Journal: Information Systems Frontiers

Volume 18, Issue 6

1035 -- 1039José Braga de Vasconcelos, Chris Kimble, Álvaro Rocha. A special issue on knowledge and competence management: Developing Enterprise solutions
1041 -- 1049Maria-Isabel Sanchez-Segura, Alejandro Ruiz-Robles, Fuensanta Medina-Domínguez. Uncovering hidden process assets: A case study
1051 -- 1061Maria José Angélico Gonçalves, Álvaro Rocha, Manuel Pérez Cota. Information management model for competencies and learning outcomes in an educational context
1063 -- 1084Eric Zimmerling, Patrick Julian Hoflinger, Philipp G. Sandner, Isabell M. Welpe. A system framework for gamified Cost Engineering
1085 -- 1102Mohammed Nassim Lacheheub, Ramdane Maamri. Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS
1103 -- 1117Maria José Sousa, Miguel González-Loureiro. Employee knowledge profiles - a mixed-research methods approach
1119 -- 1130Chris Kimble, José Braga de Vasconcelos, Álvaro Rocha. Competence management in knowledge intensive organizations using consensual knowledge and ontologies
1131 -- 1151Yeganeh Charband, Nima Jafari Navimipour. Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research
1153 -- 1163Oihab Allal-Chérif, Marc Bidan, Mohamed Makhlouf. Using serious games to manage knowledge and competencies: The seven-step development process
1165 -- 1189Hsin Hsin Chang, Yao-Chuan Tsai, Chen-Su Fu, Shu Hui Chen, Yao De Peng. Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD
1191 -- 1203Ikram Bououd, Sana Rouis Skandrani, Imed Boughzala, Mohamed Makhlouf. Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds
1205 -- 1215Humayun Zafar, Myung S. Ko, Kweku-Muata Osei-Bryson. The value of the CIO in the top management team on performance in the case of information security breaches
1217 -- 1231Yunqiang Zhu, Peng Pan, Shifeng Fang, Li Da Xu, Jia Song, Jinqu Zhang, Min Feng. The development and application of e-Geoscience in China
1233 -- 1249El-Sayed M. El-Alfy, Salahadin Mohammed, Ahmad F. Barradah. XHQE: A hybrid system for scalable selectivity estimation of XML queries
1251 -- 1263Anastasia Papazafeiropoulou, Konstantina Spanaki. Understanding governance, risk and compliance information systems (GRC IS): The experts view
1265 -- 1283Torsten J. Gerpott, Phil Meinert. Correlates of using the billing system of a mobile network operator to pay for digital goods and services

Volume 18, Issue 5

819 -- 823Thouraya Bouabana-Tebibel, Stuart H. Rubin. Towards common reusable semantics
825 -- 853Marcus Kessel, Colin Atkinson. Ranking software components for reuse based on non-functional properties
855 -- 875Mustafa Berk Duran, Gunter Mussbacher. Investigation of feature run-time conflicts on goal model-based reuse
877 -- 889Chao Chen, Mei-Ling Shyu, Shu-Ching Chen. Weighted subspace modeling for semantic concept retrieval using gaussian mixture models
891 -- 908Azadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe. Semantic weaving of configuration fragments into a consistent system configuration
909 -- 925René Rydhof Hansen, Kim Guldstrand Larsen, Mads Chr. Olesen, Erik Ramsgaard Wognsen. Formal modelling and analysis of Bitflips in ARM assembly code
927 -- 952Johanna Nellen, Kai Driessen, Martin R. Neuhäußer, Erika Ábrahám, Benedikt Wolters. Two CEGAR-based approaches for the safety verification of PLC-controlled plants
953 -- 965Daniel R. Harris. Foundations of reusable and interoperable facet models using category theory
967 -- 980André Didier, Alexandre Mota. An algebra of temporal faults
981 -- 994Stuart H. Rubin, Thouraya Bouabana-Tebibel, Yasmin Hoadjli. On the empirical justification of theoretical heuristic transference and learning
995 -- 1020Norris Syed Abdullah, Marta Indulska, Shazia Wasim Sadiq. Compliance management ontology - a shared conceptualization for research and practice in compliance management
1021 -- 1034Huda Qasim, Emad Abu-Shanab. Drivers of mobile payment acceptance: The impact of network externalities

Volume 18, Issue 4

639 -- 643Quan Z. Sheng, Xue Li, Anne H. H. Ngu, Yongrui Qin, Dong Xie. Guest editorial: web of things
645 -- 663Mohammad Alamgir Hossain, Mohammed Quaddus, Nazrul Islam. Developing and validating a model explaining the assimilation process of RFID: An empirical study
665 -- 677Sabrina Sicari, Cinzia Cappiello, Francesco De Pellegrini, Daniele Miorandi, Alberto Coen-Porisini. A security-and quality-aware system architecture for Internet of Things
679 -- 691Eric G. Stephan, Todd Elsethagen, Larry K. Berg, Matthew C. Macduff, Patrick R. Paulson, Will J. Shaw, Chitra Sivaraman, William Smith, Adam S. Wynne. Semantic catalog of things, services, and data to support a wind data management facility
693 -- 710Manoj A. Thomas, Daniela Costa, Tiago Oliveira. Assessing the role of IT-enabled process virtualization on green IT adoption
711 -- 716Lixin Shen, Hong Wang, Li Da Xu, Xue Ma, Sohail S. Chaudhry, Wu He. Identity management based on PCA and SVM
717 -- 734Remco M. Dijkman, Sander Vincent Lammers, Ad de Jong. Properties that influence business process management maturity and its effect on organizational performance
735 -- 764Mehrdad Ashtiani, Mohammad Abdollahi Azgomi. A formulation of computational trust based on quantum decision theory
765 -- 780Fernando Terroso-Saenz, Mercedes Valdés-Vela, Antonio F. Skarmeta-Gómez. A complex event processing approach to detect abnormal behaviours in the marine environment
781 -- 818Maxime Bernaert, Geert Poels, Monique Snoeck, Manu De Backer. CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises

Volume 18, Issue 3

407 -- 411Haluk Demirkan, James C. Spohrer. Emerging service orientations and transformations (SOT)
413 -- 428Mohan Baruwal Chhetri, Sergei Chichin, Quoc Bao Vo, Ryszard Kowalczyk. Smart CloudBench - A framework for evaluating cloud infrastructure performance
429 -- 455Mustafa Hashmi, Guido Governatori, Moe Thandar Wynn. Normative requirements for regulatory compliance: An abstract formal framework
457 -- 478Eng K. Chew. iSIM: An integrated design method for commercializing service innovation
479 -- 497Olivera Marjanovic, Vijaya Murthy. From product-centric to customer-centric services in a financial institution - exploring the organizational challenges of the transition process
499 -- 510George Joukhadar, Fethi A. Rabhi. SOA in practice - a study of governance aspects
511 -- 528Weisi Chen, Fethi A. Rabhi. Enabling user-driven rule management in event data analysis
529 -- 540Laor Boongasame, Farhad Daneshgar. An awareness-based meta-mechanism for e-commerce buyer coalitions
541 -- 564Ralph Foorthuis, Marlies van Steenbergen, Sjaak Brinkkemper, Wiel A. G. Bruls. A theory building study of enterprise architecture practices and benefits
565 -- 578Yong Sun, WenAn Tan, Ling Xia Li, Weiming Shen, Zhuming Bi, Xiaoming Hu. A new method to identify collaborative partners in social service provider networks
579 -- 595Vinodh Krishnaraju, Saji K. Mathew, Vijayan Sugumaran. Web personalization for user acceptance of technology: An empirical investigation of E-government services
597 -- 619Soe-Tsyr Daphne Yuan, Peng-Wei Chiu. Persuasive narrative advertisement generator: A microenterprise service innovation perspective
621 -- 638Kim Hua Tan, W. P. Wong, Leanne Chung. Information and Knowledge Leakage in Supply Chain

Volume 18, Issue 2

233 -- 235Atreyi Kankanhalli, Jungpil Hahn, Sharon Tan , Gordon Gao. Big data and analytics in healthcare: Introduction to the special section
237 -- 252Prem Timsina, Jun Liu, Omar F. El-Gayar. Advanced analytics for the automation of medical systematic reviews
253 -- 263Changgyu Yang, Hee-Jun Lee. A study on the antecedents of healthcare information protection intention
265 -- 275Tao Zhou, Yaobin Lu, Bin Wang. Examining online consumers' initial trust building from an elaboration likelihood model perspective
277 -- 292Evelina Pencheva, Ivaylo Atanasov. Engineering of web services for internet of things applications
293 -- 314Herbjørn Nysveen, Per E. Pedersen. Consumer adoption of RFID-enabled services. Applying an extended UTAUT model
315 -- 332Mahmud Akhter Shareef, Vinod Kumar, Yogesh Kumar Dwivedi, Uma Kumar. Service delivery through mobile-government (mGov): Driving factors and cultural impacts
333 -- 348Kishor Vaidya, John Campbell. Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency
349 -- 358Robert B. K. Brown, Ghassan Beydoun, Graham Low, William Tibben, Reza Zamani, Francisco García Sánchez, Rodrigo Martínez-Béjar. Computationally efficient ontology selection in software requirement planning
359 -- 405Jörg Becker, Patrick Delfmann, Hanns-Alexander Dietrich, Matthias Steinhorst, Mathias Eggert. Business process compliance checking - applying and evaluating a generic pattern matching approach for conceptual models in the financial sector

Volume 18, Issue 1

1 -- 6Gert-Jan de Vreede, Pedro Antunes, Julita Vassileva, Marco Aurélio Gerosa, Kewen Wu. Collaboration technology in teams and organizations: Introduction to the special issue
7 -- 21Francisco J. Gutierrez, Sergio F. Ochoa, Gustavo Zurita, Nelson Baloian. Understanding student participation in undergraduate course communities: A case study
23 -- 46Diane E. Strode. A dependency taxonomy for agile software development projects
47 -- 68Nguyen Hoang Thuan, Pedro Antunes, David Johnstone. Factors influencing the decision to crowdsource: A systematic literature review
69 -- 84Pedro O. Rossel, Valeria Herskovic, Erika Ormeño. Creating a family of collaborative applications for emergency management in the firefighting sub-domain
85 -- 102Mikhail Fominykh, Ekaterina Prasolova-Førland, Monica Divitini, Sobah Abbas Petersen. Boundary objects in collaborative work and learning
103 -- 123Luís Duarte, Luís Carriço. Designing for geo-referenced in-situ therapeutic scenarios
125 -- 144Nelson Baloian, Gustavo Zurita. Achieving better usability of software supporting learning activities of large groups
145 -- 158Sayooran Nagulendra, Julita Vassileva. Providing awareness, explanation and control of personalized filtering in a social networking site
159 -- 170Paras Jain, Vipin Tyagi. A survey of edge-preserving image denoising methods
171 -- 204Yasser A. Khan, Mohamed El-Attar. Using model transformation to refactor use case models based on antipatterns
205 -- 231Chao Zhu, Qiang Zhu, Calisto Zuzarte, Wenbin Ma. Optimization of generic progressive queries based on dependency analysis and materialized views