Content
December 2020, Volume 22, Issue 6
- 1487-1504 Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations
by Guilherme C. Wiedenhöft & Edimara M. Luciano & Gabriela V. Pereira - 1505-1518 Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method
by Wafa Bouaynaya - 1519-1537 Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans
by Amit Rathee & Jitender Kumar Chhabra - 1539-1559 Using Mobile Phone Data for Emergency Management: a Systematic Literature Review
by Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo - 1561-1567 Quantum Secured Internet Transport
by Bernardo A. Hubermann & Bob Lund & Jing Wang
October 2020, Volume 22, Issue 5
- 1001-1007 Heuristic Acquisition for Data Science
by Lydia Bouzar-Benlabiod & Stuart H. Rubin - 1009-1019 A Hybrid Bi-level Metaheuristic for Credit Scoring
by Doruk Şen & Cem Çağrı Dönmez & Umman Mahir Yıldırım - 1021-1037 Event Study and Principal Component Analysis Based on Sentiment Analysis – A Combined Methodology to Study the Stock Market with an Empirical Study
by Qianwen Xu & Victor Chang & Ching-Hsien Hsu - 1039-1051 Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods
by Mohammed Kuko & Mohammad Pourhomayoun - 1053-1066 Evolutionary Programming Based Deep Learning Feature Selection and Network Construction for Visual Data Classification
by Haiman Tian & Shu-Ching Chen & Mei-Ling Shyu - 1067-1083 Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE
by Salima Smiti & Makram Soui - 1085-1093 Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions
by Narges Manouchehri & Hieu Nguyen & Pantea Koochemeshkian & Nizar Bouguila & Wentao Fan - 1095-1111 An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering
by Sabin Kafle & Nisansa Silva & Dejing Dou - 1113-1131 The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data
by Justin M. Johnson & Taghi M. Khoshgoftaar - 1133-1161 A Hybrid Genetic Algorithm for Software Architecture Re-Modularization
by Lifeng Mu & Vijayan Sugumaran & Fangyuan Wang - 1163-1178 How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics
by Matti Mäntymäki & Sami Hyrynsalmi & Antti Koskenvoima - 1179-1201 Eliciting Process Knowledge Through Process Stories
by Pedro Antunes & Jose A. Pino & Mary Tate & Alistair Barros - 1203-1226 The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis
by Elvira Ismagilova & Emma L. Slade & Nripendra P. Rana & Yogesh K. Dwivedi - 1227-1240 Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective
by Emmanuel W. Ayaburi & Jaeung Lee & Michele Maasberg - 1241-1264 A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness
by Hwee-Joo Kam & Thomas Mattson & Sanjay Goel
August 2020, Volume 22, Issue 4
- 791-802 Policy and Information Systems Implementation: the Greek Property Tax Information System Case
by Dimosthenis Anagnostopoulos & Thanos Papadopoulos & Teta Stamati & Maria Elisavet Balta - 803-814 Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market
by Irfan Kanat & T. S. Raghu & Ajay Vinzé - 815-827 Information Matters: an Empirical Study of the Efficiency of On-Demand Services
by Hongyan Dai & Ling Ge & Yali Liu - 829-842 A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things
by Qinghua Zheng & Chutong Yang & Haijun Yang & Jianhe Zhou - 843-862 An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME)
by Hua Dai & A. F. Salam - 863-880 Information-Theoretic Remodularization of Object-Oriented Software Systems
by Amarjeet Prajapati & Jitender Kumar Chhabra - 881-895 Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees’ Perceptions of Presenteeism: from Both Individual and Social Perspectives
by Jinbi Yang & Chunxiao Yin - 897-909 An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407
by Rohit Valecha - 911-925 An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking
by Yulei Gavin Zhang & Mandy Yan Dang & Hsinchun Chen - 927-945 From Agile to DevOps: Smart Skills and Collaborations
by Aymeric Hemon & Barbara Lyonnet & Frantz Rowe & Brian Fitzgerald - 947-960 Optimal Piracy Control: Should a Firm Implement Digital Rights Management?
