default search action
ACM Transactions on Management Information Systems, Volume 5
Volume 5, Number 1, April 2014
- Joyce C. Ho, Cheng H. Lee, Joydeep Ghosh:
Septic Shock Prediction for Patients with Missing Data. 1:1-1:15 - Christopher C. Yang, Haodong Yang, Ling Jiang:
Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media. 2:1-2:21 - Salah Bouktif, Houari A. Sahraoui, Faheem Ahmed:
Predicting Stability of Open-Source Software Systems Using Combination of Bayesian Classifiers. 3:1-3:26 - Lihua Huang, Sulin Ba, Xianghua Lu:
Building Online Trust in a Culture of Confucianism: The Impact of Process Flexibility and Perceived Control. 4:1-4:23 - M. Lisa Yeo, Erik Rolland, Jackie Rees Ulmer, Raymond A. Patterson:
Risk Mitigation Decisions for IT Security. 5:1-5:21
Volume 5, Number 2, July 2014
- Seymour E. Goodman:
Building the Nation's Cyber Security Workforce: Contributions from the CAE Colleges and Universities. 6:1-6:9 - Suruchi Deodhar, Keith R. Bisset, Jiangzhuo Chen, Yifei Ma, Madhav V. Marathe:
An Interactive, Web-Based High Performance Modeling Environment for Computational Epidemiology. 7:1-7:27 - Patty Kostkova, Martin Szomszor, Connie St. Luis:
#swineflu: The Use of Twitter as an Early Warning and Risk Communication Tool in the 2009 Swine Flu Pandemic. 8:1-8:25 - Chih-Fong Tsai, Zen-Yu Quan:
Stock Prediction by Searching for Similarities in Candlestick Charts. 9:1-9:21
Volume 5, Number 3, January 2015
- Matthias Jarke, Kalle Lyytinen:
Editorial: "Complexity of Systems Evolution: Requirements Engineering Perspective". 11:1-11:7 - Gilbert Fridgen, Julia Klier, Martina Beer, Thomas Wolf:
Improving Business Value Assurance in Large-Scale IT Projects - A Quantitative Method Based on Founded Requirements Assessment. 12:1-12:17 - John Leslie King, Carl P. Simon:
Complications with Complexity in Requirements. 13:1-13:12 - Suranjan Chakraborty, Christoph Rosenkranz, Josh Dehlinger:
Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering. 14:1-14:30 - Md. Rashed Iqbal Nekvi, Nazim H. Madhavji:
Impediments to Regulatory Compliance of Requirements in Contractual Systems Engineering Projects: A Case Study. 15:1-15:35 - Radhika Jain, Lan Cao, Kannan Mohan, Balasubramaniam Ramesh:
Situated Boundary Spanning: An Empirical Investigation of Requirements Engineering Practices in Product Family Development. 16:1-16:29 - Ivan Jureta, Alexander Borgida, Neil A. Ernst, John Mylopoulos:
The Requirements Problem for Adaptive Systems. 17:1-17:33
Volume 5, Number 4, January 2015
- G. Alan Wang, Harry Jiannan Wang, Jiexun Li, Alan S. Abrahams, Weiguo Fan:
An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q&A Communities. 18:1-18:31 - Andrew Partington, Moe Thandar Wynn, Suriadi Suriadi, Chun Ouyang, Jonathan Karnon:
Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals. 19:1-19:18 - Jiaqi Yan, Daning Hu, Stephen S. Y. Liao, Huaiqing Wang:
Mining Agents' Goals in Agent-Oriented Business Processes. 20:1-20:22 - Thushari P. Silva, Jian Ma, Yang Chen:
Process Analytics Approach for R&D Project Selection. 21:1-21:34 - Xitong Guo, Sherry X. Sun, Doug Vogel:
A Dataflow Perspective for Business Process Integration. 22:1-22:33 - Jie Jiang, Huib Aldewereld, Virginia Dignum, Yao-Hua Tan:
Compliance Checking of Organizational Interactions. 23:1-23:24 - Claudio Di Ciccio, Massimo Mecella:
On the Discovery of Declarative Control Flows for Artful Processes. 24:1-24:37 - Thorben Keller, Frédéric Thiesse, Elgar Fleisch:
Classification Models for RFID-Based Real-Time Detection of Process Events in the Supply Chain: An Empirical Study. 25:1-25:30
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.