IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v13y2011i4d10.1007_s10796-011-9323-z.html
   My bibliography  Save this article

Editorial

Author

Listed:
  • R. Ramesh

    (SUNY Buffalo)

  • H. Raghav Rao

    (SUNY Buffalo)

Abstract

No abstract is available for this item.

Suggested Citation

  • R. Ramesh & H. Raghav Rao, 2011. "Editorial," Information Systems Frontiers, Springer, vol. 13(4), pages 451-452, September.
  • Handle: RePEc:spr:infosf:v:13:y:2011:i:4:d:10.1007_s10796-011-9323-z
    DOI: 10.1007/s10796-011-9323-z
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-011-9323-z
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-011-9323-z?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Gunwoo Kim & Yongmoo Suh, 2011. "Semantic business process space for intelligent management of sales order business processes," Information Systems Frontiers, Springer, vol. 13(4), pages 515-542, September.
    2. Kuo-chung Chang & Chih-ping Wang, 2011. "Information systems resources and information security," Information Systems Frontiers, Springer, vol. 13(4), pages 579-593, September.
    3. Faheem Ahmed & Luiz Fernando Capretz, 2011. "A business maturity model of software product line engineering," Information Systems Frontiers, Springer, vol. 13(4), pages 543-560, September.
    4. Kenneth J. Arrow, 2003. "Information Dynamics in the Networked World," Information Systems Frontiers, Springer, vol. 5(1), pages 5-5, January.
    5. Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park, 2011. "Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems," Information Systems Frontiers, Springer, vol. 13(4), pages 471-480, September.
    6. Xiang Fang & Clyde W. Holsapple, 2011. "Impacts of navigation structure, task complexity, and users’ domain knowledge on Web site usability—an empirical study," Information Systems Frontiers, Springer, vol. 13(4), pages 453-469, September.
    7. Torsten J. Gerpott, 2011. "Determinants of self-report and system-captured measures of mobile Internet use intensity," Information Systems Frontiers, Springer, vol. 13(4), pages 561-578, September.
    8. Stefan Strecker & David Heise & Ulrich Frank, 2011. "RiskM: A multi-perspective modeling method for IT risk assessment," Information Systems Frontiers, Springer, vol. 13(4), pages 595-611, September.
    9. Ravi Inder Singh & Manasa Sumeeth & James Miller, 2011. "A user-centric evaluation of the readability of privacy policies in popular web sites," Information Systems Frontiers, Springer, vol. 13(4), pages 501-514, September.
    10. Xue Li & Jing Liu & Quan Z. Sheng & Sherali Zeadally & Weicai Zhong, 2011. "TMS-RFID: Temporal management of large-scale RFID applications," Information Systems Frontiers, Springer, vol. 13(4), pages 481-500, September.
    11. Bernardo A. Huberman & John O. Ledyard, 2003. "Information Dynamics in the Networked World," Information Systems Frontiers, Springer, vol. 5(1), pages 7-8, January.
    12. Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson, 2011. "Introduction to special issue on terrorism informatics," Information Systems Frontiers, Springer, vol. 13(1), pages 1-3, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
    2. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    3. Nilgun Fescioglu-Unver & Sung Hee Choi & Dongmok Sheen & Soundar Kumara, 2015. "RFID in production and service systems: Technology, applications and issues," Information Systems Frontiers, Springer, vol. 17(6), pages 1369-1380, December.
    4. Oliver Thomas & Simon Hagen & Ulrich Frank & Jan Recker & Lauri Wessel & Friedemann Kammler & Novica Zarvic & Ingo Timm, 2020. "Global Crises and the Role of BISE," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 62(4), pages 385-396, August.
    5. Heise, David & Strecker, Stefan & Frank, Ulrich, 2014. "ControlML: A domain-specific modeling language in support of assessing internal controls and the internal control system," International Journal of Accounting Information Systems, Elsevier, vol. 15(3), pages 224-245.
    6. Roger Clarke, 2022. "Research opportunities in the regulatory aspects of electronic markets," Electronic Markets, Springer;IIM University of St. Gallen, vol. 32(1), pages 179-200, March.
    7. Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo, 2020. "Using Mobile Phone Data for Emergency Management: a Systematic Literature Review," Information Systems Frontiers, Springer, vol. 22(6), pages 1539-1559, December.
    8. Remco Dijkman & Sander Vincent Lammers & Ad Jong, 2016. "Properties that influence business process management maturity and its effect on organizational performance," Information Systems Frontiers, Springer, vol. 18(4), pages 717-734, August.
    9. Lior Fink & Daniele Papismedov, 2023. "On the Same Page? What Users Benefit from a Desktop View on Mobile Devices," Information Systems Research, INFORMS, vol. 34(2), pages 423-441, June.
    10. N. Martín & L. Pardo & K. Zografos, 2019. "On divergence tests for composite hypotheses under composite likelihood," Statistical Papers, Springer, vol. 60(6), pages 1883-1919, December.
    11. Torsten J. Gerpott & Phil Meinert, 2016. "Correlates of using the billing system of a mobile network operator to pay for digital goods and services," Information Systems Frontiers, Springer, vol. 18(6), pages 1265-1283, December.
    12. Ram Ramesh & H. Raghav Rao, 2017. "Professor Kenneth Arrow and Information Systems Frontiers: In memoriam," Information Systems Frontiers, Springer, vol. 19(2), pages 187-188, April.
    13. Gregor Dorfleitner & Lars Hornuf & Julia Kreppmeier, 2021. "Promise not Fulfilled: FinTech Data Privacy, and the GDPR," CESifo Working Paper Series 9359, CESifo.
    14. Hwee-Joo Kam & Thomas Mattson & Sanjay Goel, 0. "A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness," Information Systems Frontiers, Springer, vol. 0, pages 1-24.
    15. Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan, 2019. "A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs," Information Systems Frontiers, Springer, vol. 21(5), pages 959-977, October.
    16. César Guerra-García & Ismael Caballero & Mario Piattini, 2013. "Capturing data quality requirements for web applications by means of DQ_WebRE," Information Systems Frontiers, Springer, vol. 15(3), pages 433-445, July.
    17. Gerpott, Torsten J. & Thomas, Sandra, 2014. "Empirical research on mobile Internet usage: A meta-analysis of the literature," Telecommunications Policy, Elsevier, vol. 38(3), pages 291-310.
    18. Annie Tubadji & Toby Denney & Don J. Webber, 2021. "Cultural relativity in consumers' rates of adoption of artificial intelligence," Economic Inquiry, Western Economic Association International, vol. 59(3), pages 1234-1251, July.
    19. Gürdal Ertek & Gül Tokdemir & Mete Sevinç & Murat Mustafa Tunç, 2017. "New knowledge in strategic management through visually mining semantic networks," Information Systems Frontiers, Springer, vol. 19(1), pages 165-185, February.
    20. Mojtaba Ashja & Akram Hadizadeh Moghadam & Hamid Bidram, 2015. "Comparative study of large information systems’ CSFs during their life cycle," Information Systems Frontiers, Springer, vol. 17(3), pages 619-628, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:13:y:2011:i:4:d:10.1007_s10796-011-9323-z. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.