Content
2023, Volume 22, Issue 1/2
- 1-12 The effects of relationship quality and knowledge sharing on service innovation performance: organisational learning as a mediator
by Zhao-quan Jian & Mohamed Ali Osman & Lei Li - 13-31 Impact of e-commerce on supply chain management
by P.G. Saleeshya & R. Rahul - 32-56 Determinants of success and failure of knowledge transfer in information systems offshoring: a ranking-type Delphi study
by Artur Strasser & Susanne Strahringer & Markus Westner - 57-75 How to evaluate brand extension in the mobile internet environment
by Wenlong Zhu & Shiye Wang - 76-109 QoE-based service differentiation: an analysis of the business implications for the mobile services market
by Luis Guillermo Martinez Ballesteros & Per Jonny Nesse & Jan Markendahl - 110-126 Research on evaluation of network payment security
by Xiang Xie & Yingte Wang & Ying Cui - 127-139 Scrutinising medical practitioners' Twitter feeds: an analysis
by Arushi Jain & Vishal Bhatnagar & Nilanjan Dey & Amira S. Ashour & Fuqian Shi - 140-159 Big data block impact within big data environment
by Ron Ziv & Oded Koren & Nir Perel - 160-174 A reliability and security enhanced framework for cloud-based storage systems
by Peng Xiao
2022, Volume 21, Issue 4
- 345-358 Network intrusion detection method based on improved ant colony algorithm combined with cluster analysis in cloud computing environment
by Xifeng Wang & Xiaoluan Zhang - 359-368 An intelligent image denoising method using weighted multi-scale CB morphological filter algorithm
by Yongjie Tan & Jie Qin - 369-381 An intelligent image detection method using improved canny edge detection operator
by Qian Wang & Wenxia Chen & Haiyun Peng - 382-393 Fine-grained sentiment classification based on semantic extension of target word
by Xindong You & Pengfei Guan & Xueqiang Lv & Baoan Li & Xueping Ren - 394-404 Research on evaluation of minimum backbone grid of transmission network based on differentiation planning
by Xinyang Deng & Tao Wang & Yihe Wang & Na Zhang & Kai Liu & Fangyuan Yang - 405-422 Research on control strategy of grid-connected inverter based on three-loop structure
by Yan Geng & Yingjun Ju & Bo Hu & Jianwei Ji
2022, Volume 21, Issue 2/3
- 139-152 Optimisation decision model of enterprise financial risk management combining stochastic demand
by Dandan Zhao & Lin Li - 153-168 Research on integrated management of sales and inventory information in circulation enterprises based on case-based learning
by Ruirong Jing & Huilin Wang & Guohui Gao - 169-184 Research on efficiency evaluation of financial refinement management based on DEA
by Lv Wenwen & Zarina Abdul Salam - 185-199 Mobile payment risk prediction of communication operators under new business model
by Xiao-ying Shi - 200-214 Establishment of business risk information value assessment model based on RAROC
by Nuan Wang - 215-232 Research on real-time acquisition method of logistics location information of electric commerce based on ranking threshold
by Mei Mei - 233-247 Research on visualisation transmission method for business innovation strategy data based on structural characteristics
by Jing Hu - 248-263 Early warning method for enterprise financial informatisation caused by tax difference
by Guojian Lin & Weichuan Chen - 264-279 Research on digital management method of market information based on fusion information
by Jing Li & Ming Yan - 280-293 Trajectory information acquisition method for library borrowing behaviour based on RFID technology
by Huan Zhou & Enjun Ding - 294-310 Feature extraction modelling of enterprise innovation behaviour data based on morphological gradient
by Shibiao Mu - 311-326 Information supervisory model for financial risk prevention and control based on twin-SVM
