


default search action
Information Systems Frontiers, Volume 22
Volume 22, Number 1, February 2020
- Ram Ramesh, H. Raghav Rao:

ISF Editorial 2020. 1-9 - John Leslie King, Andrew J. Ehrenberg:

The Productivity Vampires. 11-15 - Xiaofan Li, Andrew B. Whinston:

Analyzing Cryptocurrencies. 17-22 - Satyen Mukherjee:

Emerging Frontiers in Smart Environment and Healthcare - A Vision. 23-27 - Andrew J. Ehrenberg, John Leslie King:

Blockchain in Context. 29-35 - Bernardo A. Huberman, Bob Lund:

A Quantum Router For The Entangled Web. 37-43 - Jae Kyu Lee, Younghoon Chang

, Hun Yeong Kwon, Beopyeon Kim:
Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach. 45-57 - Victor Chang

:
Presenting Cloud Business Performance for Manufacturing Organizations. 59-75 - Lina Zhou, Uchechukwuka Amadi, Dongsong Zhang:

Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location. 77-90 - Ravi Thambusamy, Prashant Palvia

:
U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality. 91-111 - Kichan Nam

, Jeff Baker
, Norita B. Ahmad
, Jahyun Goo:
Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM). 113-130 - Federico Cabitza

, Angela Locoro
, Carlo Batini:
Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach. 131-148 - Xiuyuan Gong, Matthew K. O. Lee

, Zhiying Liu, Xiabing Zheng:
Examining the Role of Tie Strength in Users' Continuance Intention of Second-Generation Mobile Instant Messaging Services. 149-170 - Jongwoo Kim, Richard L. Baskerville

, Yi Ding:
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online. 171-185 - Mansooreh Ezhei

, Behrouz Tork Ladani
:
Interdependency Analysis in Security Investment against Strategic Attacks. 187-201 - Andy Weeger, Xuequn Wang

, Heiko Gewald
, Mahesh S. Raisinghani, Otávio P. Sanchez
, Gerald G. Grant
, Siddhi Pittayachawan
:
Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives. 203-219 - Martin (Dae Youp) Kang, Anat Hovav:

Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation. 221-242 - Carlos Tam

, Diogo Santos, Tiago Oliveira
:
Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model. 243-257 - Jun Sun

:
Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective. 259-271 - Chichang Jou

:
Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules. 273
Volume 22, Number 2, April 2020
- Amany R. Elbanna, Yogesh Dwivedi

, Deborah Bunker, David Wastell:
The Search for Smartness in Working, Living and Organising: Beyond the 'Technomagic'. 275-280 - Peter M. Bednar

, Christine E. Welch
:
Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems. 281-298 - Olivia Benfeldt Nielsen

, John Stouby Persson, Sabine Madsen:
Data Governance as a Collective Action Problem. 299-313 - Prabhsimran Singh, Yogesh K. Dwivedi

, Karanjeet Singh Kahlon, Ravinder Singh Sawhney, Ali Abdallah Alalwan
, Nripendra P. Rana:
Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing. 315-337 - Milad Mirbabaie

, Deborah Bunker, Stefan Stieglitz, Annika Deubel
:
Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication. 339-351 - Bendik Bygstad, Egil Øvrelid

, Thomas Lie, Magnus Bergquist:
Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital. 353-364 - Khalid Alzadjali

, Amany R. Elbanna:
Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman. 365-380 - Steven Alter

:
Making Sense of Smartness in the Context of Smart Devices and Smart Systems. 381-393 - Stefan Stieglitz

, Christian Meske, Björn Ross
, Milad Mirbabaie:
Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics. 395-409 - Abdullah Mohammed Baabdullah

:
Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness. 411-427 - Hadi Karimikia, Narges Safari

, Harminder Singh
:
Being useful: How information systems professionals influence the use of information systems in enterprises. 429-453 - Alan Serrano

, Javier García Guzmán, Georgios Xydopoulos, Ali Tarhini
:
Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective. 455-474 - Cheng-Kui Huang, Tawei Wang

, Tzu-Yen Huang:
Initial Evidence on the Impact of Big Data Implementation on Firm Performance. 475-487 - Paul Rimba, An Binh Tran, Ingo Weber

