


default search action
Information Systems Frontiers, Volume 23
Volume 23, Number 1, February 2021
- Silvia Chiusano, Tania Cerquitelli, Robert Wrembel
, Daniele Quercia
:
Breakthroughs on Cross-Cutting Data Management, Data Analytics, and Applied Data Science. 1-7 - Petar Jovanovic
, Sergi Nadal
, Oscar Romero
, Alberto Abelló, Besim Bilalli
:
Quarry: A User-centered Big Data Integration Platform. 9-33 - Pietro Michiardi, Damiano Carra
, Sara Migliorini:
Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks. 35-51 - Giovanni Battista Gardino, Rosa Meo
, Giuseppe Craparotta:
Multi-view Latent Learning Applied to Fashion Industry. 53-69 - Aria Ghora Prabono
, Bernardo Nugroho Yahya, Seok-Lyong Lee:
Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition. 71-80 - Ciprian-Octavian Truica
, Elena Simona Apostol
, Jérôme Darmont, Ira Assent
:
TextBenDS: a Generic Textual Data Benchmark for Distributed Systems. 81-100 - Ilaria Bordino, Andrea Ferretti, Francesco Gullo
, Stefano Pascolutti:
GarNLP: A Natural Language Processing Pipeline for Garnishment Documents. 101-114 - Sebastián Vallejos
, Diego Gabriel Alonso, Brian Caimmi, Luis Berdún, Marcelo Gabriel Armentano, Álvaro Soria:
Mining Social Networks to Detect Traffic Incidents. 115-134 - Funda Ustek-Spilda, Davide Vega
, Matteo Magnani
, Luca Rossi, Irina Shklovski
, Sebastián Lehuedé
, Alison Powell
:
A Twitter-Based Study of the European Internet of Things. 135-149 - Davy Preuveneers
, Giuseppe Garofalo
, Wouter Joosen:
Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom. 151-164 - Abdallah Khelil, Amin Mesmoudi
, Jorge Galicia, Ladjel Bellatreche, Mohand-Saïd Hacid, Emmanuel Coquery:
Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing. 165-183 - José Paredes, Gerardo I. Simari, Maria Vanina Martinez, Marcelo A. Falappa
:
NetDER: An Architecture for Reasoning About Malicious Behavior. 185-201 - Amine Ghrab
, Oscar Romero
, Sabri Skhiri, Esteban Zimányi:
TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes. 203-226 - Ekaterina Loginova
, Stalin Varanasi, Günter Neumann:
Towards End-to-End Multilingual Question Answering. 227-241 - Claudia Diamantini, Paolo Lo Giudice, Domenico Potena, Emanuele Storti
, Domenico Ursino:
An Approach to Extracting Topic-guided Views from the Sources of a Data Lake. 243-262
Volume 23, Number 2, April 2021
- Shouhuai Xu, Moti Yung, Jingguo Wang
:
Seeking Foundations for the Science of Cyber Security. 263-267 - Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang:
HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks. 269-283 - Bin Xia
, Yuxuan Bai, Junjie Yin, Yun Li, Jian Xu:
LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling. 285-298 - Krishna Chandra Roy
, Qian Chen
:
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification. 299-315 - Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu:
Incentive Mechanism for Rational Miners in Bitcoin Mining Pool. 317-327 - Mario Silic
, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. 329-341 - A. J. Burns
, Clay Posey, Tom L. Roberts:
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity. 343-360 - Eunkyung Kweon, Hansol Lee, Sangmi Chai, Kyeongwon Yoo:
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence. 361-373 - Qi Liu, Gengzhong Feng, Giri Kumar Tayi, Jun Tian:
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach. 375-389 - Stephan Berger, Björn Häckel, Lukas Häfner
:
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems. 391-414 - Tan Trung Luong
, Uthayasankar Sivarajah
, Vishanth Weerakkody:
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence? 415-433 - Supavich (Fone) Pengnate, Rathindra Sarathy
, Todd J. Arnold:
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation. 435-452 - Efpraxia D. Zamani
, Nancy Pouloudi
, George M. Giaglis, Jonathan Wareham:
Accommodating Practices During Episodes of Disillusionment with Mobile IT. 453-475 - Benjamin Clapham
, Michael Siering
, Peter Gomber:
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets. 477-494 - Maciej Grzenda
, Jaroslaw Legierski:
Towards Increased Understanding of Open Data Use for Software Development. 495-513
Volume 23, Number 3, June 2021
- Zhen Zhao, Zong Min Ma
, Li Yan:
An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM. 515-530 - Sahar Karimi
