IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v17y2015i1d10.1007_s10796-014-9544-z.html
   My bibliography  Save this article

Information systems frontiers: Keyword analysis and classification

Author

Listed:
  • Chulhwan Chris Bang

    (The State University of New York at Buffalo)

Abstract

The current study focuses on the disciplines of ISF researches. The various analyses have employed to address research discipline of Management Information Systems (MIS). Since ISF is a forum for not only academic researchers but also industrial experts, it is worth to shed light on distinctive research features of ISF. I created a keyword classification scheme, incorporating new research topics into Barki’s information systems keyword classification scheme. This research describes the disciplines of 318 papers in 14 issues published on ISF until 2012 by 796 scholars, examining word frequency and keyword co-occurrence.

Suggested Citation

  • Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
  • Handle: RePEc:spr:infosf:v:17:y:2015:i:1:d:10.1007_s10796-014-9544-z
    DOI: 10.1007/s10796-014-9544-z
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-014-9544-z
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-014-9544-z?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Joseph A. Cazier & Benjamin B. M. Shao & Robert D. St. Louis, 2007. "Sharing information and building trust through value congruence," Information Systems Frontiers, Springer, vol. 9(5), pages 515-529, November.
    2. Nicholas C. Romano & Ramesh Sharda & Joyce Lucca, 2005. "Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP): An Introduction," Information Systems Frontiers, Springer, vol. 7(1), pages 5-12, February.
    3. Young Mee Shin & Seung Chang Lee & Bongsik Shin & Ho Geun Lee, 2010. "Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes," Information Systems Frontiers, Springer, vol. 12(5), pages 595-606, November.
    4. Bobby Swar & Junghoon Moon & Junyoung Oh & Cheul Rhee, 2012. "Determinants of relationship quality for IS/IT outsourcing success in public sector," Information Systems Frontiers, Springer, vol. 14(2), pages 457-475, April.
    5. Arnold Kamis & Tziporah Stern & Daniel M. Ladik, 2010. "A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce," Information Systems Frontiers, Springer, vol. 12(2), pages 157-168, April.
    6. Leonard Barolli & Akio Koyama & Arjan Durresi & Giuseppe Marco, 2006. "A web-based e-learning system for increasing study efficiency by stimulating learner’s motivation," Information Systems Frontiers, Springer, vol. 8(4), pages 297-306, September.
    7. Türker Tanergüçlü & Hakan Maraş & Cevriye Gencer & Haluk Aygüneş, 2012. "A decision support system for locating weapon and radar positions in stationary point air defence," Information Systems Frontiers, Springer, vol. 14(2), pages 423-444, April.
    8. Young Chan Choe & Joowon Park & Miri Chung & Junghoon Moon, 2009. "Effect of the food traceability system for building trust: Price premium and buying behavior," Information Systems Frontiers, Springer, vol. 11(2), pages 167-179, April.
    9. Matthias Book & Volker Gruhn, 2007. "Specifying and controlling multi-channel web interfaces for enterprise applications," Information Systems Frontiers, Springer, vol. 9(2), pages 137-150, July.
    10. Yuri Natchetoi & Huaigu Wu & Gilbert Babin & Serhan Dagtas, 2007. "EXEM: Efficient XML data exchange management for mobile applications," Information Systems Frontiers, Springer, vol. 9(4), pages 439-448, September.
    11. Soe-Tsyr Yuan & Jiming Liu, 2005. "Guest Editors: Special Issue in Advances in e-Technology and e-Services," Information Systems Frontiers, Springer, vol. 7(4), pages 335-336, December.
    12. Therani Madhusudan, 2007. "A web services framework for distributed model management," Information Systems Frontiers, Springer, vol. 9(1), pages 9-27, March.
    13. Holger Ziekow & Oliver Günther, 2010. "Sharing RFID and complex event data among organizations," Information Systems Frontiers, Springer, vol. 12(5), pages 541-549, November.
    14. Frank G. Goethals & Monique Snoeck & Wilfried Lemahieu & Jacques Vandenbulcke, 2006. "Management and enterprise architecture click: The FAD(E)E framework," Information Systems Frontiers, Springer, vol. 8(2), pages 67-79, February.
    15. Maja Stula & Damir Krstinic & Ljiljana Seric, 2012. "Intelligent forest fire monitoring system," Information Systems Frontiers, Springer, vol. 14(3), pages 725-739, July.
    16. Kuo-chung Chang & Chih-ping Wang, 2011. "Information systems resources and information security," Information Systems Frontiers, Springer, vol. 13(4), pages 579-593, September.
    17. Ali Fatolahi & Fereidoon Shams, 2006. "An investigation into applying UML to the Zachman framework," Information Systems Frontiers, Springer, vol. 8(2), pages 133-143, February.
    18. Dunlu Peng & Xiaoling Wang & Aoying Zhou, 2007. "VsLattice: A vector-based conceptual index structure for web service retrieval," Information Systems Frontiers, Springer, vol. 9(4), pages 423-437, September.
    19. Petter Gottschalk, 2010. "Knowledge management technology for organized crime risk assessment," Information Systems Frontiers, Springer, vol. 12(3), pages 267-275, July.
    20. Jung-Wook Choi & Dong-Ik Oh, 2011. "Tag-only aging-counter localization for the R-LIM2 system," Information Systems Frontiers, Springer, vol. 13(1), pages 127-137, March.
    21. Joachim Schwieren & Gottfried Vossen, 2010. "ID-Services: an RFID middleware architecture for mobile applications," Information Systems Frontiers, Springer, vol. 12(5), pages 529-539, November.
    22. Oleksiy Mazhelis & Pasi Tyrväinen, 2012. "Economic aspects of hybrid cloud infrastructure: User organization perspective," Information Systems Frontiers, Springer, vol. 14(4), pages 845-869, September.
    23. J. Leon Zhao & Mohan Tanniru & Liang-Jie Zhang, 2007. "Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue," Information Systems Frontiers, Springer, vol. 9(1), pages 1-8, March.
    24. J. C. Poindexter & Julia B. Earp & David L. Baumer, 2006. "An experimental economics approach toward quantifying online privacy choices," Information Systems Frontiers, Springer, vol. 8(5), pages 363-374, December.
    25. Chuanzhen Zang & Yushun Fan & Renjing Liu, 2008. "Architecture, implementation and application of complex event processing in enterprise information systems based on RFID," Information Systems Frontiers, Springer, vol. 10(5), pages 543-553, November.
    26. Lan Xiao & Li Zheng, 2012. "Business process design: Process comparison and integration," Information Systems Frontiers, Springer, vol. 14(2), pages 363-374, April.
    27. Jens H. Weber-Jahnke & Christina Obry, 2012. "Protecting privacy during peer-to-peer exchange of medical documents," Information Systems Frontiers, Springer, vol. 14(1), pages 87-104, March.
    28. Anja Bog & Hasso Plattner & Alexander Zeier, 2011. "A mixed transaction processing and operational reporting benchmark," Information Systems Frontiers, Springer, vol. 13(3), pages 321-335, July.
    29. N. Kalra & T. Lauwers & D. Dewey & T. Stepleton & M. B. Dias, 2009. "Design of a braille writing tutor to combat illiteracy," Information Systems Frontiers, Springer, vol. 11(2), pages 117-128, April.
    30. Faheem Ahmed & Luiz Fernando Capretz, 2011. "A business maturity model of software product line engineering," Information Systems Frontiers, Springer, vol. 13(4), pages 543-560, September.
    31. Timothy R. Hill & Malu Roldan, 2005. "Toward Third Generation Threaded Discussions for Mobile Learning: Opportunities and Challenges for Ubiquitous Collaborative Environments," Information Systems Frontiers, Springer, vol. 7(1), pages 55-70, February.
    32. Alladi Venkatesh, 2008. "Digital home technologies and transformation of households," Information Systems Frontiers, Springer, vol. 10(4), pages 391-395, September.
    33. Gerrit Versteeg & Harry Bouwman, 2006. "Business architecture: A new paradigm to relate business strategy to ICT," Information Systems Frontiers, Springer, vol. 8(2), pages 91-102, February.
    34. Matthias Enzmann & Markus Schneider, 2005. "Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System," Information Systems Frontiers, Springer, vol. 7(4), pages 359-370, December.
    35. Irfan Awan, 2006. "Mobility management for m-commerce requests in wireless cellular networks," Information Systems Frontiers, Springer, vol. 8(4), pages 285-295, September.
    36. Tom Butler & Damien McGovern, 2012. "A conceptual model and IS framework for the design and adoption of environmental compliance management systems," Information Systems Frontiers, Springer, vol. 14(2), pages 221-235, April.
    37. Ching-Hsien Hsu & Han-Chieh Chao & Jong Hyuk Park, 2011. "Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems," Information Systems Frontiers, Springer, vol. 13(4), pages 471-480, September.
    38. Shagufta Umer & Muhammad Afzal & Maqbool Hussain & Khalid Latif & Hafiz Farooq Ahmad, 2012. "Autonomous mapping of HL7 RIM and relational database schema," Information Systems Frontiers, Springer, vol. 14(1), pages 5-18, March.
