Sr. No.,Authors,Title,Abstract,Author Keywords,Cited by,Source title,Year 1,Modgil S.; Singh R.K.; Gupta S.; Dennehy D.,A Confirmation Bias View on Social Media Induced Polarisation During Covid-19,"Social media has played a pivotal role in polarising views on politics, climate change, and more recently, the Covid-19 pandemic. Social media induced polarisation (SMIP) poses serious challenges to society as it could enable ‘digital wildfires’ that can wreak havoc worldwide. While the effects of SMIP have been extensively studied, there is limited understanding of the interplay between two key components of this phenomenon: confirmation bias (reinforcing one’s attitudes and beliefs) and echo chambers (i.e., hear their own voice). This paper addresses this knowledge deficit by exploring how manifestations of confirmation bias contributed to the development of ‘echo chambers’ at the height of the Covid-19 pandemic. Thematic analysis of data collected from 35 participants involved in supply chain information processing forms the basis of a conceptual model of SMIP and four key cross-cutting propositions emerging from the data that have implications for research and practice. © The Author(s) 2021.",Confirmation Bias; Covid-19; Echo Chambers; Social Media Induced Polarisation,104,Information Systems Frontiers,2024 2,Jha A.; Chakrabarty M.; Saha D.,Network Investment as Drivers of Mobile Subscription – A Firm-level Analysis,"Globally, Mobile Network Operators (MNOs) incur considerable capital investments towards the acquisition of spectrum, deployment of mobile networks, and marketing and advertising of their mobile services to potential mobile subscribers. The extant literature, which is mainly conceptual, suggests that such capital investments impact the individual mobile subscriber base of MNOs. However, the extant literature lacks in quantitative explanation of such impacts. We address this lacuna by proposing an empirical framework using a novel panel dataset of the four largest MNOs of India, during the years 2009–2017. We find that capital investments in the spectrum (both contemporaneous and lagged) and mobile networks (lagged) positively impact the mobile subscriber base of MNOs in India. We observe that a “triggering effect,” such as the market rollout of 4G (fourth generation) services, leads to an initial slump in the mobile subscriber base of MNOs, which is counterintuitive and signifies the importance of early network-preparedness on the part of MNOs. We also find that, in the event of the aforementioned market triggers, MNOs’ firm-size and potential to invest in the spectrum, in addition to network-preparedness, are crucial for its survival. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",4G; Firm-level drivers; India; Mobile Network Operators; Mobile Service Diffusion; Network investments,2,Information Systems Frontiers,2023 3,Gasmi F.; Um P.N.; Virto L.R.; Saba P.,"Digital Literacy, Sustainable Development and Radiation Regulation: Policy and Information Systems Implications","This paper explores the convergence of development economics, regulatory policies, and public health considerations within the field of Information Systems (IS) research, focusing specifically on 5G and 6G mobile technologies. Despite the widespread deployment of these technologies and their potential health implications, there is a limited understanding in IS literature on why countries adopt varying thresholds for radiation regulation. Our study, analyzing data from 124 countries, uncovered an inverted U-shaped relationship between digital literacy and the rigidity of radiation regulation. This finding reveals that nations with lower digital literacy levels tend to enforce stricter regulations, whereas those with higher literacy levels adopt more relaxed policies. By highlighting how digital literacy, a critical aspect of the digital divide, significantly influences regulatory frameworks in telecommunications, this study contributes to filling the gap in IS research. This underscores the necessity of informed and transparent regulatory decision making, especially in countries with diverse levels of digital literacy. Calling for a multidisciplinary approach to policy formulation, our work enriches the broader discourse in IS research, underlining the pivotal role of digital literacy in shaping both the access and regulatory landscapes of emerging technologies. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",5G; 6G; Digital Literacy; Policy; Radiation; Regulation; Sustainable Development,7,Information Systems Frontiers,2024 4,Shah C.S.; Krishnan S.,"Digital Gender Gap, Gender Equality and National Institutional Freedom: A Dynamic Panel Analysis","While digital gender gap is a growing field of research in Information Systems (IS), there remains a dearth of research focusing on it. The objective of this study is to investigate the relationship between the digital gender gap in mobile and internet usage and gender equality. Additionally, this study also examines the impact of national institutional freedoms on the aforementioned relationship. Utilizing the theoretical framework of intersecting inequalities and building upon existing literature on the gender digital divide, this study aims to explore the associations between disparities in mobile and internet usage, gender equality, and the extent of national institutional freedoms encompassing economic, political, and media domains. In pursuit of this objective, we undertake a dynamic panel data analysis using publicly accessible archival data at the country level. The results indicate that national institutions have a significant impact on the relationship between the digital gender gap in internet and mobile phone usage and gender equality. The discussion encompasses the significance of our findings for both study and practice. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Country-level; Gender digital inequality; Gender equality; Gender gap in mobile and internet; National institutions,3,Information Systems Frontiers,2025 5,Oks S.J.; Jalowski M.; Lechner M.; Mirschberger S.; Merklein M.; Vogel-Heuser B.; Möslein K.M.,"Cyber-Physical Systems in the Context of Industry 4.0: A Review, Categorization and Outlook","Cyber-physical systems (CPS) offer great potential for the digital transformation of industrial value creation in the context of Industry 4.0. They unify and integrate several technological approaches, including big data analysis and artificial intelligence, enhancing real-time monitoring and control of manufacturing processes. An extensive knowledge base formed by various disciplines, including information systems, engineering, and computer science, already exists for CPS. However, this knowledge has not been holistically captured and structured to date. To address this research gap, this study conducts a large-scale literature review of 2365 papers representing the current state of the research and then develops a novel categorization on industrial CPS with 10 sections, 32 areas, and 246 fields. The categorization is presented in hierarchical graphical form and can also be utilized as a web tool. To conclude, a perspective on future research needs and potentials to enhance Industry 4.0 in both research and practice are offered. © The Author(s) 2022.",Categorization; Cyber-physical systems (CPS); Industry 4.0; State of research,89,Information Systems Frontiers,2024 6,Lee E.; Yoo C.W.; Goo J.; Nam K.; Koo C.,Is Contact Tracing for Pandemic Relief or Privacy Menace?: a Lens of Dual-Calculus Decision,"South Korea endured early outbreaks and flattened the coronavirus curve without paralyzing economic systems. The critical factor that leads to the policy’s success is contact tracing using personal information. However, at the same time, the extensive use of personal information has raised social problems related to privacy loss. Even in devastating pandemics, balancing personal privacy and public safety remains a crucial issue. Thus, this study attempted to gain a deeper understanding of privacy disclosure for restaurant customers. We applied privacy calculus theory and risk-risk trade-off concepts to explain the relationship between two conflicting risks. i.e., privacy risk and health risk. We found that “risk substitutions” provide implications for how customers’ privacy perceptions change with the level of health risk and the importance of perceived benefit. Finally, we verified that institutional privacy protection directly influences disclosure intention. This study has implications for theory and practice. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",COVID-19 pandemic; Information privacy disclosure; Institutional privacy protection; Privacy calculus; Restaurants customer; Risk-risk trade-off,3,Information Systems Frontiers,2024 7,Chatterjee S.; Rana N.P.; Khorana S.; Mikalef P.; Sharma A.,Assessing Organizational Users’ Intentions and Behavior to AI Integrated CRM Systems: a Meta-UTAUT Approach,"This paper tests the meta-analysis based unified theory of acceptance and use of technology (meta-UTAUT) model to predict the behavioral intentions of organizational users and their use behavior to artificial intelligence (AI) integrated customer relationship management (CRM) systems. Data was collected from 315 organizational users in India. The hypotheses draw on the theoretical underpinnings which have been statistically validated. Results show that CRM quality and satisfaction significantly influences an organization’s employees attitudes and intentions to use AI integrated CRM systems. The compatibility of CRM systems has, however, a limited impact on employees attitudes. The findings, which are aligned with the extended UTAUT model, provide useful insights into organizations and decision-makers for designing AI integrated CRM systems. © 2021, The Author(s).",AI-CRM; CRM Quality; CRM satisfaction; Meta-UTAUT; User behavior,146,Information Systems Frontiers,2023 8,El Hathat Z.; Venkatesh V.G.; Sreedharan V.R.; Zouadi T.; Manimuthu A.; Shi Y.; Srinivas S.S.,Leveraging Greenhouse Gas Emissions Traceability in the Groundnut Supply Chain: Blockchain-Enabled Off-Chain Machine Learning as a Driver of Sustainability,"As emphasized in multiple United Nations (UN) reports, sustainable agriculture, a key goal in the UN Sustainable Development Goals (SDGs), calls for dedicated efforts and innovative solutions. In this study, greenhouse gas (GHG) emissions in the groundnut supply chain from the region of Diourbel & Niakhar, Senegal, to the port of Dakar are investigated. The groundnut supply chain is divided into three steps: cultivation, harvesting, and processing/shipping. This work adheres to UN guidelines, addressing the imperative for sustainable agriculture by applying machine learning-based predictive modeling (MLPMs) utilizing the FAOSTAT and EDGAR databases. Additionally, it provides a novel approach using blockchain-enabled off-chain machine learning through smart contracts built on Hyperledger Fabric to secure GHG emissions storage and machine learning’s predictive analytics from fraud and enhance transparency and data security. This study also develops a decision-making dashboard to provide actionable insights for GHG emissions reduction strategies across the groundnut supply chain. © The Author(s) 2024.",Blockchain smart contracts; Greenhouse gas (GHG) emissions; Groundnut supply chain; Machine learning; Senegal; Sustainable agriculture,12,Information Systems Frontiers,2024 9,Abdalla Mikhaeil C.; Raman R.; James T.L.; Venkatesh V.,"The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs)","In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs. © The Author(s) 2025.",Consumer adoption; Privacy; Privacy-enhancing technologies (PETs); UTAUT2,2,Information Systems Frontiers,2025 10,Fujita S.; Hatayama M.,Estimation Method for Roof‐damaged Buildings from Aero-Photo Images During Earthquakes Using Deep Learning,"Issuing a disaster certificate, which is used to decide the contents of a victim’s support, requires accuracy and rapidity. However, in Japan at large, issuing of damage certificates has taken a long time in past earthquake disasters. Hence, the government needs a more efficient mechanism for issuing damage certificates. This study developed an estimation system of roof-damaged buildings to obtain an overview of earthquake damage based on aero-photo images using deep learning. To provide speedy estimation, this system utilized the trimming algorithm, which automatically generates roof image data using the location information of building polygons on GIS (Geographic Information System). Consequently, the proposed system can estimate, if a house is covered with a blue sheet with 97.57 % accuracy and also detect whether a house is damaged, with 93.51 % accuracy. It would therefore be worth considering the development of an image recognition model and a method of collecting aero-photo data to operate this system during a real earthquake. © 2021, The Author(s).",Aero photo; Damage certification; Deep learning; GIS; Image recognition,16,Information Systems Frontiers,2023 11,Bhatia A.; Dassani P.,Factors Affecting Behavioural Intention to Use Generative Artificial Intelligence Tool: A Multigroup Analysis,"Generative Artificial Intelligence (GenAI) popular chatbot Chat Generative Pre-Trained Transformer (ChatGPT) grabbed the attention of millions of users within days of its launch. It provides human-like responses and streamlines repetitive human tasks. This chatbot not only augments productivity but also evokes behavioural biases amongst its initial users. The research attempts to examine prominent factors that influence users’ intention to use ChatGPT. We extend the celebrated model of UTAUT2 along with herding and optimism bias. We notice users’ inclination towards herding bias as they rushed to adopt ChatGPT and optimism bias as they tend to overestimate ChatGPT’s capabilities, presuming its results to be flawless. The survey data collected from early ChatGPT users reveal that optimism bias significantly influences users’ intention to use ChatGPT, while contrary to the literature, hedonic motivation does not. A theoretical framework is proposed to examine behavioural biases towards ChatGPT adoption, with key theoretical and practical implications. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",GenAI Tools; Herding bias; Optimism bias; Technology adoption; UTAUT2,2,Information Systems Frontiers,2025 12,Vössing M.; Kühl N.; Lind M.; Satzger G.,Designing Transparency for Effective Human-AI Collaboration,"The field of artificial intelligence (AI) is advancing quickly, and systems can increasingly perform a multitude of tasks that previously required human intelligence. Information systems can facilitate collaboration between humans and AI systems such that their individual capabilities complement each other. However, there is a lack of consolidated design guidelines for information systems facilitating the collaboration between humans and AI systems. This work examines how agent transparency affects trust and task outcomes in the context of human-AI collaboration. Drawing on the 3-Gap framework, we study agent transparency as a means to reduce the information asymmetry between humans and the AI. Following the Design Science Research paradigm, we formulate testable propositions, derive design requirements, and synthesize design principles. We instantiate two design principles as design features of an information system utilized in the hospitality industry. Further, we conduct two case studies to evaluate the effects of agent transparency: We find that trust increases when the AI system provides information on its reasoning, while trust decreases when the AI system provides information on sources of uncertainty. Additionally, we observe that agent transparency improves task outcomes as it enhances the accuracy of judgemental forecast adjustments. © 2022, The Author(s).",Agent transparency; Design science research; Human-AI collaboration; Human-AI interaction; Trust,147,Information Systems Frontiers,2022 13,Niu S.; Ma J.; Yin Q.; Wang Z.; Bai L.; Yang X.,Modelling Patient Longitudinal Data for Clinical Decision Support: A Case Study on Emerging AI Healthcare Technologies,"The COVID-19 pandemic has highlighted the critical need for advanced technology in healthcare. Clinical Decision Support Systems (CDSS) utilizing Artificial Intelligence (AI) have emerged as one of the most promising technologies for improving patient outcomes. This study’s focus on developing a deep state-space model (DSSM) is of utmost importance, as it addresses the current limitations of AI predictive models in handling high-dimensional and longitudinal electronic health records (EHRs). The DSSM’s ability to capture time-varying information from unstructured medical notes, combined with label-dependent attention for interpretability, will allow for more accurate risk prediction for patients. As we move into a post-COVID-19 era, the importance of CDSS in precision medicine cannot be ignored. This study’s contribution to the development of DSSM for unstructured medical notes has the potential to greatly improve patient care and outcomes in the future. © The Author(s) 2024.",Artificial intelligence; Clinical decision support; Deep state-space models; Longitudinal electronic health records,10,Information Systems Frontiers,2025 14,Hassandoust F.; Techatassanasoontorn A.A.; Tan F.B.,Importance of IT and Role Identities in Information Systems Infusion,"Information systems (IS) should be infused into individuals’ work activities for organizations to extract value from these systems. Studies have identified various factors that impact IS infusion, but few have examined the importance of individuals’ identities and the role of contextual factors. Drawing on identity and status characteristics theories, this study conceptualizes individuals’ material identity as IT identity, and role identity as IS infusion role identity and examines their relationships and effects on IS infusion as well as the role status characteristics play in shaping these relationships. The models were evaluated using survey data collected from enterprise systems users. Findings suggest that individuals’ IT identity shape IS infusion role identity, and together, these identities influence their IS infusion. Additionally, work-related and personal characteristics strengthen the relationships between identities and IS infusion. This study highlights the role of individual’s IT and role identities and status characteristics in fostering IS infusion. © 2023, The Author(s).",Identity theories; IS infusion; IT identity; Material identity; Personal characteristics; Role identity; Work-related characteristics,8,Information Systems Frontiers,2024 15,Roshanzamir M.; Jafari M.; Alizadehsani R.; Roshanzamir M.; Shoeibi A.; Gorriz J.M.; Khosravi A.; Nahavandi S.; Acharya U.R.,What Happens in Face During a Facial Expression? Using Data Mining Techniques to Analyze Facial Expression Motion Vectors,"Automatic facial expression recognition is a big challenge in human–computer interaction. Analyzing the changes in the face during a facial expression can be used for this purpose. In this paper, these changes are extracted as a number of motion vectors. These motion vectors are extracted using an optical flow algorithm. Then, they are used to analyze facial expressions by some of the data mining algorithms. This analysis has not only determined what changes occur in the face during facial expression but has also been used to recognize facial expressions. Cohen-Kanade facial expression dataset was used in this research. Based on our findings, the vertical lengths of motion vectors created in the lower part of the face have the greatest impact on the classification of facial expressions. Among the investigated classification algorithms, deep learning, support vector machine, and C5.0 had better performance, yielding an accuracy of 95.3%, 92.8%, and 90.2% respectively. © 2024, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Automatic Facial Expression Recognition; C5.0; Data Mining; Deep Learning; Facial Expression Analysis; Optical Flow; Supported Vector Machine,7,Information Systems Frontiers,2024 16,Chatterjee S.; Chaudhuri R.; Kamble S.; Gupta S.; Sivarajah U.,Adoption of Artificial Intelligence and Cutting-Edge Technologies for Production System Sustainability: A Moderator-Mediation Analysis,"Cutting-edge technologies like big data analytics (BDA), artificial intelligence (AI), quantum computing, blockchain, and digital twins have a profound impact on the sustainability of the production system. In addition, it is argued that turbulence in technology could negatively impact the adoption of these technologies and adversely impact the sustainability of the production system of the firm. The present study has demonstrated that the role of technological turbulence as a moderator could impact the relationships between the sustainability the of production system with its predictors. The study further analyses the mediating role of operational sustainability which could impact the firm performance. A theoretical model has been developed that is underpinned by dynamic capability view (DCV) theory and firm absorptive capacity theory. This model was verified by PLS-SEM with 412 responses from various manufacturing firms in India. There exists a positive and significant influence of AI and other cutting-edge technologies for keeping the production system sustainable. © 2022, The Author(s).",Artificial intelligence; Firm performance; Operational sustainability; Production system sustainability; Technology turbulence,80,Information Systems Frontiers,2023 17,Albashrawi M.; Abbasi A.Z.; Li L.; Rehman U.,Adoption of Blockchain E-Voting Service: Digital Literacy as a Mediating Mechanism,"Blockchain has become a promising technology with huge benefits; nevertheless, its adoption intention has been scarce across different organizations, especially in government-to-citizens service (e.g., blockchain-based e-voting). Therefore, we aim to investigate how blockchain can affect citizens' adoption intention to use blockchain-based e-voting service. We study blockchain adoption intention by employing UTAUT2 as a theoretical base and the Replacement-Amplification-Transformation (R.A.T) technology integration model to study digital literacy as a mediating mechanism in our study model due to its significance in the contemporary business world. On the method side, we obtained 315 valid responses that we utilized to conduct a PLS-SEM-based analysis. Our findings state that digital literacy positively mediates the relationship between five determinants of UTAUT2 (e.g., facilitating conditions, social influence, hedonic motivation, habit, and price value) and citizens' intention to adopt blockchain e-voting service for casting their votes in elections. This study is among the first to examine the mediating mechanism of digital literacy between UTAUT2 factors and citizens' intention to adopt blockchain e-voting service. It is also worthwhile to quote that our study is a pioneer in extending the UTAUT2 model in the context of blockchain e-voting service. Lastly, we communicate the study's theoretical and practical implications to enrich both knowledge and industry. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Adoption intention; Blockchain; Digital literacy; E-voting service; UTAUT2,1,Information Systems Frontiers,2025 18,Bao T.; Ding Y.; Gopal R.; Möhlmann M.,Throwing Good Money After Bad: Risk Mitigation Strategies in the P2P Lending Platforms,"The success of peer-to-peer (P2P) lending platforms has proven inconsistent and uneven over time and geography. This paper aims to strengthen our understanding of the market evolution through an analysis of risks on P2P lending platforms, which can be significantly affected by the way the platform design, regulatory structural building, nature of the transaction, and interdependencies between organizational components. We extend the social-technical model and create a systematic framework to map and analyze the financial risks from a hybrid financial and organizational approach. By implementing textual and statistical analysis on a dataset from Renrendai platform, we found that risks are generated not only from the stakeholders but also due to the weaknesses of interdependencies between organizational components and platform design. We also utilize our models to investigate why some P2P platforms such as LendingClub and Upstart (US), Renrendai (China), and Zopa (UK) have succeeded or failed from both finance and IS perspectives, and further propose potential risk-mitigation strategies for P2P lending platforms. © Crown 2023.",Information Systems Management; P2P Lending Platforms; Risk Categorization; Risks Mitigation Strategies,7,Information Systems Frontiers,2024 19,Rubio-Medrano C.E.; Soundrapandian P.K.D.; Hill M.; Claramunt L.; Baek J.; S G.; Ahn G.-J.,DyPolDroid: Protecting Against Permission-Abuse Attacks in Android,"Android applications are extremely popular, as they are widely used for banking, social media, e-commerce, etc. Such applications typically leverage a series of Permissions, which serve as a convenient abstraction for mediating access to security-sensitive functionality within the Android Ecosystem, e.g., sending data over the Internet. However, several malicious applications have recently deployed attacks such as data leaks and spurious credit card charges by abusing the Permissions granted initially to them by unaware users in good faith. To alleviate this pressing concern, we present DyPolDroid, a dynamic and semi-automated security framework that builds upon Android Enterprise, a device-management framework for organizations, to allow for users and administrators to design and enforce so-called Counter-Policies, a convenient user-friendly abstraction to restrict the sets of Permissions granted to potential malicious applications, thus effectively protecting against serious attacks without requiring advanced security and technical expertise. Additionally, as a part of our experimental procedures, we introduce Laverna, a fully operational application that uses permissions to provide benign functionality at the same time it also abuses them for malicious purposes. To fully support the reproducibility of our results, and to encourage future work, the source code of both DyPolDroid and Laverna is publicly available as open-source. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Access control; Android enterprise; Permission-abuse attacks,11,Information Systems Frontiers,2023 20,Gasmi I.; Neji S.; Smiti S.; Soui M.,Features Selection for Credit Risk Prediction Problem,"Credit risk assessment has drawn great interests from both researcher studies and financial institutions. In fact, classifying an applicant as defaulter or non-defaulter customer helps banks to make a reasonable decision. The classification of applicants is based on a set of historical information of past loans. Data sets for analysis may include different features, many of which may be irrelevant to the decision making process. Keeping irrelevant features or leaving out relevant ones may be harmful, causing generation of poor quality patterns that may lead to confusion decision. Determining an appropriate set of predictors is an important challenge in credit risk prediction research which guarantees better decision-making. It is the task of searching the smallest subset of features that provide the highest accuracy and comprehensibility. Thus, this study proposes feature selection-based classification model on credit risk assessment. To this end, five algorithms are applied, Speed-constrained Multi-objective PSO (SMPSO), Non-dominated Sorting Algorithm (NSGA-II), Sequential Forward Selection (SFS), Sequential Forward Floating Selection (SFFS), and Random Subset Feature Selection (RSFS). The selected subset is evaluated based on three classifiers K-Nearest Neighbors (KNN), Support Vector Machine (SVM) and Artificial Neural Network (ANN). Our proposed model is validated using three real-world credit datasets. The obtained results confirm the efficiency of SMPSO-KNN model to select the most significant features and provide the highest classification accuracy compared to existing models. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Credit risk classification; Feature selection; Multi-objective optimization,10,Information Systems Frontiers,2025 21,Zhu X.; Jin H.; Sun H.; Li J.,Uncovering Financial Distress with Textual Risk Disclosures in Annual Reports: Insights from Large Language Models,"Risk factor disclosures in annual reports, which discuss the potential uncertainties faced by companies in textual form, are rarely utilized in financial distress prediction. This paper innovatively employs the large language model (LLM) to extract systematic textual predictors for financial distress from massive textual risk factor disclosures. Based on risk factor disclosures from 27,059 financial reports of 4,694 U.S. publicly listed companies between 2014 and 2023, a total of 24 LLM-based textual predictors are extracted, including two new predictors not included in prior studies. Compared to commonly used textual features, LLM-based textual predictors improve financial distress prediction performance by achieving a significantly higher AUC (Area Under the Curve). Furthermore, following instructions in specially designed prompts, the LLM generates detailed explanations on how to utilize extracted textual predictors to distinguish distressed companies from non-distressed ones, making LLM-based textual predictors highly interpretable. This study highlights the critical role of risk factor disclosures in assessing financial distress risks and demonstrates the powerful textual information extraction capabilities of LLMs. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Financial distress prediction; Large language models; Prompt engineering; Risk factor disclosures; Textual analysis,0,Information Systems Frontiers,2025 22,Umamaheswaran S.; Fernandes S.; Venkatesh V.G.; Avula N.; Shi Y.,What Do Employers Look for in “Business Analytics” Roles? – A Skill Mining Analysis,"Businesses constantly strive to build organizational capacity to use data strategically. As a result, there is a growing demand for business analytics professionals. While higher education systems worldwide have been adapting to build competencies, they must meet employees' expectations. Curriculum design for delivering business analytics competencies remains a challenge due to the rapidly evolving nature of business analytics as a discipline. The paper aims to decode the industry expectations for the Business Analytics profile. This study investigates the skills employers value by analyzing job descriptions. We use a text-mining approach to understand the weightage of different skills and mine skill clusters within business analytics roles. The core skill clusters are hard skills related to Big data, Business Intelligence, and analytical techniques. Results also suggest that traditional machine learning (ML) skills, typically expected in a data science profile, are also being sought after in a business analytics role. Surprisingly soft communication and stakeholder management skills are also emerging as essential skills for business analytics roles. This study provides a better understanding by investigating the interplay between the demand for skills in the job market and curriculum development. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Business analytics; Data analytics; Information society; Skill development; Skill mining,4,Information Systems Frontiers,2023 23,Yao X.; Yang W.; Feng C.; Li Z.,Reading Between the Lines: Detecting Corporate Financial Fraud Using Multi-dimensional Textual Features,"In this study, we propose a novel resampling algorithm which incorporates multi-dimensional textual features to address the challenges in corporate financial fraud detection. Using a sample of Chinese listed firms, we apply various text mining techniques to extract similarity, readability and sentiment information of corporate annual reports measured by a collection of textual features. We improve the SMOTE (Synthetic Minority Oversampling Technique) algorithm by calculating the weighted Euclidean distance based on feature importance to generate new instances and rebalance the sample distribution. The overall predictive accuracy significantly benefits from the inclusion of textual features and the application of the proposed resampling method, which remains robust when accounting for the misclassification costs. We analyze the contributions of predictors and interpret the model at the end. Our study shows the power of soft information from corporate disclosure for fraud detection and provides new algorithms in solving business ethics questions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.","Corporate financial fraud; Imbalanced data,Resampling algorithms; SMOTE; Text analytics",2,Information Systems Frontiers,2025 24,Dhar S.; Bose I.; Benitez J.,Understanding the Relationship between Adoption and Value Creation on Online Social Networks,"In this paper, we reviewed 126 papers published in 13 top journals in information systems from 2008 to 2022 that focused on the adoption of social networking sites (SNS) and its consequences. The paper presents a summary of the literature review. The literature review indicated that most scholars studied the adoption and the consequences of SNS adoption in silos. Human behavior is complex. Skinnerian behaviorism posits that human behavior is triggered by environmental stimulus and reinforced by an appraisal of consequences to the behavior. It evinces a need for the development of an integrative framework to model the stimulus for adoption of SNS and an appraisal of the reinforcement of the consequences of adoption in a single frame. We analyze the associated constructs and theories to propose the integrative Social Networking Site Exploitation Framework (SNSEF), based on reinforcement theory, social psychology, and social capital theory. The SNSEF constitutes nine propositions to explain human motivations and behavior that leads to value creation on SNS. SNS providers will find the framework useful to assess human motivations of SNS usage and the value generation from the sites to design appropriate features of their sites to attract and retain active users. The SNSEF will help educational and business organizations as well as governmental agencies in designing appropriate policies for SNS adoption and exploiting SNS for communication. Business managers and marketers may leverage the SNSEF to understand user behavior on SNS to attain business goals. Academic scholars may gain from the literature review, propositions of the SNSEF, and the future research directions presented in this paper. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Adoption; Consequences; Integrative research framework; Online social networking; Reinforcement theory; Social Networking Site Exploitation Framework (SNSEF),5,Information Systems Frontiers,2024 25,Delen D.; Davazdahemami B.; Rasouli Dezfouli E.,Predicting and Mitigating Freshmen Student Attrition: A Local-Explainable Machine Learning Framework,"With the emergence of novel methods for improving machine learning (ML) transparency, traditional decision-support-focused information systems seem to need an upgrade in their approach toward providing more actionable insights for practitioners. Particularly, given the complex decision-making process of humans, using insights obtained from group-level interpretation of ML models for designing individual interventions may lead to mixed results. The present study proposes a hybrid ML framework by integrating established predictive and explainable ML approaches for decision support systems involving the prediction of human decisions and designing individualized interventions accordingly. The proposed framework is aimed at providing actionable insights for designing individualized interventions. It was showcased in the context of college students’ attrition problem using a large and feature-rich integrated data set of freshman college students containing information about their demographics, educational, financial, and socioeconomic factors. A comparison of feature importance scores at the group- vs. individual-level revealed that while group-level insights might be useful for adjusting long-term strategies, using them as a one-size-fits-all strategy to design and implement individual interventions is subject to suboptimal outcomes. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Analytics; Deep learning; Explainable AI; Prediction; SHAP; Student attrition,13,Information Systems Frontiers,2024 26,Soetekouw L.; Angelopoulos S.,Digital Resilience Through Training Protocols: Learning To Identify Fake News On Social Media,"We explore whether training protocols can enhance the ability of social media users to detect fake news, by conducting an online experiment (N = 417) to analyse the effect of such a training protocol, while considering the role of scepticism, age, and level of education. Our findings show a significant relationship between the training protocol and the ability of social media users to detect fake news, suggesting that the protocol can play a positive role in training social media users to recognize fake news. Moreover, we find a direct positive relationship between age and level of education on the one hand and ability to detect fake news on the other, which has implications for future research. We demonstrate the potential of training protocols in countering the effects of fake news, as a scalable solution that empowers users and addresses concerns about the time-consuming nature of fact-checking. © The Author(s) 2022.",Fake news; Fake news detection; Misinformation; Scepticism; Social media,37,Information Systems Frontiers,2024 27,Yang B.; Dai H.; Haried P.; Luo X.; Hu T.E.,An Empirical Examination of Organizational Commitment Across Psychological Contract Matching Patterns in Information Technology Outsourcing (ITO),"The demand for information technology outsourcing (ITO) providing large-scale professional services has developed into a mature and essential industry for many organizations. Against this backdrop, managing the internal workplace relationship and organizational commitment levels between the vendor firm providing critical ITO services and the vendor’s employees performing the work for the external client is a significant emerging challenge for all involved parties. Contracts in various formats and structures (transactional or psychological) are often applied as a universal tool to govern the complex ITO relationship. However, the formal or transactional contract may not be enough to ensure employee commitment to position the ITO relationship for success. This paper investigates the impact that the psychological contract has on organizational commitment across different matching patterns between the outsourcing vendor and the vendor's employees. Building upon empirical findings and theoretical perspectives of a systematic grounded theory-based literature review, business observations, and best practices, we develop a theoretical framework that categorizes the matching patterns of the vendor-employee psychological contract into four types: Vendor Dominant, Employee Dominant, Mutual Relational, and Mutual Transactional. Our findings from an analysis of 562 survey participants demonstrate that the employee's relational psychological contract has a higher positive influence on organizational commitment than the employee's transactional psychological contract in both matching and mismatching situations. The implications and future research avenues of study are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Information Technology Outsourcing; Matching Pattern; Organizational Commitment; Psychological Contract; Vendor-Employee Relationship,0,Information Systems Frontiers,2025 28,Tsoukanara E.; Koloniari G.; Pitoura E.,Skyline-based Exploration of Temporal Property Graphs,"In this paper, we focus on temporal property graphs, that is, property graphs whose labeled nodes and edges as well as the values of the properties associated with them may change with time. A key challenge in studying temporal graphs lies in detecting interesting events in their evolution, defined as time intervals of significant stability, growth, or shrinkage. To address this challenge, we build aggregated graphs, where nodes are grouped based on the values of their properties, and seek events at the aggregated level. To locate such events, we propose a novel approach based on unified evolution skylines. A unified evolution skyline assesses the significance of an event in conjunction with the duration of the interval in which the event occurs. Significance is measured by a set of counts, where each count refers to the number of graph elements that remain stable, are created, or deleted, for a specific property value. Lastly, we share experimental findings that highlight the efficiency and effectiveness of our approach. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Aggregation; Exploration; Skylines; Temporal evolution; Temporal property graph,0,Information Systems Frontiers,2024 29,Enholm I.M.; Papagiannidis E.; Mikalef P.; Krogstie J.,Artificial Intelligence and Business Value: a Literature Review,"Artificial Intelligence (AI) are a wide-ranging set of technologies that promise several advantages for organizations in terms off added business value. Over the past few years, organizations are increasingly turning to AI in order to gain business value following a deluge of data and a strong increase in computational capacity. Nevertheless, organizations are still struggling to adopt and leverage AI in their operations. The lack of a coherent understanding of how AI technologies create business value, and what type of business value is expected, therefore necessitates a holistic understanding. This study provides a systematic literature review that attempts to explain how organizations can leverage AI technologies in their operations and elucidate the value-generating mechanisms. Our analysis synthesizes the current literature and highlights: (1) the key enablers and inhibitors of AI adoption and use; (2) the typologies of AI use in the organizational setting; and (3) the first- and second-order effects of AI. The paper concludes with an identification of the gaps in the literature and develops a research agenda that identifies areas that need to be addressed by future studies. © 2021, The Author(s).",Artificial intelligence; Artificial intelligence capabilities; Research agenda; Systematic literature review,704,Information Systems Frontiers,2022 30,Gupta G.; Chaudhuri N.,Decoding GenAI Assimilation in Teams: A Multi-Method Study of GenAI’s Impact on Collaborative Performance in Project-Based Work,"As GenAI garners substantial attention and investment, its transformative potential in reshaping team dynamics and productivity within intensive project management workflows remains underexplored. This study addresses this research gap through a multi-method investigation, combining organizational learning, computational modeling, and field experiments. Examining the influence of GenAI across project development phases, the research elucidates its impact on team performance outcomes. A randomized experiment involving 107 professionals provides insights into the nuanced dynamics of GenAI infusion, considering contextual factors. The findings contribute valuable evidence-based insights for organizations navigating the integration of GenAI, offering practical guidance on leveraging its capabilities for enhanced goal-oriented collaboration. The study concludes with implications for research and practice, acknowledging limitations and suggesting avenues for further exploration in the evolving landscape of Human-GenAI augmentation in organizations. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",CausalML; GenAI; Organizational learning; Project development; System dynamics modeling,1,Information Systems Frontiers,2025 31,Russo A.; Lax G.; Dromard B.; Mezred M.,A System to Access Online Services with Minimal Personal Information Disclosure,"The General Data Protection Regulation highlights the principle of data minimization, which means that only data required to successfully accomplish a given task should be processed. In this paper, we propose a Blockchain-based scheme that allows users to have control over the personal data revealed when accessing a service. The proposed solution does not rely on sophisticated cryptographic primitives, provides mechanisms for revoking the authorization to access a service and for guessing the identity of a user only in cases of need, and is compliant with the recent eIDAS Regulation. We prove that the proposed scheme is secure and reaches the expected goal, and we present an Ethereum-based implementation to show the effectiveness of the proposed solution. © 2021, The Author(s).",Access control; Blockchain; eIDAS Regulation; Privacy; Smart contracts,9,Information Systems Frontiers,2022 32,Bortlik M.; Heinrich B.; Lohninger D.,Service Re-Selection for Disruptive Events in Mobile Environments: A Heuristic Technique for Decision Support at Runtime,"Modern service-based processes in mobile environments are highly complex due to the necessary spatial–temporal coordination between multiple participating users and the consideration of context information. Due to the dynamic nature of mobile environments, disruptive events occur at runtime, which require a re-selection of the planned service compositions respecting multiple users and context-awareness. Thereby, when re-selecting services the features performance, solution quality, solution robustness and alternative solutions are essential and contribute to the efficacy of service systems. This paper presents an optimization-based heuristic technique based on a stateful representation that uses a region-based approach to re-select services considering multiple users, context information and in particular disruptive events at runtime. The evaluation results, which are based on a real-world scenario from the tourism domain, show that the proposed heuristic is superior compared to competing artifacts. © The Author(s) 2023.",Context-awareness; Disruptive events; Mobile environments; Multi user processes; Runtime decision support; Service re-selection,2,Information Systems Frontiers,2024 33,Alshare K.; Moqbel M.; Merhi M.I.; Bartelt V.; Alam M.,The Impact of Cultural Dimensions and Quality of Life on Smartphone Addiction and Employee Performance: The Moderating Role of Quality of Life,"Smartphones, while ubiquitous and beneficial, can lead to problematic use. This study investigates the intricate interplay between cultural dimensions, smartphone addiction, and employee performance. Through the lens of distraction theory, attachment Theory, coping theory combined with Hofstede's cultural dimensions, and self-regulation theory and quality of life, we examine how collectivism, individualism, uncertainty avoidance, and masculinity cultural dimensions influence smartphone addiction and its subsequent effect on employee performance. The findings, based on data collected from 233 employees at a major medical center in the Midwest region of the USA and employing structural equation modeling, reveal a significant cultural influence on smartphone addiction, ultimately leading to a decline in performance. However, quality of life emerges as a crucial moderator, mitigating the negative impact of smartphone addiction. This research offers valuable insights for information systems scholars, highlighting the importance of cultural context in understanding smartphone addiction. Furthermore, the study equips managers with practical knowledge to address smartphone addiction within a culturally diverse workforce. By implementing strategies that enhance employee quality of life, organizations can foster a more productive and engaged work environment. © The Author(s) 2024.",Cultural dimensions; Moderation; Performance; Quality of life; Smartphone addiction,3,Information Systems Frontiers,2025 34,Behera R.K.; Bala P.K.; Ray A.,Cognitive Chatbot for Personalised Contextual Customer Service: Behind the Scene and beyond the Hype,"With the proliferation of the use of chatbots across industries, business-to-business (B2B) businesses have started using cognitive chatbots for improved customer service which signifies our research. By extending the Technology Acceptance Model and Information Systems Success Model, this study examines personalised contextual customer service using cognitive chatbot. A quantitative research method is applied to the primary data collected from 300 respondents of B2B businesses. The study contributes to the limited research on chatbots and suggests improvement in customer service. The findings provide evidence of high value by customers, particularly while checking for real-time information on reliability and accessibility of products/services. The automated answers to repetitive questions on the recurrent issues create a seamless experience for the customers. This research makes significant theoretical contributions by integrating two models into a simplified model in chatbot literature and manifest that trust affects the willingness to use the cognitive chatbot which drives automation. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Cognitive chatbot; Cognitive computing; Cognitive technologies; Customer service in B2B; Personalisation and contextualisation,77,Information Systems Frontiers,2024 35,Diamantini C.; Potena D.; Storti E.,Analytic Processing in Data Lakes: A Semantic Query-Driven Discovery Approach,"Data integration and discovery are open issues in Data Lakes potentially storing hundreds of data sources. The present paper addresses these issues targeting multidimensional data sources, that is sources containing atomic or derived measures aggregated along a number of dimensions, typically derived from raw data for analytical and reporting purposes. Combining semantic models of metadata with existing data-driven techniques, the paper proposes an approach for the discovery of mappings between source metadata and concepts in a reference knowledge graph, enabling the definition of reasoning-based techniques to discover, integrate, and rank data sources relevant to a given analytical query. The efficiency and effectiveness of the approach is discussed by means of experiments on real-world scenarios. © The Author(s) 2024.",Data lake; Knowledge graph; Multidimensional data; Query-driven discovery,2,Information Systems Frontiers,2024 36,Sharma M.; Joshi S.; Luthra S.; Kumar A.,"Impact of Digital Assistant Attributes on Millennials’ Purchasing Intentions: A Multi-Group Analysis using PLS-SEM, Artificial Neural Network and fsQCA","The rising population of millennials, coupled with Digital Assistants (DA) and online purchasing trends among consumers have gained increasing attention by global marketers. The study evaluates the influence of DA attributes on the purchasing intention (PUI) of millennials. A combined approach of PLS-SEM, Artificial Neural Network (ANN) and Fuzzy-set Qualitative Comparative Analysis (fsQCA) is used to predict the PUI of 345 millennials. Also, multi-group analysis is employed to uncover the influence of gender on the relationship between PUI and DA attributes. The findings suggest that DA attributes may amplify purchasing intention among millennials, especially through perceived interactivity and anthropomorphism. Further, the moderating role of gender was found significant on the inter-relationship of perceived interactivity and PUI. This research is a pioneer study in the area of artificial intelligence, conversational commerce, DA and AI-powered chatbots. This study will help marketers and practitioners to predict millennial purchasing intentions. An evaluation of this paper may help them to foster immersive and effective engagement through DA. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.",Artificial intelligence; Artificial neural network; Chatbots; Conversational commerce; Customer purchase; Interactivity; Millennials,73,Information Systems Frontiers,2024 37,Sengupta T.; Narayanamurthy G.; Moser R.; Pereira V.; Bhattacharjee D.,Disruptive Technologies for Achieving Supply Chain Resilience in COVID-19 Era: An Implementation Case Study of Satellite Imagery and Blockchain Technologies in Fish Supply Chain,"In supply chains where stakeholders belong to the economically disadvantaged segment and form an important part of the supply chain distribution, the complexities grow manifold. Fisheries in developing nations are one such sector where the complexity is not only due to the produce being perishable but also due to the livelihood dependence of others in the coastal regions that belong to the section of economically disadvantaged. This paper explains the contextual challenges of fish supply chain in a developing country and describes how integrating disruptive technologies can address those challenges. Through a positive deviance approach, we show how firms can help unorganized supply chains with economically disadvantaged suppliers by carefully redesigning the supply chain through the integration of satellite imagery and blockchain technology. With COVID-19 in the backdrop, we highlight how such technologies significantly improves the supply chain resilience and at the same time contributes to the income generating opportunities of poor fisherfolks in developing nations. Our study has important implications to both developing markets and food supply chain practitioners as this paper tackles issues such as perishability, demand-supply mismatch, unfair prices, and quality related data transparency in the entire value chain. © 2021, The Author(s).",Blockchain; Disruptive technology; Pandemic; Positive deviance; Resilience; Satellite imagery; Seafood supply chain,51,Information Systems Frontiers,2022 38,Yang P.; Bi G.; Qi J.; Wang X.; Yang Y.; Xu L.,Multimodal Wearable Intelligence for Dementia Care in Healthcare 4.0: a Survey,"As a new revolution of Ubiquitous Computing and Internet of Things, multimodal wearable intelligence technique is rapidly becoming a new research topic in both academic and industrial fields. Owning to the rapid spread of wearable and mobile devices, this technique is evolving healthcare from traditional hub-based systems to more personalised healthcare systems. This trend is well-aligned with recent “Healthcare 4.0” which is a continuous process of transforming the entire healthcare value chain to be preventive, precise, predictive and personalised, with significant benefits to elder care. But empowering the utility of multimodal wearable intelligence technique for elderly care like people with dementia is significantly challenging considering many issues, such as shortage of cost-effective wearable sensors, heterogeneity of wearable devices connected, high demand for interoperability, etc. Focusing on these challenges, this paper gives a systematic review of advanced multimodal wearable intelligence technologies for dementia care in Healthcare 4.0. One framework is proposed for reviewing the current research of wearable intelligence, and key enabling technologies, major applications, and successful case studies in dementia care, and finally points out future research trends and challenges in Healthcare 4.0. © The Author(s) 2021.",Dementia; Healthcare; Internet of things; Wearable intelligence,28,Information Systems Frontiers,2025 39,Polyviou A.; Pappas I.O.,Chasing Metaverses: Reflecting on Existing Literature to Understand the Business Value of Metaverses,"Metaverses refer to immersive virtual worlds in which people, places, and things of the physical world are represented by their digital representations. The wide adoption of metaverses is expected to widely disrupt the way we interact in the virtual world by elevating our online interactive experiences and bringing a plethora of implications for businesses. Following a structured literature review of related research published in the last decade, we shed light on our current understanding of metaverses and reflect on the potentially transformative value of metaverses for businesses in the near future. We draw on an established research framework to organize the insights of existing literature across different levels of analysis and activities’ purpose. Through this analysis, we reveal eight propositions on the changes brought by the use of metaverses and identify a number of open questions which could serve as future research avenues. © 2022, The Author(s).",Avatars; Business value; Digital twins; Virtual reality; Virtual worlds,46,Information Systems Frontiers,2023 40,Singh P.; Kaur S.; Baabdullah A.M.; Dwivedi Y.K.; Sharma S.; Sawhney R.S.; Das R.,Is #SDG13 Trending Online? Insights from Climate Change Discussions on Twitter,"Anthropogenic activities over the past few decades have led to increased vulnerability of environmental and ecological stability on this planet. Accelerated climate change is one such subset of the environmental problems that threatens the very existence of humankind in twenty first century. Governments, United Nations (UN) and other humanitarian agencies across the globe have developed and devised strategies for climate action that requires grater public awareness and actions. Social media has played a vital role in information dissemination and raising public awareness of climate change in the digital era. To this aid, an upsurge has been documented in recent times regarding discussions over climate change with #SDG13 (Sustainable Development Goals) at its epicenter. Following the principles of Actor Network Theory (ANT) we analyzed a large volume of Twitter data to understand general citizens’ perception and attitude towards climate change. Our findings unveil people’s opinion on causes and concerns related to barriers of adopting a more sustainable consumption and lifestyle practice. There is also a growing apathy towards sluggish government actions that makes little difference. People were also found to exchange innovative concepts and measures towards mitigating the effects of climate change. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Climate action; Climate change; Public participation; SDG13; Sustainable development; Twitter analytics,11,Information Systems Frontiers,2023 41,Majhi S.G.; Anand A.; Mukherjee A.; Rana N.P.,The Optimal Configuration of IT-Enabled Dynamic Capabilities in a firm’s Capabilities Portfolio: a Strategic Alignment Perspective,"Although IT-enabled dynamic capabilities (ITDCs) add value to firms operating in turbulent and rapidly changing environments, firms face several challenges in developing, deploying, and maintaining the right portfolio of ITDCs. Since ITDCs are not uniformly advantageous, firms need to make strategic decisions in order to accomplish the complex task of achieving optimal ITDC configurations. This conceptual paper draws on the strategic alignment perspective to identify the optimal configuration of ITDCs for a firm based on its business strategy orientation indicated by the Miles and Snow typology. This paper first explicates the theoretically ideal configurations of ITDCs based on the competitive strategy patterns associated with each Miles and Snow archetype and then develops a model for measuring the strategic fit of ITDCs. This paper contributes to the literatures on ITDCs and strategic alignment by identifying optimal ITDC configurations and by conceptualizing the strategic fit of ITDCs respectively. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Business value of IT; Configuration theory; IT enabled dynamic capabilities; Miles and Snow typology; Strategic alignment,23,Information Systems Frontiers,2022 42,Arayankalam J.; Krishnan S.,ICT-Based Country-Level Determinants of Social Media Diffusion,"There is a broad consensus that social media platforms have become critical tools for policymakers in achieving various policy objectives in a country. Therefore, an in-depth understanding of the ICT-based country-level determinants of social media diffusion has become necessary. To this end, we propose a government-people-technology (GTP) framework for categorizing the ICT-based country-level determinants of social media diffusion into three dimensions. Using this framework and utilizing archival data from 107 countries, we examine the roles of ICT in the government's vision, ICT law maturity, Internet bandwidth, ICT cost, ICT skill, and capacity to own ICT in influencing social media diffusion. A quantile panel data regression results reveal that ICT in the government's vision, ICT law maturity, Internet bandwidth, and capacity to own ICT were positively associated with social media diffusion. In contrast, ICT cost was negatively associated with it. Thus, by offering a new framework, we contribute to the technology diffusion literature by emphasizing the role of government, people, and supportive technologies in driving social media diffusion at the country level. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Country-level; Determinants; GTP framework; ICT diffusion; Social media diffusion,3,Information Systems Frontiers,2023 43,Jinasena D.N.; Spanaki K.; Papadopoulos T.; Balta M.E.,Success and Failure Retrospectives of FinTech Projects: A Case Study Approach,"The popularity and potential of FinTech for generating business value has been highlighted in an evolving number of studies. Nevertheless, there is still ambiguity on the success of such disruptive technologies. To address this gap, this paper draws on a case study of an IT vendor in Japan. We interview key stakeholders involved in the case project to (i) explore the success factors of FinTech applications adopted by non-financial organisations, (ii) illustrate the applicability of the multi-dimensional project success framework in FinTech projects, and (iii) highlight the importance of the FinTech Project Management field that warrants further investigation. We contribute to the IT Project Management field, where we extend the theoretical background with aspects of FinTech adoption and success. We also inform practice in terms of lessons for managers to improve the existing processes and assist their organisations in business transformational initiatives using FinTech. © 2020, The Author(s).",Case study; FinTech; IT Project Management; Project success; Success factors,19,Information Systems Frontiers,2023 44,Ibañez-Lissen L.; González-Manzano L.; de Fuentes J.; Garcia-Alfaro J.,Characterizing Cross-Contamination on Multitask Multimodal Large Language Models,"Recent advances in Large Language Models (LLMs) have paved the way for the emergence of Multimodal and Multitask LLMs (MMLLMs). While poisoning attacks are well studied in traditional AI models, they have not been characterized for MMLLMs. This paper focuses on a MMLLM-specific threat, dubbed cross-contamination, by which one task may be indirectly affected by the poison inserted in other tasks. In this vein, this paper addresses representative data poisoning techniques (label flipping and backdooring) across different text-, image- and video-based tasks. We analyse the effect on three representative models, namely OFA, LLaMa Vision 3.2 and Qwen2 Visual. The size of the dataset, the poison budget, the number of epochs and the generation strategy are analysed. Results confirm that poisoning can spread through unrelated tasks while preserving the overall model performance. Interestingly, attack effectivity rates above 99% can be achieved with just 5% of poison. The level of stealthiness depends on the type of attack, the targeted task and the model. We have also found a surprise effect by which a higher number of epochs do not always lead to a greater spread of the poison. Lastly, the choice of generation strategies has led to differences beyond 70% in the attack success rate. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Backdooring; Cross-contamination; Data poisoning; Machine learning; Multimodal LLMs; Multitasking LLMs,0,Information Systems Frontiers,2025 45,Osatuyi B.; Dennis A.R.,The Role of Personality in Fake News Sharing on Social Media: Reducing Extraverts’ Proclivity to Share Fake News,"Fake news is a critical societal issue. Most lay people believe that it is important not to share fake news stories, but research shows that confirmation bias (the alignment between a story and the user’s prior opinions) has a stronger effect on the decision to share a news story than the belief that a news story is true. Research also shows that some users are more likely to deliberately share news stories they believe are false. We conducted three experiments examining the role that personality plays in active sharing (e.g., posting new messages, videos, or pictures) and passive sharing (e.g., liking or sharing messages) of news stories that the user believes to be true and false. We found that users high in two personality traits (extraversion and agreeableness) were consistently more likely to share news stories that they believed to be false. Extraversion had a stronger effect on the decision to actively share a story than belief in the story and confirmation bias combined. Extraverts were more likely to share news stories they believed to be false than introverts were to share stories they believed to be true. In other words, sharing fake news was influenced more by extraversion than by the recognition that the story was false. Surprisingly, conscientiousness had no effect; highly conscientious users were as likely as less conscientious users to share news stories they believed to be fake. We then developed a personality-based intervention and found that it reduced the likelihood that users would share a story they believed was false, and that it had the strongest effects on extraverts. © The Author(s) 2025.",Believability; Confirmation bias; Fake news; Personality traits; Sharing; Social media,4,Information Systems Frontiers,2025 46,AlMasaud A.; Sampaio S.; Sampaio P.,Mining Data Wrangling Workflows for Design Patterns Discovery and Specification,"In this paper, we investigate Data Wrangling (DW) pipelines in the form of workflows devised by data analysts with varying levels of experience to find commonalities or patterns. We propose an approach for pattern discovery based on workflow mining techniques, addressing key challenges associated with finding patterns in data preparation solutions. The findings provide insights into the most commonly used DW operations, solution patterns, redundancies, and reuse opportunities in data preparation. The findings were used to create design pattern specifications curated into a catalog in the form of a DW Design Patterns Handbook. The evaluation of the proposed handbook is performed by surveying professionals with results confirming the usefulness of discovered patterns to the construction of DW solutions and assisting data analysts/scientists via the reuse of patterns and best practices in DW. © 2024, The Author(s).",Data preparation; Design patterns; Pattern specification; Reusability; Workflow mining,0,Information Systems Frontiers,2024 47,Poser M.; Küstermann G.C.; Tavanapour N.; Bittner E.A.C.,Design and Evaluation of a Conversational Agent for Facilitating Idea Generation in Organizational Innovation Processes,"Large numbers of incomplete, unclear, and unspecific submissions on idea platforms hinder organizations to exploit the full potential of open innovation initiatives as idea selection is cumbersome. In a design science research project, we develop a design for a conversational agent (CA) based on artificial intelligence to facilitate contributors in generating elaborate ideas on idea platforms where human facilitation is not scalable. We derive prescriptive design knowledge in the form of design principles, instantiate, and evaluate the CA in two successive evaluation episodes. The design principles contribute to the current research stream on automated facilitation and can guide providers of idea platforms to enhance idea generation and subsequent idea selection processes. Results indicate that CA-based facilitation is engaging for contributors and yields well-structured and elaborated ideas. © 2022, The Author(s).",Conversational Agent; Facilitation; Human-AI Interaction; Idea Generation; Open Innovation,28,Information Systems Frontiers,2022 48,Sringeswara S.; Singh J.B.; Sharma S.K.; Gouda S.K.,Revealing the Role of Intra-household Dynamics in Computer Adoption: An Inductive Theorization Approach Using Machine Learning in the Indian Context,"Research on technology adoption has focused on individual, organizational, and institutional factors, yet adoption within households in developing countries like India remains underexplored. To address this gap, we utilized a large-scale national household survey and a machine learning-based inductive approach to uncover the complex relationship between intra-household dynamics and computer adoption. Our study identified household education externalities, the education level of women in the family, and the presence of teenage children as key factors influencing computer adoption. Our decision tree analysis revealed the intricate combinations of predictors that impact adoption, offering nuanced explanations of this complex phenomenon. Our findings can inform the development of customer-oriented marketing strategies and customized intervention programs that address cost, access, and education inequalities hindering household computer adoption, benefiting computer makers and government policymakers. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Abduction; Algorithmic induction; Decision trees; Household computer adoption; Machine learning,2,Information Systems Frontiers,2025 49,Okeke R.I.; Eiza M.H.,The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies,"This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collection technique and used Nvivo aided thematic analysis and interpretivism underpinned by Role-Based Framework (RBF) for analysis. Our findings revealed that vagueness of roles and lack of clarity in sharing data security responsibilities are the major challenges of preventing IIDTRC in UK retail companies. We suggest an application of RBF which provides a conceptual analysis for cross-functional management team to address the challenges of preventing IIDTRC. RBF enables clarity of shared roles where both information security and crimes prevention teams work in unison is required to prevent IIDTRC to maximise internal data security. Contributions for policymakers are offered in this paper. © 2022, The Author(s).",Data security; Insider threat prevention; Internal identity theft related crimes; Qualitative case study; Retail sector; Role-based framework,6,Information Systems Frontiers,2023 50,Williams J.A.; Gupta S.,Integrating the IT Use Literature: Construct Validity and a Holistic Nomological Framework,"IT use is the fundamental construct of IS research. However, despite its centrality, the literature lacks agreement on the nature of the construct and its antecedents, which has led to a fragmented nomological network. We provide a comprehensive review of the existing empirical IT use constructs, analyze their overlaps, and distill them into three dominant constructs: adoption, static IT use, and innovative IT use. We then develop an overarching framework for extant IT use research by developing a holistic model. Each IT use construct has its own set of organizational and technological antecedents as well as psychological drivers. Our model synthesizes existing research and is empirically validated using a web-based survey of business technology users. These findings resolve issues in the conceptualization of IT use, integrate the fragmented IT literature, and help avoid the illusion of knowledge accumulation. The outcomes of the paper provide guidelines for researchers on the conceptualization of IT use as well as for practitioners regarding purposeful use-based design. Areas for future research in IT use are also recommended. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Innovative use; IT use; Literature review; Static use; Unified theory,1,Information Systems Frontiers,2025 51,Akanfe O.; Bhatt P.; Lawong D.A.,"Technology Advancements Shaping the Financial Inclusion Landscape: Present Interventions, Emergence of Artificial Intelligence and Future Directions","The global commitment to advancing financial inclusion (FI) relies on technology to connect underserved communities with the formal financial sector. Existing traditional technologies have made some progress, but they often fail to adapt to the unique needs of these populations. Although artificial intelligence (AI) offers new possibilities to meet these limitations, its rapid advancement has outpaced the development of integrative studies, leaving its potential impact on financial access by the underserved largely unexplored. Existing research provides fragmented insights into how different technological interventions impact diverse groups. We develop a segment-outcome-focused analysis to structure a scoping review of 95 information systems studies to assess current technological advances for FI and explore how AI can address their limitations, including limited digital literacy, uneven and high cost of infrastructure, and service personalization. We then engender future research directions and conclude with theoretical contributions and practical implications, emphasizing the potential of AI solutions to advance FI. © The Author(s) 2025.",Artificial Intelligence (AI); Financial Inclusion (FI); Interventions; Segments beneficiaries; Technological Advances,12,Information Systems Frontiers,2025 52,Dattathrani S.; De’ R.,The Concept of Agency in the Era of Artificial Intelligence: Dimensions and Degrees,"Human and material agency have been investigated in the IS literature to understand how technology and humans influence each other. Some framings of agency treat humans and technology symmetrically, some privilege the agency of humans over technology, and others do not attribute agency to either humans or non-humans. We argue that with the new generation of technologies, such as AI, the notion of agency needs to differentiate between the actions of AI from that of traditional information systems and humans. We introduce the dimensions of agency to differentiate agencies while not privileging any actor. We illustrate the application of dimensions by using it as a lens to study the case of a technician using an AI solution for screening patients for early-stage breast cancer. Through the use of the dimensions of agency we illustrate how the influence of AI over human practice, such as screening for early-stage breast cancer, is higher than the influence of traditional technology. We discuss our contribution to the theory of agency and conclude with a discussion on potential practical applications of the framework. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Agency; Artificial Intelligence (AI); Ethics; Healthcare; Moral machines; Responsible AI,49,Information Systems Frontiers,2023 53,Liu R.; Gupta S.; Patel P.,The Application of the Principles of Responsible AI on Social Media Marketing for Digital Health,"Social media enables medical professionals and authorities to share, disseminate, monitor, and manage health-related information digitally through online communities such as Twitter and Facebook. Simultaneously, artificial intelligence (AI) powered social media offers digital capabilities for organizations to select, screen, detect and predict problems with possible solutions through digital health data. Both the patients and healthcare professionals have benefited from such improvements. However, arising ethical concerns related to the use of AI raised by stakeholders need scrutiny which could help organizations obtain trust, minimize privacy invasion, and eventually facilitate the responsible success of AI-enabled social media operations. This paper examines the impact of responsible AI on businesses using insights from analysis of 25 in-depth interviews of health care professionals. The exploratory analysis conducted revealed that abiding by the responsible AI principles can allow healthcare businesses to better take advantage of the improved effectiveness of their social media marketing initiatives with their users. The analysis is further used to offer research propositions and conclusions, and the contributions and limitations of the study have been discussed. © 2021, The Author(s).",Consumer trust theory; Digital health; Information sharing theory; Responsible AI; Social media marketing; Technology acceptance model,71,Information Systems Frontiers,2023 54,Kauten C.; Gupta A.; Qin X.; Richey G.,Predicting Blood Donors Using Machine Learning Techniques,"The United States’ blood supply chain is experiencing market decline due to recent innovations in surgical practice, transfusion management, and hospital policy. These innovations strain US blood centers, resulting in cuts to surge capacities, consolidation, and reduced funding for research and outreach programs. In this study, we use data from a regional blood center to explore the application of contemporary machine learning algorithms for modeling donor retention. Such predictive models of donor retention can be used to design more cost effective donor outreach programs. Using data from a large US blood center paired with random forest classifiers, we are able to build a model of donor retention with a Mathews correlation of coefficient of 0.851. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Analytics; Blood donors; Blood supply; Machine learning; Retention,11,Information Systems Frontiers,2022 55,Kar A.K.; Kushwaha A.K.,Facilitators and Barriers of Artificial Intelligence Adoption in Business – Insights from Opinions Using Big Data Analytics,"Data-driven predictions have become an inseparable part of business decisions. Artificial Intelligence (AI) has started helping the product and support teams perform more accurate experiments in various business settings. This study proposes a framework for businesses based on inductive learnings related to success and barriers shared on social media platforms. Our goal is to analyse the signals emerging from these conversational opinions from the early adoption of AI, with a focus towards facilitators and barriers faced by teams. Factors like efficiency, innovation, business research, product novelty, manual intervention, adaptability, emotion, support, personal growth, experiential learning, fear of failure and fear of upgradation have been identified based on an exploratory study and then a confirmatory study. We present the learnings through a roadmap for practitioners. This study contributes to the IS literature by delineating AI as a determinant of success and introduces a lot of organizational factors into the model. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Big data analytics; Chatbots; Information systems adoption; Machine learning; Marketing automation,113,Information Systems Frontiers,2023 56,Bylois N.; Neven F.; Vansummeren S.,Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering,"We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality validation relies on data unit tests, which use global metrics to determine if data quality falls within expected ranges. Unfortunately, these existing approaches suffer from two limitations. Firstly, they offer only coarse-grained assessments, missing fine-grained errors. Secondly, they fail to pinpoint the specific data causing test failures. To address these issues, we propose a novel approach using conditional metrics, enabling more detailed analysis than global metrics. Our method involves two stages: unit test discovery and monitoring/error identification. In the discovery phase, we derive conditional metric-based unit tests from historical data, focusing on stability to select appropriate metrics. The monitoring phase involves using these tests for new data batches, with conditional metrics helping us identify potential errors. We validate the effectiveness of this approach using two datasets and seven synthetic error scenarios, showing significant improvements over global metrics and promising results in fine-grained error detection for data ingestion validation. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Data monitoring; Data profiling; Data unit tests; Dynamic data,0,Information Systems Frontiers,2024 57,Aghakhani N.; Oh O.; Gregg D.; Jain H.,How Review Quality and Source Credibility Interacts to Affect Review Usefulness: An Expansion of the Elaboration Likelihood Model,"This study extends our understanding of what makes an online review useful by examining the effects of review quality (i.e., as a composite variable of review comprehensiveness and review topic consistency) on review usefulness, and the moderating effects of source credibility on the relationship between review quality and review usefulness. The Elaboration Likelihood Model, convergence theory, and cueing effect literature are used to define the variables of review comprehensiveness and review topic consistency. Analyses of 27,517 restaurant reviews from Yelp show that review topic consistency has a positive effect on review usefulness, but, contrary to our hypothesis, review comprehensiveness has a negative effect on review usefulness. We also found source credibility positively moderates the effect of review comprehensiveness on review usefulness, but negatively moderates the effect of review topic consistency on review usefulness. Theoretical and practical implications are discussed. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Bias effect; Elaboration likelihood model; Online reviews; Review helpfulness; Review usefulness; Source credibility; Text mining,32,Information Systems Frontiers,2023 58,Weber M.; Engert M.; Schaffer N.; Weking J.; Krcmar H.,Organizational Capabilities for AI Implementation—Coping with Inscrutability and Data Dependency in AI,"Artificial Intelligence (AI) implementation incorporates challenges that are unique to the context of AI, such as dealing with probabilistic outputs. To address these challenges, recent research suggests that organizations should develop specific capabilities for AI implementation. Currently, we lack a thorough understanding of how certain capabilities facilitate AI implementation. It remains unclear how they help organizations to cope with AI’s unique characteristics. To address this research gap, we employ a qualitative research approach and conduct 25 explorative interviews with experts on AI implementation. We derive four organizational capabilities for AI implementation: AI Project Planning and Co-Development help to cope with the inscrutability in AI, which complicates the planning of AI projects and communication between different stakeholders. Data Management and AI Model Lifecycle Management help to cope with the data dependency in AI, which challenges organizations to provide the proper data foundation and continuously adjust AI systems as the data evolves. We contribute to our understanding of the sociotechnical implications of AI’s characteristics and further develop the concept of organizational capabilities as an important success factor for AI implementation. For practice, we provide actionable recommendations to develop organizational capabilities for AI implementation. © 2022, The Author(s).",Adoption; Artificial intelligence; Capability; Implementation; Knowledge-based view; Machine learning; Organization; Resource-based view,91,Information Systems Frontiers,2023 59,Cui Z.; Cui B.; Xu J.; Fu J.,A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network Coexistence,"The Beyond 5G (B5G) network promotes the development of all sectors of society and greatly changes our lives. To provide subscribers with better security and privacy protection, the 3rd Generation Partnership Project (3GPP) has enhanced the Non-Access Stratum (NAS) protocol for B5G. It is crucial to analyze the security of NAS protocol and confirm whether it achieves security goals. However, previous work mainly considered the issues in B5G standard, while overlooking the fact that 4G and B5G networks coexist in actual mobile network operators. In this paper, we provide the first systematic security analysis model for B5G NAS protocol under the assumption of network coexistence. We identified 9 protocol vulnerabilities, including one never reported before. This new vulnerability could be exploited to track the target user. We have reported the novel vulnerability to the GSM Association (GSMA) and obtained a tracking number CVD-2022-0058. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Attack; Beyond 5G; Protocol; Vulnerability,0,Information Systems Frontiers,2025 60,Singh A.; Rana N.P.; Huang X.; Dubey N.,The Influence of Data Breach Disclosures on R&D: Firm Strategies at Play,"R&D expenditure is crucial for firms to drive innovation, preserve competitive advantage, and guarantee long-term growth. Nevertheless, such long-term investments are susceptible to interruptions from unforeseen circumstances like mandatory disclosure of data breaches. The U.S. Government mandates all firms to publicly disclose data breach incidents, which invariably erodes stakeholder trust in a company’s governance and security procedures. For the purpose of achieving immediate stability and damage management, firms tend to frequently reallocate resources away from long-term expenditures, including R&D. Based on the signalling theory and the resource-based view, we investigate the impact on firms’ R&D expenditure after the mandatory disclosure of data breach incidents and identify firm-related characteristics that can affect the relationship between the post-breach disclosure phase and R&D investment. We use a unique dataset from the Audit Analytics Cybersecurity database, combined with Compustat from 2004 to 2024 for U.S. publicly traded firms, to empirically test our hypotheses. Our findings contribute to a deeper understanding of how firms navigate the tension between short-term crisis management and long-term innovation strategies in the aftermath of a data breach. © The Author(s) 2025.",Business orientation; Data breach; Mandatory disclosure; R&D expenditure; Strategic positioning,0,Information Systems Frontiers,2025 61,Topuz K.; Abdulrashid I.; Davazdahemami B.; Coussement K.; Delen D.,Developing an Interpretable Decision Support Framework for Artifact Design in Organ Transplantation,"This research enhances the healthcare IS literature by presenting a dual-level interpretable decision support framework tailored for organ transplantation. It incorporates a synergistic combination of elastic net, Bayesian belief networks, and Shapley additive explanations to construct a decision support system (DSS) that combines predictive capabilities regarding organ graft survival with elucidating contributing factors extracted using techniques from the explainable artificial intelligence (XAI) domain. This methodological innovation merges the computational prowess of machine learning with the clarity and ethical considerations of XAI to foster trust and transparency in healthcare AI applications. Based on a real-life dataset of 31,207 transplant records from the United Network for Organ Sharing (UNOS), the proposed DSS empowers healthcare professionals by offering a tool for refined feature selection, nuanced risk assessment, and personalized explanations, which enhance decision-making in organ transplantation. Crucially, the framework provides powerful dual-level interpretability: Bayesian Belief Networks offer transparent global insights into variable dependencies and population-level risks. At the same time, SHAP quantifies individual feature contributions to specific patient predictions, revealing why a particular outcome is predicted. We demonstrate the framework’s capability to support informed decision-making through simulated clinical scenarios and an interactive online tool, showcasing how its dual-level insights can be leveraged for practical use. This study contributes by introducing an interpretable DSS capable of dissecting and interpreting risk factors at both global and individual levels, advancing knowledge of determinants for graft longevity, and critically examining the pitfalls of traditional global explanation methods in ML, thus setting new standards for explainable analytics in healthcare. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Health care decision-making; Healthcare AI explainability; Organ transplantation risk analysis; Probabilistic modeling; XAI,0,Information Systems Frontiers,2025 62,Wendt C.; Adam M.; Benlian A.; Kraus S.,Let’s Connect to Keep the Distance: How SMEs Leverage Information and Communication Technologies to Address the COVID-19 Crisis,"COVID-19 caused significant challenges for small and medium-sized enterprises (SMEs) in the event industry. To address these challenges, many SMEs leveraged information and communication technologies (ICTs), with some even emerging strengthened from the crisis. Drawing on the technology-organization-environment framework and technology-affordances-and-constraints theory, we investigate the adoption of ICTs as a crisis response strategy in 10 SMEs in the German business event (e.g., corporate events, conferences) industry. Our findings reveal that ICT adoption not only depends on rational decisions based on organizational, environmental, and technological characteristics, but also on these dimensions’ interrelationship and the specific ICTs’ affordances and constraints. Introducing readily available ICTs (e.g., video-conferencing) has significant potential in addressing physical distancing in the short and medium term, while more sophisticated ICTs (e.g., virtual reality) are more likely to gain importance in the long term. Thus, we expand our understanding of organizational technology adoption and ICT-enabled crisis response strategies in SMEs. © 2021, The Author(s).",COVID-19; Crisis response; Information and communication technologies; SME; Technology-affordances-and-constraints theory; Technology-organization-environment framework,50,Information Systems Frontiers,2022 63,Lin S.-Y.; Hu Y.-H.; Lee P.-J.; Zeng Y.-H.; Chang C.-M.; Chang H.-C.,"Fake News Detection Model with Hybrid Features—News Text, Image, and Social Context","With the evolving realm of news propagation and the surge in social media usage, detecting and combatting fake news has become an increasingly important issue. Currently, fake news detection employs three main feature categories: news text, social context, and news images. However, most studies emphasize just one, while only a limited number incorporate image features. This study presents an innovative hybrid fake news detection model amalgamating text mining technology to extract news text features, user information on Twitter to extract social context features, and VGG19 model to extract news image features to increase the model's accuracy. We harness four diverse machine learning algorithms (Logistic Regression, Random Forest, Support Vector Machine, and Extreme Gradient Boosting) to construct models and evaluate their performance via Precision, Recall, F1-Score, and Accuracy metrics. Results indicate the fusion of news text, social context, and image features outperforms their individual application, yielding a noteworthy 92.5% overall accuracy. Significantly, social context attributes, encompassing users, publishers, and distribution networks, contribute crucial insights into detecting early-stage fake news dissemination. Consequently, our study bolsters fact-checking entities by furnishing them with news-content insights for verification and equips social media platforms with a potent fake news detection model—comprising news content, imagery, and user-centric social context data—to discern erroneous information. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Fake news detection; Machine learning; Social context; Text mining,0,Information Systems Frontiers,2025 64,Tutun S.; Johnson M.E.; Ahmed A.; Albizri A.; Irgil S.; Yesilkaya I.; Ucar E.N.; Sengun T.; Harfouche A.,An AI-based Decision Support System for Predicting Mental Health Disorders,"Approximately one billion individuals suffer from mental health disorders, such as depression, bipolar disorder, schizophrenia, and anxiety. Mental health professionals use various assessment tools to detect and diagnose these disorders. However, these tools are complex, contain an excessive number of questions, and require a significant amount of time to administer, leading to low participation and completion rates. Additionally, the results obtained from these tools must be analyzed and interpreted manually by mental health professionals, which may yield inaccurate diagnoses. To this extent, this research utilizes advanced analytics and artificial intelligence to develop a decision support system (DSS) that can efficiently detect and diagnose various mental disorders. As part of the DSS development process, the Network Pattern Recognition (NEPAR) algorithm is first utilized to build the assessment tool and identify the questions that participants need to answer. Then, various machine learning models are trained using participants’ answers to these questions and other historical data as inputs to predict the existence and the type of their mental disorder. The results show that the proposed DSS can automatically diagnose mental disorders using only 28 questions without any human input, to an accuracy level of 89%. Furthermore, the proposed mental disorder diagnostic tool has significantly fewer questions than its counterparts; hence, it provides higher participation and completion rates. Therefore, mental health professionals can use this proposed DSS and its accompanying assessment tool for improved clinical decision-making and diagnostic accuracy. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial Intelligence; Diagnosis; Disease Prediction; Feature selection; Healthcare Analytics; Machine learning; Mental Disorder; Network Pattern Recognition; Network Science; SCL-90-R,131,Information Systems Frontiers,2023 65,Huynh M.-T.,Individual Data-Driven Mindset and Decision-Making Performance: The Mediating Roles of Effort and Persistence,"Despite the growing importance of employees’ data-driven mindset (DDM) in enabling data-driven transformation, research on this concept remains limited. This study addresses this gap by developing a DDM instrument and illuminating its influence on individuals’ behaviors and decision-making performance. Grounded in the mindset theory of action phases and expectancy-value theory, DDM is constructed as a composite of expectancy beliefs, values, and perceived costs. This work theorizes that DDM shapes two forms of engagement-related behavior – effort and persistence – which, in turn, influence individual decision quality. Empirical analysis suggests that expectancy beliefs positively affect effort but not persistence, while values positively influence both effort and persistence, and perceived costs negatively impact persistence but not effort. Both effort and persistence are positively associated with decision quality. By introducing the DDM instrument, this study offers a novel and theoretically grounded tool for capturing individual cognitive orientations toward data use, enabling more precise empirical investigations into how such mindsets lead to data-driven behavior and decision quality. The findings enrich the data-driven transformation literature by shedding light on how DDM shapes engagement in data-centric practices and promotes a data-driven culture. © The Author(s) 2025.",Analytics mindset; Data-driven culture; Data-driven decision-making; Data-driven mindset; Expectancy-value theory; Rubicon model,0,Information Systems Frontiers,2025 66,Tang Y.M.; Chau K.Y.; Kuo W.T.; Liu X.X.,IoT-Based Information System on Cold-Chain Logistics Service Quality (ICCLSQ) Management in Logistics 4.0,"This study aims to develop a model to assess the impact of IoT technologies on cold-chain logistics service quality management and information of fresh product e-commerce in logistics 4.0. With eight primary characteristics and 40 dimension-related variables, we created a theoretical framework of IoT-based Cold-chain Logistics Service Quality (ICCLSQ) management through a structural equation model. A follow-up online poll of 522 previous fresh product purchasers who experienced features of logistics 4.0 was undertaken to assess customer expectations regarding the quality of information management and logistics service qualities in fresh product e-commerce. Statistical analysis was undertaken to investigate the attribute correlations and linear regressions were performed for analysis. Customers’ pleasure, return motivation, security and privacy are the four-logistics service quality scale dimensions in fresh products information management. The new theoretical model enables a better understanding of the LSQ factors that affect customer satisfaction on the information management of fresh product e-commerce enterprises, as well as enhancing the deployment of their services in light of Logistics 4.0. