default search action
Information Systems Frontiers, Volume 23
Volume 23, Number 1, February 2021
- Silvia Chiusano, Tania Cerquitelli, Robert Wrembel, Daniele Quercia:
Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science. 1-7 - Petar Jovanovic, Sergi Nadal, Oscar Romero, Alberto Abelló, Besim Bilalli:
Quarry: A User-centered Big Data Integration Platform. 9-33 - Pietro Michiardi, Damiano Carra, Sara Migliorini:
Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks. 35-51 - Giovanni Battista Gardino, Rosa Meo, Giuseppe Craparotta:
Multi-view Latent Learning Applied to Fashion Industry. 53-69 - Aria Ghora Prabono, Bernardo Nugroho Yahya, Seok-Lyong Lee:
Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition. 71-80 - Ciprian-Octavian Truica, Elena Simona Apostol, Jérôme Darmont, Ira Assent:
TextBenDS: a Generic Textual Data Benchmark for Distributed Systems. 81-100 - Ilaria Bordino, Andrea Ferretti, Francesco Gullo, Stefano Pascolutti:
GarNLP: A Natural Language Processing Pipeline for Garnishment Documents. 101-114 - Sebastián Vallejos, Diego Gabriel Alonso, Brian Caimmi, Luis Berdún, Marcelo Gabriel Armentano, Álvaro Soria:
Mining Social Networks to Detect Traffic Incidents. 115-134 - Funda Ustek-Spilda, Davide Vega, Matteo Magnani, Luca Rossi, Irina Shklovski, Sebastian Lehuede, Alison Powell:
A Twitter-Based Study of the European Internet of Things. 135-149 - Davy Preuveneers, Giuseppe Garofalo, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. 151-164 - Abdallah Khelil, Amin Mesmoudi, Jorge Galicia, Ladjel Bellatreche, Mohand-Saïd Hacid, Emmanuel Coquery:
Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing. 165-183 - José Paredes, Gerardo I. Simari, Maria Vanina Martinez, Marcelo A. Falappa:
NetDER: An Architecture for Reasoning About Malicious Behavior. 185-201 - Amine Ghrab, Oscar Romero, Sabri Skhiri, Esteban Zimányi:
TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes. 203-226 - Ekaterina Loginova, Stalin Varanasi, Günter Neumann:
Towards End-to-End Multilingual Question Answering. 227-241 - Claudia Diamantini, Paolo Lo Giudice, Domenico Potena, Emanuele Storti, Domenico Ursino:
An Approach to Extracting Topic-guided Views from the Sources of a Data Lake. 243-262
Volume 23, Number 2, April 2021
- Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. 263-267 - Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang:
HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks. 269-283 - Bin Xia, Yuxuan Bai, Junjie Yin, Yun Li, Jian Xu:
LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling. 285-298 - Krishna Chandra Roy, Qian Chen:
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification. 299-315 - Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu:
Incentive Mechanism for Rational Miners in Bitcoin Mining Pool. 317-327 - Mario Silic, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. 329-341 - A. J. Burns, Clay Posey, Tom L. Roberts:
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity. 343-360 - Eunkyung Kweon, Hansol Lee, Sangmi Chai, Kyeongwon Yoo:
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence. 361-373 - Qi Liu, Gengzhong Feng, Giri Kumar Tayi, Jun Tian:
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach. 375-389 - Stephan Berger, Björn Häckel, Lukas Häfner:
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems. 391-414 - Tan Trung Luong, Uthayasankar Sivarajah, Vishanth Weerakkody:
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence? 415-433 - Supavich (Fone) Pengnate, Rathindra Sarathy, Todd J. Arnold:
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation. 435-452 - Efpraxia D. Zamani, Nancy Pouloudi, George M. Giaglis, Jonathan Wareham:
Accommodating Practices During Episodes of Disillusionment with Mobile IT. 453-475 - Benjamin Clapham, Michael Siering, Peter Gomber:
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets. 477-494 - Maciej Grzenda, Jaroslaw Legierski:
Towards Increased Understanding of Open Data Use for Software Development. 495-513
Volume 23, Number 3, June 2021
- Zhen Zhao, Zong Min Ma, Li Yan:
An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM. 515-530 - Sahar Karimi:
Cross-visiting Behaviour of Online Consumers Across Retailers' and Comparison Sites, a Macro-Study. 531-542 - Mohammad Alamgir Hossain, Shams Rahman:
Investigating the Success of OGB in China: The Influence of Personality Traits. 543-559 - Palash Bera:
Interactions between Analysts in Developing Collaborative Conceptual Models. 561-573 - Farid Shirvani, Ghassan Beydoun, Pascal Perez, William Scott, Peter Campbell:
An Architecture Framework Approach for Complex Transport Projects. 575-595 - Farid Shirvani, Ghassan Beydoun, Pascal Perez, William Scott, Peter Campbell:
Correction to: An Architecture Framework Approach for Complex Transport Projects. 597 - Kim Fecher, Lauren McCarthy, Daniel E. Porreca, Niam Yaraghi:
Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices' Workflow. 599-605 - Mengyue Wang, Xin Li, Patrick Y. K. Chau:
Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context. 607-626 - Mahesh Balan U, Saji K. Mathew:
Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process. 627-647 - Hung-Pin Shih, Pei-Chen Sung:
Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance. 649-661 - Federico Iannacci, Colm Fearon, Kristine Pole:
From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs. 663-680 - Yen-Chun Chou, Benjamin B. M. Shao:
Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing. 681-694 - Zong-Chang Yang:
Vector Gravitation Clustering Networks. 695-707 - Adarsh Anand, Navneet Bhatt, Omar Hussain Alhazmi:
Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters. 709-722 - Naveena Prakasam, Louisa Huxtable-Thomas:
Reddit: Affordances as an Enabler for Shifting Loyalties. 723-751 - Amit V. Deokar, Jie Tao:
OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs. 753-772 - Chenglong Zhang, Nan Feng, Jianjian Chen, Dahui Li, Minqiang Li:
Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities. 773-790 - A. Geethapriya, S. Valli:
An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis. 791-805
Volume 23, Number 4, August 2021
- Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. 807-810 - R. K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal, Aniket Kuiri:
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models. 811-833 - Trupil Limbasiya, Sanjay Kumar Sahay, Bharath Sridharan:
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. 835-848 - Samir Talegaon, Ram Krishnan:
A Formal Specification of Access Control in Android with URI Permissions. 849-866 - Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak:
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning. 867-882 - Md. Farhan Haque, Ram Krishnan:
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. 883-896 - Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats. 897-913 - Rajesh Kumar Shrivastava, Chittaranjan Hota:
UnderTracker: Generating Robust Binaries Using Execution Flow Traces. 915-930 - Thi Tran, Rohit Valecha, Paul Rad, H. Raghav Rao:
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises. 931-939 - Abhipsa Pal, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage. 941-961 - Qun Chen, Ji-Wen Li, Jian-Guo Liu, Jingti Han, Yun Shi, Xunhua Guo:
Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending? 963-986 - Kuttimani Tamilmani, Nripendra P. Rana, Yogesh K. Dwivedi:
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2. 987-1005 - Anca Elena-Bucea, Frederico Cruz-Jesus, Tiago Oliveira, Pedro Simões Coelho:
Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union. 1007-1021 - Amir Hassan Zadeh, David Taylor, Margaret Bertsos, Timothy Tillman, Nasim Nosoudi, Scott Bruce:
Predicting Sports Injuries with Wearable Technology and Data Analysis. 1023-1037 - Abhishek Majumdar, Tapas Debnath, Arpita Biswas, Sandeep K. Sood, Krishna Lal Baishnab:
An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm). 1039-1056 - M. Vimalkumar, Jang Bahadur Singh, Sujeet Kumar Sharma:
Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations. 1057-1076
Volume 23, Number 5, September 2021
- Yuko Murayama, Hans Jochen Scholl, Dimiter Velev:
Information Technology in Disaster Risk Reduction. 1077-1081 - Eileen Young, Benigno Aguirre:
PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation. 1083-1096 - Milad Mirbabaie, Christian Ehnis, Stefan Stieglitz, Deborah Bunker, Tanja Rose:
Digital Nudging in Social Media Disaster Communication. 1097-1113 - Osamu Uchida, Sachi Tajima, Yoshitaka Kajita, Keisuke Utsu, Yuji Murakami, Sanetoshi Yamada:
Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation. 1115-1125 - Stathis G. Arapostathis:
A Methodology for Automatic Acquisition of Flood-event Management Information From Social Media: the Flood in Messinia, South Greece, 2016. 1127-1144 - Shalak Mendon, Pankaj Dutta, Abhishek Behl, Stefan Lessmann:
A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters. 1145-1168 - Ahmed Abouzeid, Ole-Christoffer Granmo, Christian Webersik, Morten Goodwin:
Learning Automata-based Misinformation Mitigation via Hawkes Processes. 1169-1188 - Tullio Tanzi, Matteo Bertolino:
Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation. 1189-1202 - Jun Sasaki, Makoto Kitsuya:
Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction. 1203-1211 - Terje Gjøsæter, Jaziar Radianti, Weiqin Chen:
Universal Design of ICT for Emergency Management from Stakeholders' Perspective. 1213-1225 - Lin-Chih Chen:
Interactive Topic Search System Based on Topic Cluster Technology. 1227-1243 - Ameni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa:
Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic. 1245-1271 - Patrick Mikalef, Kshitij Sharma, Ilias O. Pappas, Michail N. Giannakos:
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study. 1273-1286 - Navid Aghakhani, Onook Oh, Dawn G. Gregg, Jahangir Karimi:
Online Review Consistency Matters: An Elaboration Likelihood Model Perspective. 1287-1301 - Eleanna Kafeza, Christos Makris, Gerasimos Rompolas, Feras N. Al-Obeidat:
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter. 1303-1316 - Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari:
Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1317-1337 - Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari:
Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1339 - Arpan Kumar Kar:
What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the "Digital Service Usage Satisfaction Model". 1341-1361
Volume 23, Number 6, December 2021
- Victor Chang, Carole A. Goble, Muthu Ramachandran, Lazarus Jegatha Deborah, Reinhold Behringer:
Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19. 1363-1367 - R. Elakkiya, Pandi Vijayakumar, Marimuthu Karuppiah:
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking. 1369-1383 - Prabhdeep Singh, Rajbir Kaur, Kiran Deep Singh, Gaurav Dhiman:
A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients. 1385-1401 - Longling Zhang, Bochen Shen, Ahmed Barnawi, Shan Xi, Neeraj Kumar, Yi Wu:
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia. 1403-1415 - Harleen Kaur, Shafqat Ul Ahsaan, Bhavya Alankar, Victor Chang:
A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets. 1417-1429 - Jyoti Choudrie, Shruti Patil, Ketan Kotecha, Nikhil Matta, Ilias O. Pappas:
Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study. 1431-1465 - Francesco Piccialli, Vincenzo Schiano Di Cola, Fabio Giampaolo, Salvatore Cuomo:
The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic. 1467-1497 - Raed Salah Algharabat, Nripendra P. Rana:
Social Commerce in Emerging Markets and its Impact on Online Community Engagement. 1499-1520 - Neeru Malhotra, Sunil Sahadev, P. S. H. Leeflang, Keyoor Purani:
New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis. 1521-1536 - Grace Fox, Tabitha L. James:
Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study. 1537-1562 - Daniel Chandran, Abdullah Alammari:
Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia. 1563-1572 - Cancan Wang, Rony Medaglia, Tina Blegind Jensen:
When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology. 1573-1591 - Ashish Kumar Jha, Indranil Bose:
Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships. 1593-1607 - Kjell Hausken, Jonathan W. Welburn:
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. 1609-1620 - Steven D. Silver:
Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS. 1621-1642
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.