Icons / Logo / Facebook Created with Sketch. Icons / Logo / Google Created with Sketch. Icons / Logo / ORCID Created with Sketch. Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Information Systems Frontiers
IF
2.54
Papers
1138
Papers 1145
1 page of 115 pages (1,145 results)
Newest
Published on Aug 22, 2017in Information Systems Frontiers 2.54
Maedeh Yassaee1
Estimated H-index: 1
(HSG: University of St. Gallen),
Tobias Mettler14
Estimated H-index: 14
(UNIL: University of Lausanne)
A high rate of work-related accidents or diseases around the world not only threatens the health and wellbeing of employees, but also causes a considerable annual economic burden for organizations. One promising use of information technology would therefore be the management and prevention of occupational accidents and employee absenteeism. Although some companies are starting to introduce digital occupational health initiatives, there is scarce evidence about the inhibiting factors which may di...
Published on Aug 1, 2019in Information Systems Frontiers 2.54
Luvai Motiwalla15
Estimated H-index: 15
(University of Massachusetts Lowell),
Amit V. Deokar10
Estimated H-index: 10
(University of Massachusetts Lowell)
+ 1 AuthorsAngelika Dimoka16
Estimated H-index: 16
(TU: Temple University)
Behavioral research in information systems employing quantitative methods has traditionally relied on mainly survey-based approaches to gather subjective user data. With new advances in technology such as mobile computing, wearable devices, and social media, along with computational capabilities, organizations are in a position to leverage objective data in addressing IT issues typically addressed in behavioral research. In this paper, we propose a framework for envisioning how data analytics ma...
Published on Sep 11, 2017in Information Systems Frontiers 2.54
Mingxin Gan6
Estimated H-index: 6
(USTB: University of Science and Technology Beijing),
Lily Sun10
Estimated H-index: 10
(University of Reading),
Rui Jiang36
Estimated H-index: 36
(THU: Tsinghua University)
Nowadays people manage their social circles via a variety of online social media which employ social recommendation as an important component. Among social recommendation methods, global methods take an emphasis on common tastes between people while local methods assume that new relations are established mainly through people’s common friends. However, in a real social network, both local and global relations exist, which motivate us to integrate them to improve recommendation performance. To ac...
Published on Jun 13, 2018in Information Systems Frontiers 2.54
Suning Zhu1
Estimated H-index: 1
(AU: Auburn University),
Ashish Gupta2
Estimated H-index: 2
(AU: Auburn University)
+ 1 AuthorsCasey G. Cegielski16
Estimated H-index: 16
(AU: Auburn University)
As business analytics (BA) applications permeate across various industry sectors, the workforce needs to be trained and upskilled to meet the challenges of understanding and implementing analytics methodologies. To achieve payoffs from the resource investments in BA training, it is critical for enterprises to understand an individual’s learning behavior along with the process and outcome-centric satisfaction associated with a collaborative analytics training task. This study focuses on identifyi...
Published on Aug 15, 2017in Information Systems Frontiers 2.54
Negin Banaeianjahromi2
Estimated H-index: 2
(Lappeenranta University of Technology),
Kari Smolander20
Estimated H-index: 20
(Aalto University)
Enterprise architecture (EA) is widely employed to reduce complexity and to improve business–information technology (IT) alignment. Despite the efforts by practitioners and academics in proposing approaches to smoothen EA development, it is not easy to find a fully successful EA. Because EA development is a complex endeavour, it is important to understand the obstacles that practitioners face during EA development. With the grounded theory, we studied how obstacles during EA development emerged ...
Published on Jun 10, 2017in Information Systems Frontiers 2.54
Sujeet Kumar Sharma12
Estimated H-index: 12
(Sultan Qaboos University)
Higher penetration of smartphones and 3G and 4G mobile networks have led to the higher usage of smartphones for mobile banking activities. This paper identifies key antecedents influencing the mobile banking acceptance. The research extends the original Technology Acceptance Model, by incorporating two cognitive antecedents, namely, autonomous motivation and controlled motivation, in addition to trust components for understanding adoption. Data were collected from 225 mobile banking users and an...
Published on Aug 13, 2017in Information Systems Frontiers 2.54
Surya Karunagaran2
Estimated H-index: 2
(Indian Institute of Technology Madras),
Saji K. Mathew6
Estimated H-index: 6
(Indian Institute of Technology Madras),
Franz Lehner12
Estimated H-index: 12
(University of Passau)
Cloud computing is widely advertised as a technology-based service model and an emerging business model which is highly beneficial for the adopting organizations. But, academic landscape lacks sufficient empirical studies of cloud adoption at firm-level, and the existing cloud adoption factors are mostly anecdotal in nature. A multiple case study approach was used to extract and compare adoption characteristics of SMEs and large firms in Germany, based on the Technology-Organization and Environm...
Published on Jan 5, 2019in Information Systems Frontiers 2.54
Amir Hassan Zadeh4
Estimated H-index: 4
(Wright State University),
Hamed Majidi Zolbanin3
Estimated H-index: 3
(BSU: Ball State University)
+ 1 AuthorsDursun Delen32
Estimated H-index: 32
(OSU: Oklahoma State University–Stillwater)
Contagious diseases pose significant challenges to public healthcare systems all over the world. The rise in emerging contagious and infectious diseases has led to calls for the use of new techniques and technologies capable of detecting, tracking, mapping and managing behavioral patterns in such diseases. In this study, we used Big Data technologies to analyze two sets of flu (influenza) activity data: Twitter data were used to extract behavioral patterns from a location-based social network an...
Published on Jul 15, 2017in Information Systems Frontiers 2.54
Young Jin Lee4
Estimated H-index: 4
(DU: University of Denver),
Kellie B. Keeling10
Estimated H-index: 10
(DU: University of Denver)
+ 0 AuthorsAndrew Urbaczewski1
Estimated H-index: 1
(DU: University of Denver)
Our objective in this paper is to assess the values of online user reviews for movies compared with the sales impact of post-release ad spending for movies. We use weekly box-office sales and ad spending data for 304 movies released in the U.S. along with online ratings and user characteristics from a social network site for movies. By exploiting the fixed-effects two-stage instrumental variable approach to account for movie heterogeneity and simultaneous relationships among user reviews, ad spe...
Published on Dec 18, 2018in Information Systems Frontiers 2.54
Yunhong Xu (Kunming University of Science and Technology), Dehu Yin (Kunming University of Science and Technology), Duanning Zhou (EWU: Eastern Washington University)
With the development of social interaction techniques and social tagging mechanisms, online academic community as a new platform has greatly changed the way users organize and share knowledge. The large amount of social tagging data occurred on online academic community provides us a channel to systematically understand users’ tagging behavior. Based on data collected from a specific online academic community, this research first classifies users into two categories: active and inactive users. A...
12345678910