by Qiong Kang - 327-341 Integration technology of logistics information resources in electric power enterprises based on web services
by Zijian Zhang & Yu Liang & Yu Cui & Junyu Liu
2022, Volume 21, Issue 1
- 1-12 Construction of an urban multi variable geospatial information integration model based on distributed artificial intelligence
by Lede Niu & Mei Pan & Yan Zhou - 13-29 Optimisation of cost accounting method for resource flow based on blockchain technology
by Sanping Qiu - 30-45 The information association model of college students' archives based on a cloud computing management platform
by Can Yi - 46-62 Design of information push system for global tourist routes in eco-scenic spots based on GIS
by Cuixia Li & Wenqia Shao - 63-79 Dynamic distribution and planning for traffic flow of the urban ecological road network based on blockchain technology
by Xian Luo & Rongtao Liao & Yixi Wang & Wei Zhan - 80-96 A multi-terminal pushing method for emergency information in a smart city based on deep learning
by Zheng Xie & Xin Su - 97-114 Intelligent control method of accounting information based on multi-objective evolution
by Qian Liu & Kim R. Thorup - 115-137 'Are you having a laugh?': detecting humorous expressions on social media: an exploration of theory, current approaches and future work
by Suzanne Elayan & Martin Sykora & Thomas W. Jackson & Ejovwoke Onojeharho
2021, Volume 20, Issue 4
- 335-355 Information systems continuance: the role of incentives and goal harmony
by Tove Bøe & Boge Gulbrandsen & Tom Roar Eikebrokk - 356-376 Enhancing Excel business tools with additional relational and recursive capabilities
by Pedro Ramos & Luís Botelho & António Gonçalves Martins - 377-399 Validation of cognitive inhibitors to technology adoption using content analysis
by Easwar Krishna Iyer & Sreehari Unnikrishnan & Paul Philip & Mallika Sundarrajan & Bharadhwaj Sivakumaran - 400-423 Illusion of SNS influence: are popular SNS influential?
by Dongback Seo & Martin P. Bügel - 424-435 Investigating the role of information technology in developing the learning organisation: empirical evidence from Egypt
by Hadia H. Abdel Aziz & Karim Hodeib
2021, Volume 20, Issue 3
- 221-233 Big data prediction method of traffic logistics demands based on regional differences
by Rongting Sun & Yiqun Guo - 234-249 Research on regional spatial logistics information integration method based on big data
by Xiang-dong Chen & Gregory Kalra - 250-264 Intelligent classification of logistics multi-distribution resources based on information fusion
by Xinxian Qiu - 265-281 Research on routing optimisation of logistics distribution vehicle based on cloud model
by Zhongmin Liu & Jia Lyu - 282-298 Design of logistics transportation monitoring system based on GPS/DR combined positioning technology
by Wenlian Deng & Aida Maki - 299-315 Design of logistics operation management algorithm based on information technology on internet
by Lili Shao & Fuxian Huang & Yuzhen Yang - 316-334 Integrated equilibrium planning for emergency logistics warehouse allocation based on internet plus mode
by Chao-sheng Han & Kim R. Thorup
2021, Volume 20, Issue 1/2
- 5-20 Assessing the impact of information technology on human resource practices: evidence from organisations in Ghana
by Mayqueen Attatsitsey & Noble Osei-Bonsu - 21-48 Investigation and analysis on crowdsourcing for improving enterprise QoS
by S. Remya & R. Sasikala - 49-65 Automatic brain tumour detection using image processing and data mining techniques
by R. Geetha Ramani & Febronica Faustina & Shalika Siddique & K. Sivaselvi - 66-82 Congestion management with improved real power transfer using TCSC in 30 bus system
by P. Kalaimani & K. Mohana Sundaram - 83-94 Classification of cricket videos using finite state machines
by Vijayan Ellappan & R. Rajkumar - 95-109 An improved mean curvature-based bending model for cloth simulation
