EconPapers    
Economics at your fingertips  
 

Information Systems Frontiers

1999 - 2025

Current editor(s): Ram Ramesh and Raghav Rao

From Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


2015, volume 17, articles 6

Special section on business process analytics pp. 1191-1194 Downloads
Karl R. Lang, Vojislav B. Misic and Leon J. Zhao
An intelligent approach to data extraction and task identification for process mining pp. 1195-1208 Downloads
Jiexun Li, Harry Jiannan Wang and Xue Bai
Semantics-based event log aggregation for process mining and analytics pp. 1209-1226 Downloads
Amit V. Deokar and Jie Tao
Examining micro-level knowledge sharing discussions in online communities pp. 1227-1238 Downloads
G. Alan Wang, Xiaomo Liu, Jianling Wang, Min Zhang and Weiguo Fan
The classification of hackers by knowledge exchange behaviors pp. 1239-1251 Downloads
Xiong Zhang, Alex Tsang, Wei T. Yue and Michael Chau
Workflow-aware attention tracking to enhance collaboration management pp. 1253-1264 Downloads
Shaokun Fan, Lele Kang and J. Leon Zhao
Collaborative personal profiling for web service ranking and recommendation pp. 1265-1282 Downloads
Wenge Rong, Baolin Peng, Yuanxin Ouyang, Kecheng Liu and Zhang Xiong
E-commerce web site loyalty: A cross cultural comparison pp. 1283-1299 Downloads
Jengchung Victor Chen, David C. Yen, Wannasri Pornpriphet and Andree E. Widjaja
Rough set based classification of real world Web services pp. 1301-1311 Downloads
Hala S. Own and Hamdi Yahyaoui
The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis pp. 1313-1333 Downloads
Pekka Kekolahti, Juuso Karikoski and Antti Riikonen
Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations pp. 1335-1352 Downloads
Heng-Li Yang and August F. Y. Chao
Diffusion of deception in social media: Social contagion effects and its antecedents pp. 1353-1367 Downloads
Arun Vishwanath
RFID in production and service systems: Technology, applications and issues pp. 1369-1380 Downloads
Nilgun Fescioglu-Unver, Sung Hee Choi, Dongmok Sheen and Soundar Kumara
Estimating trust value: A social network perspective pp. 1381-1400 Downloads
Wei-Lun Chang, Arleen N. Diaz and Patrick C. K. Hung
The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling pp. 1401-1425 Downloads
Jan Claes, Irene Vanderfeesten, Frederik Gailly, Paul Grefen and Geert Poels

2015, volume 17, articles 5

Advances in secure knowledge management in the big data era pp. 983-986 Downloads
Chittaranjan Hota, Shambhu Upadhyaya and Jamal Nazzal Al-Karaki
Surviving advanced persistent threats in a distributed environment – Architecture and analysis pp. 987-995 Downloads
Ruchika Mehresh and Shambhu Upadhyaya
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013 pp. 997-1005 Downloads
Jaeung Lee, Manish Agrawal and H. R. Rao
Secure and privacy preserving data processing support for active authentication pp. 1007-1015 Downloads
Yan Sun and Shambhu Upadhyaya
Game-theoretic strategies for IDS deployment in peer-to-peer networks pp. 1017-1028 Downloads
Pratik Narang and Chittaranjan Hota
Analysis of a multistage attack embedded in a video file pp. 1029-1037 Downloads
Hiran V. Nath and B. M. Mehtre
Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service pp. 1039-1056 Downloads
Kawaljeet Kaur Kapoor, Yogesh K. Dwivedi and Michael D. Williams
Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts pp. 1057-1076 Downloads
Mohammad Alamgir Hossain and Mohammed Quaddus
Social balance in signed networks pp. 1077-1095 Downloads
Xiaolong Zheng, Daniel Zeng and Fei-Yue Wang
Does better Internet access lead to more adoption? A new empirical study using household relocation pp. 1097-1110 Downloads
Junzhao Ma and Qingyi Huang
Measurements of mislead threshold of company graph distortion pp. 1111-1132 Downloads
Shaio Yan Huang, Tung-Hsien Wu, An-An Chiu and David C. Yen
How business process reengineering affects information technology investment and employee performance under different performance measurement pp. 1133-1144 Downloads
Shaio Yan Huang, Chao-Hsiung Lee, An-An Chiu and David C. Yen
Addressing the valuation problem in multi-round combinatorial auctions pp. 1145-1160 Downloads
Soumyakanti Chakraborty, Anup K. Sen and Amitava Bagchi
IPTV parental control: A collaborative model for the Social Web pp. 1161-1176 Downloads
Ana Fernández-Vilas, Rebeca P. Díaz-Redondo and Sandra Servia-Rodríguez
Understanding health information technology adoption: A synthesis of literature from an activity perspective pp. 1177-1190 Downloads
Jun Sun and Zhe Qu

