default search action
Information Systems Frontiers, Volume 14
Volume 14, Number 1, March 2012
- Jens H. Weber-Jahnke, Liam Peyton, Thodoros Topaloglou:
eHealth system interoperability. 1-3 - Shagufta Umer, Muhammad Afzal, Maqbool Hussain, Khalid Latif, Hafiz Farooq Ahmad:
Autonomous mapping of HL7 RIM and relational database schema. 5-18 - Ellen Balka, Sandra Whitehouse, Shannon T. Coates, Dug Andrusiek:
Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions. 19-42 - Daisy Daiqin He, Jian Yang, Michael Compton, Kerry Taylor:
Authorization in cross-border eHealth systems. 43-55 - Payam Sadeghi, Morad Benyoucef, Craig E. Kuziemsky:
A mashup based framework for multi level healthcare interoperability. 57-72 - Alain Mouttham, Craig E. Kuziemsky, Dishant Langayan, Liam Peyton, José Pereira:
Interoperable support for collaborative, mobile, and accessible health care. 73-85 - Jens H. Weber-Jahnke, Christina Obry:
Protecting privacy during peer-to-peer exchange of medical documents. 87-104 - Hongqiao Yang, Weizi Li, Kecheng Liu, Junping Zhang:
Knowledge-based clinical pathway for medical quality improvement. 105-117
Volume 14, Number 2, April 2012
- Shazia Wasim Sadiq, Michael zur Muehlen, Marta Indulska:
Preface. 119-121 - Shazia Wasim Sadiq, Michael zur Muehlen, Marta Indulska:
Governance, risk and compliance: Applications in information systems. 123-124 - Susan V. Scott, Nicholas Perry:
The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry. 125-141 - G. R. Gangadharan, Vincenzo D'Andrea, Stefano De Paoli, Michael Weiss:
Managing license compliance in free and open source software development. 143-154 - Jörg Hoffmann, Ingo Weber, Guido Governatori:
On compliance checking for clausal constraints in annotated process models. 155-177 - Syaiful Ali, Peter F. Green:
Effective information technology (IT) governance mechanisms: An IT outsourcing perspective. 179-193 - Linh Thao Ly, Stefanie Rinderle-Ma, Kevin Göser, Peter Dadam:
On enabling integrated process compliance with semantic constraints in process management systems - Requirements, challenges, solutions. 195-219 - Tom Butler, Damien McGovern:
A conceptual model and IS framework for the design and adoption of environmental compliance management systems - For special issue on governance, risk and compliance in IS. 221-235 - Francis Kofi Andoh-Baidoo, Kweku-Muata Osei-Bryson, Kwasi Amoako-Gyampah:
Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework. 237-259 - Anastasiou Kartas, Sigi Goode:
Use, perceived deterrence and the role of software piracy in video game console adoption. 261-277 - Senaka Fernando, Jyoti Choudrie, Mark Lycett, Sergio de Cesare:
Hidden assumptions and their influence on clinicians' acceptance of new IT systems in the NHS. 279-299 - James Ma, Daniel Zeng, Huimin Zhao:
Modeling the growth of complex software function dependency networks. 301-315 - Agnès Voisard, Holger Ziekow:
Modeling trade-offs in the design of sensor-based event processing infrastructures. 317-330 - Seokjoo Andrew Chang:
Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue. 331-342 - Silke Retzer, Pak Yoong, Val A. Hooper:
Inter-organisational knowledge transfer in social networks: A definition of intermediate ties. 343-361 - Lan Xiao, Li Zheng:
Business process design: Process comparison and integration. 363-374 - Min-Jae Lee, JinKyu Lee:
The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. 375-393 - Shouhong Wang, Hai Wang:
Organizational schemata of e-portfolios for fostering higher-order thinking. 395-407 - Dan Jong Kim, Yujong Hwang:
A study of mobile internet user's service quality perceptions from a user's utilitarian and hedonic value tendency perspectives. 409-421 - Türker Tanergüçlü, Hakan Maras, Cevriye Gencer, Haluk Aygünes:
A decision support system for locating weapon and radar positions in stationary point air defence. 423-444 - Hwan-Joo Seo, Young Soo Lee, Jai-Joon Hur, Jin Ki Kim:
The impact of information and communication technology on skilled labor and organization types. 445-455 - Bobby Swar, Junghoon Moon, Junyoung Oh, Cheul Rhee:
Determinants of relationship quality for IS/IT outsourcing success in public sector. 457-475
Volume 14, Number 3, July 2012
- Shiguo Lian, Jean-Henry Morin, Stefanos Gritzalis, Gregory L. Heileman:
Special issue on ubiquitous multimedia services. 477-479 - Athanasios Loukas, Dimitrios Damopoulos, Sofia-Anna Menesidou, Maria Eleni Skarkala, Georgios Kambourakis, Stefanos Gritzalis:
MILC: A secure and privacy-preserving mobile instant locator with chatting. 481-497 - Ray-I Chang, Te-Chih Wang, Chia-Hui Wang, Jen-Chang Liu, Jan-Ming Ho:
Effective distributed service architecture for ubiquitous video surveillance. 499-515 - Yuan Dong, Shiguo Lian:
Automatic and fast temporal segmentation for personalized news consuming. 517-526 - Rodrigo Roman, Javier López, Olivier Dugeon, Marc Lacoste, Pierre Yves Plaza, Marta Bel:
Advanced secure multimedia services for digital homes. 527-540 - Emmanouil A. Panaousis, Christos Politis, Konstantinos Birkos, Christos A. Papageorgiou, Tasos Dagiuklas:
Security model for emergency real-time communications in autonomous networks. 541-553 - Evelina Pencheva, Ivaylo Atanasov:
Third party application control on quality of service in IP based multimedia networks. 555-569 - Mark Umberger, Satja Lumbar, Iztok Humar:
Modeling the influence of network delay on the user experience in distributed home-automation networks. 571-584 - Sayyen Teoh, Shan Ling Pan, Anand Ramchand:
Resource management activities in healthcare information systems: A process perspective. 585-600 - Seungwok Han, Hee Yong Youn, Ohyoung Song:
Efficient category-based service discovery on multi-agent platform. 601-616 - Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi:
Secure XML querying based on authorization graphs. 617-632 - Yung-Ming Li, Jhih-Hua Jhang-Li, Ting-Kai Hwang, Ping-Wen Chen:
Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost. 633-645 - Selwyn Piramuthu:
Vulnerabilities of RFID protocols proposed in ISF. 647-651 - Namho Lee, Jae Kwon Bae, Chulmo Koo:
A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment. 653-668 - Hamideh Afsarmanesh, Simon Samwel Msanjila, Luis M. Camarinha-Matos:
Technological research plan for active ageing. 669-692 - She-I Chang, David C. Yen, I-Cheng Chang, Jung-Chu Chou:
Study of the digital divide evaluation model for government agencies-a Taiwanese local government's perspective. 693-709 - Chunlin Li, Layuan Li:
Collaboration among mobile agents for efficient energy allocation in mobile grid. 711-723 - Maja Stula, Damir Krstinic, Ljiljana Seric:
Intelligent forest fire monitoring system. 725-739 - Gary F. Templeton, James F. Dowdy Jr.:
CASE-mediated organizational and deutero learning at NASA. 741-764 - Haluk Demirkan, Sagnika Sen, Michael Goul, Jason Nichols:
Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows. 765-788 - Jungyub Woo, Nenad Ivezic, Hyunbo Cho:
Agile test framework for business-to-business interoperability. 789-808 - Md. Enamul Kabir, Hua Wang, Elisa Bertino:
A role-involved purpose-based access control model. 809-822
Volume 14, Number 4, September 2012
- Jason J. Jung, Yue-Shan Chang, Ying Liu, Chao-Chin Wu:
Advances in intelligent grid and cloud computing. 823-825 - Iñigo Goiri, Jordi Guitart, Jordi Torres:
Economic model of a Cloud provider operating in a federated Cloud. 827-843 - Oleksiy Mazhelis, Pasi Tyrväinen:
Economic aspects of hybrid cloud infrastructure: User organization perspective. 845-869 - Benedikt Martens, Frank Teuteberg:
Decision-making in cloud computing environments: A cost and risk based approach. 871-893 - Kuan-Chou Lai, You-Fu Yu:
A scalable multi-attribute hybrid overlay for range queries on the cloud. 895-908 - Yue-Shan Chang, Ruey-Kai Sheu, Shyan-Ming Yuan, Jyn-Jie Hsu:
Scaling database performance on GPUs. 909-924 - J. Octavio Gutiérrez-García, Kwang Mong Sim:
GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications. 925-951 - Jason J. Jung:
ContextGrid: A contextual mashup-based collaborative browsing system. 953-961
Volume 14, Number 5, December 2012
- Ram Ramesh, H. Raghav Rao:
Information systems frontiers editorial December 2012. 963-965 - Kenneth J. Arrow:
Economic theory and the financial crisis. 967-970 - Hangjung Zo, Derek L. Nazareth, Hemant K. Jain:
End-to-end reliability of service oriented applications. 971-986 - Chunlin Li, Layuan Li:
An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment. 987-998 - Alejandro Rodríguez González, Ricardo Colomo Palacios, Fernando Guldrís-Iglesias, Juan Miguel Gómez-Berbís, Ángel García-Crespo:
FAST: Fundamental Analysis Support for Financial Statements. Using semantics for trading recommendations. 999-1017 - Chi-Lun Liu, Heng-Li Yang:
Applying ontology-based blog to detect information system post-development change requests conflicts. 1019-1032 - Probir Kumar Banerjee, Louis C. K. Ma:
Routinisation of B2B E-commerce by small firms: A process perspective. 1033-1046 - Yong Jin Kim, Seokwoo Song, Vallabh Sambamurthy, Young Lyoul Lee:
Entrepreneurship, knowledge integration capability, and firm performance: An empirical study. 1047-1060 - Kamil Reddy, H. S. Venter, Martin S. Olivier:
Using time-driven activity-based costing to manage digital forensic readiness in large organisations. 1061-1077 - Barry A. Cumbie, Chetan S. Sankar:
Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process. 1079-1094 - Namho Lee, Jae Kwon Bae, Chulmo Koo:
Erratum to: A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment. 1095
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.