by Dan Wu & Guofang Nan & Minqiang Li - 961-983 Citizen Science: An Information Quality Research Frontier
by Roman Lukyanenko & Andrea Wiggins & Holly K. Rosser - 985-999 Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services
by Ramzi El-Haddadeh
June 2020, Volume 22, Issue 3
- 529-532 Being (more) Human in a Digitized World
by Priya Seetharaman & Saji K. Mathew & Maung K. Sein & Ravindra Babu Tallamraju - 533-547 “Can Computer Based Human-Likeness Endanger Humanness?” – A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can’t Have”
by Jaana Porra & Mary Lacity & Michael S. Parks - 549-562 Non-addictive Information Systems
by Simon Kloker - 563-583 Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users’ Perception of Group Harmony
by Kiljae Lee & Kyung Young Lee & Lorn Sheehan - 585-605 Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India
by Linus Kendall & Bidisha Chaudhuri & Apoorva Bhalla - 607-631 The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India
by Abhipsa Pal & Rahul De’ & Tejaswini Herath - 633-653 Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized
by Rishikesan Parthiban & Israr Qureshi & Somprakash Bandyopadhyay & Babita Bhatt & Saravana Jaikumar - 655-670 Information Exchange Architecture for Collaborative Industrial Ecosystem
by Petri Kannisto & David Hästbacka & Arto Marttinen - 671-671 Correction to: Information Exchange Architecture for Collaborative Industrial Ecosystem
by Petri Kannisto & David Hästbacka & Arto Marttinen - 673-695 The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study
by Jyoti Choudrie & Sutee Pheeraphuttranghkoon & Soheil Davari - 697-718 Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system
by Yan (Mandy) Dang & Yulei (Gavin) Zhang & Susan A. Brown & Hsinchun Chen - 719-734 An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management
by Chul Woo Yoo - 735-747 Clinical Decision Support System for Managing COPD-Related Readmission Risk
by C. Derrick Huang & Jahyun Goo & Ravi S. Behara & Ankur Agarwal - 749-770 Technology as a Disruptive Agent: Intergenerational Perspectives
by Kamran Mahroof & Vishanth Weerakkody & Dilek Onkal & Zahid Hussain - 771-787 Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network
by Ehsan Alirezaei & Saeed Parsa - 789-789 RETRACTED ARTICLE: A systematic review on post-implementation evaluation models of enterprise architecture artefacts
by Fatemeh Nikpay & Rodina Ahmad & Babak Darvish Rouhani & Shahaboddin Shamshirband
April 2020, Volume 22, Issue 2
- 275-280 The Search for Smartness in Working, Living and Organising: Beyond the ‘Technomagic’
by Amany Elbanna & Yogesh Dwivedi & Deborah Bunker & David Wastell - 281-298 Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems
by Peter M. Bednar & Christine Welch - 299-313 Data Governance as a Collective Action Problem
by Olivia Benfeldt & John Stouby Persson & Sabine Madsen - 315-337 Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing
by Prabhsimran Singh & Yogesh K. Dwivedi & Karanjeet Singh Kahlon & Ravinder Singh Sawhney & Ali Abdallah Alalwan & Nripendra P. Rana - 339-351 Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication
by Milad Mirbabaie & Deborah Bunker & Stefan Stieglitz & Annika Deubel - 353-364 Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital
by Bendik Bygstad & Egil Øvrelid & Thomas Lie & Magnus Bergquist - 365-380 Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman
by Khalid Alzadjali & Amany Elbanna - 381-393 Making Sense of Smartness in the Context of Smart Devices and Smart Systems
by Steven Alter - 395-409 Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics
by Stefan Stieglitz & Christian Meske & Björn Ross & Milad Mirbabaie - 411-427 Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness
by Abdullah Mohammed Baabdullah - 429-453 Being useful: How information systems professionals influence the use of information systems in enterprises
by Hadi Karimikia & Narges Safari & Harminder Singh - 455-474 Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective
by Alan Serrano & Javier Garcia-Guzman & Georgios Xydopoulos & Ali Tarhini - 475-487 Initial Evidence on the Impact of Big Data Implementation on Firm Performance
by Cheng-Kui Huang & Tawei Wang & Tzu-Yen Huang - 489-507 Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution
by Paul Rimba & An Binh Tran & Ingo Weber & Mark Staples & Alexander Ponomarev & Xiwei Xu - 509-510 Correction to: Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution
by Paul Rimba & An Binh Tran & Ingo Weber & Mark Staples & Alexander Ponomarev & Xiwei Xu - 511-528 E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives
by Thompson S. H. Teo & Sojung Lucia Kim & Li Jiang
February 2020, Volume 22, Issue 1
- 1-9 ISF Editorial 2020
by R. Ramesh & H. R. Rao - 11-15 The Productivity Vampires
by John Leslie King & Andrew J. Ehrenberg - 17-22 Analyzing Cryptocurrencies
by Xiaofan Li & Andrew B. Whinston - 23-27 Emerging Frontiers in Smart Environment and Healthcare – A Vision
by Satyen Mukherjee - 29-35 Blockchain in Context
by Andrew J. Ehrenberg & John Leslie King - 37-43 A Quantum Router For The Entangled Web
by Bernardo A. Huberman & Bob Lund - 45-57 Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
by Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim - 59-75 Presenting Cloud Business Performance for Manufacturing Organizations
by Victor Chang - 77-90 Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location
by Lina Zhou & Uchechukwuka Amadi & Dongsong Zhang - 91-111 U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality
by Ravi Thambusamy & Prashant Palvia - 113-130 Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM)
by Kichan Nam & Jeff Baker & Norita Ahmad & Jahyun Goo - 131-148 Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach
by Federico Cabitza & Angela Locoro & Carlo Batini - 149-170 Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging Services
by Xiuyuan Gong & Matthew K. O. Lee & Zhiying Liu & Xiabing Zheng - 171-185 Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by Jongwoo Kim & Richard L. Baskerville & Yi Ding - 187-201 Interdependency Analysis in Security Investment against Strategic Attacks
by Mansooreh Ezhei & Behrouz Tork Ladani - 203-219 Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives
by Andy Weeger & Xuequn Wang & Heiko Gewald & Mahesh Raisinghani & Otavio Sanchez & Gerald Grant & Siddhi Pittayachawan - 221-242 Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
by Martin (Dae Youp) Kang & Anat Hovav - 243-257 Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model
by Carlos Tam & Diogo Santos & Tiago Oliveira - 259-271 Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective
by Jun Sun - 273-273 Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules
by Chichang Jou
December 2019, Volume 21, Issue 6
- 1203-1205 Editorial: Special issue on cyber security, privacy and ethics of information systems
by Alessandro Acquisti & Tamara Dinev & Mark Keil - 1207-1212 Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith
by Mark Keil & Mary Culnan & Tamara Dinev & Heng Xu - 1213-1229 Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study
by Emmanuel W. Ayaburi & James Wairimu & Francis Kofi Andoh-Baidoo - 1231-1250 Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers
by Henner Mohr & Zhiping Walter - 1251-1264 Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development
by Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi - 1265-1284 A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
by Simon Trang & Benedikt Brendel - 1285-1305 Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments
by Margareta Heidt & Jin P. Gerlach & Peter Buxmann - 1307-1324 How Data Protection Regulation Affects Startup Innovation
by Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind - 1325-1344 Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation
by Venugopal Gopalakrishna-Remani & Robert Paul Jones & Kerri M. Camp - 1345-1355 An AHP-IFT Integrated Model for Performance Evaluation of E-Commerce Web Sites
by Babak Daneshvar Rouyendegh & Kazim Topuz & Ali Dag & Asil Oztekin - 1357-1368 Assimilation of Big Data Innovation: Investigating the Roles of IT, Social Media, and Relational Capital
