Abstract is missing.
- Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing TragedyJaeung Lee, Basma Abdul Rehman, Manish Agrawal, H. Raghav Rao. 1-14 [doi]
- Discovering the Voice from Travelers: A Sentiment Analysis for Online ReviewsWei-Lun Chang. 15-26 [doi]
- Design of Intelligent Agents for Supply Chain ManagementYoonsang Lee, Riyaz Sikora. 27-39 [doi]
- Investigating IT Standardization Process Through the Lens of Theory of Communicative ActionKarthikeyan Umapathy, Sandeep Purao, John W. Bagby. 40-53 [doi]
- Acquiring High Quality Customer Data with Low CostXiaoping Liu, Xiao-Bai Li. 54-65 [doi]
- The Mobile Internet as Antecedent for Down-Scoping Corporate Service PortfoliosClaudia Loebbecke, Virpi Kristiina Tuunainen, Stefan Cremer. 66-77 [doi]
- Who Is My Audience? Investigating Stakeholder Collapse in Online Social PlatformsUtku Pamuksuz, Sung Won Kim, Ramanath Subramanyam. 78-82 [doi]
- Does Self-promotion on Social Media Boost Career? Evidence from the Market for ExecutivesYanzhen Chen, Huaxia Rui, Andrew B. Whinston. 83-96 [doi]
- The Ethics of Online Social Network ForensicsJongwoo (Jonathan) Kim, Richard Baskerville, Yi Ding. 97-111 [doi]
- Digital Leadership Through Service Computing: Agility Driven by Interconnected System and Business ArchitecturesMohan Tanniru, Jiban Khuntia. 112-125 [doi]
- Are Online Reviewers Leaving? Heterogeneity in Reviewing BehaviorParastoo Samiei, Arvind K. Tripathi. 126-142 [doi]
- The Role of Web and E-Commerce in Poverty Reduction: A Framework Based on Ecological Systems TheoryDong-Heon Kwak, Hemant Jain. 143-154 [doi]
- Using Text Mining Analytics to Understand IT Internal Control WeaknessesPeiqin Zhang, Lucian L. Visinescu, Kexin Zhao, Ram L. Kumar. 155-160 [doi]
- Creating Realistic Synthetic Incident DataNico Rödder, Paul Karänke, Christof Weinhardt. 161-165 [doi]
- Rumor and Truth Spreading Patterns on Social Network Sites During Social Crisis: Big Data Analytics ApproachMehrdad Koohikamali, Dan J. Kim. 166-170 [doi]
- The Big Data Analysis of the Next Generation Video Surveillance System for Public SecurityZheng Xu, Zhiguo Yan, Lin Mei, Hui Zhang. 171-175 [doi]
- Wish Lists and Shopping Carts: A Study of Visual Metaphors on Arab E-Commerce WebsitesDivakaran Liginlal, Maryam Al-Fehani, Preetha Gopinath, Alex Cheek. 176-180 [doi]
- Creditworthiness Analysis in E-Financing Businesses - A Cross-Business ApproachKun Liang, Zhangxi Lin, Zelin Jia, Cuiqing Jiang, Jiangtao Qiu. 181-185 [doi]
- Empirical Investigation of Partnership and Mediating Effect of Mode of Partnership on Innovation Outcome of IT FirmsAshish Kumar Jha, Indranil Bose. 186-190 [doi]
- Privacy Calculus Theory and Its Applicability for Emerging TechnologiesAdrija Majumdar, Indranil Bose. 191-195 [doi]
- An IT Risk-Return Model to Study IT Governance of Indian FirmsManas Tripathi, Arunabha Mukhopadhyay, Indranil Bose. 196-201 [doi]
- Use of Ontologies in Information Systems DevelopmentOsama Bassam J. Rabie, Heinz Roland Weistroffer. 202-206 [doi]
- Framework for Using New Age Technology to Increase Effectiveness of Project Communication for Outsourced IT Projects Executed from OffshoreSuparna Dhar, Indranil Bose. 207-211 [doi]
- Does Too Much Regulation Kill the Online Gambling Industry?: An Empirical Analysis of Regulation Effects Using VAR ModelMoonkyoung Jang, Seongmin Jeon, Byungjoon Yoo, Jongil Kim, Chang Hee Han. 212-216 [doi]
- Developing and Evaluating a Readability Measure for Microblogging CommunicationMarten Risius, Theresia Pape. 217-221 [doi]
- Sharing Behavior in Online Social Media: An Empirical Analysis with Deep LearningDonghyuk Shin, Shu He, Gene Moo Lee, Andrew B. Whinston. 222-227 [doi]
- The Impact of Patient Web Portals on Readmissions Through IT Based Reminder SystemsYazan Alnsour, Jiban Khuntia. 228-232 [doi]
- Do Hedonic and Utilitarian Apps Differ in Consumer Appeal?Bidyut Hazarika, Jiban Khuntia, Madhavan Parthasarathy, Jahangir Karimi. 233-237 [doi]