


default search action
Information Systems Frontiers, Volume 18
Volume 18, Number 1, February 2016
- Gert-Jan de Vreede

, Pedro Antunes
, Julita Vassileva
, Marco Aurélio Gerosa, Kewen Wu:
Collaboration technology in teams and organizations: Introduction to the special issue. 1-6 - Francisco J. Gutierrez

, Sergio F. Ochoa, Gustavo Zurita
, Nelson Baloian
:
Understanding student participation in undergraduate course communities: A case study. 7-21 - Diane E. Strode

:
A dependency taxonomy for agile software development projects. 23-46 - Nguyen Hoang Thuan

, Pedro Antunes
, David Johnstone:
Factors influencing the decision to crowdsource: A systematic literature review. 47-68 - Pedro O. Rossel

, Valeria Herskovic, Erika Ormeño:
Creating a family of collaborative applications for emergency management in the firefighting sub-domain. 69-84 - Mikhail Fominykh

, Ekaterina Prasolova-Førland, Monica Divitini
, Sobah Abbas Petersen:
Boundary objects in collaborative work and learning. 85-102 - Luís Duarte, Luís Carriço

:
Designing for geo-referenced in-situ therapeutic scenarios. 103-123 - Nelson Baloian

, Gustavo Zurita
:
Achieving better usability of software supporting learning activities of large groups. 125-144 - Sayooran Nagulendra, Julita Vassileva

:
Providing awareness, explanation and control of personalized filtering in a social networking site. 145-158 - Paras Jain

, Vipin Tyagi
:
A survey of edge-preserving image denoising methods. 159-170 - Yasser A. Khan, Mohamed El-Attar

:
Using model transformation to refactor use case models based on antipatterns. 171-204 - Chao Zhu, Qiang Zhu, Calisto Zuzarte, Wenbin Ma:

Optimization of generic progressive queries based on dependency analysis and materialized views. 205-231
Volume 18, Number 2, April 2016
- Atreyi Kankanhalli, Jungpil Hahn, Sharon Tan, Gordon Gao:

Big data and analytics in healthcare: Introduction to the special section. 233-235 - Prem Timsina, Jun Liu, Omar F. El-Gayar

:
Advanced analytics for the automation of medical systematic reviews. 237-252 - Changgyu Yang, Hee-Jun Lee:

A study on the antecedents of healthcare information protection intention. 253-263 - Tao Zhou, Yaobin Lu, Bin Wang

:
Examining online consumers' initial trust building from an elaboration likelihood model perspective. 265-275 - Evelina Pencheva

, Ivaylo Atanasov
:
Engineering of web services for internet of things applications. 277-292 - Herbjørn Nysveen, Per E. Pedersen:

Consumer adoption of RFID-enabled services. Applying an extended UTAUT model. 293-314 - Kishor Vaidya, John Campbell

:
Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency. 333-348 - Robert B. K. Brown, Ghassan Beydoun

, Graham Low, William John Tibben, Reza Zamani, Francisco García-Sánchez
, Rodrigo Martínez-Béjar
:
Computationally efficient ontology selection in software requirement planning. 349-358 - Jörg Becker

, Patrick Delfmann, Hanns-Alexander Dietrich, Matthias Steinhorst, Mathias Eggert:
Business process compliance checking - applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. 359-405
Volume 18, Number 3, June 2016
- Haluk Demirkan

, James C. Spohrer:
Emerging service orientations and transformations (SOT). 407-411 - Mohan Baruwal Chhetri

, Sergei Chichin, Quoc Bao Vo, Ryszard Kowalczyk
:
Smart CloudBench - A framework for evaluating cloud infrastructure performance. 413-428 - Mustafa Hashmi, Guido Governatori

, Moe Thandar Wynn
:
Normative requirements for regulatory compliance: An abstract formal framework. 429-455 - Eng K. Chew:

iSIM: An integrated design method for commercializing service innovation. 457-478 - Olivera Marjanovic

