Abstract is missing.
- A Motivational Thermostat Framework for Enhanced E-Learning SystemsJaeJeung Kim, Youngtae Seok, Dongwon Lee, Howon Lee. 3-10 [doi]
- Anchored Asynchronous Online Discussions: Facilitating Participation and Engagement in a Blended EnvironmentNimer Alrushiedat, Lorne Olfman. 11-20 [doi]
- AskEris-A Many-to-One Communication Platform for Higher EducationSilvia Schacht, Achim Botzenhardt, Alexander Maedche. 21-30 [doi]
- Do Student-Instructor Co-created eLearning Materials Lead to Better Learning Outcomes? Empirical Results from a German Large Scale Course Pilot StudyRené Wegener, Jan Marco Leimeister. 31-40 [doi]
- Engaging Students through Web 2.0 Technologies: Capturing the Long Tail of Student ParticipationNitin Aggarwal, Leslie Jordan Albert, Eric A. Walden, Shruti Kumthekar. 41-47 [doi]
- Evaluating E-Assessment for Exercises that Require Higher-Order Cognitive SkillsTim A. Majchrzak, Claus A. Usener. 48-57 [doi]
- Experiences with Using Assessment Based, Double-Loop Learning to Improve Engineering Student's Design SkillsPaul J. Fortier, Judith Sims-Knight, Benjamin Viall. 58-67 [doi]
- Integrating Blogging and Microblogging to Foster Learning and Social Interaction in Online Learning CommunitiesBrian Thoms. 68-77 [doi]
- iPad in Education: A Case Study of iPad Adoption and Use in a Primary SchoolSarah Henderson, Jeff Yeow. 78-87 [doi]
- Learning to Work in Partially Distributed Teams: The Impact of Team Interaction on Learning OutcomesRosalie J. Ocker, Starr Roxanne Hiltz. 88-97 [doi]
- Play for Performance: Using Computer Word Games to Improve Test-Taking PerformanceAlan R. Dennis, Akshay Bhagwatwar, Randall K. Minas. 98-107 [doi]
- Re-design and Evaluation of an Anchored Discussion SystemEvren Eryilmaz, Terry Ryan, Mary Poplin, Justin Mary. 108-117 [doi]
- Understanding E-Learning System Usage Outcomes in Hybrid CoursesA. K. M. Najmul Islam. 118-127 [doi]
- Cognitive Load in Collaboration-ConvergenceGwendolyn L. Kolfschoten, Frances M. T. Brazier. 129-138 [doi]
- Sparking Creativity: Improving Electronic Brainstorming with Individual Cognitive PrimingAlan R. Dennis, Randall K. Minas, Akshay Bhagwatwar. 139-148 [doi]
- Time Pressure, Cultural Diversity, Psychological Factors, and Information Sharing in Short Duration Virtual TeamsSouren Paul, Fang He. 149-158 [doi]
- Toward Better Solutions: An Analysis of the Ideation Literature in Light of Bounded Ideation TheoryBruce A. Reinig, Robert O. Briggs. 159-168 [doi]
- Abstract Reasoning in Collaborative ModelingIlona Wilmont, Erik Barendsen, Stijn Hoppenbrouwers, Sytse Hengeveld. 170-179 [doi]
- End-User Involvement and Team Factors in Business Process ModelingPeter Rittgen. 180-189 [doi]
- Exploring Collaborative Modeling as Teaching MethodJose J. Gonzalez. 190-196 [doi]
- From Measuring the Quality of Labels in Process Models to a Discourse on Process Model Quality: A Case StudyPeter Fettke, Armella-Lucia Vella, Peter Loos. 197-206 [doi]
- Proposing a Participative Modelling Framework for Discrete Event Simulation StudiesAntuela A. Tako, Kathy Kotiadis. 207-215 [doi]
- A Collaborative Algorithm for Computer-Supported Idea Selection in the Front End of InnovationJana Görs, Graham Horton, Nadine Kempe. 217-226 [doi]
- A Model and Exploratory Field Study on Team CreativityTriparna de Vreede, Imed Boughzala, Gert-Jan de Vreede, Roni Reiter-Palmon. 227-236 [doi]
- An Optimal Algorithm for Raw Idea Selection under UncertaintyNadine Kempe, Graham Horton, Robert Buchholz, Jana Görs. 237-246 [doi]
- Idea Generation in Technology-Supported Teams: A Multilevel Motivational PerspectiveSankara-Subramanian Srinivasan, Likoebe M. Maruping, Lionel P. Robert Jr.. 247-256 [doi]
- Practices to Improve Group Creativity: A Longitudinal Field InvestigationAnn Majchrzak, Philip H. B. More, Jeremiah Johnson. 257-265 [doi]
- The Effects of Role Assignment on the Quality of Creative OutputsMihaela Stan. 266-273 [doi]
- Comparing Business Process and IT Outsourcing Risks-An Exploratory Study in Germany and AustralasiaHeiko Gewald, Anne C. Rouse. 275-284 [doi]
- The Effects of Relationship Characteristics on Task Performance in Collaborative Environments Mediated by Information SystemsJaesong Yang, Ilsang Ko, Hyeyoung Jang, Joonkee Cho. 285-294 [doi]
- The Value Proposition of Captive Offshore Development Centers: Exploring the Role of IT Capabilities and Antecedent FactorsS. Balaji, Donald R. Chand, Gary C. David. 295-304 [doi]
- A Collaboration Maturity Model: Development and Exploratory ApplicationImed Boughzala, Gert-Jan de Vreede. 306-315 [doi]
- An Ontology for ActionCenter-Oriented Collaboration PlatformsAzamatbek Mametjanov, Cuong Nguyen, Douglas Kjeldgaard, Robert O. Briggs. 316-325 [doi]
- A Repeatable Collaboration Process for Exploring Business Process Improvement AlternativesMercy Amiyo, Josephine Nabukenya, Henk G. Sol. 326-335 [doi]
- Collaborative Ontological Design of a Web PortalAnkita Vij, Siddartha Bhattacharyya, Arkalgud Ramaprasad. 336-342 [doi]
- Combining Case Study, Design Science and Action Research Methods for Effective Collaboration Engineering Research EffortsJosephine Nabukenya. 343-352 [doi]
- Constancy and Change in Scientific Collaboration: Coherence and Integrity in Long-Term Ecological Data ProductionMatthew Burton, Steven J. Jackson. 353-362 [doi]
- CoPrA: A Process Analysis Technique to Investigate Collaboration in GroupsIsabella Seeber, Ronald Maier, Barbara Weber. 363-372 [doi]
- Designing for Distributed Scientific Collaboration: A Case Study in an Animal Health LaboratoryJane Li, Christian Müller-Tomfelde, Toni Robertson. 373-381 [doi]
- Dynamic Models for Ideas Number Prediction in BrainstormingHassan Ait Haddou, Guy Camilleri, Pascale Zaraté. 382-391 [doi]
- Exploring the Use of Stories in Patterns of CollaborationTanja Buttler, Stephan Lukosch. 392-401 [doi]
- Organizational Factors Inhibiting the Design of Effective Emergency Management Information Systems (EMIS)Murray Turoff. 402-411 [doi]
- The Seven Layer Model of Collaboration: An Exploratory Study of Process Identification and ImprovementAaron Read, Brad Hullsiek, Robert O. Briggs. 412-420 [doi]
- Using Collaborative Engineering to Inform Collaboration EngineeringLynne P. Cooper. 421-430 [doi]
- Decision 2.0: An Exploratory Case StudyAhmed Elragal, Ola El-Telbany. 432-443 [doi]
- Functional Diversity and Its Impact on Distributed Groups: An Exploratory StudyAnil Aggarwal. 444-453 [doi]
- Producing a Questionnaire for a User Survey on Anshin with Information Security for Users without Technical KnowledgeDai Nishioka, Yuko Murayama, Yasuhiro Fujihara. 454-463 [doi]
- Antecedents of Transactive Memory Systems in Virtual Teams-The Role of Communication, Culture, and Team SizeBettina C. Riedl, Julia V. Gallenkamp, Arnold Picot, Isabell M. Welpe. 465-474 [doi]
- Exploring the State of Discipline on the Formation of Swift Trust within Global Virtual TeamsShafiz Affendi Mohd. Yusof, Norhayati Zakaria. 475-482 [doi]
- Media Choices over Time in Partially Distributed TeamsLinda Plotnick, Starr Roxanne Hiltz, Rosalie J. Ocker. 483-492 [doi]
- SNS Cyberinfrastructure and Incubating Global Virtual TeamsDhiraj Murthy. 493-502 [doi]
- A Case Study of Remote Interdisciplinary Designing through Video PrototypesCristian Bogdan, Dominik Ertl, Jürgen Falb, Anders Green, Hermann Kaindl. 504-513 [doi]
- An Empirical Study on Emotions, Knowledge Management Processes, and Performance within Integrated Business Process TeamsOlivier Caya, Eric Brunelle, Pierre-Majorique Léger, Tristan Grebot. 514-524 [doi]
- Designing Noticeable Bricklets by Tracking Users' Eye MovementsSoussan Djamasbi, Marisa Siegel, Tom Tullis. 525-532 [doi]
- Distorting Social Feedback in Visualizations of ConversationTony Bergstrom, Karrie Karahalios. 533-542 [doi]
- Embodied Agents and the Predictive Elaboration Model of Persuasion-The Ability to Tailor Embodied Agents to Users' Need for CognitionMatthew D. Pickard, Jeffrey L. Jenkins, Jay F. Nunamaker Jr.. 543-552 [doi]
- Fine-Tuning Group Collaboration Environments: How Differences in General Causality Orientation and Performance Targets Shape Interaction and PerformanceXuequn Wang, Christoph Schneider, Joseph S. Valacich. 553-561 [doi]
- Neurophysiological Correlates of Information Systems Commonly Used Self-Reported Measures: A Multitrait Multimethod StudyAna Ortiz de Guinea, Ryad Titah, Pierre-Majorique Léger, Thomas Micheneau. 562-571 [doi]
- Not All Created Equal: Individual-Technology Fit of Brain-Computer InterfacesAdriane B. Randolph. 572-578 [doi]
- Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal DynamicsAaron C. Elkins, Douglas C. Derrick, Judee K. Burgoon, Jay F. Nunamaker Jr.. 579-588 [doi]
- Structuring for Subjective Experience: The Contextual Scenario FrameworkEric Swanson, Keiichi Sato. 589-598 [doi]
- A Multiattribute Auction Procedure and Its ImplementationGregory E. Kersten, Pierpaolo Pontrandolfo, Shikui Wu. 600-609 [doi]
- Integration of Behavioral and Analytic Decision Support in Electronic NegotiationsRonny Mitterhofer, Daniel Druckman, Michael Filzmoser, Johannes Gettinger, Mareike Schoop, Sabine T. Koeszegi. 610-617 [doi]
- Identifying Culture and Leveraging Cultural Differences for Negotiation AgentsBrian D. Ziebart, Miroslav Dudík, Geoffrey J. Gordon, Katia P. Sycara, Wendi L. Adair, Jeanne Brett. 618-627 [doi]
- Modeling Power Distance and Individualism/Collectivism in Negotiation Team DynamicsVíctor Sánchez-Anguix, Tinglong Dai, Zhaleh Semnani-Azad, Katia P. Sycara, Vicente J. Botti. 628-637 [doi]
- Multi-strategy Selection Supported Automated Negotiation System Based on BDI AgentMukun Cao. 638-647 [doi]
- Self-Coordinated Defense Mechanisms against Cyberhate: An Analysis of Postings Related to the 2010 Haiti Earthquake on FacebookRajib Subba, Tung Bui. 648-657 [doi]
- Using Ontologies and Soft Systems Methodology to Provide Multi-user Support in Problem StructuringCédric Gaspoz, Yair Wand. 658-667 [doi]
- Collaboration in Context: From the Desktop to the CloudRaju Vegesna. 669-673 [doi]
- Putting the Users in Charge: A Collaborative, User Composable Interface for NASA's Mission ControlJay P. Trimble, Tom Dayton, Madelyn Quinol. 674-683 [doi]
- Shareable Technology Mash-Up for Situation Awareness in Catastrophic EventsBabajide Osatuyi, Dali Ding, Michael Chumer. 684-692 [doi]
- The Lively PartsBin-A Cloud-Based Repository for Collaborative Development of Active Web ContentJens Lincke, Robert Krahn, Dan Ingalls, Marko Röder, Robert Hirschfeld. 693-701 [doi]
- User-Driven Collaboration for NASA Mission ControlChristopher Webster, Nija Shi, Sue Blumenberg, Irene Smith, Sylvia Lin, Benson Hong, Adam Crume, Peter Tran. 702-711 [doi]
- Company Tactics for Customer Socialization with Social Media Technologies: Finnair's Rethink Quality and Quality Hunters InitiativesSirkka L. Jarvenpaa, Virpi Kristiina Tuunainen. 713-722 [doi]
