default search action
Information Systems Frontiers, Volume 22
Volume 22, Number 1, February 2020
- Ram Ramesh, H. Raghav Rao:
ISF Editorial 2020. 1-9 - John Leslie King, Andrew J. Ehrenberg:
The Productivity Vampires. 11-15 - Xiaofan Li, Andrew B. Whinston:
Analyzing Cryptocurrencies. 17-22 - Satyen Mukherjee:
Emerging Frontiers in Smart Environment and Healthcare - A Vision. 23-27 - Andrew J. Ehrenberg, John Leslie King:
Blockchain in Context. 29-35 - Bernardo A. Huberman, Bob Lund:
A Quantum Router For The Entangled Web. 37-43 - Jae Kyu Lee, Younghoon Chang, Hun Yeong Kwon, Beopyeon Kim:
Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach. 45-57 - Victor Chang:
Presenting Cloud Business Performance for Manufacturing Organizations. 59-75 - Lina Zhou, Uchechukwuka Amadi, Dongsong Zhang:
Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location. 77-90 - Ravi Thambusamy, Prashant Palvia:
U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality. 91-111 - Kichan Nam, Jeff Baker, Norita B. Ahmad, Jahyun Goo:
Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM). 113-130 - Federico Cabitza, Angela Locoro, Carlo Batini:
Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach. 131-148 - Xiuyuan Gong, Matthew K. O. Lee, Zhiying Liu, Xiabing Zheng:
Examining the Role of Tie Strength in Users' Continuance Intention of Second-Generation Mobile Instant Messaging Services. 149-170 - Jongwoo Kim, Richard L. Baskerville, Yi Ding:
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online. 171-185 - Mansooreh Ezhei, Behrouz Tork Ladani:
Interdependency Analysis in Security Investment against Strategic Attacks. 187-201 - Andy Weeger, Xuequn Wang, Heiko Gewald, Mahesh S. Raisinghani, Otávio P. Sanchez, Gerald G. Grant, Siddhi Pittayachawan:
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. 203-219 - Martin (Dae Youp) Kang, Anat Hovav:
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation. 221-242 - Carlos Tam, Diogo Santos, Tiago Oliveira:
Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model. 243-257 - Jun Sun:
Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective. 259-271 - Chichang Jou:
Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules. 273
Volume 22, Number 2, April 2020
- Amany R. Elbanna, Yogesh Dwivedi, Deborah Bunker, David Wastell:
The Search for Smartness in Working, Living and Organising: Beyond the 'Technomagic'. 275-280 - Peter M. Bednar, Christine E. Welch:
Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems. 281-298 - Olivia Benfeldt Nielsen, John Stouby Persson, Sabine Madsen:
Data Governance as a Collective Action Problem. 299-313 - Prabhsimran Singh, Yogesh K. Dwivedi, Karanjeet Singh Kahlon, Ravinder Singh Sawhney, Ali Abdallah Alalwan, Nripendra P. Rana:
Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing. 315-337 - Milad Mirbabaie, Deborah Bunker, Stefan Stieglitz, Annika Deubel:
Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication. 339-351 - Bendik Bygstad, Egil Øvrelid, Thomas Lie, Magnus Bergquist:
Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital. 353-364 - Khalid Alzadjali, Amany R. Elbanna:
Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman. 365-380 - Steven Alter:
Making Sense of Smartness in the Context of Smart Devices and Smart Systems. 381-393 - Stefan Stieglitz, Christian Meske, Björn Ross, Milad Mirbabaie:
Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics. 395-409 - Abdullah Mohammed Baabdullah:
Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness. 411-427 - Hadi Karimikia, Narges Safari, Harminder Singh:
Being useful: How information systems professionals influence the use of information systems in enterprises. 429-453 - Alan Serrano, Javier García Guzmán, Georgios Xydopoulos, Ali Tarhini:
Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective. 455-474 - Cheng-Kui Huang, Tawei Wang, Tzu-Yen Huang:
Initial Evidence on the Impact of Big Data Implementation on Firm Performance. 475-487 - Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu:
Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 489-507 - Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu:
Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 509-510 - Thompson S. H. Teo, Sojung Lucia Kim, Li Jiang:
E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives. 511-528
Volume 22, Number 3, June 2020
- Priya Seetharaman, Saji K. Mathew, Maung K. Sein, Ravindra Babu Tallamraju:
Being (more) Human in a Digitized World. 529-532 - Jaana Porra, Mary C. Lacity, Michael S. Parks:
"Can Computer Based Human-Likeness Endanger Humanness?" - A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can't Have". 533-547 - Simon Kloker:
Non-addictive Information Systems. 549-562 - Kiljae K. Lee, Kyung Young Lee, Lorn Sheehan:
Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users' Perception of Group Harmony. 563-583 - Linus Kendall, Bidisha Chaudhuri, Apoorva Bhalla:
Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India. 585-605 - Abhipsa Pal, Rahul De', Tejaswini C. Herath:
The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India. 607-631 - Rishikesan Parthiban, Israr Qureshi, Somprakash Bandyopadhyay, Babita Bhatt, Saravana Jaikumar:
Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized. 633-653 - Petri Kannisto, David Hästbacka, Arto Marttinen:
Information Exchange Architecture for Collaborative Industrial Ecosystem. 655-670 - Petri Kannisto, David Hästbacka, Arto Marttinen:
Correction to: Information Exchange Architecture for Collaborative Industrial Ecosystem. 671 - Jyoti Choudrie, Sutee Pheeraphuttharangkoon, Soheil Davari:
The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study. 673-695 - Mandy Yan Dang, Gavin Yulei Zhang, Susan A. Brown, Hsinchun Chen:
Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system. 697-718 - Chul Woo Yoo:
An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management. 719-734 - C. Derrick Huang, Jahyun Goo, Ravi S. Behara, Ankur Agarwal:
Clinical Decision Support System for Managing COPD-Related Readmission Risk. 735-747 - Kamran Mahroof, Vishanth Weerakkody, Dilek Önkal-Atay, Zahid Hussain:
Technology as a Disruptive Agent: Intergenerational Perspectives. 749-770 - Ehsan Alirezaei, Saeed Parsa:
Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network. 771-787 - (Withdrawn) RETRACTED ARTICLE: A systematic review on post-implementation evaluation models of enterprise architecture artefacts. 789
Volume 22, Number 4, August 2020
- Dimosthenis Anagnostopoulos, Thanos Papadopoulos, Teta Stamati, Maria Elisavet Balta:
Policy and Information Systems Implementation: the Greek Property Tax Information System Case. 791-802 - Irfan Kanat, T. S. Raghu, Ajay S. Vinze:
Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market. 803-814 - Hongyan Dai, Ling Ge, Yali Liu:
Information Matters: an Empirical Study of the Efficiency of On-Demand Services. 815-827 - Qinghua Zheng, Chutong Yang, Haijun Yang, Jianhe Zhou:
A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things. 829-842 - Hua Dai, Al F. Salam:
An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME). 843-862 - Amarjeet Prajapati, Jitender Kumar Chhabra:
Information-Theoretic Remodularization of Object-Oriented Software Systems. 863-880 - Jinbi Yang, Chunxiao Yin:
Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees' Perceptions of Presenteeism: from Both Individual and Social Perspectives. 881-895 - Rohit Valecha:
An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407. 897-909 - Gavin Yulei Zhang, Mandy Yan Dang, Hsinchun Chen:
An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking. 911-925 - Aymeric Hemon, Barbara Lyonnet, Frantz Rowe, Brian Fitzgerald:
From Agile to DevOps: Smart Skills and Collaborations. 927-945 - Dan Wu, Guofang Nan, Minqiang Li:
Optimal Piracy Control: Should a Firm Implement Digital Rights Management? 947-960 - Roman Lukyanenko, Andrea Wiggins, Holly K. Rosser:
Citizen Science: An Information Quality Research Frontier. 961-983 - Ramzi El-Haddadeh:
Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services. 985-999
Volume 22, Number 5, October 2020