, Vijaya Murthy
:
From product-centric to customer-centric services in a financial institution - exploring the organizational challenges of the transition process. 479-497 - George Joukhadar

, Fethi A. Rabhi:
SOA in practice - a study of governance aspects. 499-510 - Weisi Chen

, Fethi A. Rabhi:
Enabling user-driven rule management in event data analysis. 511-528 - Laor Boongasame

, Farhad Daneshgar:
An awareness-based meta-mechanism for e-commerce buyer coalitions. 529-540 - Ralph Foorthuis

, Marlies van Steenbergen, Sjaak Brinkkemper, Wiel A. G. Bruls:
A theory building study of enterprise architecture practices and benefits. 541-564 - Yong Sun

, WenAn Tan, Ling Xia Li, Weiming Shen
, Zhuming Bi, Xiaoming Hu:
A new method to identify collaborative partners in social service provider networks. 565-578 - Vinodh Krishnaraju

, Saji K. Mathew
, Vijayan Sugumaran
:
Web personalization for user acceptance of technology: An empirical investigation of E-government services. 579-595 - Soe-Tsyr Daphne Yuan, Peng-Wei Chiu:

Persuasive narrative advertisement generator: A microenterprise service innovation perspective. 597-619 - Kim Hua Tan

, Wai Peng Wong
, Leanne Chung
:
Information and Knowledge Leakage in Supply Chain. 621-638
Volume 18, Number 4, August 2016
- Quan Z. Sheng

, Xue Li
, Anne H. H. Ngu, Yongrui Qin
, Dong Xie:
Guest editorial: web of things. 639-643 - Mohammad Alamgir Hossain

, Mohammed Quaddus, Nazrul Islam:
Developing and validating a model explaining the assimilation process of RFID: An empirical study. 645-663 - Sabrina Sicari, Cinzia Cappiello

, Francesco De Pellegrini, Daniele Miorandi, Alberto Coen-Porisini
:
A security-and quality-aware system architecture for Internet of Things. 665-677 - Eric G. Stephan

, Todd Elsethagen, Larry K. Berg
, Matthew C. Macduff, Patrick R. Paulson, Will J. Shaw
, Chitra Sivaraman, William Smith, Adam S. Wynne:
Semantic catalog of things, services, and data to support a wind data management facility. 679-691 - Manoj A. Thomas

, Daniela Costa, Tiago Oliveira
:
Assessing the role of IT-enabled process virtualization on green IT adoption. 693-710 - Lixin Shen, Hong Wang, Li Da Xu, Xue Ma, Sohail S. Chaudhry

, Wu He:
Identity management based on PCA and SVM. 711-716 - Remco M. Dijkman

, Sander Vincent Lammers, Ad de Jong
:
Properties that influence business process management maturity and its effect on organizational performance. 717-734 - Mehrdad Ashtiani

, Mohammad Abdollahi Azgomi
:
A formulation of computational trust based on quantum decision theory. 735-764 - Fernando Terroso-Saenz

, Mercedes Valdés-Vela
, Antonio F. Skarmeta-Gómez
:
A complex event processing approach to detect abnormal behaviours in the marine environment. 765-780 - Maxime Bernaert, Geert Poels

, Monique Snoeck
, Manu De Backer:
CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises. 781-818
Volume 18, Number 5, October 2016
- Thouraya Bouabana-Tebibel, Stuart H. Rubin:

Towards common reusable semantics. 819-823 - Marcus Kessel

, Colin Atkinson
:
Ranking software components for reuse based on non-functional properties. 825-853 - Mustafa Berk Duran, Gunter Mussbacher:

Investigation of feature run-time conflicts on goal model-based reuse. 855-875 - Chao Chen, Mei-Ling Shyu, Shu-Ching Chen:

Weighted subspace modeling for semantic concept retrieval using gaussian mixture models. 877-889 - Azadeh Jahanbanifar, Ferhat Khendek