- Determining the Value of a Virtual Community to Its ParticipantsLili Liu, Christian Wagner, Huaping Chen. 723-732 [doi]
- Peer-Based Recommendations in Online B2C E-Commerce: Comparing Collaborative Personalization and Social Network-Based PersonalizationSeth Li, Elena Karahanna. 733-742 [doi]
- Information Sharing in Online Dyadic Exchange: A Relational Dialectic PerspectiveChun Fung (Ben) Choi, Zhenhui Jiang, Eugene Yap. 743-752 [doi]
- Understanding Continuous Use of Virtual Communities: A Comparison of Four Theoretical PerspectivesJuyeon Ham, Jihun Park, Jae-Nam Lee, Jae Yun Moon. 753-762 [doi]
- Following Trendsetters: Collective Decisions in Online Social NetworksYasuaki Sakamoto. 764-773 [doi]
- Exploring the Relationship between Research Impact and Collaborations for Information ScienceAlireza Abbasi, Liaquat Hossain, Christine Owen. 774-780 [doi]
- Knowledge and Social Networks in Yahoo! AnswersAmit Rechavi, Sheizaf Rafaeli. 781-789 [doi]
- Network Structure or Tie Content? The Impact of Managerial Networks on Career Outcomes and InfluenceNicoline Scheidegger. 790-799 [doi]
- Provider-Independent Online Social Identity Management-Enhancing Privacy Consistently Across Multiple Social Networking SitesMoritz Riesner, Günther Pernul. 800-809 [doi]
- Self-Organized Service Management in Social SystemsElena del Val Noguera, Miguel Rebollo, Vicente J. Botti. 810-817 [doi]
- Social Media and Warning Response Impacts in Extreme Events: Results from a Naturally Occurring ExperimentYulia Tyshchuk, Cindy Hui, Martha Grabowski, William A. Wallace. 818-827 [doi]
- A Member - Virtual Team Fit Theory: Group Conscientiousness Effects on PerformanceYi (Jenny) Zhang, Ofir Turel. 829-838 [doi]
- Communicator Trust across Media: A Comparison of Audio Conferencing, Video Conferencing, and a 3D Virtual EnvironmentNicholas S. Lockwood, Anne P. Massey. 839-848 [doi]
- Discipline Yourself Before Life Disciplines You: Deficient Self-Regulation and Mobile Phone Unregulated UseAmr A. Soror, Zachary R. Steelman, Moez Limayem. 849-858 [doi]
- Every Post You Make, Every Pic You Take, I'll Be Watching You: Behind Social Spheres on FacebookBen L. Marder, Adam N. Joinson, Avi Shankar. 859-868 [doi]
- Exploring the Effects of Personality on Collaboration Technology TransitionTriparna de Vreede, Gert-Jan de Vreede, Gregory Ashley, Roni Reiter-Palmon. 869-878 [doi]
- Motivated Information Processing in Groups: A Design of a Computational ModelTaehyon Choi. 879-888 [doi]
- Revisiting Social Influence in the Ubiquitous Computing EraJay Zeal, Stephen P. Smith, Rens Scheepers. 889-898 [doi]
- Stereotype and Perception Change in Intercultural NegotiationZhaleh Semnani-Azad, Katia P. Sycara, Michael Lewis, Wendi L. Adair. 899-908 [doi]
- Building a Knowledge Base for Health Information Exchange between Emergency Departments and Poison Control CentersMollie R. Cummins, Barbara I. Crouch, Per H. Gesteland. 910-914 [doi]
- Complexity of Collaborative Work in Residential Aged Care Facilities: An Analysis of Information Exchange for Medication ManagementAmina Tariq, Andrew Georgiou, Johanna I. Westbrook. 915-924 [doi]
- Delivery of Multilingual mHealth Service for Control of TB/HIV in Developing CountriesAishwarya Bakshi, Junhua Li, Pradeep Ray, Padmanesan Narasimhan, Kasturi Bakshi. 925-931 [doi]
- Distributed Cognition in Geriatric TelepsychiatrySean W. Hansen, Janis L. Gogan, Ryan J. Baxter. 932-941 [doi]
- Improving Colon Cancer Screening Levels Using Self-Serve Technologies: The Case of the Incomplete AppointmentStacy Kozak, Chad Saunders. 942-951 [doi]
- Market Engineering for Electronic Health ServicesSebastian Dünnebeil, Ali Sunyaev, Jan Marco Leimeister, Helmut Krcmar. 952-961 [doi]
- The Role of Healthcare System of Systems and Collaborative Technologies in Providing Superior Healthcare Delivery to Native American PatientsNilmini Wickramasinghe, Suresh Chalasani, Sridevi Koritala. 962-971 [doi]
- Collaboration in Virtual Worlds: The Role of the FacilitatorBenjamin Wigert, Gert-Jan de Vreede, Imed Boughzala, Ikram Bououd. 973-982 [doi]
- Fostering Group Collaboration in Virtual WorldsKristel M. de Nobrega, Anne-Françoise Rutkowski. 983-992 [doi]
- Social Virtual Worlds' Success Factors: Four Studies' Insights for the Tourism Supply and Demand SideBrigitte Stangl, Margit Kastner, Felicitas Polsterer. 993-1002 [doi]
- Virtual Worlds as Collaborative Innovation and Knowledge PlatformJohann Füller, Julia Müller, Katja Hutter, Kurt Matzler, Julia Hautz. 1003-1012 [doi]
- Virtual Worlds as Environments for Virtual Customer IntegrationStefan Stieglitz, Tobias Brockmann. 1013-1020 [doi]
- A New Ensemble Model for Efficient Churn Prediction in Mobile TelecommunicationNamhyoung Kim, Jaewook Lee, Kyu-Hwan Jung, Yong Seog Kim. 1023-1029 [doi]
- An Empirical Study of Software Project Managers Using a Case-Based ReasonerCarolyn Mair, Miriam Martincova, Martin J. Shepperd. 1030-1039 [doi]
- Automated News Reading: Stock Price Prediction Based on Financial News Using Context-Specific FeaturesMichael Hagenau, Michael Liebmann, Markus Hedwig, Dirk Neumann. 1040-1049 [doi]
- "Boom" or "Ruin"-Does It Make a Difference? Using Text Mining and Sentiment Analysis to Support Intraday Investment DecisionsMichael Siering. 1050-1059 [doi]
- Inference of Missing ICD 9 Codes Using Text Mining and Nearest Neighbor TechniquesMadhav Erraguntla, Belita Gopal, Satheesh Ramachandran, Richard J. Mayer. 1060-1069 [doi]
- Mixed Graph of Terms: Beyond the Bags of Words Representation of a TextMassimo De Santo, Paolo Napoletano, Antonio Pietrosanto, Consolatina Liguori, Vincenzo Paciello, Francesco Polese. 1070-1079 [doi]
- Predicting the Risk of Low Back Disorders due to Manual Handling TasksJozef Zurada. 1080-1088 [doi]
- Preparation of Complex Landslide Simulation Results with Clustering Approaches for Decision Support and Early WarningEva Nuhn, Erik Kropat, Wolfgang Reinhardt, Stefan Pickl. 1089-1096 [doi]
- Studying Active Learning in the Cost-Sensitive FrameworkVictor S. Sheng. 1097-1106 [doi]
- Who Are We? Mining Institutional Identities Using n-gramsDaniel S. Soper, Ofir Turel. 1107-1116 [doi]
- A Fuzzy Logic Multi-criteria Decision Framework for Selecting IT Service ProvidersAmir Karami, Zhiling Guo. 1118-1127 [doi]
- Probabilistic Modeling of State Transitions on the Self-Organizing Map: Some Temporal Financial ApplicationsPeter Sarlin, Zhiyuan Yao, Tomas Eklund. 1128-1137 [doi]
- Rough Clustering Using an Evolutionary AlgorithmKevin E. Voges, Nigel K. L. Pope. 1138-1145 [doi]
- Towards Prioritizing IT Solution Developments through System Dynamics and Fuzzy LogicZuzana Kristekova, Tobias Riasanow, Michael Schermann, Helmut Krcmar. 1146-1155 [doi]
- Considering Production Limits in Greenhouse Gas Emission Trading Using the Data Envelopment Analysis ApproachBo Hsiao, Ming-Miin Yu, Ching-Chin Chern, Li-Chen Chou. 1157-1166 [doi]
- Developing a Risk Management DSS for Supporting Sustainable Vietnamese Catfish FarmingTru Cong Le, France Cheong, Christopher Cheong. 1167-1176 [doi]
- Evaluating the Quality of Web Based Sustainability Reports: A Multi-method FrameworkMichael Freundlieb, Frank Teuteberg. 1177-1186 [doi]
- Ontologies and Decision Support for Failure Mitigation in Intelligent Water Distribution NetworksJing Lin, Sahra Sedigh, Ali R. Hurson. 1187-1196 [doi]
- Spatial Decision Support for Assessing Impacts of Atmospheric Sulfur Deposition on Aquatic Ecosystems in the Southern Appalachian RegionKeith M. Reynolds, Paul F. Hessburg, Timothy Sullivan, Nicholas Povak, Todd McDonnell, Bernard Cosby, William Jackson. 1197-1206 [doi]
- Toward Green IS Adoption Behaviors: A Self-Determination PerspectiveYulia Wati, Chulmo Koo. 1207-1216 [doi]
- Transport Coopetition for Environmental Sustainability: Guiding Vertical Standard DesignRikard Lindgren, Jens Holgersson. 1217-1226 [doi]
- Web-Based Support of Crop Selection for Climate AdaptationDaryl H. Hepting, Timothy Maciag, Harvey Hill. 1227-1236 [doi]
- A Multi-item Fuzzy Economic Production Quantity Problem with Limited Storage SpaceKaj-Mikael Björk, József Mezei, Henrik Nyman. 1238-1246 [doi]
- A New Approach for Simulation and Modeling of Autonomous Production ProcessesSander Lass, Hanna Theuer, Norbert Gronau. 1247-1256 [doi]
- Exploring Contracts with Options in Loyalty Reward Programs Supply ChainYuheng Cao, Aaron Luntala Nsakanda, Moustapha Diaby, Shaobo Ji, Michael J. Hine. 1257-1266 [doi]
- Integrated Aircraft Scheduling Problem: An Auto-Adapting Algorithm to Find Robust Aircraft Assignments for Large Flight PlansTorsten Reiners, Julia Pahl, Michael Maroszek, Cornelius Rettig. 1267-1276 [doi]
- Logistics for Large-Scale Disaster Response: Achievements and ChallengesYiping Jiang, Yufei Yuan, Kai Huang, Lindu Zhao. 1277-1285 [doi]
- On the Value of Information for Tactical Decision Support in Stockout ManagementSebastian Langton, Martin Josef Geiger. 1286-1295 [doi]
- Scheduling Logistics Activities in Staged Queues with Sequence-Dependent Changeover and Processing TimesL. Douglas Smith, Dirk Christian Mattfeld, Jan Fabian Ehmke, Jian Li. 1296-1305 [doi]
- Slow Steaming in Container ShippingJasper Meyer, Robert Stahlbock, Stefan Voss. 1306-1314 [doi]
- Vehicle Routing with Driver Learning for Real World CEP ProblemsMarcel Kunkel, Michael Schwind. 1315-1322 [doi]
- Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems CasesDavid Tilson, Carsten Sørensen, Kalle Lyytinen. 1324-1333 [doi]
- Handheld Computing from a Designer's Perspective: A 10-Year Review-2001-2010Bo Andersson. 1334-1343 [doi]
- Mobile Cloud Convergence in GaaS: A Business Model PropositionChristina Moreno, Nicolas Tizon, Marius Preda. 1344-1352 [doi]
- Mobile Converged Rich Communication Services: A Conjoint AnalysisShahrokh Nikou, Harry Bouwman, Mark de Reuver. 1353-1362 [doi]
- Mobile Enterprise Applications-Current State and Future DirectionsAndrea Giessmann, Katarina Stanoevska-Slabeva, Bastiaan de Visser. 1363-1372 [doi]
- Segmentation Bases in the Mobile Services Market: Attitudes In, Demographics OutAnna Sell, Pirkko Walden. 1373-1382 [doi]
- The Design of the Mobile Service: Fit between Mobility and Customer VariabilityHsin-Lu Chang, Jia-Ren Lin, Kai Wang, Carol Hsu, Jeffrey C. F. Tai. 1383-1392 [doi]
- Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and TheftZhiling Tu, Yufei Yuan. 1393-1402 [doi]
- Veterinarian Work, Enhanced by Mobile Technology-An Empirical StudySonja Leskinen. 1403-1412 [doi]
- An Integrated Decision Support Model to Assess Reviewers for Research Project SelectionWei Xu, Wei Du, Jian Ma, Wei Wang, Qian Liu. 1414-1423 [doi]
- Consumer Decision Making for Residential MortgagesSudeb Mitra, Steven Walczak. 1424-1433 [doi]
- Data Quality Metadata and Decision MakingG. Shankaranarayanan, Bin Zhu. 1434-1443 [doi]
- Evaluation of Regression Splines: A Multi-criteria Decision Analysis ApproachKweku-Muata Osei-Bryson. 1444-1451 [doi]