by Pratyush Bharati & Abhijit Chaudhury - 1369-1384 Individual Decision-Performance Using Spatial Decision Support Systems: A Geospatial Reasoning Ability and Perceived Task-Technology Fit Perspective
by Michael A. Erskine & Dawn G. Gregg & Jahangir Karimi & Judy E. Scott - 1385-1419 Do we Fully Understand Information Systems Failure? An Exploratory Study of the Cognitive Schema of IS Professionals
by Jong Uk Kim & Rajiv Kishore
October 2019, Volume 21, Issue 5
- 959-977 A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs
by Saini Das & Arunabha Mukhopadhyay & Debashis Saha & Samir Sadhukhan - 979-995 DPRel: A Meta-Path Based Relevance Measure for Mining Heterogeneous Networks
by Mukul Gupta & Pradeep Kumar & Bharat Bhasker - 997-1018 Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance
by Arunabha Mukhopadhyay & Samir Chatterjee & Kallol K. Bagchi & Peteer J. Kirs & Girja K. Shukla - 1019-1030 Don’t Disturb Me! Understanding the Impact of Interruptions on Knowledge Work: an Exploratory Neuroimaging Study
by Pankush Kalgotra & Ramesh Sharda & Roger McHaney - 1031-1043 Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective
by Mousa Albashrawi & Luvai Motiwalla - 1045-1068 Examining Consumers’ Behavioral Intention in O2O Commerce from a Relational Perspective: an Exploratory Study
by Lin Xiao & Chuanmin Mi & Yucheng Zhang & Jing Ma - 1069-1083 Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect
by Feng Xu & Xin (Robert) Luo & Hongyun Zhang & Shan Liu & Wei (Wayne) Huang - 1085-1110 Real World User Model: Evolution of User Modeling Triggered by Advances in Wearable and Ubiquitous Computing
by Federica Cena & Silvia Likavec & Amon Rapp - 1111-1135 An Empirical Review of the Connection Between Model Viewer Characteristics and the Comprehension of Conceptual Process Models
by Jan Mendling & Jan Recker & Hajo A. Reijers & Henrik Leopold - 1137-1151 The Impact of Emotion: A Blended Model to Estimate Influence on Social Media
by Wei-Lun Chang - 1153-1166 A Novel Group Ownership Delegate Protocol for RFID Systems
by Cheng-Chi Lee & Chun-Ta Li & Chung-Lun Cheng & Yan-Ming Lai & Athanasios V. Vasilakos - 1167-1185 Formal Model of Business Processes Integrated with Business Rules
by Krzysztof Kluza & Grzegorz J. Nalepa - 1187-1201 Exploring Gender Differences in Online Consumer Purchase Decision Making: An Online Product Presentation Perspective
by Xiaolin Lin & Mauricio Featherman & Stoney L. Brooks & Nick Hajli
August 2019, Volume 21, Issue 4
- 735-742 Leveraging Data Analytics for Behavioral Research
by Luvai Motiwalla & Amit V. Deokar & Surendra Sarnikar & Angelika Dimoka - 743-760 Social Media for Nowcasting Flu Activity: Spatio-Temporal Big Data Analysis
by Amir Hassan Zadeh & Hamed M. Zolbanin & Ramesh Sharda & Dursun Delen - 761-772 Investigating Users’ Tagging Behavior in Online Academic Community Based on Growth Model: Difference between Active and Inactive Users
by Yunhong Xu & Dehu Yin & Duanning Zhou - 773-790 Self-Reported and Computer-Recorded Experience in Mobile Banking: a Multi-Phase Path Analytic Approach
by Mousa Albashrawi & Hasan Kartal & Asil Oztekin & Luvai Motiwalla - 791-814 Understanding the Impact of Immersion and Authenticity on Satisfaction Behavior in Learning Analytics Tasks
by Suning Zhu & Ashish Gupta & David Paradice & Casey Cegielski - 815-827 Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling
by Sujeet Kumar Sharma - 829-844 The Economic Value of Online User Reviews with Ad Spending on Movie Box-Office Sales
by Young-Jin Lee & Kellie B. Keeling & Andrew Urbaczewski - 845-860 Exploring the Contingent Effect of Community Equity on Users’ Intention to Share Information
by Kristijan Mirkovski & Chunxiao Yin & Libo Liu & Jinbi Yang - 861-875 Differential cloud adoption: A comparative case study of large enterprises and SMEs in Germany
by Surya Karunagaran & Saji K Mathew & Franz Lehner - 877-908 Lack of Communication and Collaboration in Enterprise Architecture Development
by Negin Banaeianjahromi & Kari Smolander - 909-924 Digital Occupational Health Systems: What Do Employees Think about it?
