Journal: Information Systems Frontiers

Volume 12, Issue 5

481 -- 483Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar. Guest editorial: Advances in RFID technology
485 -- 490Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar. Ubiquitous RFID: Where are we?
491 -- 505Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew S. Tanenbaum. Classifying RFID attacks and defenses
507 -- 519Yanjun Zuo. Secure and private search protocols for RFID systems
521 -- 528Shijie Zhou, Zhen Zhang, Zongwei Luo, Edward C. Wong. A lightweight anti-desynchronization RFID authentication protocol
529 -- 539Joachim Schwieren, Gottfried Vossen. ID-Services: an RFID middleware architecture for mobile applications
541 -- 549Holger Ziekow, Oliver Günther. Sharing RFID and complex event data among organizations
551 -- 562Arijit Sengupta, Shu Z. Schiller. FlexRFID: A design, development and deployment framework for RFID-based business applications
563 -- 578Shengguang Meng, Dickson K. W. Chiu, Eleanna Kafeza, Liu Wenyin, Qing Li. Automated management of assets based on RFID triggered alarm messages
579 -- 593Shailaja Venkatsubramanyan, Timothy R. Hill. An empirical investigation into the effects of web search characteristics on decisions associated with impression formation
595 -- 606Young Mee Shin, Seung Chang Lee, Bongsik Shin, Ho Geun Lee. Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes
607 -- 629Min Gao, Kecheng Liu, Zhongfu Wu. Personalisation in web computing and informatics: Theories, techniques, applications, and future research
631 -- 645Emilio Alvarez-Suescun. Combining transaction cost and resource-based insights to explain IT implementation outsourcing

Volume 12, Issue 4

357 -- 359Maria Carla Calzarossa, Ivo De Lotto, Simon Rogerson. Ethics and information systems - Guest editors introduction
361 -- 367Luisa Massari. Analysis of MySpace user profiles
369 -- 377Don Gotterbarn. The ethics of video games: Mayhem, death, and the training of the next generation
379 -- 387Ian Stoodley, Christine Bruce, Sylvia Edwards. Expanding ethical vistas of IT professionals
389 -- 397Barbara Begier. Users involvement may help respect social and ethical values and improve software quality
399 -- 413Gonçalo Jorge Morais da Costa, Nuno Sotero Alves da Silva. Knowledge versus content in e-learning: A philosophical discussion
415 -- 424Malik Aleem Ahmed, Jeroen van den Hoven. Agents of responsibility - freelance web developers in web applications development
425 -- 431Matthew Warren, Shona Leitch. Hacker Taggers: A new type of hackers
433 -- 441Frances S. Grodzinsky, Andra Gumbus, Stephen Lilley. Ethical implications of internet monitoring: A comparative study
443 -- 455Seung-Hyun Rhee, Nam Wook Cho, Hyerim Bae. Increasing the efficiency of business processes using a theory of constraints
457 -- 479Alex Norta, Rik Eshuis. Specification and verification of harmonized business-process collaborations

Volume 12, Issue 3

235 -- 237Devaki Rau, Thorvald Haerem, Gautam Ray, Wei Zheng. Guest editorial for the special section on Technology acceptance, usage, and competitive advantage
239 -- 255Jun Tian, Kanliang Wang, Yan Chen, Björn Johansson. From IT deployment capabilities to competitive advantage: An exploratory study in China
257 -- 265Bendik Bygstad, Hans-Petter Aanby. ICT infrastructure for innovation: A case study of the enterprise service bus approach
267 -- 275Petter Gottschalk. Knowledge management technology for organized crime risk assessment
277 -- 285Jeanine Warisse Turner, N. Lamar Reinsch. Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages?
287 -- 297Devaki Rau, Thorvald Haerem. Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research
299 -- 309Ludwig Christian Schaupp, Lemuria Carter. The impact of trust, risk and optimism bias on E-file adoption
311 -- 322Xin Xu, Will Wai-Kit Ma, Eric Wing Kuen See-To. Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance
323 -- 335Saggi Nevo, Michael R. Wade, Wade D. Cook. An empirical study of IT as a factor of production: The case of Net-enabled IT assets
337 -- 356Lily Sun, Khadidjatou Ousmanou, Matthew Cross. An ontological modelling of user requirements for personalised information provision

Volume 12, Issue 2

97 -- 114Vincenza Carchiolo, Sebastiano D Ambra, Alessandro Longheu, Michele Malgeri. Object-oriented re-engineering of manufacturing models: A case study
115 -- 139Ebrahim Bagheri, Ali A. Ghorbani. UML-CI: A reference model for profiling critical infrastructure systems
141 -- 148Li Wang, Lida Xu, Renjing Liu, Hai-Hong Wang. An approach for moving object recognition based on BPR and CI
149 -- 156Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu. An SVM-based machine learning method for accurate internet traffic classification
157 -- 168Arnold Kamis, Tziporah Stern, Daniel M. Ladik. A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce
169 -- 183Sven Laumer, Andreas Eckhardt, Natascha Trunk. Do as your parents say? - Analyzing IT adoption influencing factors for full and under age applicants
185 -- 205Jahyun Goo. Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement
207 -- 217Yogesh Kumar Dwivedi, Anastasia Papazafeiropoulou, Willem-Paul Brinkman, Banita Lal. Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider
219 -- 234Ravi Patnayakuni, Cynthia P. Ruppel. A socio-technical approach to improving the systems development process

Volume 12, Issue 1

1 -- 7Marijn Janssen, JinKyu Lee, Nitesh Bharosa, Anthony M. Cresswell. Advances in multi-agency disaster management: Key elements in disaster research
9 -- 27Edgar A. Maldonado, Carleen F. Maitland, Andrea Hoplight Tapia. Collaborative systems development in disaster relief: The impact of multi-level governance
29 -- 47Dickson K. W. Chiu, Drake T. T. Lin, Eleanna Kafeza, Minhong Wang, HaiYang Hu, Hua Hu, Yi Zhuang. Alert based disaster notification and resource allocation
49 -- 65Nitesh Bharosa, JinKyu Lee, Marijn Janssen. Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises
67 -- 79Minu Ipe, T. S. Raghu, Ajay S. Vinze. Information intermediaries for emergency preparedness and response: A case study from public health
81 -- 95Jane Fedorowicz, Janis L. Gogan. Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system