:
Cross-visiting Behaviour of Online Consumers Across Retailers' and Comparison Sites, a Macro-Study. 531-542 - Mohammad Alamgir Hossain
, Shams Rahman
:
Investigating the Success of OGB in China: The Influence of Personality Traits. 543-559 - Palash Bera
:
Interactions between Analysts in Developing Collaborative Conceptual Models. 561-573 - Farid Shirvani, Ghassan Beydoun
, Pascal Perez
, William Scott, Peter Campbell:
An Architecture Framework Approach for Complex Transport Projects. 575-595 - Farid Shirvani, Ghassan Beydoun
, Pascal Perez
, William Scott, Peter Campbell:
Correction to: An Architecture Framework Approach for Complex Transport Projects. 597 - Kim Fecher, Lauren McCarthy, Daniel E. Porreca, Niam Yaraghi
:
Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices' Workflow. 599-605 - Mengyue Wang
, Xin Li
, Patrick Y. K. Chau:
Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context. 607-626 - Mahesh Balan U, Saji K. Mathew:
Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process. 627-647 - Hung-Pin Shih
, Pei-Chen Sung:
Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance. 649-661 - Federico Iannacci
, Colm Fearon, Kristine Pole:
From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs. 663-680 - Yen-Chun Chou, Benjamin B. M. Shao
:
Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing. 681-694 - Zong-Chang Yang
:
Vector Gravitation Clustering Networks. 695-707 - Adarsh Anand
, Navneet Bhatt
, Omar Hussain Alhazmi:
Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters. 709-722 - Naveena Prakasam
, Louisa Huxtable-Thomas
:
Reddit: Affordances as an Enabler for Shifting Loyalties. 723-751 - Amit V. Deokar
, Jie Tao:
OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs. 753-772 - Chenglong Zhang, Nan Feng, Jianjian Chen, Dahui Li, Minqiang Li:
Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities. 773-790 - A. Geethapriya, S. Valli
:
An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis. 791-805
Volume 23, Number 4, August 2021
- Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. 807-810 - R. K. Shyamasundar, Pratiksha Chaudhary, Arushi Jaiswal, Aniket Kuiri:
Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models. 811-833 - Trupil Limbasiya
, Sanjay Kumar Sahay, Bharath Sridharan:
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. 835-848 - Samir Talegaon
, Ram Krishnan
:
A Formal Specification of Access Control in Android with URI Permissions. 849-866 - Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak:
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning. 867-882 - Md. Farhan Haque
, Ram Krishnan
:
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. 883-896 - Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats. 897-913 - Rajesh Kumar Shrivastava
, Chittaranjan Hota
:
UnderTracker: Generating Robust Binaries Using Execution Flow Traces. 915-930 - Thi Tran
, Rohit Valecha, Paul Rad, H. Raghav Rao:
An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises. 931-939 - Abhipsa Pal
, Tejaswini C. Herath, Rahul De', H. Raghav Rao:
Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage. 941-961 - Qun Chen, Ji-Wen Li, Jian-Guo Liu
, Jingti Han, Yun Shi, Xunhua Guo
:
Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending? 963-986 - Kuttimani Tamilmani, Nripendra P. Rana, Yogesh K. Dwivedi
:
Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2. 987-1005 - Anca Elena-Bucea, Frederico Cruz-Jesus
, Tiago Oliveira
, Pedro Simões Coelho
:
Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union. 1007-1021 - Amir Hassan Zadeh, David Taylor, Margaret Bertsos, Timothy Tillman, Nasim Nosoudi
, Scott Bruce
:
Predicting Sports Injuries with Wearable Technology and Data Analysis. 1023-1037 - Abhishek Majumdar
, Tapas Debnath
, Arpita Biswas, Sandeep K. Sood
, Krishna Lal Baishnab:
An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm). 1039-1056 - M. Vimalkumar
, Jang Bahadur Singh, Sujeet Kumar Sharma
:
Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations. 1057-1076
Volume 23, Number 5, September 2021
- Yuko Murayama, Hans Jochen Scholl, Dimiter Velev:
Information Technology in Disaster Risk Reduction. 1077-1081 - Eileen Young
, Benigno Aguirre:
PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation. 1083-1096 - Milad Mirbabaie
, Christian Ehnis, Stefan Stieglitz, Deborah Bunker, Tanja Rose:
Digital Nudging in Social Media Disaster Communication. 1097-1113 - Osamu Uchida
, Sachi Tajima, Yoshitaka Kajita, Keisuke Utsu, Yuji Murakami, Sanetoshi Yamada:
Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation. 1115-1125 - Stathis G. Arapostathis
:
A Methodology for Automatic Acquisition of Flood-event Management Information From Social Media: the Flood in Messinia, South Greece, 2016. 1127-1144 - Shalak Mendon, Pankaj Dutta
, Abhishek Behl
, Stefan Lessmann
:
A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters. 1145-1168 - Ahmed Abouzeid
, Ole-Christoffer Granmo, Christian Webersik, Morten Goodwin:
Learning Automata-based Misinformation Mitigation via Hawkes Processes. 1169-1188 - Tullio Tanzi, Matteo Bertolino:
Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation. 1189-1202 - Jun Sasaki, Makoto Kitsuya:
Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction. 1203-1211 - Terje Gjøsæter
, Jaziar Radianti
, Weiqin Chen:
Universal Design of ICT for Emergency Management from Stakeholders' Perspective. 1213-1225 - Lin-Chih Chen:
Interactive Topic Search System Based on Topic Cluster Technology. 1227-1243 - Ameni Hbaieb, Mahdi Khemakhem
, Maher Ben Jemaa:
Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic. 1245-1271 - Patrick Mikalef
, Kshitij Sharma, Ilias O. Pappas
, Michail N. Giannakos:
Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study. 1273-1286 - Navid Aghakhani, Onook Oh
, Dawn G. Gregg
, Jahangir Karimi:
Online Review Consistency Matters: An Elaboration Likelihood Model Perspective. 1287-1301 - Eleanna Kafeza
, Christos Makris
, Gerasimos Rompolas
, Feras N. Al-Obeidat
:
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter. 1303-1316 - Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari
:
Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1317-1337 - Mohammad Soltani Delgosha, Tahereh Saheb, Nastaran Hajiheydari
:
Correction to: Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis. 1339 - Arpan Kumar Kar
:
What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the "Digital Service Usage Satisfaction Model". 1341-1361
Volume 23, Number 6, December 2021
- Victor Chang
, Carole A. Goble, Muthu Ramachandran, Lazarus Jegatha Deborah, Reinhold Behringer:
Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19. 1363-1367 - R. Elakkiya
, Pandi Vijayakumar
, Marimuthu Karuppiah
:
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking. 1369-1383 - Prabhdeep Singh
, Rajbir Kaur, Kiran Deep Singh
, Gaurav Dhiman
:
A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients. 1385-1401 - Longling Zhang, Bochen Shen
, Ahmed Barnawi, Shan Xi, Neeraj Kumar
, Yi Wu
:
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia. 1403-1415 - Harleen Kaur
, Shafqat Ul Ahsaan
, Bhavya Alankar, Victor Chang
:
A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets. 1417-1429 - Jyoti Choudrie
, Shruti Patil, Ketan Kotecha, Nikhil Matta, Ilias O. Pappas
:
Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study. 1431-1465 - Francesco Piccialli
, Vincenzo Schiano Di Cola, Fabio Giampaolo, Salvatore Cuomo
:
The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic. 1467-1497 - Raed Salah Algharabat
, Nripendra P. Rana
:
Social Commerce in Emerging Markets and its Impact on Online Community Engagement. 1499-1520 - Neeru Malhotra
, Sunil Sahadev
, P. S. H. Leeflang, Keyoor Purani
:
New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis. 1521-1536 - Grace Fox, Tabitha L. James
:
Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study. 1537-1562 - Daniel Chandran
, Abdullah Alammari:
Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia. 1563-1572 - Cancan Wang
, Rony Medaglia, Tina Blegind Jensen:
When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology. 1573-1591 - Ashish Kumar Jha
, Indranil Bose
:
Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships. 1593-1607 - Kjell Hausken
, Jonathan W. Welburn:
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. 1609-1620 - Steven D. Silver:
Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS. 1621-1642

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.