    39. Corlane Barclay, 2008. "Towards an integrated measurement of IS project performance: The project performance scorecard," Information Systems Frontiers, Springer, vol. 10(3), pages 331-345, July.
    40. Nitesh Bharosa & JinKyu Lee & Marijn Janssen, 2010. "Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises," Information Systems Frontiers, Springer, vol. 12(1), pages 49-65, March.
    41. Max Kotlyar & Igor Jurisica, 2006. "Predicting Protein-Protein Interactions by Association Mining," Information Systems Frontiers, Springer, vol. 8(1), pages 37-47, February.
    42. Seokjoo Andrew Chang, 2012. "Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue," Information Systems Frontiers, Springer, vol. 14(2), pages 331-342, April.
    43. Ebrahim Bagheri & Ali A. Ghorbani, 2010. "UML-CI: A reference model for profiling critical infrastructure systems," Information Systems Frontiers, Springer, vol. 12(2), pages 115-139, April.
    44. She-I Chang & David C. Yen & Celeste See-Pui Ng & I-Cheng Chang & Sheng-Yu Yu, 2011. "An ERP system performance assessment model development based on the balanced scorecard approach," Information Systems Frontiers, Springer, vol. 13(3), pages 429-450, July.
    45. S. Revi Sterling & John O’Brien & John K. Bennett, 2009. "Advancement through interactive radio," Information Systems Frontiers, Springer, vol. 11(2), pages 145-154, April.
    46. Joseph W. Rottman & Mary C. Lacity, 2008. "A US Client’s learning from outsourcing IT work offshore," Information Systems Frontiers, Springer, vol. 10(2), pages 259-275, April.
    47. Libo Chen & Marcello L'Abbate & Ulrich Thiel & Erich J. Neuhold, 2005. "The Layer-Seeds Term Clustering Method: Enabling Proactive Situation-Aware Product Recommendations in E-Commerce Dialogues," Information Systems Frontiers, Springer, vol. 7(4), pages 405-419, December.
    48. Daniel S. Soper & Haluk Demirkan & Michael Goul, 2007. "An interorganizational knowledge-sharing security model with breach propagation detection," Information Systems Frontiers, Springer, vol. 9(5), pages 469-479, November.
    49. Patrick C. K. Hung & Dickson K. W. Chiu & W. W. Fung & William K. Cheung & Raymond Wong & Samuel P. M. Choi & Eleanna Kafeza & James Kwok & Joshua C. C. Pun & Vivying S. Y. Cheng, 2007. "End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach," Information Systems Frontiers, Springer, vol. 9(1), pages 85-101, March.
    50. Sergey Samoilenko, 2008. "Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories," Information Systems Frontiers, Springer, vol. 10(3), pages 281-292, July.
    51. Shailaja Venkatsubramanyan & Timothy R. Hill, 2010. "An empirical investigation into the effects of web search characteristics on decisions associated with impression formation," Information Systems Frontiers, Springer, vol. 12(5), pages 579-593, November.
    52. Se-Joon Hong & James Y. L. Thong & Jae-Yun Moon & Kar-Yan Tam, 2008. "Understanding the behavior of mobile data services consumers," Information Systems Frontiers, Springer, vol. 10(4), pages 431-445, September.
    53. Susan Scott & Nicholas Perry, 2012. "The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry," Information Systems Frontiers, Springer, vol. 14(2), pages 125-141, April.
    54. Frances S. Grodzinsky & Andra Gumbus & Stephen Lilley, 2010. "Ethical implications of internet monitoring: A comparative study," Information Systems Frontiers, Springer, vol. 12(4), pages 433-441, September.
    55. Lemuria Carter & Vishanth Weerakkody, 2008. "E-government adoption: A cultural comparison," Information Systems Frontiers, Springer, vol. 10(4), pages 473-482, September.
    56. Chunlin Li & Layuan Li, 2012. "Collaboration among mobile agents for efficient energy allocation in mobile grid," Information Systems Frontiers, Springer, vol. 14(3), pages 711-723, July.
    57. Yanjun Zuo & Timothy O’Keefe, 2007. "Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system," Information Systems Frontiers, Springer, vol. 9(5), pages 451-467, November.
    58. Balaji Parthasarathy & Krithi Ramamritham, 2009. "Guest editorial: Information and communications technology for development," Information Systems Frontiers, Springer, vol. 11(2), pages 103-104, April.
    59. Ian Stoodley & Christine Bruce & Sylvia Edwards, 2010. "Expanding ethical vistas of IT professionals," Information Systems Frontiers, Springer, vol. 12(4), pages 379-387, September.
    60. Themis Palpanas & Pawan Chowdhary & George Mihaila & Florian Pinel, 2007. "Integrated model-driven dashboard development," Information Systems Frontiers, Springer, vol. 9(2), pages 195-208, July.
    61. Lea Kutvonen & Janne Metso & Sini Ruohomaa, 2007. "From trading to eCommunity management: Responding to social and contractual challenges," Information Systems Frontiers, Springer, vol. 9(2), pages 181-194, July.
    62. Silke Retzer & Pak Yoong & Val Hooper, 2012. "Inter-organisational knowledge transfer in social networks: A definition of intermediate ties," Information Systems Frontiers, Springer, vol. 14(2), pages 343-361, April.
    63. Murray E. Jennex & Suzanne Zyngier, 2007. "Security as a contributor to knowledge management success," Information Systems Frontiers, Springer, vol. 9(5), pages 493-504, November.
    64. Hoyoung Kim & Jinwoo Kim & Yeonsoo Lee, 2005. "An Empirical Study of Use Contexts in the Mobile Internet, Focusing on the Usability of Information Architecture," Information Systems Frontiers, Springer, vol. 7(2), pages 175-186, May.
    65. Thomas A. Horan & Benjamin Schooley, 2005. "Inter-organizational Emergency Medical Services: Case Study of Rural Wireless Deployment and Management," Information Systems Frontiers, Springer, vol. 7(2), pages 155-173, May.
    66. Nikolas V. Stylianides & George V. Stephanopoulos & George S. Tselikis & Michael Dopher, 2005. "Signaling Performance Trials and Evaluation Results on a GPRS Platform," Information Systems Frontiers, Springer, vol. 7(2), pages 129-140, May.
    67. Jane Fedorowicz & Janis L. Gogan, 2010. "Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system," Information Systems Frontiers, Springer, vol. 12(1), pages 81-95, March.
    68. Payam Sadeghi & Morad Benyoucef & Craig E. Kuziemsky, 2012. "A mashup based framework for multi level healthcare interoperability," Information Systems Frontiers, Springer, vol. 14(1), pages 57-72, March.
    69. Malik Aleem Ahmed & Jeroen Hoven, 2010. "Agents of responsibility—freelance web developers in web applications development," Information Systems Frontiers, Springer, vol. 12(4), pages 415-424, September.
    70. Ji Ma & Mehmet A. Orgun, 2008. "Formalising theories of trust for authentication protocols," Information Systems Frontiers, Springer, vol. 10(1), pages 19-32, March.
    71. Devaki Rau & Thorvald Haerem & Gautam Ray & Wei Zheng, 2010. "Guest editorial for the special section on “Technology acceptance, usage, and competitive advantage”," Information Systems Frontiers, Springer, vol. 12(3), pages 235-237, July.
    72. Roman Beck & Daniel Beimborn & Tim Weitzel & Wolfgang König, 2008. "Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services," Information Systems Frontiers, Springer, vol. 10(4), pages 415-429, September.
    73. Linh Thao Ly & Stefanie Rinderle-Ma & Kevin Göser & Peter Dadam, 2012. "On enabling integrated process compliance with semantic constraints in process management systems," Information Systems Frontiers, Springer, vol. 14(2), pages 195-219, April.
    74. Anders I. MØrch & Silje Jondahl & Jan A. Dolonen, 2005. "Supporting Conceptual Awareness with Pedagogical Agents," Information Systems Frontiers, Springer, vol. 7(1), pages 39-53, February.
    75. Maria Alaranta & Stefan Henningsson, 2008. "An approach to analyzing and planning post-merger IS integration: Insights from two field studies," Information Systems Frontiers, Springer, vol. 10(3), pages 307-319, July.
    76. Xiaofeng Yu & Yan Zhang & Tian Zhang & Linzhang Wang & Jun Hu & JianHua Zhao & Xuandong Li, 2007. "A model-driven development framework for enterprise Web services," Information Systems Frontiers, Springer, vol. 9(4), pages 391-409, September.
    77. Saggi Nevo & Michael Wade & Wade D. Cook, 2010. "An empirical study of IT as a factor of production: The case of Net-enabled IT assets," Information Systems Frontiers, Springer, vol. 12(3), pages 323-335, July.
    78. Nan Zhang & Xunhua Guo & Guoqing Chen, 2011. "Why adoption and use behavior of IT/IS cannot last?—two studies in China," Information Systems Frontiers, Springer, vol. 13(3), pages 381-395, July.
    79. Jens Weber-Jahnke & Liam Peyton & Thodoros Topaloglou, 2012. "eHealth system interoperability," Information Systems Frontiers, Springer, vol. 14(1), pages 1-3, March.