, Mark Staples, Alexander Ponomarev, Xiwei Xu
:
Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 489-507 - Paul Rimba, An Binh Tran, Ingo Weber, Mark Staples, Alexander Ponomarev, Xiwei Xu:

Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution. 509-510 - Thompson S. H. Teo, Sojung Lucia Kim, Li Jiang:

E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives. 511-528
Volume 22, Number 3, June 2020
- Priya Seetharaman

, Saji K. Mathew, Maung K. Sein, Ravindra Babu Tallamraju:
Being (more) Human in a Digitized World. 529-532 - Jaana Porra, Mary C. Lacity, Michael S. Parks:

"Can Computer Based Human-Likeness Endanger Humanness?" - A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can't Have". 533-547 - Simon Kloker:

Non-addictive Information Systems. 549-562 - Kiljae K. Lee

, Kyung Young Lee, Lorn Sheehan:
Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users' Perception of Group Harmony. 563-583 - Linus Kendall

, Bidisha Chaudhuri
, Apoorva Bhalla:
Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India. 585-605 - Abhipsa Pal

, Rahul De', Tejaswini C. Herath:
The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India. 607-631 - Rishikesan Parthiban, Israr Qureshi

, Somprakash Bandyopadhyay, Babita Bhatt
, Saravana Jaikumar
:
Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized. 633-653 - Petri Kannisto

, David Hästbacka, Arto Marttinen:
Information Exchange Architecture for Collaborative Industrial Ecosystem. 655-670 - Petri Kannisto

, David Hästbacka, Arto Marttinen:
Correction to: Information Exchange Architecture for Collaborative Industrial Ecosystem. 671 - Jyoti Choudrie

, Sutee Pheeraphuttharangkoon, Soheil Davari
:
The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study. 673-695 - Mandy Yan Dang, Gavin Yulei Zhang, Susan A. Brown

, Hsinchun Chen:
Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system. 697-718 - Chul Woo Yoo

:
An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management. 719-734 - C. Derrick Huang, Jahyun Goo

, Ravi S. Behara
, Ankur Agarwal:
Clinical Decision Support System for Managing COPD-Related Readmission Risk. 735-747 - Kamran Mahroof

, Vishanth Weerakkody, Dilek Önkal-Atay
, Zahid Hussain:
Technology as a Disruptive Agent: Intergenerational Perspectives. 749-770 - Ehsan Alirezaei, Saeed Parsa

:
Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network. 771-787 - (Withdrawn) RETRACTED ARTICLE: A systematic review on post-implementation evaluation models of enterprise architecture artefacts. 789

Volume 22, Number 4, August 2020
- Dimosthenis Anagnostopoulos, Thanos Papadopoulos, Teta Stamati, Maria Elisavet Balta:

Policy and Information Systems Implementation: the Greek Property Tax Information System Case. 791-802 - Irfan Kanat

, T. S. Raghu, Ajay S. Vinze:
Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market. 803-814 - Hongyan Dai, Ling Ge

, Yali Liu:
Information Matters: an Empirical Study of the Efficiency of On-Demand Services. 815-827 - Qinghua Zheng, Chutong Yang, Haijun Yang, Jianhe Zhou:

A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things. 829-842 - Hua Dai, Al F. Salam

:
An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME). 843-862 - Amarjeet Prajapati

, Jitender Kumar Chhabra
:
Information-Theoretic Remodularization of Object-Oriented Software Systems. 863-880 - Jinbi Yang, Chunxiao Yin:

Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees' Perceptions of Presenteeism: from Both Individual and Social Perspectives. 881-895 - Rohit Valecha:

An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407. 897-909 - Gavin Yulei Zhang, Mandy Yan Dang, Hsinchun Chen:

An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking. 911-925 - Aymeric Hemon

, Barbara Lyonnet
, Frantz Rowe, Brian Fitzgerald:
From Agile to DevOps: Smart Skills and Collaborations. 927-945 - Dan Wu, Guofang Nan

, Minqiang Li:
Optimal Piracy Control: Should a Firm Implement Digital Rights Management? 947-960 - Roman Lukyanenko, Andrea Wiggins

, Holly K. Rosser:
Citizen Science: An Information Quality Research Frontier. 961-983 - Ramzi El-Haddadeh

:
Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services. 985-999
Volume 22, Number 5, October 2020
- Lydia Bouzar-Benlabiod, Stuart H. Rubin:

Heuristic Acquisition for Data Science. 1001-1007 - Doruk Sen

, Cem Çagri Dönmez, Umman Mahir Yildirim:
A Hybrid Bi-level Metaheuristic for Credit Scoring. 1009-1019 - Qianwen Xu

, Victor Chang
, Ching-Hsien Hsu:
Event Study and Principal Component Analysis Based on Sentiment Analysis - A Combined Methodology to Study the Stock Market with an Empirical Study. 1021-1037 - Mohammed Kuko

, Mohammad Pourhomayoun:
Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods. 1039-1051 - Haiman Tian

, Shu-Ching Chen, Mei-Ling Shyu:
Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification. 1053-1066 - Salima Smiti, Makram Soui:

Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE. 1067-1083 - Narges Manouchehri

, Hieu Nguyen, Pantea Koochemeshkian, Nizar Bouguila, Wentao Fan
:
Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions. 1085-1093 - Sabin Kafle

, Nisansa de Silva, Dejing Dou:
An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering. 1095-1111 - Justin M. Johnson

, Taghi M. Khoshgoftaar:
The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data. 1113-1131 - Lifeng Mu, Vijayan Sugumaran

, Fangyuan Wang:
A Hybrid Genetic Algorithm for Software Architecture Re-Modularization. 1133-1161 - Matti Mäntymäki

, Sami Hyrynsalmi
, Antti Koskenvoima:
How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics. 1163-1178 - Pedro Antunes

, José A. Pino, Mary Tate
, Alistair Barros
:
Eliciting Process Knowledge Through Process Stories. 1179-1201 - Elvira Ismagilova

, Emma L. Slade
, Nripendra P. Rana
, Yogesh K. Dwivedi
:
The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis. 1203-1226 - Emmanuel W. Ayaburi, Jaeung Lee, Michele Maasberg:

Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective. 1227-1240 - Hwee-Joo Kam

, Thomas Mattson, Sanjay Goel:
A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. 1241-1264
Volume 22, Number 6, December 2020
- Jorge Martinez-Gil

, Alejandra Lorena Paoletti, Mario Pichler:
A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles. 1265-1274 - Fereshteh Ghahramani, Jingguo Wang

:
Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective. 1275-1290 - Dunlu Peng

, Yinrui Wang, Cong Liu, Zhang Chen:
TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition. 1291-1304 - Samar Mouakket

, Yuan Sun
:
Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender. 1305-1321 - Hamed Majidi Zolbanin, Dursun Delen, Durand Crosby, David Wright:

A Predictive Analytics-Based Decision Support System for Drug Courts. 1323-1342 - Xiongfei Cao, Ali Nawaz Khan, Ahsan Ali

, Naseer Abbas Khan
:
Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users' Discontinuous Usage Behavior in SNSs. 1343-1356 - Christie Pei-Yee Chin

, Nina Evans
, Charles Zhechao Liu, Kim-Kwang Raymond Choo
:
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks. 1357-1376 - Lawrence Bunnell

, Kweku-Muata Osei-Bryson, Victoria Y. Yoon:
RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers. 1377-1418 - Kai Klinker, Manuel Wiesche

, Helmut Krcmar:
Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation. 1419-1431 - Duong Dang

, Samuli Pekkola:
Institutional Perspectives on the Process of Enterprise Architecture Adoption. 1433-1445 - Yong Sun

, Wenan Tan:
Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing. 1447-1465 - Juan Du, Hengqing Jing, Kim-Kwang Raymond Choo

, Vijayan Sugumaran
, Daniel Castro-Lacouture
:
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain. 1467-1485 - Guilherme Costa Wiedenhöft

, Edimara M. Luciano
, Gabriela Viale Pereira:
Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations. 1487-1504 - Wafa Bouaynaya

:
Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method. 1505-1518 - Amit Rathee

, Jitender Kumar Chhabra
:
Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans. 1519-1537 - Yanxin Wang, Jian Li, Xi Zhao, Gengzhong Feng, Xin (Robert) Luo

:
Using Mobile Phone Data for Emergency Management: a Systematic Literature Review. 1539-1559 - Bernardo A. Huberman

, Bob Lund, Jing Wang:
Quantum Secured Internet Transport. 1561-1567

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














