Journal: Information Technology and Management

Volume 20, Issue 2

55 -- 71Chuanxi Cai, Shue Mei, Weijun Zhong. Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
73 -- 90Rui Duan, Cuiqing Jiang, Hemant K. Jain, Yong Ding, Deyou Shu. Integrating geographical and temporal influences into location recommendation: a method based on check-ins
91 -- 106Soojung Oh, Young U. Ryu, Hongsuk Yang. Interaction effects between supply chain capabilities and information technology on firm performance