    80. Mengistu Kifle & Victor W. A. Mbarika & Pratim Datta, 2006. "Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: The case of tele-cardiology in Ethiopia," Information Systems Frontiers, Springer, vol. 8(3), pages 211-223, July.
    81. Aaron X. L. Shen & Christy M. K. Cheung & Matthew K. O. Lee & Huaping Chen, 2011. "How social influence affects we-intention to use instant messaging: The moderating effect of usage experience," Information Systems Frontiers, Springer, vol. 13(2), pages 157-169, April.
    82. Xiuzhen Chen & Qinghua Zheng & Xiaohong Guan, 2008. "An OVAL-based active vulnerability assessment system for enterprise computer networks," Information Systems Frontiers, Springer, vol. 10(5), pages 573-588, November.
    83. Seung-Hyun Rhee & Hyerim Bae & Yongsun Choi, 2007. "Enhancing the efficiency of supply chain processes through web services," Information Systems Frontiers, Springer, vol. 9(1), pages 103-118, March.
    84. Finn Olav Sveen & Eliot Rich & Matthew Jager, 2007. "Overcoming organizational challenges to secure knowledge management," Information Systems Frontiers, Springer, vol. 9(5), pages 481-492, November.
    85. Luisa Massari, 2010. "Analysis of MySpace user profiles," Information Systems Frontiers, Springer, vol. 12(4), pages 361-367, September.
    86. Ashish Gupta & Ramesh Sharda & Robert A. Greve, 2011. "You’ve got email! Does it really matter to process emails now or later?," Information Systems Frontiers, Springer, vol. 13(5), pages 637-653, November.
    87. Jae-Nam Lee & Minh Q. Huynh & Rudy Hirschheim, 2008. "An integrative model of trust on IT outsourcing: Examining a bilateral perspective," Information Systems Frontiers, Springer, vol. 10(2), pages 145-163, April.
    88. Amar Gupta & Igor Crk & Rajdeep Bondade, 2011. "Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm," Information Systems Frontiers, Springer, vol. 13(3), pages 397-405, July.
    89. Yogesh K. Dwivedi & Michael D. Williams & Viswanath Venkatesh, 2008. "Guest Editorial: A profile of adoption of Information & Communication Technologies (ICT) research in the household context," Information Systems Frontiers, Springer, vol. 10(4), pages 385-390, September.
    90. Ji Hu, 2011. "Derivation of trust federation for collaborative business processes," Information Systems Frontiers, Springer, vol. 13(3), pages 305-319, July.
    91. Christopher J. O. Baker & René Witte, 2006. "Mutation Mining—A Prospector's Tale," Information Systems Frontiers, Springer, vol. 8(1), pages 47-57, February.
    92. Anastasiou Kartas & Sigi Goode, 2012. "Use, perceived deterrence and the role of software piracy in video game console adoption," Information Systems Frontiers, Springer, vol. 14(2), pages 261-277, April.
    93. Peter Goldschmidt, 2007. "Managing the false alarms: A framework for assurance and verification of surveillance monitoring," Information Systems Frontiers, Springer, vol. 9(5), pages 541-556, November.
    94. Jun Tian & Kanliang Wang & Yan Chen & Björn Johansson, 2010. "From IT deployment capabilities to competitive advantage: An exploratory study in China," Information Systems Frontiers, Springer, vol. 12(3), pages 239-255, July.
    95. Ozgur Turetken & Ramesh Sharda, 2005. "Clustering-Based Visual Interfaces for Presentation of Web Search Results: An Empirical Investigation," Information Systems Frontiers, Springer, vol. 7(3), pages 273-297, July.
    96. Amjad Umar, 2005. "IT Infrastructure to Enable Next Generation Enterprises," Information Systems Frontiers, Springer, vol. 7(3), pages 217-256, July.
    97. Alejandro Zunino & Marcelo Campo & Cristian Mateos, 2005. "Reactive Mobility by Failure: When Fail Means Move," Information Systems Frontiers, Springer, vol. 7(2), pages 141-154, May.
    98. Kjell Hausken, 2006. "Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability," Information Systems Frontiers, Springer, vol. 8(5), pages 338-349, December.
    99. J. Octavio Gutierrez-Garcia & Kwang Mong Sim, 2012. "GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications," Information Systems Frontiers, Springer, vol. 14(4), pages 925-951, September.
    100. Christina Ann LaComb & Janet Arlie Barnett & Qimei Pan, 2007. "The imagination market," Information Systems Frontiers, Springer, vol. 9(2), pages 245-256, July.
    101. Ram Ramesh & H. Raghav Rao, 2005. "Foreword Design Science and Information Systems," Information Systems Frontiers, Springer, vol. 7(3), pages 215-215, July.
    102. Xiaojun Zhang & Likoebe M. Maruping, 2008. "Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values," Information Systems Frontiers, Springer, vol. 10(4), pages 403-413, September.
    103. Stefan Strecker & David Heise & Ulrich Frank, 2011. "RiskM: A multi-perspective modeling method for IT risk assessment," Information Systems Frontiers, Springer, vol. 13(4), pages 595-611, September.
    104. Jen-Hsiang Chen & Kuo-Ming Chao & Nick Godwin & Von-Wun Soo, 2005. "Combining Cooperative and Non-Cooperative Automated Negotiations," Information Systems Frontiers, Springer, vol. 7(4), pages 391-404, December.
    105. Ravi Inder Singh & Manasa Sumeeth & James Miller, 2011. "A user-centric evaluation of the readability of privacy policies in popular web sites," Information Systems Frontiers, Springer, vol. 13(4), pages 501-514, September.
    106. Jahyun Goo, 2010. "Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement," Information Systems Frontiers, Springer, vol. 12(2), pages 185-205, April.
    107. João Paulo A. Almeida & Maria-Eugenia Iacob & Pascal Eck, 2007. "Requirements traceability in model-driven development: Applying model and transformation conformance," Information Systems Frontiers, Springer, vol. 9(4), pages 327-342, September.
    108. Md. Enamul Kabir & Hua Wang & Elisa Bertino, 2012. "A role-involved purpose-based access control model," Information Systems Frontiers, Springer, vol. 14(3), pages 809-822, July.
    109. Yue-Shan Chang & Ruey-Kai Sheu & Shyan-Ming Yuan & Jyn-Jie Hsu, 2012. "Scaling database performance on GPUs," Information Systems Frontiers, Springer, vol. 14(4), pages 909-924, September.
    110. Hong Joo Lee & Hyung Jun Ahn & Jong Woo Kim & Sung Joo Park, 2006. "Capturing and reusing knowledge in engineering change management: A case of automobile development," Information Systems Frontiers, Springer, vol. 8(5), pages 375-394, December.
    111. G. R. Gangadharan & Vincenzo D’Andrea & Stefano Paoli & Michael Weiss, 2012. "Managing license compliance in free and open source software development," Information Systems Frontiers, Springer, vol. 14(2), pages 143-154, April.
    112. Mehmet N. Aydin & Mark E. Bakker, 2008. "Analyzing IT maintenance outsourcing decision from a knowledge management perspective," Information Systems Frontiers, Springer, vol. 10(3), pages 293-305, July.
    113. Michele Marchesi & Giancarlo Succi & Barbara Russo, 2007. "A model of the dynamics of the market of COTS software, in the absence of new entrants," Information Systems Frontiers, Springer, vol. 9(2), pages 257-265, July.
    114. Chin-Feng Lee & S. Wesley Changchien & Wei-Tse Wang & Jau-Ji Shen, 2006. "A data mining approach to database compression," Information Systems Frontiers, Springer, vol. 8(3), pages 147-161, July.
    115. Pu Li & H. Raghav Rao, 2007. "An examination of private intermediaries’ roles in software vulnerabilities disclosure," Information Systems Frontiers, Springer, vol. 9(5), pages 531-539, November.
    116. Stephen Burgess & Carmine Sellitto & Carmen Cox & Jeremy Buultjens, 2011. "Trust perceptions of online travel information by different content creators: Some social and legal implications," Information Systems Frontiers, Springer, vol. 13(2), pages 221-235, April.
    117. Min Gao & Kecheng Liu & Zhongfu Wu, 2010. "Personalisation in web computing and informatics: Theories, techniques, applications, and future research," Information Systems Frontiers, Springer, vol. 12(5), pages 607-629, November.
    118. David B. Skillicorn, 2011. "Computational approaches to suspicion in adversarial settings," Information Systems Frontiers, Springer, vol. 13(1), pages 21-31, March.
    119. Benedikt Martens & Frank Teuteberg, 2012. "Decision-making in cloud computing environments: A cost and risk based approach," Information Systems Frontiers, Springer, vol. 14(4), pages 871-893, September.
    120. Jörg Hoffmann & Ingo Weber & Guido Governatori, 2012. "On compliance checking for clausal constraints in annotated process models," Information Systems Frontiers, Springer, vol. 14(2), pages 155-177, April.
    121. Suresh Chalasani & Rajendra V. Boppana, 2005. "Adaptive Multimodule Routers for Multiprocessor Architectures," Information Systems Frontiers, Springer, vol. 7(3), pages 317-327, July.