by Xiaohui Tan & Ruiliang Guo - 110-131 A review on feature selection methods for improving the performance of classification in educational data mining
by Maryam Zaffar & Manzoor Ahmed Hashmani & K.S. Savita & Sameer Ahmad Khan - 132-144 Frequency variations management in deregulated environment using intelligent controller
by C.V. Aravind & Yi Heng Ser & Charles R. Sarimuthu & Ramani Kannan - 145-159 Automation of smart monitoring for person localisation and alerting network
by K. Deepika & J. Usha - 160-177 Mobile application for children to learn hadith: 'Hidup Cara Rasullullah'
by Aliza Sarlan & Rohiza Ahmad & Wan Fatimah Wan Ahmad & Suci Astrini - 178-206 Promoting business-IT alignment through agent metaphor-based software technology
by D. Venkatesan & S. Sridhar - 207-216 Performance analysis of iris biometric system using GKPCA and SVM
by M. Suganthy & S. Manjula
2020, Volume 19, Issue 4
- 261-279 Predicting service collaboration for users based on data variation patterns
by Jiaqiu Wang & Zhongjie Wang - 280-291 Comprehensive evaluation of cloud services based on fuzzy grey method
by Wenjuan Li & Jian Cao & Shiyou Qian - 292-304 Log automaton under conditions of infrequent behaviour mining
by Xian-wen Fang & Juan Li & Li-li Wang & Huan Fang - 305-317 A caching strategy based on dynamic popularity for named data networking
by Meiju Yu & Ru Li - 318-333 A construction and self-learning method for intelligent domain sentiment lexicon
by Shaochun Wu & Qifeng Xiao & Ming Gao & Guobing Zou - 334-346 Learning context-dependent word embeddings based on dependency parsing
by Ke Yan & Jie Chen & Wenhao Zhu & Xin Jin & Guannan Hu - 347-357 A recommendation algorithm for point of interest using time-based collaborative filtering
by Jun Zeng & Xin He & Feng Li & Yingbo Wu - 358-375 A dynamic programming-based approach for cloud instance type selection and optimisation
by Pengwei Wang & Wanjun Zhou & Caihui Zhao & Yinghui Lei & Zhaohui Zhang
2020, Volume 19, Issue 2/3
- 93-117 Automatic recognition and defect compensation for calf leather
by Yu-Tang Lee & Chung Yeh - 118-125 Fitting the power spectrum of stationary random sequence
by Chang-qing Zhang & Zhan-wen Liu & Zhi-gang Xu - 126-150 Factors influencing cloud computing adoption for higher educational institutes in India: a fuzzy AHP approach
by Mahak Sharma & Ruchita Gupta & Padmanav Acharya - 151-161 A blind demodulation algorithm of random codes on carrier under low signal noise ratio by Morlet wavelet
by Wei Huang & Xiangmo Zhao & Chao Wang - 162-180 E-HRM implementation, adoption and its predictors: a case of small and medium enterprises of Pakistan
by Abdul Waheed & Miao Xiaoming & Salma Waheed & Naveed Ahmad & Shang Tian-tian - 181-201 Moderating effect of information technology ambidexterity linking new human resource management practices and innovation performance
by Abdul Waheed & Miao Xiaoming & Naveed Ahmad & Salma Waheed - 202-219 Canonical correlation analysis of the impact of ICT on the diversification performance
by Omar Alexánder León García & Juan Ignacio Igartua Lopez & Jaione Ganzarain Epelde - 220-239 Simulation verification for automobile anti-lock braking system bench test principle
by Ruru Hao & Xiangmo Zhao & Lan Yang - 240-258 OBWD: an ontology and Bayesian network-based workflow design platform
by Chao Dong & Chongchong Zhao
2020, Volume 19, Issue 1
- 1-18 Impact of information and communication technologies on productivity growth
by Alma Maciulyte-Sniukiene & Mindaugas Butkus - 19-32 A Delphi-based study on the innovation practices in the Albanian financial sector
by Amali Çipi & Enida Pulaj - 33-46 Implementing ERP evaluation through a fuzzy analysis: an empirical investigation
by Maria Rosaria Marcone - 47-67 Does social media use at work lower productivity?
