Journal: Information Systems Frontiers

Volume 19, Issue 6

1229 -- 1232Shih-Chia Huang, Suzanne McIntosh, Stanislav Sobolevsky, Patrick C. K. Hung. Big Data Analytics and Business Intelligence in Industry
1233 -- 1241Jimin Guo, Benjamin C. M. Fung, Farkhund Iqbal, Peter J. K. Kuppen, Rob A. E. M. Tollenaar, Wilma E. Mesker, Jean-Jacques Lebrun. Revealing determinant factors for early breast cancer recurrence by decision tree
1243 -- 1259Fernando de Almeida Freitas, Sarajane Marques Peres, Clodoaldo Ap. M. Lima, Felipe Venâncio Barbosa. Grammatical facial expression recognition in sign language discourse: a study at the syntax level
1261 -- 1271Chengde Zheng, Xiaofeng Yu, Qiming Jin. How user relationships affect user perceived value propositions of enterprises on social commerce platforms
1273 -- 1282Ling Huang, Qinglin Zhao, Yan Li, Shangguang Wang, Lei Sun, Wu Chou. Reliable and efficient big service selection
1283 -- 1299Victor W. Chu, Raymond K. Wong, Chi-Hung Chi, Wei Zhou, Ivan Ho. The design of a cloud-based tracker platform based on system-of-systems service architecture
1301 -- 1309Wei-Feng Tung, Yu-Jei Lan. Analyzing social choice and group ranking of online games for product mix innovation
1311 -- 1327Wei-Feng Tung, Guillaume Jordann. Crowdsourcing social network service for social enterprise innovation
1329 -- 1342Yufang Peng, Jin Shi, Marcelo Fantinato, Jing Chen. A study on the author collaboration network in big data
1343 -- 1356Shaio Yan Huang, Chi-Chen Lin, An-An Chiu, David C. Yen. Fraud detection using fraud triangle risk factors
1357 -- 1372Xiongnan Jin, Sejin Chun, Jooik Jung, Kyong-Ho Lee. A fast and scalable approach for IoT service selection based on a physical service model
1373 -- 1390Mohammed Hawa, Raed T. Al-Zubi, Khalid A. Darabkh, Ghazi M. Al-Sukkar. Adaptive approach to restraining content pollution in peer-to-peer networks
1391 -- 1405Stephen Jackson, Meng Seng Wong. A cultural theory analysis of e-government: Insights from a local government council in Malaysia
1407 -- 1422Leif Lundmark, Chong Oh, J. Cameron Verhaal. A little Birdie told me: Social media, organizational legitimacy, and underpricing in initial public offerings
1423 -- 1443Asef Pourmasoumi, Mohsen Kahani, Ebrahim Bagheri. Mining variable fragments from process event logs

Volume 19, Issue 5

969 -- 974Vijayan Sugumaran, T. V. Geetha, D. Manjula, Hema Gopal. Guest Editorial: Computational Intelligence and Applications
975 -- 991Berna Tektas Sivrikaya, Ferhan Çebi, Hasan Hüseyin Turan, Nihat Kasap, Dursun Delen. A fuzzy long-term investment planning model for a GenCo in a hybrid electricity market considering climate change impacts
993 -- 1012Youngseok Choi, Habin Lee. Data properties and the performance of sentiment classification for electronic commerce applications
1013 -- 1028G. Pavai, T. V. Geetha. Improving the freshness of the search engines by a probabilistic approach based incremental crawler
1029 -- 1038Zheng Xu 0001, Junyu Xuan, Yunhuai Liu, Kim-Kwang Raymond Choo, Lin Mei, Chuanping Hu. Building spatial temporal relation graph of concepts pair using web repository
1039 -- 1056S. P. Faustina Joan, S. Valli. An enhanced text detection technique for the visually impaired to read text
1057 -- 1066Weidong Zhao, Qingfeng Zeng, Guangjian Zheng, Liu Yang. The resource allocation model for multi-process instances based on particle swarm optimization
1067 -- 1084Maria Isabel Sánchez Segura, German-Lenin Dugarte-Peña, Fuensanta Medina-Domínguez, Alejandro Ruiz-Robles. A model of biomimetic process assets to simulate their impact on strategic goals
1085 -- 1099Sebastian Büsch, Volker Nissen, Arndt Wünscher. Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques
1101 -- 1121Patrick Afflerbach, Martin Hohendorf, Jonas Manderscheid. Design it like Darwin - A value-based application of evolutionary algorithms for proper and unambiguous business process redesign
1123 -- 1132Mauro Castelli, Ivo Gonçalves, Leonardo Trujillo, Ales Popovic. An evolutionary system for ozone concentration forecasting
1133 -- 1148Tung-Hsien Wu, Shi-Ming Huang, Shaio Yan Huang, David C. Yen. The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance
1149 -- 1160Yong Jin Kim, Chan Young Kim, Yong-Jae Shin. The effects of ubiquitous healthcare service on the south Korean Economy: using input-output analysis
1161 -- 1176Ali Cevahir. Index partitioning through a bipartite graph model for faster similarity search in recommendation systems
1177 -- 1190Jue Shen, Majid Baghaei Nejad, Li Xie, Jia Mao, Zhibo Pang, Yi Feng, Lida Xu, Hannu Tenhunen, Zhuo Zou, Li-Rong Zheng. Interactive UHF/UWB RFID tag for mass customization
1191 -- 1203Nathan Hopkins, Mary Tate, Allan Sylvester, David Johnstone. Motivations for 21st century school children to bring their own device to school
1205 -- 1228Daniel Schatz, Rabih Bashroush. Economic valuation for information security investment: a systematic literature review