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",E-commerce; Fresh product; Information management; Internet of Things (IoT); Logistics 4.0; Logistics service quality; Theoretical model,29,Information Systems Frontiers,2024 67,Sadhukhan P.; Chakraborty T.,Footprints of Data in a Classifier: Understanding the Privacy Risks and Solution Strategies,"The widespread deployment of Artificial Intelligence (AI) across government and private industries brings both advancements and heightened privacy and security concerns. Article 17 of the General Data Protection Regulation (GDPR) mandates the Right to Erasure, requiring data to be permanently removed from a system to prevent potential compromise. While existing research primarily focuses on erasing sensitive data attributes, several passive data compromise mechanisms remain underexplored and unaddressed. One such issue arises from the residual footprints of training data embedded within predictive models. Performance disparities between test and training data can inadvertently reveal which data points were part of the training set, posing a privacy risk. This study examines how two fundamental aspects of classifier systems—training data quality and classifier training methodology—contribute to privacy vulnerabilities. Our theoretical analysis demonstrates that classifiers exhibit universal vulnerability under conditions of data imbalance and distributional shifts. Empirical findings reinforce our theoretical results, highlighting the significant role of training data quality in classifier susceptibility. Additionally, our study reveals that a classifier’s operational mechanism and architectural design impact its vulnerability. We further investigate mitigation strategies through data obfuscation techniques and analyze their impact on both privacy and classification performance. To aid practitioners, we introduce a privacy-performance trade-off index, providing a structured approach to balancing privacy protection with model effectiveness. The findings offer valuable insights for selecting classifiers and curating training data in diverse real-world applications. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Data obfuscation; GDPR right to erasure; Performance; Privacy of model; Privacy of training data; Vulnerability,0,Information Systems Frontiers,2025 68,Bernardi M.L.; Cimitile M.; Panella G.; Pecori R.; Simoncelli G.,Automatic Generation of Job Safety Reports with Explainable RAG-Based LLMs,"Monitoring workplace activities is critical for ensuring job safety. Generative Artificial Intelligence (Gen-AI) and Human-centered Artificial Intelligence (Hum-AI) can suggest new trustworthy solutions to automate these monitoring procedures, ensuring improved work accident prevention. In this paper, we present a novel framework that combines Retrieval Augmented Generation (RAG) with explainable LLMs to automatically generate job safety reports from unstructured accident descriptions. Our method integrates embeddings like BERT and SciBERT and explainable AI exploiting Layer-Wise Relevance Propagation (LRP) to highlight root causes of accidents within the generated reports. We evaluate multiple LLMs, including LLaMA 3.1, Mixtral-8x7B, and DeepSeek v2, on the Aviation Safety Reporting System (ASRS) dataset. Results show that our best configuration (Mixtral-8x7B with SciBERT) achieves F1-scores up to 0.909 and GLEU and METEOR scores above 0.3 and 0.2. These findings demonstrate the effectiveness and interpretability of the proposed system in real-world job safety contexts and how the proposed approach could assist safety experts or inspectors more explicitly. © The Author(s) 2025.",Decision support systems; Explainable AI; Job safety; Large Language Models; RAG; Reporting; Risk assessment,1,Information Systems Frontiers,2025 69,Pidnebesna A.; Hartman D.; Pokorná A.; Straka M.; Hlinka J.,Computing Approximate Global Symmetry of Complex Networks with Application to Brain Lateral Symmetry,"The symmetry of complex networks is a global property that has recently gained attention since MacArthur et al. 2008 showed that many real-world networks contain a considerable number of symmetries. These authors work with a very strict symmetry definition based on the network’s automorphism detecting mostly local symmetries in complex networks. The potential problem with this approach is that even a slight change in the graph’s structure can remove or create some symmetry. Recently, Liu (2020) proposed to use an approximate automorphism instead of strict automorphism. This method can discover symmetries in the network while accepting some minor imperfections in their structure. The proposed numerical method, however, exhibits some performance problems and has some limitations while it assumes the absence of fixed points and thus concentrates only on global symmetries. In this work, we exploit alternative approaches recently developed for treating the Graph Matching Problem and propose a method, which we will refer to as Quadratic Symmetry Approximator (QSA), to address the aforementioned shortcomings. To test our method, we propose a set of random graph models suitable for assessing a wide family of approximate symmetry algorithms. Although our modified method can potentially be applied to all types of symmetries, in the current work we perform optimization and testing oriented towards more global symmetries motivated by testing on the human brain. © The Author(s) 2025.",Approximate automorphism; Automorphism; Complex network; Graph matching; Graph symmetry; Quadratic assignment,2,Information Systems Frontiers,2025 70,Hastings S.; Moore T.; Gandal N.; Barnir N.,Quantifying Costs of Enhanced Security in Multifactor Authentication,"Multifactor authentication (MFA) is an essential cybersecurity control. While the benefits are substantial, MFA also introduces friction that impacts the productivity of legitimate users. In this paper, we construct and analyze a dataset of authentication logs from a University population spanning two years. We focus on two costs experienced by users: (1) login failures and (2) the time spent away from IT applications following a failed authentication before attempting to re-authenticate. The second measure captures how user frustration can manifest by avoiding or delaying future engagement after experiencing failures. Following an exogenous change in MFA policy from a simple deny/approve notification to a more cumbersome approach, we observe significant increases in the number of login failures and in time spent away following failures. We also briefly examine which types of users had the greatest difficulty adjusting to the more secure mobile MFA procedure. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Cybersecurity; Econometrics; Multifactor authentication; Opportunity costs,0,Information Systems Frontiers,2025 71,Lee Y.S.; Bang C.C.,Framework for the Classification of Imbalanced Structured Data Using Under-sampling and Convolutional Neural Network,"Among machine learning techniques, classification techniques are useful for various business applications, but classification algorithms perform poorly with imbalanced data. In this study, we propose a classification technique with improved binary classification performance on both the minority and majority classes of imbalanced structured data. The proposed framework is composed of three steps. In the first step, a balanced training set is created via under-sampling. Then, each example is converted into an image depicting a line graph. In the last step, a Convolutional Neural Network (CNN) is trained using the images. In the experiments, we selected six datasets from the UCI Repository and applied the proposed framework to them. The proposed model achieved the best receiver operating characteristic (ROC) curve and Balanced Accuracy (BA) on all the datasets and five datasets, respectively. This demonstrates that the combination of under-sampling and CNNs is a viable approach for imbalanced structure data classification. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Class imbalance; Convolutional neural network; Deep learning; Structured data,9,Information Systems Frontiers,2022 72,Hansen H.F.; Lillesund E.; Mikalef P.; Altwaijry Ν.,Understanding Artificial Intelligence Diffusion through an AI Capability Maturity Model,"The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of AI through a maturity lens. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value. © The Author(s) 2024.",AI Capabilities; AI maturity; Artificial Intelligence; Intelligent Systems; Organizational AI,25,Information Systems Frontiers,2024 73,Hammerschmidt T.; Hafner A.; Stolz K.; Passlack N.; Posegga O.; Gerholz K.-H.,A Review of How Different Views on Ethics Shape Perceptions of Morality and Responsibility within AI Transformation,"This paper examines the evolving dynamics of human-AI interaction, emphasizing the ethical challenges and responsibility gaps that emerge as AI technologies become more autonomous and integrated into society and business. We analyze, utilizing a systematic literature review, how various ethical views influence our understanding of morality and responsibility in human-AI collaborations. Deontological ethics emerge as a dominant theme, with much of the literature centered on ethical principles shaped by powerful nations. The study highlights the need to integrate diverse ethical perspectives into AI research to address contradictions in ethical frameworks across various cultural contexts. While respecting cultural differences, achieving a common ground among these frameworks requires increased dialogue among AI researchers and practitioners. Our findings further underscore the importance of future research in developing a more cohesive understanding of how AI transformation challenges previous assumptions about AI’s role in moral agency and responsibility. © The Author(s) 2025.",Ethical Theories; Moral Philosophy; Responsible AI; Systematic Review,6,Information Systems Frontiers,2025 74,Storey V.C.; Yue W.T.; Zhao J.L.; Lukyanenko R.,"Generative Artificial Intelligence: Evolving Technology, Growing Societal Impact, and Opportunities for Information Systems Research","The continuing, explosive developments in generative artificial intelligence (GenAI), built on large language models and related algorithms, has led to much excitement and speculation about the potential impact of this new technology. Claims include artificial intelligence (AI) being poised to revolutionize business and society and dramatically change personal life. However, it is not clear how this technology, with its significantly distinct features from past AI technologies, has transformative potential or how researchers in information systems should react to it. In this paper, we consider the evolving and emerging trends of AI in order to examine its present and predict its future impacts. Many existing papers on GenAI are either too technical for most information systems researchers or lack the depth needed to appreciate the potential impacts of GenAI. We, therefore, attempt to bridge the technical and organizational communities of GenAI from a system-oriented sociotechnical perspective. Specifically, we explore the unique features of GenAI, which are rooted in the continued change from symbolism to connectionism, and the deep systemic and inherent properties of human-AI ecosystems. We retrace the evolution of AI that proceeded the level of adoption, adaption, and use found today, in order to propose future research on various impacts of GenAI in both business and society within the context of information systems research. Our efforts are intended to contribute to the creation of a well-structured research agenda in the information systems community to support innovative strategies and operations enabled by this new wave of AI. © The Author(s) 2025.",Artificial Intelligence (AI); Connectionism; Framework for Generative AI as a Sociotechnical System; Generative AI (GenAI); Information Systems; Large Language Models (LLM); Societal impact,44,Information Systems Frontiers,2025 75,Lau J.S.Y.; Tang Y.M.; Gao G.; Fong K.N.K.; So B.C.L.,Development and Usability Testing of Virtual Reality (VR)-Based Reminiscence Therapy for People with Dementia,"The prevalence of dementia is increasing due to a longer life expectancy and an ageing population. Cognitive impairment affects patients’ daily lives and places a financial and healthcare burden on them and their families. Reminiscence therapy (RT) is a non-pharmacological approach that has been found to enhance the quality of life for older adults with or without dementia. There is an urgent need for more functional and effective treatments, such as virtual reality (VR), which are becoming increasingly popular. VR in RT is a relatively new field, and this paper proposes a conceptual model for developing proof-of-concept virtual reality-based reminiscence therapy (VR-RT) for people with dementia, based on the 4Is: immersion, interaction, imagination, and impression. This model is intended to offer an alternative therapeutic experience for older adults with dementia. This paper demonstrates VR-RT in accordance with the results from the proposed 4Is model, to depict different periods of the olden days of scenes, such as restoring the historical objects and appearance of the citizens. The proposed VR-RT is then evaluated with the occupational therapists (OTs) through pilot testing. The findings reveal that VR-RT based on the proposed model may elicit a positive attitude and motivation in older adults with dementia. The proposed 4Is model serves to offer essential features for VR development, followed by a survey to identify suitable reminiscence materials and themes tailored to older adults with dementia. A pilot test with OTs revealed that VR-RT has the potential to improve the conditions of people with dementia. The research contributes valuable insights and lays the groundwork for future development of VR-RT for people with dementia. © The Author(s) 2024.",4Is; Cognitive training; Dementia; Reminiscence therapy; Virtual reality,5,Information Systems Frontiers,2025 76,Kim J.S.; Yeo J.; Jain H.,An Economic Framework for Creating AI-Augmented Solutions Across Countries Over Time,"This paper examines the potential for collaboration between countries with differential resource endowments to advance AI innovation and achieve mutual economic benefits. Our framework juxtaposes economies with a comparative advantage in AI-capital and those with a comparative advantage in tech-labor, analyzing how these endowments can lead to enhanced comparative advantages over time. Through the application of various production functions and the use of Edgeworth boxes, our analysis reveals that strategic collaboration based on comparative advantage can yield Pareto improvements for both developed and developing countries. Nonetheless, this study also discusses the challenges of uneven benefit distribution, particularly the risk of “brain drain” from developing nations. Contributing to the discourse on the economics of AI and international collaboration, this study highlights the importance of thoughtful strategic planning to promote equitable and sustainable AI development worldwide. © The Author(s) 2024.",AI Infrastructure; Artificial Intelligence; Heterogeneous Country Responses; International Collaboration; Pareto Improvement; Pareto Optimality; Production Function; Resource Allocation; Tech Labor,0,Information Systems Frontiers,2024 77,Drydakis N.,Artificial Intelligence and Reduced SMEs’ Business Risks. A Dynamic Capabilities Analysis During the COVID-19 Pandemic,"The study utilises the International Labor Organization’s SMEs COVID-19 pandemic business risks scale to determine whether Artificial Intelligence (AI) applications are associated with reduced business risks for SMEs. A new 10-item scale was developed to capture the use of AI applications in core services such as marketing and sales, pricing and cash flow. Data were collected from 317 SMEs between April and June 2020, with follow-up data gathered between October and December 2020 in London, England. AI applications to target consumers online, offer cash flow forecasting and facilitate HR activities are associated with reduced business risks caused by the COVID-19 pandemic for both small and medium enterprises. The study indicates that AI enables SMEs to boost their dynamic capabilities by leveraging technology to meet new types of demand, move at speed to pivot business operations, boost efficiency and thus, reduce their business risks. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial Intelligence; Business Risks; COVID-19 pandemic; Dynamic Capabilities; SMEs,116,Information Systems Frontiers,2022 78,Schulz T.; Gewald H.; Böhm M.; Krcmar H.,Smart Mobility: Contradictions in Value Co-Creation,"Technical progress is disrupting the mobility sector. New door-to-door (D2D) mobility integrators promise to offer smart mobility by packaging together different mobility services such as car-sharing and public transport. However, mobility providers up to now have rarely entered into value co-creation relationships. As a result, citizens are offered mobility that cannot be considered truly smart. Although value co-creation has been the subject of numerous studies taking the service-dominant logic perspective, this research has often lacked empirical evidence. To close this gap, we conceptualize value co-creation between mobility providers and a D2D mobility integrator by applying Activity Theory. Based on a qualitative study in the German mobility sector, we identify several inhibitors of value co-creation from the viewpoint of mobility providers. In addition, we show how these inhibitors serve as triggers for adaptations, ultimately leading to the formation of a value co-creation relationship. © 2020, The Author(s).",Activity theory; Service-dominant logic; Smart mobility; Value co-creation,26,Information Systems Frontiers,2023 79,Krishna B.; Krishnan S.; Sebastian M.P.,"Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective","Cyberattacks can be considered one of the fundamental challenges that paralyze the progress of digital payment usage (DPU) progress among citizens, as consumers shun away from using digital banking services due to increased concern over information security. National Cybersecurity Commitment (NCSC) has emerged as a preventive cybersecurity mechanism for countries to tackle such cybersecurity threats. Previous studies have shown that a country's NCSC positively impacts the business and economy of the country. This study examines the effect of NCSC on digital payment usage (DPU) across nations by grounding our discussion on the institutional trust theory. As trusting belief in security measures is a culturally embedded characteristic, we also examine the moderating role of national culture through Hofstede’s cultural dimensions. We use multilevel models to analyze publicly available archives of repeated cross-sectional data covering 76 countries to test the proposed relationships. Our findings indicate that NCSC has a positive influence on DPU. Further, our results highlight that the relationship between NCSC and DPU in a country is contingent on cultural dimensions. Overall, the evidence suggests that a competent cybersecurity environment compatible with cultural values can influence the speedy diffusion of digital payments in a country. Implications of our findings for research and practice are also discussed. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cybersecurity commitment; Digital payment; Institutional trust; National culture; Preventive security,45,Information Systems Frontiers,2023 80,Ahmed A.; Al-Maamari M.; Firouz M.; Delen D.,An Adaptive Simulated Annealing-Based Machine Learning Approach for Developing an E-Triage Tool for Hospital Emergency Operations,"Patient triage at emergency departments (EDs) is necessary to prioritize care for patients with critical and time-sensitive conditions. In this paper, the metaheuristic optimization algorithms simulated annealing (SA) and adaptive simulated annealing (ASA) are proposed to optimize the parameters of extreme gradient boosting (XGB) and categorical boosting (CaB). The proposed algorithms are SA-XGB, ASA-XGB, SA-CaB, and ASA-CaB. Grid search (GS), a traditional approach used for machine learning fine-tuning, is also used to fine-tune the parameters of XGB and CaB, which are named GS-XGB and GS-CaB. The optimized model is used to develop an e-triage tool that can be used at EDs to predict ED patients' emergency severity index (ESI). The results show ASA-CaB outperformed all the proposed algorithms with accuracy, precision, recall, and f1 of 83.3%, 83.2%, 83.3%, and 83.2%, respectively. © This is a U.S. Government work and not under copyright protection in the US; foreign copyright protection may apply 2023.",E-triage automaton; Emergency severity index (ESI); Hospital emergency department; Hyperparameter optimization; Machine learning; Simulated annealing,5,Information Systems Frontiers,2024 81,French A.M.; George A.; Madden J.; Storey V.C.,"Tabloids, Fake News, and the Overton Window: The COP Model on News Consumption in Uncertain Times","There has been much discussion regarding fake news believability and consumption that is based on confirmation bias, as well as the impact of fake news on society. However, there has been little research that demarcates identifiable fake news from misinformation, satire, or parody in unknown situations. IS research also fails to recognize other forms of news that are similar and might not be true, including the long-existing tabloid news. This research derives a Content Dimensions-Overton Window-Perceived Utility (COP) model for fake news consumption that identifies factors that impact readers’ tendencies to accept or reject identifiable fake news even when the user does not have any predefined belief to confirm the news. It uses social media data collected during the 2020 Coronavirus outbreak and applies Multi-Attribute Utility Theory and the Overton window to identify a set of factors that represents users’ acceptance or rejection under unknown situations. These COP model factors are further analyzed by comparing fake news to traditional tabloid journalism to identify how these forms differ. The results show that individuals are highly sensitive to tone and emotional appeal when deciding to accept or reject a piece of news (tabloid or fake). However, they are less sensitive to truthfulness when dealing with identifiable fake news in uncertain situations than they are with tabloid journalism. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Content Dimensions-Overton Window-Perceived Utility (COP); Disinformation; Emotional appeal; Emotional utility; Fake news; Informational utility; Misinformation; Overton window; Parody; Relevance; Satire; Tabloid; Utility theory; Veracity,0,Information Systems Frontiers,2025 82,Oppong-Tawiah D.; Minocher X.; Boroomand F.; Webster J.,Meaningful Work as an Ethical Approach: Shaping the Next Generation of Organizational Gamification,"Gamified information systems have become widespread in organizations along with unintended ethical consequences. In parallel, recent advances in artificial intelligence and their promise for gamification raise new ethical concerns in the workplace. Building on a generational review of research progress in the field, we draw from work design, affordances, and value-sensitive design literatures to develop a theoretical framework and a related ethical design approach to encourage more meaningful work with organizational gamification. Our frameworks specify how game elements and their associated affordances can help transition organizational gamification from an add-on to an integrated part of instrumental work systems. We discuss how tying an ethical reflection into a historically informed view of progress in the field overcomes limitations in previous generations of gamification research and helps to resolve long-standing as well as emerging ethical concerns. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",AI; Dark side; Ethical design; Gamification; Theoretical review; Work design,4,Information Systems Frontiers,2025 83,Papagiannidis S.; Davlembayeva D.,Bringing Smart Home Technology to Peer-to-Peer Accommodation: Exploring the Drivers of Intention to Stay in Smart Accommodation,"COVID-19 has caused disruptions in the sharing economy for both platforms and owners, who are typically micro-businesses. Lower demand and ample supply means that users have a great deal of choice. Finding ways for properties to differentiate themselves has been a pressing need. Against this background, this paper pursued two objectives: firstly to explore the perceived functional and emotional value of smart accommodation and the factors contributing to this by adopting the Theory of Consumption Values, and secondly to examine the role of perceived value in driving intention to stay in smart accommodation in the future. 430 responses were collected to analyse the relationships among antecedents, value and intention. The results showed that the functional value of smart accommodation is associated with the perception that such accommodation represents good value for the price, smart devices are useful, they can enhance control of stay experiences, and there are resources and opportunities facilitating the use of technology. Emotional value is determined by the perception that staying in smart accommodation represents sustainable behaviour, the integration of smart home technologies offers control over the stay experience, improves the entertainment experience, aesthetics and playfulness of using technology. Emotional values are inhibited by the perception of surveillance in smart accommodation. Also, the study offers evidence of the correlation of intention with functional and emotional value. The evidence contributes to the literature by explaining the potential implications of innovative technologies for business recovery in the post-pandemic reality, exploring the applications of smart technologies in delivering tourism services, and identifying the factors in the adoption of smart homes in the hospitality sector. The findings provide practical implications for facilitating the applications of innovative technology and its adoption in home and non-home environments. © 2021, Crown.",Hospitality; Sharing economy; Smart accommodation; Smart homes; SMEs; The theory of consumption values; Value,42,Information Systems Frontiers,2022 84,Li Y.; Gan Z.; Zheng B.,How do Artificial Intelligence Chatbots Affect Customer Purchase? Uncovering the Dual Pathways of Anthropomorphism on Service Evaluation,"Although chatbots are increasingly deployed in customer service to reduce the burden of human labor and sometimes replace human employees in online shopping, there remains the challenge of ensuring consumers’ service evaluation and purchase decisions after chatbot service. Anthropomorphism, referring to human-like traits exhibited by non-human entities, is considered a key principle to facilitate customers’ positive evaluation of chatbot service and purchase decisions. However, equipping chatbots with anthropomorphism should be planned and rolled out cautiously because it could be both advantages to building customer trust and disadvantages for increasing customer overload. To understand how customers process and react to chatbot anthropomorphism, this study applied Wixom and Todd’s model and social information processing theory which guide this study to examine how object-based social beliefs (i.e., chatbot warmth and chatbot competence) of anthropomorphic chatbot influence service evaluation and customer purchase by generating behavioral beliefs (i.e., trust in chatbot and chatbot overload). The research model was examined with a “lab–in–the–field” experiment of 212 samples and two scenario-based experiments of 124 samples and 232 samples. The results showed that chatbot warmth and competence had significant effects on trust in chatbot and chatbot overload. Trust in chatbot and chatbot overload further significantly impact service evaluation and then customer purchase. Implications for theory and practice are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Anthropomorphism; Chatbot; ICT–related overload; Service evaluation; Trust,19,Information Systems Frontiers,2025 85,Wang W.; Chen L.; Xiong M.; Wang Y.,Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care,"Artificial Intelligence (AI) technology is transforming the healthcare sector. However, despite this, the associated ethical implications remain open to debate. This research investigates how signals of AI responsibility impact healthcare practitioners’ attitudes toward AI, satisfaction with AI, AI usage intentions, including the underlying mechanisms. Our research outlines autonomy, beneficence, explainability, justice, and non-maleficence as the five key signals of AI responsibility for healthcare practitioners. The findings reveal that these five signals significantly increase healthcare practitioners’ engagement, which subsequently leads to more favourable attitudes, greater satisfaction, and higher usage intentions with AI technology. Moreover, ‘techno-overload’ as a primary ‘techno-stressor’ moderates the mediating effect of engagement on the relationship between AI justice and behavioural and attitudinal outcomes. When healthcare practitioners perceive AI technology as adding extra workload, such techno-overload will undermine the importance of the justice signal and subsequently affect their attitudes, satisfaction, and usage intentions with AI technology. © 2021, The Author(s).",Artificial Intelligence (AI); Attitudes; Employee engagement; Responsible AI; Satisfaction; Usage intentions,113,Information Systems Frontiers,2023 86,Franque F.B.; Oliveira T.; Tam C.,Continuance Intention of Mobile Payment: TTF Model with Trust in an African Context,"The use of mobile payment (m-payment) is growing exponentially in developing countries. A small number of investigations have been undertaken on what makes people continue to use m-payment in an African context. We combine the task technology fit (TTF) model, expectation-confirmation model (ECM), and trust dimension to explain the influence of continuance use of m-payment. We collected 384 valid questionnaire responses from Mozambique. The results show that the relevant constructs to explain continuance intention are use, individual performance, overall trust, and the moderation role of satisfaction. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",African context; Continuance intention; Expectation-confirmation model; Mobile payment; Task technology fit model; Trust,69,Information Systems Frontiers,2023 87,Khatami H.; Abdolvand N.; Homayoun S.; Harandi S.R.,Sustainable Development and Corporate Profitability: Data Mining Approach,"With the expansion of business activities around the world and the importance of sustainability in various fields, corporate sustainability has become a strategic imperative for management plans and investment decision. Therefore, this study focuses on examining the contribution of sustainability variables, i.e., economic, social, and environmental (ESG), to corporates profitability at 5936 companies distributed globally in an industry sectors using the data mining methods. The data extracted from Thomson Reuters database (ASSET4 ESG) for the period of 2002–2017 was used for modelling. Different algorithms, such as decision tree, support vector machine, and Naïve Bayes, were used for modelling. Since the current study uses a multi-class classification, the Kappa criterion was used to assess the quality of the classification algorithm. The results of the study confirmed that none of the sustainability dimensions had a negative impact on corporate profitability. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.","Artificial intelligence; Corporate profitability; Data mining; Environmental, social, and governance (ESG) index; Machine learning; Sustainability",5,Information Systems Frontiers,2025 88,Bose I.; Kar A.K.; Lee G.M.; Leung A.C.M.; Kim D.J.,Artificial Intelligence and the Bright Internet: Transforming the Internet for a Better Future,[No abstract available],,0,Information Systems Frontiers,2025 89,Deveci B.U.; Celtikoglu M.; Albayrak O.; Unal P.; Kirci P.,Transfer Learning Enabled Bearing Fault Detection Methods Based on Image Representations of Single-Dimensional Signals,"Bearings are vital components in rotating machinery. Undetected bearing faults may result not only in financial loss, but also in the loss of lives. Hence, there exists an abundance of studies working on the early detection of bearing faults. The rising use of deep learning in recent years increased the number of imaging types/neural network architectures used for bearing fault classification, making it challenging to choose the most suitable 2-D imaging method and neural network. This study aims to address this challenge, by sharing the results of the training of eighteen imaging methods with four different networks using the same vibration data and training metrics. To further strengthen the results, the validation dataset size was taken as five times the training dataset size. The best results obtained is 99.89% accuracy by using Scattergram Filter Bank 1 as the image input, and ResNet-50 as the network for training. Prior to our work, Scattergram images have never been used for bearing fault classification. Ten out of 72 methods used in this work resulted in accuracies higher than 99.5%. © The Author(s) 2023.",CNN; Deep learning; Defect detection; GoogLeNet; Inception-ResNet-v2; ResNet-50; Rolling bearings fault determination; Scattergram; Signal processing; SqueezeNet; Time–frequency images; Transfer learning,28,Information Systems Frontiers,2024 90,Chiu M.-L.; Chiao C.; Lin C.-N.,The Mediating Role of Absorptive Capability Between the Effect of Organizational Internalization Through Social Media on Open Inbound Innovation,"Organizational chain innovation is a crucial issue for large-scale businesses, and firms that have adopted external knowledge can enhance innovation efficiency. However, to gain external knowledge does not mean to simply copy external information; instead, the firm must effectively use the knowledge it obtains for innovation. Social media provides employees with opportunities to communicate with customers, and is thus important for fostering firms’ organizational socialization. The socialization process of an organization comprises individual/employee level and functional department level. However, without the development of absorptive capability during the socialization process, the acquired information may be considered as a superficial feature, rather than an essential nature for an effect on an inbound open innovation. This study proposes an innovative and complete research model based on media system dependency theory to discuss the interrelationship between the social media information of organizations and their inbound open innovation. Empirical analysis shows the important link for these components of inbound open innovation. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Absorptive capacity; Inbound open innovation; Media system dependency theory; Social media information,6,Information Systems Frontiers,2024 91,Wu L.; Zhang Z.; Huang J.; Su I.-H.; Tian S.,Digital Technologies and Supply Chain Resilience: A Resource-Action-Performance Perspective,"This study empirically examines how various digital technologies individually and collectively contribute to supply chain resilience (SCRes) in coping with major disruptions. While there is no shortage in the IS literature to study the use of digital technologies, current trend is prevailed with either the investigation of single technology or treating all deployed technologies as an undifferentiated whole. Therefore, theoretically, we aim to address the lack of conceptual clarity and insights in the use of multiple digital technologies in tandem. To operationalize this research, we deploy and build on the Resource-Action-Performance (RAP) perspective, and categorize widely used digital technologies into two, namely, resource-oriented and action-oriented technologies. We then empirically investigate how these two categories of digital technologies are orchestrated to help maintain and improve SCRes for manufacturing firms during major disruptions, in this case, Covid-19. The results show a positive effect of resource-oriented technologies on SCRes, which is mediated by action-oriented technologies. Our contributions to the IS literature are threefold. First, our study provides important theoretical insights by analytically separating and categorizing different digital technologies as a means to enrich our understanding in the use of multiple technologies in tandem. Second, we offer empirical evidence to elaborate different functions and values that different digital technologies individually and collectively contributed to firm’s capability in SCRes and its ability to cope with major disruptions. Third, our study provides practical insights into utilizing digital tools to maintain business continuity in uncertain environments. © The Author(s) 2025.",Digital technologies; Industry 4.0; Resource-action-performance; Supply chain resilience,10,Information Systems Frontiers,2025 92,Tingelhoff F.; Schultheiss R.; Schöbel S.M.; Leimeister J.M.,Qualitative Insights into Organizational Value Creation: Decoding Characteristics of Metaverse Platforms,"The significance of metaverse platforms is growing in both research and practical applications. To utilize the chances and opportunities metaverse platforms offer, research and practice must understand how these platforms create value, which has not been adequately explored. Our research explores the characteristics of metaverse platforms that facilitate value creation for organizations in both B2B and B2C sectors. Employing a qualitative inductive approach, we conducted 15 interviews with decision-makers from international corporations active in the metaverse. We identified 26 metaverse platform characteristics, which we categorized into six dimensions based on the DeLone and McLean Information Systems success model. Subsequently, we provide examples to illustrate the application of these identified characteristics within metaverse platforms. This study contributes to the academic discourse by uncovering the characteristics that shape the competitive landscape of emerging metaverse platforms. Leveraging these characteristics may offer metaverse providers a competitive edge in attracting complementary organizations to their platforms. © The Author(s) 2024.",Complementors; Metaverse Platform Ecosystem; Organizational Value Creation; Platform Characteristics,7,Information Systems Frontiers,2025 93,Balakrishnan J.; Dwivedi Y.K.; Hughes L.; Boy F.,Enablers and Inhibitors of AI-Powered Voice Assistants: A Dual-Factor Approach by Integrating the Status Quo Bias and Technology Acceptance Model,"This study investigates the factors that build resistance and attitude towards AI voice assistants (AIVA). A theoretical model is proposed using the dual-factor framework by integrating status quo bias factors (sunk cost, regret avoidance, inertia, perceived value, switching costs, and perceived threat) and Technology Acceptance Model (TAM; perceived ease of use and perceived usefulness) variables. The study model investigates the relationship between the status quo factors and resistance towards adoption of AIVA, and the relationship between TAM factors and attitudes towards AIVA. A sample of four hundred and twenty was analysed using structural equation modeling to investigate the proposed hypotheses. The results indicate an insignificant relationship between inertia and resistance to AIVA. Perceived value was found to have a negative but significant relationship with resistance to AIVA. Further, the study also found that inertia significantly differs across gender (male/female) and age groupings. The study's framework and results are posited as adding value to the extant literature and practice, directly related to status quo bias theory, dual-factor model and TAM. © The Author(s) 2021.",Artificial intelligence; Dual-factor model; Resistance to change; Status quo bias theory; Voice assistants,125,Information Systems Frontiers,2024 94,Zaman N.; Goldberg D.M.; Gruss R.J.; Abrahams A.S.; Srisawas S.; Ractham P.; Şeref M.M.H.,Cross-Category Defect Discovery from Online Reviews: Supplementing Sentiment with Category-Specific Semantics,"Online reviews contain many vital insights for quality management, but the volume of content makes identifying defect-related discussion difficult. This paper critically assesses multiple approaches for detecting defect-related discussion, ranging from out-of-the-box sentiment analyses to supervised and unsupervised machine-learned defect terms. We examine reviews from 25 product and service categories to assess each method’s performance. We examine each approach across the broad cross-section of categories as well as when tailored to a singular category of study. Surprisingly, we found that negative sentiment was often a poor predictor of defect-related discussion. Terms generated with unsupervised topic modeling tended to correspond to generic product discussions rather than defect-related discussion. Supervised learning techniques outperformed the other text analytic techniques in our cross-category analysis, and they were especially effective when confined to a single category of study. Our work suggests a need for category-specific text analyses to take full advantage of consumer-driven quality intelligence. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Business intelligence; Quality management; Sentiment analysis; Supervised learning; Text analytics; Unsupervised learning,10,Information Systems Frontiers,2022 95,Saurabh K.; Upadhyay P.; Rani N.,Towards Blockchain Decentralized Autonomous Organizations (DAO) Design,"A decentralized autonomous organization (DAO) can be envisioned as an organization or society where its design, processes, and operational tasks are coded in the form of agreements or smart contracts, adhering to guidelines, values, and collective consensus. This paper underpins how organization design constructs (structure, strategy) and organization innovation constructs (innovation complexity, novel delivery) are related and sequenced to DAO transformation excellence (organizational excellence, organizational user expectation). An online survey of 262 blockchain DAO practitioners and researchers was conducted using SmartPLS to demonstrate empirical research findings (probably the first empirical research paper) on the implementation of blockchain DAO in organization design. The study focuses on understanding the role of blockchain DAO in organization design and innovation and how the users can leverage the technology, its substitutes, implementation readiness, and its impacts on organizations. Findings from the paper will help managers develop platforms and tools for various situations related to DAO-led organization design. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Blockchain; Decentralized autonomous organization (DAO); Distributed ledger technology; Smart contracts,10,Information Systems Frontiers,2025 96,Kumar S.; Lim W.M.; Sivarajah U.; Kaur J.,Artificial Intelligence and Blockchain Integration in Business: Trends from a Bibliometric-Content Analysis,"Artificial intelligence (AI) and blockchain are the two disruptive technologies emerging from the Fourth Industrial Revolution (IR4.0) that have introduced radical shifts in the industry. The amalgamation of AI and blockchain holds tremendous potential to create new business models enabled through digitalization. Although research on the application and convergence of AI and blockchain exists, our understanding of the utility of its integration for business remains fragmented. To address this gap, this study aims to characterize the applications and benefits of integrated AI and blockchain platforms across different verticals of business. Using bibliometric analysis, this study reveals the most influential articles on the subject based on their publications, citations, and importance in the intellectual network. Using content analysis, this study sheds light on the subject’s intellectual structure, which is underpinned by four major thematic clusters focusing on supply chains, healthcare, secure transactions, and finance and accounting. The study concludes with 10 application areas in business that can benefit from these technologies. © 2022, The Author(s).",Artificial intelligence; Blockchain; Business; Fourth industrial revolution; Integration; IR 4.0; Trends,283,Information Systems Frontiers,2023 97,Tu Y.-J.; Kapoor G.; Piramuthu S.,On Group Ownership Delegate Protocol for RFID Systems,"As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag’s side, it is not uncommon for RFID tags to be read by multiple readers. Even more, when an item moves between owners, ownership of the RFID tagged item needs to be updated to reflect reality. As authentication protocols play a critical role in RFID-based systems, it is necessary to ensure that any developed protocol is free from vulnerabilities that can be taken advantage by an adversary to mount attacks on the system. Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) develop group ownership authentication protocols for a group of RFID-tagged items that simultaneously switch ownership. We evaluate the protocols in Lee et al. (Information Systems Frontiers, 21, 1153-1166, 2019) and identify several critical vulnerabilities. We then discuss the sources of these vulnerabilities and common precautions that should be taken to avoid such vulnerabilities. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",authentication; group ownership transfer; RFID; vulnerabilities,2,Information Systems Frontiers,2022 98,Dhar S.; Bose I.,Corporate Users’ Attachment to Social Networking Sites: Examining the Role of Social Capital and Perceived Benefits,"The debate on the pros and cons of employee attachment to social networking sites (SNS) has led to social media policy paralysis in many organizations, and often a prohibition on employee use of SNS. This paper examines corporate users’ attachment to SNS. An analysis of 316 survey responses showed that corporate users’ socialization in large public SNS was steeped in perceived work-related benefits, which in turn nourished their SNS attachment. Social use outperformed informational use in generating perceived work-related benefits from SNS. Weak ties in large heterogeneous networks resulted in strategic and operational benefits, whereas the effects of strong bonding in homogenous networks were limited to operational benefits. The paper contributes to research on SNS use by corporate users and the debate on the effect of SNS use for work. The findings will benefit SNS strategists of organizations and policymakers to exploit the benefit potential of public SNS. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Attachment theory; Corporate user; Perceived benefits; Social capital theory; Social networking sites; Uses and gratifications theory,19,Information Systems Frontiers,2023 99,Ren W.; Tong X.; Du J.; Wang N.; Li S.; Min G.; Zhao Z.,Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation,"The Internet of Things (IoT) and Industrial 4.0 bring enormous potential benefits by enabling highly customised services and applications, which create huge volume and variety of data. However, preserving the privacy in IoT and Industrial 4.0 against re-identification attacks is very challenging. In this work, we considered three main data types generated in IoT: context data, continuous data, and media data. We first proposed a stream data anonymisation method based on k-anonymity for data collected by IoT devices; and then privacy enhancing techniques for both continuous data and media data were proposed for different IoT scenarios. The experiment results show that the proposed techniques can well preserve privacy without significantly affecting the utility of the data. © The Author(s) 2021.",Data anonymisation; Industrial 4.0; Internet of things (IoT); Privacy preserving,24,Information Systems Frontiers,2024 100,Tiwari A.A.; Gupta S.; Zamani E.D.; Mittal N.; Agarwal R.,An Overarching Conceptual Framework for ICT-enabled Responsive Governance,"Over the recent years, responsiveness has gained importance as it is a critical element of public governance processes and acts as a driving factor for supporting the achievement of governance objectives, especially in the implementation phases. In this study, we identify the knowledge gaps in the realm of responsive governance based on a systematic literature review. Based on our analysis, we propose a conceptual framework of major building blocks (input, process and outcomes) for the development and implementation of responsive governance at the local, regional and national levels of administrative hierarchy. