|
|
Information Systems Frontiers
1999 - 2025
Current editor(s): Ram Ramesh and Raghav Rao From Springer Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
2015, volume 17, articles 6
- Special section on business process analytics pp. 1191-1194

- Karl R. Lang, Vojislav B. Misic and Leon J. Zhao
- An intelligent approach to data extraction and task identification for process mining pp. 1195-1208

- Jiexun Li, Harry Jiannan Wang and Xue Bai
- Semantics-based event log aggregation for process mining and analytics pp. 1209-1226

- Amit V. Deokar and Jie Tao
- Examining micro-level knowledge sharing discussions in online communities pp. 1227-1238

- G. Alan Wang, Xiaomo Liu, Jianling Wang, Min Zhang and Weiguo Fan
- The classification of hackers by knowledge exchange behaviors pp. 1239-1251

- Xiong Zhang, Alex Tsang, Wei T. Yue and Michael Chau
- Workflow-aware attention tracking to enhance collaboration management pp. 1253-1264

- Shaokun Fan, Lele Kang and J. Leon Zhao
- Collaborative personal profiling for web service ranking and recommendation pp. 1265-1282

- Wenge Rong, Baolin Peng, Yuanxin Ouyang, Kecheng Liu and Zhang Xiong
- E-commerce web site loyalty: A cross cultural comparison pp. 1283-1299

- Jengchung Victor Chen, David C. Yen, Wannasri Pornpriphet and Andree E. Widjaja
- Rough set based classification of real world Web services pp. 1301-1311

- Hala S. Own and Hamdi Yahyaoui
- The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis pp. 1313-1333

- Pekka Kekolahti, Juuso Karikoski and Antti Riikonen
- Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations pp. 1335-1352

- Heng-Li Yang and August F. Y. Chao
- Diffusion of deception in social media: Social contagion effects and its antecedents pp. 1353-1367

- Arun Vishwanath
- RFID in production and service systems: Technology, applications and issues pp. 1369-1380

- Nilgun Fescioglu-Unver, Sung Hee Choi, Dongmok Sheen and Soundar Kumara
- Estimating trust value: A social network perspective pp. 1381-1400

- Wei-Lun Chang, Arleen N. Diaz and Patrick C. K. Hung
- The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling pp. 1401-1425

- Jan Claes, Irene Vanderfeesten, Frederik Gailly, Paul Grefen and Geert Poels
2015, volume 17, articles 5
- Advances in secure knowledge management in the big data era pp. 983-986

- Chittaranjan Hota, Shambhu Upadhyaya and Jamal Nazzal Al-Karaki
- Surviving advanced persistent threats in a distributed environment – Architecture and analysis pp. 987-995

- Ruchika Mehresh and Shambhu Upadhyaya
- Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013 pp. 997-1005

- Jaeung Lee, Manish Agrawal and H. R. Rao
- Secure and privacy preserving data processing support for active authentication pp. 1007-1015

- Yan Sun and Shambhu Upadhyaya
- Game-theoretic strategies for IDS deployment in peer-to-peer networks pp. 1017-1028

- Pratik Narang and Chittaranjan Hota
- Analysis of a multistage attack embedded in a video file pp. 1029-1037

- Hiran V. Nath and B. M. Mehtre
- Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service pp. 1039-1056

- Kawaljeet Kaur Kapoor, Yogesh K. Dwivedi and Michael D. Williams
- Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts pp. 1057-1076

- Mohammad Alamgir Hossain and Mohammed Quaddus
- Social balance in signed networks pp. 1077-1095

- Xiaolong Zheng, Daniel Zeng and Fei-Yue Wang
- Does better Internet access lead to more adoption? A new empirical study using household relocation pp. 1097-1110

- Junzhao Ma and Qingyi Huang
- Measurements of mislead threshold of company graph distortion pp. 1111-1132

- Shaio Yan Huang, Tung-Hsien Wu, An-An Chiu and David C. Yen
- How business process reengineering affects information technology investment and employee performance under different performance measurement pp. 1133-1144

- Shaio Yan Huang, Chao-Hsiung Lee, An-An Chiu and David C. Yen
- Addressing the valuation problem in multi-round combinatorial auctions pp. 1145-1160

- Soumyakanti Chakraborty, Anup K. Sen and Amitava Bagchi
- IPTV parental control: A collaborative model for the Social Web pp. 1161-1176

- Ana Fernández-Vilas, Rebeca P. Díaz-Redondo and Sandra Servia-Rodríguez
- Understanding health information technology adoption: A synthesis of literature from an activity perspective pp. 1177-1190

- Jun Sun and Zhe Qu
2015, volume 17, articles 4
- Special issue on agreement technologies pp. 707-711