by Joseph Vithayathil & Majid Dadgar & J. Kalu Osiri - 68-90 Assessing the business dimensions of green IT transformation: a case of an Indian IT organisation
by Parvathi Jayaprakash & R. Radhakrishna Pillai
2019, Volume 18, Issue 4
- 347-361 Top management support and information systems implementation success: a meta-analytical replication
by Mark I. Hwang - 362-388 User engagement in social media - empirical results from Facebook
by Rupak Rauniar & Greg Rawski & Ronald J. Salazar & Donald Hudson - 389-406 Evaluation of mean and variance approximations in three point estimation of task completion times using the beta and the Kumaraswamy distribution
by Pablo Ortiz Bochard & Thomas Schwarz - 407-418 Impact of communication on the collaboration between 3PL service providers and their clients. Case of Lithuania
by Aidas Vasilis Vasiliauskas & Virgilija Vasilienė-Vasiliauskienė & Ieva Meidutė-Kavaliauskienė - 419-434 CPPM: a lightweight performance prediction middleware for cloud platforms
by Xiao Peng
2019, Volume 18, Issue 2/3
- 129-142 Parallel naïve Bayes regression model-based collaborative filtering recommendation algorithm and its realisation on Hadoop for big data
by Shiqi Wen & Cheng Wang & Haibo Li & Guoqi Zheng - 143-155 A fuzzy inference-based trust model estimation system for service selection in cloud computing
by Roney Thomas & Priya Govindaraj & Jaisankar Natarajan - 156-170 Identifying inter-organisational resource-service sequences based on similarity for collaborative tasks
by Haibo Li & Mengxia Liang - 171-181 An EMD-SVM model with error compensation for short-term wind speed forecasting
by Yuanyuan Xu & Tianhe Yao & Genke Yang - 182-194 Facilitating social recommendation with collaborative topic regression and social trust
by Xiaoyi Deng & Feifei Huangfu - 195-212 A collusion-resistant public auditing scheme for shared cloud data
by Fulin Nan & Hui Tian & Tian Wang & Yiqiao Cai & Yonghong Chen - 213-226 Cost and green aware workload migration on geo-distributed datacentres
by Jiacheng Jiang & Yingbo Wu & De Xiang & Keqin Yu & Tianhui Wang - 227-242 SGP: a social network sampling method based on graph partition
by Xiaolin Du & Dan Wang & Yunming Ye & Yan Li & Yueping Li - 243-255 A semi-supervised approach of graph-based with local and global consistency
by Yihao Zhang & Junhao Wen & Zhi Liu & Changpeng Zhu - 256-267 Diabetes index evaluation framework based on data mining technology: a genetic factor involved solution for predicting diabetes risk
by Yao Wang & Dianhui Chu & Mingqiang Song - 268-283 Voice transmission through WiFi
by Shalini Goel & Vipul Garg & Deepak Garg & Manshiv Kathait - 284-296 Study on image feature recognition algorithm and its application in public security management
by Xiaoyi Yang & Qian Wu & Xinmei Deng - 297-326 Needle in a haystack: an empirical study on mining tags from Flickr user comments
by Haijun Zhang & Jingxuan Li & Bin Luo & Yan Li - 327-345 Threefold similarity analysis: a case study on crowdsourcing feeds
by Kaixu Liu & Gianmario Motta & Tianyi Ma & Ke Fan
2019, Volume 18, Issue 1
- 1-15 Analysis of the multi-agent's relationship in collaborative innovation network for science and technology SEMs based on evolutionary game theory
by Guangyou Nan & Jinyu Wei & Haiju Hu - 16-31 Research on the measuring method and structure mining of organisation conflict
by Lei Liu & Xinan Zhao - 32-46 Electric vehicle range estimation based on the road congestion level classification
by Hong Liang & Wenjiao Wang & Yunlei Sun & Min Zhong & Yuan Gao & Xiao Sun & Jianhang Liu - 47-62 A decision support system for identification of technology innovation risk based on sequential CBR
by Quan Xiao - 63-73 The research on the selection of the rice transfer machine
by Xin Yang & Zhenxiang Zeng & Jinyu Wei & Xinjiang Cai - 74-92 Dataset replica placement strategy under a response time constraint in the cloud
by Xiuguo Wu & Wei Su - 93-109 Sampling method based on improved C4.5 decision tree and its application in prediction of telecom customer churn
by Weibin Deng & Linsen Deng & Jin Liu & Jie Qi - 110-125 An improved reversible data hiding scheme based on pixel permutation
by Jilin Wang & Xiao Sun & Xiaoqing Feng
2018, Volume 17, Issue 4
- 257-274 Research on key techniques of cryptographic access control and properties optimisation in cloud storage