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Citizen-centric; Governance; ICT; Responsiveness; Service delivery; Value co-creation,4,Information Systems Frontiers,2024 101,Tutun S.; Harfouche A.; Albizri A.; Johnson M.E.; He H.,A Responsible AI Framework for Mitigating the Ramifications of the Organ Donation Crisis,"Thousands of people die while waiting for organ transplants due to a significant gap between demand and supply. This gap often leads to illegal activities and ethical issues such as illicit organ trade and auctions. Therefore, to increase the organ supply and procure more organs, organizations must understand the causes of families who refuse to consent to donate their loved one's organs. Furthermore, such organizations must better identify those families most likely to consent to organ donation. We propose a responsible AI framework that integrates network science and artificial intelligence to identify consent outcomes for organ donation. The proposed framework includes three phases: (1) collecting and pre-processing data, (2) creating new features and identifying root causes of family refusal, and (3) training and testing models to predict the probability of families granting consent for organ donation. The designed artifact included collaborative decisions and network measures, increasing explainability through network science. It integrated human reviews and assessment of risks which increases correct and interpretable predictions. Results can help encourage organ donations and reduce the illegal organ trade. The experimental results show that the designed artifact outperformed previous studies identifying factors affecting consent outcomes. This framework integrates network science and artificial intelligence to reduce maleficence, solve the lack of transparency (i.e., increase trustworthiness) and improve accountability of the model that aims to predict consent outcomes. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",AI Ethics; Machine Learning; Network Analysis; Organ Donation; Responsible AI,22,Information Systems Frontiers,2023 102,Shaikh F.A.; Siponen M.,Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions,"IS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches influences subsequent investment decisions. Using firm-level data on 722 firms in the UK, we find that higher breach costs are more likely to elicit increases in cybersecurity investments. This relationship is further strengthened if a third party identifies the breach instead of the focal firm. We contribute to the literature on cybersecurity investments and incident response. The findings stress the need for firms to analyze aspects of their cybersecurity performance and use them as feedback for investment decisions, making these decisions data-driven and based on firm-specific needs. © The Author(s) 2023.",Breach cost; Breach identification; Cybersecurity breach; Cybersecurity investment; Cybersecurity performance; Organizational learning,38,Information Systems Frontiers,2024 103,Menezes S.M.; Kumar A.; Dutta S.,Navigating in Turbulent Times: Using Social Media to Examine Small and family-Owned Business Topics and Sentiments during the COVID-19 Crisis,"During a crisis, small and family-owned businesses tend to experience more severe economic consequences than their larger counterparts and often lack financial resources needed to weather the challenges brought about by the crisis. To comprehend the distinct challenges and concerns of small and family-owned businesses during a major crisis, this research study focuses on the recent COVID-19 pandemic, which had a catastrophic effect on businesses and societies alike. To that effect, we address two research questions: First, what topics pertaining to small and family-owned businesses do social media users discuss during the COVID-19 pandemic? To achieve this goal, we employ the BERTopic model, a state-of-the-art technique for topic modeling, to identify and categorize prevalent themes arising from the discourse. Second, what is the impact of major government announcements on these discussions? Specifically, we study how sentiments change around a major government announcement aimed at supporting small businesses in the face of the pandemic. Our findings suggest that government announcements do not change the negative sentiments for most of the topics. This highlights the ineffectiveness of government announcements in alleviating people’s concern related to small and family-owned business and underscores the importance of a better consultation process and communication strategy by policymakers. The implications of our study transcend recent COVID-19 effects, as World Health Organization (WHO) cautions that there could be even worse health and socio-economic crises in the future, and we need to be better prepared to handle subsequent devastating effects. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",BERTopic; Clustering; Coronavirus; COVID-19; Social media; Topic model,1,Information Systems Frontiers,2025 104,Cercenelli L.; Emiliani N.; Gulotta C.; Bevini M.; Badiali G.; Marcelli E.,Augmented Reality to Assist in the Diagnosis of Temporomandibular Joint Alterations,"Augmented Reality (AR) is an increasingly prominent technology with diverse applications across various surgical disciplines. This study aims to develop and assess the feasibility of a novel AR application intended to aid surgeons in the clinical assessment of temporomandibular joint (TMJ) alterations necessitating surgical intervention. The application employs a multi-modality tracking approach, combining both marker-less and marker-based tracking techniques to concurrently track the fixed portion of the joint and the movable mandible involved in TMJ. For the marker-based tracking both a planar marker with a binary QR-code pattern and a cuboid marker that contains a unique QR-code pattern on each face were tested and compared. The AR application was implemented for the HoloLens 2 head-mounted display and validated on a healthy volunteer performing the TMJ task, i.e. the opening and closing of the mouth. During the task, video recordings from the HoloLens cameras captured the horizontal and vertical excursions of the jaw movements (TMJ movements) using virtual markers anchored to the AR-displayed virtual anatomies. For validation, the video-recorded TMJ movements during AR viewing were compared with standard kinesiographic acquisitions. The findings demonstrated the consistency between the AR-derived trajectories and the kinesiography curves, especially when using the cubic Multi Target tracker to follow the moving mandible. Finally, the AR application was experienced on a patient and it was extremely useful for the surgeon to diagnose alterations in the normal kinematics of the TMJ. Future efforts should be addressed to minimize the bulkiness of the tracker and provide additional visual cues for surgeons. © The Author(s) 2024.",3D technologies; Augmented reality; Diagnosis; HoloLens; Orthognathic surgery; Tracking technology,2,Information Systems Frontiers,2025 105,Obayi R.; Choudhary S.; Nayak R.; GV R.,Pragmatic Interoperability for Human–Machine Value Creation in Agri-Food Supply Chains,"This study delves into the dynamics of pragmatic interoperability, focusing on the case of a digital ecosystem in India —the eKrishi platform—which combines of industry 4.0 technologies with human-centric principles. Through qualitative analysis, we unveil the motivations shaping system and business-level interoperability alignment. We found that three categories of sustainability metrics—socio-economic, socio-ecological, and eco-efficiency— are driven by diverse pragmatic views. Furthermore, we found that system-level alignment is driven by actors’ defensive strategy for compliance and standardization, while business level interoperability is underpinned by actors’ offensive strategy for social and economic innovation. The study introduces a 2 × 2 alignment framework—corporate citizenship, regulatory stewardship, corporate stewardship, and value chain stewardship—offering nuanced insights. By aligning systems and business motives for pragmatic interoperability, we contribute towards theory building on interoperability and provide practical implications for guiding stakeholder alignment in Industry 4.0 initiatives. © The Author(s) 2025.",Business Innovation; Data Interoperability; Digital Platforms; Digital Supply Chain; Digital Transformation; Pragmatic Interoperability,4,Information Systems Frontiers,2025 106,Saba P.; Meissonier R.; Harfouche A.,"Different IT Projects, but the same Conflicts. Action Research During IT Deployment","Information System (IS) research has overlooked user conflicts in teams among simultaneous or successive Information Technology (IT) projects, leaving a gap in comprehending the potential contagion processes leading to project failure. While IS literature has separately developed theories on conflicts and conflict contagion, we conceptualize a whole theoretic system we call ""IT Conflict Contagion"" (IT-CC). This theory is used as a driver for a 2-year action research project conducted at a French management consulting firm during the second attempt of its Business Intelligence (BI) tool baptized “PMT.” While most MIS methods tend to manage conflicts within the boundaries of an IT project, we emphasize the need for a comprehensive understanding of past IT implementations and their impact on subsequent projects despite the different aims, designs, and functionalities of these IT systems. This research calls for IS researchers and practitioners to adopt a holistic conflict management perspective, considering the IT portfolio and the interplay between various IT systems to ensure successful IT implementation. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Action research; Conflict contagion; IT implementation; IT portfolio,4,Information Systems Frontiers,2025 107,Zhang J.; Li S.; Wang Y.,Shaping a Smart Transportation System for Sustainable Value Co-Creation,"The smart transportation system (STS) leverages ubiquitous and networked computing to improve the efficiency of urban mobility. Whilst existing IS work has explored various factors influencing STS development, there is a lack of consideration of how value can be created for building a more sustainable STS. Drawing upon the value co-creation theory and stakeholder theory, we seek to understand the socio-technical shaping of the STS ecosystem and how government, firms and citizens collaboratively create sustainable value for designing and implementing STS initiatives. To reach this aim, we carry out a longitudinal case study over 2016–2018 in Shijiazhuang, China. We offer both theoretical and practical explanations on (i) key value facets with regard to sustainable STS design and implementation; and (ii) a holistic view of iterative value co-creation process pushed by key stakeholders. This study makes particular contributions to the IS, marketing and transportation literature by offering a critical understanding of the social dynamics for shaping a big data-driven STS ecosystem. © 2021, The Author(s).",Citizen participation; Data governance; Smart transportation system; Sustainability; Value co-creation,36,Information Systems Frontiers,2023 108,Cho J.; Park I.,The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approach,"Electronic surveillance/monitoring has become ubiquitous in modern organizations as advanced information technology (IT) expands organizational capacity to track system users’ daily information systems (IS) activities. Although this environmental shift surrounding IS raises an important (though largely unexplored) issue of IS users’ information privacy and subsequent IS behaviors, little is known about cognitive/psychological processes and boundary conditions underlying IS users’ information privacy concerns and behaviors under the context of non-volitional workplace surveillance. Grounded on psychological reactance theory, this paper articulates how and when information privacy concerns under workplace surveillance relate to IS use behaviors (i.e., effective IS use and shadow IT use) via psychological reactance. In addition, it investigates IS procedural fairness, a contextual boundary condition. We tested a research model using two surveys (via online platforms) data collected from a sample of 301 and 302 IS users working under electronic surveillance/monitoring systems in various organizations and industries. Using moderated mediation analyses, the results of the study show that (1) psychological reactance mediates the relationship between IS users’ information privacy concerns and effective IS use and shadow IT use, respectively; and (2) IS procedural fairness acts as a boundary condition for the given mediated relationships such that the negative impacts of information privacy concerns on psychological reactance and IS behaviors are mitigated. Implications for theory and practice are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Cognitive/psychological processes; Effective information systems use; Electronic surveillance and monitoring in non-volitional contexts; Information privacy concerns; Information systems use behaviors; Shadow information technology use; Situational uncertainty,1,Information Systems Frontiers,2024 109,Chou Y.-C.; Shao B.B.M.,An Empirical Study of Information Technology Capabilities to Enable Value Chain Activities and Interfaces,"Information technology (IT) is a critical resource and asset for a firm’s internal operations and external interactions with outside stakeholders. This paper explores IT capabilities that enable a retailer’s value chain activities and interfaces with suppliers and customers. IT capabilities that enable the value chain activities of logistics and operations as well as those of marketing and sales are identified to examine how they influence a retailer’s implementation of value chain interfaces. Through the lens of organizational information processing theory (OIPT), we find that both IT capabilities and IT infrastructure play a pivotal role in implementing value chain interfaces but in distinctive ways. On the supplier-facing side, a retailer’s IT infrastructure and IT capabilities enabling logistics and operations are essential to its vendor-managed inventory (VMI) system. On the customer-facing side, a retailer’s e-commerce website requires IT infrastructure and IT capabilities that enable marketing and sales. Moreover, synergies are found downstream for e-commerce website that benefits from the integration of IT infrastructure and IT capabilities enabling logistics and operations while such synergies are not found upstream for VMI. This partial complementary effect is explicated by the sequential asymmetric information dependency of value chain activities. Finally, we discuss the implications of our findings for the research and practice of IT enablement and integration. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",e-commerce website; IT capabilities; IT infrastructure; Organizational information processing theory; Value chain activities and interfaces; Vendor-managed inventory,5,Information Systems Frontiers,2023 110,Ni P.; Okhrati R.; Guan S.; Chang V.,Knowledge Graph and Deep Learning-based Text-to-GraphQL Model for Intelligent Medical Consultation Chatbot,"Text-to-GraphQL (Text2GraphQL) is a task that converts the user's questions into Graph + QL (Query Language) when a graph database is given. That is a task of semantic parsing that transforms natural language problems into logical expressions, which will bring more efficient direct communication between humans and machines. The existing related work mainly focuses on Text-to-SQL tasks, and there is no available semantic parsing method and data set for the graph database. In order to fill the gaps in this field to serve the medical Human–Robot Interactions (HRI) better, we propose this task and a pipeline solution for the Text2GraphQL task. This solution uses the Adapter pre-trained by “the linking of GraphQL schemas and the corresponding utterances” as an external knowledge introduction plug-in. By inserting the Adapter into the language model, the mapping between logical language and natural language can be introduced faster and more directly to better realize the end-to-end human–machine language translation task. In the study, the proposed Text2GraphQL task model is mainly constructed based on an improved pipeline composed of a Language Model, Pre-trained Adapter plug-in, and Pointer Network. This enables the model to copy objects' tokens from utterances, generate corresponding GraphQL statements for graph database retrieval, and builds an adjustment mechanism to improve the final output. And the experiments have proved that our proposed method has certain competitiveness on the counterpart datasets (Spider, ATIS, GeoQuery, and 39.net) converted from the Text2SQL task, and the proposed method is also practical in medical scenarios. © 2022, The Author(s).",Deep learning; Health informatics; Knowledge graph; Natural language processing; Semantic parsing; Text-to-GraphQL,41,Information Systems Frontiers,2024 111,Chatterjee S.; Chaudhuri R.,Impacts of Industry 5.0 in Supply Chain Flow in Post COVID-19 Era: Moderating Role of Senior Leadership Support,"Industry 5.0 involves human and machines reunion by working together to improve the efficiency of service and production process. Industry 5.0 helps to create platforms for better value cocreation and open business models. Such open business model supports in integrating organizational competencies and customers’ preferences along with ensuring better services to meet the challenging needs of the tomorrows’ business world. It is an upcoming field of research and not many studies are available to understand the consequences of Industry 5.0 in the context of ambidexterity and absorptive capacity of the organization, especially from supply chain flow perspective in post COVID-19 period. Also, not many studies are available which have investigated the role of senior leadership support to facilitate adoption of industry 5.0 and sustainability of supply chain management process in the post COVID-19 period. With the support of absorptive capacity theory and existing literature, a conceptual model has been developed which was later validated using PLS-SEM technique considering 378 respondents from different industries. The study found that there is a significant impact of absorptive capacity of the organization towards successfully using industry 5.0 related technologies which in turn positively and significantly influence sustenance of supply chain flow in post COVID-19 period. The study also found that senior leadership support is necessary to successfully adopt and use industry 5.0 for sustaining supply chain flow in the post COVID-19 period. © 2024, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Absorptive capacity; Ambidexterity; COVID-19; Explorative and exploitative innovation; Industry 5.0; Supply chain,16,Information Systems Frontiers,2024 112,Younas M.; Awan I.,"Cloud, IoT and Data Science",[No abstract available],,4,Information Systems Frontiers,2024 113,Klee S.; Janson A.,Investigating Relevant Data in Automotive Procurement Departments: External Shocks as Transparency Creator for Data Deficits in Decision-Making,"Uncertainty becomes the new normal for organizations worldwide. Many organizations are dependent on complex global supply chains. COVID-19, but also environmental disasters or the war in Ukraine, demonstrate the volatility of supply chains. Procurement departments are the central interface between internal and external stakeholders and must manage the supply chain stability what requires fast and accurate decision-making. External shocks and sudden disruptions of central supply chains illustrated that data analytics could not prevent disruptions, although sound research on competitive advantages and numerous investments should have enabled organizations to data-driven decision-making. Rather, it became transparent, that there are numerous data deficits in organizations. We did an interview-based study with 23 procurement and supply chain experts about relevant data sets and the status of its usability. We contribute to theory and practice by uncovering relevant aspects of data and provide theoretical propositions on how decision-making can be improved in automotive procurement departments. © 2023, The Author(s).",Automotive manufacturers; Data analytics; Decision-making; External shocks; Procurement departments; Supply chain,0,Information Systems Frontiers,2023 114,Chatterjee S.; Mikalef P.; Khorana S.; Kizgin H.,Assessing the Implementation of AI Integrated CRM System for B2C Relationship Management: Integrating Contingency Theory and Dynamic Capability View Theory,"Customer relationship management (CRM) is a strategic approach to manage an organization’s interaction with current and potential customers. Artificial Intelligence (AI) can analyze huge volume of data without human intervention. The integration of AI with existing legacy CRM system in the business to customer (B2C) relationship makes sense given the massive potential for growth of AI integrated CRM system. Failure to plan AI-CRM technology implementation in an organization could lead some to success and others to failure. The Contingency theory states that it is not possible for organizations to take decisions without a contingency plan and the optimal course of action depends on the internal and external circumstances. The Dynamic Capability View theory emphasizes the organizational ability to react adequately in a timely manner to any external changes and combines multiple capabilities of the organization, including organizational CRM and AI capabilities. Against this background, the purpose of this study is to examine the success and failure of implementation of AI integrated CRM system in an organization from B2C perspective using Contingency theory and Dynamic Capability View theory. The study finds that information quality, system fit, and organizational fit significantly and positively impact the implementation of AI-CRM for B2C relationship management. Also, there is a moderating impact of technology turbulence on both acceptance and failure of AI-CRM capability in the organization. © The Author(s) 2022.",AI-CRM; B2C; Contingency theory; Dynamic capability view; Success and failure,47,Information Systems Frontiers,2024 115,Hossain M.A.; Akter S.; Ahsan M.F.; Ahmed J.U.; Khan S.,From Caterpillar to Butterfly: Social Media Engagement of the Socially Excluded Third-Gender People in Bangladesh,"This paper focuses on the effects of gender diversity – in terms of binary- and third-gender – on social media engagement (SMEn). Specifically, we examine the extent to which SMEn's antecedents and outcomes vary between binary- and third-gender people. Based on the uses and gratification theory (UGT), we develop and validate a model using two cross-sectional studies. Data have been collected from heterosexual and third-gender people (TGP) separately, and analysed with the structural equation modelling (SEM) technique. Our results show that the incentives and outcomes of SMEn are not identical across different gender groups; rather, socially excluded TGP take advantage of social media differently than their heterosexual counterpart. More specifically, habit is the strongest predictor of SMEn for the heterosexual group, which is emotional reassurance for the TGP. Interestingly, identity management is an important determinant of SMEn only for TGP, while social interaction is important for both groups. We further find that SMEn enhances both groups' quality of life and social self-esteem but more for TGP. This study advances knowledge by applying UGT in a new research setting within information systems. The findings provide guidelines to social media architects and policymakers on engaging socially disadvantaged people with social media and enhancing their social wellbeing. © The Author(s) 2023.",Social exclusion; Social media; Third gender; Uses and gratification,1,Information Systems Frontiers,2024 116,Yayla A.; Dincelli E.; Parameswaran S.,A Mining Town in a Digital Land: Browser-Based Cryptocurrency Mining as an Alternative to Online Advertising,"Advertising has been the most common strategy for content monetization. However, behavioral data collection for personalized advertisements has raised privacy concerns. This study explores users’ perceptions of browser-based cryptocurrency mining (BCM) as an alternative content monetization method to online advertising. The mining process is an essential part of blockchain technology, but it is a resource-intensive process. By utilizing BCM, content providers can mine cryptocurrency on the computers of website visitors and provide free or discounted services for the cost of the mining process. Considering that BCM revenue can be comparable to online advertisement while preserving user privacy at a negligible cost, we explored underlying factors affecting the adoption of BCM. We conducted a qualitative exploratory study using linguistic analysis and topic modeling of data collected from an online focus group. The results revealed that users raised security concerns and resisted BCM adoption due to its negative image and potential risk barriers. Our results further showed that online advertising benefits from the status quo bias. That is, although users raised both privacy and security concerns, they still considered online advertising. We extend the literature by analyzing controversial technology in the light of incumbent technology and provide directions for implementing BCM as a successful revenue stream. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Advertising; Blockchain; Controversial technology; Cryptocurrency; Privacy; Security; Technology adoption,3,Information Systems Frontiers,2024 117,El-Haddadeh R.; Fadlalla A.; Hindi N.M.,Is There a Place for Responsible Artificial Intelligence in Pandemics? A Tale of Two Countries,"This research examines the considerations of responsible Artificial Intelligence in the deployment of AI-based COVID-19 digital proximity tracking and tracing applications in two countries; the State of Qatar and the United Kingdom. Based on the alignment level analysis with the Good AI Society’s framework and sentiment analysis of official tweets, the diagnostic analysis resulted in contrastive findings for the two applications. While the application EHTERAZ (Arabic for precaution) in Qatar has fallen short in adhering to the responsible AI requirements, it has contributed significantly to controlling the pandemic. On the other hand, the UK’s NHS COVID-19 application has exhibited limited success in fighting the virus despite relatively abiding by these requirements. This underlines the need for obtaining a practical and contextual view for a comprehensive discourse on responsible AI in healthcare. Thereby offering necessary guidance for striking a balance between responsible AI requirements and managing pressures towards fighting the pandemic. © 2021, The Author(s).",COVID-19 pandemic; Ethics; Responsible Artificial Intelligence; Sentiment analysis,15,Information Systems Frontiers,2023 118,Xia P.; Wang Z.; Zhu X.,Predicting Customer Demand for MSE Loan Products: A Bilevel Dynamic Selective Ensemble Learning Method,"As business models shift from product-centric to customer-centric, financial institutions have transitioned from passively responding to micro and small enterprise (MSE) loan requests to proactively acquiring customers. Consequently, customer demand prediction (CDP) has become an indispensable component of credit decision-making. Dynamic selective ensemble learning, with its ability to capture diverse and complex demand patterns, holds great potential in improving CDP performance. However, key challenges remain, particularly in adapting to local nonlinearity and misclassification independence among base classifiers in complexity data distributions. To this end, we propose a bilevel dynamic selective ensemble learning method for CDP in MSE loan products. Specifically, we design a mutual information-based instance selection module to accommodate complexity data distribution with local nonlinearity adaptation. We also propose a double fault-based classifier selection module to select base classifiers with high complementarity and misclassification independence. Empirical evaluation demonstrates that the proposed method outperforms all state-of-the-art benchmarks. This study provides financial institutions with a novel tool for proactively identifying MSEs with loan demand, thereby enhancing the efficiency of loan product reach and significantly reducing customer acquisition costs. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Customer demand prediction; Double fault measure; Dynamic ensemble learning; Loan products; Mutual information,0,Information Systems Frontiers,2025 119,Li L.,Reskilling and Upskilling the Future-ready Workforce for Industry 4.0 and Beyond,"Industry 4.0 is revolutionizing manufacturing processes and has a powerful impact on globalization by changing the workforce and increasing access to new skills and knowledge. World Economic Forum estimates that, by 2025, 50% of all employees will need reskilling due to adopting new technology. Five years from now, over two-thirds of skills considered important in today’s job requirements will change. A third of the essential skills in 2025 will consist of technology competencies not yet regarded as crucial to today's job requirements. In this study, we focus our discussion on the reskilling and upskilling of the future-ready workforce in the era of Industry 4.0 and beyond. We have delineated top skills sought by the industry to realize Industry 4.0 and presented a blueprint as a reference for people to learn and acquire new skills and knowledge. The findings of the study suggest that life-long learning should be part of an organization’s strategic goals. Both individuals and companies need to commit to reskilling and upskilling and make career development an essential phase of the future workforce. Great efforts should be taken to make these learning opportunities, such as reskilling and upskilling, accessible, available, and affordable to the workforce. This paper provides a unique perspective regarding a future-ready learning society as an essential integral of the vision of Industry 4.0. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. corrected publication 2022. Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.","Experiential training; Future-ready workforce; Human capital; Industrial revolution; Industry 4.0; Reskilling, upskilling, competencies; Skill sets",401,Information Systems Frontiers,2024 120,Ogbanufe O.M.; Baham C.,Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret,"Authentication plays an important role in securing our systems but is threatened by increasingly sophisticated account hacking and account take over. Several security services have been developed, including multi-factor authentication (MFA) designed to cope with online account authentication. It remains unknown how users perceive and evaluate secure authentication for online account threats and consequently use it to protect their online account. Drawing on the Protection Motivation Theory (PMT) and the literature on anticipated regret, this study investigates the factors that affect the use of MFA secure authentication to avoid online account threats. This work extends PMT by showing how the emotion of anticipated regret heightens appraisals of threat and coping. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Account take-over; Anticipated regret; Multi-factor authentication; Online account hacking; Protection motivation theory,13,Information Systems Frontiers,2023 121,Kulkarni R.S.; Krishnan S.; Sebastian M.P.,A Dynamic Perspective to Drive Digital Servitization: A Meta-Synthesis Approach to Understand Interactions Between Key Factors,"The present study aims to establish a dynamic perspective of how the choice of attributes driving digital servitization (DS) and their interaction with each other contributes to the success of DS endeavors in firms. This study conducts a meta-synthesis of qualitative studies on DS, incorporating study-specific analysis followed by a cross-study synthesis. Utilizing the social exchange theory, it presents a framework that defines present and future firm configurations and guides transitions in the DS journey. This study bridges gaps in prior research on DS by providing a dynamic, theory-based perspective using meta-synthesis on how firms must evolve their attributes and capabilities to attain desired states in their transformation journey. The framework developed from this study provides practitioners with paths or sequences of decisions that a firm should follow over time to transition from one configuration to another for a firm’s success in DS. © The Author(s) 2025.",Ambidexterity; Co-development with customers; Digital servitization; Innovation culture; Management commitment; Specialization of knowledge; Value chain alignment and control,0,Information Systems Frontiers,2025 122,Qu G.; Xu Q.; Wang J.; Wu Y.; Wang X.,From Interpersonal Trust to Team Performance in App Design: Roles of Transactive Memory Systems and Social Ties,"The studies examining how interpersonal trust at the dyadic individual level affects team performance in app design have been sparse. Drawing upon the perspectives of transactive memory systems (TMS) and social ties, we propose that TMS mediates the effect of interpersonal trust on team performance. In addition, the centralization of instrumental ties and expressive ties moderates the effect of interpersonal trust and TMS. We capture team performance holistically with solution creativity, team efficiency, and member satisfaction. For hypothesis testing, we collect data based on a term project of app design with 79 teams at a major university in China. Our results show that the centralization of instrumental ties strengthens the relationship between interpersonal trust and TMS. The centralization of expressive ties weakens the relationship between trust and TMS and that between TMS and team performance. The mediating effect of TMS is moderated by the centralization of instrumental and expressive ties. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",App Design; Configural Approach; Interpersonal Trust; Social Ties; Team Performance; Transactive Memory Systems,2,Information Systems Frontiers,2025 123,Duan L.; Da Xu L.,Data Analytics in Industry 4.0: A Survey,"Industry 4.0 is the fourth industrial revolution for decentralized production through shared facilities to achieve on-demand manufacturing and resource efficiency. It evolves from Industry 3.0 which focuses on routine operation. Data analytics is the set of techniques focus on gain actionable insight to make smart decisions from a massive amount of data. As the performance of routine operation can be improved by smart decisions and smart decisions need the support from routine operation to collect relevant data, there is an increasing amount of research effort in the merge between Industry 4.0 and data analytics. To better understand current research efforts, hot topics, and tending topics on this critical intersection, the basic concepts in Industry 4.0 and data analytics are introduced first. Then the merge between them is decomposed into three components: industry sectors, cyber-physical systems, and analytic methods. Joint research efforts on different intersections with different components are studied and discussed. Finally, a systematic literature review on the interaction between Industry 4.0 and data analytics is conducted to understand the existing research focus and trend. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",5G; Big data; Blockchain; Cloud computing; Cyber-physical system; Data analytics; Digital twin; Industry 4.0; Internet of things; Manufacturing,73,Information Systems Frontiers,2024 124,Merhi M.I.; Ahluwalia P.,"The Role of E-participation, Human Capital, and Corruption-Free on Environmental Performance","There are many concerns at the global level about environmental performance. The United Nations has created a framework for measuring national development goals that enable environmental sustainability. This paper examines the relationships between technological and social factors as enablers of environmental performance and draws from technological determinism and human agency paradigms. It fills an important gap in the literature by empirically examining the hypothesized relationships. The specific examined factors are online service (maturity and quality), IT infrastructure, e-participation, corruption-free, and human capital. Environmental performance is the dependent variable. These factors are relevant to ten of the seventeen goals that the United Nations set in their SDG framework. The hypotheses are tested and validated using secondary data collected by reputable global institutions and PLS-SEM analytical procedures. The results indicate that technology can enable environmental performance directly and indirectly through e-participation. We also found that e-participation influences corruption-free and human capital that positively impact environmental performance. This paper provides significant implications for research and practice. © The Author(s) 2024.",Corruption; E-participation; Environmental performance; Human capital,3,Information Systems Frontiers,2025 125,Wang Q.; Chau M.; Peng C.-H.; Ngai E.W.T.,Using the Anchoring Effect and the Cultural Dimensions Theory to Study Customers’ Online Rating Behaviors,"This study focuses on the effect of prior average ratings of a product on subsequent online ratings, and we further analyze whether culture moderates this effect. The anchoring effect theory and cultural dimensions theory serve as the theoretical foundations for our investigation. To our best knowledge, we are the first to introduce the anchoring effect theory into the online review context. This study is also among the first to investigate how culture influences customers’ online evaluations. Empirical results suggest that the prior average rating positively influences subsequent customers’ posted ratings, and this positive influence is significantly moderated by culture. Besides theoretical contributions, our insights may also strategically benefit online sellers by increasing customer satisfaction and improving long-term sales. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Anchoring effect theory; Culture; E-commerce; Hofstede cultural dimensions theory; Online rating behavior; Online word-of-mouth,16,Information Systems Frontiers,2022 126,Bartsch S.C.; Nguyen L.H.; Schmidt J.-H.; Du G.; Adam M.; Benlian A.; Sunyaev A.,The Present and Future of Accountability for AI Systems: A Bibliometric Analysis,"Artificial intelligence (AI) systems, particularly generative AI systems, present numerous opportunities for organizations and society. As AI systems become more powerful, ensuring their safe and ethical use necessitates accountability, requiring actors to explain and justify any unintended behavior and outcomes. Recognizing the significance of accountability for AI systems, research from various research disciplines, including information systems (IS), has started investigating the topic. However, accountability for AI systems appears ambiguous across multiple research disciplines. Therefore, we conduct a bibliometric analysis with 5,809 publications to aggregate and synthesize existing research to better understand accountability for AI systems. Our analysis distinguishes IS research, defined by the Web of Science “Computer Science, Information Systems” category, from related non-IS disciplines. This differentiation highlights IS research’s unique socio-technical contribution while ensuring and integrating insights from across the broader academic landscape on accountability for AI systems. Building on these findings, we derive research propositions to lead future research on accountability for AI systems. Finally, we apply these research propositions to the context of generative AI systems and derive a research agenda to guide future research on this emerging topic. © The Author(s) 2025.",Accountability; Artificial intelligence; Bibliometric analysis; Research propositions,1,Information Systems Frontiers,2025 127,Cram W.A.; D’Arcy J.,Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research,"A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational cybersecurity policies. However, we posit that this emphasis on policy compliance is susceptible to several notable limitations that could lead to inaccurate research conclusions. In this research essay, we consider the limitations of using cybersecurity policy compliance as a dependent variable by presenting three assertions: (1) the link between policy compliance and organizational-level outcomes is ambiguous; (2) policies vary widely in terms of their clarity and completeness; and (3) employees have an inconsistent familiarity with their own organization’s cybersecurity policies. Taken together, we suggest that studying compliance with cybersecurity policies reveals only a partial picture of employee behavior. In response, we offer recommendations for future research. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Compliance; Cybersecurity; Employee behavior; Information security; Policy; Research essay; Violation,3,Information Systems Frontiers,2025 128,Ahangama S.,"Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis","Virtual Social Networks (VSN) act as a catalyst for the success of the active participation of citizens in information sharing, collaboration, and decision making. VSN based e-participation tools allow many-to-many communication and collaboration near real-time with users who might be in geographically dispersed locations. It provides a platform to voice opinions and perspectives and share them with others in new and innovative ways. Cybersecurity is a key area that needs to be considered for the success and continuous use of e-participation systems as it protects user privacy and helps to avoid scams, harassment, and misinformation. The intervening effect of cybersecurity protection mechanisms and citizens’ education level on the relationship between VSN diffusion and e-participation initiatives is explored in the proposed research model presented in this paper. Moreover, this research model is explored for different stages of e-participation (e-information, e-consultation, and e-decision making) and the five dimensions of cybersecurity (legal, technical, organizational, capacity building, and cooperation). The findings indicate that improved VSN usage has increased e-participation (especially in e-consultation and e-decision making) as a result of improved cybersecurity protection and public education, highlighting the varying importance of different cybersecurity protection measures for three stages of e-participation. Thus, considering the recent problems like platform manipulation, misinformation and data breaches associated with the use of VSN for e-participation, this study emphasizes the importance of regulations, policies, partnerships, technical frameworks, and research to ensure cybersecurity, as well as the importance of education to enable the public to interact productively in e-participation activities. This study is performed using publicly available data from 115 countries and the research model is developed, drawing theoretical basis from the Protection Motivation Theory, Structuration Theory, and Endogenous Growth Theory. This paper recognizes the theoretical and practical implications, and limitations while recommending future research directions. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Citizen education level; Cybersecurity; E-Participation; Protection Motivation Theory; VSN diffusion,15,Information Systems Frontiers,2023 129,Dwivedi Y.K.; Ismagilova E.; Rana N.P.; Raman R.,"Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review","Social media plays an important part in the digital transformation of businesses. This research provides a comprehensive analysis of the use of social media by business-to-business (B2B) companies. The current study focuses on the number of aspects of social media such as the effect of social media, social media tools, social media use, adoption of social media use and its barriers, social media strategies, and measuring the effectiveness of use of social media. This research provides a valuable synthesis of the relevant literature on social media in B2B context by analysing, performing weight analysis and discussing the key findings from existing research on social media. The findings of this study can be used as an informative framework on social media for both, academic and practitioners. © 2021, The Author(s).",Business-to-business; Digital transformation; Information systems; Literature review; Marketing; Social media,149,Information Systems Frontiers,2023 130,Yan J.; Zhou H.; Wang W.,Intelligent Network Element: A Programmable Switch Based on Machine Learning to Defend Against DDoS Attacks,"The proposed native intelligent network by 6G networks has provided a boost to network security capabilities. Unlike intelligent networks built by intelligent network elements, plug-in AI applications require transmission bandwidth for traffic analysis and consume computation and storage resources of security devices. This cannot meet the real-time requirements for detecting and processing DDoS attacks. This paper proposes the intelligent network element that combines programmable switch technology and AI algorithms. The intelligent network element is used to build a distributed intelligent network defense system that analyzes the packet header information of the traffic to classify the packets, thus realizing network intelligence at the network layer. We analyzes a total of 14 types of DDoS attack traffic categorized into application layer DDoS, low-rate DDoS, and DRDoS. The machine learning model is used to sink to the network layer.In conclusion, the performance of the k-means, random forest, and decision tree algorithms is evaluated by comparing the performance of single-point and multi-point deployment scenarios on intelligent network elements in multiple dimensions. The results demonstrate that the multi-point intelligent network element system can reduce the packet loss rate by approximately 10% when the client transmits packets at a rate of 1000 pkts/s, while exhibiting a slight increase in resource consumption. This enables the intelligent network element detection accuracy to reach 98.03%. © The Author(s) 2025.",DDoS attacks; Intelligent network elements; Multi-point; Programmable switches,6,Information Systems Frontiers,2025 131,Park H.; Jiang S.; Lee O.-K.D.; Chang Y.,Exploring the Attractiveness of Service Robots in the Hospitality Industry: Analysis of Online Reviews,"As the hospitality industry has begun adopting service robots to replace frontline human services, service robots’ attractiveness becomes a salient factor in their design and implementation. However, it is unclear what consist of service robots’ attractiveness and how they affect customer responses. This study examines the effects of multiple dimensions of service robots’ attractiveness on customers’ emotions using a text mining approach. For the data analysis, we collected 50,629 online reviews on 59 hotels and restaurants using service robots from the largest social commerce platform in China. Using the Linguistic Inquiry and Word Count (LIWC) method, we analyzed 7570 online reviews that are directly related to service robots. With the LIWC outcomes, the relationships between the attractiveness dimensions and customer emotions were investigated. Based on our findings, finally, we provide propositions for understanding the attractiveness of service robots. The theoretical and practical implications of the findings are discussed. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Attractiveness; Content analysis; Emotion; Hospitality services; HRI (Human robot interaction); Service robots,47,Information Systems Frontiers,2024 132,Deng Z.; Fan G.; Deng Z.; Wang B.,Why Doctors Participate in Teams of Online Health Communities? A Social Identity and Brand Resource Perspective,"Virtual teamwork has emerged as a new mode of healthcare service in online health communities, enabling doctors to collaborate and share knowledge for better patient care. However, the multifaceted impact of teams on their members and how they develop within them have not been effectively validated. To address this gap, we draw insights from social identity theory and brand resources to understand how doctors benefit from online teams using a unique dataset of 2,222 teams with 4,587 doctors from a large Chinese OHC. Our analysis shows that team capital positively affects members’ performance through warmth and ethics images, while team capital is negatively related to warmth image but positively related to ethics image. Additionally, leaders’ ethics images have a positive influence on members’ ethics images, with mediation effects present. This study sheds light on the role of doctor images in improving their performance in OHCs based on social identity theory and provides practical guidance for online medical services. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Brand image; Doctor performance; Online doctor teams; Online health communities; Social identity,12,Information Systems Frontiers,2024 133,Lips S.; Tsap V.; Bharosa N.; Krimmer R.; Tammet T.; Draheim D.,Management of National eID Infrastructure as a State-Critical Asset and Public-private Partnership: Learning from the Case of Estonia,"In the management of national electronic identity (eID) infrastructure, cooperation between public and private parties becomes more and more important, as the mutual dependencies between the provision of e-services and the provision of the national public key infrastructure (PKI) continuously increases. Yet, it is not clear which key factors affect the public-private collaboration in the eID field, as existing studies do not provide insight into this particular matter. Therefore, we aim to identify the factors that affect public-private partnership (PPP) in the field of eID. We also describe feasible formats that help to improve the cooperation between the two sectors, based on insights from the case of Estonia. In service of that study, we conducted twelve qualitative interviews with high-level experts representing several parties from the public and the private sector. By conducting a thematic analysis of the interviews, we identified five key factors for successful PPP in the eID field, i.e., engagement, joint understanding, two-way communication, clear role division, and process orientation. Furthermore, we generalize our results by discussing, in how far the found cooperation formats can be used by stakeholders to manage state-critical information technology (IT) infrastructure components similar to eID such as mobile phone services, data transmission services and digital signature services. © 2023, The Author(s).",Critical infrastructure management; Electronic identity; Identity management; Public-private partnership,12,Information Systems Frontiers,2023 134,Xie Z.; Liu G.; Qu J.; Wu J.; Li H.,Identifying Structural Holes for Sentiment Classification,"The prevalence of online user-generated content has attracted great interest in textual sentiment analysis, which provides a low-cost yet effective way to discern consumers and markets. A mainstream of sentiment analysis is to construct a classification model with Bag-of-Words (BoW) features, but the large vocabulary base and skewed distribution of term frequency consistently pose research challenges, which is made even worse by the limited valid sentiment labels. In light of this, in this paper, we propose a novel method called Structural Holes based Sentiment Classifier (SHSC) for BoW-based sentiment classification. The key to SHSC is to reinforce the classification contribution of semantically rich words with clear-cut sentiment polarity. To this end, a word co-occurrence network is carefully constructed to represent both high and low frequency words. The work to find classification-inefficient words is then transformed into the identification of so-called bridge nodes that occupy the positions of structural holes in the network. Two interesting measures, i.e., information advantage rank and control advantage weight, are then designed elaborately for this purpose, which are based on the proposed sentiment-label propagation and short-path computation algorithms, respectively. SHSC finally feeds this information as the key regularizers into a simple regression model to guide parametric learning. Extensive experiments on real-world text datasets demonstrate the advantage of our SHSC model over competitive benchmarks, particularly when sentiment labels are scarce. The effectiveness of uncovering structural holes for sentiment classification is also carefully verified with some robustness checks and demonstration cases. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Regularization; Sentiment classification; Structural holes; Word network,3,Information Systems Frontiers,2022 135,Tang G.; Fan N.,Solution Path Algorithm for Double Margin Support Vector Machines,"Data uncertainty is a challenging problem in machine learning. Distributionally robust optimization (DRO) can be used to model the data uncertainty. Based on DRO, a new support vector machines with double regularization terms and double margins can be derived. The proposed model can capture the data uncertainty in a probabilistic way and perform automatic feature selection for high dimensional data. We prove that the optimal solutions of this model change piecewise linearly with respect to the hyperparameters. Based on this property, we can derive the entire solution path by computing solutions only at the breakpoints. A solution path algorithm is proposed to efficiently identify the optimal solutions, thereby accelerating the hyperparameter tuning process. In computational efficiency experiments, the proposed solution path algorithm demonstrates superior performance compared to the CVXPY method and the Sequential Minimal Optimization (SMO) algorithm. Numerical experiments further confirm that the proposed model achieves robust performance even under noisy data conditions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Classification; Distributionally robust optimization; Hyperparameter tuning; Solution path algorithm; Support vector machines,0,Information Systems Frontiers,2025 136,Orlando D.; Ormachea J.; Soliani V.; Vaisman A.A.,TGV: A Visualization Tool for Temporal Property Graph Databases,"Graph databases are increasingly being used in the data science field, in particular to represent different kinds of networks. In real-world situations, the nodes and edges in a network evolve across time. For example, in a social network, people’s preferences and relationships change, as well as the characteristics of the network entities themselves. Temporal property graph databases aim at capturing these changes, by means of appropriate data models and query languages that allow users to represent, store, and query time-varying graphs. In order to exploit their full potential, temporal property graph databases require visualization tools that allow navigating graph data across time. To address this need, the present work introduces a framework for temporal property graph visualization, denoted TGV, based on T-GQL, a data model and query language for temporal graphs implemented over Neo4j, a widely-used graph database. TGV allows editing and running T-GQL queries, displaying the result, and navigating such result across time. Further, TGV displays temporal graphs in a transparent way, hiding the underlying T-GQL structure from the user. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Graph visualization; Neo4j; Temporal database; Temporal graphs,6,Information Systems Frontiers,2024 137,Bang C.C.; Yakasai F.A.; Lee Y.S.; Woo D.,Predicting Altcoin Prices in Cryptocurrency Bear Market,"The cryptocurrency market has experienced substantial growth in recent years, driven by increased capital liquidity and speculative investment. However, its volatility has led to significant financial losses for many investors, particularly in altcoins, which are more speculative and less stable than Bitcoin. This study investigates the factors influencing altcoin price volatility during bear markets, with a focus on the roles of dominant cryptocurrencies like Bitcoin and Ethereum and sentiment derived from Reddit discussions. Grounded in Dow Theory and spillover effect, the research evaluates how the dominance of Bitcoin and Ethereum shapes altcoin price movements. Four altcoins—Zcash (ZEC), Litecoin (LTC), Ripple (XRP), and Dash (DASH)—are analyzed using machine learning algorithms such as Classification and Regression Trees, Random Forests, and Extreme Gradient Boosting (XGBoost). The results reveal that XGBoost delivers superior predictive performance and highlight that Bitcoin (BTC) and Ethereum (ETH) price fluctuations exert a stronger influence on altcoin prices than sentiment. These findings provide valuable insights for investors and suggest integrating machine learning-based predictive models into financial decision-making systems to enhance risk management and market forecasting. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Altcoins; Bear market; Cryptocurrency; Machine learning; Reddit sentiments; XGBoost,0,Information Systems Frontiers,2025 138,Li Y.; Kettinger W.J.,Testing the Relationship Between Information and Knowledge in Computer-Aided Decision-Making,"Information and knowledge are two foundational concepts in Information Systems (IS) research, but their relationship remains vague, and researchers continue to use them interchangeably in studies. This limits the ability to clearly specify what information is in the systems and how it is used for operations and decisions. We address the issue in the context of computer-aided decision-making. In contrast to the traditional view that information is the input of knowledge, we argue, from the knowledge-based view of information, that information is produced from knowledge and functions as the basis of decisions. Further, cognitive factors such as one’s general knowledge in the task domain and guidance in decision aids influence knowledge and information for decisions. An information-centric framework is developed and tested based on a popular production-planning decision task. The result supports the direct impact of information on decisions and the indirect impact of knowledge via its influence on information. This study is the first to empirically test the relationship between knowledge and information in IS research. It calls for more attention to the information concept and how it is processed in IS. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Computer-aided decision-making; Decision aid; Information; Knowledge; Knowledge-based view of information; Production planning,7,Information Systems Frontiers,2022 139,Lee S.-P.; Kim K.; Park S.,Investigating the Market Success of Software-as-a-Service Providers: the Multivariate Latent Growth Curve Model Approach,"Software-as-a-Service (SaaS) Cloud computing as the next stage of internet evolution provides all the computing resources as services over the Internet. In the SaaS cloud computing research area, there are many studies from the user’s point of view, but there is relatively little research on the supplier’s success strategy. The purpose of this study is to empirically analyze the factors that determine the market competitiveness necessary for SaaS cloud computing providers to survive in the mid to long term. We presented application dimension and technology maturity as SaaS idiosyncratic factors and show how these factors influence the business performance of SaaS providers through a differentiation strategy and low-cost strategy. Using a multivariate latent growth curve model, this study analyzed 199 strategic business units of SaaS cloud computing providers in Korea for three years. Our results find that SaaS cloud computing idiosyncratic factors did not significantly enhance the software providers’ business performance in the early stage. However, they significantly affected the growth rate of their customer base and financial performance as the SaaS technology became mature over time. In addition, this study identifies a set of business, strategic, and technical considerations to guide the practitioners’ decision-making process for selecting an appropriate SaaS cloud computing model. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Application dimension; Business performance; Latent growth curve model; Longitudinal study; Software-as-a-Service; Technology maturity,5,Information Systems Frontiers,2023 140,Meske C.; Bunde E.,Design Principles for User Interfaces in AI-Based Decision Support Systems: The Case of Explainable Hate Speech Detection,"Hate speech in social media is an increasing problem that can negatively affect individuals and society as a whole. Moderators on social media platforms need to be technologically supported to detect problematic content and react accordingly. In this article, we develop and discuss the design principles that are best suited for creating efficient user interfaces for decision support systems that use artificial intelligence (AI) to assist human moderators. We qualitatively and quantitatively evaluated various design options over three design cycles with a total of 641 participants. Besides measuring perceived ease of use, perceived usefulness, and intention to use, we also conducted an experiment to prove the significant influence of AI explainability on end users’ perceived cognitive efforts, perceived informativeness, mental model, and trustworthiness in AI. Finally, we tested the acquired design knowledge with software developers, who rated the reusability of the proposed design principles as high. © 2022, The Author(s).",Design principles; Design science research; Explainable artificial intelligence; Hate speech detection; Local explanations,59,Information Systems Frontiers,2023 141,Jha A.; Saha D.,Mobile Broadband for Inclusive Connectivity: What Deters the High-Capacity Deployment of 4G-LTE Innovation in India?,"The global market uptake of the fourth generation-Long-Term Evolution (4G-LTE) Mobile Broadband (MoBro) services are steadily rising, leading to higher capital investments by mobile network operators (MNOs) to scale-up their infrastructure for meeting the impending demand for MoBro data the world over. However, MNOs face uncertainties about financial returns from such investments, owing to a host of technological and market-related factors, which impact the enablement of such 4G-LTE MoBro services. These challenges are clearly evident in the Indian market. Firstly, 4G-LTE subscribers in the rural India contribute to less than one-third of the overall market size. Secondly, India performs poorly in terms of minimum capacity requirements of the 4G-LTE MoBro services. Thirdly, the rise in per-user consumption of MoBro data does not translate into a similar rise in the MNOs’ revenue. Fourthly, the socio-economic-geographic segregation of India into twenty-two administrative zones (referred to as telecom circles) add to the complexities in the capital investment decisions of MNOs. To address the above challenges, we model various cost and profitability scenarios of a hypothetical MNO providing universal 4G-LTE deployment across the twenty-two telecom circles in India using the available spectrum bands. Our proposed model is firmly established in the “network investment economics” framework for telecom innovations. We adopt a technology diffusion-based approach to forecast the 4G-LTE subscribers in India. We focus on the requirements of 4G-LTE MoBro infrastructure investments, including the spectrum selection decisions by MNOs, and show that, for valuation of the spectrum, the policymakers in India need to take into account the potential of the spectrum in terms of financial returns to an MNO deploying 4G-LTE using that spectrum, as against merely valuing the spectrum based on primarily the technical characteristics of its carrier frequency and benchmarks of prior spectrum auction prices in a particular telecom circle. Finally, we also show that a nationwide 4G-LTE network, which is universal, inclusive, and adhering to the global standards in terms of service quality, can be financially lucrative for MNOs, if enabled by appropriate policies instituting collaborative frameworks for infrastructure sharing, and price rationalization of spectrum bands across the twenty-two telecom circles. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",4G-LTE; Discounted cash flow; India; Spectrum bands; Universal broadband,8,Information Systems Frontiers,2022 142,Cheng S.,Understanding Users’ Voluntary Switching Behavior for User Interfaces of Intelligent Personal Assistant Devices,"Intelligent voice user interfaces (UIs) are increasingly accepted by users to replace traditional ones to operate intelligent personal assistant devices. This study developed a model to explicate the key factors influencing users’ voluntary switching behavior between traditional UIs and intelligent voice ones from push-pull-mooring framework perspective, which considers the push effect from two dimensions of perceived inconvenience, the pull effect from three factors based on perceived value, and the mooring effect from switching costs. A mixed-methods approach is adopted to explore pull factors (qualitative) and validate model (quantitative). The model was validated based on 259 respondents using both traditional UI and intelligent voice one of smart home devices from China. The results indicated that all push (extrinsic and intrinsic inconvenience), pull (interface adaptivity, playfulness, and social presence) and mooring (switching costs) factors significantly affect switching intention and then affect actual behavior. The implications for research and practice are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Perceived Inconvenience; Perceived Value; Push-Pull-Mooring Framework; Switching Costs; User Interfaces; Voluntary Switching Behavior,3,Information Systems Frontiers,2025 143,Dag A.; Asilkalkan A.; Aydas O.T.; Caglar M.; Simsek S.; Delen D.,A Parsimonious Tree Augmented Naive Bayes Model for Exploring Colorectal Cancer Survival Factors and Their Conditional Interrelations,"Effective management of colorectal cancer (CRC) necessitates precise prognostication and informed decision-making, yet existing literature often lacks emphasis on parsimonious variable selection and conveying complex interdependencies among factors to medical practitioners. To address this gap, we propose a decision support system integrating Elastic Net (EN) and Simulated Annealing (SA) algorithms for variable selection, followed by Tree Augmented Naive Bayes (TAN) modeling to elucidate conditional relationships. Through k-fold cross-validation, we identify optimal TAN models with varying variable sets and explore interdependency structures. Our approach acknowledges the challenge of conveying intricate relationships among numerous variables to medical practitioners and aims to enhance patient-physician communication. The stage of cancer emerges as a robust predictor, with its significance amplified by the number of metastatic lymph nodes. Moreover, the impact of metastatic lymph nodes on survival prediction varies with the age of diagnosis, with diminished relevance observed in older patients. Age itself emerges as a crucial determinant of survival, yet its effect is modulated by marital status. Leveraging these insights, we develop a web-based tool to facilitate physician–patient communication, mitigate clinical inertia, and enhance decision-making in CRC treatment. This research contributes to a parsimonious model with superior predictive capabilities while uncovering hidden conditional relationships, fostering more meaningful discussions between physicians and patients without compromising patient satisfaction with healthcare provision. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Bayesian belief network; Colorectal cancer; Explainable AI; Healthcare analytics; Patient-physician communication,2,Information Systems Frontiers,2025 144,Li S.; Iqbal M.; Saxena N.,Future Industry Internet of Things with Zero-trust Security,"The emerging techniques, such as the fifth-generation communications (5G), Internet of Things (IoT), blockchain, artificial intelligence, etc., are operating in unison will drive the transformation of global business forward. The 5G technology is expected to unleash a massive IoT ecosystems by providing massive connectivity for huge number of IoT devices with faster data rate, ultra-low latency, and low-cost access. The 5G networks will be designed to bring the level of performance needed for massive IoT and will enable a perceived fully ubiquitous connected world. Meanwhile, the blockchain being promoted as the fundamental for new business model in Future IoT (FIoT). This paper attempts to provide a set of new directions and ideas for research in 5G/6G enabled IoT and new technique trends in IoT. The current IoT are facing a number of challenges, such as massive IoT devices access, network performances, security, standardization, and critical applications. This paper investigates new technologies, such as 5G, zero-trust, and blockchain will catalyse the innovation in IoT. Specifically, a zero-trust security architecture for FIoT is proposed and a blockchain-based device authentication in IoT environment (BasIoT) is proposed that can provide massive secure device access in FIoT. (Figure presented.) © The Author(s) 2022.",Data anonymisation; Industrial 4.0; Internet of things (IoT); Privacy preserving,71,Information Systems Frontiers,2024 145,Olan F.; Jayawickrama U.; Arakpogun E.O.; Suklan J.; Liu S.,Fake news on Social Media: the Impact on Society,"Fake news (FN) on social media (SM) rose to prominence in 2016 during the United States of America presidential election, leading people to question science, true news (TN), and societal norms. FN is increasingly affecting societal values, changing opinions on critical issues and topics as well as redefining facts, truths, and beliefs. To understand the degree to which FN has changed society and the meaning of FN, this study proposes a novel conceptual framework derived from the literature on FN, SM, and societal acceptance theory. The conceptual framework is developed into a meta-framework that analyzes survey data from 356 respondents. This study explored fuzzy set-theoretic comparative analysis; the outcomes of this research suggest that societies are split on differentiating TN from FN. The results also show splits in societal values. Overall, this study provides a new perspective on how FN on SM is disintegrating societies and replacing TN with FN. © The Author(s) 2022.",Fake news; Misinformation; Social media; Societal acceptance; Societal values; True news,162,Information Systems Frontiers,2024 146,Niederman F.; Baker E.W.,Ethics and AI Issues: Old Container with New Wine?,"This paper reflects on what differentiates AI ethics issues from concerns raised by all IS applications. AI ethics issues can be viewed in three distinct categories. One can view AI as another IS application like any other. We examine this category of AI applications focusing primarily on Mason’s (MIS Quarterly, 10, 5–12, 1986) PAPA framework as a way to position AI ethics within the IS domain. One can also view AI as adding a generative capacity producing outputs that cannot be pre-determined from inputs and code. We examine this by adding “inference” to the informational pyramid and exploring its implications. AI can also be viewed as a basis for reexamining questions of the nature of mental phenomena such as reasoning and imagination. At this time, AI-based systems seem far from replicating or replacing human capabilities. However, if/when such abilities emerge as computing machinery continues growing in capacity and capability, it will be helpful to have anticipated arising ethical issues and developed plans for avoiding, detecting, and resolving them to the extent possible. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",AI; Artificial intelligence; Ethics; PAPA framework; Philosophy of science,20,Information Systems Frontiers,2023 147,Chien S.-Y.; Lin Y.-L.; Chang B.-F.,The Effects of Intimacy and Proactivity on Trust in Human-Humanoid Robot Interaction,"Social humanoid robots (SHRs) have been widely applied in diverse contexts to enhance human–robot interaction by imitating humanlike behavior. Previous studies have utilized a variety of design features to explore the influence of human–robot relationships, but the robot’s communication scheme when providing assistance during the interaction is rarely discussed. The purpose of this study is to investigate which SHR communication approaches are more favorable for users, where different levels of social manner (proactive vs. reactive) and types of expressive behavior (intimate vs. impassive) are developed and empirically validated. A total of 273 participants were recruited for our user studies, and two online survey sessions were conducted to simulate an online shopping experience. During the experiments, an SHR (the Pepper robot) was used to provide the associated services to the participants (such as providing recommendations or subjective opinions regarding a chosen product). The preliminary study confirmed that the manipulations designed for each experimental condition were valid. In the formal study, the results revealed strong evidence that both the SHR’s social manner and its expressive behavior significantly influence participant perceptions of robots and the resultant HRI experience. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Humanoid robots; Human–robot interaction; Intimacy; Social robots; Trust,24,Information Systems Frontiers,2024 148,Rathore H.; Samavedhi A.; Sahay S.K.; Sewak M.,Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses,"The android ecosystem (smartphones, tablets, etc.) has grown manifold in the last decade. However, the exponential surge of android malware is threatening the ecosystem. Literature suggests that android malware can be detected using machine and deep learning classifiers; however, these detection models might be vulnerable to adversarial attacks. This work investigates the adversarial robustness of twenty-four diverse malware detection models developed using two features and twelve learning algorithms across four categories (machine learning, bagging classifiers, boosting classifiers, and neural network). We stepped into the adversary’s shoes and proposed two false-negative evasion attacks, namely GradAA and GreedAA, to expose vulnerabilities in the above detection models. The evasion attack agents transform malware applications into adversarial malware applications by adding minimum noise (maximum five perturbations) while maintaining the modified applications’ structural, syntactic, and behavioral integrity. These adversarial malware applications force misclassifications and are predicted as benign by the detection models. The evasion attacks achieved an average fooling rate of 83.34% (GradAA) and 99.21% (GreedAA) which reduced the average accuracy from 90.35% to 55.22% (GradAA) and 48.29% (GreedAA) in twenty-four detection models. We also proposed two defense strategies, namely Adversarial Retraining and Correlation Distillation Retraining as countermeasures to protect detection models from adversarial attacks. The defense strategies slightly improved the detection accuracy but drastically enhanced the adversarial robustness of detection models. Finally, investigating the robustness of malware detection models against adversarial attacks is an essential step before their real-world deployment and can help in developing adversarially superior detection models. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Adversarial Robustness; Machine Learning; Malware Detection; Static Analysis,9,Information Systems Frontiers,2023 149,Brennecke M.; Fridgen G.; Jöhnk J.; Radszuwill S.; Sedlmeir J.,When Your Thing Won’t Behave: Security Governance in the Internet of Things,"In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels. © The Author(s) 2024.",Information Security; Internet of Things (IoT); IT Governance; IT Security; Risk Analysis; Security Breach,1,Information Systems Frontiers,2025 150,Nasr I.B.; Abaidi I.; Thomas L.,Home Sweet Smart Home: Enhancing Consumer Valuation and Purchase Intention of Smart Home Technologies (SHTs) for Societal Value,"Smart home technology (SHT) offers numerous economic, social, and environmental benefits, positioning it as a sustainable option for individuals and families seeking eco-friendly living solutions. Despite these advantages, adoption rates for SHT remain paradoxically low. Recognizing the ecological potential of SHT, this study investigates the psychological processes that influence the perceived sustainable value of SHT offerings within website content and how these perceptions affect adoption behavior. By integrating innovation diffusion theory with perceived value theory, this research provides a comprehensive framework for understanding the adoption of complex innovations like SHT. Empirical findings reveal that imagery processing during the online purchasing experience significantly enhances the perception of sustainable benefits and reduces the perceived sacrifices associated with adopting SHT, highlighting the importance of visual content in promoting sustainable technology adoption. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Buying intention; Complex product; Mental imagery; Perceived risk; Product’s sustainable values; Smart home technology,6,Information Systems Frontiers,2024 151,Gurumurthy B.; Bidarkar V.R.; Broneske D.; Pionteck T.; Saake G.,Exploiting Shared Sub-Expression and Materialized View Reuse for Multi-Query Optimization,"Querying in isolation lacks the potential of reusing intermediate results, which ends up wasting computational resources. Multi-Query Optimization (MQO) addresses this challenge by devising a shared execution strategy across queries, with two generally used strategies: batched or cached. These strategies are shown to improve performance, but hardly any study explores the combination of both. In this work we explore such a hybrid MQO, combining batching (Shared Sub-Expression) and caching (Materialized View Reuse) techniques. Our hybrid-MQO system merges batched query results as well as caches the intermediate results, thereby any new query is given a path within the previous plan as well as reusing the results. Since caching is a key component for improving performance, we measure the impact of common caching techniques such as FIFO, LRU, MRU and LFU. Our results show LRU to be the optimal for our usecase, which we use in our subsequent evaluations. To study the influence of batching, we vary the factor - derivability - which represents the similarity of the results within a query batch. Similarly, we vary the cache sizes to study the influence of caching. Moreover, we also study the role of different database operators in the performance of our hybrid system. The results suggest that, depending on the individual operators, our hybrid method gains a speed-up between 4x to a slowdown of 2x from using MQO techniques in isolation. Furthermore, our results show that workloads with a generously sized cache that contain similar queries benefit from using our hybrid method, with an observed speed-up of 2x over sequential execution in the best case. © The Author(s) 2024.",Batched query execution; Caching policies; Materialized view reuse; MQO; Multi-query optimization,1,Information Systems Frontiers,2024 152,Rani S.; Kumar M.,Heterogeneous Information Fusion based Topic Detection from Social Media Data,"Due to the pervasive nature of social networking platforms, as well as the proliferation of user generated content, the internet has become a repository of unstructured multimedia data. The use of this huge data for user experience enhancement is still a problem, where topic detection is one of the solutions to solve this issue, not having been explored in the literature for this application. Videos with similar content or related to the same topic can be grouped together with the help of topic detection methods. In this paper, a framework for topic detection using web videos textual metadata has been developed. The key contribution in this paper is to leverage multimedia metadata to find web video topics using a two-step process. First, we used transformer-based model to perform topic modeling for identification of topics from the heterogeneous textual data of web videos. Second, topic-based video retrieval has been accomplished using a classification approach. Further, experiments are carried out on a publicly available dataset to assess the performance of the proposed method. The proposed work is compared to the state-of-the-art methods Discriminative Probabilistic Models (DPM), Event clustering based method (ECBM),Multi-Modality Based Method (MMBM), Side-Information Based Method (SIBM), and Similarity Cascades(SC), which shows that the proposed system outperforms others in terms of Precision, Recall, F-measure and Accuracy. The experimental results demonstrates the effectiveness of proposed method for topic detection. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",BERT; Deep learning; Topic detection; Topic visualization; Transformers,1,Information Systems Frontiers,2023 153,Sengupta A.; Mukherjee A.; VanderMeer D.,Impact of Perceived Barriers of Electronic Health Information Exchange on Physician’s Use of EHR: A Normalisation Process Theory Approach,"Digitizing healthcare is a major aim of healthcare policy, with efforts aimed at increasing adoption of electronic health records (EHRs). We study the capability use for EHRs through the lens of normalisation process theory to assess whether these barriers to adoption also remain barriers to sustained use. We focus on health information exchange (HIE), which is one of the most challenging capabilities identified in the literature. We analyse the National Electronic Health Records Survey data, in which physicians were asked whether known HIE adoption barriers remain in place, and how frequently they use HIE capabilities. Though we expect that adoption barriers reported to be less problematic will be associated with greater capability use, we found that adoption barriers perceived to be more (less) problematic were not necessarily those that predicted less (greater) capability use. This study contributes through a critical examination of the process of normalization of EHR capabilities. © The Author(s) 2024.",Electronic health record; Empirical analysis; Health information exchange; Interoperability; Normalisation process theory; Perceived barriers,0,Information Systems Frontiers,2025 154,Chatterjee R.S.; Kliestik T.; Singh D.K.; Sivarajah U.; Chatterjee S.,Ethical and Structural Determinants of Generative AI-Driven Healthcare Data Sharing for Financial Analysis,"The integration of generative Artificial Intelligence within the healthcare industry, from generic customer service to specialized fields of expertise, has recently gained significant prominence. The inextricable role of generative AI models in facilitating this service has raised several key questions about organization-centric appropriation of technology adoption and the ethics of such decisions. Despite a positive appraisal of the robustness of the generative AI model, the growth of this specialized service industry is lacking. The key factor of addressability is gauging the adequacy of human-centric AI processes and their perceived structural and functional impact within the service organization. Combining the structural, procedural, and ethical constituent factors with AI implementation, this study explores their relative impact on the data sharing of healthcare-related data for financial analysis purposes. The novel approach is based on adaptive structuration theory and normative ethical perspectives inherent to human-oriented AI implementation and standardization. The HCAI framework was adopted and integrated with the virtue ethicality theoretical backdrop to capture the AI integrative data role perception within two different service orientations in a healthcare service facility. The data was collected from medical and finance department professionals in selected hospitals through the design of two studies. A total of 389 finance professionals and 440 medical department staff participated in the study. The results show a significant and differential perceptual influence of structural and task-oriented constructs on the data sharing mindset between these two groups. This study presents empirical findings on the organizational implications of generative AI, integrating the human-centric AI framework and its perceived fairness in the context of healthcare data sharing for financial analysis purposes. It also provides several new contributions on procedural and ethical perspectives that enhance the understanding and implications of risk and mitigation in medico AI facilities and their impact on healthcare-related data sharing for economic analysis. The study proposes to undertake a longitudinal and experimental research design to further enhance the generalizability of the current research outcomes achieved through cross-sectional data. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Ethics; Financial analysis; Generative AI; HCAI framework; Healthcare; Medical data,0,Information Systems Frontiers,2025 155,Ahlemann F.; Dittes S.; Fillbrunn T.; Rehring K.; Reining S.; Urbach N.,Managing In-Company IT Standardization: A Design Theory,"Today’s companies rely heavily on in-company information technology standards (ICITS) to reduce costs, ensure flexibility, and facilitate the planning, implementation, and operation of IT systems. Steering and managing ICITS has proven to be challenging, revealing the need for efficient governance mechanisms. But even though prior research demonstrates the challenges of ICITS, viable advice on how to implement ICITS is scarce. In this paper, we develop an organizational design theory for the management of ICITS based on the framework of organizational control theory. We conducted a critical case study to identify basic goals, constitutive elements, and fundamental mechanisms of a working ICITS management. The resulting design goals and principles were then evaluated and further refined in the light of additional expert interviews. With our work, we wish to extend the body of theoretical knowledge on the management of ICITS and help practitioners master the various challenges occurring in this domain. © 2022, The Author(s).",Design theory; In-company IT standards; IT governance; IT management; IT standardization,3,Information Systems Frontiers,2023 156,Li J.; Chang X.,Combating Misinformation by Sharing the Truth: a Study on the Spread of Fact-Checks on Social Media,"Misinformation on social media has become a horrendous problem in our society. Fact-checks on information often fall behind the diffusion of misinformation, which can lead to negative impacts on society. This research studies how different factors may affect the spread of fact-checks over the internet. We collected a dataset of fact-checks in a six-month period and analyzed how they spread on Twitter. The spread of fact-checks is measured by the total retweet count. The factors/variables include the truthfulness rating, topic of information, source credibility, etc. The research identifies truthfulness rating as a significant factor: conclusive fact-checks (either true or false) tend to be shared more than others. In addition, the source credibility, political leaning, and the sharing count also affect the spread of fact-checks. The findings of this research provide practical insights into accelerating the spread of the truth in the battle against misinformation online. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Credibility; Data analysis; Fact-check; Information sharing; Misinformation; Social media,42,Information Systems Frontiers,2023 157,Bag S.; Routray S.; Saikouk T.; Roubaud D.,Generative AI-Powered Innovation on Data-Driven Financial Decision-Making in Operations and Supply Chain Management: A Moderated Mediation Analysis,"The study aims to understand the effect of Generative AI-powered innovation on data-driven financial decision-making in operations and supply chain management (OSCM), directly and indirectly through ethical tension. Additionally, it seeks to explore how Generative AI ethics policy uncertainty and ethical leadership moderate the impact of Generative AI innovation on ethical tension and knowledge behavior in organizations. The study develops a research model based on socio-technical systems theory and contingency theory. The primary data is collected through surveys, and further direct relationships are tested using variance-based structural equation modeling, and moderated mediation hypotheses are tested using PROCESS. The study offers several novel insights. It shows that Generative AI-powered innovation increases ethical tensions. Moreover, ethical tensions have a significant negative impact on financial decision-making in OSCM. Our results indicate that while Generative AI enhances financial decision-making in OSCM and subsequently improves firm performance, high levels of policy uncertainty exacerbate ethical tensions arising from Generative AI innovation, thereby further impeding financial decision-making. Consequently, the mediation effect of ethical tension is stronger under these conditions. Finally, the study finds that ethical leadership serves as a protective buffer. Even when Generative AI creates ethical tensions, strong ethical leadership helps maintain decision-making integrity and mitigates the negative impact of ethical tensions on financial outcomes. This study is one of the first studies that theorizes the relationship between generative AI-powered innovation, ethical tensions, decision-making, ethical policy uncertainty, and ethical leadership. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Ethical leadership; Ethical tensions; Financial decisions; Generative AI policy uncertainty; Generative AI-powered innovation; Operations and supply chain management,1,Information Systems Frontiers,2025 158,Bacon E.; Williams M.D.; Davies G.H.,On the Combinatory Nature of Knowledge Transfer Conditions: A Mixed Method Assessment,"Organisations are increasingly creating inter-organisational ecosystem partnerships to innovate openly. Despite effective knowledge management significantly supporting ecosystem infrastructures, empirical insights into the importance of and interdependencies between conditions for successful knowledge exchange across ecosystem contexts remain unexplored within existing literature. This study implements a mixed-method approach to ascertain which conditions are responsible for knowledge transfer success across innovation ecosystems. Interpretive Structural Modelling was employed to analyse questionnaires with key ecosystem stakeholders, in order to impose a hierarchical structure upon the conditions. The configurational nature of these conditions, and their combinations into solutions for success was ascertained through analysing semi-structured interviews using fuzzy-set Qualitative Comparative Analysis. Results reveal multiple, mutually exclusive pathways to knowledge transfer success, grouped into three solution types, increasing understanding of the interrelated nature of the knowledge transfer conditions. Limitations and implications for future research are provided. © 2021, The Author(s).",Digital transformation; Ecosystem; FsQCA; Innovation; ISM; Knowledge transfer,8,Information Systems Frontiers,2023 159,Chang W.-L.; Chen L.-M.; Hashimoto T.,Cashless Japan: Unlocking Influential Risk on Mobile Payment Service,"In Japan, cashless is not yet popular but government and companies are devoted to the development of mobile payment methods. This research collected 241 Japanese users and applied decision trees algorithm. Six types of perceived risks (financial, privacy, performance, psychological, security, and time) were used and the categorized class is intention to use mobile payment (low, medium, and high). We also compared different competitive models to examine the performance, including decision trees, kNN, Naïve Bayes, SVM, and logistic regression and decision trees outperformed among all models. The findings indicated that privacy and performance risks are import to Japanese users. Safe, secured, reliable, and fast mobile payment environment are more important to low intention users (less concerns about financial risk). Financial loss, safe, secured, reliable, and fast mobile payment environment are more important to medium intention users (less concerns about time and security risk). Monetary loss, safe, reliable, and fast mobile payment environment are more important to high intention users (less concerns about security risk and psychological risk). The results can help Japanese companies unlock the perceived risk on mobile payment and furnish appropriate strategies to improve usage. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cashless; Decision trees; Mobile payment; Perceived risk,26,Information Systems Frontiers,2022 160,Zhou L.; Tao J.; Zhang D.,Does Fake News in Different Languages Tell the Same Story? An Analysis of Multi-level Thematic and Emotional Characteristics of News about COVID-19,"Fake news is being generated in different languages, yet existing studies are dominated by English news. The analysis of fake news content has focused on lexical and stylometric features, giving little attention to semantic features. A few studies involving semantic features have either used them as the inputs to classifiers with no interpretations, or treated them in isolation. This research aims to investigate both thematic and emotional characteristics of fake news at different levels and compare them between different languages for the first time. It extends a state-of-the-art topic modeling technique to extract news topics and introduces a divergence measure to assess the importance of thematic characteristics for identifying fake news. We further examine associations of the thematic and emotional characteristics of fake news. The empirical findings have implications for developing both general and language-specific countermeasures for fake news. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19; Cross-lingual analysis; Emotion; Fake news; Theme; Topic modeling,24,Information Systems Frontiers,2023 161,Hughes L.; Malik T.; Dettmer S.; Al-Busaidi A.S.; Dwivedi Y.K.,Reimagining Higher Education: Navigating the Challenges of Generative AI Adoption,"The proliferation of generative artificial intelligence (GenAI) has disrupted academic institutions across the world, presenting transformative challenges for decision makers, and leading to questions around existing methods and practices within higher education (HE). The widespread adoption of GenAI tools and processes highlights an ongoing change to existing perceptions of the role of humans and machines. Academics have expressed concerns relating to: academic integrity, undermining critical thinking, lowering of academic standards and the threat to existing academic models. This study presents a mixed methods approach to developing valuable insight to the key underlying challenges impacting GenAI adoption within HE. The results highlight many of the key challenges impacting decision makers in the formation of policy and strategic direction. The findings identify significant interdependencies between the key underlying challenges associated with GenAI adoption in HE. We further discuss the implications in the findings of the high levels of driving power of the factors: (i) perceived risks from Large Language Model training and learning; (ii) the reliability of GenAI outputs in the context of impact on creativity and decision making; (iii) the impact from poor levels of GenAI platform regulation. We posit this research as offering new insight and perspective on the changing landscape of HE through the widespread adoption of GenAI. © The Author(s) 2025.",Adoption; Challenges; Generative AI; Generative Artificial Intelligence; Higher education; Large Language Models (LLMs),27,Information Systems Frontiers,2025 162,Gandhi M.; Kar A.K.; Roy S.K.,Managing Industrial Innovation Communications on Social Media Platforms for Effective User Engagement,"The enormous presence of users over social media platforms (SMPs) has been harnessed by B2B marketers and researchers across the innovation process. However, limited research has examined the marketing of firms’ industrial innovation practices over SMPs. Through the lens of signaling theory, we identified the presence of organizational, product, process, marketing, and social innovation operations in their SM posts. These posts were further analyzed using multimodal analytical techniques to identify their embedded textual and visual features. The results indicate that using SMPs for announcing industrial innovation practices is essential. It also shows the prevalence of users’ interest in the information relevant to organizational innovation practices of B2B firms. Our study provides a guidebook for social media managers that leads them from “what” to “how” while designing social media posts for effective user engagement. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Business to business firms; Industrial innovation; Machine learning; Multimodal analytics; Social media; User engagement,8,Information Systems Frontiers,2024 163,Wu K.; Beydoun G.; Sohaib O.; Gill A.,The Co-construct/ Co-evolving Process between Organization’s Absorptive Capacity and Enterprise System Practice under Changing Context: The Case of ERP Practice,"Long term sustainability in a competitive and changing environment requires an organization to continuously learn and adapt. The ability to access and use new knowledge is contingent on the organisational absorptive capacity (AC). In this paper, we focus on how an organization’s absorptive capacity and its enterprise system practices develop and co-evolve over time. Analysing a fifteen years’ ERP practice in an organisational context, this study synthesizes a new AC analysis framework that takes into account the dynamic nature of AC. This high-level analysis coupled with a longitudinal view resolves inconsistent results between current AC studies and suggest further directions for organisational AC research. © 2022, The Author(s).",Absorptive capacity; Enterprise architecture; ERP; Information systems lifecycle; Organizational learning,4,Information Systems Frontiers,2022 164,Sharma G.; Chatterjee S.; Rani V.; Tatavarthy A.D.; Bose I.,Driving Sustainability: Unravelling the Dynamics of User Engagement on Organization Generated Social Media Content on Electric Vehicles,"The transportation sector is facing a need for sustainable alternatives due to the challenges posed by climate change, urbanization, and dependency on fossil fuel. Electric vehicles (EVs) have emerged as a key solution to these mobility problems globally. However, the adoption of EVs remains uneven across regions due to infrastructural, economic, and consumer-related barriers. In this study, we examine the role of organization generated content (OGC) in influencing public sentiment and engagement with EV-related material. Using advanced computational methods, including topic modelling with Latent Dirichlet Allocation (LDA), sentiment analysis, and predictive modelling, the research identifies critical themes driving online discussions and user engagement. We find that topics such as carbon emissions, charging infrastructure, EV finance and repair, and popular car features significantly impact user sentiment and engagement. Posts emphasizing technological advancements, affordability, and infrastructure growth lead to positive engagement, while concerns like range anxiety and cost generate neutral or negative responses. We also discover how government organizations, non-government organizations (NGOs), and corporates, should tailor their messaging to influence public perception. This research contributes to the literature on sustainability communication and computational social science by providing actionable insights into how organizations can communicate on social media. It highlights the importance of strategic, visually engaging, and data-driven communication to address consumer concerns, drive meaningful engagement, and ultimately promote the adoption of EVs. The paper provides implications for policymakers, social media managers, and sustainability advocates striving to foster environmentally friendly transportation solutions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Electric vehicles; Sentiment analysis; Social media; Sustainability; Text mining; User engagement,0,Information Systems Frontiers,2025 165,Smith K.J.; Dhillon G.; Otoo B.A.,iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation,"Attachment to social media is a serious problem for iGen users. A recent study of social media use by 10,000 iGen users found 36% were on social media for 2 to 4 h daily, and 11% for more than 5 h. Further, users who reported spending more time on social media were significantly more likely to rate their mental health as poor. With the increasing awareness of the dire consequences of addiction to social media, calls have been made to take action against its continued proliferation. Instead of bans on social media, we call for mild policy-based interventions to guide appropriate positive social media use, while minimizing harmful experiences. Attachment Theory is adopted to understand the individual values and feelings of attachment of iGen to social media. We then use the Value-focused Thinking process to organize values to define iGen’s attachment objectives. In a final synthesis we present a mild policy-based interventions approach to suggest policy interventions and techniques for social media use to combat over-attachment by iGen users. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Attachment; Public policy; Social media; Stakeholder values,7,Information Systems Frontiers,2022 166,Bello M.; Bello R.; García M.-M.; Nowé A.; Sevillano-García I.; Herrera F.,A Three-level Framework for LLM-enhanced Explainable AI: From Technical Explanations to Natural Language,"The growing application of artificial intelligence in sensitive domains has intensified the demand for systems that are not only accurate but also explainable and trustworthy. Although explainable AI (XAI) methods have proliferated, many do not consider the diverse audiences that interact with AI systems: from developers and domain experts to end-users and society. This paper addresses how trust in AI is influenced by the design and delivery of explanations and proposes a multilevel framework that aligns explanations with the epistemic, contextual, and ethical expectations of different stakeholders. The framework consists of three layers: algorithmic and domain-based, human-centered, and social explainability, with Large Language Models serving as crucial mediators that transform technical outputs of AI explanations into accessible, contextual narratives across all levels. We show how LLMs enable dynamic, conversational explanations that bridge the gap between complex model behavior and human understanding, facilitating interactive dialogue and enhancing societal transparency. Through comprehensive case studies, we show how this LLM-enhanced approach achieves technical fidelity, user engagement, and societal accountability, reframing XAI as a dynamic, trust-building process that leverages natural language capabilities to democratize AI explainability. © The Author(s) 2025.",Explainable AI; Explanations; Human-AI interaction; Large language models; Stakeholders; Trust AI,0,Information Systems Frontiers,2025 167,De Marchi B.; Agovi E.; Aliverti A.,Stress Level Assessment by a Multi-Parametric Wearable Platform: Relevance of Different Physiological Signals,"In contemporary society, where chronic stress is increasingly prevalent, this study aims to propose a multi-parametric wearable platform suitable for real-life monitoring and to validate its ability to acquire four physiological signals relevant for the stress response (electrocardiogram, respiration, galvanic skin response, photoplethysmogram). Secondly, it seeks to conduct a statistical analysis on the derived features both to identify the physiological signals necessary for a comprehensive analysis of the stress response and to understand the distinct contribution of each one. The results obtained revealed at least two statistically significant features from each of the physiological signals considered, confirming the importance of a multi-parametric approach for an accurate stress response analysis. Additionally, the proposed statistical hypotheses allowed to determine how each physiological signal contributes differently to characterize various aspects of the stress response. For these reasons, this study could represent a benchmark for future investigations aiming to classify the stress response. © The Author(s) 2024.",Multi-parametric; Physiological signals; Statistical analysis; Stress level; Wearables,2,Information Systems Frontiers,2025 168,Priyadarshini J.; Singh R.K.; Mishra R.; He Q.; Braganza A.,Implementation of Additive Manufacturing in the Healthcare Supply Chain for Circular Economy Goals: Paradoxical Tensions and Solutions from an Industry 5.0 Perspective,"This study addresses the paradoxical tensions that arise during additive manufacturing (AM) implementation for circular economy goals in the healthcare sector. Using the lens of paradox theory, this study identifies four competing priorities that stakeholders may encounter while adopting AM. Focus group discussions among 12 industry experts from the healthcare supply chain were conducted to verify the paradoxes. Semi-structured interviews were then conducted with 10 industry experts to derive the solutions to manage these tensions from an Industry 5.0 perspective to achieve the full benefits of AM. This study expands paradox theory into the AM literature and provides a novel ‘both/and’ perspective (i.e. a pluralistic rather than a dualistic perspective) to look at emerging tensions encountered while implementing AM in the healthcare sector. This perspective will help decision-makers realise that these tensions can be managed over time to turn them into creative, rather than destructive, forces. © The Author(s) 2024.",Additive manufacturing; Circular economy; Healthcare; Industry 5.0; Paradox theory,28,Information Systems Frontiers,2024 169,Xiong R.R.; Liu C.Z.; Choo K.-K.R.,Synthesizing Knowledge through A Data Analytics-Based Systematic Literature Review Protocol,"Systematic literature reviews (SLR) are commonly undertaken by researchers to stay informed of the latest development in a particular topic, but this manual process is demanding and can only locate and analyze a limited number of articles. We propose a data analytic-based SLR protocol and a set of semi-automated tools to leverage the latest advances in data analytics and facilitate a more effective, objective, and comprehensive SLR process. Our protocol incorporates scraping tools to collect articles from seven bibliographic databases, and text analytics, social network analysis, natural language processing, citation analysis, and main path analysis to analyze a large number of articles. To demonstrate its utility of, we apply the protocol on the topic of “information diffusion in social networks”. The results reveal 11 latent topics under this broad domain along with the most critical articles for each topic, and the connections among the associated 1,229 articles and their references. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Citation analysis; Information diffusion; Main path analysis; Social network analysis; Systematic literature review; Text analytics,8,Information Systems Frontiers,2025 170,Schmid S.; Hartwig K.; Cieslinski R.; Reuter C.,Digital Resilience in Dealing with Misinformation on Social Media during COVID-19: A Web Application to Assist Users in Crises,"In crises such as the COVID-19 pandemic, it is crucial to support users when dealing with social media content. Considering digital resilience, we propose a web app based on Social Network Analysis (SNA) to provide an overview of potentially misleading vs. non-misleading content on Twitter, which can be explored by users and enable foundational learning. The latter aims at systematically identifying thematic patterns which may be associated with misleading information. Additionally, it entails reflecting on indicators of misleading tweets which are proposed to approach classification of tweets. Paying special attention to non-expert users of social media, we conducted a two-step Think Aloud study for evaluation. While participants valued the opportunity to generate new knowledge and the diversity of the application, qualities such as equality and rapidity may be further improved. However, learning effects outweighed individual costs as all users were able to shift focus onto relevant features, such as hashtags, while readily pointing out content characteristics. Our design artifact connects to learning-oriented interventions regarding the spread of misleading information and tackles information overload by a SNA-based plug-in. © The Author(s) 2022.",COVID-19; Crisis communication; Fake news; Network analysis; User-centered,12,Information Systems Frontiers,2024 171,Bawack R.; Dennehy D.; Kumi C.A.; Boutchouang W.,AI Analytics in Enhancing Patient-Centered Care Through Wearables: A Cross-Country Analysis,"This study explores the impact of Artificial Intelligence Analytics (AIA) capability, supported by wearable technology, on patient-centered care in the healthcare systems of low- and middle-income countries (LMICs). Focusing on Cameroon and Ghana, a cross-country survey assessed how these digital health tools influence perceptions of effective patient-professional communication, empathy, patient involvement, and access to essential healthcare. Using big data analytics capability theory adapted to healthcare and structural equation modeling, the findings reveal that AIA capability significantly improves perceptions of patient-centered care, particularly regarding communication and empathy, with differences between the two countries. Although eHealth literacy enhances positive perceptions of care, it does not significantly moderate the relationship between AIA capability and patient-centered care. This study highlights the importance of context-specific approaches in adopting wearable health devices in LMICs and adds to the growing literature on AI-powered wearables in underrepresented regions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Analytics; Artificial intelligence; Big data analytics capability; EHealth literacy; Patient-centered care; Wearable,0,Information Systems Frontiers,2025 172,Bojer C.S.; Bygstad B.; Øvrelid E.,Speeding up Explorative BPM with Lightweight IT: the Case of Machine Learning,"In the modern digital age, companies need to be able to quickly explore the process innovation affordances of digital technologies. This includes exploration of Machine Learning (ML), which when embedded in processes can augment or automate decisions. BPM research suggests using lightweight IT (Bygstad, Journal of Information Technology, 32(2), 180–193 2017) for digital process innovation, but existing research provides conflicting views on whether ML is lightweight or heavyweight. We therefore address the research question “How can Lightweight IT contribute to explorative BPM for embedded ML?” by analyzing four action cases from a large Danish manufacturer. We contribute to explorative BPM by showing that lightweight ML considerably speeds up opportunity assessment and technical implementation in the exploration process thus reducing process innovation latency. We furthermore show that succesful lightweight ML requires the presence of two enabling factors: 1) loose coupling of the IT infrastructure, and 2) extensive use of building blocks to reduce custom development. © The Author(s) 2024.",Digital Process Innovation; Explorative BPM; IT Infrastructure; Lightweight IT; Machine Learning,2,Information Systems Frontiers,2025 173,Chen Y.; Lu Y.; Bulysheva L.; Kataev M.Y.,Applications of Blockchain in Industry 4.0: a Review,"As the key component of Industry 4.0, IoT has been widely used in various fields of industry. But cloud-based data storage, computation, and communication in IoT cause many issues, such as transmission delay, single point of failure, and privacy disclosure. Moreover, the centralized access control in IoT constrains its availability and scalability. Blockchain is a decentralized, tamper-proof, trustless, transparent, and immutable append-only database. The integration of Blockchain and IoT technologies has led to robust distributed applications, including smart healthcare, smart finance, smart supply chain, smart cities, smart manufacturing, smart government, smart agriculture, smart transportation, smart education, smart e-commerce, and smart grid. Blockchain should be consolidated with 5G and artificial intelligence to tackle the challenges associated with digital transformation in Industry 4.0. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",5G; Artificial Intelligence (AI); Blockchain; Industry 4.0; Internet of Things (IoT),76,Information Systems Frontiers,2024 174,Tripathi S.; Deokar A.V.; Ajjan H.,Understanding the Order Effect of Online Reviews: A Text Mining Perspective,"Online reviews are aimed to help prospective buyers in their decision-making. While prior research has focused on the economic impact of ratings, review volume, helpfulness and sentiments, open research questions remain regarding the evolution of text attributes associated with online reviews. Using a large dataset, we extract sentiment intensity, along with novel attributes – product usage contexts and product features – present in each online review and analyze their pattern over the temporal order of the reviews. Results indicate that sentiment intensity as well as the number of product features and usage contexts diminish with respect to the increase in review order, suggesting that earlier reviews tend to have more information for prospective customers. However, the declining trend of sentiment intensity is less when reviews mention a higher number of product features and usage contexts. These findings contribute to the literature while having key practical implications for e-commerce websites, retailers, and customers. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Dynamics of eWOM; eWOM; Online reviews; Order effect; Text mining,7,Information Systems Frontiers,2022 175,Gong Y.; Janssen M.,Why Organizations Fail in Implementing Enterprise Architecture Initiatives?,"Enterprise architecture (EA) initiatives consist of functions, processes, tools, instruments, and principles to guide the design of IT and its alignment with business. EA is often presented as a silver bullet to ensure that IT contributes to business. Yet, many EA initiatives do not work out or even fail, but in the literature this area is undertheorized. This study aims to understand the factors influencing the failure of EA initiatives. We identified 15 factors and invited 8 EA experts to evaluate the factors and their influence based on an approach combining grey systems theory, Decision-Making and Trial Evaluation Laboratory (DEMATEL), and Interpretative Structural Modeling (ISM). The findings indicate that the factors are correlated and interwoven in complex causal chains. This study reveals the root factor and suggests enhancing high-level managers’ EA knowledge and ensuring communication and leadership skills of enterprise architects as the starting point to avoid EA failure. Only later, organizing the EA function becomes important. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",DEMATEL; Enterprise Architecture; Grey systems theory; ISM; IT architecture; IT failure,7,Information Systems Frontiers,2023 176,Xie P.,The Interplay Between Investor Activity on Virtual Investment Community and the Trading Dynamics: Evidence From the Bitcoin Market,"Virtual investment community has become an important information source for investors. This study contributes to the related literature by investigating the endogenous interplay between investor activity on the virtual investment community and the market trading dynamics using a vector autoregressive framework to analyze an hourly dataset collected from the Bitcoin market. The main results suggest that the sentiment and the posting frequency of virtual investment community messages are largely driven by the past market outcomes, but they provide limited value-relevant information for future price prediction. It is also demonstrated that when investors express conflicting opinions, or when their discussions exhibit a lack of diversity, their incentive to trade decreases, resulting in low trading volume. Theoretical contributions and practical implications are discussed. © 2021, This is a U.S. government work and not under copyright protection in the U.S.; foreign copyright protection may apply.",Bitcoin; Financial technology; Opinion mining; Social media analytics; Topic modeling,15,Information Systems Frontiers,2022 177,FakhrHosseini S.; Lee C.; Lee S.-H.; Coughlin J.,A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes,"Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication technologies (ICT), are transforming homes into interconnected ecosystem of services. Yet, discourse on home technologies remains fragmented due to inconsistent terminologies. This paper addresses the lack of a framework, studying distinctions between smart and non-smart homes and forecasting connectivity and automation growth. Experts (21) participated in online surveys and interviews in 2021, exploring language, structure, and technical/social aspects of basic and smarter homes. Quantitative survey data and qualitative interview analyses yield insights on defining smarter homes, barriers to adoption, and framework improvements to establish universal definitions. This study underscores the urgency of harmonizing language and concepts in the domain of smart homes, revealing user understanding gaps and usability issues as barriers. This bridges gaps for consumer engagement and tech adoption. © The Author(s) 2024.",Connected home; Interoperability; Levels of automation; Smart home,11,Information Systems Frontiers,2025 178,Stsiampkouskaya K.; Kundu O.; Syrda J.; Joinson A.,Threats & Trade-offs: A Start-up Simulation Game for Cybersecurity and Innovation Decision-Making,"Cybersecurity is now critically important in an increasingly digitized and connected world. In addition to required digital security, individuals and organisations pursue multiple other objectives under binding resource constraints. Understanding how they make decisions in the face of these trade-offs is important for both research and teaching purposes. Games can create effective and exciting learning environments and also provide an immersive and experiment-based research setting to understand decision-making. We present a novel tabletop board game which sets cybersecurity in a broader organisational context and emulates real life business decisions. It can be used as a powerful research tool to understand decision-making about cybersecurity in a resource-constrained and uncertain environment. It is also a useful interdisciplinary educational tool, integrating concepts from cybersecurity, business development, and innovation management in gameplay. © The Author(s) 2025.",Business management; Cybersecurity; Digital secruity; Game-based learning; Serious games,0,Information Systems Frontiers,2025 179,Jeon S.-E.; Lee S.-J.; Lee Y.-R.; Yu H.; Lee I.-G.,Machine Learning-Based Cooperative Clustering for Detecting and Mitigating Jamming Attacks in beyond 5G Networks,"As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively. © The Author(s) 2024.",Cooperative jammer detection; Jammer avoidance; Jamming attack; Routing path selection; Smart repeater,3,Information Systems Frontiers,2024 180,Sildir H.; Boy O.C.; Sarrafi S.,A Mixed-Integer Formulation for the Simultaneous Input Selection and Outlier Filtering in Soft Sensor Training,"Soft sensors are used to calculate the real-time values of process variables which can be measured in the laboratory only or require expensive online measurement tools. A set of mathematical expressions are developed and trained from historical data to exploit the statistical knowledge between online and offline measurements to ensure a reliable prediction performance, for optimization and control purposes. This study focuses on the development of a mixed-integer optimization problem to perform input selection and outlier filtering simultaneously using rigorous algorithms during the training procedure, unlike traditional heuristic and sequential methods. Nonlinearities and nonconvexities in the optimization problem is further tailored for global optimality and computational advancements by reformulations and piecewise linearizations to address the complexity of the task with additional binary variables, representing the selection of a particular input or data. The proposed approach is implemented on actual data from two different industrial plants and compared to traditional approach. © The Author(s) 2024.",Input Selection; Mixed Integer Optimization; Piecewise Linearization; Reformulation; Soft Sensor,1,Information Systems Frontiers,2024 181,Li Y.; Goel S.,Making It Possible for the Auditing of AI: A Systematic Review of AI Audits and AI Auditability,"Artificial intelligence (AI) technologies have become the key driver of innovation in society. However, numerous vulnerabilities of AI systems can lead to negative consequences for society, such as biases encoded in the training data and algorithms and lack of transparency. This calls for AI systems to be audited to ensure that the impact on society is understood and mitigated. To enable AI audits, auditability measures need to be implemented. This study provides a systematic review of academic work and regulatory work on AI audits and AI auditability. Results reveal the current understanding of the AI audit scope, audit challenges, and auditability measures. We identify and categorize AI auditability measures for each audit area and specific process to be audited and the party responsible for each process to be audited. Our findings will guide existing efforts to make AI systems auditable across the lifecycle of AI systems. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Accountability; AI audits; Artificial intelligence (AI); Auditability; Explainability; Transparency,22,Information Systems Frontiers,2025 182,Heinisuo E.; Kuoppakangas P.; Stenvall J.,Navigating AI Implementation in Local Government: Addressing Dilemmas by Fostering Mutuality and Meaningfulness,"This study explores AI-enabled local public service provisioning, especially dilemmas of the mutual and meaningful development process. Theoretically, it builds on the current literature on AI implementation in the public sector and relates it to the theorisations of mutuality and meaningfulness. Empirically, it examines the experiences of public agents in a qualitative case study of chatbot development by the City of Oulu, Finland. The study concludes six factors that are constructed into three interconnected dilemma pairs to examine cross-cutting problematic decision-making scenarios and provide reconciliations through mutuality and meaningfulness. © The Author(s) 2025.",Artificial intelligence; Meaningfulness; Mutuality; Public services,3,Information Systems Frontiers,2025 183,Turkolmez G.B.; El Hathat Z.; Subramanian N.; Kuppusamy S.; Sreedharan V.R.,Machine Learning Algorithms for Pricing End-of-Life Remanufactured Laptops,"Due to the growing volume of e-waste in the world and its environmental impact, it is important to understand how to extend the useful life of electronic items. In this paper, we examine the remanufacturing process of end-of-life laptops for third-party remanufacturers and consider their pricing problem, which involves issues like a lack of reliable datasets, fluctuating costs of new components, and difficulties in benchmarking laptop prices, to name a few. We develop a unique approach that uses machine learning algorithms to help price remanufactured laptops. Our methodology involves a variety of techniques, which include an additive model, CART analysis, Random Forest, and Polynomial Regression. We consider depreciation and discount factors to account for the varying ages and conditions of laptops when estimating remanufactured laptop prices. Finally, we also compare our estimated prices to traditional prices. In summary, we leverage data-driven decision-making and develop a robust methodology for pricing remanufactured laptops to extend their lifespan. © The Author(s) 2024.",Additive models; Classification and regression trees; Depreciation; Flexible pricing; Random forests,4,Information Systems Frontiers,2024 184,Azri A.; Favre C.; Harbi N.; Darmont J.; Noûs C.,Rumor Classification through a Multimodal Fusion Framework and Ensemble Learning,"The proliferation of rumors on social media has become a major concern due to its ability to create a devastating impact. Manually assessing the veracity of social media messages is a very time-consuming task that can be much helped by machine learning. Most message veracity verification methods only exploit textual contents and metadata. Very few take both textual and visual contents, and more particularly images, into account. Moreover, prior works have used many classical machine learning models to detect rumors. However, although recent studies have proven the effectiveness of ensemble machine learning approaches, such models have seldom been applied. Thus, in this paper, we propose a set of advanced image features that are inspired from the field of image quality assessment, and introduce the Multimodal fusiON framework to assess message veracIty in social neTwORks (MONITOR), which exploits all message features by exploring various machine learning models. Moreover, we demonstrate the effectiveness of ensemble learning algorithms for rumor detection by using five metalearning models. Eventually, we conduct extensive experiments on two real-world datasets. Results show that MONITOR outperforms state-of-the-art machine learning baselines and that ensemble models significantly increase MONITOR’s performance. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Ensemble learning; Image features; Machine learning; Rumor verification; Social networks,12,Information Systems Frontiers,2023 185,Onwujekwe G.; Weistroffer H.R.,Intelligent Decision Support Systems: An Analysis of the Literature and a Framework for Development,"The spread and impact of decision support systems (DSS) have continued to gain intensity with applications in medical diagnosis, control systems, air traffic control, security systems and executive dashboards that help in strategic decision-making. As the field of machine learning (ML) continues to develop, DSS researchers have been incorporating ML techniques into DSS artifacts and this trend is growing. Though researchers have been talking about intelligent decision support systems for about three decades now, there has not been any recent attempt to provide a comprehensive framework to guide researchers and developers in creating DSS that use machine learning techniques. In this paper we examine the progress that has been made in applying ML techniques for developing DSS, based on a literature analysis of 2093 journal papers published from 2014 – 2024, and propose a framework for future development of intelligent DSS. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Decision support system; Framework; IDSS; Intelligent decision support systems; Literature analysis; Machine learning,11,Information Systems Frontiers,2025 186,Kushwaha A.K.; Pharswan R.; Kumar P.; Kar A.K.,How Do Users Feel When They Use Artificial Intelligence for Decision Making? A Framework for Assessing Users’ Perception,"Artificial intelligence (AI) transits from merely adopted technology to fueling everyday decision-making systems from medication to navigation. With this combination of AI in decision-making systems (ADMS), the present study explores how text-based users' data from social media helps organize the users' perspectives of ADMS? To investigate our research questions, we used a framework consisting of three phases, exploratory, confirmatory, and validatory. We applied hierarchy clustering and topic modeling in the exploratory study, hypothesis building, and empirical analysis during the confirmatory study and support vector machine (SVM) in the validatory study. Our findings suggest that users are primarily concerned about the risk involved in using ADMS. Factors like accountability, self-efficacy, knowledge of ADMS individuals' attitudes towards ADMS impact the perception of ADMS among individuals. This study's theoretical and practical implications have great scope as ADMS is still in its elementary stage. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Accountability; Artificial Intelligence; Fairness; Machine learning; Perceived risk; Trust,34,Information Systems Frontiers,2023 187,Klepetko R.; Krishnan R.,Visualizing Convolutional Neural Network Models’ Sensitivity to Nonnatural Data Order,"Convolutional neural networks (CNN) have revolutionized image recognition technology and found applications in various nonimage-related fields. For nonnatural data, such as cybersecurity packets, in which the data sample order is not defined by nature, some models trained on certain orderings of data perform better than when trained with other orderings. Some orderings create patterns from which the CNN extracts better features. Understanding how to best order the training data to improve CNN performance is not well-studied. In this study, we investigate this problem by examining malware infections using different CNN models and include visualization tools to enhance our analysis. We define a functional algorithm for ordering and show that order importance in CNNs is model dependent. In addition, we show that depending on the model, statistical relationships are crucial in establishing order with better performance. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cloud IaaS; Convolutional neural networks; Data preparation; Deep learning; Malware detection; Security,1,Information Systems Frontiers,2023 188,Keegan B.J.; Dennehy D.; Naudé P.,Implementing Artificial Intelligence in Traditional B2B Marketing Practices: An Activity Theory Perspective,"Anecdotal evidence suggests that artificial intelligence (AI) technologies are highly effective in digital marketing and rapidly growing in popularity in the context of business-to-business (B2B) marketing. Yet empirical research on AI-powered B2B marketing, and particularly on the socio-technical aspects of its use, is sparse. This study uses Activity Theory (AT) as a theoretical lens to examine AI-powered B2B marketing as a collective activity system, and to illuminate the contradictions that emerge when adopting and implementing AI into traditional B2B marketing practices. AT is appropriate in the context of this study, as it shows how contradictions act as a motor for change and lead to transformational changes, rather than viewing tensions as a threat to prematurely abandon the adoption and implementation of AI in B2B marketing. Based on eighteen interviews with industry and academic experts, the study identifies contradictions with which marketing researchers and practitioners must contend. We show that these contradictions can be culturally or politically challenging to confront, and even when resolved, can have both intended and unintended consequences. © The Author(s) 2022.","Activity Theory, B2B Marketing; Artificial Intelligence",39,Information Systems Frontiers,2024 189,Qin P.; Tan W.; Guo J.; Shen B.,Intelligible Description Language Contract (IDLC) – A Novel Smart Contract Model,"The development of Industry 4.0, smart contract is one of critical application in the blockchain platform, which is the remove of intermediary services to facilitate transactions directly between stakeholders, in which the trust between stakeholders is guaranteed by a blockchain system. However, existing solution of automated execution of smart contract is simply given by the prescribed program code. This solution results in two negative effects: the contract is not human-readable and difficult to modify; contracting parties cannot collaboratively draft the contract and cannot assure the shared consent of the contract. Therefore, we will introduce a brand-new solution of smart contract, called Intelligible Description Language Contract (IDLC). It will allow contracting parties to draft a contract collaboratively just as working on text editor with a supportive tool of concept disambiguation through Supervised Sentence Contract (SSC). SSC consists of Machine Natural language (MNL) via Semantic input method (SIM). SIM provides a method of supervised contract obligation creation. MNL provides the capability of universal computer-understandability. Meanwhile, in the complex contract transactions and management, especially in supply chain management, a chained evidence sequence is designed to avoid collusion. IDLC is a first paradigm that bridges the traditional contract based on natural languages and the smart contract based on blockchain platform. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Blockchain; Industry 4.0; Information management; Semantic analysis; Smart contract,11,Information Systems Frontiers,2024 190,Rodrigo P.; Arakpogun E.O.; Vu M.C.; Olan F.; Djafarova E.,Can you be Mindful? The Effectiveness of Mindfulness-Driven Interventions in Enhancing the Digital Resilience to Fake News on COVID-19,"This study explores the factors that influence the dissemination process of and public susceptibility to fake news amidst COVID-19. By adopting a qualitative approach that draws on 21 interviews with social media users from the standpoint of source credibility and construal level theories, our findings highlight motives of news sharers, platform features, and source credibility/relatedness as major factors influencing the dissemination of and public susceptibility to fake news. The paper further argues that public susceptibility to fake news can be mitigated by building an integrated approach that combines a tripartite strategy from an individual, institutional and platform level. For example, educating the public on digital resilience and enhancing awareness around source credibility can help individuals and institutions reflect on news authenticity and report fake news where possible. This study contributes to fake news literature by integrating concepts from information management, consumer behaviour, influencer marketing and mindfulness to propose a model to help authorities identify and understand the key factors that influence susceptibility to fake news during a public crisis such as COVID-19. © The Author(s) 2022.",COVID-19; Digital resilience; Fake news; Information management; Mindfulness,36,Information Systems Frontiers,2024 191,Vasist P.N.; Chatterjee D.; Krishnan S.,The Polarizing Impact of Political Disinformation and Hate Speech: A Cross-country Configural Narrative,"Information and communication technologies hold immense potential to enhance our lives and societal well-being. However, digital spaces have also emerged as a fertile ground for fake news campaigns and hate speech, aggravating polarization and posing a threat to societal harmony. Despite the fact that this dark side is acknowledged in the literature, the complexity of polarization as a phenomenon coupled with the socio-technical nature of fake news necessitates a novel approach to unravel its intricacies. In light of this sophistication, the current study employs complexity theory and a configurational approach to investigate the impact of diverse disinformation campaigns and hate speech in polarizing societies across 177 countries through a cross-country investigation. The results demonstrate the definitive role of disinformation and hate speech in polarizing societies. The findings also offer a balanced perspective on internet censorship and social media monitoring as necessary evils to combat the disinformation menace and control polarization, but suggest that such efforts may lend support to a milieu of hate speech that fuels polarization. Implications for theory and practice are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Disinformation; Fake news; Hate speech; Internet censorship; Polarization; Social media monitoring,63,Information Systems Frontiers,2024 192,Sadiq A.-B.; Vahdat-Nejad H.; Joloudari J.H.; Zeraatkar M.-A.; Hosseini S.-A.,RF-SVM: Robust Injection Attack Detection Using Random Forest Feature Selector and Support Vector Machine Classifier for Secure Network Systems,"IoT is rapidly growing and being implemented in various domains, such as smart cities, smart governments, smart hospitals, and smart homes. However, this growth also brings security challenges that can have detrimental effects on the IoT system. Injection attacks are one example of these challenges, which can compromise the network’s performance and functionality. This paper focuses on injection attacks and uses machine learning methods to detect these attacks and suspicious activities in the system. The main challenge is the availability of much missing data in the corresponding datasets. Contrary to previous research, which is based on eliminating the sparse features, this paper proposes a method for keeping such sparse, valuable data. The proposed method combines a support vector machine with features selected by the random forest to detect this type of attack with high confidence. The performance was evaluated using metrics such as accuracy, precision, and recall. The proposed model offers low computational overhead and high processing speed, making it well-suited for various network devices, including smart homes. Finally, by selecting 46 effective features from the total feature set of the AWID dataset, we achieved a detection accuracy of 99.99%. To the best of our knowledge, this study has had the best performance compared to previous studies. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Data balancing; Feature selection; Injection attack detection; Internet of things; Random Forest; Support vector machine,0,Information Systems Frontiers,2025 193,David-West O.; Oni O.; Ashiru F.,Diffusion of Innovations: Mobile Money Utility and Financial Inclusion in Nigeria. Insights from Agents and Unbanked Poor End Users,"Despite a rigorous policy drive towards financial inclusion in Nigeria, and although the country has a high tele-density ratio, the vast unbanked largely poor remain excluded from the financial sector. Adopting a mixed method approach of the supplier and consumer sides of mobile money, using documentary analysis, focus groups, interviews, and surveys; this article relies on the diffusion of innovations theoretical framework to explore the utility of mobile money with a view to not only assess its application in the enhancement of financial inclusion, but also better tailor the current applications for these low-income users. We identify 4 factors (lack of customer demand and experimenters, lack of integration in the ecosystem, lack of trust and preference for effective local savings scheme and policy short-termism resulting in mobile money operational unsustainability) that are responsible for non-diffusion of mobile money. Our paper reveals interest dynamics that can advance a more long-term mobile money regulatory policy which takes care of the concerns of the unbanked poor. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Adoption; Diffusion; Financial inclusion; Financial services; Mobile money; Unbanked,15,Information Systems Frontiers,2022 194,Munteanu B.-Ş.; Murariu A.; Nichitean M.; Pitac L.-G.; Dioşan L.,Value of Original and Generated Ultrasound Data Towards Training Robust Classifiers for Breast Cancer Identification,"Breast cancer represents one of the leading causes of death among women, with 1 in 39 (around 2.5%) of them losing their lives annually, at the global level. According to the American Cancer Society, it is the second most lethal type of cancer in females, preceded only by lung cancer. Early diagnosis is crucial in increasing the chances of survival. In recent years, the incidence rate has increased by 0.5% per year, with 1 in 8 women at increased risk of developing a tumor during their life. Despite technological advances, there are still difficulties in identifying, characterizing, and accurately monitoring malignant tumors. The main focus of this article is on the computerized diagnosis of breast cancer. The main objective is to solve this problem using intelligent algorithms, that are built with artificial neural networks and involve 3 important steps: augmentation, segmentation, and classification. The experiment was made using a publicly available dataset that contains medical ultrasound images, collected from approximately 600 female patients (it is considered a benchmark). The results of the experiment are close to the goal set by our team. The final accuracy obtained is 86%. © The Author(s) 2024.",Augmentation; Breast cancer; Breast ultrasound images; Classification; Deep learning; Segmentation,9,Information Systems Frontiers,2025 195,Effah J.; Adam I.O.,Examining Client-Vendor Relationship in the Outsourcing of a Work Environment Virtualisation: An Activity Theory Perspective,"This study provides an insight into the duality of client and vendor relationship (CVR) in information technology (IT) outsourcing by adopting a composite view of a subject in activity theory analysis. Evidence in the literature shows a trend that outsourcing relationships have become strategic assets with clients scouting for not only technical outcomes but for business ideas and innovation from their suppliers. Whilst extant literature demonstrates the critical role of outsourcing relationships in outsourcing success and value, the research on IT outsourcing has largely examined outsourcing relationships in general, focusing on the factors, challenges and a one-sided view of the CVR and providing no insights on the relationship between the client and vendor from a composite perspective. To explore this, our study employed an interpretive qualitative case study method and activity theory as the lens. Drawing on hermeneutics to analyse the data, the findings show the need for activity theory to cater for the duality of subjects in a collaborative way. Implications of the study for practice and policy are then provided. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Activity theory; Client-vendor relationship; Developing country; Outsourcing; Work environment virtualisation,7,Information Systems Frontiers,2022 196,"Angelone F.; Ciliberti F.K.; Tobia G.P.; Jónsson H., Jr; Ponsiglione A.M.; Gislason M.K.; Tortorella F.; Amato F.; Gargiulo P.",Innovative Diagnostic Approaches for Predicting Knee Cartilage Degeneration in Osteoarthritis Patients: A Radiomics-Based Study,"Osteoarthritis (OA) is a common joint disease affecting people worldwide, notably impacting quality of life due to joint pain and functional limitations. This study explores the potential of radiomics — quantitative image analysis combined with machine learning — to enhance knee OA diagnosis. Using a multimodal dataset of MRI and CT scans from 138 knees, radiomic features were extracted from cartilage segments. Machine learning algorithms were employed to classify degenerated and healthy knees based on radiomic features. Feature selection, guided by correlation and importance analyses, revealed texture and shape-related features as key predictors. Robustness analysis, assessing feature stability across segmentation variations, further refined feature selection. Results demonstrate high accuracy in knee OA classification using radiomics, showcasing its potential for early disease detection and personalized treatment approaches. This work contributes to advancing OA assessment and is part of the European SINPAIN project aimed at developing new OA therapies. © The Author(s) 2024.","osteoarthritis, knee cartilage, imaging, segmentation, radiomics, machine learning",12,Information Systems Frontiers,2025 197,Zhang H.; Wang M.,Tapping vs. Scrolling: Effects of Different Content Acquisition Modes on Content Consumption,"Tapping and scrolling are two widely adopted touch modes of content acquisition in mobile apps. We empirically investigate factors that affect users’ preferences over these two modes and their subsequent content consumption. We find that higher content quality uncertainty, higher content fit uncertainty, and lower content acquisition cost are the main reasons that scrolling is more likely to be adopted than tapping in content acquisition. We model users’ content consumption as a two-stage decision process consisting of the choice stage and interaction stage. Compared to tapping, scrolling can significantly increase users’ likelihood of choosing specific content. It can also increase (reduce) users’ likelihood of interacting with content when it generates a positive (negative) confirmation on content quality and fit. Our work sheds new light on the effects of tapping and scrolling on users’ content acquisition and content consumption. These findings provide practical implications for platforms’ content management strategies. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.",Content acquisition; Content consumption; Human–machine interface; User behavior; User-generated contents,1,Information Systems Frontiers,2024 198,Zablith F.,Leveraging Action Knowledge from Product Reviews to Enhance Human-Centered Recommender Systems: A Knowledge Graph-Based Framework,"Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial intelligence; Human-centricity; Knowledge graph; Ontologies; Product reviews; Recommendation systems,4,Information Systems Frontiers,2025 199,Zhang X.; Shi Y.; Li T.; Guan Y.; Cui X.,How Do Virtual AI Streamers Influence Viewers’ Livestream Shopping Behavior? The Effects of Persuasive Factors and the Mediating Role of Arousal,"With the exponential growth of livestream shopping and the development of artificial intelligence (AI), virtual influencers powered by AI have become a new trend. However, this phenomenon has yet to be studied precisely to understand the underlying mechanisms of virtual AI streamers’ influence on the viewers. This study explores the effects of virtual influencers powered by AI by investigating the persuasive factors and underlying emotional mechanism that affect viewers’ parasocial interaction intention and impulse buying intention. Data collected from 559 livestream viewers in a scenario-based survey were analyzed using maximum likelihood structural equation modeling (SEM) estimation and cross-validated using Bayesian SEM. The findings confirm the appraisal–emotion–action scheme and validate the role of arousal in mediating three persuasive factors and two behavioral approaches. Parasocial interaction intention was correlated with coolness, whereas congruence and mind perception were important antecedents of viewers’ urge to buy impulsively. Furthermore, mindset had important moderating effects on arousal and parasocial interaction intention toward impulsive urges. This study extends the research on influencer marketing and livestream shopping. It also apprises marketing and retailing managers of the importance of nurturing an AI workforce and sheds light on IS management practice for potential industry opportunities. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",AI influencer; Arousal; Coolness; Impulsivity; Livestream shopping; Mind perception,58,Information Systems Frontiers,2024 200,Dwivedi Y.K.; Ismagilova E.; Sarker P.; Jeyaraj A.; Jadil Y.; Hughes L.,A Meta-Analytic Structural Equation Model for Understanding Social Commerce Adoption,"Social commerce (s-commerce) has gained prominence with advances in social media and social networking technologies over the last decade. Prior research has employed diverse theoretical perspectives to understand and explain consumer behavior within s-commerce but has also produced inconsistent results. This study integrates different theoretical perspectives including trust, social support, and social presence. The research portrays an integrated research model involving factors that impact behavioral intention and use behavior of s-commerce consumers whilst synthesizing prior empirical findings. A meta-analytic structural equation modeling (MASEM) method was used to synthesize 189 findings reported in 68 s-commerce studies and to analyze the structural model. Our findings show that trust and informational support have positive effects on behavioral intention while trust and emotional support have positive effects on use behavior. Furthermore, our findings highlight that behavioral intention influences use behavior and mediates the effect of trust and informational support on use behavior. The implications for research and practice are discussed in detail. © 2021, The Author(s).",Behavioral intention; MASEM; S-commerce; Use behavior,45,Information Systems Frontiers,2023 201,Kumar A.; Singh J.P.; Rana N.P.; Dwivedi Y.K.,Multi-Channel Convolutional Neural Network for the Identification of Eyewitness Tweets of Disaster,"During a disaster, a large number of disaster-related social media posts are widely disseminated. Only a small percentage of disaster-related information is posted by eyewitnesses. The post of a disaster eyewitness offers an accurate depiction of the disaster. Therefore, the information posted by the eyewitness is preferred over the other source of information as it is more effective at helping organize rescue and relief operations and potentially saving lives. In this work, we propose a multi-channel convolutional neural network (MCNN) that uses three different word-embedding vectors together to classify disaster-related tweets into eyewitness, non-eyewitness, and don’t know classes. We compared the performance of the proposed multi-channel convolutional neural network with several attention-based deep-learning models and conventional machine learning-models such as recurrent neural network, gated recurrent unit, Long-Short-Term-Memory, convolutional neural network, logistic regression, support vector machine, and gradient boosting. The proposed multi-channel convolutional neural network achieved an F1-score of 0.84, 0.88, 0.84, and 0.86 with four disaster-related datasets of floods, earthquakes, hurricanes, and wildfires, respectively. The experimental results show that the training MCNN model with different word embedding together performs better than the conventional machine-learning models and several other deep-learning models. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Disaster; Eyewitness tweets; Informative contents; Multi-channel convolutional neural network; Recurrent neural network,8,Information Systems Frontiers,2023 202,Nosenko A.; Cheng Y.; Chen H.,Password and Passphrase Guessing with Recurrent Neural Networks,"Most online services continue their reliance on text-based passwords as the primary authentication mechanism. With a growing number of these services and the limited creativity to devise new memorable passwords, users tend to reuse their passwords across multiple platforms. These factors, combined with the increasing number of leaked passwords, make passwords vulnerable to cross-site guessing attacks. Over the years, researchers have proposed several prevalent methods to predict subsequently used passwords, such as dictionary attacks, rule-based approaches, neural networks, and combinations of the above. We exploit the correlation between the similarity and predictability of these subsequent passwords in a dataset of 28.8 million users and their 61.5 million passwords. We use a rule-based approach but delegate rule derivation, classification, and prediction to a Recurrent Neural Network (RNN). We limit the number of guessing attempts to ten yet get an astonishingly high prediction accuracy of up to 83% in under five attempts, twice as much as any other known model. The result makes our model effective for targeted online password guessing without getting spotted or locked out. To the best of our knowledge, this study is the first attempt of its kind using RNN. We also explore the use of RNN models in passphrase guessing. Passphrases are perceived to be more secure and easier to remember than passwords of the same length. We use a dataset that contains around 100,000 distinct phrases. We demonstrate that RNN models can predict complete passphrases given the initial word with rate up to 40%, which is twice better than other known approaches. Furthermore, our predictions can succeed in under 5,000 attempts, a 100% improvement compared to existing algorithms. In addition, this approach provides ease of deployment and low resource consumption. To our knowledge, it is the first attempt to exploit RNN for passphrase guessing. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Authentication; Passphrases; Passwords; Recurrent neural networks,9,Information Systems Frontiers,2023 203,Zhong C.; Yayla A.,Cognitive Impacts of Explainable AI in Cybersecurity Incident Response: Challenges and Propositions,"Cybersecurity incident response (CSIR) is paramount for organizational resilience. At its core, analysts undertake a cognitively demanding process of data analytics to correlate data points, identify patterns, and synthesize diverse information. Recently, artificial intelligence (AI) based solutions have been utilized to streamline CSIR workflows, notably with an increasing focus on explainable AI (XAI) to ensure transparency. However, XAI also poses challenges, requiring analysts to allocate additional time to process explanations. This study addresses the gap in understanding how AI and its explanations can be seamlessly integrated into CSIR workflows. Employing a multi-method approach, we first interviewed analysts to identify their cognitive challenges, interactions with AI, and expectations from XAI. In a subsequent case study, we investigated the evolution of analysts' needs for AI explanations throughout the investigative process. Our findings yield several key propositions for addressing the cognitive impacts of XAI in CSIR, aiming to enhance cognitive fit to reduce analysts' cognitive load during investigations. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Cognitive overload; Cyber situation awareness; Cybersecurity analytics; Explainable artificial intelligence; Incident response,2,Information Systems Frontiers,2025 204,Lal B.; Dwivedi Y.K.; Haag M.,Working from Home During Covid-19: Doing and Managing Technology-enabled Social Interaction With Colleagues at a Distance,"With the overnight growth in Working from Home (WFH) owing to the pandemic, organisations and their employees have had to adapt work-related processes and practices quickly with a huge reliance upon technology. Everyday activities such as social interactions with colleagues must therefore be reconsidered. Existing literature emphasises that social interactions, typically conducted in the traditional workplace, are a fundamental feature of social life and shape employees’ experience of work. This experience is completely removed for many employees due to the pandemic and, presently, there is a lack of knowledge on how individuals maintain social interactions with colleagues via technology when working from home. Given that a lack of social interaction can lead to social isolation and other negative repercussions, this study aims to contribute to the existing body of literature on remote working by highlighting employees’ experiences and practices around social interaction with colleagues. This study takes an interpretivist and qualitative approach utilising the diary-keeping technique to collect data from twenty-nine individuals who had started to work from home on a full-time basis as a result of the pandemic. The study explores how participants conduct social interactions using different technology platforms and how such interactions are embedded in their working lives. The findings highlight the difficulty in maintaining social interactions via technology such as the absence of cues and emotional intelligence, as well as highlighting numerous other factors such as job uncertainty, increased workloads and heavy usage of technology that affect their work lives. The study also highlights that despite the negative experiences relating to working from home, some participants are apprehensive about returning to work in the traditional office place where social interactions may actually be perceived as a distraction. The main contribution of our study is to highlight that a variety of perceptions and feelings of how work has changed via an increased use of digital media while working from home exists and that organisations need to be aware of these differences so that they can be managed in a contextualised manner, thus increasing both the efficiency and effectiveness of working from home. © 2021, The Author(s).",Covid-19; Remote work; Social interaction; Technology-enabled social interaction; Working from Home,147,Information Systems Frontiers,2023 205,SADEFO KAMDEM J.; Kapsa D.S.,CyberRisk Prediction using Machine Learning and Extreme Value Theory,"This paper develops a hybrid framework for quantifying the financial impact of data breaches by combining predictive machine learning with extreme value theory (EVT). Using incident-level breach data from the Privacy Rights Clearinghouse (PRC) covering the period 2005–2020, we first estimate the number of compromised records with a Random Forest model trained on organizational, temporal and attack-type characteristics. We then analyze the tail behavior of the predicted losses to capture the fat-tailed distribution of cyber risks. Our results indicate that the distribution of affected records is well represented by a Fréchet law, and we estimate the parameters of the Generalized Extreme Value (GEV) distribution to compute Value-at-Risk (VaR) at high confidence levels. This two-stage approach provides a rigorous assessment of maximum potential losses, addressing the question of cyber-risk insurability. By linking predictive accuracy with tail risk quantification, our findings deliver actionable insights for insurers, regulators, and organizations seeking to anticipate and manage the financial consequences of large-scale data breaches. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Cyber insurance; Cyber risk; Extreme value theory; Machine learning; Random forest; Value-at-risk,0,Information Systems Frontiers,2025 206,E F.; Lee P.T.Y.; Deng B.; Yang L.; Chau M.,The Sharing of Disaster-Related Information on Social Media,"This paper explores how two types of textual features—uncertainty-related features and self-regulation-related features—affect information diffusion amid disasters. We identify four textual expressions (i.e., insight, netspeak, work, and reward) of social media posts that generate negative impacts on the diffusion of information. Against the backdrop of the COVID-19 pandemic, we conducted an econometrical study of COVID-19-related posts collected from Weibo, followed by an experiment, to examine the proposed relationships between the reposting behavior and the four textual expressions. Theoretically, we examined the potential effects of information avoidance on the sharing of information on social media during disasters. This study can improve the predictive performance in future disaster-related studies of social media. Practically, government officers are advised that these features may generate negative impacts on the reposting behavior of those who read their posts and hinder the transfer of official information and policy announcements. © The Author(s) 2025.",COVID-19; Disaster management; Information diffusion; Social media; Text mining,1,Information Systems Frontiers,2025 207,Ihamäki P.; Heljakka K.,Robot Pets as “Serious Toys”- Activating Social and Emotional Experiences of Elderly People,"When robots are used as part of meaningful play, for example to enhance wellbeing, they can be considered “serious toys”. Our study examines the potential of robotic pet toys viewed as companions, which activate social and emotional experiences of the elderly by increasing their wellbeing. In order to study the benefits of using Golden Pup, a commercial robot dog, we designed and performed a research intervention at a senior day activity center with 10 participants of ages 65–80+ years who were joined by a playful group of preschoolers. In this study, we were mainly interested in the firsthand user experiences.This study suggests how robotic pets can be used to activate the social and emotional experiences of elderly, and illustrated the role of building a relationship with a robotic pet. We present novel results on how a robot dog with a natural interface (NUI) may be used to evoke social and emotional experiences in older adults as part of playful, intergenerational group activities. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Commercial robot pets; Elderly experiences; Emotional experience; Social robot,35,Information Systems Frontiers,2024 208,Migliorini S.; Vecchia A.D.; Belussi A.; Quintarelli E.,ARTEMIS: a Context-Aware Recommendation System with Crowding Forecaster for the Touristic Domain,"Recommendation systems are becoming an invaluable assistant not only for users, who may be disoriented in the presence of a huge number of different alternatives, but also for service providers or sellers, who would like to be able to guide the choice of customers toward particular items with specific characteristics. This influence capability can be particularly useful in the tourism domain, where the need to manage the industry in a more sustainable way and the ability to predict and control the level of crowding of PoIs (Points of Interest) have become more pressing in recent years. In this paper, we study the role of contextual information in determining both PoI occupations and user preferences, and we explore how machine learning and deep learning techniques can help produce good recommendations for users by enriching historical information with its contextual counterpart. As a result, we propose the architecture of ARTEMIS, a context-Aware Recommender sysTEM wIth crowding forecaSting, able to learn and forecast user preferences and occupation levels based on historical contextual features. Throughout the paper, we refer to a real-world application scenario regarding the tourist visits performed in Verona, a municipality in Northern Italy, between 2014 and 2019. © The Author(s) 2024.",Context-aware recommendation system; Crowding forecaster; Deep learning; Machine learning,7,Information Systems Frontiers,2024 209,Aydin E.; Rahman M.; Ozeren E.,Does Industry 5.0 Reproduce Gender (In)equalities at Organisations? Understanding the Interaction of Human Resources and Software Development Teams in Supplying Human Capitals,"The aim of this study is to illustrate the significance of human resources and software development teams in the process of value co-creation, specifically in the provision of human capital within the framework of Industry 5.0. This investigation takes into account ethical considerations, machine ethics, and gender inequalities. In order to achieve this aim, we conduct semi-structured in-depth qualitative interviews with 12 Human Resources Specialists and 12 Computer Engineers in large scale organisations in Turkey. As a theoretical lens, we adopt modified grounded theory to explore the interaction of teams for demonstrating how they design and manage the digital process by considering the human–machine collaboration aspect of Industry 5.0. Based on the interviews, there are three main themes in the present research: digitalisation in tracking personnel data, ensuring ethical actions in digitalisation of organisational process, and reflections of digitalisation to gender inequality. Since studies on diversity and industry 5.0 are scarce, this research demonstrates the ethical and adverse aspects of industry 5.0, and how it reflects to gender inequality in organisations. © 2023, Crown.",Artificial intelligence (AI); Gender Inequality; Human–machine collaboration; Industry 5.0; Value co-creation,20,Information Systems Frontiers,2023 210,Kumar R.; Thakurta R.,Classifying DSS Research – A Theoretical Framework,"The domain of decision support systems (DSS), focusing on developing various systems to aid decision-making, is receiving increasing attention. The proliferation of the domain necessitates a more comprehensive categorization of DSS research towards a unified representation that can contribute to a shared understanding. We thereby resort to re-examining the DSS research to assimilate, unveil, and re-structure the DSS scholarship. We perform an automated content analysis of the abstracts to investigate the structural commonalities of the DSS articles featuring in the Scopus database and published in the last five decades. Furthermore, we supplement our findings by exploring and classifying the emergent sub-structures. For this, we resort to the scenario classification framework, which draws from information systems, human-computer interaction, and requirements engineering domains, and adapt it in the context of DSS. Our overall results led to a framework for classifying DSS research with four levels: decision environment, DS (decision support) artifact, DS application, and context. We show the framework’s applicability by systematically classifying a sample of publications shortlisted to demonstrate its usefulness. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artifact; Decision Support; Decision Support Systems; Text Mining; Theoretical Framework,0,Information Systems Frontiers,2025 211,Bonenberger L.; Zeller-Lanzl J.,Design Knowledge for Sensitive Social Media Recommender Systems,"Recommender systems are among social media sites’ most critical components in attracting and retaining users. However, they entail challenges, for example, by inducing social comparison, which harms social media users’ well-being. This study developed design knowledge for sensitive social media recommender systems that help to foster users’ well-being. It followed an incremental and iterative design science research approach, evaluating sensitive social media recommender systems through a systematic literature review, two qualitative interview series with experts and users, a scientific focus group, and an online survey based on the Kano customer satisfaction model. The study outcomes include a conceptual framework, meta-requirements, design principles, and design features. This work enhances the understanding of making current social media recommender systems more sensitive towards users, enriches the research on digital responsibility, and is one of the first to demonstrate the feasibility of Kano analysis as an evaluation tool in design science research. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Design science research; Kano analysis; Recommender systems; Social media; Well-being,0,Information Systems Frontiers,2025 212,Xu J.; Jain H.K.; Gu D.; Liang C.,Business-Process-Driven Service Composition in a Hybrid Cloud Environment,"Cloud services have been widely used to support tasks in business processes. A variety of services with differing types, brands, and quality of service (QoS) characteristics are available from various vendors. Additionally, companies also build their own private clouds to meet specific business requirements related to performance, privacy, and security. The problem of selecting and assembling appropriate services to support an organization’s multiple related business processes is very challenging. This problem also differs from traditional product/service selection problems because of the presence of business processes with non-sequential tasks and multiple, related business processes. The various QoS characteristics of services, the special requirements of some subtasks in the business processes, compatibility between cloud services, and the coordination of multiple business processes need to be considered when selecting appropriate services. This paper develops a multi-factor cloud service composition optimal selection (CSCOS) model to formalize the constrained combinatorial optimization problem and designs an improved differential evolution algorithm based on a constructive cooperative coevolutionary framework (C3IMDE) for solution. Experiments on synthetic data demonstrate that C3IMDE has better efficiency and stability than benchmark algorithms, especially for large-scale, multi-process collaborative optimization. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Cloud service composition; Heuristics; Hybrid cloud environments; Multi-process collaborative optimization; OR in service industries,6,Information Systems Frontiers,2025 213,Verma V.; Tandon A.; Aggarwal A.G.,The Moderating Effect of Management Review in Enhancing Software Reliability: A Partial Least Square Approach,"This paper investigates the attributes related to the software development process (SDP) that affect software reliability (SR). In addition, the impact of management review (MR) on SR during testing period is studied. An interactive path model is developed to examine interrelationships between SDP factors, MR and SR. Partial Least Square is used for examining the consistency of factors within the model and to test predictive validity based on the hypothesis developed for relationships among factors. The survey-based research study is conducted to validate the model by collecting data from software professionals working at different job positions. The statistical results reveal that there is a direct positive influence of SDP factors on SR and MR positively moderates the relation between testing and SR. This means that management’s frequent assessment of the testing process, together with better planning and execution of SDP components, improves SR. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Management review; Moderating effect; Partial least square; Path model; Software development process; Software reliability,3,Information Systems Frontiers,2022 214,Chen S.-Y.; He Q.-F.; Lai C.-F.,Deep Reinforcement Learning-Based Robot Exploration for Constructing Map of Unknown Environment,"In traditional environment exploration algorithms, two problems are still waiting to be solved. One is that as the exploration time increases, the robot will repeatedly explore the areas that have been explored. The other is that in order to explore the environment more accurately, the robot will cause slight collisions during the exploration process. In order to solve the two problems, a DQN-based exploration model is proposed, which enables the robot to quickly find the unexplored area in an unknown environment, and designs a DQN-based navigation model to solve the local minima problem generated by the robot during the exploration. Through the switching mechanism of exploration model and navigation model, the robot can quickly complete the exploration task through selecting the modes according to the environment exploration situation. In the experiment results, the difference between the proposed unknown environment exploration method and the previous known-environment exploration methods research is less than 5% under the same exploration time. And in the proposed method, the robot can achieve zero collision and almost zero repeated exploration of the area when it has been trained for 30w rounds. Therefore, it can be seen that the proposed method is more practical than the previous methods. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Constructing map; DRL; Robot exploration; Unknown environment,5,Information Systems Frontiers,2024 215,Zimmermann S.; Schulz T.; Hein A.; Kaus A.F.; Gewald H.; Krcmar H.,Why Specialized Service Ecosystems Emerge—the Case of Smart Parking in Germany,"Traffic caused by drivers searching for a free parking space has numerous negative effects, such as increased emissions and noise pollution. Innovative solutions can reduce these negative effects by providing car drivers with better information via a smart parking app. However, smart parking apps currently do not offer overarching solutions which support the entire parking process. Utilizing a service-dominant logic perspective, we examine why such overarching solutions do not emerge, whereas specialized ecosystems flourish. We follow a multiple case study approach and conduct qualitative interviews with three app providers and fourteen associated parking operators in Germany. Our results show how conflicting institutional arrangements at the micro, meso, and macro context levels lead to specialization. Our study deepens the understanding of how conflicting institutional arrangements affect the emergence of service ecosystems, drawing practical recommendations to overcome specialized smart parking apps in favor of overarching solutions. © The Author(s) 2023.",Institutional arrangements; Multiple case study; Service ecosystems; Service-dominant logic; Smart parking,1,Information Systems Frontiers,2025 216,Breiter K.; Crome C.; Oberländer A.M.; Schnaak F.,Dynamic Capabilities for the Twin Transformation Climb: A Capability Maturity Model,"Digital transformation and sustainability transformation are at the top of organizations’ agendas to remain competitive. While guidance on both transformations exists separately, even more research on integrating digital and sustainability transformation, namely twin transformation, is required. Specifically, deeper knowledge about relevant twin transformation capabilities and progress is needed for effective implementation. To enhance the understanding and provide corresponding guidance, we developed a twin transformation capability maturity model focusing on dynamic capabilities required to realize twin transformation based on a structured literature review and interviews with 13 experts. Further, we demonstrated its use with a technology service provider. Our contribution is twofold: First, accounting for organizations’ twin transformation starting points in terms of their digitalization and sustainability experience and expertise, we reveal three pathways to becoming a twin transformer. Second, our work provides an overview of 45 relevant twin transformation capabilities structured along six capability dimensions and four maturity stages. Our work also provides relevant practical implications supporting organizations in assessing their twin transformation maturity building the foundation for targeted capability development. © The Author(s) 2024.",Design science research; Digital transformation; Dynamic capabilities; Maturity model; Sustainability transformation; Twin transformation,17,Information Systems Frontiers,2024 217,Khnaisser C.; Hamrouni H.; Blumenthal D.B.; Dignös A.; Gamper J.,Efficiently Labeling and Retrieving Temporal Anomalies in Relational Databases,"Time and temporal constraints are implicit in most databases. To facilitate data analysis and quality assessment, a database should provide explicit operations to identify the violation of temporal constraints. Against this background, the purpose of this paper is threefold: (1) we identify and provide a formal definition of five common anomalies in temporal databases, (2) we propose two new relational operations that allow, respectively, to label anomalous tuples in and to retrieve the anomalous tuples from a dataset, and (3) we provide three different SQL implementations of these operations for current relational database management systems. The healthcare domain is used to illustrate the usage and utility of the temporal anomalies. Finally, an experimental evaluation on real-world and synthetic data analyses the performance of the different implementations of the anomaly operators. © The Author(s) 2024.",Temporal anomalies; Temporal constraints; Temporal database; Temporal queries,0,Information Systems Frontiers,2024 218,Herath T.C.; Herath H.S.B.; Cullum D.,An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks,"As organizations have become increasingly reliant on information systems, senior managers are keen in assessing the progress of implemented information security strategies. Although the balanced scorecard approach has been suggested for security governance, a critical issue affecting information security practitioners is complexity, as there are many standards and frameworks, with duplication and overlaps to adhere to when organizing the data. Consequently, the article attempts to develop a more inclusive framework for information security governance, a research gap recently identified in the literature. The article maps five governance and control frameworks (COBIT, SABSA, ISG, ITIL, and ISO 27000) to the information security balanced scorecard (InfoSec BSC) to develop a conceptual design of an effective information security performance measurement tool that can be used by senior managers. Using a real-life case application and interviews with a panel of experts, the article identifies IS initiatives, performance measures for each of the mapped objectives derived from governance and control frameworks that may provide guidance for practitioners. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Balanced scorecard; IS governance; IS security governance; Security frameworks; Security performance,21,Information Systems Frontiers,2023 219,Pelé P.; Schulze J.; Piramuthu S.; Zhou W.,IoT and Blockchain Based Framework for Logistics in Food Supply Chains,"The significance of means to feed the world population despite its steady increase in number cannot be overstated. Efficient and effective agricultural policies and their implementation along with advances in science and technology have together helped pave the way for supply to meet demand for food around the world. With the importance and constraints that are associated with food supply chains and the potential for security violations, food supply chains need to be secured to avoid unnecessary damage. Security of food supply chains is therefore of paramount importance. Recent advances in IoT and blockchain technology have facilitated security improvements in this general area. We consider food supply chains, with specific emphasis on the logistics aspect, and develop a framework with the incorporation of IoT and blockchain technology. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",blockchain; food supply chain; IoT; logistics,26,Information Systems Frontiers,2023 220,Hew J.-J.; Lee V.-H.; T’ng S.-T.; Tan G.W.-H.; Ooi K.-B.; Dwivedi Y.K.,Are Online Mobile Gamers Really Happy? On the Suppressor Role of Online Game Addiction,"Drawing upon the Stimulus-Organism-Response Theory and Flow Theory, this study aims to investigate the effects of environmental stimuli that are unique to the mobile multiplayer online battle arena (MOBA) environment (i.e., immediacy, social interaction, and competition) in inducing the state of flow, which is expected to be the basis of online game addiction and subjective happiness among the online mobile gamers. Besides, this study explores the uncharted role of addiction in suppressing the effect of flow on happiness through the theoretical lens of Rational Addiction Theory. The results indicate that all environmental stimuli are directly and positively related to the state of flow, which relates directly and positively to online game addiction and subjective happiness. Online game addiction is found to have a direct and negative association with subjective happiness, on top of its suppressor role that negatively mediates the relationship between flow and subjective happiness. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Competitive mediation; Flow Theory; Hedonic information systems; Mobile commerce; Mobile gaming; Online game addiction; Rational Addiction Theory; Stimulus-Organism-Response Theory,34,Information Systems Frontiers,2024 221,Kim J.Y.; Sim J.; Cho D.,Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why,"Much has been written about how social media platforms enable the rise of networked activism. However, few studies have examined how these platforms’ low-information environments shape how social movement activists, their opponents, and social media platforms interact. Hate speech reporting is one understudied area where such interactions occur. This article fills this gap by examining to what extent and how the gender and popularity of counterspeech in comment sections influence social media users’ willingness to report hate speech on the #MeToo movement. Based on a survey experiment (n = 1250) conducted in South Korea, we find that YouTube users are more willing to report such sexist hate speech when the counterspeech is delivered by a female rather than a male user. However, when the female user’s counterspeech received many upvotes, this was perceived to signal her enhanced status and decreased the intention to report hate speech, particularly among male users. No parallel patterns were found regarding other attitudes toward hate speech, counterspeech, YouTube, the #MeToo movement, and gender discrimination and hate speech legislation. These findings inform that users report hate speech based on potentially harmful content as well as their complex social interactions with other users and the platform. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Gender bias; Online hate speech; Social media; Social movements,13,Information Systems Frontiers,2023 222,Pattanaik P.K.; Gupta S.; Pani A.K.; Himanshu U.; Pappas I.O.,Impact of Inter and Intra Organizational Factors in Healthcare Digitalization: a Conditional Mediation Analysis,"Digitalization of the healthcare industry is a major trend and focus worldwide. It has the capability to improve the quality of care, reduce costs, and increase accessibility. India’s Healthcare Vision 2030 serves as a driving force compelling healthcare organization in India to embrace digitalization in their operations and services. We surveyed Indian healthcare employees to provide a comprehensive understanding of how external factors impact an organization's internal resources towards successful adoption of healthcare digitalization. The integration of three theoretical perspectives Institutional Theory (IP), Resource-Based View (RBV), and Absorptive Capacity Theory (ACT)) enables a more holistic and intricacies view. Our results emphasize that healthcare digital transformation requires more than just investment and time. Neglecting to respond to external pressures can lead to limited outcomes in digitalization efforts. It necessitates the presence of an appropriate organizational culture, accompanied by strong belief and support from top management. © The Author(s) 2024.",Electronic Health Information Exchange System; Healthcare Digitalization; Institutional Theory; Organizational Culture; Paperless Healthcare; Resource-based View,5,Information Systems Frontiers,2025 223,Pattanayak S.; Ramkumar M.; Gupta S.; Goswami M.,"Blockchain Empowered Metaverse: Enhancing User Engagement through Trust, Collaboration, Authenticity, And Governance","Metaverse—an immersive virtual environment blending digital and physical worlds—has attracted widespread interest for its potential to reshape work and social interaction. However, the practical realization of a fully operational metaverse remains limited, and strategies to enhance user engagement are still understudied. To address this, existing studies are exploring blockchain technology (BCT) as a means to enhance user engagement. Drawing on trust transfer theory and a mixed-methods approach, we identify three key engagement attributes: Collaboration, Authenticity, and Governance (CAG). Our findings show that trust in BCT transfers to metaverse platforms as BCT reinforces CAG characteristics, thereby promoting sustained engagement. We extend trust transfer theory by demonstrating how BCT’s core properties (transparency, immutability, traceability, and decentralization) build trust not only in the technology but also in the platforms and user interactions it supports. This trust enhances the CAG framework, promoting a secure, transparent, and decentralized metaverse experience. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Blockchain technology; Metaverse; Trust transfer theory; User engagement; Virtual ecosystem,3,Information Systems Frontiers,2025 224,Kim S.-S.; Kim Y.J.,Toward the Understanding of the Appropriation of Compliance Support System in Organizations,"Considering the complexity of compliance environment, only focusing on control-oriented actions through compulsory or disciplinary measures, as many firms did in the past, does not help firms tackle imminent challenges. Applying adaptive structuration theory to corporate compliance management, this study focused on identifying antecedents of compliance support system appropriation and investigating their impacts on compliance performance. As a result of surveying 192 multi-business firms in Korea, this study found that regulation environment and compliance championship as meta-structuring contexts shape compliance culture as an institutional structure and require key features of compliance support system (CSS) as a structure to be appropriated by users, which ultimately enhances the compliance performance of the firm. The findings contribute to making the previous adaptive structuration theory more applicable and providing useful directions to improve compliance performance for corporations. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Adaptive structuration theory; Compliance management performance; Compliance support system; System appropriation,0,Information Systems Frontiers,2025 225,Nguyen T.H.; Trivedi R.H.; Fukukawa K.; Adomako S.,Investigating Drivers of Customer Experience with Virtual Conversational Agents,"Building on the perspectives of the uses & gratification (U&G) theory and stimulus-organism-response (S–O-R) model, this article develops and tests an integrative framework to examine the underlying factors influencing customers’ experiences with chatbots as a form of virtual conversational agent (VCA) in the UK and Vietnam. In addition to utilitarian and hedonic factors, anthropomorphism and social presence are also investigated, which are considered important experiential dimensions in a customer-machine relationship. We also explore how stimuli such as functionality, communication style similarity, and aesthetics indirectly affect outcomes like customer satisfaction and reuse intention, mediated by four types of customer experiences. Data collected from a sample of 417 and 359 participants in the UK and Vietnam respectively revealed that, in general, perceived informativeness, credibility, enjoyment, functionality, and communication style similarity are crucial for customer satisfaction in both countries. Interesting differences in the effects of customer experience between developed and developing countries were observed. For instance, the effects of anthropomorphism and social presence on satisfaction are only effective for customers from developed country, while those from developing country only need information provided by chatbots be transparent. Our findings offer a novel way to understand customer experience with chatbots and provide important theoretical and managerial implications. © The Author(s) 2025.",Anthropomorphism; Artificial intelligence; Chatbot; Customer experience; Social presence; Virtual Conversational Agent,7,Information Systems Frontiers,2025 226,Dennehy D.; Conboy K.; Babu J.,Adopting Learning Analytics to Inform Postgraduate Curriculum Design: Recommendations and Research Agenda,"Understanding student sentiment plays a vital role in understanding the changes that could or should be made in curriculum design at university. Learning Analytics (LA) has shown potential for improving student learning experiences and supporting teacher inquiry. Yet, there is limited research that reports on the adoption and actual use of LA to support teacher inquiry. This four-year longitudinal study captures sentiment of postgraduate students at a university in Ireland, by integrating LA with the steps of teacher inquiry. This study makes three important contributions to teaching and learning literature. First, it reports on the use of LA to support teacher inquiry over four one-year cycles of a Master of Science in Business Analytics programme between 2016 and 2020. Second, it provides evidence-based recommendations on how to optimise LA to support teacher inquiry, with specific attention as to how these can improve the assimilation of LA into the curriculum design and delivery. Third, the paper concludes with a research agenda to help improve the adoption and integration of LA in the future. © 2021, The Author(s).",Adoption; Business analytics; Curriculum design; Learning analytics; Sentiment analysis,12,Information Systems Frontiers,2023 227,Zhang C.; Chen Y.; Chen H.; Chong D.,Industry 4.0 and its Implementation: a Review,"Triggered by the development of information and communications technologies, Industry 4.0 opens up a new era for the manufacturing industry.Currently, Industry 4.0 has attracted much attention from industry and academia. Research on Industry 4.0 is still evolving towards the development of frameworks linking Industry 4.0’s enabling technologies to specific goals and to their impact on the manufacturers’ businesses.Accordingly, this study presents a systematic review of the scope of Industry 4.0, its goals and implementations, as well as the barriers to the implementation of Industry 4.0. Solutions for overcoming the barriers and challenges are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Implementation; Industry 4.0; Intelligent manufacturing,74,Information Systems Frontiers,2024 228,Lu Y.,The Current Status and Developing Trends of Industry 4.0: a Review,"The core concept of Industry 4.0 is to integrate advanced information technologies, especially emerging technologies, such as the Internet of Things, 5G & 6G, data analytics and management, artificial intelligence, cloud computing, and blockchain, to achieve a consistent transformation and upgrade of manufacturing and to reshape the value chain of industry and society. More research focuses on the integration of informatization and industrialization, the digital integration and governance of the industry, and specific technical and operational objects. This paper conducts a survey trying to depict an overview of Industry 4.0, specifically a bibliographic analysis, the extant review and status, the enabling technologies, the major drivers, implementing policies in major countries, and developing trends and challenges. Furthermore, the next generation of industrial revolution Industry 5.0 is discussed. This study theoretically and practically provides a good foundation of the industrial revolution from the information systems perspective. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Artificial intelligence (AI); Blockchain; Cloud computing; Industry 4.0; Industry 5.0; IoT (internet of things),73,Information Systems Frontiers,2025 229,Lefebvre A.; Spruit M.,Laboratory Forensics for Open Science Readiness: an Investigative Approach to Research Data Management,"Recently, the topic of research data management has appeared at the forefront of Open Science as a prerequisite for preserving and disseminating research data efficiently. At the same time, scientific laboratories still rely upon digital files that are processed by experimenters to analyze and communicate laboratory results. In this study, we first apply a forensic process to investigate the information quality of digital evidence underlying published results. Furthermore, we use semiotics to describe the quality of information recovered from storage systems with laboratory forensics techniques. Next, we formulate laboratory analytics capabilities based on the results of the forensics analysis. Laboratory forensics and analytics form the basis of research data management. Finally, we propose a conceptual overview of open science readiness, which combines laboratory forensics techniques and laboratory analytics capabilities to help overcome research data management challenges in the near future. © 2021, The Author(s).",Digital forensics; Laboratory forensics; Open science readiness; Reproducible research; Research data management,5,Information Systems Frontiers,2023 230,Lin S.-Y.; Chien S.-Y.; Chen Y.-Z.; Chien Y.