


Остановите войну!
for scientists:


default search action
Information Systems Frontiers, Volume 18
Volume 18, Number 1, February 2016
- Gert-Jan de Vreede
, Pedro Antunes
, Julita Vassileva
, Marco Aurélio Gerosa, Kewen Wu:
Collaboration technology in teams and organizations: Introduction to the special issue. 1-6 - Francisco J. Gutierrez, Sergio F. Ochoa, Gustavo Zurita
, Nelson Baloian
:
Understanding student participation in undergraduate course communities: A case study. 7-21 - Diane E. Strode
:
A dependency taxonomy for agile software development projects. 23-46 - Nguyen Hoang Thuan
, Pedro Antunes
, David Johnstone:
Factors influencing the decision to crowdsource: A systematic literature review. 47-68 - Pedro O. Rossel
, Valeria Herskovic, Erika Ormeño:
Creating a family of collaborative applications for emergency management in the firefighting sub-domain. 69-84 - Mikhail Fominykh
, Ekaterina Prasolova-Førland, Monica Divitini
, Sobah Abbas Petersen:
Boundary objects in collaborative work and learning. 85-102 - Luís Duarte, Luís Carriço
:
Designing for geo-referenced in-situ therapeutic scenarios. 103-123 - Nelson Baloian
, Gustavo Zurita
:
Achieving better usability of software supporting learning activities of large groups. 125-144 - Sayooran Nagulendra, Julita Vassileva
:
Providing awareness, explanation and control of personalized filtering in a social networking site. 145-158 - Paras Jain
, Vipin Tyagi
:
A survey of edge-preserving image denoising methods. 159-170 - Yasser A. Khan, Mohamed El-Attar
:
Using model transformation to refactor use case models based on antipatterns. 171-204 - Chao Zhu, Qiang Zhu, Calisto Zuzarte, Wenbin Ma:
Optimization of generic progressive queries based on dependency analysis and materialized views. 205-231
Volume 18, Number 2, April 2016
- Atreyi Kankanhalli, Jungpil Hahn, Sharon Tan, Gordon Gao:
Big data and analytics in healthcare: Introduction to the special section. 233-235 - Prem Timsina, Jun Liu, Omar F. El-Gayar
:
Advanced analytics for the automation of medical systematic reviews. 237-252 - Changgyu Yang, Hee-Jun Lee:
A study on the antecedents of healthcare information protection intention. 253-263 - Tao Zhou, Yaobin Lu, Bin Wang
:
Examining online consumers' initial trust building from an elaboration likelihood model perspective. 265-275 - Evelina Pencheva
, Ivaylo Atanasov
:
Engineering of web services for internet of things applications. 277-292 - Herbjørn Nysveen, Per E. Pedersen:
Consumer adoption of RFID-enabled services. Applying an extended UTAUT model. 293-314 - Kishor Vaidya, John Campbell
:
Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency. 333-348 - Robert B. K. Brown, Ghassan Beydoun
, Graham Low, William John Tibben, Reza Zamani, Francisco García-Sánchez
, Rodrigo Martínez-Béjar
:
Computationally efficient ontology selection in software requirement planning. 349-358 - Jörg Becker
, Patrick Delfmann, Hanns-Alexander Dietrich, Matthias Steinhorst, Mathias Eggert:
Business process compliance checking - applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. 359-405
Volume 18, Number 3, June 2016
- Haluk Demirkan, James C. Spohrer:
Emerging service orientations and transformations (SOT). 407-411 - Mohan Baruwal Chhetri
, Sergei Chichin, Quoc Bao Vo, Ryszard Kowalczyk
:
Smart CloudBench - A framework for evaluating cloud infrastructure performance. 413-428 - Mustafa Hashmi, Guido Governatori
, Moe Thandar Wynn
:
Normative requirements for regulatory compliance: An abstract formal framework. 429-455 - Eng K. Chew:
iSIM: An integrated design method for commercializing service innovation. 457-478 - Olivera Marjanovic
, Vijaya Murthy:
From product-centric to customer-centric services in a financial institution - exploring the organizational challenges of the transition process. 479-497 - George Joukhadar
, Fethi A. Rabhi:
SOA in practice - a study of governance aspects. 499-510 - Weisi Chen
, Fethi A. Rabhi:
Enabling user-driven rule management in event data analysis. 511-528 - Laor Boongasame
, Farhad Daneshgar:
An awareness-based meta-mechanism for e-commerce buyer coalitions. 529-540 - Ralph Foorthuis
, Marlies van Steenbergen, Sjaak Brinkkemper, Wiel A. G. Bruls:
A theory building study of enterprise architecture practices and benefits. 541-564 - Yong Sun
, WenAn Tan, Ling Xia Li, Weiming Shen
, Zhuming Bi, Xiaoming Hu:
A new method to identify collaborative partners in social service provider networks. 565-578 - Vinodh Krishnaraju
, Saji K. Mathew
, Vijayan Sugumaran
:
Web personalization for user acceptance of technology: An empirical investigation of E-government services. 579-595 - Soe-Tsyr Daphne Yuan, Peng-Wei Chiu:
Persuasive narrative advertisement generator: A microenterprise service innovation perspective. 597-619 - Kim Hua Tan
, Wai Peng Wong
, Leanne Chung
:
Information and Knowledge Leakage in Supply Chain. 621-638
Volume 18, Number 4, August 2016
- Quan Z. Sheng
, Xue Li
, Anne H. H. Ngu, Yongrui Qin
, Dong Xie:
Guest editorial: web of things. 639-643 - Mohammad Alamgir Hossain
, Mohammed Quaddus, Nazrul Islam:
Developing and validating a model explaining the assimilation process of RFID: An empirical study. 645-663 - Sabrina Sicari, Cinzia Cappiello
, Francesco De Pellegrini, Daniele Miorandi, Alberto Coen-Porisini
:
A security-and quality-aware system architecture for Internet of Things. 665-677 - Eric G. Stephan
, Todd Elsethagen, Larry K. Berg
, Matthew C. Macduff, Patrick R. Paulson, Will J. Shaw
, Chitra Sivaraman, William Smith, Adam S. Wynne:
Semantic catalog of things, services, and data to support a wind data management facility. 679-691 - Manoj A. Thomas
, Daniela Costa, Tiago Oliveira
:
Assessing the role of IT-enabled process virtualization on green IT adoption. 693-710 - Lixin Shen, Hong Wang, Li Da Xu, Xue Ma, Sohail S. Chaudhry
, Wu He:
Identity management based on PCA and SVM. 711-716 - Remco M. Dijkman
, Sander Vincent Lammers, Ad de Jong
:
Properties that influence business process management maturity and its effect on organizational performance. 717-734 - Mehrdad Ashtiani
, Mohammad Abdollahi Azgomi
:
A formulation of computational trust based on quantum decision theory. 735-764 - Fernando Terroso-Saenz
, Mercedes Valdés-Vela
, Antonio F. Skarmeta-Gómez
:
A complex event processing approach to detect abnormal behaviours in the marine environment. 765-780 - Maxime Bernaert, Geert Poels
, Monique Snoeck
, Manu De Backer:
CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises. 781-818
Volume 18, Number 5, October 2016
- Thouraya Bouabana-Tebibel, Stuart H. Rubin:
Towards common reusable semantics. 819-823 - Marcus Kessel, Colin Atkinson
:
Ranking software components for reuse based on non-functional properties. 825-853 - Mustafa Berk Duran, Gunter Mussbacher:
Investigation of feature run-time conflicts on goal model-based reuse. 855-875 - Chao Chen, Mei-Ling Shyu, Shu-Ching Chen:
Weighted subspace modeling for semantic concept retrieval using gaussian mixture models. 877-889 - Azadeh Jahanbanifar, Ferhat Khendek