    122. Vishwas Patil & R. K. Shyamasundar, 2005. "e-coupons: An Efficient, Secure and Delegable Micro-Payment System," Information Systems Frontiers, Springer, vol. 7(4), pages 371-389, December.
    123. João-Batista Destro-Filho, 2005. "Performance Comparison of Several Non-Linear Equalizers in the Context of Mobile Telecommunications," Information Systems Frontiers, Springer, vol. 7(2), pages 113-128, May.
    124. Helana Scheepers & Rens Scheepers, 2008. "A process-focused decision framework for analyzing the business value potential of IT investments," Information Systems Frontiers, Springer, vol. 10(3), pages 321-330, July.
    125. Shiguo Lian & Jean-Henry Morin & Stefanos Gritzalis & Gregory L. Heileman, 2012. "Special issue on ubiquitous multimedia services," Information Systems Frontiers, Springer, vol. 14(3), pages 477-479, July.
    126. Mark Umberger & Satja Lumbar & Iztok Humar, 2012. "Modeling the influence of network delay on the user experience in distributed home-automation networks," Information Systems Frontiers, Springer, vol. 14(3), pages 571-584, July.
    127. Hemant K. Sabat, 2008. "Spectrum acquisition strategies adopted by wireless carriers in the USA," Information Systems Frontiers, Springer, vol. 10(1), pages 77-102, March.
    128. Amit V. Deokar & Omar F. El-Gayar, 2011. "Decision-enabled dynamic process management for networked enterprises," Information Systems Frontiers, Springer, vol. 13(5), pages 655-668, November.
    129. Ludwig Christian Schaupp & Lemuria Carter, 2010. "The impact of trust, risk and optimism bias on E-file adoption," Information Systems Frontiers, Springer, vol. 12(3), pages 299-309, July.
    130. Chima Adiele, 2011. "Towards promoting interactivity in a B2B web community," Information Systems Frontiers, Springer, vol. 13(2), pages 237-249, April.
    131. Yuan Dong & Shiguo Lian, 2012. "Automatic and fast temporal segmentation for personalized news consuming," Information Systems Frontiers, Springer, vol. 14(3), pages 517-526, July.
    132. Daning Hu & Sherry X. Sun & J. Leon Zhao & Xinlei Zhao, 2011. "Strategic choices of inter-organizational information systems: A network perspective," Information Systems Frontiers, Springer, vol. 13(5), pages 681-692, November.
    133. Seungwok Han & Hee Yong Youn & Ohyoung Song, 2012. "Efficient category-based service discovery on multi-agent platform," Information Systems Frontiers, Springer, vol. 14(3), pages 601-616, July.
    134. Liping Shen & Victor Callaghan & Ruimin Shen, 2008. "Affective e-Learning in residential and pervasive computing environments," Information Systems Frontiers, Springer, vol. 10(4), pages 461-472, September.
    135. Jialun Qin & Yilu Zhou & Hsinchun Chen, 2011. "A multi-region empirical study on the internet presence of global extremist organizations," Information Systems Frontiers, Springer, vol. 13(1), pages 75-88, March.
    136. Stephen C. Hayne & Lucy J. Troup & Sara A. McComb, 2011. "“Where’s Farah?”: Knowledge silos and information fusion by distributed collaborating teams," Information Systems Frontiers, Springer, vol. 13(1), pages 89-100, March.
    137. Bendik Bygstad & Hans-Petter Aanby, 2010. "ICT infrastructure for innovation: A case study of the enterprise service bus approach," Information Systems Frontiers, Springer, vol. 12(3), pages 257-265, July.
    138. Julie Fisher & Rudy Hirschheim & Robert Jacobs, 2008. "Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company," Information Systems Frontiers, Springer, vol. 10(2), pages 165-178, April.
    139. Matthew Warren & Shona Leitch, 2010. "Hacker Taggers: A new type of hackers," Information Systems Frontiers, Springer, vol. 12(4), pages 425-431, September.
    140. Rodrigo Roman & Javier Lopez & Olivier Dugeon & Marc Lacoste & Pierre Yves Plaza & Marta Bel, 2012. "Advanced secure multimedia services for digital homes," Information Systems Frontiers, Springer, vol. 14(3), pages 527-540, July.
    141. Joyojeet Pal, 2009. "If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India," Information Systems Frontiers, Springer, vol. 11(2), pages 105-116, April.
    142. Nancy C. Roberts, 2011. "Tracking and disrupting dark networks: Challenges of data collection and analysis," Information Systems Frontiers, Springer, vol. 13(1), pages 5-19, March.
    143. Ming Li & Lu Liu & Lu Yin & Yanqiu Zhu, 2011. "A process mining based approach to knowledge maintenance," Information Systems Frontiers, Springer, vol. 13(3), pages 371-380, July.
    144. Arijit Sengupta & Shu Z. Schiller, 2010. "FlexRFID: A design, development and deployment framework for RFID-based business applications," Information Systems Frontiers, Springer, vol. 12(5), pages 551-562, November.
    145. Yuan-Chu Hwang & Soe-Tsyr Yuan & Jung-Hui Weng, 2011. "A study of the impacts of positive/negative feedback on collective wisdom—case study on social bookmarking sites," Information Systems Frontiers, Springer, vol. 13(2), pages 265-279, April.
    146. Remco M. Dijkman & Teduh Dirgahayu & Dick A. C. Quartel, 2007. "The adequacy of languages for representing interaction mechanisms," Information Systems Frontiers, Springer, vol. 9(4), pages 359-373, September.
    147. Chengen Wang & Lida Xu, 2008. "Parameter mapping and data transformation for engineering application integration," Information Systems Frontiers, Springer, vol. 10(5), pages 589-600, November.
    148. Yogesh K. Dwivedi & Anastasia Papazafeiropoulou & Willem-Paul Brinkman & Banita Lal, 2010. "Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider," Information Systems Frontiers, Springer, vol. 12(2), pages 207-217, April.
    149. Gunwoo Kim & Yongmoo Suh, 2011. "Semantic business process space for intelligent management of sales order business processes," Information Systems Frontiers, Springer, vol. 13(4), pages 515-542, September.
    150. Sanjay Gosain, 2007. "Realizing the vision for web services: Strategies for dealing with imperfect standards," Information Systems Frontiers, Springer, vol. 9(1), pages 53-67, March.
    151. Daniel Brenner & Colin Atkinson & Rainer Malaka & Matthias Merdes & Barbara Paech & Dima Suliman, 2007. "Reducing verification effort in component-based software engineering through built-in testing," Information Systems Frontiers, Springer, vol. 9(2), pages 151-162, July.
    152. Seung-Hyun Rhee & Nam Wook Cho & Hyerim Bae, 2010. "Increasing the efficiency of business processes using a theory of constraints," Information Systems Frontiers, Springer, vol. 12(4), pages 443-455, September.
    153. Charles Møller & Sohail S. Chaudhry & Bent Jørgensen, 2008. "Complex service design: A virtual enterprise architecture for logistics service," Information Systems Frontiers, Springer, vol. 10(5), pages 503-518, November.
    154. Alicja Gruźdź & Aleksandra Ihnatowicz & Dominik Ślʁzak, 2006. "Interactive Gene Clustering—A Case Study of Breast Cancer Microarray Data," Information Systems Frontiers, Springer, vol. 8(1), pages 21-27, February.
    155. Gary F. Templeton & Mark B. Schmidt & G. Stephen Taylor, 2009. "Managing the diffusion of organizational learning behavior," Information Systems Frontiers, Springer, vol. 11(2), pages 189-200, April.
    156. Pradeep Ray & Seyed A. Shahrestani & Farhad Daneshgar, 2005. "The Role of Fuzzy Awareness Modelling in Cooperative Management," Information Systems Frontiers, Springer, vol. 7(3), pages 299-316, July.
    157. Ruixi Yuan & Zhu Li & Xiaohong Guan & Li Xu, 2010. "An SVM-based machine learning method for accurate internet traffic classification," Information Systems Frontiers, Springer, vol. 12(2), pages 149-156, April.
    158. Rudy Hirschheim & Jens Dibbern & Armin Heinzl, 2008. "Foreword to the special issue on IS sourcing," Information Systems Frontiers, Springer, vol. 10(2), pages 125-127, April.
    159. Ray-I Chang & Te-Chih Wang & Chia-Hui Wang & Jen-Chang Liu & Jan-Ming Ho, 2012. "Effective distributed service architecture for ubiquitous video surveillance," Information Systems Frontiers, Springer, vol. 14(3), pages 499-515, July.
    160. Tomás Sánchez López & Damith Chinthana Ranasinghe & Bela Patkai & Duncan McFarlane, 2011. "Taxonomy, technology and applications of smart objects," Information Systems Frontiers, Springer, vol. 13(2), pages 281-300, April.
    161. Patrick C. K. Hung & Don Sparrow & Qing Li, 2007. "ISF special issue on enterprise services computing: Evolution and challenges," Information Systems Frontiers, Springer, vol. 9(2), pages 135-136, July.