- Global Optimization Methods for Assigning Collaborators to Multiple Problems Using Genetic AlgorithmGunwoo Kim, Keunho Choi, Yongmoo Suh. 1452-1460 [doi]
- An Open Source Approach for a Military Situational Awareness SystemAlexander J. Loechel, Goran Mihelcic, Stefan Pickl. 1462-1471 [doi]
- GINA: System Interoperability for Enabling Smart Mobile System Services in Network Decision Support SystemsDaniel R. Dolk, Thomas Anderson, Frank Busalacchi, David Tinsley. 1472-1481 [doi]
- Middleware for Mobile Social Networks: A SurveyAhmed Karam, Nader Mohamed. 1482-1490 [doi]
- Decision Support for Management of Agents' Knowledge and Skills with Job Rotation in Service-Oriented OrganizationKotaro Ohori, Noriyuki Kobayashi, Akihiko Obata, Atsuki Takahashi, Shingo Takahashi. 1492-1501 [doi]
- Devising a Method for Developing Knowledge-Intense, Person-Oriented Services-Results from Early EvaluationPhilipp Menschner, Jan Marco Leimeister. 1502-1511 [doi]
- Efficient QoS Aggregation in Service Value NetworksSteffen Haak, Benjamin Blau. 1512-1521 [doi]
- Service Productivity Management-Status Quo and Directions for the Design of Conceptual Modeling GrammarsJörg Becker, Daniel Beverungen, Ralf Knackstedt, Hans Peter Rauer, Daniel Sigge. 1522-1531 [doi]
- The Effects of Service Orientation, Technology Orientation and Open Innovation on the Performance of Software-intensive Service BusinessesRisto Rajala, Mika Westerlund. 1532-1541 [doi]
- Understanding the Influences of Consumers' Mood States Induced by Web Page Content on Advertisement Effectiveness to Improve Internet Advertising ServicesShiu-li Huang, Szu-Chen Chen. 1542-1551 [doi]
- A Decision Framework for Cloud ComputingStephen H. Kaisler, William H. Money, Stephen J. Cohen. 1553-1562 [doi]
- Costing of Cloud Computing Services: A Total Cost of Ownership ApproachBenedikt Martens, Marc Walterbusch, Frank Teuteberg. 1563-1572 [doi]
- Privacy and Value Co-creation for IT-Enabled Service Systems: Cui Bono?Ellen Chan, Robert R. Harmon, Haluk Demirkan. 1573-1582 [doi]
- Revenue Management for Cloud Providers-A Policy-Based Approach under Stochastic DemandTim Püschel, Fabian Putzke, Dirk Neumann. 1583-1592 [doi]
- Technology Acceptance of Cloud Computing: Empirical Evidence from German IT DepartmentsNicky Opitz, Tobias F. Langkau, Nils-Holger Schmidt, Lutz M. Kolbe. 1593-1602 [doi]
- Effects of "Advanced Search" on User Performance and Search Efforts: A Case Study with Three Digital LibrariesXiangmin Zhang, Yuelin Li. 1605-1614 [doi]
- Finding Problems: When Digital Library Users Act as Usability EvaluatorsMichael Khoo, Diana S. Kusunoki, Craig M. MacDonald. 1615-1624 [doi]
- 'Knee-Deep in the Data': Practical Problems in Applying the OAIS Reference Model to the Preservation of Computer GamesJerome McDonough. 1625-1634 [doi]
- Authorship and Documentary Boundary ObjectsIsto Huvila. 1636-1645 [doi]
- Digital Images of Medieval Music Documents: Transforming Research Processes and Knowledge Production in MusicologyGrace Eden, Marina Jirotka. 1646-1655 [doi]
- Institutional Ethnography: Mapping Out Textual Mediation and Ruling Relations in Information Systems ResearchAlain Ross, Chad Saunders. 1656-1665 [doi]
- The Use of Microblogging for Field-Based Scientific ResearchAlberto Pepe, Matthew S. Mayernik. 1666-1675 [doi]
- Appropriate Interface Designs for Mobile End-User Devices-Up Close and Personalized Executive Information Systems as an ExampleJörg H. Mayer, Tim Weitzel. 1677-1686 [doi]
- Building Support for Web Information Gathering TasksAnwar Alhenshiri, Carolyn R. Watters, Michael A. Shepherd, Jack Duffy. 1687-1696 [doi]
- Characterizing Queries in Different Search TasksJeonghyun Kim, Ahmet Can. 1697-1706 [doi]
- Cobre: A Comparative Book Reader for Los Primeros LibrosBenjamin Liles, James Creel, Alexey Maslov, Steven Nuernberg, Anton duPlessis, Holly Mercer, Mark McFarland, John J. Leggett. 1707-1716 [doi]
- Determinants of Information Channel Choice: The Impact of Task Complexity and Dispositional Character TraitsErik Hemmer, Armin Heinzl. 1717-1726 [doi]
- Determining Dimensions of Social Websites: Insights through Genre TheoryMohini Singh, Ray Hackney, Yogesh Kumar Dwivedi, Konrad J. Peszynski. 1728-1736 [doi]
- Perceptions of Connectedness: Public Access Computing and Social Inclusion in ColombiaLuis Fernando Baron-Porras, Ricardo Gomez. 1737-1746 [doi]
- The Missing Link: Intention to Produce Online Content Accessible to People with Disabilities by Non-professionalsKarine Nahon, Izak Benbasat, Camille Grange. 1747-1757 [doi]
- An Adaptive Recommendation System in Social MediaChuan Hu, Chen Zhang, Tiejun Wang, Qing Li. 1759-1767 [doi]
- An Investigation into the Problematic Use of FacebookZach W. Y. Lee, Christy M. K. Cheung, Dimple R. Thadani. 1768-1776 [doi]
- Building Social Decision Support Mechanisms with Friend NetworksYung-Ming Li, Yi-Lin Lee. 1777-1784 [doi]
- Can We Predict Political Poll Results by Using Blog Entries?Manabu Okumura, Tetsuya Motegi, Tetsuro Kobayashi, Keizo Oyama, Takahisa Suzuki. 1785-1789 [doi]
- Geographical Bias on Social Media and Geo-local Contents System with Mobile DevicesKazunari Ishida. 1790-1796 [doi]
- Hedonic and Utilitarian Search for Electronic Word-of-MouthEssi Pöyry, Petri Parvinen, Jari Salo, Hedon Blakaj. 1797-1806 [doi]
- Relationship between Online Word-of-Mouth Communication and Consumer BehaviorIsamu Okada. 1807-1813 [doi]
- The Effects of Social Media on E-Commerce: A Perspective of Social Impact TheoryKee-Young Kwahk, Xi Ge. 1814-1823 [doi]
- The Role of Social Interaction Filter and Visualization in Casual BrowsingIndratmo, Julita Vassileva. 1824-1833 [doi]
- A Focus + Context Technique for Visualizing a Document CollectionDustin Dunsmuir, Eric Lee, Chris D. Shaw, Maureen C. Stone, Robert F. Woodbury, John Dill. 1835-1844 [doi]
- A Work-Centered Visual Analytics Model to Support Engineering Design with Interactive Visualization and Data-MiningXin Yan, Mu Qiao, Jia Li, Timothy W. Simpson, Gary Stump, Xiaolong (Luke) Zhang. 1845-1854 [doi]
- Applied Visual Analytics for Exploring the National Health and Nutrition Examination SurveySilvia Oliveros Torres, Heather A. Eicher-Miller, Carol J. Boushey, David S. Ebert, Ross Maciejewski. 1855-1863 [doi]
- The Whole Story: Building the Complete History of a PlaceWilliam Ribarsky, Eric Sauda, Zachary Wartell, Jeffery Balmer. 1864-1873 [doi]
- A Nodal Capacity Market to Assure Resource AdequacyAleksandr Rudkevich, Anatoly I. Lazebnik, Igor S. Sorokin. 1876-1887 [doi]
- A Revenue Management Approach for Efficient Electric Vehicle Charging CoordinationChristoph M. Flath, Sebastian Gottwalt, Jens P. Ilg. 1888-1896 [doi]
- Evaluating Wind-Following and Ecosystem Services for Hydroelectric Dams in PJMAlisha Fernandez, Seth Blumsack, Patrick Reed. 1897-1906 [doi]
- Impacts of Malicious Data on Real-Time Price of Electricity Market OperationsLiyan Jia, Robert J. Thomas, Lang Tong. 1907-1914 [doi]
- Packaging Energy and Reserves Bids through Risk Penalties for Enhanced Reliability in Co-optimized MarketsMichael Roytman, Uday V. Shanbhag, Judith B. Cardell, C. Lindsay Anderson. 1915-1922 [doi]
- Planning, Markets and Investment in the Electric Supply IndustryRichard E. Schuler. 1923-1930 [doi]
- Selling Random WindEilyan Bitar, Kameshwar Poolla, Pramod P. Khargonekar, Ram Rajagopal, Pravin Varaiya, Felix F. Wu. 1931-1937 [doi]
- The Manufacture of Potable Water: Case Analyses of Electric System AlternativesRichard D. Tabors, Siddarth Nagendraprasad, Ayoob Hussain, Mounir Ayntrazi, Jonathan A. Brant. 1938-1947 [doi]
- A Local Market Model for Urban Residential Microgrids with Distributed Energy ResourcesAquil Jalia, Nicholas Honeth, Claes Sandels, Lars Nordström. 1949-1958 [doi]
- Development and Validation of Aggregated Models for Thermostatic Controlled Loads with Demand ResponseKaranjit Kalsi, Marcelo Elizondo, Jason Fuller, Shuai Lu, David Chassin. 1959-1966 [doi]
- Integrated Smart Grid Hierarchical ControlA. P. Sakis Meliopoulos, George J. Cokkinides, Renke Huang, Evangelos Farantatos. 1967-1976 [doi]
- Integration of Photovoltaic Distributed Generation in the Power Distribution GridMiroslav Begovic, Insu Kim, Damir Novosel, Julio Romero Aguero, Ajeet Rohatgi. 1977-1986 [doi]
- R&D Requirements for Integration of Wind GenerationJ. Charles Smith, Mark O'Malley, Dale Osborn, Richard Piwko, Robert J. Thomas. 1987-1996 [doi]
- Smart Integration of Variable and Intermittent RenewablesJay Apt, Emily Fertig, Warren Katzenstein. 1997-2001 [doi]
- State Estimation and Control of Heterogeneous Thermostatically Controlled Loads for Load FollowingJohanna L. Mathieu, Duncan S. Callaway. 2002-2011 [doi]
- The Demand Response Spinning Reserve Demonstration-Measuring the Speed and Magnitude of Aggregated Demand ResponseJoseph H. Eto, Janine Nelson-Hoffman, Eric Parker, Clark Bernier, Paul Young, Dave Sheehan, John Kueck, Brendan J. Kirby. 2012-2019 [doi]
- The Impact of Wind Energy on Generator Dispatch Profiles and Carbon Dioxide ProductionC. Lindsay Anderson, Judith B. Cardell. 2020-2026 [doi]
- Toward Distributed Contingency Screening Using Line Flow Calculators and Dynamic Line Rating Units (DLRs)Marija D. Ilic, Andrew Hsu. 2027-2035 [doi]
- Combating Unauthorized Load Signal Analysis with Targeted Event MaskingThomas D. Nicol, David M. Nicol. 2037-2043 [doi]
- Determining the Vulnerabilities of the Power Transmission SystemBenjamin A. Carreras, David E. Newman, Ian Dobson. 2044-2053 [doi]
- Electromechanical Wave Green's Function Estimation from Ambient Electrical Grid Frequency NoiseScott Backhaus, Yilu Liu. 2054-2061 [doi]
- Investigation of Phase Angle Differences Using Statistical Analysis of Real World State Estimator DataThomas A. Ferryman, Brett G. Amidan. 2062-2071 [doi]
- Recommended Approach to a NASPInet ArchitecturePaul T. Myrda, Jeffrey Taft, Paul Donner. 2072-2081 [doi]
- Risk Metrics for Dynamic Complex Infrastructure Systems Such as the Power Transmission GridDavid E. Newman, Benjamin A. Carreras, Naga S. Degala, Ian Dobson. 2082-2090 [doi]
- Successes and Challenges for Synchrophasor Technology: An Update from the North American SynchroPhasor InitiativeAlison Silverstein, Jeffery E. Dagle. 2091-2095 [doi]
- The Fundamental Concept of Unified Generalized Model and Data Representation for New Applications in the Future GridMladen Kezunovic, Santiago Grijalva, Papiya Dutta, Ayusman Roy. 2096-2103 [doi]
- Topology Perturbation for Detecting Malicious Data InjectionKate L. Morrow, Erich Heine, Katherine M. Rogers, Rakeshbabu Bobba, Thomas J. Overbye. 2104-2113 [doi]
- A Markov-Transition Model for Cascading Failures in Power GridsZhifang Wang, Anna Scaglione, Robert J. Thomas. 2115-2124 [doi]
- A Multirate Approach for Time Domain Simulation of Very Large Power SystemsBertrand Haut, Valeriu Savcenco, Patrick Panciatici. 2125-2132 [doi]
- Api-do: Tools for Exploring the Wireless Attack Surface in Smart MetersTravis Goodspeed, Sergey Bratus, Ricky Melgares, Ryan Speers, Sean W. Smith. 2133-2140 [doi]
