Match!
Information Systems Frontiers
IF
2.54
Papers
1138
Papers 1161
1 page of 117 pages (1,161 results)
Newest
#1Simon T.-N. Trang (GAU: University of Göttingen)H-Index: 4
#2Benedikt Brendel (GAU: University of Göttingen)
Enforcing information security policies is a key concern of information security managers. To deter employees from deviant behavior, organizations often implement sanction mechanisms. However, evidence from research regarding the efficiency of such a deterrence approach has been mixed. Drawing on this inconsistency, this paper examines the applicability of deterrence theory in information security policy compliance research. It is argued that contextual and methodological moderators play a cruci...
#1Stephan Berger (University of Augsburg)
#2Björn Häckel (Augsburg College)H-Index: 5
Last.Lukas Häfner (University of Augsburg)H-Index: 2
view all 0 authors...
Ongoing digitalization accelerates the transformation and integration of physical production and traditional computing systems into smart objects and their interconnectivity, forming the Internet of Things. In manufacturing, the cross-linking of embedded systems creates adaptive and self-organizing Cyber-Physical Production Systems (CPPSs). Owing to ever-increasing cross-linking, rapid technological advances, and multifunctionality, the complexity and structural opacity of CPPSs are rapidly incr...
#1Gianfranco Walsh (FSU: University of Jena)H-Index: 30
#2Edward ShiuH-Index: 21
Last.Ikuo Takahashi (Keio: Keio University)H-Index: 5
view all 0 authors...
#1Jan Mendling (WU: Vienna University of Economics and Business)H-Index: 53
#2Jan Recker (University of Cologne)H-Index: 3
Last.Henrik LeopoldH-Index: 17
view all 4 authors...
Understanding conceptual models of business domains is a key skill for practitioners tasked with systems analysis and design. Research in this field predominantly uses experiments with specific user proxy cohorts to examine factors that explain how well different types of conceptual models can be comprehended by model viewers. However, the results from these studies are difficult to compare. One key difficulty rests in the unsystematic and fluctuating consideration of model viewer characteristic...
#1Cheng-Chi Lee (FJU: Fu Jen Catholic University)H-Index: 27
#2Chun-Ta Li (Tainan University of Technology)H-Index: 20
Last.Athanasios V. Vasilakos (Luleå University of Technology)H-Index: 3
view all 5 authors...
In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the...
#1Federica Cena (UNITO: University of Turin)H-Index: 14
#2Silvia Likavec (UNITO: University of Turin)H-Index: 9
Last.Amon Rapp (UNITO: University of Turin)H-Index: 12
view all 3 authors...
Over the last few years, user modeling scenery is changing. With the recent advancements in ubiquitous and wearables technologies, the amount and type of data that can be gathered about users and used to build user models is expanding. User Model can now be enriched with data regarding different aspects of people’s everyday lives. All these changes bring forth new research questions about the kinds of services which could be provided, the ways for effectively conveying new forms of personalisati...
#1Krzysztof Kluza (AGH University of Science and Technology)H-Index: 11
#2Grzegorz J. Nalepa (AGH University of Science and Technology)H-Index: 20
Business Processes describe the ways in which operations are carried out in order to accomplish the intended objectives of organizations. A process can be depicted using a modeling notation, such as Business Process Model and Notation. Process model can also describe operational aspects of every task; but in a properly designed model, the detailed aspects of low-level logic should be delegated to external services, especially to a Business Rule Engine. Business Rules support the specification of...
#1Feng Xu (Xi'an Jiaotong University)H-Index: 1
#2Xin Luo (UNM: University of New Mexico)H-Index: 1
Last.Wei Huang (Xi'an Jiaotong University)H-Index: 1
view all 5 authors...
Firms have increasingly invested in information technology (IT) security to protect their information resources. Nevertheless, deciding when to invest in IT security is rather difficult for executives because of the irreversibility of spending and uncertainty of IT security investments performance. A review of the literature on IT security investments reveals that previous studies largely neglected the strategy and timing of investments. Basing on real options theory, this research examines IT s...
#1Xiaolin Lin (A&M-CC: Texas A&M University–Corpus Christi)H-Index: 10
#2Mauricio Featherman (WSU: Washington State University)H-Index: 15
Last.Nick Hajli (UT: University of Tehran)H-Index: 10
view all 4 authors...
Gender effects remain poorly understood in the E-commerce setting. Using the selectivity model, this research further investigates gender differences in consumer Web-based purchase decisions. Specifically, gender differences in the effects of interactivity, vividness, diagnosticity, and perceived risk on subsequent consumer attitude and online purchase intentions are investigated and explained. An empirical survey-based research study in the e-commerce context found that gender differences exist...
#1Mukul Gupta (Indian Institute of Management Indore)H-Index: 3
#2Pradeep Kumar (Indian Institute of Management Lucknow)H-Index: 7
Last.Bharat Bhasker (Indian Institute of Management Raipur)H-Index: 2
view all 3 authors...
Mining a heterogeneous network requires measuring the relatedness between objects represented as nodes in the network. Relevance measurement on objects in a heterogeneous network is a challenging problem. Many researchers transform a heterogeneous network into the corresponding homogeneous network and then apply conventional similarity measures. However, this approach involves information loss as various path semantics are lost in the transformation process. In this paper, we study the problem o...
12345678910