by Maedeh Yassaee & Tobias Mettler - 925-939 GLORY: Exploration and integration of global and local correlations to improve personalized online social recommendations
by Mingxin Gan & Lily Sun & Rui Jiang - 941-955 Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis
by Duy Dang-Pham & Siddhi Pittayachawan & Vince Bruno & Karlheinz Kautz - 957-957 Erratum to: Online knowledge sharing mechanisms: A systematic review of the state of the art literature and recommendations for future research
by Yeganeh Charband & Nima Jafari Navimipour
June 2019, Volume 21, Issue 3
- 495-501 Moving beyond Smart Cities: Digital Nations for Social Innovation & Sustainability
by Arpan Kumar Kar & Vigneswara Ilavarasan & M. P. Gupta & Marijn Janssen & Ravi Kothari - 503-525 Barriers to the Development of Smart Cities in Indian Context
by Nripendra P. Rana & Sunil Luthra & Sachin Kumar Mangla & Rubina Islam & Sian Roderick & Yogesh K. Dwivedi - 527-545 Value Co-Creation as a Dialectical Process: Study in Bangladesh and Indian Province of West Bengal
by Mizan Rahman & Sunny Bose & Mujahid Mohiuddin Babu & Bidit Lal Dey & Sanjit Kumar Roy & Ben Binsardi - 547-564 Leveraging Smart Supply Chain and Information System Agility for Supply Chain Flexibility
by Shivam Gupta & Vinayak A. Drave & Surajit Bag & Zongwei Luo - 565-580 Farmer Cooperatives’ Intention to Adopt Agricultural Information Technology—Mediating Effects of Attitude
by Ya-na Wang & Lifu Jin & Hanping Mao - 581-604 Assessing the Gap between Technology and the Environmental Sustainability of European Cities
by Adeoluwa Akande & Pedro Cabral & Sven Casteleyn - 605-620 Design of an O2O Citizen Participation Ecosystem for Sustainable Governance
by Jingrui Ju & Luning Liu & Yuqiang Feng - 621-634 Transnational Digital Identity as an Instrument for Global Digital Citizenship: The Case of Estonia’s E-Residency
by Piia Tammpuu & Anu Masso - 635-659 Balancing Digital-By-Default with Inclusion: A Study of the Factors Influencing E-Inclusion in the UK
by Ahlam Al-Muwil & Vishanth Weerakkody & Ramzi El-haddadeh & Yogesh Dwivedi - 661-685 Classification of Smart City Research - a Descriptive Literature Review and Future Research Agenda
by Parul Gupta & Sumedha Chauhan & M. P. Jaiswal - 687-702 Composing Scientific Collaborations Based on Scholars’ Rank in Hypergraph
by Fahimeh Ghasemian & Kamran Zamanifar & Nasser Ghasem-Aghaee - 703-718 Applying Social Interaction Theory to Negotiation Modeling: Design of E-negotiation System
by Bo Yu & Rustam Vahidov - 719-734 Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model
by Yogesh K. Dwivedi & Nripendra P. Rana & Anand Jeyaraj & Marc Clement & Michael D. Williams
April 2019, Volume 21, Issue 2
- 229-240 Dynamic network analysis of online interactive platform
by Mehmet N. Aydin & N. Ziya Perdahci - 241-259 Task scheduling algorithms for multi-cloud systems: allocation-aware approach
by Sanjaya K. Panda & Indrajeet Gupta & Prasanta K. Jana - 261-300 Enterprise security investment through time when facing different types of vulnerabilities
by Yosra Miaoui & Noureddine Boudriga - 301-325 A model to analyze the challenge of using cyber insurance
by Tridib Bandyopadhyay & Vijay Mookerjee - 327-341 Predictive maintenance: strategic use of IT in manufacturing organizations
by Salvatore T. March & Gary D. Scudder - 343-357 The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
by Robert E. Crossler & France Bélanger & Dustin Ormond - 359-382 Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies
by Steve Jones & Zahir Irani & Uthayasankar Sivarajah & Peter E. D. Love - 383-404 Multi-dimensional intelligence in smart physical objects
by Federica Cena & Luca Console & Assunta Matassa & Ilaria Torre - 405-416 Effectiveness of standards consortia: Social network perspectives
by Beomjin Choi & T. S. Raghu & Ajay Vinzé & Kevin J. Dooley - 417-439 Leveraging collective intelligence for behavioral prediction in signed social networks through evolutionary approach