- Computational Challenges for Power System OperationYousu Chen, Zhenyu Huang, Yan Liu, M. J. Rice, Shuangshuang Jin. 2141-2150 [doi]
- Evaluating Multicast Message Authentication Protocols for Use in Wide Area Power Grid Data Delivery ServicesCarl H. Hauser, Thanigainathan Manivannan, David E. Bakken. 2151-2158 [doi]
- Understanding Bulk Power Reliability: The Importance of Good Data and a Critical Review of Existing SourcesEmily Fisher, Joseph H. Eto, Kristina Hamachi LaCommare. 2159-2168 [doi]
- Verification and Protection of Confidentiality in an Advanced Smart GridBruce M. McMillin, Ravi Akella. 2169-2175 [doi]
- A Reference Guide to Cloud Computing Dimensions: Infrastructure as a Service Classification FrameworkJonas Repschläger, Stefan Wind, Rüdiger Zarnekow, Klaus Turowski. 2178-2188 [doi]
- Semantic MDA for E-Government Service DevelopmentPeter Salhofer, Bernd Stadlhofer. 2189-2198 [doi]
- Understanding Interoperable Systems: Challenges for the Maintenance of SOA ApplicationsLaura J. White, Norman Wilde, Thomas Reichherzer, Eman El-Sheikh, George Goehring, Arthur B. Baskin, Ben Hartmann, Mircea Manea. 2199-2206 [doi]
- IT Business Cases in Local Government: An Action Research StudyPeter Axel Nielsen, John Stouby Persson. 2208-2217 [doi]
- Shared Services as a Collaboration Strategy and Arrangement in Public Service NetworksMarijn Janssen, Muhammad Mustafa Kamal, Vishanth Weerakkody, Anton Joha. 2218-2227 [doi]
- A Dynamic-Capabilities View of Local Electronic Government: Lessons from Two Successful CasesLuis F. Luna-Reyes, José Ramón Gil-García, F. Ramirez-Hernandez. 2229-2238 [doi]
- Applying Extending Structuration Theory: A Study of an IT-Enabled Budget Reform in the Context of Interdisciplinary CollaborationGabriel Puron Cid. 2239-2248 [doi]
- Boundary Objects, Agents, and Organizations: Lessons from E-Document System Development in ThailandRadaphat Chongthammakun, Steven J. Jackson. 2249-2258 [doi]
- Building the Academic Community of E-Government Research on Cross-Boundary Information Integration and SharingDjoko Sigit Sayogo, Jaehee Jong, Taewoo Nam, Mohammed A. Gharawi. 2259-2268 [doi]
- Conceptualizing Electronic Governance EducationTomasz Janowski, Elsa Estevez, Adegboyega K. Ojo. 2269-2278 [doi]
- Understanding and Comparing E-Campaigning Utilisation in the 2008 New Zealand General ElectionHugo Gong, Miriam Lips, Mary Tate. 2279-2288 [doi]
- Understanding Smart Cities: An Integrative FrameworkHafedh Chourabi, Taewoo Nam, Shawn Walker, José Ramón Gil-García, Sehl Mellouli, Karine Nahon, Theresa A. Pardo, Hans Jochen Scholl. 2289-2297 [doi]
- Governing the Social Network: How U.S. Federal Department and Agency Records Management Policies Are Addressing Social Media ContentChad Doran. 2299-2308 [doi]
- The Legal Perspective on Business to Government Reporting - A Conceptual Modeling Approach and Its Application in the Financial SectorRalf Knackstedt, Mathias Eggert, Stefan Fleischer. 2309-2318 [doi]
- The Web Accessibility Crisis of the Korea's Electronic Government: Fatal Consequences of the Digital Signature Law and Public Key CertificateHun Myoung Park. 2319-2328 [doi]
- A Grassroots Cyber Security Program to Protect the NationGregory B. White. 2330-2337 [doi]
- A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control SystemsThomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass. 2338-2345 [doi]
- ICT-Enabled City Government Field Operations: Resiliency During Extreme EventsHans Jochen Scholl, Beth J. Patin, Akemi Takeoka Chatfield. 2346-2356 [doi]
- Seeing the Real World: Sharing Protected Data in Real TimeJohn R. James, Frank Mabry, Kevin Huggins. 2357-2365 [doi]
- The Influences of Social Networks on Phishing VulnerabilityKathryn Coronges, Ronald Dodge, Cort Mukina, Zachary Radwick, Joseph Shevchik, Ericka Rovira. 2366-2373 [doi]
- How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic ModelWei Zhang, Xin (Robert) Luo, Stephen D. Burd, Alessandro F. Seazzu. 2374-2380 [doi]
- Fraud Prediction and the Human Factor: An Approach to Include Human Behavior in an Automated Fraud AuditStefan Hoyer, Halyna Zakhariya, Thorben Sandner, Michael H. Breitner. 2382-2391 [doi]
- Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider ThreatsFrank L. Greitzer, Lars J. Kangas, Christine F. Noonan, Angela C. Dalton, Ryan Hohimer. 2392-2401 [doi]
- Insider Threat Behavior Factors: A Comparison of Theory with Reported IncidentsAsmaa Munshi, Peter Dell, Helen Armstrong. 2402-2411 [doi]
- Insider Threat Security Reference ArchitectureJoji Montelibano, Andrew Moore. 2412-2421 [doi]
- Managing Malicious Insider Risk through BANDITVincent H. Berk, George Cybenko, Ian D. Gregorio-De Souza, John P. Murphy. 2422-2430 [doi]
- On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert ChannelsChrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan. 2431-2440 [doi]
- Who Really Did It? Controlling Malicious Insiders by Merging Biometric Behavior with Detection and Automated ResponsesBruce Gabrielson. 2441-2449 [doi]
- Assessing Transparency in Government: Rhetoric, Reality and DesireMaria Cucciniello, Greta Nasi, Giovanni Valotti. 2451-2461 [doi]
- E-Participation and Climate Change: Are Local Governments Actively Promoting Responsible Behaviors and Offering Opportunities for Citizen Involvement?Sonia Royo, Ana Yetano, Basilio Acerete. 2462-2471 [doi]
- ICT for Governance and Policy Modelling: Research Challenges and Future Prospects in EuropeYannis Charalabidis, Fenareti Lampathaki, Gianluca Misuraca, David Osimo. 2472-2481 [doi]
- Identifying Informational Needs for Open Government: The Case of EgyptRalf Klischewski. 2482-2490 [doi]
- Measurement of Open Government: Metrics and ProcessJohn Carlo Bertot, Patrice McDermott, Ted Smith. 2491-2499 [doi]
- A Self-Determination Perspective on IT-Based Citizen Advisory SupportTobias Giesbrecht, Joachim Pfister, Gerhard Schwabe. 2501-2510 [doi]
- Critical Success Factors for Shared Services: Results from Two Case StudiesMark Borman, Marijn Janssen. 2511-2520 [doi]
- Incrementally Clustering Legislative Interpellation DocumentsFu-ren Lin, Yu-tze Huang, Dachi Liao. 2521-2530 [doi]
- Factors Influencing Citizen Adoption of E-Government Services: A Cross-Cultural Comparison (Research in Progress)Cigdem Akkaya, Petra Wolf, Helmut Krcmar. 2531-2540 [doi]
- Understanding the Impact of Political Structure, Governance and Public Policy on E-GovernmentGirish J. Gulati, David J. Yates, Christine B. Williams. 2541-2550 [doi]
- Interactive Effects of Networked Publics and Social Media on Transforming the Public Sphere: A Survey of Iran's Leaderless 'Social Media Revolution'Akemi Takeoka Chatfield, Reza Akbari, Nima Mirzayi, Hans Jochen Scholl. 2552-2562 [doi]
- Shepherding and Censorship: Discourse Management in the Tea Party Patriots Facebook GroupChristopher M. Mascaro, Alison N. Novak, Sean P. Goggins. 2563-2572 [doi]
- Social Capital and the Networked Public Sphere: Implications for Political Social Media SitesMarius Rohde Johannessen. 2573-2582 [doi]
- Tweets and Votes: A Study of the 2011 Singapore General ElectionMarko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee-Peng Lim, Jing Jiang. 2583-2591 [doi]
- Achieving Network Stability through Convergence-Case Study of an E-Government Project Using Actor Network TheorySachin Ruikar, Pei-Chia Chang. 2593-2602 [doi]
- A Review of Success Factors and Challenges of Public Sector BPR ImplementationsMarlen Jurisch, Christian Ikas, Wolfgang Palka, Petra Wolf, Helmut Krcmar. 2603-2612 [doi]
- Attitudinal Determinants of E-Government Technology Use among U.S. Local Public ManagersEunjung Shin. 2613-2622 [doi]
- Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to ActionDjoko Sigit Sayogo, Theresa A. Pardo. 2623-2632 [doi]
- The Revolution That Wasn't: Investigating Barriers to Platform-Based E-Service Delivery PartnershipsViktor Arvidsson. 2633-2642 [doi]
- The Shape of Interoperability: Reviewing and Characterizing a Central Area within eGovernment ResearchLeif Skiftenes Flak, Hans Solli-Sæther. 2643-2652 [doi]
- Access, Awareness and Use of Internet Self-Help Websites for Depression in University StudentsGordana Culjak. 2655-2664 [doi]
- Considering the Visual Element in Clinical Pediatric Data ManagementMark Ginsburg. 2665-2674 [doi]
- Consumer Perspectives on Quality Attributes in Evaluating Health WebsitesDonghua Tao, Cynthia M. LeRouge, Gloria Deckard, Gianluca De Leo. 2675-2684 [doi]
- Cycles of Electronic Health Records Adaptation by Physicians: How Do the Positive and Negative Experiences with the EHR System Affect Physicians' EHR Adaptation Process?Cherie Noteboom, Dhundy Bastola, Sajda Qureshi. 2685-2695 [doi]
- Improving the Compliance of Transplantation Medicine Patients with an Integrated Mobile SystemTim A. Majchrzak, Antorweep Chakravorty. 2696-2705 [doi]
- Investigation of a Consumer Focused Health IT System: The Role of Claimant Information in the Social Security Determination ProcessNicole Lytle-Kosola, Sue S. Feldman, Thomas A. Horan, Eileen Elias, Raphael Gaeta. 2706-2715 [doi]
- Personal Health Records: Identifying Utilization Patterns from System Use Logs and Patient InterviewsBengisu Tulu, Diane M. Strong, Sharon A. Johnson, Isa Bar-On, John Trudel, Lawrence Garber. 2716-2725 [doi]
- A Seeded Cloud Approach to Health Cyberinfrastructure: Preliminary Architecture Design and Case ApplicationsChaitan Baru, Nathan Botts, Thomas A. Horan, Kevin Patrick, Sue S. Feldman. 2727-2734 [doi]
- PALMS: A Modern Coevolution of Community and Computing Using Policy Driven DevelopmentBarry Demchak, Jacqueline Kerr, Fred Raab, Kevin Patrick, Ingolf H. Krüger. 2735-2744 [doi]
- Public Health Informatics: Increasing Use and AccessRahman Alim Strum, Ann L. Fruhling, Alice Schumaker. 2745-2751 [doi]
- Towards Semantically Enabled Next Generation Community Health Information Portals: The PopSciGrid PilotDeborah L. McGuinness, Timothy Lebo, Li Ding, James P. McCusker, Abdul R. Shaikh, Richard P. Moser, Glen D. Morgan, Zaria Tatalovich, Gordon Willis, Bradford W. Hesse, Noshir S. Contractor, Paul Courtney. 2752-2760 [doi]
- Use of, Preferences for, and Expectations Regarding Personal Health Records among People Affected by Cancer: Results of a LIVESTRONG Survey and the 2008 Health Information National Trends SurveyEllen Burke Beckjord, Ruth Rechis, Bradford W. Hesse. 2761-2769 [doi]
- Efficient De-identification of Electronic Patient Records for User Cognitive TestingKenric W. Hammond, Efthimis N. Efthimiadis, Ryan Laundry. 2771-2778 [doi]
- MindFlow: Intelligent Workflow for Clinical Trials in Mental HealthcareYugyung Lee, Saurav Jana, Teja Mylavarapu, Deendayal Dinakarpandian, Dennis Owens. 2779-2788 [doi]
- A Method for Modeling Health Informatics Capacity in Patient Journeys Supported by Interprofessional TeamsCarolyn McGregor, Andrea Steadman, Jennifer Percival, Andrew James. 2790-2799 [doi]