Volume 19, Issue 4

699 -- 703Chulmo Koo, Francesco Ricci, Cihan Cobanoglu, Fevzi Okumus. Special issue on smart, connected hospitality and tourism
705 -- 715Seung Jae Lee. A review of audio guides in the era of smart tourism
717 -- 729Sunyoung Hlee, Jimin Lee, Dae-Seop Moon, Changsok Yoo. The acceptance of 'intelligent trade shows': Visitors' evaluations of IS innovation
731 -- 742Namho Chung, Inessa Tyan, Heejeong Han. Enhancing the smart tourism experience through geotag
743 -- 752Seunghun Shin, Sung-Byung Yang, Kichan Nam, Chulmo Koo. Conceptual foundations of a landmark personality scale based on a destination personality scale: Text mining of online reviews
753 -- 767Ahmet Bulent Ozturk, Khaldoon Nusair, Fevzi Okumus, Dipendra Singh. Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework
769 -- 785Marya Wani, Vishnupriya Raghavan, Dolphy M. Abraham, Virginia Franke Kleist. Beyond utilitarian factors: User experience and travel company website successes
787 -- 802Jengchung Victor Chen, I-Han Lu, David C. Yen, Andree E. Widjaja. Factors affecting the performance of internal control task team in high-tech firms
803 -- 818Jörn Künsemöller, Nan Zhang, Kimmo Berg, Joao Soares. A game-theoretic evaluation of an ISP business model in caching
819 -- 833Johan Ullberg, Pontus Johnson. Empirical assessment of the accuracy of an interoperability prediction language
835 -- 854Frederico Cruz-Jesus, Tiago Oliveira, Fernando Bação, Zahir Irani. Assessing the pattern between economic and digital development of countries
855 -- 868Zhaoyu Li, Rui Xu, Pingyuan Cui, Lida Xu, Wu He. Geometry-based propagation of temporal constraints
869 -- 880Miroslava Raspopovic, Aleksandar Jankulovic. Performance measurement of e-learning using student satisfaction analysis
881 -- 897Heng Tang, Chang Boon Patrick Lee, Kwee Keong Choong. Consumer decision support systems for novice buyers - a design science approach
899 -- 922Michaela Sprenger, Tobias Mettler, Robert Winter. A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
923 -- 0Michaela Sprenger, Tobias Mettler, Robert Winter. Erratum to: A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions
925 -- 943Yan Li 0018, Manoj A. Thomas, Kweku-Muata Osei-Bryson. Ontology-based data mining model management for self-service knowledge discovery
945 -- 953Rui Xu, Changqing Wu, Shengying Zhu, Baodong Fang, Wei Wang, Lida Xu, Wu He. A rapid maneuver path planning method with complex sensor pointing constraints in the attitude space
955 -- 968Rajesh Chandwani, Rahul De'. Doctor-patient interaction in telemedicine: Logic of choice and logic of care perspectives

Volume 19, Issue 3

421 -- 424Douglas Cumming, Sofia Johan, Denis Schweizer. Information systems, agency problems, and fraud - Special section, information systems frontiers
425 -- 441Qizhi Tao, Yizhe Dong, Ziming Lin. Who can get money? Evidence from the Chinese peer-to-peer lending platform
443 -- 455Ruochen Liao, Shenaz Balasinorwala, H. Raghav Rao. Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests
457 -- 467Lorne N. Switzer, Jun Wang. An event based approach for quantifying the effects of securities fraud in the IT industry
469 -- 479Kuntara Pukthuanthong, Saif Ullah, Thomas J. Walker, Xuan Wu. Timely vs. delayed CEO turnover
481 -- 507Soe-Tsyr Daphne Yuan, Shiou-Tian Hsu. Enhancing service system design: An entity interaction pattern approach
509 -- 524A. J. Burns, Clay Posey, James F. Courtney, Tom L. Roberts, Prabhashi Nanayakkara. Organizational information security as a complex adaptive system: insights from three agent-based models
525 -- 548Lingling Gao, Kerem Aksel Waechter. Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation
549 -- 568Nripendra P. Rana, Yogesh Kumar Dwivedi, Banita Lal, Michael D. Williams, Marc Clement. Citizens' adoption of an electronic government system: towards a unified view
569 -- 576Xin Wang, Li Wang, Li Zhang, Xiaobo Xu, Weiyong Zhang, Yingcheng Xu. Developing an employee turnover risk evaluation model using case-based reasoning
577 -- 591Sojung Lucia Kim, Thompson S. H. Teo, Anol Bhattacherjee, Kichan Nam. IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea
593 -- 610Adriano Olímpio Tonelli, Paulo Henrique de Souza Bermejo, Pâmela Aparecida dos Santos, Larissa Zuppo, André Luiz Zambalde. It governance in the public sector: a conceptual model
611 -- 623Patrick Buckley, Fergal Obrien. The effect of malicious manipulations on prediction market accuracy
625 -- 644Yan Dang, Yulei Zhang, James N. Morgan. Integrating switching costs to information systems adoption: An empirical study on learning management systems
645 -- 667Narasimhaiah Gorla, Ananth Chiravuri, Ravi Chinta. Business-to-business e-commerce adoption: An empirical investigation of business factors
669 -- 697Ting Li, Zongmin Ma. Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML

Volume 19, Issue 2

187 -- 188Ram Ramesh, H. Raghav Rao. Professor Kenneth Arrow and Information Systems Frontiers: In memoriam
189 -- 195Marijn Janssen, David Konopnicki, Jane L. Snowdon, Adegboyega Ojo. Driving public sector innovation using big and open linked data (BOLD)
197 -- 212Yogesh Kumar Dwivedi, Marijn Janssen, Emma L. Slade, Nripendra P. Rana, Vishanth Weerakkody, Jeremy Millard, Jan Hidders, Dhoya Snijders. Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling
213 -- 229Gabriela Viale Pereira, Marie Anne Macadar, Edimara M. Luciano, Maurício Gregianin Testa. Delivering public value through open government data initiatives in a Smart City context
231 -- 251Aaron W. Baur. Harnessing the social web to enhance insights into people's opinions in business, government and public administration
253 -- 266Marcel Rosenberger, Christiane Lehrer, Reinhard Jung. Integrating data from user activities of social networks into public administrations
267 -- 283Bram Klievink, Bart-Jan Romijn, Scott Cunningham, Hans de Bruijn. Big data in the public sector: Uncertainties and readiness
285 -- 300Vishanth Weerakkody, Zahir Irani, Kawal Kapoor, Uthayasankar Sivarajah, Yogesh Kumar Dwivedi. Open data and its usability: an empirical view from the Citizen's perspective
301 -- 319Yiwei Gong. Estimating participants for knowledge-intensive tasks in a network of crowdsourcing marketplaces
321 -- 336Spiros Mouzakitis, Dimitris Papaspyros, Michael Petychakis, Sotiris Koussouris, Anastasios Zafeiropoulos, Eleni Fotopoulou, Lena Farid, Fabrizio Orlandi, Judie Attard, John E. Psarras. Challenges and opportunities in renovating public sector information by enabling linked data and analytics
337 -- 360Fatemeh Ahmadi Zeleti, Adegboyega Ojo. Open data value capability architecture
361 -- 375Siddhartha Menon. The role of civil society groups in improving access to the DC-CAN
377 -- 396Shuyuan Mary Ho, Merrill Warkentin. Leader's dilemma game: An experimental design for cyber insider threat research
397 -- 409Shahla Ghobadi, John Campbell, Stewart Clegg. Pair programming teams and high-quality knowledge sharing: A comparative study of coopetitive reward structures
411 -- 420Jongchang Ahn, Kyungran Ma, Ook Lee, Suaini Sura. Do big data support TV viewing rate forecasting? A case study of a Korean TV drama

Volume 19, Issue 1

1 -- 12Li Chunlin, Layuan Li. Optimal scheduling across public and private clouds in complex hybrid cloud environment
13 -- 30Wenjuan Xu, Peiyu Ou, Weiguo Fan. Antecedents of ERP assimilation and its impact on ERP value: A TOE-based model and empirical test
31 -- 56Dmytro Babik, Rahul Singh, Xia Zhao, Eric W. Ford. What you think and what I think: Studying intersubjectivity in knowledge artifacts evaluation
57 -- 73Venkataraghavan Krishnaswamy, Rangaraja P. Sundarraj. Organizational implications of a comprehensive approach for cloud-storage sourcing
75 -- 89Gang Tian, Jian Wang, Keqing He, Chengai Sun, Yuan Tian. Integrating implicit feedbacks for time-aware web service recommendations
91 -- 107Jelena Lukic, Milos Radenkovic, Marijana Despotovic-Zrakic, Aleksandra Labus, Zorica Bogdanovic. Supply chain intelligence for electricity markets: A smart grid perspective
109 -- 127Nenad Tomasev. Extracting the patterns of truthfulness from political information systems in Serbia
129 -- 148Kevin Miller, Gunjan Mansingh. OptiPres: a distributed mobile agent decision support system for optimal patient drug prescription
149 -- 163Wei-Lun Chang, Chien-Fang Jung. A hybrid approach for personalized service staff recommendation
165 -- 185Gürdal Ertek, Gül Tokdemir, Mete Sevinç, Murat Mustafa Tunç. New knowledge in strategic management through visually mining semantic networks