    162. Joseph Barjis & Ashish Gupta & Ramesh Sharda, 2011. "Knowledge work and communication challenges in networked enterprises," Information Systems Frontiers, Springer, vol. 13(5), pages 615-619, November.
    163. Ling Li & Li Xu & Hueiwang Anna Jeng & Dayanand Naik & Thomas Allen & Maria Frontini, 2008. "Creation of environmental health information system for public health service: A pilot study," Information Systems Frontiers, Springer, vol. 10(5), pages 531-542, November.
    164. Jaeki Song & Yong Jin Kim, 2006. "Social influence process in the acceptance of a virtual community service," Information Systems Frontiers, Springer, vol. 8(3), pages 241-252, July.
    165. Ashish Arora & Anand Nandkumar & Rahul Telang, 2006. "Does information security attack frequency increase with vulnerability disclosure? An empirical analysis," Information Systems Frontiers, Springer, vol. 8(5), pages 350-362, December.
    166. Jason J. Jung & Yue-Shan Chang & Ying Liu & Chao-Chin Wu, 2012. "Advances in intelligent grid and cloud computing," Information Systems Frontiers, Springer, vol. 14(4), pages 823-825, September.
    167. Dickson K. W. Chiu & Drake T. T. Lin & Eleanna Kafeza & Minhong Wang & Haiyang Hu & Hua Hu & Yi Zhuang, 2010. "Alert based disaster notification and resource allocation," Information Systems Frontiers, Springer, vol. 12(1), pages 29-47, March.
    168. Yuan-Chu Hwang & Soe-Tsyr Yuan, 2009. "Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom," Information Systems Frontiers, Springer, vol. 11(1), pages 43-60, March.
    169. Marc Cheong & Vincent C. S. Lee, 2011. "A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 45-59, March.
    170. Jessica K. Winkler & Jens Dibbern & Armin Heinzl, 2008. "The impact of cultural differences in offshore outsourcing—Case study results from German–Indian application development projects," Information Systems Frontiers, Springer, vol. 10(2), pages 243-258, April.
    171. Jia Zhang & Karthik Akula & Momtazul Karim & Raghu Kumar Reddy Ariga, 2011. "A university-oriented Web 2.0 services portal," Information Systems Frontiers, Springer, vol. 13(2), pages 251-264, April.
    172. Michael Chau & George L. Ball & Jinghua Huang & Jian Chen & J. Leon Zhao, 2011. "Global IT and IT-enabled services," Information Systems Frontiers, Springer, vol. 13(3), pages 301-304, July.
    173. Hideyasu Sasaki, 2011. "A computing theory for collaborative and transparent decision making under time constraint," Information Systems Frontiers, Springer, vol. 13(2), pages 207-220, April.
    174. Janice Glasgow & Igor Jurisica, 2006. "Introduction: Knowledge Discovery in High-Throughput Biological Domains," Information Systems Frontiers, Springer, vol. 8(1), pages 5-7, February.
    175. Maarten Laat & Vic Lally, 2005. "Investigating Group Structure in CSCL: Some New Approaches," Information Systems Frontiers, Springer, vol. 7(1), pages 13-25, February.
    176. Aaron Luntala Nsakanda & Moustapha Diaby & Yuheng Cao, 2011. "An aggregate inventory-based model for predicting redemption and liability in loyalty reward programs industry," Information Systems Frontiers, Springer, vol. 13(5), pages 707-719, November.
    177. Alex Norta & Rik Eshuis, 2010. "Specification and verification of harmonized business-process collaborations," Information Systems Frontiers, Springer, vol. 12(4), pages 457-479, September.
    178. Quan Z. Sheng & Sherali Zeadally & Zongwei Luo & Jen-Yao Chung & Zakaria Maamar, 2010. "Ubiquitous RFID: Where are we?," Information Systems Frontiers, Springer, vol. 12(5), pages 485-490, November.
    179. Aikaterini Mitrokotsa & Melanie R. Rieback & Andrew S. Tanenbaum, 2010. "Classifying RFID attacks and defenses," Information Systems Frontiers, Springer, vol. 12(5), pages 491-505, November.
    180. Pingzhao Hu & Celia M. T. Greenwood & Joseph Beyene, 2006. "Statistical Methods for Meta-Analysis of Microarray Data: A Comparative Study," Information Systems Frontiers, Springer, vol. 8(1), pages 9-20, February.
    181. Emilio Alvarez-Suescun, 2010. "Combining transaction cost and resource-based insights to explain IT implementation outsourcing," Information Systems Frontiers, Springer, vol. 12(5), pages 631-645, November.
    182. Benoit A. Aubert & Guillaume Beaurivage & Anne-Marie Croteau & Suzanne Rivard, 2008. "Firm strategic profile and IT outsourcing," Information Systems Frontiers, Springer, vol. 10(2), pages 129-143, April.
    183. Lida Xu & WenAn Tan & Hongyuan Zhen & Weiming Shen, 2008. "An approach to enterprise process dynamic modeling supporting enterprise process evolution," Information Systems Frontiers, Springer, vol. 10(5), pages 611-624, November.
    184. Hamideh Afsarmanesh & Simon Samwel Msanjila & Luis M. Camarinha-Matos, 2012. "Technological research plan for active ageing," Information Systems Frontiers, Springer, vol. 14(3), pages 669-692, July.
    185. Xiang Fang & Clyde W. Holsapple, 2011. "Impacts of navigation structure, task complexity, and users’ domain knowledge on Web site usability—an empirical study," Information Systems Frontiers, Springer, vol. 13(4), pages 453-469, September.
    186. Shijie Zhou & Zhen Zhang & Zongwei Luo & Edward C. Wong, 2010. "A lightweight anti-desynchronization RFID authentication protocol," Information Systems Frontiers, Springer, vol. 12(5), pages 521-528, November.
    187. She-I Chang & David C. Yen & I-Cheng Chang & Jung-Chu Chou, 2012. "Study of the digital divide evaluation model for government agencies–a Taiwanese local government’s perspective," Information Systems Frontiers, Springer, vol. 14(3), pages 693-709, July.
    188. Noyan Ilk & J. Leon Zhao & Paulo Goes & Paul Hofmann, 2011. "Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems," Information Systems Frontiers, Springer, vol. 13(3), pages 359-370, July.
    189. Clyde W. Holsapple & Jiming Wu, 2008. "Building effective online game websites with knowledge-based trust," Information Systems Frontiers, Springer, vol. 10(1), pages 47-60, March.
    190. Dickson K. W. Chiu & Eleanna Kafeza & Patrick C. K. Hung, 2011. "ISF special issue on emerging social and legal aspects of information systems with Web 2.0," Information Systems Frontiers, Springer, vol. 13(2), pages 153-155, April.
    191. Dan J. Kim & Yujong Hwang, 2012. "A study of mobile internet user’s service quality perceptions from a user’s utilitarian and hedonic value tendency perspectives," Information Systems Frontiers, Springer, vol. 14(2), pages 409-421, April.
    192. Danny Greefhorst & Henk Koning & Hans van Vliet, 2006. "The many faces of architectural descriptions," Information Systems Frontiers, Springer, vol. 8(2), pages 103-113, February.
    193. Mohammad M. Masud & Latifur Khan & Bhavani Thuraisingham, 2008. "A scalable multi-level feature extraction technique to detect malicious executables," Information Systems Frontiers, Springer, vol. 10(1), pages 33-45, March.
    194. Ravi Patnayakuni & Cynthia P. Ruppel, 2010. "A socio-technical approach to improving the systems development process," Information Systems Frontiers, Springer, vol. 12(2), pages 219-234, April.
    195. Ulf Hedestig & Victor Kaptelinin, 2005. "Facilitator’s Roles in a Videoconference Learning Environment," Information Systems Frontiers, Springer, vol. 7(1), pages 71-83, February.
    196. Miladin Stefanovic & Milan Matijević & Milan Erić & Visnja Simic, 2009. "Method of design and specification of web services based on quality system documentation," Information Systems Frontiers, Springer, vol. 11(1), pages 75-86, March.
    197. Don Gotterbarn, 2010. "The ethics of video games: Mayhem, death, and the training of the next generation," Information Systems Frontiers, Springer, vol. 12(4), pages 369-377, September.
    198. Kuan-Chou Lai & You-Fu Yu, 2012. "A scalable multi-attribute hybrid overlay for range queries on the cloud," Information Systems Frontiers, Springer, vol. 14(4), pages 895-908, September.
    199. Alain Mouttham & Craig Kuziemsky & Dishant Langayan & Liam Peyton & Jose Pereira, 2012. "Interoperable support for collaborative, mobile, and accessible health care," Information Systems Frontiers, Springer, vol. 14(1), pages 73-85, March.
    200. Agnès Voisard & Holger Ziekow, 2012. "Modeling trade-offs in the design of sensor-based event processing infrastructures," Information Systems Frontiers, Springer, vol. 14(2), pages 317-330, April.
    201. Shoubo Xu, 2008. "The concept and theory of material flow," Information Systems Frontiers, Springer, vol. 10(5), pages 601-609, November.