- An E-Health Readiness Assessment Framework for Public Health Services-Pandemic PerspectiveJunhua Li, Pradeep Ray, Holly Seale, Raina MacIntyre. 2800-2809 [doi]
- Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital EnvironmentMike Krey, Steven Furnell, Bettina Harriehausen, Matthias Knoll. 2810-2819 [doi]
- Developing an Instrument for Information Quality for Clinical Decision MakingLinda W. Byrd, Terry Anthony Byrd. 2820-2829 [doi]
- Evaluating the Impact of Electronic Health Records on Clinical Reasoning PerformanceMatthew J. Wills, Omar F. El-Gayar, Amit V. Deokar. 2830-2839 [doi]
- Evaluation and Neuronal Network-Based Classification of the PHRs Privacy PoliciesInma Carrión, José Luis Fernández Alemán, Chrisina Jayne, Dominic Palmer-Brown, José Ambrosio Toval Álvarez, Juan Manuel Carrillo-de-Gea. 2840-2849 [doi]
- Evaluation of an Electronic Patient Record in a Nursing Home: One Size Fits All?Margreet B. Michel-Verkerke, A. Marcella G. M. Hoogeboom. 2850-2859 [doi]
- Evolving the Business Model to Improve Care Performance for Remote Patient Management: A Case StudyHao-Yun Kao, Yen-Hung Kuo, Yi-Kuang Chien, Yu-Han Hung, Ling-Sui Chen, Ching-Kuan Liu. 2860-2868 [doi]
- Factors in Physician Expectations of a Forthcoming Electronic Health Record ImplementationChristopher A. Harle, Marvin A. Dewar. 2869-2878 [doi]
- Importance of the Relative Advantage of RFID as Enabler of Asset Management in the Healthcare: Results from a Delphi StudySamuel Fosso Wamba, Eric W. T. Ngai. 2879-2889 [doi]
- Innovation in Weight Loss Intervention Programs: An Examination of a 3D Virtual World ApproachJeanne D. Johnston, Anne P. Massey, Celeste DeVaneaux. 2890-2899 [doi]
- IT Adoption: HealthCare Metrics TrackingRonald D. Freeze, Ajay S. Vinze, Raghu Santanam, Michael F. Furukawa. 2900-2909 [doi]
- IT Strategic Planning in a Pediatric Hospital: Overview of the Process and OutcomesMirou Jaana, Mari Teitelbaum, Tyson Roffey. 2910-2919 [doi]
- Measuring Users' Mental Strain When Performing Technology Based Surgical Tasks on a Surgical Simulator Using Thermal Imaging TechnologyJon R. Pluyter, Anne-Françoise Rutkowski, Jack Jakimowicz, Carol S. Saunders. 2920-2926 [doi]
- Motivations Underlying the Adoption of ERP Systems in Healthcare Organizations: An Analysis from "Success Stories"Placide Poba-Nzaou, Sylvestre Uwizeyemungu, Louis Raymond, Guy Paré. 2927-2936 [doi]
- Technology Acceptance by Health Professionals in Canada: An Analysis with a Modified UTAUT ModelPrincely Ifinedo. 2937-2946 [doi]
- The Impact of IT on Quality of Care: Evaluation of an Integrated Chronic Disease Management SystemAlain Pinsonneault, Vijay Dakshinamoorthy, Kristen Reidel, Robyn Tamblyn. 2947-2956 [doi]
- A Hybrid Web Based Personal Health Record System Shielded with Comprehensive SecurityJennifer Israelson, Ebru Celikel Cankaya. 2958-2968 [doi]
- An Examination of the Relationships among IT Capability Intentions, IT Infrastructure Integration and Quality of Care: A Study in U.S. HospitalsRandy V. Bradley, Renee M. E. Pratt, Evelyn H. Thrasher, Terry Anthony Byrd, Carlos Thomas. 2969-2980 [doi]
- ESCAP: Towards the Design of an AI Architecture for a Virtual Counselor to Tackle Students' Exam StressTarashankar Rudra, Manning Li, Manolya Kavakli. 2981-2990 [doi]
- Evaluating and Improving the Perioperative Process: Benchmarking and Redesign of Preoperative Patient EvaluationsJim Ryan, Carmen Lewis, Barbara Doster, Sandra Daily. 2991-3000 [doi]
- Pattern Discovery of User Interface Sequencing by Rehabilitation Clients with Cognitive ImpairmentsWilliam N. Robinson, Ali Raza Syed, Arash Akhlaghi, Tianjie Deng. 3001-3010 [doi]
- Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable DocumentsJohannes Heurix, Michael Karlinger, Thomas Neubauer. 3011-3020 [doi]
- Secure and Reliable Distributed Health Records: Achieving Query Assurance across Repositories of Encrypted Health DataAndrew Clarke, Robert Steele. 3021-3029 [doi]
- Using OWL Ontologies for Clinical Guidelines Based Comorbid Decision SupportSamina Raza Abidi, Jafna Cox, Syed Sibte Raza Abidi, Michael A. Shepherd. 3030-3038 [doi]
- Empirical Analysis of Online Anonymity and User Behaviors: The Impact of Real Name PolicyDaegon Cho, Soodong Kim, Alessandro Acquisti. 3041-3050 [doi]
- Investigating the Effectiveness of IS Security Countermeasures towards Cyber Attacker DeterrenceGurvirender P. Tejay, Sean M. Zadig. 3051-3060 [doi]
- Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth Computer Hacking EpidemicQing Hu, Chenghong Zhang, Zhengchuan Xu. 3061-3070 [doi]
- Unethical Use of Information Technology: A Two-Country StudySutirtha Chatterjee, Joseph S. Valacich, Suprateek Sarker. 3071-3080 [doi]
- Visualization of ATM Usage Patterns to Detect Counterfeit Cards UsageBen Reardon, Kara Nance, Stephen McCombie. 3081-3088 [doi]
- Algorithmic Trading Systems: A Multifaceted View of AdoptionDavid Bell, Laide Gana. 3090-3099 [doi]
- B2B E-Commerce Adoption by the Grocery Industry in Developing Countries: Indonesia versus BahrainSherah Kurnia, Mazen Ali. 3100-3109 [doi]
- Dissatisfaction Does Not Mean Rejection: A Theory of Reinvention of Applicable Technologies by Mindful and Unfaithful UsersSaggi Nevo, Dorit Nevo. 3110-3119 [doi]
- Do I Want to Pay to Download Movies? Predicting Acceptance of Legal Online Movie Download ServicesSunghan Ryu, Byungho Park, Hyunsuk Im, Jonghyun Hong, Junyeong Lee. 3120-3128 [doi]
- Exploring Factors Impacting Users' Attitude and Intention towards Social Tagging SystemsHesham Allam, James Blustein, Michael Bliemel, Louise Spiteri. 3129-3138 [doi]
- Four Types of Attitudes in ICT Acceptance and Use? A Critical Assessment on the Basis of Empirical and Scientometric DataJulia Krönung, Steffen Bernius. 3139-3148 [doi]
- Social Aspects in Technology Acceptance: Theory Integration and DevelopmentBjörn Niehaves, Elena Gorbacheva, Ralf Plattfaut. 3149-3158 [doi]
- The Implementation of Large-Scale Information Systems in Small and Medium-Sized Enterprises-A Case Study of Work-and Health-Related ConsequencesSven Laumer, Christian Maier, Tim Weitzel, Andreas Eckhardt. 3159-3168 [doi]
- Cultural, Individual and Device-Specific Antecedents on Mobile Banking Adoption: A Cross-National StudyTommi Laukkanen, Pedro Cruz. 3170-3179 [doi]
- Digital Advertising's Human Toll: How Implied Cost-to-User Affects Web Content Platforms (A Research Proposal)Brian Kimball Dunn, Dennis F. Galletta. 3180-3187 [doi]
- Investigating Consumers' Variety Seeking Behavior in the Light of Online Reviews: An Individual Level Panel AnalysisQingliang Wang, Khim-Yong Goh. 3188-3197 [doi]
- Online Auctions and Multichannel RetailingJason Kuruzovich. 3198-3207 [doi]
- Revitalizing the P's of E-Marketing with Customer Experience ManagementSophea Chea, Tung X. Bui, Margaret Meiling Luo. 3208-3217 [doi]
- Social Brand Value and the Value Enhancing Role of Social Media Relationships for BrandsJohann Füller, Roland Schroll, Severin Dennhardt, Katja Hutter. 3218-3227 [doi]
- The Impact of Observational Learning and Electronic Word of Mouth on Consumer Purchase Decisions: The Moderating Role of Consumer Expertise and Consumer InvolvementChristy M. K. Cheung, Bo Xiao, Ivy L. B. Liu. 3228-3237 [doi]
- The Tradeoff between Online Community Activity and Consumption: Evidence from Online PokerJerry Lindholm, Maurits Kaptein, Petri Parvinen. 3238-3246 [doi]
- A Composite Framework for Behavioral Compliance with Information Security PoliciesSalvatore Aurigemma, Raymond R. Panko. 3248-3257 [doi]
- An Integrative Model of Information Security Awareness for Assessing Information Systems Security RiskRoberto J. Mejias. 3258-3267 [doi]
- Assimilation of Security-Related Policies in U.S. Firms: An Empirical Study of Web Assimilation and Related Knowledge as AntecedentsKevin P. Gallagher, Xiaoni Zhang, Vickie Coleman Gallagher. 3268-3277 [doi]
- End User Perception of Online Risk under UncertaintyVaibhav Garg, L. Jean Camp. 3278-3287 [doi]
- Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure BehaviorJeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns. 3288-3296 [doi]
- Manage Risks through the Enterprise ArchitectureJosé Barateiro, Gonçalo Antunes, José Luis Borbinha. 3297-3306 [doi]
- Measuring Impact on Missions and Processes: Assessment of Cyber BreachesJoobin Choobineh, Evan E. Anderson, Michael R. Grimaila. 3307-3316 [doi]
- Security Policy Compliance: User Acceptance PerspectiveAhmad Al-Omari, Omar F. El-Gayar, Amit V. Deokar. 3317-3326 [doi]
- Business Models in the Software IndustryMarkus Schief, Peter Buxmann. 3328-3337 [doi]
- Human Capital in the Domain of Community Wireless NetworksAbdelnasser Abdelaal, Hesham H. Ali. 3338-3346 [doi]
- The Dual Regimes of Digital Innovation ManagementFredrik Svahn, Ola Henfridsson. 3347-3356 [doi]
- Exploring Patterns and Configurations in Networked Learning TextsCaroline Haythornthwaite, Anatoliy A. Gruzd. 3358-3367 [doi]
- Exposing Chat Features through Analysis of Uptake between ContributionsDaniel D. Suthers, Caterina Desiato. 3368-3377 [doi]
- Statistical Discourse Analysis of a Role-Based Online Discussion Forum: Patterns of Knowledge ConstructionAlyssa Friend Wise, Ming Ming Chiu. 3378-3386 [doi]
- Visualizing Behavioral Data from a 3D Virtual Learning Environment: A Preliminary StudyMatthew Schmidt, James M. Laffey. 3387-3394 [doi]
- An Empirical Study of Volunteer Members' Perceived Turnover in Open Source Software ProjectsYiqing Yu, Alexander Benlian, Thomas Hess. 3396-3405 [doi]
- Citizen Engineering: Methods for "Crowdsourcing" Highly Trustworthy ResultsZhi Zhai, David Hachen, Tracy Kijewski-Correa, Feng Shen, Gregory R. Madey. 3406-3415 [doi]
- Describing the Software Forge EcosystemMegan Squire, David Williams. 3416-3425 [doi]
- Goals and Tasks: Two Typologies of Citizen Science ProjectsAndrea Wiggins, Kevin Crowston. 3426-3435 [doi]
- Network-Based Analysis of the Structure and Evolution of an Open Source Software ProductQize Le, Jitesh H. Panchal. 3436-3445 [doi]
- Who Will Remain? An Evaluation of Actual Person-Job and Person-Team Fit to Predict Developer Retention in FLOSS ProjectsAndreas Schilling, Sven Laumer, Tim Weitzel. 3446-3455 [doi]
- Categorizing Behavior in Online Communities: A Look Into the World of Cake BakersDale Ganley, Christine Moser, Peter L. M. Groenewegen. 3457-3466 [doi]
- Idea Generation in Virtual Communities for Innovation: The Influence of Participants' Motivation on Idea QualityUlrich Bretschneider, Balaji Rajagopalan, Jan Marco Leimeister. 3467-3479 [doi]
- Linguistic Markers of Secrets and Sensitive Self-Disclosure in TwitterDavid J. Houghton, Adam N. Joinson. 3480-3489 [doi]
- Negotiating Cultural Values in Social Media: A Case Study from WikipediaJonathan T. Morgan, Robert M. Mason, Karine Nahon. 3490-3499 [doi]
- Political Communication and Influence through Microblogging-An Empirical Analysis of Sentiment in Twitter Messages and Retweet BehaviorStefan Stieglitz, Linh Dang-Xuan. 3500-3509 [doi]
