Journal: Journal of Database Management

Volume 31, Issue 4

1 -- 23Derek Colley, Clare Stanier, Md. Asaduzzaman. Investigating the Effects of Object-Relational Impedance Mismatch on the Efficiency of Object-Relational Mapping Frameworks
24 -- 45Mengmeng Shen, Jun Wang 0059, Ou Liu, Haiying Wang. Expert Detection and Recommendation Model With User-Generated Tags in Collaborative Tagging Systems
46 -- 68Arash Saghafi, Yair Wand. A Meta-Analysis of Ontological Guidance and Users' Understanding of Conceptual Models
69 -- 87Louise Harder Fischer, Richard L. Baskerville. Revising the Socio-Technical Perspective for the 21st Century: New Mechanisms at Work

Volume 31, Issue 3

1 -- 13Steven Alter, Dominik Bork. Systems Analysis and Design Toolkit Based on Work System Theory and Its Extensions
14 -- 39Amrita George, Kurt Schmitz, Veda C. Storey. A Framework for Building Mature Business Intelligence and Analytics in Organizations
40 -- 66Lingfei Zou, Shaobo Wei, Weiling Ke, Kwok Kee Wei. Creativity of Participants in Crowdsourcing Communities: The Effects of Promotion Focus and Extrinsic Motivation
67 -- 82Akhilesh Bajaj, Wade Bick. The Rise of NoSQL Systems: Research and Pedagogy

Volume 31, Issue 2

1 -- 20Leigh A. Mutchler, Merrill Warkentin. Experience Matters: The Role of Vicarious Experience in Secure Actions
21 -- 41Canchu Lin, Anand S. Kunnathur, Long Li. The Cultural Foundation of Information Security Behavior: Developing a Cultural Fit Framework for Information Security Behavior Control
42 -- 63Mark L. Gillenson, Thomas F. Stafford, Xihui Paul Zhang, Yao Shi. Use of Qualitative Research to Generate a Function for Finding the Unit Cost of Software Test Cases
64 -- 73Dinesh Batra. Research Challenges and Opportunities in Conducting Quantitative Studies on Large-Scale Agile Methodology
74 -- 87Keng Siau, Weiyu Wang. Artificial Intelligence (AI) Ethics: Ethics of AI and Ethical AI

Volume 31, Issue 1

1 -- 19QingQing Zhou, Ming Jing. Detecting Expressional Anomie in Social Media via Fine-grained Content Mining
20 -- 37M. Asif Naeem, Erum Mehmood, M. G. Abbas Malik, Noreen Jamil. Optimizing Semi-Stream CACHEJOIN for Near-Real- Time Data Warehousing
38 -- 63Hemang Chamakuzhi Subramanian, Suresh Malladi. Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis
64 -- 84Brandon Laughlin, Karthik Sankaranarayanan, Khalil El-Khatib. A Service Architecture Using Machine Learning to Contextualize Anomaly Detection