by Shidong Zhu & Liu Jiang & Zhenliu Zhou - 275-295 Informal interactive bring your own device strategising practices of South African small and medium enterprises
by Salah Kabanda - 296-312 Finding linkage between sustainability science and complex networks
by Katsuhide Fujita - 313-333 Collaboration environments for small and medium-sized architecture, engineering and construction enterprises: success factors in implementation
by Aisha Abuelmaatti & Vian Ahmed - 334-348 Hadoop ecosystem as enterprise big data platform: perspectives and practices
by Sourav Mazumder & Subhankar Dhar - 349-370 Factors affecting diffusion and adoption of information and communication technology among rural users in Khyber Pakhtunkhwa Province, Pakistan
by Zahid Latif & Wang Lei & Zulfiqar Hussain Pathan & Sikander Hussain & Kaleem Khan
2018, Volume 17, Issue 3
- 155-169 Modelling technique of the object-attribute system oriented to data mining
by Yaoyu Hu & Ai Wang - 170-183 Relationships among customer loyalty, customer satisfaction, corporate image and behavioural intention on social media for a corporation
by Haixia Lv & Guang Yu & Gang Wu - 184-196 A research on the international competition ability measure of Chinese ICT industry
by Hai-Chao Li & Shi-Jie Fan - 197-216 Research on book shopping website interface based on the eye tracker
by Hongxia Li & Dandan Che & Xiaofang Yuan & Yan Li - 217-236 Case study on estimating the financial impact of IT process alignment
by Eunil Park & Jay Ohm & Sang Jib Kwon - 237-255 Challenges of software developers: the Namibian Government experience
by Monica Nehemia-Maletzky & Tiko Iyamu
2018, Volume 17, Issue 1/2
- 4-19 Immersive element analysis of the multiplayer online battle arena game genre
by Gilsang Yoo & Jaebum Jung & Jaechun Ryu & Jeahong Kim & Kichun Nam - 20-32 Texture analysis based feature extraction using Gabor filter and SVD for reliable fault diagnosis of an induction motor
by Rashedul Islam & Jia Uddin & Jong-Myon Kim - 33-43 An introduction to face-recognition methods and its implementation in software applications
by Byoung-Moo Kwon & Kang-Hee Lee - 44-50 Shadow detection using chromaticity and entropy in colour image
by Ki-Hong Park & Jae-Ho Kim & Yoon-Ho Kim - 51-61 User interface using bounce for realistic movement on smart TV
by Daehyun Ryu & Kyoungju Park - 62-70 Analysis of serious games for preventing internet gaming addiction
by Ji Yun Kim & Jae Hwan Bae - 71-79 A framework for context-aware application programming on smart phone
by Baek Gyoon Sung - 80-91 A tree cognitive navigation system based on two-dimensional code and GPS
by Wenjie Hu & Chunling Wang & Qiaochu Mo & Bo Wang - 92-112 Estimating the sentiment strength of a word using word similarity
by Kangbok Lee & Jongbum Baik & Soowon Lee - 113-128 Game operation query language for facilitating game server's FCAPS operation
by Hwan-Soo Yoo & Seong-Whan Kim - 129-139 Automatic classification of Lithuanian parliament bills
by Aušra Mackutė-Varoneckienė & Ka Lok Man & Tomas Krilavičius - 140-154 The investigation of relationships: self-esteem, self-confidence, and conduct problems in counselling
by Mila Park
2017, Volume 16, Issue 4
- 317-332 Enhancing BRICS integration: a cloud-based green supply chain concept
by Saroj Koul & Hari Narayan Perikamana & Uma Kumar & Vinod Kumar - 333-347 Evaluating the competitiveness of Indian metro cities: in smart city context
by Harish Kumar & Manoj Kumar Singh & Manmohan Prasad Gupta - 348-359 Big data analytics for exploratory social network analysis
by Chetna Dabas - 360-375 The internet of things - new value streams for customers
by Ashok Kumar Wahi & Vandana Ahuja - 376-390 Antecedents for success of e-commerce platforms: an investigative approach
by Asif Ali & Gowhar Rasool & Anjali Pathania - 391-404 Study of repeated e-government project audit based on text mining
by Yan Hong Chen & Hui Hui Li & Zhi Nan Yu
2017, Volume 16, Issue 3
- 205-214 From social capital to continuous use of social networking sites: a conceptualisation
by Rui Chen & Sushil K. Sharma & H. Raghav Rao - 215-236 Exploring the benefits of cloud services and accountability tools from a competitiveness and return on investment perspective
by Sindre Høyland & Janne Merete Hagen & Ruth Østgaard Skotnes - 237-253 References-based search methodology for assuring acceptable quality of a query research article
