Patrick Y. K. Chau
- Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process pp. 627-647

- Mahesh Balan U and Saji K. Mathew
- Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance pp. 649-661

- Hung-Pin Shih and Pei-Chen Sung
- From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs pp. 663-680

- Federico Iannacci, Colm Fearon and Kristine Pole
- Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing pp. 681-694

- Yen-Chun Chou and Benjamin B. M. Shao
- Vector Gravitation Clustering Networks pp. 695-707

- Zong-chang Yang
- Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters pp. 709-722

- Adarsh Anand, Navneet Bhatt and Omar H. Alhazmi
- Reddit: Affordances as an Enabler for Shifting Loyalties pp. 723-751

- Naveena Prakasam and Louisa Huxtable-Thomas
- OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs pp. 753-772

- Amit V. Deokar and Jie Tao
- Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities pp. 773-790

- Chenglong Zhang, Nan Feng, Jianjian Chen, Dahui Li and Minqiang Li
- An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis pp. 791-805

- A. Geethapriya and S. Valli
2021, volume 23, articles 2
- Seeking Foundations for the Science of Cyber Security pp. 263-267

- Shouhuai Xu, Moti Yung and Jingguo Wang
- HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks pp. 269-283

- Xin Huang, Fei Yan, Liqiang Zhang and Kai Wang
- LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling pp. 285-298

- Bin Xia, Yuxuan Bai, Junjie Yin, Yun Li and Jian Xu
- DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification pp. 299-315

- Krishna Chandra Roy and Qian Chen
- Incentive Mechanism for Rational Miners in Bitcoin Mining Pool pp. 317-327

- Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu and Lijie Xu
- Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes pp. 329-341

- Mario Silic and Paul Benjamin Lowry
- Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity pp. 343-360

- A. J. Burns, Clay Posey and Tom L. Roberts
- The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence pp. 361-373

- Eunkyung Kweon, Hansol Lee, Sangmi Chai and Kyeongwon Yoo
- Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach pp. 375-389

- Qi Liu, Gengzhong Feng, Giri Kumar Tayi and Jun Tian
- Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems pp. 391-414

- Stephan Berger, Björn Häckel and Lukas Häfner
- Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence? pp. 415-433

- Tan Trung Luong, Uthayasankar Sivarajah and Vishanth Weerakkody
- The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation pp. 435-452

- Supavich Fone Pengnate, Rathindra Sarathy and Todd J. Arnold
- Accommodating Practices During Episodes of Disillusionment with Mobile IT pp. 453-475

- Efpraxia D. Zamani, Nancy Pouloudi, George Giaglis and Jonathan Wareham
- Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets pp. 477-494

- Benjamin Clapham, Michael Siering and Peter Gomber
- Towards Increased Understanding of Open Data Use for Software Development pp. 495-513

- Maciej Grzenda and Jaroslaw Legierski
2021, volume 23, articles 1
- Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science pp. 1-7

- Silvia Chiusano, Tania Cerquitelli, Robert Wrembel and Daniele Quercia
- Quarry: A User-centered Big Data Integration Platform pp. 9-33

- Petar Jovanovic, Sergi Nadal, Oscar Romero, Alberto Abelló and Besim Bilalli
- Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks pp. 35-51

- Pietro Michiardi, Damiano Carra and Sara Migliorini
- Multi-view Latent Learning Applied to Fashion Industry pp. 53-69

- Giovanni Battista Gardino, Rosa Meo and Giuseppe Craparotta
- Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition pp. 71-80

- Aria Ghora Prabono, Bernardo Nugroho Yahya and Seok-Lyong Lee
- TextBenDS: a Generic Textual Data Benchmark for Distributed Systems pp. 81-100

- Ciprian-Octavian Truică, Elena-Simona Apostol, Jérôme Darmont and Ira Assent
- GarNLP: A Natural Language Processing Pipeline for Garnishment Documents pp. 101-114

- Ilaria Bordino, Andrea Ferretti, Francesco Gullo and Stefano Pascolutti
- Mining Social Networks to Detect Traffic Incidents pp. 115-134

- Sebastián Vallejos, Diego G. Alonso, Brian Caimmi, Luis Berdun, Marcelo G. Armentano and Álvaro Soria
- A Twitter-Based Study of the European Internet of Things pp. 135-149

- Funda Ustek-Spilda, Davide Vega, Matteo Magnani, Luca Rossi, Irina Shklovski, Sebastian Lehuede and Alison Powell
- Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom pp. 151-164

- Davy Preuveneers, Giuseppe Garofalo and Wouter Joosen
- Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing pp. 165-183

- Abdallah Khelil, Amin Mesmoudi, Jorge Galicia, Ladjel Bellatreche, Mohand-Saïd Hacid and Emmanuel Coquery
- NetDER: An Architecture for Reasoning About Malicious Behavior pp. 185-201

- Jose N. Paredes, Gerardo I. Simari, Maria Vanina Martinez and Marcelo A. Falappa
- TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes pp. 203-226

- Amine Ghrab, Oscar Romero, Sabri Skhiri and Esteban Zimányi
- Towards End-to-End Multilingual Question Answering pp. 227-241

- Ekaterina Loginova, Stalin Varanasi and Günter Neumann
- An Approach to Extracting Topic-guided Views from the Sources of a Data Lake pp. 243-262

- Claudia Diamantini, Paolo Lo Giudice, Domenico Potena, Emanuele Storti and Domenico Ursino
|
On this page- 2021, volume 23
-
Articles 6
Articles 5 Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
On this page- 2021, volume 23
-
Articles 6
Articles 5 Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2015, volume 17
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
|