Match!
Information Systems Frontiers
IF
2.54
Papers
1164
Papers 1262
1 page of 127 pages (1,262 results)
Newest
#1Jae Kyu Lee (Xi'an Jiaotong University)
#2Younghoon Chang (BIT: Beijing Institute of Technology)H-Index: 9
Last.Beopyeon Kim (KU: Korea University)
view all 4 authors...
The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research propos...
Source
#1Farid ShirvaniH-Index: 2
#2Ghassan BeydounH-Index: 20
Last.Peter CampbellH-Index: 2
view all 5 authors...
Source
#1Abhipsa Pal (IIMB: Indian Institute of Management Bangalore)H-Index: 1
#2Rahul De (IIMB: Indian Institute of Management Bangalore)H-Index: 8
Last.Tejaswini C. Herath (Brock University)H-Index: 15
view all 3 authors...
Mobile payment technology has aided in socio-economic development through financial inclusion and protective security during crises. However, there is a gap in understanding whether this technology has the potential for sustainable development that encompasses individual emancipation and environmental growth beyond social and economic change. To evaluate mobile payments role in sustainable human-centric development, we develop a framework based on the theories by two influential development econ...
Source
#1Mengyue WangH-Index: 4
#2Xin Li (CityU: City University of Hong Kong)H-Index: 21
Last.Patrick Y. K. Chau (UNNC: The University of Nottingham Ningbo China)
view all 3 authors...
Photos play a critical role in online shopping. To examine their impact on consumers, most previous studies rely on human assessments to develop measures for photos. Such an approach limits the number of dimensions and samples that can be investigated in one study. This study exploits image-processing techniques to tackle this challenge. We develop a framework and differentiate two types of computer-generated measures, aggregative and decompositive measures, which may be used in different ways i...
Source
Last.Niam Yaraghi (Brookings Institution)H-Index: 7
view all 4 authors...
To examine whether integration of Health Information Exchange (HIE) services into office workflow would have an impact on ED visits and unplanned 30-day readmission amongst the patients who were treated at the medical practice. We designed and implemented a training program at a medical practice in Western New York over a period of three months between November 2016 and January 2017. During the program, a group of health IT professionals and clinical specialists trained the staff on how to appro...
Source
#1Farid Shirvani (UOW: University of Wollongong)H-Index: 2
#2Ghassan Beydoun (Information Technology University)H-Index: 20
Last.Peter Campbell (UOW: University of Wollongong)H-Index: 2
view all 5 authors...
Transport infrastructure systems are very complex and expensive. Projects to procure such systems are costly, long and complex to manage. The procurement context usually includes many collaborating organizations but often with different concerns and priorities, and many interactions to other parties. This makes the procurement very complex and entangled. DoDAF, MoDAF and TRAK are three architecture frameworks (AF) that model the whole enterprise/system life cycle that includes system procurement...
Source
#1Palash Bera (SLU: Saint Louis University)H-Index: 7
Conceptual models are frequently developed as part of IS analysis and design. Development of such models involves expertise in conceptual modeling techniques, served by modeling analysts, and in the domain applications, served by domain analysts. This paper focuses on understanding how these two types of analysts interact and develop conceptual models collaboratively. The subjects as analysts were placed in pairs (one modeling and one domain) and asked to develop conceptual models collaborativel...
Source
#1Miloslava Plachkinova (UT: University of Tampa)H-Index: 4
#2Philip Menard (UTSA: University of Texas at San Antonio)
The Internet of Things (IoT) has gained popularity among home consumers due to its characteristics related to automation, information gathering, and purported physical security benefits. In an effort to capitalize on an expanding market, IoT developers have rushed products to market without proper due diligence regarding device cybersecurity. By being more focused on the utility and convenience of IoT devices without being concerned about their devices’ inherent security flaws, consumers may be ...
Source
#1Mohammad Alamgir Hossain (RMIT: RMIT University)H-Index: 4
#2Shams Rahman (RMIT: RMIT University)H-Index: 13
Online group buying (OGB) is one of the latest types of e-commerce to find success in China. Many OGB businesses join the marketplace in China every month, creating tremendous competition. In order to understand the success factors, this study uses information systems success models and incorporates personality traits. We collected data from 408 OGB customers and found support for the model, with most variables being significant. Among the five major personality traits, extroversion, agreeablene...
Source
#1Kiljae Lee (Embry-Riddle Aeronautical University, Daytona Beach)H-Index: 4
#2Kyung Young Lee (Dal: Dalhousie University)H-Index: 6
Last.Lorn Sheehan (Dal: Dalhousie University)H-Index: 12
view all 3 authors...
Unlike most other computing devices that are known to isolate their users, Smart Voice Assistant Speaker (SVAS) appears to improve the perception of social cohesion (i.e., Group Harmony) among its co-users. We hypothesize that the social cues emanated from the continued, and habituated, use of SVAS develop the “illusion of intimacy” which, in turn, ripples through the entire group, and help fulfill the need for social integration. The data collected from 218 families support this hypothesis. We ...
Source
12345678910
Top fields of study
Data mining
World Wide Web
Marketing
Information system
Computer science
Management science
Knowledge management