2015, volume 17, articles 4

Special issue on agreement technologies pp. 707-711 Downloads
Carlos Iván Chesñevar, Eva Onaindia, Sascha Ossowski and George Vouros
Reasoning about reasons behind preferences using modal logic pp. 713-724 Downloads
Truls Pedersen, Sjur Dyrkolbotn and Thomas Ågotnes
Reasoning about the impacts of information sharing pp. 725-742 Downloads
Yuqing Tang, Federico Cerutti, Nir Oren and Chatschik Bisdikian
Subjective logic operators in trust assessment: an empirical study pp. 743-762 Downloads
Federico Cerutti, Lance M. Kaplan, Timothy J. Norman, Nir Oren and Alice Toniolo
From roles to standards: a dynamic maintenance approach using incentives pp. 763-778 Downloads
Ramón Hermoso, Henrique Lopes Cardoso and Maria Fasli
An ontological-based knowledge-representation formalism for case-based argumentation pp. 779-798 Downloads
Stella Heras, Vicente Botti and Vicente Julián
Service discovery acceleration with hierarchical clustering pp. 799-808 Downloads
Zijie Cong, Alberto Fernandez, Holger Billhardt and Marin Lujak
On the inaccuracy of numerical ratings: dealing with biased opinions in social networks pp. 809-825 Downloads
Roberto Centeno, Ramón Hermoso and Maria Fasli
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory pp. 827-844 Downloads
Ping Wang, Kuo-Ming Chao and Chi-Chun Lo
A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research pp. 845-856 Downloads
Kweku-Muata Osei-Bryson
Event-cloud platform to support decision-making in emergency management pp. 857-869 Downloads
Matthieu Lauras, Frédérick Benaben, Sébastien Truptil and Aurélie Charles
Networked enterprise business model alignment: A case study on smart living pp. 871-887 Downloads
Sam Solaimani, Harry Bouwman and Timo Itälä
E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks pp. 889-915 Downloads
Vishanth Weerakkody, Zahir Irani, Habin Lee, Ibrahim Osman and Nitham Hindi
Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron pp. 917-946 Downloads
Jakub Malý and Martin Nečaský
Intelligent drowsy eye detection using image mining pp. 947-960 Downloads
Ahmed Emam
VXQ: A visual query language for XML data pp. 961-981 Downloads
Ryan H. Choi and Raymond K. Wong

2015, volume 17, articles 3

Special section on the role of information technology in service delivery pp. 471-474 Downloads
Jaeki Song, Jeff Baker and Fred D. Davis
Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs) pp. 475-492 Downloads
Ravi Seethamraju
Improving service of online health information provision: A case of usage-driven design for health information portals pp. 493-511 Downloads
Bang Viet Nguyen, Frada Burstein and Julie Fisher
Categorizing consumer behavioral responses and artifact design features: The case of online advertising pp. 513-532 Downloads
Jian Tang, Ping Zhang and Philip Fei Wu
Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach pp. 533-546 Downloads
Miri Kim, Jaeki Song and Jason Triche
A meta-analysis of existing research on citizen adoption of e-government pp. 547-563 Downloads
Nripendra P. Rana, Yogesh K. Dwivedi and Michael D. Williams
Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs pp. 565-589 Downloads
Seokho Son and Kwang Mong Sim
Smart grid data analytics for digital protective relay event recordings pp. 591-600 Downloads
Tomo Popovic, Mladen Kezunovic and Bozo Krstajic
Examining the antecedent factors of online microsourcing pp. 601-617 Downloads
Baozhou Lu, Rudy Hirschheim and Andrew Schwarz
Comparative study of large information systems’ CSFs during their life cycle pp. 619-628 Downloads
Mojtaba Ashja, Akram Hadizadeh Moghadam and Hamid Bidram
An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries pp. 629-644 Downloads
Vincent Cho and Aman Chan
Customer revisit intention to restaurants: Evidence from online reviews pp. 645-657 Downloads
Xiangbin Yan, Jing Wang and Michael Chau
Investments in enterprise integration technology: An event study pp. 659-672 Downloads
Narcyz Roztocki and Heinz Roland Weistroffer
Failure recovery in distributed model composition with intelligent assistance pp. 673-689 Downloads
Hui Huang, Xueguang Chen and Zhiwu Wang
On achieving secure collaboration in supply chains pp. 691-705 Downloads
Sharad Barkataki and Hassan Zeineddine

