default search action
Information Systems Frontiers, Volume 12
Volume 12, Number 1, March 2010
- Marijn Janssen, JinKyu Lee, Nitesh Bharosa, Anthony M. Cresswell:
Advances in multi-agency disaster management: Key elements in disaster research. 1-7 - Edgar A. Maldonado, Carleen F. Maitland, Andrea Hoplight Tapia:
Collaborative systems development in disaster relief: The impact of multi-level governance. 9-27 - Dickson K. W. Chiu, Drake T. T. Lin, Eleanna Kafeza, Minhong Wang, Haiyang Hu, Hua Hu, Yi Zhuang:
Alert based disaster notification and resource allocation. 29-47 - Nitesh Bharosa, JinKyu Lee, Marijn Janssen:
Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises. 49-65 - Minu Ipe, T. S. Raghu, Ajay S. Vinze:
Information intermediaries for emergency preparedness and response: A case study from public health. 67-79 - Jane Fedorowicz, Janis L. Gogan:
Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system. 81-95
Volume 12, Number 2, April 2010
- Vincenza Carchiolo, Sebastiano D'Ambra, Alessandro Longheu, Michele Malgeri:
Object-oriented re-engineering of manufacturing models: A case study. 97-114 - Ebrahim Bagheri, Ali A. Ghorbani:
UML-CI: A reference model for profiling critical infrastructure systems. 115-139 - Li Wang, Lida Xu, Renjing Liu, Hai-Hong Wang:
An approach for moving object recognition based on BPR and CI. 141-148 - Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu:
An SVM-based machine learning method for accurate internet traffic classification. 149-156 - Arnold Kamis, Tziporah Stern, Daniel M. Ladik:
A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce. 157-168 - Sven Laumer, Andreas Eckhardt, Natascha Trunk:
Do as your parents say? - Analyzing IT adoption influencing factors for full and under age applicants. 169-183 - Jahyun Goo:
Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. 185-205 - Yogesh Kumar Dwivedi, Anastasia Papazafeiropoulou, Willem-Paul Brinkman, Banita Lal:
Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider. 207-217 - Ravi Patnayakuni, Cynthia P. Ruppel:
A socio-technical approach to improving the systems development process. 219-234
Volume 12, Number 3, July 2010
- Devaki Rau, Thorvald Haerem, Gautam Ray, Wei Zheng:
Guest editorial for the special section on "Technology acceptance, usage, and competitive advantage". 235-237 - Jun Tian, Kanliang Wang, Yan Chen, Björn Johansson:
From IT deployment capabilities to competitive advantage: An exploratory study in China. 239-255 - Bendik Bygstad, Hans-Petter Aanby:
ICT infrastructure for innovation: A case study of the enterprise service bus approach. 257-265 - Petter Gottschalk:
Knowledge management technology for organized crime risk assessment. 267-275 - Jeanine Warisse Turner, N. Lamar Reinsch:
Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages? 277-285 - Devaki Rau, Thorvald Haerem:
Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research. 287-297 - Ludwig Christian Schaupp, Lemuria D. Carter:
The impact of trust, risk and optimism bias on E-file adoption. 299-309 - Xin Xu, Will Wai-Kit Ma, Eric Wing Kuen See-To:
Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance. 311-322 - Saggi Nevo, Michael R. Wade, Wade D. Cook:
An empirical study of IT as a factor of production: The case of Net-enabled IT assets. 323-335 - Lily Sun, Khadidjatou Ousmanou, Matthew Cross:
An ontological modelling of user requirements for personalised information provision. 337-356
Volume 12, Number 4, September 2010
- Mariacarla Calzarossa, Ivo De Lotto, Simon Rogerson:
Ethics and information systems - Guest editors' introduction. 357-359 - Luisa Massari:
Analysis of MySpace user profiles. 361-367 - Don Gotterbarn:
The ethics of video games: Mayhem, death, and the training of the next generation. 369-377 - Ian Stoodley, Christine Bruce, Sylvia L. Edwards:
Expanding ethical vistas of IT professionals. 379-387 - Barbara Begier:
Users' involvement may help respect social and ethical values and improve software quality. 389-397 - Gonçalo Jorge Morais da Costa, Nuno Sotero Alves da Silva:
Knowledge versus content in e-learning: A philosophical discussion. 399-413 - Malik Aleem Ahmed, Jeroen van den Hoven:
Agents of responsibility - freelance web developers in web applications development. 415-424 - Matthew J. Warren, Shona Leitch:
Hacker Taggers: A new type of hackers. 425-431 - Frances S. Grodzinsky, Andra Gumbus, Stephen Lilley:
Ethical implications of internet monitoring: A comparative study. 433-441 - Seung-Hyun Rhee, Nam Wook Cho, Hyerim Bae:
Increasing the efficiency of business processes using a theory of constraints. 443-455 - Alex Norta, Rik Eshuis:
Specification and verification of harmonized business-process collaborations. 457-479
Volume 12, Number 5, November 2010
- Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar:
Guest editorial: Advances in RFID technology. 481-483 - Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar:
Ubiquitous RFID: Where are we? 485-490 - Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum:
Classifying RFID attacks and defenses. 491-505 - Yanjun Zuo:
Secure and private search protocols for RFID systems. 507-519 - Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong:
A lightweight anti-desynchronization RFID authentication protocol. 521-528 - Joachim Schwieren, Gottfried Vossen:
ID-Services: an RFID middleware architecture for mobile applications. 529-539 - Holger Ziekow, Oliver Günther:
Sharing RFID and complex event data among organizations. 541-549 - Arijit Sengupta, Shu Z. Schiller:
FlexRFID: A design, development and deployment framework for RFID-based business applications. 551-562 - Shengguang Meng, Dickson K. W. Chiu, Eleanna Kafeza, Liu Wenyin, Qing Li:
Automated management of assets based on RFID triggered alarm messages. 563-578 - Shailaja Venkatsubramanyan, Timothy R. Hill:
An empirical investigation into the effects of web search characteristics on decisions associated with impression formation. 579-593 - Young Mee Shin, Seung Chang Lee, Bongsik Shin, Ho Geun Lee:
Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes. 595-606 - Min Gao, Kecheng Liu, Zhongfu Wu:
Personalisation in web computing and informatics: Theories, techniques, applications, and future research. 607-629 - Emilio Alvarez-Suescun:
Combining transaction cost and resource-based insights to explain IT implementation outsourcing. 631-645
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.