Journal: Information Systems Frontiers

Volume 14, Issue 5

963 -- 965Ram Ramesh, H. Raghav Rao. Information systems frontiers editorial December 2012
967 -- 970Kenneth J. Arrow. Economic theory and the financial crisis
971 -- 986Hangjung Zo, Derek L. Nazareth, Hemant K. Jain. End-to-end reliability of service oriented applications
987 -- 998ChunLin Li, Layuan Li. An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment
999 -- 1017Alejandro Rodríguez González, Ricardo Colomo Palacios, Fernando Guldrís-Iglesias, Juan Miguel Gómez Berbís, Ángel García-Crespo. FAST: Fundamental Analysis Support for Financial Statements. Using semantics for trading recommendations
1019 -- 1032Chi-Lun Liu, Heng-Li Yang. Applying ontology-based blog to detect information system post-development change requests conflicts
1033 -- 1046Probir Kumar Banerjee, Louis C. K. Ma. Routinisation of B2B E-commerce by small firms: A process perspective
1047 -- 1060Yong Jin Kim, Seokwoo Song, V. Sambamurthy, Young Lyoul Lee. Entrepreneurship, knowledge integration capability, and firm performance: An empirical study
1061 -- 1077Kamil Reddy, H. S. Venter, Martin S. Olivier. Using time-driven activity-based costing to manage digital forensic readiness in large organisations
1079 -- 1094Barry A. Cumbie, Chetan S. Sankar. Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process
1095 -- 0Namho Lee, Jae Kwon Bae, Chulmo Koo. Erratum to: A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment

Volume 14, Issue 4

823 -- 825Jason J. Jung, Yue-Shan Chang, Ying Liu, Chao-Chin Wu. Advances in intelligent grid and cloud computing
827 -- 843Iñigo Goiri, Jordi Guitart, Jordi Torres. Economic model of a Cloud provider operating in a federated Cloud
845 -- 869Oleksiy Mazhelis, Pasi Tyrväinen. Economic aspects of hybrid cloud infrastructure: User organization perspective
871 -- 893Benedikt Martens, Frank Teuteberg. Decision-making in cloud computing environments: A cost and risk based approach
895 -- 908Kuan-Chou Lai, You-Fu Yu. A scalable multi-attribute hybrid overlay for range queries on the cloud
909 -- 924Yue-Shan Chang, Ruey-Kai Sheu, Shyan-Ming Yuan, Jyn-Jie Hsu. Scaling database performance on GPUs
925 -- 951J. Octavio Gutiérrez-García, Kwang Mong Sim. GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications
953 -- 961Jason J. Jung. ContextGrid: A contextual mashup-based collaborative browsing system

Volume 14, Issue 3

477 -- 479Shiguo Lian, Jean-Henry Morin, Stefanos Gritzalis, Gregory L. Heileman. Special issue on ubiquitous multimedia services
481 -- 497Athanasios Loukas, Dimitrios Damopoulos, Sofia-Anna Menesidou, Maria Eleni Skarkala, Georgios Kambourakis, Stefanos Gritzalis. MILC: A secure and privacy-preserving mobile instant locator with chatting
499 -- 515Ray-I Chang, Te-Chih Wang, Chia-Hui Wang, Jen-Chang Liu, Jan-Ming Ho. Effective distributed service architecture for ubiquitous video surveillance
517 -- 526Yuan Dong, Shiguo Lian. Automatic and fast temporal segmentation for personalized news consuming
527 -- 540Rodrigo Roman, Javier Lopez, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, Marta Bel. Advanced secure multimedia services for digital homes
541 -- 553Emmanouil A. Panaousis, Christos Politis, Konstantinos Birkos, Christos A. Papageorgiou, Tasos Dagiuklas. Security model for emergency real-time communications in autonomous networks
555 -- 569Evelina Pencheva, Ivaylo Atanasov. Third party application control on quality of service in IP based multimedia networks
571 -- 584Mark Umberger, Satja Lumbar, Iztok Humar. Modeling the influence of network delay on the user experience in distributed home-automation networks
585 -- 600Sayyen Teoh, Shan Ling Pan, Anand Ramchand. Resource management activities in healthcare information systems: A process perspective
601 -- 616Seungwok Han, Hee Yong Youn, Ohyoung Song. Efficient category-based service discovery on multi-agent platform
617 -- 632Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi. Secure XML querying based on authorization graphs
633 -- 645Yung-Ming Li, Jhih-Hua Jhang-Li, Ting-Kai Hwang, Ping-Wen Chen. Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost
647 -- 651Selwyn Piramuthu. Vulnerabilities of RFID protocols proposed in ISF
653 -- 668Namho Lee, Jae Kwon Bae, Chulmo Koo. A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment
669 -- 692Hamideh Afsarmanesh, Simon Samwel Msanjila, Luis M. Camarinha-Matos. Technological research plan for active ageing
693 -- 709She-I Chang, David C. Yen, I-Cheng Chang, Jung-Chu Chou. Study of the digital divide evaluation model for government agencies-a Taiwanese local government's perspective
711 -- 723ChunLin Li, Layuan Li. Collaboration among mobile agents for efficient energy allocation in mobile grid
725 -- 739Maja Stula, Damir Krstinic, Ljiljana Seric. Intelligent forest fire monitoring system
741 -- 764Gary F. Templeton, James F. Dowdy Jr.. CASE-mediated organizational and deutero learning at NASA
765 -- 788Haluk Demirkan, Sagnika Sen, Michael Goul, Jason Nichols. Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows
789 -- 808Jungyub Woo, Nenad Ivezic, Hyunbo Cho. Agile test framework for business-to-business interoperability
809 -- 822Md. Enamul Kabir, Hua Wang, Elisa Bertino. A role-involved purpose-based access control model