by Ranjeet Kumar & Ramesh Chandra Tripathi - 254-268 Internet thinking of the traditional enterprise - taking Su Ning as an example
by Dan Chang & Jiawei Song - 269-286 Information industry security: an industry convergence point of view
by Xiaolan Guan & Menggang Li - 287-300 Network dynamics in friend recommendation: a study of Indian engineering students
by Pradip Swarnakar & Ajay Kumar & Himanshu Tyagi - 301-313 Using cognitive radio scheme for big data traffic management in cellular systems
by Jamal Raiyn
2017, Volume 16, Issue 2
- 117-132 Cultivating the wisdom of personnel through internal crowdsourcing
by Kaisa Henttonen & Tommi Rissanen & Päivi Eriksson & Jukka Hallikas - 133-146 Brick and mortar store vs. online shopping experience: a study
by Pooja Misra & Sushil Baranwal & Manya Jha - 147-161 Providing custom enterprise resource planning solutions: benefits and challenges
by Hanuv Mann & Uma Kumar & Vinod Kumar & Inder Jit Singh Mann - 162-172 Archiving ERP data to enhance operational effectiveness: the case of Dolphin
by Shalini Srivastava & Richa Misra - 173-180 Assessing learning styles to improve skill development: a case study of NASSCOM
by Abhijeet Lele & Parameswar Nayak - 181-204 Critical success factors for e-business in Sri Lankan text books and stationery market
by S.W.S.B. Dasanayaka & M.A. Aboonidhal & G.D. Sardana
2017, Volume 16, Issue 1
- 5-30 PLM as a strategy for the management of heterogeneous information in bio-medical imaging field
by Marianne Allanic & Pierre-Yves Hervé & Alexandre Durupt & Marc Joliot & Philippe Boutinaud & Benoît Eynard - 31-52 Cyber-physical infomobility for tourism application
by Alexander Smirnov & Nikolay Shilov & Alexey Kashevnik & Andrew Ponomarev - 53-72 A situation awareness analysis scheme to identify deficiencies of complex man-machine interactions
by Ellemieke Van Doorn & Zoltán Rusák & Imre Horváth - 73-90 The influence of documenting assumed values of product properties on the number of iterations in the design process - first observations
by Alfred Sadlauer & Peter Hehenberger & Klaus Zeman - 91-112 A feature-based approach to conceptualisation, upfront modelling, and planning for the future of complex systems
by Eliab Z. Opiyo
2016, Volume 15, Issue 4
- 293-312 Thermal infrared geostationary satellite sensor data application for prediction and monitoring earthquake in Algeria
by Abdelatif Hassini & Ahmed Hafid Belbachir - 313-332 Designing security policies for complex SCADA systems management and protection
by Christophe Feltus & Djamel Khadraoui - 333-345 The use of RFID tags to support the post-disaster recovery of utility infrastructure
by Chetan S. Sankar & Bill Rushing & Corley L. Lauderdale & Steve Henderson - 346-363 Adaptive data collection approach based on sets similarity function for saving energy in periodic sensor networks
by Hassan Harb & Abdallah Makhoul & Ali Jaber & Rami Tawil & Oussama Bazzi - 364-386 From spatial data warehouse and decision-making tool to SOLAP generalisation approach for efficient road risk analysis
by Khalissa Amieur Derbal & Zioual Tahar & Kamel Boukhalfa & Ibtissem Frihi & Zaïa Alimazighi - 387-400 A RFID-based similarity cluster approach for detecting abnormal logistics paths and its performance evaluation
by Xiaohua Cao & Qingxia Li
2016, Volume 15, Issue 3
- 195-226 The online target advertising design model: a conceptual model to provide theoretical guidelines, insights, and understanding in online target marketplaces and the development of websites and apps
by Efosa C. Idemudia - 227-250 Product architecture and organisational capabilities' impact on performance: Taiwan's IT industry
by Ing-Shane Yung & Chin-Fa Tsai - 251-271 Design and evaluation of a role improvisation exercise for crisis and disaster response teams
by Jiri Trnka & Jonas Lundberg & Erland Jungert - 272-290 Understanding technologically-induced customer services in the Nigerian banking sector: the internet as a post-modern phenomenon
by Wilson Ozuem & Kerry E. Howell & Geoff Lancaster
2016, Volume 15, Issue 2
- 99-117 Evaluation of the objective and subjective features of technological products: evidences from Turkish tablet PC market
by Abdullah Okumuş & Hilal Özen & Gökmen Kara - 118-143 An e-readiness assessment model for disaster management
by Ali Benssam & Nadia Nouali-Taboudjemat & Omar Nouali - 144-167 MapReduce-based efficient betweenness approximation pivot method for large graphs
