


default search action
Information Systems Frontiers, Volume 12
Volume 12, Number 1, March 2010
- Marijn Janssen

, JinKyu Lee, Nitesh Bharosa
, Anthony M. Cresswell:
Advances in multi-agency disaster management: Key elements in disaster research. 1-7 - Edgar A. Maldonado, Carleen F. Maitland, Andrea Hoplight Tapia:

Collaborative systems development in disaster relief: The impact of multi-level governance. 9-27 - Dickson K. W. Chiu

, Drake T. T. Lin, Eleanna Kafeza
, Minhong Wang
, Haiyang Hu, Hua Hu, Yi Zhuang:
Alert based disaster notification and resource allocation. 29-47 - Nitesh Bharosa

, JinKyu Lee, Marijn Janssen
:
Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises. 49-65 - Minu Ipe, T. S. Raghu, Ajay S. Vinze:

Information intermediaries for emergency preparedness and response: A case study from public health. 67-79 - Jane Fedorowicz

, Janis L. Gogan:
Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system. 81-95
Volume 12, Number 2, April 2010
- Vincenza Carchiolo

, Sebastiano D'Ambra, Alessandro Longheu
, Michele Malgeri:
Object-oriented re-engineering of manufacturing models: A case study. 97-114 - Ebrahim Bagheri

, Ali A. Ghorbani:
UML-CI: A reference model for profiling critical infrastructure systems. 115-139 - Li Wang, Lida Xu, Renjing Liu, Hai-Hong Wang:

An approach for moving object recognition based on BPR and CI. 141-148 - Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu:

An SVM-based machine learning method for accurate internet traffic classification. 149-156 - Arnold Kamis

, Tziporah Stern, Daniel M. Ladik:
A flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce. 157-168 - Sven Laumer, Andreas Eckhardt, Natascha Trunk:

Do as your parents say? - Analyzing IT adoption influencing factors for full and under age applicants. 169-183 - Jahyun Goo:

Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement. 185-205 - Yogesh Kumar Dwivedi

, Anastasia Papazafeiropoulou, Willem-Paul Brinkman
, Banita Lal:
Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider. 207-217 - Ravi Patnayakuni, Cynthia P. Ruppel:

A socio-technical approach to improving the systems development process. 219-234
Volume 12, Number 3, July 2010
- Devaki Rau, Thorvald Haerem, Gautam Ray, Wei Zheng:

Guest editorial for the special section on "Technology acceptance, usage, and competitive advantage". 235-237 - Jun Tian, Kanliang Wang, Yan Chen

, Björn Johansson
:
From IT deployment capabilities to competitive advantage: An exploratory study in China. 239-255 - Bendik Bygstad, Hans-Petter Aanby:

ICT infrastructure for innovation: A case study of the enterprise service bus approach. 257-265 - Petter Gottschalk:

Knowledge management technology for organized crime risk assessment. 267-275 - Jeanine Warisse Turner

, N. Lamar Reinsch:
Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages? 277-285 - Devaki Rau, Thorvald Haerem:

Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research. 287-297 - Ludwig Christian Schaupp, Lemuria D. Carter

:
The impact of trust, risk and optimism bias on E-file adoption. 299-309 - Xin Xu

, Will Wai-Kit Ma, Eric Wing Kuen See-To
:
Will mobile video become the killer application for 3G mobile Internet? a model of media convergence acceptance. 311-322 - Saggi Nevo, Michael R. Wade

, Wade D. Cook:
An empirical study of IT as a factor of production: The case of Net-enabled IT assets. 323-335 - Lily Sun, Khadidjatou Ousmanou, Matthew Cross:

An ontological modelling of user requirements for personalised information provision. 337-356
Volume 12, Number 4, September 2010
- Mariacarla Calzarossa

, Ivo De Lotto, Simon Rogerson
:
Ethics and information systems - Guest editors' introduction. 357-359 - Luisa Massari

:
Analysis of MySpace user profiles. 361-367 - Don Gotterbarn

:
The ethics of video games: Mayhem, death, and the training of the next generation. 369-377 - Ian Stoodley

, Christine Bruce, Sylvia L. Edwards:
Expanding ethical vistas of IT professionals. 379-387 - Barbara Begier:

Users' involvement may help respect social and ethical values and improve software quality. 389-397 - Gonçalo Jorge Morais da Costa, Nuno Sotero Alves da Silva

:
Knowledge versus content in e-learning: A philosophical discussion. 399-413 - Malik Aleem Ahmed, Jeroen van den Hoven:

Agents of responsibility - freelance web developers in web applications development. 415-424 - Matthew J. Warren

, Shona Leitch:
Hacker Taggers: A new type of hackers. 425-431 - Frances S. Grodzinsky, Andra Gumbus, Stephen Lilley:

Ethical implications of internet monitoring: A comparative study. 433-441 - Seung-Hyun Rhee, Nam Wook Cho, Hyerim Bae:

Increasing the efficiency of business processes using a theory of constraints. 443-455 - Alex Norta

, Rik Eshuis
:
Specification and verification of harmonized business-process collaborations. 457-479
Volume 12, Number 5, November 2010
- Quan Z. Sheng

, Sherali Zeadally, Zongwei Luo
, Jen-Yao Chung, Zakaria Maamar
:
Guest editorial: Advances in RFID technology. 481-483 - Quan Z. Sheng

, Sherali Zeadally, Zongwei Luo
, Jen-Yao Chung, Zakaria Maamar
:
Ubiquitous RFID: Where are we? 485-490 - Aikaterini Mitrokotsa

, Melanie R. Rieback, Andrew S. Tanenbaum:
Classifying RFID attacks and defenses. 491-505 - Yanjun Zuo:

Secure and private search protocols for RFID systems. 507-519 - Shijie Zhou, Zhen Zhang, Zongwei Luo

, Edward C. Wong:
A lightweight anti-desynchronization RFID authentication protocol. 521-528 - Joachim Schwieren, Gottfried Vossen:

ID-Services: an RFID middleware architecture for mobile applications. 529-539 - Holger Ziekow, Oliver Günther

:
Sharing RFID and complex event data among organizations. 541-549 - Arijit Sengupta

, Shu Z. Schiller:
FlexRFID: A design, development and deployment framework for RFID-based business applications. 551-562 - Shengguang Meng, Dickson K. W. Chiu

, Eleanna Kafeza
, Liu Wenyin, Qing Li
:
Automated management of assets based on RFID triggered alarm messages. 563-578 - Shailaja Venkatsubramanyan, Timothy R. Hill:

An empirical investigation into the effects of web search characteristics on decisions associated with impression formation. 579-593 - Young Mee Shin, Seung Chang Lee, Bongsik Shin

, Ho Geun Lee:
Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes. 595-606 - Min Gao

, Kecheng Liu, Zhongfu Wu:
Personalisation in web computing and informatics: Theories, techniques, applications, and future research. 607-629 - Emilio Alvarez-Suescun:

Combining transaction cost and resource-based insights to explain IT implementation outsourcing. 631-645

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














