


default search action
Information Systems and E-Business Management, Volume 10
Volume 10, Number 1, March 2012
- Preface to the focus theme section: collaborative value creation in e-business management. 1-3

- Dirk Riehle:

The single-vendor commercial open course business model. 5-17 - Kelly A. Lyons, Paul R. Messinger

, Run H. Niu, Eleni Stroulia
:
A tale of two pricing systems for services. 19-42 - Torsten Schaper:

Organising equity exchanges. 43-60 - Martin Gneiser, Julia Heidemann, Mathias Klier, Andrea Landherr, Florian Probst:

Valuation of online social networks taking into account users' interconnectedness. 61-84 - Dennis Kundisch

, Robin Zorzi:
Enhancing the quality of financial advice with web 2.0: an approach considering social capital in private asset allocation. 85-99 - Markus Ruch, Stefan Sackmann:

Integrating management of customer value and risk in e-commerce. 101-116 - Jochen Kokemüller, Heiko Roßnagel

:
Secure mobile sales force automation: the case of independent sales agencies. 117-133 - Yun Wan

, Makoto Nakayama, Norma G. Sutcliffe:
The impact of age and shopping experiences on the classification of search, experience, and credence goods in online shopping. 135-148 - Stefan Tams:

Toward holistic insights into trust in electronic markets: examining the structure of the relationship between vendor trust and its antecedents. 149-160
Volume 10, Number 2, June 2012
- Dongsong Zhang, Wenji Mao, Justin Zhan, Daniel Zeng:

Editorial: special issue on "social computing and e-business". 161-163 - Hemant K. Jain, Cheng Thao, Huimin Zhao:

Enhancing electronic medical record retrieval through semantic query expansion. 165-181 - Kai Li, Efosa C. Idemudia, Zhangxi Lin, Yang Yu:

A framework for intermediated online targeted advertising with banner ranking mechanism. 183-200 - Cheng-Hsien Yu, Shi-Jen Lin:

Web crawling and filtering for on-line auctions from a social network perspective. 201-218 - Dan J. Kim:

An investigation of the effect of online consumer trust on expectation, satisfaction, and post-expectation. 219-240 - Stefan Strecker, Ulrich Frank, David Heise, Heiko Kattenstroth:

MetricM: a modeling method in support of the reflective design and use of performance measurement systems. 241-276
Volume 10, Number 3, September 2012
- T. S. Raghu, H. Raghav Rao, Raj Sharman:

Exploring the grand challenges for next generation e-Business: selected papers from the workshop on e-Business 2009. 277-278 - Susan J. Winter

:
The rise of cyberinfrastructure and grand challenges for eCommerce. 279-293 - John Langford, Lihong Li, R. Preston McAfee, Kishore Papineni:

Cloud control: voluntary admission control for intranet traffic management. 295-308 - Huaxia Rui, Andrew B. Whinston:

Information or attention? An empirical study of user contribution on Twitter. 309-324 - Karthikeyan Umapathy

, Sandeep Purao
, John W. Bagby:
Empirical analysis of anticipatory standardization processes: a case study. 325-350 - Roumen Vragov, Richard D. Shang, Karl Reiner Lang:

Institutional dependencies in dynamic buyout price models for online auctions. 351-366 - Frank Edward Walter, Stefano Battiston

, Mahir Yildirim, Frank Schweitzer
:
Moving recommender systems from on-line commerce to retail stores. 367-393 - Boris Otto

, Kai M. Hüner, Hubert Österle:
Toward a functional reference model for master data quality management. 395-425 - Dirk Riehle:

Erratum to: The single-vendor commercial open source business model. 427
Volume 10, Number 4, December 2012
- Frederick T. Sheldon

, Jeffrey Todd McDonald:
Introduction to the special issue on cyber security and management. 429-431 - Anis Ben Aissa

, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Defining and computing a value based cyber-security measure. 433-453 - Ju An Wang, Minzhe Guo, Hao Wang, Linfeng Zhou:

Measuring and ranking attacks based on vulnerability analysis. 455-490 - Alper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton:

Behavioral analysis of botnets for threat intelligence. 491-519 - Rashmi Parthasarathy, Behrooz A. Shirazi, Nina M. Peterson, Wen-Zhan Song

, Ali R. Hurson
:
Management and security of remote sensor networks in hazardous environments using over the air programming. 521-548 - Chia-Lin Hsu, Kuo-Chien Chang, Mu-Chen Chen:

The impact of website quality on customer satisfaction and purchase intention: perceived playfulness and perceived flow as mediators. 549-570 - Boris Otto

, Erwin Folmer, Verena Ebner:
A characteristics framework for Semantic Information Systems Standards. 571-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