- Lydia Bouzar-Benlabiod, Stuart H. Rubin:
Heuristic Acquisition for Data Science. 1001-1007 - Doruk Sen, Cem Çagri Dönmez, Umman Mahir Yildirim:
A Hybrid Bi-level Metaheuristic for Credit Scoring. 1009-1019 - Qianwen Xu, Victor Chang, Ching-Hsien Hsu:
Event Study and Principal Component Analysis Based on Sentiment Analysis - A Combined Methodology to Study the Stock Market with an Empirical Study. 1021-1037 - Mohammed Kuko, Mohammad Pourhomayoun:
Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods. 1039-1051 - Haiman Tian, Shu-Ching Chen, Mei-Ling Shyu:
Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification. 1053-1066 - Salima Smiti, Makram Soui:
Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE. 1067-1083 - Narges Manouchehri, Hieu Nguyen, Pantea Koochemeshkian, Nizar Bouguila, Wentao Fan:
Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions. 1085-1093 - Sabin Kafle, Nisansa de Silva, Dejing Dou:
An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering. 1095-1111 - Justin M. Johnson, Taghi M. Khoshgoftaar:
The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data. 1113-1131 - Lifeng Mu, Vijayan Sugumaran, Fangyuan Wang:
A Hybrid Genetic Algorithm for Software Architecture Re-Modularization. 1133-1161 - Matti Mäntymäki, Sami Hyrynsalmi, Antti Koskenvoima:
How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics. 1163-1178 - Pedro Antunes, José A. Pino, Mary Tate, Alistair Barros:
Eliciting Process Knowledge Through Process Stories. 1179-1201 - Elvira Ismagilova, Emma L. Slade, Nripendra P. Rana, Yogesh K. Dwivedi:
The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis. 1203-1226 - Emmanuel W. Ayaburi, Jaeung Lee, Michele Maasberg:
Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective. 1227-1240 - Hwee-Joo Kam, Thomas Mattson, Sanjay Goel:
A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. 1241-1264
Volume 22, Number 6, December 2020
- Jorge Martínez Gil, Alejandra Lorena Paoletti, Mario Pichler:
A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles. 1265-1274 - Fereshteh Ghahramani, Jingguo Wang:
Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective. 1275-1290 - Dunlu Peng, Yinrui Wang, Cong Liu, Zhang Chen:
TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition. 1291-1304 - Samar Mouakket, Yuan Sun:
Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender. 1305-1321 - Hamed Majidi Zolbanin, Dursun Delen, Durand Crosby, David Wright:
A Predictive Analytics-Based Decision Support System for Drug Courts. 1323-1342 - Xiongfei Cao, Ali Nawaz Khan, Ahsan Ali, Naseer Abbas Khan:
Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users' Discontinuous Usage Behavior in SNSs. 1343-1356 - Christie Pei-Yee Chin, Nina Evans, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks. 1357-1376 - Lawrence Bunnell, Kweku-Muata Osei-Bryson, Victoria Y. Yoon:
RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers. 1377-1418 - Kai Klinker, Manuel Wiesche, Helmut Krcmar:
Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation. 1419-1431 - Duong Dang, Samuli Pekkola:
Institutional Perspectives on the Process of Enterprise Architecture Adoption. 1433-1445 - Yong Sun, Wenan Tan:
Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing. 1447-1465 - Juan Du, Hengqing Jing, Kim-Kwang Raymond Choo, Vijayan Sugumaran, Daniel Castro-Lacouture:
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain. 1467-1485 - Guilherme Costa Wiedenhöft, Edimara M. Luciano, Gabriela Viale Pereira:
Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations. 1487-1504 - Wafa Bouaynaya:
Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method. 1505-1518 - Amit Rathee, Jitender Kumar Chhabra:
Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans. 1519-1537 - Yanxin Wang, Jian Li, Xi Zhao, Gengzhong Feng, Xin (Robert) Luo:
Using Mobile Phone Data for Emergency Management: a Systematic Literature Review. 1539-1559 - Bernardo A. Huberman, Bob Lund, Jing Wang:
Quantum Secured Internet Transport. 1561-1567
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.