, Maria Toeroe:
Semantic weaving of configuration fragments into a consistent system configuration. 891-908 - René Rydhof Hansen

, Kim Guldstrand Larsen
, Mads Chr. Olesen, Erik Ramsgaard Wognsen:
Formal modelling and analysis of Bitflips in ARM assembly code. 909-925 - Johanna Nellen, Kai Driessen, Martin R. Neuhäußer, Erika Ábrahám

, Benedikt Wolters:
Two CEGAR-based approaches for the safety verification of PLC-controlled plants. 927-952 - Daniel R. Harris

:
Foundations of reusable and interoperable facet models using category theory. 953-965 - André Didier, Alexandre Mota:

An algebra of temporal faults. 967-980 - Stuart H. Rubin, Thouraya Bouabana-Tebibel, Yasmin Hoadjli

:
On the empirical justification of theoretical heuristic transference and learning. 981-994 - Norris Syed Abdullah

, Marta Indulska
, Shazia Sadiq
:
Compliance management ontology - a shared conceptualization for research and practice in compliance management. 995-1020 - Huda Qasim, Emad Abu-Shanab

:
Drivers of mobile payment acceptance: The impact of network externalities. 1021-1034
Volume 18, Number 6, December 2016
- José Braga de Vasconcelos

, Chris Kimble
, Álvaro Rocha
:
A special issue on knowledge and competence management: Developing Enterprise solutions. 1035-1039 - María Isabel Sánchez Segura

, Alejandro Ruiz-Robles
, Fuensanta Medina-Domínguez
:
Uncovering hidden process assets: A case study. 1041-1049 - Maria José Angélico Gonçalves

, Álvaro Rocha
, Manuel Pérez Cota:
Information management model for competencies and learning outcomes in an educational context. 1051-1061 - Eric Zimmerling, Patrick Julian Hoflinger, Philipp G. Sandner, Isabell M. Welpe:

A system framework for gamified Cost Engineering. 1063-1084 - Mohammed Nassim Lacheheub

, Ramdane Maamri:
Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS. 1085-1102 - Maria José Sousa

, Miguel González-Loureiro
:
Employee knowledge profiles - a mixed-research methods approach. 1103-1117 - Chris Kimble

, José Braga de Vasconcelos
, Álvaro Rocha
:
Competence management in knowledge intensive organizations using consensual knowledge and ontologies. 1119-1130 - Yeganeh Charband, Nima Jafari Navimipour

:
Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research. 1131-1151 - Oihab Allal-Chérif

, Marc Bidan
, Mohamed Makhlouf
:
Using serious games to manage knowledge and competencies: The seven-step development process. 1153-1163 - Hsin Hsin Chang, Yao-Chuan Tsai, Chen Su Fu, Shu Hui Chen, Yao De Peng:

Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD. 1165-1189 - Ikram Bououd

, Sana Rouis Skandrani, Imed Boughzala, Mohamed Makhlouf
:
Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds. 1191-1203 - Humayun Zafar, Myung S. Ko, Kweku-Muata Osei-Bryson:

The value of the CIO in the top management team on performance in the case of information security breaches. 1205-1215 - Yunqiang Zhu, Peng Pan, Shifeng Fang, Li Da Xu, Jia Song, Jinqu Zhang, Min Feng:

The development and application of e-Geoscience in China. 1217-1231 - El-Sayed M. El-Alfy

, Salahadin Mohammed, Ahmad F. Barradah:
XHQE: A hybrid system for scalable selectivity estimation of XML queries. 1233-1249 - Anastasia Papazafeiropoulou, Konstantina Spanaki

:
Understanding governance, risk and compliance information systems (GRC IS): The experts view. 1251-1263 - Torsten J. Gerpott, Phil Meinert:

Correlates of using the billing system of a mobile network operator to pay for digital goods and services. 1265-1283

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