, Maria Toeroe:
Semantic weaving of configuration fragments into a consistent system configuration. 891-908 - René Rydhof Hansen
, Kim Guldstrand Larsen, Mads Chr. Olesen, Erik Ramsgaard Wognsen:
Formal modelling and analysis of Bitflips in ARM assembly code. 909-925 - Johanna Nellen, Kai Driessen, Martin R. Neuhäußer, Erika Ábrahám
, Benedikt Wolters:
Two CEGAR-based approaches for the safety verification of PLC-controlled plants. 927-952 - Daniel R. Harris
:
Foundations of reusable and interoperable facet models using category theory. 953-965 - André Didier, Alexandre Mota:
An algebra of temporal faults. 967-980 - Stuart H. Rubin, Thouraya Bouabana-Tebibel, Yasmin Hoadjli
:
On the empirical justification of theoretical heuristic transference and learning. 981-994 - Norris Syed Abdullah
, Marta Indulska
, Shazia Wasim Sadiq
:
Compliance management ontology - a shared conceptualization for research and practice in compliance management. 995-1020 - Huda Qasim, Emad Abu-Shanab
:
Drivers of mobile payment acceptance: The impact of network externalities. 1021-1034
Volume 18, Number 6, December 2016
- José Braga de Vasconcelos
, Chris Kimble
, Álvaro Rocha
:
A special issue on knowledge and competence management: Developing Enterprise solutions. 1035-1039 - María Isabel Sánchez Segura
, Alejandro Ruiz-Robles
, Fuensanta Medina-Domínguez
:
Uncovering hidden process assets: A case study. 1041-1049 - Maria José Angélico Gonçalves
, Álvaro Rocha
, Manuel Pérez Cota:
Information management model for competencies and learning outcomes in an educational context. 1051-1061 - Eric Zimmerling, Patrick Julian Hoflinger, Philipp G. Sandner, Isabell M. Welpe:
A system framework for gamified Cost Engineering. 1063-1084 - Mohammed Nassim Lacheheub
, Ramdane Maamri:
Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS. 1085-1102 - Maria José Sousa
, Miguel González-Loureiro
:
Employee knowledge profiles - a mixed-research methods approach. 1103-1117 - Chris Kimble
, José Braga de Vasconcelos
, Álvaro Rocha
:
Competence management in knowledge intensive organizations using consensual knowledge and ontologies. 1119-1130 - Yeganeh Charband, Nima Jafari Navimipour
:
Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research. 1131-1151 - Oihab Allal-Chérif, Marc Bidan, Mohamed Makhlouf
:
Using serious games to manage knowledge and competencies: The seven-step development process. 1153-1163 - Hsin Hsin Chang, Yao-Chuan Tsai, Chen Su Fu, Shu Hui Chen, Yao De Peng:
Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD. 1165-1189 - Ikram Bououd
, Sana Rouis Skandrani, Imed Boughzala, Mohamed Makhlouf
:
Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds. 1191-1203 - Humayun Zafar, Myung S. Ko, Kweku-Muata Osei-Bryson:
The value of the CIO in the top management team on performance in the case of information security breaches. 1205-1215 - Yunqiang Zhu, Peng Pan, Shifeng Fang, Li Da Xu, Jia Song, Jinqu Zhang, Min Feng:
The development and application of e-Geoscience in China. 1217-1231 - El-Sayed M. El-Alfy
, Salahadin Mohammed, Ahmad F. Barradah:
XHQE: A hybrid system for scalable selectivity estimation of XML queries. 1233-1249 - Anastasia Papazafeiropoulou, Konstantina Spanaki
:
Understanding governance, risk and compliance information systems (GRC IS): The experts view. 1251-1263 - Torsten J. Gerpott, Phil Meinert:
Correlates of using the billing system of a mobile network operator to pay for digital goods and services. 1265-1283

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.