- Purposive Sampling on Twitter: A Case StudyChristopher Sibona, Steven Walczak. 3510-3519 [doi]
- Self Discrepancy, Perceived Privacy Rights, and Contribution in Virtual CommunitiesAyoung Suh, Kyung-shik Shin. 3520-3529 [doi]
- Social Capital and Knowledge Sharing in Online Communities: A Mediation ModelSally Pui Man Law, Man Kit Chang. 3530-3539 [doi]
- Social Media as a Driver for New Rhetorical Practices in OrganisationsJoão Baptista, Robert D. Galliers. 3540-3549 [doi]
- The Influence of Self-Concept Improvement on Member Loyalty to Online Communities: An Empirical Comparison between Social Networks and Virtual WorldsYoung Eun Lee, Aditya N. Saharia. 3550-3559 [doi]
- Uncovering Multi-mediated Associations in Socio-technical NetworksKar-Hai Chu, Daniel D. Suthers, Devan Rosen. 3560-3569 [doi]
- A Text Mining Model for Strategic Alliance DiscoveryYilu Zhou, Yi Zhang, Nicholas Vonortas, Jeff Williams. 3571-3580 [doi]
- Diversification of Web Search Results through Social Interest MiningYuqing Mao, Haifeng Shen, Chengzheng Sun. 3581-3590 [doi]
- Forecasting the Unemployment Rate by Neural Networks Using Search Engine Query DataWei Xu, Ziang Li, Qing Chen. 3591-3599 [doi]
- Using Sequence Analysis to Classify Web Usage Patterns across WebsitesQiqi Jiang, Chuan-Hoo Tan, Chee Wei Phang, Kwok Kee Wei. 3600-3609 [doi]
- Barriers to Knowledge Acquisition, Transfer and Management in Regional Knowledge Economy DevelopmentEileen M. Trauth. 3612-3621 [doi]
- Knowledge Creation and Financial Firm Performance: Mediating Processes from an Organizational Agility PerspectiveTing-(Rachel) Chung, Ting-Peng Liang, Chih-Hung Peng, Deng-Neng Chen. 3622-3631 [doi]
- Matching Up the Gap between Perceived Importance and Knowledge for IT Skills among Australian AccountantsPranish Rai. 3632-3640 [doi]
- A Framework for Reflective Business Process ManagementSilke Balzert, Peter Fettke, Peter Loos. 3642-3651 [doi]
- Acculturation Disparity Analysis Model (ADAM): Experts and ApprenticesDarryl D. Diptee. 3652-3660 [doi]
- How Can Knowledge Management Support Competence-Based Learning? Towards a Research AgendaMichael Hertlein, Stefan Smolnik. 3661-3668 [doi]
- A Text Analysis Approach to Motivate Knowledge Sharing via Microsoft SharePointRobert M. Patton, Wade McNair, Christopher T. Symons, Jim N. Treadwell, Thomas E. Potok. 3670-3678 [doi]
- A Role-Based Resource Management Approach for Emergency OrganizationsTaina A. Kurki, Hanna-Miina Sihvonen. 3679-3687 [doi]
- Contribution and Limits of IT-Enabled Codification and Dissemination of Traditional Knowledge: Case of Bamiléké PeopleDieudonné Toukam, Samuel Fosso Wamba. 3688-3698 [doi]
- Expanding the Disaster Management Knowledge Space through Spatial MediationHsine-Jen Tsai, Les Miller, Ming Hua 0003, Sree Nilakanta, Meher Vani Bojja. 3699-3708 [doi]
- KM Issues with Retiring and Transient Explosive Ordnance Disposal (EOD) Airmen and Their Impact on Air Force EOD Response CapabilitiesJoshua Connell, Gregory M. Schechtman, Bryan Hasty. 3709-3718 [doi]
- User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in ProgressJustin Scott Giboney, Susan A. Brown, Jay F. Nunamaker Jr.. 3719-3727 [doi]
- Encouraging Knowledge Contribution to Electronic Repositories: The Roles of Rewards and Job DesignL. G. Pee. 3729-3738 [doi]
- Explore the Knowledge Integration in Knowledge Teams from a Transactive Memory PerspectiveChia-chen Wang, Cheng-Kiang Farn. 3739-3745 [doi]
- Knowledge Problems in Corrective Software Maintenance-A Case StudyMaria Alaranta, Stefanie Betz. 3746-3755 [doi]
- Knowledge Sharing Barriers in Growing Software CompaniesMarianne Kukko, Nina Helander. 3756-3765 [doi]
- Knowledge Transfer within Organizations: A Social Network PerspectiveAndrew Harrison, Qing Hu. 3766-3775 [doi]
- Project Complexity and Knowledge Transfer in Global Software Outsourcing Project Teams: A Transactive Memory Systems PerspectiveGang Qu, Shaobo Ji, Aaron Luntala Nsakanda. 3776-3785 [doi]
- The Impact of Importance and Distribution on Information Exchange in Team Decision Making: Preliminary ResultsBabajide Osatuyi, Starr Roxanne Hiltz, Jerry Fjermestad. 3786-3795 [doi]
- Understanding the Effect of Innovative Climate and Interaction Involvement on User Intention to Share KnowledgeEugenia Y. Huang, Travis K. Huang. 3796-3805 [doi]
- Whom to Ask for What knowledge? A Comparison of Exchange Partners and Their Impact on Knowledge TypesBernhard Moos, Heinz-Theo Wagner, Daniel Beimborn, Tim Weitzel. 3806-3815 [doi]
- Knowledge Intensive Business Processes: An Exploratory StudyÖykü Isik, Joachim Van den Bergh, Willem Mertens. 3817-3826 [doi]
- Opening the Black Box of Outsourcing Knowledge Intensive Business Processes-A Longitudinal Case Study of Outsourcing Recruiting ActivitiesSven Laumer, Nadine Blinn, Andreas Eckhardt. 3827-3836 [doi]
- Variation of Work Practices in Technology-Mediated Environment-Knowledge Work Activity Framework PerspectiveKimmo Tarkkanen. 3837-3846 [doi]
- Effectiveness of Knowledge Seeking Behaviors Embedded in Social Networks: A Perspective of Individuals in WorkplacesTae Hun Kim, Izak Benbasat. 3848-3857 [doi]
- Encouraging the Mindful Consideration of Enterprise 2.0: Design and Deployment of a GDSS-Supported Collaborative Strategic EpisodeSteven De Hertogh, Stijn Viaene. 3858-3868 [doi]
- Guidelines to Align Communities of Practice with Business Objectives: An Application of Social MediaHala Annabi, Sean T. McGann, Sarah Pels, Paul Arnold, Christopher Rivinus. 3869-3878 [doi]
- Knowledge-Based Theory of the Firm, Challenges by Social MediaBernhard R. Katzy, Kateryna Bondar, Robert M. Mason. 3879-3887 [doi]
- Knowledge Sharing in the Workplace: A Social Networking Site AssessmentGina Harden. 3888-3897 [doi]
- Return on Investment in Social Media-Does the Hype Pay Off? Towards an Assessment of the Profitability of Social Media in OrganizationsFabian Kaske, Maurice Kügler, Stefan Smolnik. 3898-3907 [doi]
- Searching for Answers-Knowledge Exchange through Social Media in OrganizationsChristoph Seebach. 3908-3917 [doi]
- Social Technologies for Cross-Functional Product Development: SWOT Analysis and ImplicationsMarco Bertoni, Koteshwar Chirumalla, Christian Johansson. 3918-3927 [doi]
- The Nature of Knowledge in the Social Media Age: Implications for Knowledge Management ModelsJeff Hemsley, Robert M. Mason. 3928-3937 [doi]
- Understanding the Influence of Social Media in the Workplace: An Integration of Media Synchronicity and Social Capital TheoriesXiongfei Cao, Douglas R. Vogel, Xitong Guo, Hefu Liu, Jibao Gu. 3938-3947 [doi]
- Conceptualizing Knowledge Use: A Theoretical Framework and Empirical StudyTingting Rachel Chung, Dennis F. Galletta. 3949-3958 [doi]
- It's Not "Just" Validation: The Effect of Organizational Justice on Contributions to a Knowledge RepositoryAlexandra Durcikova, Kelly J. Fadel. 3959-3968 [doi]
- Where to Look for Knowledge Management SuccessMurray E. Jennex, Stefan Smolnik, David T. Croasdell. 3969-3978 [doi]
- Design, Implementation, and Evaluation of a Virtual Meeting Tool-Based Innovation for UML Technology Training in Global OrganizationsMervi Koivulahti-Ojala, Timo Käkölä. 3980-3989 [doi]
- Diffusion of an Online Collaboration Tool: The Case of Google Wave Adoption FailureLaddawan Kaewkitipong. 3990-3999 [doi]
- Dynamic Knowledge Mapping: A Visualization Approach for Knowledge Management SystemsTobias Heide, Lukasz Lis. 4001-4010 [doi]
- The Impact of Organizational Social Web Site Usage on Work Performance: A Multilevel Structural Interaction PerspectivePhilip Raeth, Maurice Kügler, Stefan Smolnik. 4011-4020 [doi]
- Investigating the Critical Success Factors and Infrastructure of Knowledge Management for Open Innovation Adoption: The Case of GlaxoSmithKline (GSK) in EgyptAmira Abd-Elaziz, Inas E. Ezz, Anastasia Papazafeiropoulou, Ray J. Paul, Lampros K. Stergioulas. 4022-4031 [doi]
- Knowledge Management and Innovation Performance in Australian Service Sector OrganizationsMarianne Gloet, Danny Samson. 4032-4041 [doi]
- Knowledge Management Impact on Corporate Entrepreneurship: A Malaysian StudyPayam Ansari, Reza Sigari Tabrizi. 4042-4051 [doi]
- Leveraging Knowledge for Innovation: What Makes a Difference?Suzanne Zyngier. 4052-4061 [doi]
- Strategic Alignment and the Implementation of a Knowledge Management System: A Social Representation PerspectiveAlina Dulipovici, Daniel Robey. 4062-4071 [doi]
- A Conceptual Framework to Construct an Artefact for Meta-Abstract Design Knowledge in Design Science ResearchLukasz Ostrowski, Markus Helfert, Shuyan Xie. 4074-4081 [doi]
- A Design Theory for IT Supporting Online CommunitiesPaolo Spagnoletti, Andrea Resca. 4082-4091 [doi]
- Combining Design Science and Design Research Perspectives-Findings of Three Prototyping ProjectsSven Weber, Roman Beck, Robert Wayne Gregory. 4092-4101 [doi]
- IS Design Thinking in Disaster Management ResearchGuido Schryen, Felix Wex. 4102-4111 [doi]
- Systematic Service Innovation in Organizations: EDCI-A Template for Human-Centered Design of E-ServicesNigel P. Melville, Michael Hopps. 4112-4118 [doi]
- The Creativity Passdown Effect: Sharing Design Thinking Processes with Design TheoryJong-Seok Lee, Richard Baskerville, Jan Pries-Heje. 4119-4127 [doi]
- A Multi-agent Framework for Distributed Business Intelligence SystemsAlexander Loebbert, Gavin Finnie. 4129-4137 [doi]
- Business Intelligence Challenges in the Context of Goods- and Service-Dominant LogicPamela R. Clavier, Hugo Lotriet, Johan van Loggerenberg. 4138-4147 [doi]
- Critical Contextual Success Factors for Business Intelligence: A Delphi Study on Their Relevance, Variability, and ControllabilitySebastian Olbrich, Jens Pöppelbuß, Björn Niehaves. 4148-4157 [doi]
- Extending BPMN for Business Activity MonitoringJan-Philipp Friedenstab, Christian Janiesch, Martin Matzner, Oliver Müller. 4158-4167 [doi]
- Managing the Enterprise Business Intelligence App Store: Sentiment Analysis Supported Requirements EngineeringMichael Goul, Olivera Marjanovic, Susan Baxley, Karen Vizecky. 4168-4177 [doi]
- Paradise by the Dashboard Light: Designing Governance Metrics in Turbulent EnvironmentsHans P. Borgman, Hauke Heier, Bouchaib Bahli. 4178-4188 [doi]
- The Impact of Agility Requirements on Business Intelligence ArchitecturesMichael Zimmer, Henning Baars, Hans-Georg Kemper. 4189-4198 [doi]
- The Strategic Role of Business Intelligence in the Extended Enterprise: BI Configurations for Control Affordances in OutsourcingJoseph W. Clark. 4199-4208 [doi]
- Towards a Method to Improve Alignment of Objective and Subjective Information Requirements of Decision Makers-The Potential of System Dynamics for Information Requirements AnalysisBenjamin Mosig. 4209-4218 [doi]
- Using Quantitative Analyses to Construct a Capability Maturity Model for Business IntelligenceDavid Raber, Robert Winter, Felix Wortmann. 4219-4228 [doi]
