Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isf/isf14.bht:"
@article{DBLP:journals/isf/AfsarmaneshMC12, author = {Hamideh Afsarmanesh and Simon Samwel Msanjila and Luis M. Camarinha{-}Matos}, title = {Technological research plan for active ageing}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {669--692}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9295-z}, doi = {10.1007/S10796-011-9295-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/AfsarmaneshMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/AliG12, author = {Syaiful Ali and Peter F. Green}, title = {Effective information technology {(IT)} governance mechanisms: An {IT} outsourcing perspective}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {179--193}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9183-y}, doi = {10.1007/S10796-009-9183-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/AliG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Andoh-BaidooOA12, author = {Francis Kofi Andoh{-}Baidoo and Kweku{-}Muata Osei{-}Bryson and Kwasi Amoako{-}Gyampah}, title = {Effects of firm and {IT} characteristics on the value of e-commerce initiatives: An inductive theoretical framework}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {237--259}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9234-4}, doi = {10.1007/S10796-010-9234-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Andoh-BaidooOA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Arrow12, author = {Kenneth J. Arrow}, title = {Economic theory and the financial crisis}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {967--970}, year = {2012}, url = {https://doi.org/10.1007/s10796-012-9370-0}, doi = {10.1007/S10796-012-9370-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Arrow12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/BalkaWCA12, author = {Ellen Balka and Sandra Whitehouse and Shannon T. Coates and Dug Andrusiek}, title = {Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {19--42}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9302-4}, doi = {10.1007/S10796-011-9302-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/BalkaWCA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/BanerjeeM12, author = {Probir Kumar Banerjee and Louis C. K. Ma}, title = {Routinisation of {B2B} E-commerce by small firms: {A} process perspective}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1033--1046}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9329-6}, doi = {10.1007/S10796-011-9329-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/BanerjeeM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ButlerM12, author = {Tom Butler and Damien McGovern}, title = {A conceptual model and {IS} framework for the design and adoption of environmental compliance management systems - For special issue on governance, risk and compliance in {IS}}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {221--235}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9197-5}, doi = {10.1007/S10796-009-9197-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ButlerM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Chang12, author = {Seokjoo Andrew Chang}, title = {Time dynamics of overlapping e-auction mechanisms: Information transfer, strategic user behavior and auction revenue}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {331--342}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9249-x}, doi = {10.1007/S10796-010-9249-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Chang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChangSYH12, author = {Yue{-}Shan Chang and Ruey{-}Kai Sheu and Shyan{-}Ming Yuan and Jyn{-}Jie Hsu}, title = {Scaling database performance on GPUs}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {909--924}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9322-0}, doi = {10.1007/S10796-011-9322-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ChangSYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChangWWLH12, author = {Ray{-}I Chang and Te{-}Chih Wang and Chia{-}Hui Wang and Jen{-}Chang Liu and Jan{-}Ming Ho}, title = {Effective distributed service architecture for ubiquitous video surveillance}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {499--515}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9255-z}, doi = {10.1007/S10796-010-9255-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ChangWWLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChangYCC12, author = {She{-}I Chang and David C. Yen and I{-}Cheng Chang and Jung{-}Chu Chou}, title = {Study of the digital divide evaluation model for government agencies-a Taiwanese local government's perspective}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {693--709}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9297-x}, doi = {10.1007/S10796-011-9297-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ChangYCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChebotkoCLF12, author = {Artem Chebotko and Seunghan Chang and Shiyong Lu and Farshad Fotouhi}, title = {Secure {XML} querying based on authorization graphs}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {617--632}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9289-2}, doi = {10.1007/S10796-010-9289-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ChebotkoCLF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/CumbieS12, author = {Barry A. Cumbie and Chetan S. Sankar}, title = {Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1079--1094}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9338-5}, doi = {10.1007/S10796-011-9338-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/CumbieS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/DemirkanSGN12, author = {Haluk Demirkan and Sagnika Sen and Michael Goul and Jason Nichols}, title = {Ensuring reliability in {B2B} services: Fault tolerant inter-organizational workflows}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {765--788}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9301-5}, doi = {10.1007/S10796-011-9301-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/DemirkanSGN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/DongL12, author = {Yuan Dong and Shiguo Lian}, title = {Automatic and fast temporal segmentation for personalized news consuming}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {517--526}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9256-y}, doi = {10.1007/S10796-010-9256-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/DongL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/FernandoCLC12, author = {Senaka Fernando and Jyoti Choudrie and Mark Lycett and Sergio de Cesare}, title = {Hidden assumptions and their influence on clinicians' acceptance of new {IT} systems in the {NHS}}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {279--299}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9238-0}, doi = {10.1007/S10796-010-9238-0}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/FernandoCLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GangadharanDPW12, author = {G. R. Gangadharan and Vincenzo D'Andrea and Stefano De Paoli and Michael Weiss}, title = {Managing license compliance in free and open source software development}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {143--154}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9180-1}, doi = {10.1007/S10796-009-9180-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/GangadharanDPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GoiriGT12, author = {I{\~{n}}igo Goiri and Jordi Guitart and Jordi Torres}, title = {Economic model of a Cloud provider operating in a federated Cloud}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {827--843}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9325-x}, doi = {10.1007/S10796-011-9325-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/GoiriGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/GonzalezPGBG12, author = {Alejandro Rodr{\'{\i}}guez Gonz{\'{a}}lez and Ricardo Colomo Palacios and Fernando Guldr{\'{\i}}s{-}Iglesias and Juan Miguel G{\'{o}}mez{-}Berb{\'{\i}}s and {\'{A}}ngel Garc{\'{\i}}a{-}Crespo}, title = {{FAST:} Fundamental Analysis Support for Financial Statements. Using semantics for trading recommendations}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {999--1017}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9321-1}, doi = {10.1007/S10796-011-9321-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/GonzalezPGBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Gutierrez-GarciaS12, author = {J. Octavio Guti{\'{e}}rrez{-}Garc{\'{\i}}a and Kwang Mong Sim}, title = {GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {925--951}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9327-8}, doi = {10.1007/S10796-011-9327-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/Gutierrez-GarciaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HanYS12, author = {Seungwok Han and Hee Yong Youn and Ohyoung Song}, title = {Efficient category-based service discovery on multi-agent platform}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {601--616}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9281-x}, doi = {10.1007/S10796-010-9281-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HanYS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HeYCT12, author = {Daisy Daiqin He and Jian Yang and Michael Compton and Kerry Taylor}, title = {Authorization in cross-border eHealth systems}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {43--55}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9316-y}, doi = {10.1007/S10796-011-9316-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HeYCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HoffmannWG12, author = {J{\"{o}}rg Hoffmann and Ingo Weber and Guido Governatori}, title = {On compliance checking for clausal constraints in annotated process models}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {155--177}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9179-7}, doi = {10.1007/S10796-009-9179-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/HoffmannWG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Jung12, author = {Jason J. Jung}, title = {ContextGrid: {A} contextual mashup-based collaborative browsing system}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {953--961}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9315-z}, doi = {10.1007/S10796-011-9315-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Jung12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/JungCLW12, author = {Jason J. Jung and Yue{-}Shan Chang and Ying Liu and Chao{-}Chin Wu}, title = {Advances in intelligent grid and cloud computing}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {823--825}, year = {2012}, url = {https://doi.org/10.1007/s10796-012-9349-x}, doi = {10.1007/S10796-012-9349-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/JungCLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/KabirWB12, author = {Md. Enamul Kabir and Hua Wang and Elisa Bertino}, title = {A role-involved purpose-based access control model}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {809--822}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9305-1}, doi = {10.1007/S10796-011-9305-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/KabirWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/KartasG12, author = {Anastasiou Kartas and Sigi Goode}, title = {Use, perceived deterrence and the role of software piracy in video game console adoption}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {261--277}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9236-2}, doi = {10.1007/S10796-010-9236-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/KartasG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/KimH12, author = {Dan Jong Kim and Yujong Hwang}, title = {A study of mobile internet user's service quality perceptions from a user's utilitarian and hedonic value tendency perspectives}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {409--421}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9267-8}, doi = {10.1007/S10796-010-9267-8}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/KimH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/KimSSL12, author = {Yong Jin Kim and Seokwoo Song and Vallabh Sambamurthy and Young Lyoul Lee}, title = {Entrepreneurship, knowledge integration capability, and firm performance: An empirical study}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1047--1060}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9331-z}, doi = {10.1007/S10796-011-9331-Z}, timestamp = {Sat, 18 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/KimSSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LaiY12, author = {Kuan{-}Chou Lai and You{-}Fu Yu}, title = {A scalable multi-attribute hybrid overlay for range queries on the cloud}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {895--908}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9328-7}, doi = {10.1007/S10796-011-9328-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LaiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LeeBK12, author = {Namho Lee and Jae Kwon Bae and Chulmo Koo}, title = {A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {653--668}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9294-0}, doi = {10.1007/S10796-011-9294-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LeeBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LeeBK12a, author = {Namho Lee and Jae Kwon Bae and Chulmo Koo}, title = {Erratum to: {A} case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1095}, year = {2012}, url = {https://doi.org/10.1007/s10796-012-9371-z}, doi = {10.1007/S10796-012-9371-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LeeBK12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LeeL12, author = {Min{-}Jae Lee and JinKyu Lee}, title = {The impact of information security failure on customer behaviors: {A} study on a large-scale hacking incident on the internet}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {375--393}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9253-1}, doi = {10.1007/S10796-010-9253-1}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LeeL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiJHC12, author = {Yung{-}Ming Li and Jhih{-}Hua Jhang{-}Li and Ting{-}Kai Hwang and Ping{-}Wen Chen}, title = {Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {633--645}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9290-9}, doi = {10.1007/S10796-010-9290-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LiJHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiL12, author = {Chunlin Li and Layuan Li}, title = {Collaboration among mobile agents for efficient energy allocation in mobile grid}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {711--723}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9298-9}, doi = {10.1007/S10796-011-9298-9}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LiL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiL12a, author = {Chunlin Li and Layuan Li}, title = {An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {987--998}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9310-4}, doi = {10.1007/S10796-011-9310-4}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LiL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LianMGH12, author = {Shiguo Lian and Jean{-}Henry Morin and Stefanos Gritzalis and Gregory L. Heileman}, title = {Special issue on ubiquitous multimedia services}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {477--479}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9263-z}, doi = {10.1007/S10796-010-9263-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LianMGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LiuY12, author = {Chi{-}Lun Liu and Heng{-}Li Yang}, title = {Applying ontology-based blog to detect information system post-development change requests conflicts}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1019--1032}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9314-0}, doi = {10.1007/S10796-011-9314-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LiuY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LoukasDMSKG12, author = {Athanasios Loukas and Dimitrios Damopoulos and Sofia{-}Anna Menesidou and Maria Eleni Skarkala and Georgios Kambourakis and Stefanos Gritzalis}, title = {{MILC:} {A} secure and privacy-preserving mobile instant locator with chatting}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {481--497}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9254-0}, doi = {10.1007/S10796-010-9254-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/LoukasDMSKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/LyRGD12, author = {Linh Thao Ly and Stefanie Rinderle{-}Ma and Kevin G{\"{o}}ser and Peter Dadam}, title = {On enabling integrated process compliance with semantic constraints in process management systems - Requirements, challenges, solutions}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {195--219}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9185-9}, doi = {10.1007/S10796-009-9185-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/LyRGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MaZZ12, author = {James Ma and Daniel Zeng and Huimin Zhao}, title = {Modeling the growth of complex software function dependency networks}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {301--315}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9239-z}, doi = {10.1007/S10796-010-9239-Z}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/MaZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MartensT12, author = {Benedikt Martens and Frank Teuteberg}, title = {Decision-making in cloud computing environments: {A} cost and risk based approach}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {871--893}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9317-x}, doi = {10.1007/S10796-011-9317-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MartensT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MazhelisT12, author = {Oleksiy Mazhelis and Pasi Tyrv{\"{a}}inen}, title = {Economic aspects of hybrid cloud infrastructure: User organization perspective}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {4}, pages = {845--869}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9326-9}, doi = {10.1007/S10796-011-9326-9}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/MazhelisT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/MoutthamKLPP12, author = {Alain Mouttham and Craig E. Kuziemsky and Dishant Langayan and Liam Peyton and Jos{\'{e}} Pereira}, title = {Interoperable support for collaborative, mobile, and accessible health care}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {73--85}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9296-y}, doi = {10.1007/S10796-011-9296-Y}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/MoutthamKLPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/PanaousisPBPD12, author = {Emmanouil A. Panaousis and Christos Politis and Konstantinos Birkos and Christos A. Papageorgiou and Tasos Dagiuklas}, title = {Security model for emergency real-time communications in autonomous networks}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {541--553}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9259-8}, doi = {10.1007/S10796-010-9259-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/PanaousisPBPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/PenchevaA12, author = {Evelina Pencheva and Ivaylo Atanasov}, title = {Third party application control on quality of service in {IP} based multimedia networks}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {555--569}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9257-x}, doi = {10.1007/S10796-010-9257-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/PenchevaA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Piramuthu12, author = {Selwyn Piramuthu}, title = {Vulnerabilities of {RFID} protocols proposed in {ISF}}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {647--651}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9291-8}, doi = {10.1007/S10796-010-9291-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Piramuthu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RameshR12, author = {Ram Ramesh and H. Raghav Rao}, title = {Information systems frontiers editorial December 2012}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {963--965}, year = {2012}, url = {https://doi.org/10.1007/s10796-012-9396-3}, doi = {10.1007/S10796-012-9396-3}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/RameshR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ReddyVO12, author = {Kamil Reddy and H. S. Venter and Martin S. Olivier}, title = {Using time-driven activity-based costing to manage digital forensic readiness in large organisations}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {1061--1077}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9333-x}, doi = {10.1007/S10796-011-9333-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ReddyVO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RetzerYH12, author = {Silke Retzer and Pak Yoong and Val A. Hooper}, title = {Inter-organisational knowledge transfer in social networks: {A} definition of intermediate ties}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {343--361}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9250-4}, doi = {10.1007/S10796-010-9250-4}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/RetzerYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/RomanLDLPB12, author = {Rodrigo Roman and Javier L{\'{o}}pez and Olivier Dugeon and Marc Lacoste and Pierre Yves Plaza and Marta Bel}, title = {Advanced secure multimedia services for digital homes}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {527--540}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9258-9}, doi = {10.1007/S10796-010-9258-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/RomanLDLPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SadeghiBK12, author = {Payam Sadeghi and Morad Benyoucef and Craig E. Kuziemsky}, title = {A mashup based framework for multi level healthcare interoperability}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {57--72}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9306-0}, doi = {10.1007/S10796-011-9306-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SadeghiBK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SadiqMI12, author = {Shazia Wasim Sadiq and Michael zur Muehlen and Marta Indulska}, title = {Preface}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {119--121}, year = {2012}, url = {https://doi.org/10.1007/s10796-012-9353-1}, doi = {10.1007/S10796-012-9353-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/SadiqMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SadiqMI12a, author = {Shazia Wasim Sadiq and Michael zur Muehlen and Marta Indulska}, title = {Governance, risk and compliance: Applications in information systems}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {123--124}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9320-2}, doi = {10.1007/S10796-011-9320-2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/SadiqMI12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ScottP12, author = {Susan V. Scott and Nicholas Perry}, title = {The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {125--141}, year = {2012}, url = {https://doi.org/10.1007/s10796-009-9223-7}, doi = {10.1007/S10796-009-9223-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ScottP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SeoLHK12, author = {Hwan{-}Joo Seo and Young Soo Lee and Jai{-}Joon Hur and Jin Ki Kim}, title = {The impact of information and communication technology on skilled labor and organization types}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {445--455}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9276-7}, doi = {10.1007/S10796-010-9276-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SeoLHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/StulaKS12, author = {Maja Stula and Damir Krstinic and Ljiljana Seric}, title = {Intelligent forest fire monitoring system}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {725--739}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9299-8}, doi = {10.1007/S10796-011-9299-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/StulaKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SwarMOR12, author = {Bobby Swar and Junghoon Moon and Junyoung Oh and Cheul Rhee}, title = {Determinants of relationship quality for {IS/IT} outsourcing success in public sector}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {457--475}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9292-7}, doi = {10.1007/S10796-010-9292-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SwarMOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/TanergucluMGA12, author = {T{\"{u}}rker Tanerg{\"{u}}{\c{c}}l{\"{u}} and Hakan Maras and Cevriye Gencer and Haluk Ayg{\"{u}}nes}, title = {A decision support system for locating weapon and radar positions in stationary point air defence}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {423--444}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9269-6}, doi = {10.1007/S10796-010-9269-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/TanergucluMGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/TempletonD12, author = {Gary F. Templeton and James F. Dowdy Jr.}, title = {CASE-mediated organizational and deutero learning at {NASA}}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {741--764}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9300-6}, doi = {10.1007/S10796-011-9300-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/TempletonD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/TeohPR12, author = {Sayyen Teoh and Shan Ling Pan and Anand Ramchand}, title = {Resource management activities in healthcare information systems: {A} process perspective}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {585--600}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9280-y}, doi = {10.1007/S10796-010-9280-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/TeohPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/UmbergerLH12, author = {Mark Umberger and Satja Lumbar and Iztok Humar}, title = {Modeling the influence of network delay on the user experience in distributed home-automation networks}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {571--584}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9260-2}, doi = {10.1007/S10796-010-9260-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/UmbergerLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/UmerAHLA12, author = {Shagufta Umer and Muhammad Afzal and Maqbool Hussain and Khalid Latif and Hafiz Farooq Ahmad}, title = {Autonomous mapping of {HL7} {RIM} and relational database schema}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {5--18}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9309-x}, doi = {10.1007/S10796-011-9309-X}, timestamp = {Mon, 19 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/UmerAHLA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/VoisardZ12, author = {Agn{\`{e}}s Voisard and Holger Ziekow}, title = {Modeling trade-offs in the design of sensor-based event processing infrastructures}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {317--330}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9248-y}, doi = {10.1007/S10796-010-9248-Y}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/VoisardZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WangW12, author = {Shouhong Wang and Hai Wang}, title = {Organizational schemata of e-portfolios for fostering higher-order thinking}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {395--407}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9262-0}, doi = {10.1007/S10796-010-9262-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WangW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Weber-JahnkeO12, author = {Jens H. Weber{-}Jahnke and Christina Obry}, title = {Protecting privacy during peer-to-peer exchange of medical documents}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {87--104}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9304-2}, doi = {10.1007/S10796-011-9304-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Weber-JahnkeO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/Weber-JahnkePT12, author = {Jens H. Weber{-}Jahnke and Liam Peyton and Thodoros Topaloglou}, title = {eHealth system interoperability}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {1--3}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9319-8}, doi = {10.1007/S10796-011-9319-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/Weber-JahnkePT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/WooIC12, author = {Jungyub Woo and Nenad Ivezic and Hyunbo Cho}, title = {Agile test framework for business-to-business interoperability}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {3}, pages = {789--808}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9303-3}, doi = {10.1007/S10796-011-9303-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/WooIC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/XiaoZ12, author = {Lan Xiao and Li Zheng}, title = {Business process design: Process comparison and integration}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {2}, pages = {363--374}, year = {2012}, url = {https://doi.org/10.1007/s10796-010-9251-3}, doi = {10.1007/S10796-010-9251-3}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/XiaoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/YangLLZ12, author = {Hongqiao Yang and Weizi Li and Kecheng Liu and Junping Zhang}, title = {Knowledge-based clinical pathway for medical quality improvement}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {1}, pages = {105--117}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9307-z}, doi = {10.1007/S10796-011-9307-Z}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/YangLLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ZoNJ12, author = {Hangjung Zo and Derek L. Nazareth and Hemant K. Jain}, title = {End-to-end reliability of service oriented applications}, journal = {Inf. Syst. Frontiers}, volume = {14}, number = {5}, pages = {971--986}, year = {2012}, url = {https://doi.org/10.1007/s10796-011-9308-y}, doi = {10.1007/S10796-011-9308-Y}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ZoNJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.