Journal: ACM Trans. Management Inf. Syst.

Volume 5, Issue 4

0 -- 0G. Alan Wang, Harry Jiannan Wang, Jiexun Li, Alan S. Abrahams, Weiguo Fan. An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q&A Communities
0 -- 0Andrew Partington, Moe Thandar Wynn, Suriadi Suriadi, Chun Ouyang, Jonathan Karnon. Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals
0 -- 0Claudio Di Ciccio, Massimo Mecella. On the Discovery of Declarative Control Flows for Artful Processes
0 -- 0Jie Jiang, Huib Aldewereld, Virginia Dignum, Yao-Hua Tan. Compliance Checking of Organizational Interactions
0 -- 0Jiaqi Yan, Daning Hu, Stephen S. Y. Liao, Huaiqing Wang. Mining Agents' Goals in Agent-Oriented Business Processes
21 -- 0Thushari Silva, Ma Jian, Yang Chen. Process Analytics Approach for R&D Project Selection
22 -- 0Xitong Guo, Sherry X. Sun, Doug Vogel. A Dataflow Perspective for Business Process Integration
25 -- 0Thorben Keller, Frédéric Thiesse, Elgar Fleisch. Classification Models for RFID-Based Real-Time Detection of Process Events in the Supply Chain: An Empirical Study

Volume 5, Issue 3

0 -- 0John Leslie King, Carl P. Simon. Complications with Complexity in Requirements
0 -- 0Matthias Jarke, Kalle Lyytinen. Editorial: "Complexity of Systems Evolution: Requirements Engineering Perspective"
0 -- 0Md. Rashed Iqbal Nekvi, Nazim H. Madhavji. Impediments to Regulatory Compliance of Requirements in Contractual Systems Engineering Projects: A Case Study
0 -- 0Radhika Jain, Lan Cao, Kannan Mohan, Balasubramaniam Ramesh. Situated Boundary Spanning: An Empirical Investigation of Requirements Engineering Practices in Product Family Development
0 -- 0Suranjan Chakraborty, Christoph Rosenkranz, Josh Dehlinger. Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering
11 -- 0Gilbert Fridgen, Julia Klier, Martina Beer, Thomas Wolf. Improving Business Value Assurance in Large-Scale IT Projects - A Quantitative Method Based on Founded Requirements Assessment
17 -- 0Ivan Jureta, Alexander Borgida, Neil A. Ernst, John Mylopoulos. The Requirements Problem for Adaptive Systems

Volume 5, Issue 2

6 -- 0Seymour E. Goodman. Building the Nation's Cyber Security Workforce: Contributions from the CAE Colleges and Universities
7 -- 0Suruchi Deodhar, Keith R. Bisset, Jiangzhuo Chen, Yifei Ma, Madhav V. Marathe. An Interactive, Web-Based High Performance Modeling Environment for Computational Epidemiology
8 -- 0Patty Kostkova, Martin Szomszor, Connie St. Luis. #swineflu: The Use of Twitter as an Early Warning and Risk Communication Tool in the 2009 Swine Flu Pandemic
9 -- 0Chih-Fong Tsai, Zen-Yu Quan. Stock Prediction by Searching for Similarities in Candlestick Charts

Volume 5, Issue 1

1 -- 0Joyce C. Ho, Cheng H. Lee, Joydeep Ghosh. Septic Shock Prediction for Patients with Missing Data
2 -- 0Christopher C. Yang, Haodong Yang, Ling Jiang. Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media
3 -- 0Salah Bouktif, Houari A. Sahraoui, Faheem Ahmed. Predicting Stability of Open-Source Software Systems Using Combination of Bayesian Classifiers
4 -- 0Lihua Huang, Sulin Ba, Xianghua Lu. Building Online Trust in a Culture of Confucianism: The Impact of Process Flexibility and Perceived Control
5 -- 0M. Lisa Yeo, Erik Rolland, Jackie Rees Ulmer, Raymond A. Patterson. Risk Mitigation Decisions for IT Security