- A Comprehensive EA Benefit Realization Model-An Exploratory StudyMatthias Lange, Jan Mendling, Jan Recker. 4230-4239 [doi]
- A Self-Fueling Coordination Model for Enterprise Architecting EffectivenessJ. Alberto Espinosa, Frank Armour, Wai Fong Boh, Mark A. Clark. 4240-4249 [doi]
- Disentangling the Value of Information and Analytics through Componentized Business ArchitectureSusanne Glissmann, Jorge L. C. Sanz, Rong Liu, Valeria Becker. 4250-4259 [doi]
- Improving Government Enterprise Architecture Practice-Maturity Factor AnalysisAdegboyega K. Ojo, Tomasz Janowski, Elsa Estevez. 4260-4269 [doi]
- Mapping the Enterprise Architecture Principles in TOGAF to the Cybernetic Concepts-An Exploratory StudyMohammad Esmaeil-Zadeh, Gary Millar, Edward Lewis. 4270-4276 [doi]
- Using Business Transactions to Analyse the Consistency of Business Process ModelsArtur Caetano, Aurélio Assis, José M. Tribolet. 4277-4285 [doi]
- A Dynamic Capability-Based Framework for Business Process Management: Theorizing and Empirical ApplicationKevin Ortbach, Ralf Plattfaut, Jens Pöppelbuß, Björn Niehaves. 4287-4296 [doi]
- An Integrative Model of IT-Enabled Business Process Change: Causal Structures in Theory, Research and PracticeMarlen Jurisch, Johanna Cuno, Wolfgang Palka, Petra Wolf, Helmut Krcmar. 4297-4306 [doi]
- Business Process Modelling Towards Derivation of Information Technology GoalsYouseef Alotaibi, Fei Liu. 4307-4315 [doi]
- Data Quality Requirements of Collaborative Business ProcessesClarissa Falge, Boris Otto, Hubert Österle. 4316-4325 [doi]
- Development of a Generic Tool for the Application of Maturity Models-Results from a Design Science ApproachNico Krivograd, Peter Fettke. 4326-4335 [doi]
- Evaluating Business Models: Evidence on User Understanding and Impact to BPM CorrespondenceJohannes Buder, Carsten Felden. 4336-4345 [doi]
- Improving Healthcare Processes through Small-Scale InnovationsOlivera Marjanovic. 4346-4355 [doi]
- Network-Based Business Process AnalysisOlga Levina, Robert Hillmann. 4356-4365 [doi]
- Standardization Frameworks in Services Offshoring: The Relationship between Process Implementation Thoroughness, Task Complexity, and Performance ImprovementBryon Balint. 4366-4375 [doi]
- Towards Business Process Modeling in Business Contracting-Analyzing Collaboration Contracts as a Field of Application for Process ModelsJörg Becker, Marcel Heddier, Ralf Knackstedt. 4376-4385 [doi]
- Towards Process-Oriented Recommender Capabilities in Flexible Process Environments-State of the ArtThomas Burkhart, Benjamin Weis, Dirk Werth, Peter Loos. 4386-4395 [doi]
- Two Cases on How to Improve the Visibility of Business Process PerformanceTim Pidun, Carsten Felden. 4396-4405 [doi]
- Communication Motives, Satisfaction, and Social Support in the Workplace: Are Supervisors Effective Support Sources in Employee Networks?Moyi Jia, Mirit Shoham. 4407-4416 [doi]
- Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining OnlineNathan J. Claes, Carolyn Hurley, Michael A. Stefanone. 4417-4426 [doi]
- Multi-modal Multi-granular Analysis: Exploring Communication Networks under Varying LensesKar-Hai Chu, Devan Rosen, Daniel D. Suthers. 4427-4434 [doi]
- Recent Developments in the Global Telecommunication NetworkGeorge A. Barnett. 4435-4444 [doi]
- Structuring Organizational Communication: Employees' Role and Network Position as Predictive of Institutional Talk About the Adoption of TechnologyCorey Jay Liberman, Marya L. Doerfel. 4445-4454 [doi]
- Business Model Representation Incorporating Real Options: An Extension of e3-ValueDennis Kundisch, Thomas John. 4456-4465 [doi]
- Competition and Strategic Partnership between Intermediary Platforms in the Presence of Heterogeneous TechnologiesRavi Mantena, Rajib L. Saha. 4466-4475 [doi]
- Content Contribution in Social Media: The Case of YouTubeQian Candy Tang, Bin Gu, Andrew B. Whinston. 4476-4485 [doi]
- Implications of Negative Network Effect in the Security Software MarketDebabrata Dey, Atanu Lahiri, Guoying Zhang. 4486-4494 [doi]
- Live Show Everywhere: Distribution Dynamics and Internet Influence on Concert LocationDaegon Cho, Rahul Telang, Michael D. Smith. 4495-4504 [doi]
- Modularity and Inequality of Code Contribution in Open Source Software DevelopmentGang Peng, Xianjun Geng, Lihui Lin. 4505-4514 [doi]
- Network Centrality and Contributions to Online Public Good-The Case of Chinese WikipediaChong (Alex) Wang, Xiaoquan (Michael) Zhang. 4515-4524 [doi]
- Optimal Digital Rights Management with Uncertain PiracyRobert F. Easley, Byung Cho Kim, Daewon Sun. 4525-4534 [doi]
- Platform Pricing with Strategic BuyersYifan Dou, D. J. Wu, Jian Chen. 4535-4544 [doi]
- Predicting Enterprise Efficiency: The Impact of IT CapabilityMan Kit Chang, Ying-Chu Ng. 4545-4551 [doi]
- Risk-Aware Service Level Agreement Design for Enterprise Information SystemsMarkus Hedwig, Simon Malkowski, Dirk Neumann. 4552-4561 [doi]
- The Special Challenges of Ecommerce in China: A Preliminary Investigation of Sufficient Conditions for Generating Adequate Consumer Trust for Initial LaunchEric K. Clemons, Fujie Jin, Fei Ren, Ying Wang, Josh Wilson. 4562-4571 [doi]
- Versioning Strategy of Information Goods with Network Externality in the Presence of PiracyS. Shivendu, Zhe Zhang. 4572-4581 [doi]
- An Individual's Problem Space and Web Information Searching: A Proposed Study on Mental Organization of Keyword Importance and Efficiency in Everyday Web Information SearchingJeng-Her Alex Chen. 4583-4592 [doi]
- Can Anybody Help?: Mitigating IS Development Project Risk with User InvolvementChintan Amrit, Jos van Hillegersberg, Bart van Diest. 4593-4602 [doi]
- End User Computing: The Dark Matter (and Dark Energy) of Corporate ITRaymond R. Panko, Daniel Port. 4603-4612 [doi]
- Flow Experiences in Learning to Use a Spreadsheet ApplicationBertta Sokura. 4613-4622 [doi]
- Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users AccountableAnthony Vance, Braden Molyneux, Paul Benjamin Lowry. 4623-4632 [doi]
- The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification of Safety Critical Nuclear Fuel Data Using Spreadsheets at British Nuclear Fuels Limited (BNFL)Simon Thorne. 4633-4640 [doi]
- A Design Proposal for a Benefits Management Method for Enterprise System ImplementationsSilja Eckartz, Christiaan Katsma, Ruud Oude Maatman. 4642-4651 [doi]
- Are Enterprise System Related Misfits Always a Bad Thing?Chris Maurer, Nicholas Berente, Dale Goodhue. 4652-4661 [doi]
- Benefits Identification in Inter-organizational Information System Implementation Projects: A Multi-case Study ApproachNorbert Frick, Kai Manuel Hemmerich, Petra Schubert. 4662-4671 [doi]
- Contextual Aspects in Enterprise IntegrationJ. P. Schonewille, W. A. G. A. Bouwman. 4672-4681 [doi]
- ERP and E-Business Systems Development, Innovation and Business Performance-An Empirical InvestigationEuripidis Loukis, Fotini Michailidou. 4682-4691 [doi]
- How Leadership Styles Impact Enterprise Systems Success throughout the Lifecycle: A Theoretical ExplorationZhen Shao, Yuqiang Feng, Qing Hu. 4692-4701 [doi]
- Solution Based Procedures to Determine Business Models of Enterprise Systems ProvidersKatja Andresen, Carsten Brockmann, Narcyz Roztocki. 4702-4708 [doi]
- Upgrading to a New Version of an ERP System: A Multilevel Analysis of Influencing Factors in a Software EcosystemPhilip Holst Riis, Petra Schubert. 4709-4718 [doi]
- Determinants of RFID Technology Adoption Intention in the Saudi Retail Industry: An Empirical StudySalem Alqahtani, Samuel Fosso Wamba. 4720-4729 [doi]
- Evaluating Variance in Cost-Benefit Perceptions of RFID Systems in the Supply Chain SectorVic Matta, Ana L. Rosado Feger. 4730-4736 [doi]
- Potential of RFID in Emergency Management: Task-Technology Fit PerspectiveAshir Ahmed, Lyfie Sugianto. 4737-4745 [doi]
- An Exploratory Study of Supply Chain Management IT SolutionsHenrik John Nyman. 4747-4756 [doi]
- Co-production and Co-creation of Value: A Differential Games ApproachEmre M. Demirezen, Subodha Kumar, Bala Shetty. 4757-4766 [doi]
- Durable Goods Pricing in the Presence of Volatile DemandXiaobo Zheng, Vera Tilson. 4767-4776 [doi]
- E-Book Platform Competition in the Presence of Two-Sided Network ExternalitiesYabing Jiang. 4777-4783 [doi]
- Efficiency Implications of E-Procurement System Capabilities and Usage Behavior: Status Quo and Directions for Future ResearchChristoph Pflügler. 4784-4795 [doi]
- Integrating Business Partners on Demand: The Effect on Capacity Planning for Cost Driven Support ProcessesChristoph Dorsch, Björn Häckel. 4796-4805 [doi]
- Peaker Outsourcing for Service Systems with Time-Varying Arrival RatesMariya Bondareva, Avi Seidmann. 4806-4813 [doi]
- Product Performance Based Business Models: A Service Based PerspectiveMorris A. Cohen. 4814-4819 [doi]
- Reminder Systems for Reducing No-shows in General PracticesLeon Cui, Vera Tilson, Gregory Dobson. 4820-4827 [doi]
- Challenges and Opportunities in Planning and Implementation of ICT for the Bottom of the Pyramid: An Experience Sharing from IndiaRajanish Dass. 4829 [doi]
- Decision Enhancement Services for Small and Medium Enterprise Start-Ups in UgandaAnnabella Habinka Ejiri, Henk G. Sol. 4830-4839 [doi]
- Determinants of Worldwide Technology Utilization and Availability a Geospatial and Regression AnalysisJames B. Pick, Tetsushi Nishida. 4840-4849 [doi]
- Measuring Social Capital in the Domain of Community Wireless NetworksAbdelnasser Abdelaal, Hesham H. Ali. 4850-4859 [doi]
- Potential of Cloud-Based Infrastructure for Small Business DevelopmentMehruz Kamal. 4860-4867 [doi]
- Stock Market Reaction to Information Technology Investments in the USA and Poland: A Comparative Event StudyNarcyz Roztocki. 4868-4872 [doi]
- Celebrating IT Projects Success: A Multi-domain AnalysisPaul L. Bannerman, Alan Thorogood. 4874-4883 [doi]
- Comparing Risks in Individual Software Development and Standard Software Implementation Projects: A Delphi StudyStefan Hoermann, Marco Aust, Michael Schermann, Helmut Krcmar. 4884-4893 [doi]
- Determinants of User Involvement in Software ProjectsRahul Thakurta, Rahul Roy. 4894-4903 [doi]
- The Emergence of Information Infrastructure Risk Management in IT ServicesLars Öbrand, Nils-Petter Augustsson, Jonny Holmström, Lars Mathiassen. 4904-4913 [doi]
- Humanizing User Influence Tactics in the Quest to Reduce Resistance against IT Project Management Methodology UseKunal Mohan, Frederik Ahlemann, Anol Bhattacherjee. 4914-4923 [doi]
- Institutionalization, Embedded Rationality, and the Escalation of Commitment to IT ProjectsKenneth J. Park, Nicholas Berente. 4924-4933 [doi]
- Investigating the Interactive Effect of Control in Information Systems Development ProjectsRavi Narayanaswamy, Raymond M. Henry. 4934-4942 [doi]
- SCRUM Project Architecture and Thriving Systems TheoryLeslie J. Waguespack Jr., William T. Schiano. 4943-4951 [doi]