    202. Janice C. Sipior & Burke T. Ward, 2008. "Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation," Information Systems Frontiers, Springer, vol. 10(1), pages 3-18, March.
    203. Shan Wang & Shi Zheng & Lida Xu & Dezheng Li & Huan Meng, 2008. "A literature review of electronic marketplace research: Themes, theories and an integrative framework," Information Systems Frontiers, Springer, vol. 10(5), pages 555-571, November.
    204. Henk Jonkers & Marc M. Lankhorst & Hugo W. L. ter Doest & Farhad Arbab & Hans Bosma & Roel J. Wieringa, 2006. "Enterprise architecture: Management tool and blueprint for the organisation," Information Systems Frontiers, Springer, vol. 8(2), pages 63-66, February.
    205. Youcef Baghdadi, 2006. "Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing," Information Systems Frontiers, Springer, vol. 8(5), pages 395-410, December.
    206. Ellen Balka & Sandra Whitehouse & Shannon T. Coates & Dug Andrusiek, 2012. "Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions," Information Systems Frontiers, Springer, vol. 14(1), pages 19-42, March.
    207. Li Wang & Lida Xu & Renjing Liu & Hai Hong Wang, 2010. "An approach for moving object recognition based on BPR and CI," Information Systems Frontiers, Springer, vol. 12(2), pages 141-148, April.
    208. Senaka Fernando & Jyoti Choudrie & Mark Lycett & Sergio Cesare, 2012. "Hidden assumptions and their influence on clinicians’ acceptance of new IT systems in the NHS," Information Systems Frontiers, Springer, vol. 14(2), pages 279-299, April.
    209. Pontus Johnson & Robert Lagerström & Per Närman & Mårten Simonsson, 2007. "Enterprise architecture analysis with extended influence diagrams," Information Systems Frontiers, Springer, vol. 9(2), pages 163-180, July.
    210. Kurt DeMaagd & Johannes M. Bauer, 2011. "Modeling the dynamic interactions of agents in the provision of network infrastructure," Information Systems Frontiers, Springer, vol. 13(5), pages 669-680, November.
    211. Jungyub Woo & Nenad Ivezic & Hyunbo Cho, 2012. "Agile test framework for business-to-business interoperability," Information Systems Frontiers, Springer, vol. 14(3), pages 789-808, July.
    212. Shazia Sadiq & Michael zur Muehlen & Marta Indulska, 2012. "Governance, risk and compliance: Applications in information systems," Information Systems Frontiers, Springer, vol. 14(2), pages 123-124, April.
    213. Pradeep Ray & Lundy Lewis, 2009. "Managing cooperation in e-business systems," Information Systems Frontiers, Springer, vol. 11(2), pages 181-188, April.
    214. Kenichi Watanabe & Tomoya Enokido & Makoto Takizawa, 2006. "Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks," Information Systems Frontiers, Springer, vol. 8(4), pages 271-284, September.
    215. Hongqiao Yang & Weizi Li & Kecheng Liu & Junping Zhang, 2012. "Knowledge-based clinical pathway for medical quality improvement," Information Systems Frontiers, Springer, vol. 14(1), pages 105-117, March.
    216. Phillipa Oaks & Arthur Hofstede, 2007. "Guided interaction: A mechanism to enable ad hoc service interaction," Information Systems Frontiers, Springer, vol. 9(1), pages 29-51, March.
    217. Selwyn Piramuthu, 2012. "Vulnerabilities of RFID protocols proposed in ISF," Information Systems Frontiers, Springer, vol. 14(3), pages 647-651, July.
    218. Mahfuz Ashraf & Jo Hanisch & Paul Swatman, 2009. "ICT intervention in the ‘Chandanbari’ Village of Bangladesh: Results from a field study," Information Systems Frontiers, Springer, vol. 11(2), pages 155-166, April.
    219. Namho Lee & Jae Kwon Bae & Chulmo Koo, 2012. "A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment," Information Systems Frontiers, Springer, vol. 14(3), pages 653-668, July.
    220. Íñigo Goiri & Jordi Guitart & Jordi Torres, 2012. "Economic model of a Cloud provider operating in a federated Cloud," Information Systems Frontiers, Springer, vol. 14(4), pages 827-843, September.
    221. Kun-Lung Wu & Shyh-Kwei Chen & Philip S. Yu, 2005. "Efficient Processing of Continual Range Queries for Location-Aware Mobile Services," Information Systems Frontiers, Springer, vol. 7(4), pages 435-448, December.
    222. Haluk Demirkan & Sagnika Sen & Michael Goul & Jason Nichols, 2012. "Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows," Information Systems Frontiers, Springer, vol. 14(3), pages 765-788, July.
    223. Shengguang Meng & Dickson K. W. Chiu & Eleanna Kafeza & Liu Wenyin & Qing Li, 2010. "Automated management of assets based on RFID triggered alarm messages," Information Systems Frontiers, Springer, vol. 12(5), pages 563-578, November.
    224. M. J. O’Grady & G. M. P. O’Hare & J. Chen & D. Phelan, 2009. "Distributed network intelligence: A prerequisite for adaptive and personalised service delivery," Information Systems Frontiers, Springer, vol. 11(1), pages 61-73, March.
    225. Susan A. Brown, 2008. "Household technology adoption, use, and impacts: Past, present, and future," Information Systems Frontiers, Springer, vol. 10(4), pages 397-402, September.
    226. Jane Yung-jen Hsu & Kwei-Jay Lin & Tsung-Hsiang Chang & Chien-ju Ho & Han-Shen Huang & Wan-rong Jih, 2006. "Parameter learning of personalized trust models in broker-based distributed trust management," Information Systems Frontiers, Springer, vol. 8(4), pages 321-333, September.
    227. Dinesh A. Mirchandani & Julius H. Johnson Jr. & Kailash Joshi, 2008. "Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis," Information Systems Frontiers, Springer, vol. 10(4), pages 483-497, September.
    228. Kweku-Muata Osei-Bryson & Ojelanki Ngwenyama, 2008. "Decision models for information systems management," Information Systems Frontiers, Springer, vol. 10(3), pages 277-279, July.
    229. Hiroyuki Morohoshi & Runhe Huang & Jianhua Ma, 2006. "A user-friendly platform for developing and accessing grid services," Information Systems Frontiers, Springer, vol. 8(4), pages 255-269, September.
    230. Xin Xu & Will Wai Kit Ma & Eric Wing Kuen See-To, 2010. "Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance," Information Systems Frontiers, Springer, vol. 12(3), pages 311-322, July.
    231. Samuel Fosso Wamba & Akemi Takeoka Chatfield, 2011. "The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry," Information Systems Frontiers, Springer, vol. 13(5), pages 693-706, November.
    232. Joyojeet Pal & Meera Lakshmanan & Kentaro Toyama, 2009. "“My child will be respected”: Parental perspectives on computers and education in Rural India," Information Systems Frontiers, Springer, vol. 11(2), pages 129-144, April.
    233. Onook Oh & Manish Agrawal & H. Raghav Rao, 2011. "Information control and terrorism: Tracking the Mumbai terrorist attack through twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 33-43, March.
    234. Vincenza Carchiolo & Sebastiano D’Ambra & Alessandro Longheu & Michele Malgeri, 2010. "Object-oriented re-engineering of manufacturing models: A case study," Information Systems Frontiers, Springer, vol. 12(2), pages 97-114, April.
    235. Ling Li & Ricardo Valerdi & John N. Warfield, 2008. "Advances in enterprise information systems," Information Systems Frontiers, Springer, vol. 10(5), pages 499-501, November.
    236. Nong Ye & Toni Farley & Deepak Lakshminarasimhan, 2006. "An attack-norm separation approach for detecting cyber attacks," Information Systems Frontiers, Springer, vol. 8(3), pages 163-177, July.
    237. Levent V. Orman, 2006. "Optimum design of electronic communities as economic entities," Information Systems Frontiers, Springer, vol. 8(3), pages 179-194, July.
    238. Evelina Pencheva & Ivaylo Atanasov, 2012. "Third party application control on quality of service in IP based multimedia networks," Information Systems Frontiers, Springer, vol. 14(3), pages 555-569, July.
    239. Jorge Guajardo & Boris Škorić & Pim Tuyls & Sandeep S. Kumar & Thijs Bel & Antoon H. M. Blom & Geert-Jan Schrijen, 2009. "Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions," Information Systems Frontiers, Springer, vol. 11(1), pages 19-41, March.
    240. Bert Op het Veld & Dennis Hohlfeld & Valer Pop, 2009. "Harvesting mechanical energy for ambient intelligent devices," Information Systems Frontiers, Springer, vol. 11(1), pages 7-18, March.
    241. Jason J. Jung, 2012. "ContextGrid: A contextual mashup-based collaborative browsing system," Information Systems Frontiers, Springer, vol. 14(4), pages 953-961, September.
    242. WenAn Tan & ChuanQun Jiang & Ling Li & Zhenhong Lv, 2008. "Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies," Information Systems Frontiers, Springer, vol. 10(5), pages 519-529, November.
    243. Lawrence A. Gordon & Martin P. Loeb, 2006. "Economic aspects of information security: An emerging field of research," Information Systems Frontiers, Springer, vol. 8(5), pages 335-337, December.