2015, volume 17, articles 2

Introduction: Advances in IoT research and applications pp. 239-241 Downloads
Pan Wang, Ricardo Valerdi, Shangming Zhou and Ling Li
The internet of things: a survey pp. 243-259 Downloads
Shancang Li, Li Da Xu and Shanshan Zhao
The Internet of Things—A survey of topics and trends pp. 261-274 Downloads
Andrew Whitmore, Anurag Agarwal and Li Xu
The design of an electronic pedigree system for food safety pp. 275-287 Downloads
Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang and Li-Rong Zheng
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion pp. 289-319 Downloads
Zhibo Pang, Qiang Chen, Weili Han and Lirong Zheng
An integrated information system for snowmelt flood early-warning based on internet of things pp. 321-335 Downloads
Shifeng Fang, Lida Xu, Yunqiang Zhu, Yongqiang Liu, Zhihui Liu, Huan Pei, Jianwu Yan and Huifang Zhang
An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau pp. 337-350 Downloads
Fang Liu, Zhuming Bi, Eric L. Xu, Qin Ga, Quanyu Yang, Yingzhong Yang, Lan Ma, Tana Wuren and Rili Ge
The role of social media in supporting knowledge integration: A social capital analysis pp. 351-362 Downloads
Xiongfei Cao, Xitong Guo, Hefu Liu and Jibao Gu
Risk assessment model based on multi-agent systems for complex product design pp. 363-385 Downloads
Ni Li, Xiang Li, Yuzhong Shen, Zhuming Bi and Minghui Sun
The information technology workforce: A review and assessment of voluntary turnover research pp. 387-411 Downloads
Janice Lo
Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors pp. 413-422 Downloads
Tao Zhou
Security investment and information sharing under an alternative security breach probability function pp. 423-438 Downloads
Xing Gao, Weijun Zhong and Shue Mei
Optimal software design reuse policies: A control theoretic approach pp. 439-453 Downloads
Monica Johar, Vijay Mookerjee and Suresh Sethi
Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use pp. 455-470 Downloads
Hung-pin Shih, Kee-hung Lai and T. C. E. Cheng

2015, volume 17, articles 1

Foreword: Information Systems Frontiers pp. 1-2 Downloads
Ram Ramesh and H. Raghav Rao
Microeconomics and operations research: Their interactions and differences pp. 3-9 Downloads
Kenneth Arrow
Guest editorial: Grand successes and failures in IT: Private and public sectors pp. 11-14 Downloads
Yogesh K. Dwivedi, David Wastell, Helle Zinner Henriksen and Rahul De’
Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics pp. 15-29 Downloads
Marijn Janssen, Haiko Voort and Anne Fleur Veenstra
Technology assimilation through conjunctures – a look at IS use in retail pp. 31-50 Downloads
Ravi Anand Rao and Rahul De’
Repertoires of collaboration for common operating pictures of disasters and extreme events pp. 51-65 Downloads
Deborah Bunker, Linda Levine and Carol Woody
Knowledge transfer planning and execution in offshore outsourcing: An applied approach pp. 67-77 Downloads
Sabine Madsen, Keld Bødker and Thomas Tøth
Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER) pp. 79-93 Downloads
Laurence Brooks and M. Shahanoor Alam
The formation of technology mental models: the case of voluntary use of technology in organizational setting pp. 95-108 Downloads
Amany Elbanna and Henrik C. J. Linderoth
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology pp. 109-125 Downloads
Mohammad Alamgir Hossain and Mohammed Quaddus
Investigating success of an e-government initiative: Validation of an integrated IS success model pp. 127-142 Downloads
Nripendra P. Rana, Yogesh K. Dwivedi, Michael D. Williams and Vishanth Weerakkody
Research on information systems failures and successes: Status update and future directions pp. 143-157 Downloads
Yogesh K. Dwivedi, David Wastell, Sven Laumer, Helle Zinner Henriksen, Michael D. Myers, Deborah Bunker, Amany Elbanna, M. N. Ravishankar and Shirish C. Srivastava
Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty pp. 159-175 Downloads
Jung Lee, Jae-Nam Lee and Bernard C. Y. Tan
Lemon complaints: When online auctions go sour pp. 177-191 Downloads
Judy E. Scott, Dawn G. Gregg and Jae Hoon Choi
Profiling internet banking users: A knowledge discovery in data mining process model based approach pp. 193-215 Downloads
Gunjan Mansingh, Lila Rao, Kweku-Muata Osei-Bryson and Annette Mills
Information systems frontiers: Keyword analysis and classification pp. 217-237 Downloads
Chulhwan Chris Bang
Page updated 2025-04-16