by Xiao Long Deng & Yu Xiao Li - 168-194 Utilitarian characteristics reducing guilt: perceived values in the justification of choice
by EmÃlio José Montero Arruda-Filho & Silvia Biffignandi
2016, Volume 15, Issue 1
- 1-13 Similarity matrix learning for ontology application
by Jianzhang Wu & Xiao Yu & Wei Gao - 14-40 Enabling a culture for IT services; the role of the IT infrastructure library
by Tom Roar Eikebrokk & Jon Iden - 41-58 Analysis of the management of business informatics framework from the green ICT viewpoint
by Alena Buchalcevova - 59-89 The impacts of ICT utilisation and dynamic capabilities on the competitive advantage of South African SMEs
by Tejumade V. Adeniran & Kevin A. Johnston - 90-98 Shortage of logistics for e-commerce in holiday
by Haoxiong Yang & Jindan Li & Jing Wang & Xinjian Du
2015, Volume 14, Issue 4
- 233-252 Influence of firm size on the adoption of enterprise information systems: insights from Iberian firms
by António Trigo & João Varajão & Pedro Soto-Acosta & Nicolás Gonzálvez-Gallego & Francisco José Molina Castillo - 253-273 Key factors of successful technology push projects in the ICT context: a review of the literature
by Jari Sarja - 274-304 Research and development disclosure information on internet by multinational corporations
by Boutheina Ben Ghnaya - 305-332 A systemic model for measuring the effectiveness of virtual learning programs
by Ayham Fayyoumi & Gianluca Elia
2015, Volume 14, Issue 2/3
- 97-123 Combining barcodes and RFID in a hybrid solution to improve hospital pharmacy logistics processes
by Alejandro Romero & Elisabeth Lefebvre - 124-132 Research on emergency resources storage region division based on two-stage stochastic programming
by Jing Wang & Haoxiong Yang & Jianming Zhu - 133-145 Comprehensive evaluation of marketing channel risk of beverage enterprise on the basis of GRA-Fuzzy-AHP
by Yihong Xu & Mengju Shi & Hao Chang & Qiushuang Wei & Suhua Wang - 146-159 Great East Japan Earthquake emergency evolution and contingency decision based on system engineering approach
by Yongjian Li & Xunqing Wang & Zhe Li - 160-171 The interplay among software volatility, complexity and development outcomes: evidence from open source software
by Jorge A. Colazo - 172-184 Mining top-k influential nodes in social networks via community detection
by Wei Li & Jianbin Huang & Shuzhen Wang - 185-200 A novel approach for imputation of missing continuous attribute values in databases using genetic algorithm
by R. Devi Priya & S. Kuppuswami - 201-214 A distributed maximal frequent itemset mining with multi agents system on bitmap join indexes selection
by Hamid Necir & Habiba Drias - 215-231 Information and communication technology: a tool for increasing marketing efficiency
by Sumant Kumar Tewari & Madhvendra Misra
2015, Volume 14, Issue 1
- 5-25 Design of multiplier-less continuously variable bandwidth sharp FIR filters using modified harmony search algorithm
by James T. George & Elizabeth Elias - 26-42 UP-GNIV: an expeditious high utility pattern mining algorithm for itemsets with negative utility values
by Kannimuthu Subramanian & Premalatha Kandhasamy - 43-59 Automated secured handoff delay reduction by minimising authentication cost in mobile WiMAX network entry process
by B. Sridevi & S. Rajaram - 60-75 Information technology enabled process re-engineering for supply chain leagility
by Arnab Banerjee - 76-94 Building a knowledge map model situated in product design
by Yongwen Huang & Zuhua Jiang & Lijun Liu & Bo Song & Lijie Han
2014, Volume 13, Issue 4
- 243-263 Cloud computing adoption and determining factors in different industries: a case study of Thailand
by Chutipong Keesookpun & Hitoshi Mitomo - 264-284 Exploring knowledge strategy within a knowledge-intensive organisation: a case study approach
by Françoise De Viron & Tanguy De Jaegere & Thomas Lederer & Alain Vas - 285-304 Exploring e-governance acceptance by primary and secondary education teachers in Greece
by Kostas Zafiropoulos & Ioannis Karavasilis & Vasiliki Vrana - 305-323 An investigation of national policies on transformational government (t-Gov) in Europe
by Konstantinos Parisopoulos & Efthimios Tambouris & Konstantinos Tarabanis - 324-350 ICT-mediated interaction in the organisational IPO model
by Chien-Hsing Wu & Shu-Chen Kao & Ying-Yi Wu