    244. Daniel Zeng & Donghua Wei & Michael Chau & Feiyue Wang, 2011. "Domain-specific Chinese word segmentation using suffix tree and mutual information," Information Systems Frontiers, Springer, vol. 13(1), pages 115-125, March.
    245. Ozgur Turetken, 2008. "Is your back-up IT infrastructure in a safe location?," Information Systems Frontiers, Springer, vol. 10(3), pages 375-383, July.
    246. Yanjun Zuo, 2010. "Secure and private search protocols for RFID systems," Information Systems Frontiers, Springer, vol. 12(5), pages 507-519, November.
    247. Torsten J. Gerpott, 2011. "Determinants of self-report and system-captured measures of mobile Internet use intensity," Information Systems Frontiers, Springer, vol. 13(4), pages 561-578, September.
    248. Kim Wüllenweber & Daniel Beimborn & Tim Weitzel & Wolfgang König, 2008. "The impact of process standardization on business process outsourcing success," Information Systems Frontiers, Springer, vol. 10(2), pages 211-224, April.
    249. Martin Beer & Frances Slack & Gillian Armitt, 2005. "Collaboration and Teamwork: Immersion and Presence in an Online Learning Environment," Information Systems Frontiers, Springer, vol. 7(1), pages 27-37, February.
    250. Nasir Memon & Thomas Daniels, 2007. "Special issue on secure knowledge management," Information Systems Frontiers, Springer, vol. 9(5), pages 449-450, November.
    251. Namho Lee & Jae Kwon Bae & Chulmo Koo, 2012. "Erratum to: A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment," Information Systems Frontiers, Springer, vol. 14(5), pages 1095-1095, December.
    252. Yinsheng Li & Xiaohua Lu & Kuo-Ming Chao & Ying Huang & Muhammad Younas, 2006. "The realization of service-oriented e-Marketplaces," Information Systems Frontiers, Springer, vol. 8(4), pages 307-319, September.
    253. Minu Ipe & T. S. Raghu & Ajay Vinze, 2010. "Information intermediaries for emergency preparedness and response: A case study from public health," Information Systems Frontiers, Springer, vol. 12(1), pages 67-79, March.
    254. Quan Z. Sheng & Sherali Zeadally & Zongwei Luo & Jen-Yao Chung & Zakaria Maamar, 2010. "Guest editorial: Advances in RFID technology," Information Systems Frontiers, Springer, vol. 12(5), pages 481-483, November.
    255. Janice Glasgow & Tony Kuo & Jim Davies, 2006. "Protein Structure from Contact Maps: A Case-Based Reasoning Approach," Information Systems Frontiers, Springer, vol. 8(1), pages 29-36, February.
    256. Lily Sun & Khadidjatou Ousmanou & Matthew Cross, 2010. "An ontological modelling of user requirements for personalised information provision," Information Systems Frontiers, Springer, vol. 12(3), pages 337-356, July.
    257. Junjie Wu & Jian Chen & Yili Ren, 2011. "GIS enabled service site selection: Environmental analysis and beyond," Information Systems Frontiers, Springer, vol. 13(3), pages 337-348, July.
    258. F. Goethals & W. Lemahieu & M. Snoeck & J. Vandenbulcke, 2006. "Management and enterprise architecture click," Post-Print hal-00322787, HAL.
    259. Åsa Lindström & Pontus Johnson & Erik Johansson & Mathias Ekstedt & Mårten Simonsson, 2006. "A survey on CIO concerns-do enterprise architecture frameworks support them?," Information Systems Frontiers, Springer, vol. 8(2), pages 81-90, February.
    260. Yung-Ming Li & Jhih-Hua Jhang-Li & Ting-Kai Hwang & Ping-Wen Chen, 2012. "Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost," Information Systems Frontiers, Springer, vol. 14(3), pages 633-645, July.
    261. Kweku-Muata Osei-Bryson & Kendall Giles, 2006. "Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families," Information Systems Frontiers, Springer, vol. 8(3), pages 195-209, July.
    262. Emmanouil A. Panaousis & Christos Politis & Konstantinos Birkos & Christos Papageorgiou & Tasos Dagiuklas, 2012. "Security model for emergency real-time communications in autonomous networks," Information Systems Frontiers, Springer, vol. 14(3), pages 541-553, July.
    263. Devaki Rau & Thorvald Haerem, 2010. "Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research," Information Systems Frontiers, Springer, vol. 12(3), pages 287-297, July.
    264. Michael F. Nowlan & M. Brian Blake, 2007. "Agent-mediated knowledge sharing for intelligent services management," Information Systems Frontiers, Springer, vol. 9(4), pages 411-421, September.
    265. Lila Rao & Kweku-Muata Osei-Bryson, 2008. "An approach for incorporating quality-based cost–benefit analysis in data warehouse design," Information Systems Frontiers, Springer, vol. 10(3), pages 361-373, July.
    266. David Bell & Sergio Cesare & Nicola Iacovelli & Mark Lycett & Antonio Merico, 2007. "A framework for deriving semantic web services," Information Systems Frontiers, Springer, vol. 9(1), pages 69-84, March.
    267. Syaiful Ali & Peter Green, 2012. "Effective information technology (IT) governance mechanisms: An IT outsourcing perspective," Information Systems Frontiers, Springer, vol. 14(2), pages 179-193, April.
    268. MinJae Lee & JinKyu Lee, 2012. "The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet," Information Systems Frontiers, Springer, vol. 14(2), pages 375-393, April.
    269. Sheryl Prentice & Paul J. Taylor & Paul Rayson & Andrew Hoskins & Ben O’Loughlin, 2011. "Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict," Information Systems Frontiers, Springer, vol. 13(1), pages 61-73, March.
    270. Dan Hong & Dickson K. W. Chiu & Vincent Y. Shen & S. C. Cheung & Eleanna Kafeza, 2007. "Ubiquitous enterprise service adaptations based on contextual user behavior," Information Systems Frontiers, Springer, vol. 9(4), pages 343-358, September.
    271. Marijn Janssen & JinKyu Lee & Nitesh Bharosa & Anthony Cresswell, 2010. "Advances in multi-agency disaster management: Key elements in disaster research," Information Systems Frontiers, Springer, vol. 12(1), pages 1-7, March.
    272. Hemant K. Sabat, 2005. "The Network Investment Economics of the Mobile Wireless Industry," Information Systems Frontiers, Springer, vol. 7(2), pages 187-206, May.
    273. Mary C. Lacity & Vidya V. Iyer & Prasad S. Rudramuniyaiah, 2008. "Turnover intentions of Indian IS professionals," Information Systems Frontiers, Springer, vol. 10(2), pages 225-241, April.
    274. Xue Li & Jing Liu & Quan Z. Sheng & Sherali Zeadally & Weicai Zhong, 2011. "TMS-RFID: Temporal management of large-scale RFID applications," Information Systems Frontiers, Springer, vol. 13(4), pages 481-500, September.
    275. Jiexun Li & G. Alan Wang & Hsinchun Chen, 2011. "Identity matching using personal and social identity features," Information Systems Frontiers, Springer, vol. 13(1), pages 101-113, March.
    276. Edgar A. Maldonado & Carleen F. Maitland & Andrea H. Tapia, 2010. "Collaborative systems development in disaster relief: The impact of multi-level governance," Information Systems Frontiers, Springer, vol. 12(1), pages 9-27, March.
    277. Rong Liu & Akhil Kumar, 2011. "Leveraging information sharing to configure supply chains," Information Systems Frontiers, Springer, vol. 13(1), pages 139-151, March.
    278. Athanasios Loukas & Dimitrios Damopoulos & Sofia A. Menesidou & Maria E. Skarkala & Georgios Kambourakis & Stefanos Gritzalis, 2012. "MILC: A secure and privacy-preserving mobile instant locator with chatting," Information Systems Frontiers, Springer, vol. 14(3), pages 481-497, July.
    279. Kenneth Chan & Iman Poernomo, 2007. "QoS-aware model driven architecture through the UML and CIM," Information Systems Frontiers, Springer, vol. 9(2), pages 209-224, July.
    280. Dick A. C. Quartel & Maarten W. A. Steen & Stanislav Pokraev & Marten J. Sinderen, 2007. "COSMO: A conceptual framework for service modelling and refinement," Information Systems Frontiers, Springer, vol. 9(2), pages 225-244, July.
    281. Michael Goul & Karen Corral & Haluk Demirkan, 2005. "Database Schema Design for a Web Services Supply Chain Manager: Requirements and Proposed Infrastructure," Information Systems Frontiers, Springer, vol. 7(3), pages 257-271, July.
    282. Cevriye Gencer & Emel Kizilkaya Aydogan & Coskun Celik, 2008. "A decision support system for locating VHF/UHF radio jammer systems on the terrain," Information Systems Frontiers, Springer, vol. 10(1), pages 111-124, March.
    283. Jeanine Warisse Turner & N. Lamar Reinsch, 2010. "Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages?," Information Systems Frontiers, Springer, vol. 12(3), pages 277-285, July.