Volume 14, Issue 2

119 -- 121Shazia Wasim Sadiq, Michael zur Muehlen, Marta Indulska. Preface
123 -- 124Shazia Wasim Sadiq, Michael zur Muehlen, Marta Indulska. Governance, risk and compliance: Applications in information systems
125 -- 141Susan Scott, Nicholas Perry. The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry
143 -- 154G. R. Gangadharan, Vincenzo D'Andrea, Stefano De Paoli, Michael Weiss. Managing license compliance in free and open source software development
155 -- 177Jörg Hoffmann, Ingo Weber, Guido Governatori. On compliance checking for clausal constraints in annotated process models
179 -- 193Syaiful Ali, Peter Green. Effective information technology (IT) governance mechanisms: An IT outsourcing perspective
195 -- 219Linh Thao Ly, Stefanie Rinderle-Ma, Kevin Göser, Peter Dadam. On enabling integrated process compliance with semantic constraints in process management systems - Requirements, challenges, solutions
221 -- 235Tom Butler, Damien McGovern. A conceptual model and IS framework for the design and adoption of environmental compliance management systems - For special issue on governance, risk and compliance in IS
237 -- 259Francis Kofi Andoh-Baidoo, Kweku-Muata Osei-Bryson, Kwasi Amoako-Gyampah. Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework
261 -- 277Anastasiou Kartas, Sigi Goode. Use, perceived deterrence and the role of software piracy in video game console adoption
279 -- 299Senaka Fernando, Jyoti Choudrie, Mark Lycett, Sergio de Cesare. Hidden assumptions and their influence on clinicians' acceptance of new IT systems in the NHS
301 -- 315James Ma, Daniel Zeng, Huimin Zhao. Modeling the growth of complex software function dependency networks
317 -- 330Agnès Voisard, Holger Ziekow. Modeling trade-offs in the design of sensor-based event processing infrastructures
331 -- 342Seokjoo Andrew Chang. Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue
343 -- 361Silke Retzer, Pak Yoong, Val Hooper. Inter-organisational knowledge transfer in social networks: A definition of intermediate ties
363 -- 374Lan Xiao, Li Zheng. Business process design: Process comparison and integration
375 -- 393MinJae Lee, JinKyu Lee. The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet
395 -- 407Shouhong Wang, Hai Wang. Organizational schemata of e-portfolios for fostering higher-order thinking
409 -- 421Dan Jong Kim, Yujong Hwang. A study of mobile internet user's service quality perceptions from a user's utilitarian and hedonic value tendency perspectives
423 -- 444Türker Tanergüçlü, Hakan Maras, Cevriye Gencer, Haluk Aygünes. A decision support system for locating weapon and radar positions in stationary point air defence
445 -- 455Hwan-Joo Seo, Young Soo Lee, Jai-Joon Hur, Jin Ki Kim. The impact of information and communication technology on skilled labor and organization types
457 -- 475Bobby Swar, Junghoon Moon, Junyoung Oh, Cheul Rhee. Determinants of relationship quality for IS/IT outsourcing success in public sector

Volume 14, Issue 1

1 -- 3Jens H. Weber-Jahnke, Liam Peyton, Thodoros Topaloglou. eHealth system interoperability
5 -- 18Shagufta Umer, Muhammad Afzal, Maqbool Hussain, Khalid Latif, Hafiz Farooq Ahmad. Autonomous mapping of HL7 RIM and relational database schema
19 -- 42Ellen Balka, Sandra Whitehouse, Shannon T. Coates, Dug Andrusiek. Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions
43 -- 55Daisy Daiqin He, Jian Yang, Michael Compton, Kerry Taylor. Authorization in cross-border eHealth systems
57 -- 72Payam Sadeghi, Morad Benyoucef, Craig E. Kuziemsky. A mashup based framework for multi level healthcare interoperability
73 -- 85Alain Mouttham, Craig E. Kuziemsky, Dishant Langayan, Liam Peyton, Jose Pereira. Interoperable support for collaborative, mobile, and accessible health care
87 -- 104Jens H. Weber-Jahnke, Christina Obry. Protecting privacy during peer-to-peer exchange of medical documents
105 -- 117Hongqiao Yang, Weizi Li, Kecheng Liu, Junping Zhang. Knowledge-based clinical pathway for medical quality improvement