- Carlos Iván Chesñevar, Eva Onaindia, Sascha Ossowski and George Vouros
- Reasoning about reasons behind preferences using modal logic pp. 713-724

- Truls Pedersen, Sjur Dyrkolbotn and Thomas Ågotnes
- Reasoning about the impacts of information sharing pp. 725-742

- Yuqing Tang, Federico Cerutti, Nir Oren and Chatschik Bisdikian
- Subjective logic operators in trust assessment: an empirical study pp. 743-762

- Federico Cerutti, Lance M. Kaplan, Timothy J. Norman, Nir Oren and Alice Toniolo
- From roles to standards: a dynamic maintenance approach using incentives pp. 763-778

- Ramón Hermoso, Henrique Lopes Cardoso and Maria Fasli
- An ontological-based knowledge-representation formalism for case-based argumentation pp. 779-798

- Stella Heras, Vicente Botti and Vicente Julián
- Service discovery acceleration with hierarchical clustering pp. 799-808

- Zijie Cong, Alberto Fernandez, Holger Billhardt and Marin Lujak
- On the inaccuracy of numerical ratings: dealing with biased opinions in social networks pp. 809-825

- Roberto Centeno, Ramón Hermoso and Maria Fasli
- Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory pp. 827-844

- Ping Wang, Kuo-Ming Chao and Chi-Chun Lo
- A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research pp. 845-856

- Kweku-Muata Osei-Bryson
- Event-cloud platform to support decision-making in emergency management pp. 857-869

- Matthieu Lauras, Frédérick Benaben, Sébastien Truptil and Aurélie Charles
- Networked enterprise business model alignment: A case study on smart living pp. 871-887

- Sam Solaimani, Harry Bouwman and Timo Itälä
- E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks pp. 889-915

- Vishanth Weerakkody, Zahir Irani, Habin Lee, Ibrahim Osman and Nitham Hindi
- Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron pp. 917-946

- Jakub Malý and Martin Nečaský
- Intelligent drowsy eye detection using image mining pp. 947-960

- Ahmed Emam
- VXQ: A visual query language for XML data pp. 961-981

- Ryan H. Choi and Raymond K. Wong
2015, volume 17, articles 3
- Special section on the role of information technology in service delivery pp. 471-474

- Jaeki Song, Jeff Baker and Fred D. Davis
- Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs) pp. 475-492

- Ravi Seethamraju
- Improving service of online health information provision: A case of usage-driven design for health information portals pp. 493-511

- Bang Viet Nguyen, Frada Burstein and Julie Fisher
- Categorizing consumer behavioral responses and artifact design features: The case of online advertising pp. 513-532

- Jian Tang, Ping Zhang and Philip Fei Wu
- Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach pp. 533-546

- Miri Kim, Jaeki Song and Jason Triche
- A meta-analysis of existing research on citizen adoption of e-government pp. 547-563

- Nripendra P. Rana, Yogesh K. Dwivedi and Michael D. Williams
- Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs pp. 565-589

- Seokho Son and Kwang Mong Sim
- Smart grid data analytics for digital protective relay event recordings pp. 591-600

- Tomo Popovic, Mladen Kezunovic and Bozo Krstajic
- Examining the antecedent factors of online microsourcing pp. 601-617

- Baozhou Lu, Rudy Hirschheim and Andrew Schwarz
- Comparative study of large information systems’ CSFs during their life cycle pp. 619-628

- Mojtaba Ashja, Akram Hadizadeh Moghadam and Hamid Bidram
- An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries pp. 629-644

- Vincent Cho and Aman Chan
- Customer revisit intention to restaurants: Evidence from online reviews pp. 645-657

- Xiangbin Yan, Jing Wang and Michael Chau
- Investments in enterprise integration technology: An event study pp. 659-672

- Narcyz Roztocki and Heinz Roland Weistroffer
- Failure recovery in distributed model composition with intelligent assistance pp. 673-689

- Hui Huang, Xueguang Chen and Zhiwu Wang
- On achieving secure collaboration in supply chains pp. 691-705

- Sharad Barkataki and Hassan Zeineddine
2015, volume 17, articles 2
- Introduction: Advances in IoT research and applications pp. 239-241

- Pan Wang, Ricardo Valerdi, Shangming Zhou and Ling Li
- The internet of things: a survey pp. 243-259

- Shancang Li, Li Da Xu and Shanshan Zhao
- The Internet of Things—A survey of topics and trends pp. 261-274

- Andrew Whitmore, Anurag Agarwal and Li Xu
- The design of an electronic pedigree system for food safety pp. 275-287

- Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang and Li-Rong Zheng
- Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion pp. 289-319