    284. Minhong Wang, 2011. "Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning," Information Systems Frontiers, Springer, vol. 13(2), pages 191-205, April.
    285. Marie Griffiths & Ben Light, 2008. "Social networking and digital gaming media convergence: Classification and its consequences for appropriation," Information Systems Frontiers, Springer, vol. 10(4), pages 447-459, September.
    286. Yuqing Sun & Joshua Zhexue Huang & Xiangxu Meng, 2011. "Integrating constraints to support legally flexible business processes," Information Systems Frontiers, Springer, vol. 13(2), pages 171-189, April.
    287. Artem Chebotko & Seunghan Chang & Shiyong Lu & Farshad Fotouhi, 2012. "Secure XML querying based on authorization graphs," Information Systems Frontiers, Springer, vol. 14(3), pages 617-632, July.
    288. Daisy Daiqin He & Jian Yang & Michael Compton & Kerry Taylor, 2012. "Authorization in cross-border eHealth systems," Information Systems Frontiers, Springer, vol. 14(1), pages 43-55, March.
    289. Patrick C. K. Hung, 2007. "Special issue on enterprise distributed computing model and implementation," Information Systems Frontiers, Springer, vol. 9(4), pages 325-326, September.
    290. René Peinl & Ronald Maier, 2011. "SimKnowledge—Analyzing impact of knowledge management measures on team organizations with multi agent-based simulation," Information Systems Frontiers, Springer, vol. 13(5), pages 621-636, November.
    291. Sven Laumer & Andreas Eckhardt & Natascha Trunk, 2010. "Do as your parents say?—Analyzing IT adoption influencing factors for full and under age applicants," Information Systems Frontiers, Springer, vol. 12(2), pages 169-183, April.
    292. Say Yen Teoh & Shan L. Pan & Anand M. Ramchand, 2012. "Resource management activities in healthcare information systems: A process perspective," Information Systems Frontiers, Springer, vol. 14(3), pages 585-600, July.
    293. Malgorzata Plaza, 2008. "Team performance and information system implementation," Information Systems Frontiers, Springer, vol. 10(3), pages 347-359, July.
    294. Maria Carla Calzarossa & Ivo Lotto & Simon Rogerson, 2010. "Ethics and information systems — Guest editors’ introduction," Information Systems Frontiers, Springer, vol. 12(4), pages 357-359, September.
    295. Oleksandr Panchenko & Hasso Plattner & Alexander B. Zeier, 2011. "Efficient storage and fast querying of source code," Information Systems Frontiers, Springer, vol. 13(3), pages 349-357, July.
    296. Gary F. Templeton & James F. Dowdy, 2012. "CASE-mediated organizational and deutero learning at NASA," Information Systems Frontiers, Springer, vol. 14(3), pages 741-764, July.
    297. Detmar Straub & Peter Weill & Kathy S. Schwaig, 2008. "Strategic dependence on the IT resource and outsourcing: A test of the strategic control model," Information Systems Frontiers, Springer, vol. 10(2), pages 195-210, April.
    298. Satyen Mukherjee & Emile Aarts & Terry Doyle, 2009. "Special issue on Ambient Intelligence," Information Systems Frontiers, Springer, vol. 11(1), pages 1-5, March.
    299. Tim Goles & Stephen Hawk & Kate M. Kaiser, 2008. "Information technology workforce skills: The software and IT services provider perspective," Information Systems Frontiers, Springer, vol. 10(2), pages 179-194, April.
    300. Marco Crasso & Alejandro Zunino & Marcelo Campo, 2011. "Combining query-by-example and query expansion for simplifying web service discovery," Information Systems Frontiers, Springer, vol. 13(3), pages 407-428, July.
    301. Francis Kofi Andoh-Baidoo & Kweku-Muata Osei-Bryson & Kwasi Amoako-Gyampah, 2012. "Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework," Information Systems Frontiers, Springer, vol. 14(2), pages 237-259, April.
    302. Karthikeyan Umapathy & Sandeep Purao, 2007. "A theoretical investigation of the emerging standards for web services," Information Systems Frontiers, Springer, vol. 9(1), pages 119-134, March.
    303. Barbara Begier, 2010. "Users’ involvement may help respect social and ethical values and improve software quality," Information Systems Frontiers, Springer, vol. 12(4), pages 389-397, September.
    304. Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson, 2011. "Introduction to special issue on terrorism informatics," Information Systems Frontiers, Springer, vol. 13(1), pages 1-3, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ram Ramesh & H. Raghav Rao, 2015. "Foreword: Information Systems Frontiers," Information Systems Frontiers, Springer, vol. 17(1), pages 1-2, February.
    2. Ghassan Beydoun & Babak Abedin & José M. Merigó & Melanie Vera, 2019. "Twenty Years of Information Systems Frontiers," Information Systems Frontiers, Springer, vol. 21(2), pages 485-494, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo, 2020. "Using Mobile Phone Data for Emergency Management: a Systematic Literature Review," Information Systems Frontiers, Springer, vol. 22(6), pages 1539-1559, December.
    2. R. Ramesh & H. Raghav Rao, 2011. "Editorial," Information Systems Frontiers, Springer, vol. 13(4), pages 451-452, September.
    3. Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson, 2011. "Introduction to special issue on terrorism informatics," Information Systems Frontiers, Springer, vol. 13(1), pages 1-3, March.
    4. Nilgun Fescioglu-Unver & Sung Hee Choi & Dongmok Sheen & Soundar Kumara, 2015. "RFID in production and service systems: Technology, applications and issues," Information Systems Frontiers, Springer, vol. 17(6), pages 1369-1380, December.
    5. Shazia Sadiq & Michael Muehlen & Marta Indulska, 2012. "Preface," Information Systems Frontiers, Springer, vol. 14(2), pages 119-121, April.
    6. Sven Laumer & Andreas Eckhardt & Natascha Trunk, 2010. "Do as your parents say?—Analyzing IT adoption influencing factors for full and under age applicants," Information Systems Frontiers, Springer, vol. 12(2), pages 169-183, April.
    7. Jens Weber-Jahnke & Liam Peyton & Thodoros Topaloglou, 2012. "eHealth system interoperability," Information Systems Frontiers, Springer, vol. 14(1), pages 1-3, March.
    8. Anastasia Papazafeiropoulou & Konstantina Spanaki, 2016. "Understanding governance, risk and compliance information systems (GRC IS): The experts view," Information Systems Frontiers, Springer, vol. 18(6), pages 1251-1263, December.
    9. J. Leon Zhao & Mohan Tanniru & Liang-Jie Zhang, 2007. "Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue," Information Systems Frontiers, Springer, vol. 9(1), pages 1-8, March.
    10. Jun Sun & Zhe Qu, 2015. "Understanding health information technology adoption: A synthesis of literature from an activity perspective," Information Systems Frontiers, Springer, vol. 17(5), pages 1177-1190, October.
    11. Wafa Bouaynaya, 2020. "Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method," Information Systems Frontiers, Springer, vol. 22(6), pages 1505-1518, December.
    12. Barry A. Cumbie & Chetan S. Sankar, 2012. "Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process," Information Systems Frontiers, Springer, vol. 14(5), pages 1079-1094, December.
    13. Jason J. Jung & Yue-Shan Chang & Ying Liu & Chao-Chin Wu, 2012. "Advances in intelligent grid and cloud computing," Information Systems Frontiers, Springer, vol. 14(4), pages 823-825, September.
    14. Sam Solaimani & Harry Bouwman & Timo Itälä, 2015. "Networked enterprise business model alignment: A case study on smart living," Information Systems Frontiers, Springer, vol. 17(4), pages 871-887, August.
    15. Frederico Cruz-Jesus & Tiago Oliveira & Fernando Bacao & Zahir Irani, 2017. "Assessing the pattern between economic and digital development of countries," Information Systems Frontiers, Springer, vol. 19(4), pages 835-854, August.
    16. Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja, 2017. "Factors affecting the performance of internal control task team in high-tech firms," Information Systems Frontiers, Springer, vol. 19(4), pages 787-802, August.
    17. Nripendra P. Rana & Yogesh K. Dwivedi & Michael D. Williams, 2015. "A meta-analysis of existing research on citizen adoption of e-government," Information Systems Frontiers, Springer, vol. 17(3), pages 547-563, June.
    18. John Oredo & Denis Dennehy, 2023. "Exploring the Role of Organizational Mindfulness on Cloud Computing and Firm Performance: The Case of Kenyan Organizations," Information Systems Frontiers, Springer, vol. 25(5), pages 2029-2050, October.
    19. Kawaljeet Kaur Kapoor & Kuttimani Tamilmani & Nripendra P. Rana & Pushp Patil & Yogesh K. Dwivedi & Sridhar Nerur, 2018. "Advances in Social Media Research: Past, Present and Future," Information Systems Frontiers, Springer, vol. 20(3), pages 531-558, June.
    20. Petter Gottschalk, 2010. "Knowledge management technology for organized crime risk assessment," Information Systems Frontiers, Springer, vol. 12(3), pages 267-275, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:17:y:2015:i:1:d:10.1007_s10796-014-9544-z. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.