default search action
Information Systems Frontiers, Volume 13
Volume 13, Number 1, March 2011
- Hsinchun Chen, Yilu Zhou, Edna Reid, Catherine A. Larson:
Introduction to special issue on terrorism informatics. 1-3 - Nancy C. Roberts:
Tracking and disrupting dark networks: Challenges of data collection and analysis. 5-19 - David B. Skillicorn:
Computational approaches to suspicion in adversarial settings. 21-31 - Onook Oh, Manish Agrawal, H. Raghav Rao:
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. 33-43 - Marc Cheong, Vincent C. S. Lee:
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. 45-59 - Sheryl Prentice, Paul J. Taylor, Paul Rayson, Andrew Hoskins, Ben O'Loughlin:
Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict. 61-73 - Jialun Qin, Yilu Zhou, Hsinchun Chen:
A multi-region empirical study on the internet presence of global extremist organizations. 75-88 - Stephen C. Hayne, Lucy J. Troup, Sara A. McComb:
"Where's Farah?": Knowledge silos and information fusion by distributed collaborating teams. 89-100 - Jiexun Li, G. Alan Wang, Hsinchun Chen:
Identity matching using personal and social identity features. 101-113 - Daniel Zeng, Donghua Wei, Michael Chau, Fei-Yue Wang:
Domain-specific Chinese word segmentation using suffix tree and mutual information. 115-125 - Jung-Wook Choi, Dong-Ik Oh:
Tag-only aging-counter localization for the R-LIM2 system. 127-137 - Rong Liu, Akhil Kumar:
Leveraging information sharing to configure supply chains. 139-151
Volume 13, Number 2, April 2011
- Dickson K. W. Chiu, Eleanna Kafeza, Patrick C. K. Hung:
ISF special issue on emerging social and legal aspects of information systems with Web 2.0. 153-155 - Aaron X. L. Shen, Christy M. K. Cheung, Matthew K. O. Lee, Huaping Chen:
How social influence affects we-intention to use instant messaging: The moderating effect of usage experience. 157-169 - Yuqing Sun, Joshua Zhexue Huang, Xiangxu Meng:
Integrating constraints to support legally flexible business processes. 171-189 - Minhong Wang:
Integrating organizational, social, and individual perspectives in Web 2.0-based workplace e-learning. 191-205 - Hideyasu Sasaki:
A computing theory for collaborative and transparent decision making under time constraint. 207-220 - Stephen Burgess, Carmine Sellitto, Carmen Cox, Jeremy Buultjens:
Trust perceptions of online travel information by different content creators: Some social and legal implications. 221-235 - Chima Adiele:
Towards promoting interactivity in a B2B web community. 237-249 - Jia Zhang, Karthik Akula, Momtazul Karim, Raghu Kumar Reddy Ariga:
A university-oriented Web 2.0 services portal. 251-264 - Yuanchu Hwang, Soe-Tsyr Yuan, Jung-Hui Weng:
A study of the impacts of positive/negative feedback on collective wisdom - case study on social bookmarking sites. 265-279 - Tomás Sánchez López, Damith Chinthana Ranasinghe, Béla Pátkai, Duncan C. McFarlane:
Taxonomy, technology and applications of smart objects. 281-300
Volume 13, Number 3, July 2011
- Michael Chau, George L. Ball, Jinghua Huang, Jian Chen, J. Leon Zhao:
Global IT and IT-enabled services. 301-304 - Ji Hu:
Derivation of trust federation for collaborative business processes. 305-319 - Anja Bog, Hasso Plattner, Alexander Zeier:
A mixed transaction processing and operational reporting benchmark. 321-335 - Junjie Wu, Jian Chen, Yili Ren:
GIS enabled service site selection: Environmental analysis and beyond. 337-348 - Oleksandr Panchenko, Hasso Plattner, Alexander Zeier:
Efficient storage and fast querying of source code. 349-357 - Noyan Ilk, J. Leon Zhao, Paulo B. Góes, Paul Hofmann:
Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems. 359-370 - Ming Li, Lu Liu, Lu Yin, Yanqiu Zhu:
A process mining based approach to knowledge maintenance. 371-380 - Nan Zhang, Xunhua Guo, Guoqing Chen:
Why adoption and use behavior of IT/IS cannot last? - two studies in China. 381-395 - Amar Gupta, Igor Crk, Rajdeep Bondade:
Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm. 397-405 - Marco Crasso, Alejandro Zunino, Marcelo Campo:
Combining query-by-example and query expansion for simplifying web service discovery. 407-428 - She-I Chang, David C. Yen, Celeste See-Pui Ng, I-Cheng Chang, Sheng-Yu Yu:
An ERP system performance assessment model development based on the balanced scorecard approach. 429-450
Volume 13, Number 4, September 2011
- Ram Ramesh, H. Raghav Rao:
Editorial. 451-452 - Xiang Fang, Clyde W. Holsapple:
Impacts of navigation structure, task complexity, and users' domain knowledge on Web site usability - an empirical study. 453-469 - Ching-Hsien Hsu, Han-Chieh Chao, Jong Hyuk Park:
Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems. 471-480 - Xue Li, Jing Liu, Quan Z. Sheng, Sherali Zeadally, Weicai Zhong:
TMS-RFID: Temporal management of large-scale RFID applications. 481-500 - Ravi I. Singh, Manasa Sumeeth, James Miller:
A user-centric evaluation of the readability of privacy policies in popular web sites. 501-514 - Gunwoo Kim, Yongmoo Suh:
Semantic business process space for intelligent management of sales order business processes. 515-542 - Faheem Ahmed, Luiz Fernando Capretz:
A business maturity model of software product line engineering. 543-560 - Torsten J. Gerpott:
Determinants of self-report and system-captured measures of mobile Internet use intensity - An empirical investigation of common method bias among German mobile communications customers. 561-578 - Kuo-Chung Chang, Chih-ping Wang:
Information systems resources and information security. 579-593 - Stefan Strecker, David Heise, Ulrich Frank:
RiskM: A multi-perspective modeling method for IT risk assessment. 595-611 - Young Mee Shin, Seung Chang Lee, Bongsik Shin, Ho Geun Lee:
Erratum to: Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes. 613
Volume 13, Number 5, November 2011
- Joseph Barjis, Ashish Gupta, Ramesh Sharda:
Knowledge work and communication challenges in networked enterprises. 615-619 - René Peinl, Ronald Maier:
SimKnowledge - Analyzing impact of knowledge management measures on team organizations with multi agent-based simulation. 621-636 - Ashish Gupta, Ramesh Sharda, Robert A. Greve:
You've got email! Does it really matter to process emails now or later? 637-653 - Amit V. Deokar, Omar F. El-Gayar:
Decision-enabled dynamic process management for networked enterprises. 655-668 - Kurt DeMaagd, Johannes M. Bauer:
Modeling the dynamic interactions of agents in the provision of network infrastructure. 669-680 - Daning Hu, Sherry X. Sun, J. Leon Zhao, Xinlei Zhao:
Strategic choices of inter-organizational information systems: A network perspective. 681-692 - Samuel Fosso Wamba, Akemi Takeoka Chatfield:
The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry. 693-706 - Aaron Luntala Nsakanda, Moustapha Diaby, Yuheng Cao:
An aggregate inventory-based model for predicting redemption and liability in loyalty reward programs industry. 707-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.