by Gaganmeet Kaur Awal & K. K. Bharadwaj - 441-452 Enhancing mobile data services performance via online reviews
by Hua (Jonathan) Ye & Cecil Eng Huang Chua & Jun Sun - 453-468 Way too sentimental? a credible model for online reviews
by Wei-Lun Chang & Yi-Pei Chen - 469-484 Using sentiment analysis to improve supply chain intelligence
by Ajaya Kumar Swain & Ray Qing Cao - 485-494 Twenty Years of Information Systems Frontiers
by Ghassan Beydoun & Babak Abedin & José M. Merigó & Melanie Vera
February 2019, Volume 21, Issue 1
- 1-3 Guest Editorial: Recent Trends in Reuse and Integration
by Thouraya Bouabana-Tebibel & Stuart H. Rubin & Lydia Bouzar-Benlabiod - 5-25 Towards a Methodology for Knowledge Reuse Based on Semantic Repositories
by Anabel Fraga & Juan Llorens & Gonzalo Génova - 27-44 Towards a Reuse Strategic Decision Pattern Framework – from Theories to Practices
by Victor Chang & Mohamed Abdel-Basset & Muthu Ramachandran - 45-65 Verification of Model Transformations Using Isabelle/HOL and Scala
by Said Meghzili & Allaoua Chaoui & Martin Strecker & Elhillali Kerkouche - 67-85 Quantitative Analysis of Apache Storm Applications: The NewsAsset Case Study
by José I. Requeno & José Merseguer & Simona Bernardi & Diego Perez-Palacin & Giorgos Giotis & Vasilis Papanikolaou - 87-107 Integrated Synthesis and Execution of Optimal Plans for Multi-Robot Systems in Logistics
by Francesco Leofante & Erika Ábrahám & Tim Niemueller & Gerhard Lakemeyer & Armando Tacchella - 109-123 Extracting Knowledge from Technical Reports for the Valuation of West Texas Intermediate Crude Oil Futures
by Joseph D. Prusa & Ryan T. Sagul & Taghi M. Khoshgoftaar - 125-142 Generalized Feature Embedding for Supervised, Unsupervised, and Online Learning Tasks
by Eric Golinko & Xingquan Zhu - 143-161 Exploiting Repositories in Mobile Software Ecosystems from a Governance Perspective
by Awdren Lima Fontão & Rodrigo Pereira Santos & Arilo Claudio Dias-Neto - 163-174 Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules
by Chichang Jou - 175-189 Discovering composable web services using functional semantics and service dependencies based on natural language requests
by Sowmya Kamath S & Ananthanarayana V. S. - 191-212 An information integration and transmission model of multi-source data for product quality and safety
by Yingcheng Xu & Li Wang & Bo Xu & Wei Jiang & Chaoqun Deng & Fang Ji & Xiaobo Xu - 213-227 An examination of the long-term business value of investments in information technology
by Vincent J. Shea & Kevin E. Dow & Alain Yee-Loong Chong & Eric W. T. Ngai
December 2018, Volume 20, Issue 6
- 1153-1156 Guest Editorial: Behavioral-Data Mining in Information Systems and the Big Data Era
by Ludovico Boratto & Salvatore Carta & Andreas Kaltenbrunner & Matteo Manca - 1157-1171 TV-Program Retrieval and Classification: A Comparison of Approaches based on Machine Learning
by Fedelucio Narducci & Cataldo Musto & Marco Gemmis & Pasquale Lops & Giovanni Semeraro - 1173-1189 User Personality and User Satisfaction with Recommender Systems
by Tien T. Nguyen & F. Maxwell Harper & Loren Terveen & Joseph A. Konstan - 1191-1202 Scaling Up Integrated Structural and Content-Based Network Analysis
by Jennifer Golbeck & Jeff Gerhard & Farrah O’Colman & Ryan O’Colman - 1203-1218 The Impact of Geographic Distance on Online Social Interactions
by David Laniado & Yana Volkovich & Salvatore Scellato & Cecilia Mascolo & Andreas Kaltenbrunner - 1219-1240 Inducing Personalities and Values from Language Use in Social Network Communities
by Upendra Kumar & Aishwarya N. Reganti & Tushar Maheshwari & Tanmoy Chakroborty & Björn Gambäck & Amitava Das - 1241-1265 Personality, User Preferences and Behavior in Recommender systems
by Raghav Pavan Karumur & Tien T. Nguyen & Joseph A. Konstan - 1267-1280 The contributing factors of continuance usage of social media: An empirical analysis
by Efosa Carroll Idemudia & Mahesh S. Raisinghani & Olusola Samuel-Ojo - 1281-1296 Middleware for mobile medical data management with minimal latency