- The Role of Objects in the Coordination of Knowledge-Intensive Projects: A Study of Computer Games DevelopmentHarry Scarbrough, Nikiforos Panourgias, Joe Nandhakumar. 4952-4960 [doi]
- Aligning Multiple Definitions of Alignment-A Literature ReviewKatja Walentowitz. 4962-4971 [doi]
- An IT Balance Scorecard Design under Service Management PhilosophyAntonio Folgueras Marcos, Juan Ignacio Rouyet, Antoni Bosch. 4972-4981 [doi]
- Cloudrise: Opportunities and Challenges for IT Governance at the Dawn of Cloud ComputingHauke Heier, Hans P. Borgman, Bouchaib Bahli. 4982-4991 [doi]
- Email Governance: Are Companies in Financial Industries More Mature?Gerhard Knolmayer, Lukas E. Helfenstein, Gabriela Loosli, Georg Disterer. 4992-5001 [doi]
- Exploring the Influence of Vendor Reputation in IT Outsourcing Decisions: A Transaction Cost PerspectiveKenneth J. Park. 5002-5010 [doi]
- Extending BITA Maturity Model from Organizational Culture PerspectiveMohamed El Mekawy, Ehsan Kaboudvand, Lazar Rusu. 5011-5022 [doi]
- Finding the Right Balanced Scorecard for Business-Driven IT Management: A Literature ReviewAndreas Györy, Walter Brenner, Falk Uebernickel. 5023-5032 [doi]
- IT Governance Mechanisms in Multisourcing-A Business Group PerspectiveThomas Herz, Florian Hamel, Falk Uebernickel, Walter Brenner. 5033-5042 [doi]
- IT Governance Processes and IT Alignment: Viewpoints from the Board of DirectorsJason Kuruzovich, Geneviève Bassellier, V. Sambamurthy. 5043-5052 [doi]
- Reconsidering the Dimensions of Business-IT AlignmentFrank Schlosser, Heinz-Theo Wagner, Tim Coltman. 5053-5061 [doi]
- Resource-Based View in Empirical IT Business Value Research-An Evidence-Based Literature ReviewJanusch Patas, Jens Bartenschlager, Matthias Goeken. 5062-5071 [doi]
- The Chief Information Officer and Chief Financial Officer Dyad-How an Effective Relationship Impacts Individual Effectiveness and Strategic AlignmentJames S. Denford, Kurt B. Schobel. 5072-5081 [doi]
- An Exploratory Examination of Antecedents to Software Piracy: A Cross-Cultural ComparisonAndrew J. Setterstrom, John M. Pearson, Hassan Aleassa. 5083-5092 [doi]
- Can ERP Adoptions Change Organisational Culture in Developing Countries in Asia? An Empirical InvestigationJayantha Rajapakse. 5093-5101 [doi]
- Examining Trust within the Team in IT Startup Companies-An Empirical Study in the People's Republic of ChinaOliver Oechslein, Andranik Tumasjan. 5102-5111 [doi]
- Investigating Social Computing in Competitive DynamicsSandra A. Vannoy, B. Dawn Medlin. 5112-5121 [doi]
- Professional or Faux Pas? Effects of Multicommunicating on the Analyst-User RelationshipAnn Frances Cameron, Henri Barki, Charlene Plante. 5122-5131 [doi]
- Requirements Analysis for a Student Relationship Management System-Results from an Empirical Study in Ivy League UniversitiesLubov Lechtchinskaia, Ina Friedrich, Michael H. Breitner. 5132-5141 [doi]
- Team and Organizational Identification among Information Systems Personnel: An Exploratory Investigation of Post IT Outsourcing Personnel ImpactsChristina N. Outlay, Renee M. E. Pratt, Randy V. Bradley, Donald E. Wynn Jr.. 5142-5151 [doi]
- The Influences of Employees' Emotions and Cognition on IT Adoption: Some Perspectives from IranArmin Kashefi, Pamela Abbott. 5152-5161 [doi]
- What Influences IT Professional Psychological Contract Violation?Cynthia K. Riemenschneider, Deborah J. Armstrong. 5162-5172 [doi]
- Are We Becoming Socially Impaired? Computer-Mediated Communication, Human Evolution, and Social CapitalSaggi Nevo, Ned Kock. 5174-5183 [doi]
- Conceptualizing the Organizational IT Artifact via the Construct of Organizational IntegrationAlain Pinsonneault, Henri Barki. 5184-5193 [doi]
- Developing Interfield Nomological NetsKai R. Larsen, Dirk S. Hovorka. 5194-5203 [doi]
- Discovering the Multifaceted Roles of Information Technologies with a Holistic Configurational Theory ApproachYoungki Park, Omar A. El Sawy. 5204-5212 [doi]
- On Countering Methods Erosion: Contributing towards Stronger and More Empirically Grounded Information Systems TheoryThomas Østerlie. 5213-5222 [doi]
- Computing Requirements: Cognitive Approaches to Distributed Requirements EngineeringSean W. Hansen, William N. Robinson, Kalle Lyytinen. 5224-5233 [doi]
- Linking Relevance to Practical SignificanceAllen S. Lee, Kaveh Mohajeri. 5234-5240 [doi]
- Merging Conceptual Modeling and Law for Legally Compliant Information Systems Design-A Framework-Based Research AgendaJörg Becker, Mathias Eggert, Marcel Heddier, Ralf Knackstedt. 5241-5250 [doi]
- Organizing for Digital Infrastructure Innovation: The Interplay of Initiated and Sustained AttentionJennifer L. Claggett, Nicholas Berente. 5251-5260 [doi]
- Using Deterrence to Mitigate Employee Internet AbuseMorgan M. Shepherd, Gary Klein. 5261-5266 [doi]
- Working under Grey Skies: Information Systems Development and Organizational Identity in a Post-merger ContextDragos Vieru, Suzanne Rivard. 5267-5276 [doi]
- Agile Values, Innovation and the Shortage of Women Software DevelopersKen H. Judy. 5279-5288 [doi]
- Automated Acceptance Testing as an Agile Requirements Engineering PracticeBørge Haugset, Tor Stålhane. 5289-5298 [doi]
- Identifying Common Characteristics in Fundamental, Integrated, and Agile Software Development MethodologiesSebastian Dyck, Tim A. Majchrzak. 5299-5308 [doi]
- Scrum Practice Mitigation of Global Software Development Coordination Challenges: A Distinctive Advantage?Paul L. Bannerman, Emam Hossain, D. Ross Jeffery. 5309-5318 [doi]
- The Many Lives of an Agile Story: Design Processes, Design Products, and Understandings in a Large-Scale Agile Development ProjectAaron Read, Robert O. Briggs. 5319-5328 [doi]
- Towards a Framework for Assessing AgilityK. M. Poonacha, Subir Bhattacharya. 5329-5338 [doi]
- Analyzing Workflows in Business Processes for Obstructions due to Authorization PoliciesNick Spear, Sreekanth Malladi, Sandeep Lakkaraju. 5340-5349 [doi]
- Business Process Mining and Reconstruction for Financial AuditsMichael Werner, Nick Gehrke, Markus Nüttgens. 5350-5359 [doi]
- Determining Software Product Release Readiness by the Change-Error Correlation Function: On the Importance of the Change-Error Time LagRoman Wild, Philipp Brune. 5360-5367 [doi]
- Foundations for Software AssuranceCarol Woody, Nancy R. Mead, Daniel Shoemaker. 5368-5374 [doi]
- Hardware-Assisted Application Integrity MonitorJiang Wang, Kun Sun, Angelos Stavrou. 5375-5383 [doi]
- Improving Security Assurance of Embedded Systems through Systemic Dissolution of Architected ResourcesMichael D. Wilder, Robert Rinker. 5384-5392 [doi]
- Android: Static Analysis Using Similarity DistanceAnthony Desnos. 5394-5403 [doi]
- Cyber Crime AssessmentPeter Stephenson, Richard Walter. 5404-5413 [doi]
- Including Stakeholder Perspectives in Digital Forensic ProgramsColin Armstrong. 5414-5423 [doi]
- Novel Anti-forensics Approaches for Smart PhonesShiva Azadegan, Wei Yu, Hui Liu, Ali Sistani, Subrata Acharya. 5424-5431 [doi]
- STAAF: Scaling Android Application Analysis with a Modular FrameworkRyan W. Smith, Adam Pridgen. 5432-5440 [doi]
- Effect of Task Mental Models on Software Developer's Performance: An Experimental InvestigationVenugopal Balijepally, Sridhar P. Nerur, RadhaKanta Mahapatra. 5442-5451 [doi]
- Investigating the Long-Term Acceptance of Agile Methodologies: An Empirical Study of Developer Perceptions in Scrum ProjectsSven Overhage, Sebastian Schlauderer. 5452-5461 [doi]
- A New Deliberation Mechanism for Service-Oriented Operating SystemsJavier Palanca Cámara, Martí Navarro, Ana García-Fornes, Vicente Julián. 5463-5472 [doi]
- Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the CloudBrian Hay, Kara L. Nance, Matt Bishop, Lucas McDaniel. 5473-5479 [doi]
- Challenges in Cross-Organizational Security ManagementStefan Thalmann, Daniel Bachlechner, Lukas Demetz, Ronald Maier. 5480-5489 [doi]
- Cloud Computing Security: From Single to Multi-cloudsMohammed Abdullatif Alzain, Eric Pardede, Ben Soh, James A. Thom. 5490-5499 [doi]
- Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing EnvironmentHassan Takabi, James B. D. Joshi. 5500-5508 [doi]
- Towards Cloud Computing SLA Risk Management: Issues and ChallengesJean-Henry Morin, Jocelyn Aubert, Benjamin Gâteau. 5509-5514 [doi]
- An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management SystemsYikun Lu, Timo Käkölä. 5516-5525 [doi]
- Lightweight Introduction of EAST-ADL2 in an Automotive Software Product LineAndrea Leitner, Nermin Kajtazovic, Roland Mader, Christian Kreiner, Christian Steger, Reinhold Weiss. 5526-5535 [doi]
- Automated Behavior Computation for Software Analysis and ValidationMark G. Pleszkoch, Richard C. Linger, Stacy J. Prowell, Kirk Sayre, Luanne Burns. 5537-5545 [doi]
- Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service TenantsM. Brent Reynolds, Don R. Hulce, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins. 5546-5555 [doi]
- Effectiveness of Random Testing of Embedded SystemsPadmanabhan Krishnan, R. Venkatesh, Prasad Bokil, Tukaram Muske, P. Vijay Suman. 5556-5563 [doi]
- Effort Estimates for Vulnerability Discovery ProjectsTeodor Sommestad, Hannes Holm, Mathias Ekstedt. 5564-5573 [doi]
- New Trends in Security Evaluation of Bayesian Network-Based Malware Detection ModelsEric Filiol, Sébastien Josse. 5574-5583 [doi]
- On the Fault-Detection Capabilities of Adaptive Random Test Case Prioritization: Case Studies with Large Test SuitesZhi Quan Zhou, Arnaldo Sinaga, Willy Susilo. 5584-5593 [doi]
- Partitioning Trust in Network TestbedsGary Wong, Robert Ricci, Jonathon Duerig, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok. 5594-5602 [doi]
- Improving the Latency of VMExit Forwarding in Recursive Virtualization for the x86 ArchitectureWing-Chi Poon, Aloysius K. Mok. 5604-5612 [doi]
- Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering StudentsYoginder S. Dandass, Samuel T. Shannon, David A. Dampier. 5613-5622 [doi]
- Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services FirmsMinhua Yang, Yu Andy Wu. 5623-5630 [doi]
- Analysis and Evaluation of the German Toll System Using a Holistic Executable SpecificationBernd Pfitzinger, Tommy Baumann, Thomas Jestädt. 5632-5638 [doi]
- Precision Geolocation of Mobile WiMax Subscribers Using Timing Adjust MeasurementsRyan D. Whitty, Murali Tummala, John C. McEachen. 5639-5648 [doi]
- Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access ControlT. Owens Walker III, Murali Tummala, John C. McEachen. 5649-5658 [doi]
- The Impact of Temporal Factors on Mobility PatternsSara Gatmir-Motahari, Hui Zang, Phyllis Reuther. 5659-5668 [doi]
- Topology Skewing for Improved Route Selection in Wireless Multi-hop NetworksWinston Khoon Guan Seah, Alvin C. Valera, Pius W. Q. Lee, Yew Fai Wong. 5669-5678 [doi]
- Wireless Grids for Cultural Self-Preservation: Assessing E-Readiness in a Native American NationAngela Usha Ramnarine-Rieks, Lee W. McKnight, Gail Riina, Carlos Gardeazabal. 5679-5688 [doi]