- Zhibo Pang, Qiang Chen, Weili Han and Lirong Zheng
- An integrated information system for snowmelt flood early-warning based on internet of things pp. 321-335

- Shifeng Fang, Lida Xu, Yunqiang Zhu, Yongqiang Liu, Zhihui Liu, Huan Pei, Jianwu Yan and Huifang Zhang
- An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau pp. 337-350

- Fang Liu, Zhuming Bi, Eric L. Xu, Qin Ga, Quanyu Yang, Yingzhong Yang, Lan Ma, Tana Wuren and Rili Ge
- The role of social media in supporting knowledge integration: A social capital analysis pp. 351-362

- Xiongfei Cao, Xitong Guo, Hefu Liu and Jibao Gu
- Risk assessment model based on multi-agent systems for complex product design pp. 363-385

- Ni Li, Xiang Li, Yuzhong Shen, Zhuming Bi and Minghui Sun
- The information technology workforce: A review and assessment of voluntary turnover research pp. 387-411

- Janice Lo
- Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors pp. 413-422

- Tao Zhou
- Security investment and information sharing under an alternative security breach probability function pp. 423-438

- Xing Gao, Weijun Zhong and Shue Mei
- Optimal software design reuse policies: A control theoretic approach pp. 439-453

- Monica Johar, Vijay Mookerjee and Suresh Sethi
- Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use pp. 455-470

- Hung-pin Shih, Kee-hung Lai and T. C. E. Cheng
2015, volume 17, articles 1
- Foreword: Information Systems Frontiers pp. 1-2

- Ram Ramesh and H. Raghav Rao
- Microeconomics and operations research: Their interactions and differences pp. 3-9

- Kenneth Arrow
- Guest editorial: Grand successes and failures in IT: Private and public sectors pp. 11-14

- Yogesh K. Dwivedi, David Wastell, Helle Zinner Henriksen and Rahul De’
- Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics pp. 15-29

- Marijn Janssen, Haiko Voort and Anne Fleur Veenstra
- Technology assimilation through conjunctures – a look at IS use in retail pp. 31-50

- Ravi Anand Rao and Rahul De’
- Repertoires of collaboration for common operating pictures of disasters and extreme events pp. 51-65

- Deborah Bunker, Linda Levine and Carol Woody
- Knowledge transfer planning and execution in offshore outsourcing: An applied approach pp. 67-77

- Sabine Madsen, Keld Bødker and Thomas Tøth
- Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER) pp. 79-93

- Laurence Brooks and M. Shahanoor Alam
- The formation of technology mental models: the case of voluntary use of technology in organizational setting pp. 95-108

- Amany Elbanna and Henrik C. J. Linderoth
- Developing and validating a hierarchical model of external responsiveness: A study on RFID technology pp. 109-125

- Mohammad Alamgir Hossain and Mohammed Quaddus
- Investigating success of an e-government initiative: Validation of an integrated IS success model pp. 127-142

- Nripendra P. Rana, Yogesh K. Dwivedi, Michael D. Williams and Vishanth Weerakkody
- Research on information systems failures and successes: Status update and future directions pp. 143-157

- Yogesh K. Dwivedi, David Wastell, Sven Laumer, Helle Zinner Henriksen, Michael D. Myers, Deborah Bunker, Amany Elbanna, M. N. Ravishankar and Shirish C. Srivastava
- Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty pp. 159-175

- Jung Lee, Jae-Nam Lee and Bernard C. Y. Tan
- Lemon complaints: When online auctions go sour pp. 177-191

- Judy E. Scott, Dawn G. Gregg and Jae Hoon Choi
- Profiling internet banking users: A knowledge discovery in data mining process model based approach pp. 193-215

- Gunjan Mansingh, Lila Rao, Kweku-Muata Osei-Bryson and Annette Mills
- Information systems frontiers: Keyword analysis and classification pp. 217-237

- Chulhwan Chris Bang
|
On this page- 2015, volume 17
-
Articles 6
Articles 5 Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
On this page- 2015, volume 17
-
Articles 6
Articles 5 Articles 4 Articles 3 Articles 2 Articles 1
Other years2025, volume 27
2024, volume 26
2023, volume 25
2022, volume 24
2021, volume 23
2020, volume 22
2019, volume 21
2018, volume 20
2017, volume 19
2016, volume 18
2014, volume 16
2013, volume 15
2012, volume 14
2011, volume 13
2010, volume 12
2009, volume 11
2008, volume 10
2007, volume 9
2006, volume 8
2005, volume 7
2004, volume 6
2003, volume 5
2002, volume 4
2001, volume 3
2000, volume 2
1999, volume 1
Undated
|
|