by Richard K. Lomotey & Ralph Deters - 1297-1317 Examining the infusion of mobile technology by healthcare practitioners in a hospital setting
by Yvonne O’ Connor & Philip O’ Reilly - 1319-1344 A structural-semantic web service selection approach to improve retrievability of web services
by Martin Garriga & Alan De Renzis & Ignacio Lizarralde & Andres Flores & Cristian Mateos & Alejandra Cechich & Alejandro Zunino - 1345-1361 Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK
by Roya Gholami & Alemayehu Molla & Suparna Goswami & Christopher Brewster - 1363-1379 Crowdsourcing roles, methods and tools for data-intensive disaster management
by Marta Poblet & Esteban García-Cuesta & Pompeu Casanovas - 1381-1404 A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa
by Humphrey M. Sabi & Faith-Michael E. Uzoka & Kehbuma Langmia & Felix N. Njeh & Clive K. Tsuma
October 2018, Volume 20, Issue 5
- 901-907 Exploitation of Social Media for Emergency Relief and Preparedness: Recent Research and Trends
by Saptarshi Ghosh & Kripabandhu Ghosh & Debasis Ganguly & Tanmoy Chakraborty & Gareth J. F. Jones & Marie-Francine Moens & Muhammad Imran - 909-923 Emergency Vocabulary
by Dávid Márk Nemeskey & András Kornai - 925-932 An Embedding Based IR Model for Disaster Situations
by Ayan Bandyopadhyay & Debasis Ganguly & Mandar Mitra & Sanjoy Kumar Saha & Gareth J.F. Jones - 933-948 Classifying and Summarizing Information from Microblogs During Epidemics
by Koustav Rudra & Ashish Sharma & Niloy Ganguly & Muhammad Imran - 949-959 Weakly Supervised and Online Learning of Word Models for Classification to Detect Disaster Reporting Tweets
by Girish Keshav Palshikar & Manoj Apte & Deepak Pandita - 961-979 Analysis and Early Detection of Rumors in a Post Disaster Scenario
by Tamal Mondal & Prithviraj Pramanik & Indrajit Bhattacharya & Naiwrita Boral & Saptarshi Ghosh - 981-992 A New Mashup Based Method for Event Detection from Social Media
by Abir Troudi & Corinne Amel Zayani & Salma Jamoussi & Ikram Amous Ben Amor - 993-1011 CrisMap: a Big Data Crisis Mapping System Based on Damage Detection and Geoparsing
by Marco Avvenuti & Stefano Cresci & Fabio Del Vigna & Tiziano Fagni & Maurizio Tesconi - 1013-1025 Regional Sentiment Bias in Social Media Reporting During Crises
by Karin Sim Smith & Richard McCreadie & Craig Macdonald & Iadh Ounis - 1027-1039 Information Needs and Communication Gaps between Citizens and Local Governments Online during Natural Disasters
by Lingzi Hong & Cheng Fu & Jiahui Wu & Vanessa Frias-Martinez - 1041-1052 Uncovering the effect of dominant attributes on community topology: A case of facebook networks
by Yi-Shan Sung & Dashun Wang & Soundar Kumara - 1053-1074 Multimode co-clustering for analyzing terrorist networks
by Ahmed Aleroud & Aryya Gangopadhyay - 1075-1095 Facilitating resource sharing and selection in ubiquitous multi-user environments
by Kimberly García & Sonia Mendoza & Dominique Decouchant & Patrick Brézillon - 1097-1116 What could possibly go wrong? A multi-panel Delphi study of organizational social media risk
by Paul M. Gangi & Allen C. Johnston & James L. Worrell & Samuel C. Thompson - 1117-1133 Exploring knowledge management software implementation from a knowing-in-practice perspective
by Khuong Le-Nguyen & Romano Dyerson & G. Harindranath - 1135-1151 WebMAC: A web based clinical expert system
by Saba Bashir & Usman Qamar & Farhan Hassan Khan
August 2018, Volume 20, Issue 4
- 649-652 Disaster Management and Information Systems: Insights to Emerging Challenges
by Ghassan Beydoun & Sergiu Dascalu & Dale Dominey-Howes & Andrew Sheehan - 653-667 A Capability Assessment Model for Emergency Management Organizations
by Xinzhi Wang & Vijayan Sugumaran & Hui Zhang & Zheng Xu - 669-692 Is the Frontier Shifting into the Right Direction? A Qualitative Analysis of Acceptance Factors for Novel Firefighter Information Technologies
by Julian Weidinger & Sebastian Schlauderer & Sven Overhage