-H.,Combating Online Malicious Behavior: Integrating Machine Learning and Deep Learning Methods for Harmful News and Toxic Comments,"The surge in online media has inundated the public with information, prompting the use of sensational and provocative language to capture attention, worsening the prevalence of online malicious behavior. This study delves into machine learning (ML) and deep learning (DL) techniques to identify and recognize harmful news and toxic comments, aiming to counteract the detrimental impact on public perception. Effective methods for detecting and categorizing malicious content are proposed and discussed, highlighting the differences between ML and DL approaches in combating malicious behavior. The study employs feature selection methods to scrutinize the distinctive feature set and keywords linked to harmful news and toxic comments. The proposed approach yields promising outcomes, achieving a 94% accuracy rate in recognizing toxic comments, a 68% recognition accuracy for harmful news, and an 81% accuracy in classifying malicious behavior content (combining harmful news and toxic comments). By harnessing the capabilities of ML and DL, this research enriches our comprehension of and ability to mitigate malicious behavior in online media. It provides valuable insights into the practical identification and categorization of harmful news and toxic comments, highlighting the unique facets of these advanced computational strategies as they address the pressing challenges of our digital society. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial intelligence; Deep learning; Harmful news; Machine learning; Malicious behavior; Toxic comments,1,Information Systems Frontiers,2024 231,Ramakrishnan M.; Gregor S.; Shrestha A.; Soar J.,Addressing Knowledge Gaps in ITSM Practice with “Learning Digital Commons”: A Case Study,"Information Technology Service Management (ITSM) constitutes a suite of specialized organizational capabilities aimed at optimizing the value derived from IT services. The practice of ITSM encompasses a range of complementary frameworks. However, the practitioner community lacks a comprehensive, holistic understanding of the knowledge embedded within these frameworks. Addressing this gap, we developed Service-Symphony, an instance of a Learning Digital Commons (LEDICO) designed to empower the ITSM community with a holistic knowledge-learning experience, with design principles based on epistemic logic, cognitive constructivist learning theory and cognitive schema theory. Leveraging the Design Science Research (DSR) paradigm, we systematically constructed and assessed Service-Symphony. Evaluation tools included surveys and web analytics. Survey responses revealed a consensus among participants, with the majority expressing alignment with the four design principles underpinning Service-Symphony. Web analytics data further indicated significant engagement, with 148,796 users accessing Service-Symphony between April 2019 and September 2022. This paper contributes both to theory and practice. Theoretical contributions include the establishment of a conceptual model and a multi-grounded design theory based on cognitive constructivist learning, cognitive schema and epistemic logic. The practical contributions include e the deployment of a public domain ITSM digital commons tailored to the specific needs of the ITSM community, which is also used as supplementary learning resource for ITSM students. © The Author(s) 2024.",Cognitive constructivist learning; Cognitive Schema; Design science research; Epistemic logic; IT service management; Knowledge commons; Learning digital commons,2,Information Systems Frontiers,2025 232,Huang T.; Zhou L.; Lü K.; Wang L.; Chen H.; Du G.,An Empirical Evaluation of Algorithms for Link Prediction,"Online social networks (OSNs) analysis has been widely used in the field of information systems (IS), thus link prediction, one of the most important core techniques of OSNs analysis, plays a vital role in the development of IS. Despite the recent development of numerous link prediction approaches, there is still a lack of comprehensive studies that measure and evaluate their performance, which hinders the rational selection and full utilization of existing prediction approaches. This study proposes a novel taxonomy of link prediction approaches based on their prediction principles. Furthermore, it selects eighteen representative approaches from various categories to perform an empirical evaluation on six real-world benchmark datasets. The features of different types of predication approaches have been analyzed based evaluation test results. The research provides researchers with improved understandings on link prediction approaches and offers insightful performance related information to practitioners for developing more effective information systems. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Embedding learning; Information systems; Link prediction; Similarity score,1,Information Systems Frontiers,2025 233,Lee W.-H.; Hsiao C.-L.; Wen K.-L.,Promoting Sustainability in Motor Insurance: A Novel Approach To Evaluating Driving Behavior,"The motor insurance industry faces a persistent “vicious cycle” due to the information asymmetry, where cross-subsidization and moral hazard hinder the adoption of accurate, behavior-based pricing. Traditional usage-based insurance (UBI) models, which rely on simple event counts, often fail to capture the complexity of driving risks, limiting insurers’ ability to segment risks accurately, set fair premiums, and design incentives that promote safer driving and retention. This study proposes an innovative information system framework to break this cycle. A Driving Pattern-N (DPN) model is proposed with a novel feature set combining association-rule and sequential-pattern mining to identify causal links between driving behaviors and near-crash events. Compared to conventional UBI models, DPN captures behavioral sequences and transition probabilities, enhancing both predictive accuracy and interpretability. Implemented via a random forest ensemble, the system is benchmarked against baseline behavior-centric and pattern-based models across multiple experimental settings, demonstrating robust classification performance and actionable insights. From an information systems perspective, this research advances telematics-driven insurance by embedding transparency, explainability, and causality into the model pipeline, enabling fairer premium structures, incentivizing safer driving, and supporting a sustainable insurance ecosystem. The framework bridges UBI, advanced data mining, and decision-support systems, offering a replicable methodology for real-time risk management. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Data mining; Driving risk; Pay-how-you-drive; Usage-based insurance; Vicious cycle,0,Information Systems Frontiers,2025 234,Salim M.M.; Jo B.H.; Singh S.K.; Park J.H.,A Federated Learning and GAN-Based Stealthy Malware Detection Scheme for IIoT Security,"Industrial Internet of Things (IIoT) devices are vital for real-time data collection, yet their widespread adoption exposes networks to stealthy malware that mimics benign processes, creating major challenges for secure and efficient deployment in sensitive domains such as clinical decision-making. Effective detection is further constrained by data scarcity due to privacy concerns and restricted access to malware samples. To address these challenges, this paper proposes a Federated Stealth Malware Detection (FSMD) scheme that combines Generative Adversarial Networks (GANs) for synthetic malware augmentation with Federated Learning for privacy-preserving collaborative training. In addition, an adaptive satisfaction scoring method is introduced to reduce redundant training rounds and optimize resource usage at edge devices. Experimental results demonstrate that FSMD achieves 96.34% detection accuracy, outperforming existing methods while reducing training rounds by 36% on average compared with standard Federated Averaging (p < 0.001). Validation on Raspberry Pi hardware further confirms its efficiency under realistic IIoT constraints. By uniting data augmentation, privacy-preserving learning, and adaptive training control, FSMD provides a novel and practical solution for strengthening IIoT security against evolving stealthy malware threats. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Federated Learning; GAN; IIoT; Malware Detection,0,Information Systems Frontiers,2025 235,Etienne I.T.; Firdaus M.; Latt C.N.Z.; Noh S.; Rhee K.-H.,Hyperledger Fabric-Powered Network Slicing Handover Authentication,"Network slicing is a 5G concept that virtualizes the physical network infrastructure to accommodate multiple service requirements on the same network, where each slice manages diverse needs and ensures their coexistence. In this work, we leverage blockchain technology to strengthen the security of handover authentication (HA) processes in network slicing systems.The proposed system addresses the challenge of reducing latency during handovers by incorporating a hybrid on-chain/off-chain model, optimizing the balance between security and speed. It employs the Raft consensus mechanism, which offers lower latency compared to more traditional consensus protocols such as PBFT. It establishes a decentralized registry for recording transfer events, streamlining user equipment (UE) identification verification, and improving HA efficiency. Moreover, we also introduce a three-component model: network slicing, user environments, and a Hyperledger Fabric (HLF) blockchain for authentication and authorization, which enhances the user experience by minimizing delays, ensuring data privacy, and providing scalability. By leveraging edge computing in conjunction with network slicing, the system further reduces latency, making it more efficient for real-time applications in dynamic mobile environments. Performance experiments indicate satisfactory scalability and maintained service quality under increasing throughput, affirming the suitability of the HLF-based system for managing network scenarios. Furthermore, the system’s modular design ensures compatibility with existing authentication protocols, such as AKA and EAP, enabling seamless integration with legacy systems. Consequently, this work enhances network security and service quality, especially in network slicing, HA, and employing HLF for privacy and security solutions. As 5G networks continue to evolve toward 6G, this system’s scalability and flexibility offer a promising approach to addressing future challenges in secure and efficient handover authentication. © The Author(s) 2024.",5G; Handover authentication; Hyperledger fabric; Identity mixer; Network slicing,2,Information Systems Frontiers,2024 236,Daniel C.; Mullarkey M.; Agrawal M.,RQ Labs: A Cybersecurity Workforce Skills Development Framework,"This research contributes to the knowledge of how Information Systems (IS) researchers can iteratively intervene with practitioners to co-create instructional programs with a framework designed for fast-paced, rapidly changing IS fields such as cybersecurity. We demonstrate how complex fields, such as cybersecurity, have the need for a skilled workforce that continues to rapidly outpace supply from universities. IS researchers partnering with practitioners can use this research as an exemplar of a method to design, build, and evaluate these innovative co-curricular IS programs. Moreover, we find these co-curricular IS programs are essential to upskilling students, integrating training on the latest tools, systems, and processes in these rapidly evolving disciplines. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cybersecurity training program design; Cybersecurity workforce skills shortage; Elaborated action design research,14,Information Systems Frontiers,2023 237,Wedel I.; Palk M.; Voß S.,A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter,"Social media enable companies to assess consumers’ opinions, complaints and needs. The systematic and data-driven analysis of social media to generate business value is summarized under the term Social Media Analytics which includes statistical, network-based and language-based approaches. We focus on textual data and investigate which conversation topics arise during the time of a new product introduction on Twitter and how the overall sentiment is during and after the event. The analysis via Natural Language Processing tools is conducted in two languages and four different countries, such that cultural differences in the tonality and customer needs can be identified for the product. Different methods of sentiment analysis and topic modeling are compared to identify the usability in social media and in the respective languages English and German. Furthermore, we illustrate the importance of preprocessing steps when applying these methods and identify relevant product insights. © 2021, The Author(s).",Natural language processing; Sentiment analysis; Social media analytics; Topic modeling,1,Information Systems Frontiers,2022 238,Polyviou A.; Zamani E.D.,Are we Nearly There Yet? A Desires & Realities Framework for Europe’s AI Strategy,"Of all emerging technologies, Artificial Intelligence (AI) is perhaps the most debated topic in contemporary society because it promises to redefine and disrupt several sectors. At the same time, AI poses challenges for policymakers and decision-makers, particularly regarding formulating strategies and regulations to address their stakeholders’ needs and perceptions. This paper explores stakeholder perceptions as expressed through their participation in the formulation of Europe’s AI strategy and sheds light on the challenges of AI in Europe and the expectations for the future. Our analysis reveals six dimensions towards an AI strategy; ecosystems, education, liability, data availability sufficiency & protection, governance and autonomy. It draws on these dimensions to construct a desires-realities framework for AI strategy in Europe and provide a research agenda for addressing existing realities. Our findings contribute to understanding stakeholder desires on AI and hold important implications for research, practice and policymaking. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",AI ethics; AI strategy; Artificial Intelligence; Technology policy; Technology regulation,14,Information Systems Frontiers,2023 239,Kumar P.; Dwivedi Y.K.; Anand A.,Responsible Artificial Intelligence (AI) for Value Formation and Market Performance in Healthcare: the Mediating Role of Patient’s Cognitive Engagement,"The Healthcare sector has been at the forefront of the adoption of artificial intelligence (AI) technologies. Owing to the nature of the services and the vulnerability of a large section of end-users, the topic of responsible AI has become the subject of widespread study and discussion. We conduct a mixed-method study to identify the constituents of responsible AI in the healthcare sector and investigate its role in value formation and market performance. The study context is India, where AI technologies are in the developing phase. The results from 12 in-depth interviews enrich the more nuanced understanding of how different facets of responsible AI guide healthcare firms in evidence-based medicine and improved patient centered care. PLS-SEM analysis of 290 survey responses validates the theoretical framework and establishes responsible AI as a third-order factor. The 174 dyadic data findings also confirm the mediation mechanism of the patient’s cognitive engagement with responsible AI-solutions and perceived value, which leads to market performance. © 2021, The Author(s).",Artificial intelligence; Cognitive engagement; Healthcare; Market performance; Responsible AI; Value formation,121,Information Systems Frontiers,2023 240,Leong L.-Y.; Hew T.-S.; Ooi K.-B.; Metri B.; Dwivedi Y.K.,Extending the Theory of Planned Behavior in the Social Commerce Context: A Meta-Analytic SEM (MASEM) Approach,"The theory of planned behavior (TPB) is popular in social commerce research, but existing studies have yielded inconclusive and inconsistent findings. As TPB was developed before the introduction of the Internet, Web 2.0 technologies, and social media, it is time to evaluate whether its relevance, effectiveness, novelty, and parsimony may have deteriorated due to temporal factors and the emergence of new Information Systems (IS) artifacts. In this work, an extended TPB2 is proposed by integrating social support, and MASEM analysis was conducted using a pooled correlation matrix. The findings revealed that TPB2 can better capture the nature of social commerce, as it can explain 28.4% of the variance in attitude, 59.0% of the variance in behavioral intention, and 9% of the variance in use behavior. In addition, it indicates that masculinity and uncertainty avoidance are the most significant Hofstedian cultural dimensions. The theoretical and managerial implications are also discussed along with the research agenda. © 2022, The Author(s).",Cultural differences; Hofstedian cultural dimensions; Meta-analytic SEM (MASEM); Social commerce; Theory of Planned Behavior (TPB); TPB2,63,Information Systems Frontiers,2023 241,Dolci T.; Amata L.; Manco C.; Azzalini F.; Gribaudo M.; Tanca L.,Tools for Healthcare Data Lake Infrastructure Benchmarking,"Vast amounts of medical data are generated every day, and constitute a crucial asset to improve therapy outcomes, medical treatments and healthcare costs. Data lakes are a valuable solution for the management and analysis of such a variety and abundance of data, yet to date there is no data lake architecture specifically designed for the healthcare domain. Moreover, benchmarking the underlying infrastructure of data lakes is fundamental for optimizing resource allocation and performance, increasing the potential of this kind of data platforms. This work describes a data lake architecture to ingest, store, process, and analyze heterogeneous medical data. Also, we present a benchmark for infrastructures supporting healthcare data lakes, focusing on a variety of analysis tasks, from relational analysis to machine learning. The benchmark is tested on a virtualized implementation of our data lake architecture, and on two external cloud-based infrastructures. Our results highlight distinctions between infrastructures and tasks of different nature, according to the machine learning techniques, data sizes and formats involved. © 2024, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Benchmarking; Data analytics; Data lake; Machine learning; Medical data,3,Information Systems Frontiers,2024 242,Zeng Q.; Guo Q.; Zhuang W.; Zhang Y.; Fan W.,Do Real-Time Reviews Matter? Examining how Bullet Screen Influences Consumers’ Purchase Intention in Live Streaming Commerce,"Bullet screen as a type of real-time reviews published by viewers is an important unique feature in live streaming commerce. However, it is unclear whether and how bullet screen affects consumers’ purchase intention. Drawing upon elaboration likelihood model, this study developed a conceptual model integrating two variables for central cues and three variables for peripheral cues to explain consumers’ purchase intention. Using a big dataset of 668,591 records from the Taobao Live, the largest live streaming commerce platform in China, our empirical study finds that bullet screen has a vital role in influencing consumers’ purchase intention. Interestingly, bullet screen sentiment has a curvilinear relationship with purchase intention, and source credibility has a negative effect on purchase intention. In addition, product type moderates the impact of bullet screen on purchase intention, and the results indicate that peripheral cues have a stronger influence on purchase intention of experience products than search products. Our study contributes to customer review literature by exploring the influence of real-time reviews on consumer behaviors in live streaming commerce. It also offers a useful practical framework for platform providers and sellers. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Bullet Screen; Elaboration Likelihood Model; Live Streaming Commerce; Purchase Intention; Real-Time Reviews; Sentiment Analysis,57,Information Systems Frontiers,2023 243,Vasist P.N.; Krishnan S.,AI’s Impact on Sustainability Targets: A Cross-Country NCA and fsQCA Study,"Artificial intelligence is driving significant advancements in sustainability across nations. In light of AI’s benefits, recent studies emphasize the need for nations to develop comprehensive AI strategies that prioritize achieving SDG-related objectives. However, AI development is a complex sociotechnical process, with interconnected components influencing a country’s capability in AI. Given AI’s rising strategic significance for nations, we examine how dimensions of a nation’s AI capacity converge to facilitate sustainability advances. Using a cross-country configurational analysis comprising 59 nations, we identify six necessary conditions and three distinct configurations that influence a nation’s overall progress toward achieving the SDGs. The results underscore the relatively prominent role of access infrastructure and an operating environment underpinned by AI regulations in contributing to SDG progress. The comparatively lower significance of commercial ventures and AI talent highlights that sustainability efforts of ventures such as AI start-ups must balance social and environmental aspects with economic goals, while AI talent, in conjunction with other factors such as foundational platforms, can help drive innovative AI projects to advance SDG goals. A supplementary analysis helps discern how economic development and urbanization interact with other dimensions of a nation’s AI capacity to advance sustainability endeavors. The study renews focus on sustainability in IS research and contributes to the scholarly discourse on Responsible AI and Green IS. The results also nudge AI practitioners and policymakers to prioritize their efforts in advancing progress toward SDGs, specifically exploring AI’s potential to enhance and expedite these efforts. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial Intelligence; Configurational analysis; Sustainable development goals; Technology enactment framework,5,Information Systems Frontiers,2025 244,Yoo C.W.; Hur I.; Goo J.,Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination,"Is collective agency important for information security management? Drawing on social cognitive theory, this paper proposes four efficacy-shaping factors as antecedents of workgroup collective efficacy and examines its influence on workgroup information security effectiveness. For empirical analysis, a structural model is proposed with theoretical support. 306 individual responses were collected from 33 branch offices of a law enforcement organization in South Korea. Our results support the focal hypotheses that workgroup collective efficacy has significant positive relationships with its antecedents as well as workgroup information security effectiveness. This indicates that the exercise of collective agency is important in enhancing information security effectiveness in organizations. Further theoretical and practical implications will be discussed. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Affective state; Collective efficacy; Mastery experience; Observational learning; Social persuasion; Workgroup information security,4,Information Systems Frontiers,2023 245,Prabhala M.; Bose I.,"Look Before you Leap! The Impact of Trust, Uncertainty, and Topics of Reviews on Search and Sales of Cars","While the research on online consumer reviews is immense, it has largely focused on products which can also be purchased online. However, the high level of digital engagement of individuals today along with a reported fall in physical store visits indicate that digital content can also affect products available only for purchase offline. This research examines the effects of trust, uncertainty, and topics extracted from online consumer reviews on two outcomes in the India car market, namely the search for online information and sales. The study finds that while uncertainty does not affect sales, and has a negative effect on online information search, trust is positively associated with both. The topics extracted using Latent Dirichlet Allocation from the review corpus fall under the category of experiential or functional. The different topics have direct and mediating impacts on search and sales. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Car sales; Online consumer reviews; Online search; Topic modelling; Trust; Uncertainty,0,Information Systems Frontiers,2025 246,Chung W.; Zhang Y.; Pan J.,A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media,"The spreading of disinformation in social media threatens cybersecurity and undermines market efficiency. Detecting disinformation is challenging due to large volumes of social media content and a rapidly changing environment. This research developed and validated a theory-based, novel deep-learning approach (called TRNN) to disinformation detection. Grounded in social and psychological theories, TRNN uses deep-learning and data-centric augmentation to enhance disinformation detection in financial social media. Temporal and contextual information is encoded as specific knowledge about human-validated disinformation, which was identified from our unique collection of 745,139 financial social media messages about four U.S. high-tech company stocks and their fine-grained trading data. TRNN uses multiple series of long short-term memory (LSTM) recurrent neurons to learn dynamic and hidden patterns to support disinformation detection. Our experimental findings show that TRNN significantly outperformed widely-used machine learning techniques in terms of precision, recall, F-score and accuracy, achieving consistently better classification performance in disinformation detection. A case study of Apple Inc.’s stock price movement demonstrates the potential usability of TRNN for secure knowledge management. The research contributes to developing novel approach and model, producing new information systems artifacts and dataset, and providing empirical findings of detecting online disinformation. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cybersecurity; Deep learning; Design science; Disinformation detection; Financial market; Machine learning; Secure knowledge management; Sequence prediction; Social media; Temporal recurrent neural network,23,Information Systems Frontiers,2023 247,Pandey V.; Ansari S.,Impact of Game Design Elements on Actual Usage vs Future Use Intentions of Mobile Payment App Users: A Motivation Based Approach,"The use of gamification is on the rise across various domains. This study explores the impact of gamification on users’ actual usage and future use intentions in the context of utilitarian apps like mobile payment systems. Owing to the transactional nature of these apps, their markets are characterised by low product differentiation, low switching costs, and high competition. These market characteristics make retaining continued usage from customers a serious challenge. This study draws from self-determination theory to develop a framework for gamification’s impact on the actual and future usage intentions of mobile payment users via autonomous & controlled motivations. The study compares the effects of gamification elements on actual usage and future usage intentions by evaluating two models. The outcomes of the study establish a significant effect of gamification on the two dependent variables. Moreover, the results, enhance our understanding of integrating game design elements within mobile payment apps. The results can help practitioners use gamification strategically to modify the post-adoption behaviour of m-payment users. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.",Actual usage; Extrinsic motivation; Future use intention; Gamification; Intrinsic motivation; Mobile Payment Applications; Self-determination theory; Utilitarian apps,11,Information Systems Frontiers,2024 248,Song J.; Xia S.; Vrontis D.; Sukumar A.; Liao B.; Li Q.; Tian K.; Yao N.,The Source of SMEs’ Competitive Performance in COVID-19: Matching Big Data Analytics Capability to Business Models,"Literature notes that firms are keen to develop big data analytics capability (BDAC, e.g. big data analytics (BDA) management and technology capability) to improve their competitive performance (e.g. financial performance and growth performance). Unfortunately, the extant literature has limited understanding of the mechanisms by which firms’ BDAC affects their competitive performance, especially in the context of small and medium-sized enterprises (SMEs). Using resource capability as the theoretical lens, this paper specifically examines how BDAC influences SMEs’ competitive performance via the mediating role of business models (BMs). Also, this study explores the moderating effect of COVID-19 on the relationship between BDAC and BMs. Supported by Partial Least Squares-Structural Equation Modelling (PLS-SEM) and data from 242 SMEs in China, this study finds the mediating roles of infrastructure and value attributes of BMs in enhancing the relationship of BDAC on competitive performance. Furthermore, the improvement of financial performance comes from the matching of BDA management capability with infrastructure attributes of BMs, while the improvements in growth come from the matching of BDA management capability and BDA technology capability with value attributes of BMs. The result also confirms the positive moderating effects of COVID-19 on the relationship of BDA management capability and value attributes of BMs. This study enriches the integration of BDAC and BMs literature by showing that the match between BDAC and BMs is vital to achieve competitive performance, and it is helpful for managers to adopt an informed BDA strategy to promote widespread use of BDAs and BMs. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Big data analytics capability; Business model; Competitive performance; COVID-19; Dual attributes,47,Information Systems Frontiers,2022 249,Feng N.; Shi Y.; Li Y.; Li D.; Zhang J.; Li M.,An Exploration of the Dynamics Between Social Media and Box Office Performance,"Prior studies have reported the positive impact of social media on box office performance. There is limited evidence of the dynamics of the positive impact and how box office performance influences social media. This study examines how owned social media (OSM) and earned social media (ESM) impact box office performance in a dynamic manner and vice versa in the opening week of movies. We also examine how these impacts vary with firm size of a movie’s marketing company and platform specificity of where the movie is advertised. We applied the panel vector auto-regression method to analyze a merged dataset of 289 movies distributed in the Chinese movie market. We found that OSM and ESM had different impacts on box office performance. Box office performance reacted faster to ESM than to OSM and the reaction lasted longer to OSM than to ESM. In addition, the impact of OSM was more significant for large firms while ESM’s impact was more significant for small firms. Finally, social media on specialized platforms did not have a faster impact on box office performance than that on general platforms. The impact on general platforms did not last longer than that on specialized platform. Overall, we recommend movie marketing firms develop tailored social media strategies by means of customizing their choices of social media based on firm size and platform specificity. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Earned media; Movie box office; Owned media; Panel VAR,3,Information Systems Frontiers,2024 250,Gupta S.; Modgil S.; Bhushan B.; Sivarajah U.; Banerjee S.,Design and Implementation of an IIoT Driven Information System: A Case Study,"Information systems are critical for companies since they offer quick and easy access to complex and significant data in a structured manner to make informed and effective business decisions. Hence, the objective of this study is to conceptualize and implement an innovative information system in the case study organization. The study identified the requirements for Organizing Vision Theory (OVT) and developed architecture based on Organizational Information Processing Theory (OIPT). This architecture is designed and developed using the Industrial Internet of Things (IIoT) to support a self-organizing vision and enhanced information processing. The study’s contribution lies in developing and executing an integrative architecture of IIoT-driven information systems from the lenses of OVT and OIPT. Further, this study contributes by mapping OVT elements (such as transparency, continuity, and coherence) and OIPT elements (information processing needs and capabilities) to drive value and knowledge through a robust architecture of IIoT-driven information systems. The study also highlights the contribution of IIoT-based information systems to a new knowledge system, facilitating better decision-making by professionals. © The Author(s) 2023.",Architecture; Decision support; Digital transformation; IIoT; Industry 4.0; Information systems,7,Information Systems Frontiers,2025 251,Park H.; Astillo P.V.B.; Kim T.; You I.,5G Native Network Function for False Base Station Detection Using Machine Learning Technique,"The Fifth-Generation (5G) technology is increasingly recognized as a key enabler for V2X applications, although large-scale commercial deployments remain in the early stages. Despite its potential to support advanced vehicular connectivity, 5G systems are still vulnerable to false base station attacks. While various strategies have been proposed for detecting these attacks, they cannot easily be adapted to the 5G ecosystem due to their limited applicability to specific vendors and limited operational knowledge of the system. To address this issue, we propose a new network function called the Measurement Report (MR) Verification Function (MRVF) which can detect false base stations and is compatible with the 5G network infrastructure. MRVF gathers MR messages from User Equipment and learns a model for detecting false base stations through Machine Learning. We simulated two scenarios: one with a normal environment, and another that included the presence of a false base station. We used class-labeled data gathered from each simulation for supervised learning. The generated classification model detected false base stations with different scene behavior in the subsequent simulation experiment. Among the seven supervised learning algorithms evaluated in this study, the most suitable algorithm according to the results was the Multi Layer Perceptron, which achieved a detection accuracy of 99% when the noise level was 0%. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",5G Security; False base station; Machine learning; Supervised learning; Vehicle-to-everything (V2X),1,Information Systems Frontiers,2025 252,Sharma K.; Mukhopadhyay A.,Cyber-risk Management Framework for Online Gaming Firms: an Artificial Neural Network Approach,"Hackers have used Distributed-Denial-of-Service attacks to overwhelm a firm’s cyber-resources resulting in disrupted access to legitimate end-users. Globally, DDoS attacks cost firms between US$ 120 K to US$ 2 M for each incident. Apart from the monetary loss, they also disrupt service quality and damage the brand reputation of firms. In 2018-2019, Massively Multiplayer Online Gaming (MMOG) firms witnessed 74% of the total DDoS attacks. MMOG firms form a lucrative segment for hackers because of their large customer base and the massive incentive to cause disruptions and losses. Our Feedforward Neural Network-based Cyber-risk Assessment and Mitigation (FNN-CRAM) model consists of three modules: assessment, quantification, and mitigation. The cyber-risk assessment module uses FNN, which takes seven inputs comprising DDoS attack intensity and duration for five DDoS attack types, vulnerability data (i.e., their counts and score), and the vulnerability trends over time. This layer is connected to a ten-neuron hidden layer and one neuron output layer that estimates the probability of these attacks. We also observe that the probability of these DDoS attacks follows a Weibull distribution. Next, our cyber-risk quantification module computes the expected loss. We note that expected losses due to these DDoS attacks follow a gamma distribution. Our cyber-risk mitigation module uses a heat matrix to help the CTO (i) prioritize the cyber-risk associated with a DDoS attack and (ii) decide whether to reduce, accept, or pass the cyber-risk using technological and cyber-insurance interventions. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cyber-insurance; Cyber-risk; DDoS; MMOG; Neural network,14,Information Systems Frontiers,2023 253,Alraja M.N.; Imran R.; Khashab B.M.; Shah M.,"Technological Innovation, Sustainable Green Practices and SMEs Sustainable Performance in Times of Crisis (COVID-19 pandemic)","COVID-19 restrictions significantly affected SMEs, which have faced many challenges to their sustainability within this fragile new environment. This study proposes a holistic framework of sustainable performance by interrelating factors showing robust associations to produce this effect' for achieving sustainable performance in SMEs, through integrating the Technology Organisation Environment (TOE) and Resource Based View (RBV) models, to test how sustainable green practices can process the TOE factors when affecting sustainable performance. The research focuses on SMEs with worldwide employees and involves data collected from a range of different employees belonging to four different managerial levels. The process incorporated the analysis of 669 questionnaires to test the proposed hypotheses using structural equation modeling. Findings suggest that, together, TOE factors represent crucial inputs for green practices such as green training, green performance appraisal, that, in turn, mean critical processes lead to sustainable performance (output). Additionally, the findings should also inspire SMEs to focus even more effort on internal technological and organisational factors and to encourage an eco-friendly culture that would demand stakeholders adopt a more positive environmental stance. © 2022, The Author(s).",Green practices; Resource based view; Sustainable performance; Technological innovations; Technology-organisation-environment,196,Information Systems Frontiers,2022 254,Fosso Wamba S.; Queiroz M.M.,"Responsible Artificial Intelligence as a Secret Ingredient for Digital Health: Bibliometric Analysis, Insights, and Research Directions","With the unparallel advance of leading-edge technologies like artificial intelligence (AI), the healthcare systems are transforming and shifting for more digital health. In recent years, scientific productions have reached unprecedented levels. However, a holistic view of how AI is being used for digital health remains scarce. Besides, there is a considerable lack of studies on responsible AI and ethical issues that identify and suggest practitioners’ essential insights towards the digital health domain. Therefore, we aim to rely on a bibliometric approach to explore the dynamics of the interplay between AI and digital health approaches, considering the responsible AI and ethical aspects of scientific production over the years. We found four distinct periods in the publication dynamics and the most popular approaches of AI in the healthcare field. Also, we highlighted the main trends and insightful directions for scholars and practitioners. In terms of contributions, this work provides a framework integrating AI technologies approaches and applications while discussing several barriers and benefits of AI-based health. In addition, five insightful propositions emerged as a result of the main findings. Thus, this study’s originality is regarding the new framework and the propositions considering responsible AI and ethical issues on digital health. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Bibliometric analysis; Digital health; Machine learning; Responsible AI,87,Information Systems Frontiers,2023 255,Ampel B.,A Computational Design Framework for Targeted Disruption of Hacker Communities,"The rapid proliferation of complex information systems (IS) has been met by an ever-increasing number of attacks that can cause irreparable cyber breaches. These attacks are frequently discussed and disseminated in large international hacker forums. Prevailing approaches for studying hacker forum structures often identify key hackers but do not study how their removal changes information diffusion. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact called the HackerVote framework. HackerVote incorporates network science principles and node centrality measures to maximize the disruption of information propagation in hacker communities. We rigorously evaluated the proposed HackerVote against state-of-the-art node centrality attack methods. The results suggest that the proposed HackerVote outperforms benchmark methods based on four established network measures: (1) average inverse distance, (2) average clustering coefficient, (3) largest connected component size, and (4) spectral radius. We also demonstrated HackerVote’s proof-of-value with an in-depth case study simulating the removal of key hackers from a long-standing international hacker forum. Our proposed HackerVote framework provides important practical implications for law enforcement officials regarding targeted takedown strategies. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Computational design science; Cyber threat intelligence; Cybersecurity analytics; Hacker forums; Network science; Node centrality,0,Information Systems Frontiers,2025 256,Gao Y.; Xu A.; Hu P.J.-H.,Mining Patient-Generated Content for Medication Relations and Transition Network to Predict the Rankings and Volumes of Different Medications,"Accurate estimates of medication rankings and volumes can benefit patients, physicians, online health communities, pharmaceutical companies, and the healthcare industry at large. This study analyzes patient-generated content in online health communities to discover important medication transition and combination patterns for better ranking and volume predictions. The current research takes a data-driven analytics approach to identify medication information from patient posts and classify different types of medication relations. The identified relation patterns then are represented in a medication relation network with an adjusted transition model for ranking and volume estimates. Evaluation results of real-world patient posts show the proposed method is more effective for predicting medication rankings than existing network-based measures. Moreover, a regression-based model, informed by the proposed method’s network-based outcomes, attains promising accuracy in estimating medication volumes, as revealed by the relatively low mean squared errors. Overall, the proposed method is capable of identifying important features for increased predictive power, as manifested by R2 and adjusted R2 values. It has the potential for better medication ranking and volume predictions, and offers insights for decision making by different stakeholders. This method is generalizable and can be applied in important prediction tasks in healthcare and other domains. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Medication network analysis; Medication ranking and volume prescriptions; Medication relation extraction; Online healthcare communities; User-generated content,0,Information Systems Frontiers,2025 257,Gupta S.; Modgil S.; Tuunanen T.; Kar A.K.,Transitioning to AI-enabled Generative Cyber-Physical Servicescape,"Customers of various services have ever-changing expectations from service providers, placing critical pressure on providers to develop a synchronous, quick system that positively impacts user experiences while ensuring that providers are efficient, like ridesharing, home care, vehicle repairing, etc. To serve customers seamlessly and offer enhanced experience, businesses are turning to generative AI. Hence, this study conceptualizes an AI-enabled generative Cyber-Physical Servicescape (CPSC) structure and how different elements are related. This study adopted a grounded theory approach and used semi-structured interviews to collect data from 30 industry experts. First-order concepts, second-order themes, and aggregate dimensions are developed based on the interview data. This analysis further led to the emergence of four core elements of an AI-enabled generative CPSC: user interface, cybercore, servicescape design, and AI-based CPS servicescape. This study contributes to theory by developing four propositions and a framework that indicates the relationship between the four emerging elements of an AI-enabled generative CPSC. This study offers implications for theory and practice that can be considered when developing cyber-physical service systems in services and employing generative AI for best customer service. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Cyber-physical servicescape; Cyber-physical systems; Digital transformation; Generative artificial intelligence; Service systems,1,Information Systems Frontiers,2025 258,Motorny S.; Sarnikar S.; Noteboom C.,Design of an Intelligent Patient Decision aid Based on Individual Decision-Making Styles and Information Need Preferences,"An emerging trend in healthcare delivery is that of patient-centered medicine which includes empowering patients through shared decision-making in their medical care. The use of information technology is a key enabler for empowering patients and supporting patient-centered care. The patient decision aid is one tool for getting patients more involved in their care. However, existing patient decision aids make generalized assumptions about their users and fail to accommodate the variability of individual information needs and decision-making preferences known in the literature. In this paper, we investigate patient attributes that influence patient decision-making preferences and present a framework for the design of individualized patient decision aids. The proposed framework is instantiated in the context of end stage renal disease and was tested to evaluate its effectiveness. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Decision maker preferences; Information needs; Patient decision aids; Personalization,15,Information Systems Frontiers,2022 259,Ghaleb T.A.; da Costa D.A.; Zou Y.,On the Popularity of Internet of Things Projects in Online Communities: An Empirical Study of Hackster.io,"Online Internet of Things (IoT) communities allow IoT engineers to publish information about their projects to a wider audience of users. Despite the growing adoption of IoT technologies in business, the popularity of IoT projects remains unexplored. Understanding how to improve the popularity of IoT projects helps project owners attract more users and foster business opportunities. In this paper, we explore the important characteristics of popular IoT projects across three facets: views count, respects count, and trending scores. We study over 18,000 IoT projects hosted on Hackster.io—a large online IoT community. In particular, we perform a time-series clustering to identify the evolution of each of the three popularity facets. In addition, we construct linear mixed-effect models to investigate the most important factors associated with the popularity of IoT projects. We provide insights to online IoT communities to improve the user guidelines to help (new) IoT engineers make their projects more eye-catching. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Empirical study; Internet of Things (IoT); Online communities; Popularity,7,Information Systems Frontiers,2022 260,Sun J.; Chen X.; Zheng K.; Zan Y.,A Fine-grained Classification Method for Cross-domain Policy Texts Based on Instruction Tuning,"The well-organized structure of Policy Texts (PTs) is fundamental to intelligent governance, yet most PTs lack fine-grained category labels. PTs from different domains follow different classification systems, and traditional encoder-only models cannot directly handle scenarios where the label spaces of the source and target domains differ significantly, as their output layer typically is a fixed-dimensional classification head. Therefore, we propose a Cross-Domain Policy Text Classification (CDPTC) task. We introduce a method for the task called InstructCDPTC. This method, within an instruction tuning framework, transforms the classification task into a generation task, using the decoder-only model BigBird to predict masked tokens. We wrap the original PT within an instruction template containing a task description, a label description, and a mask sequence, which serve as input to BigBird. During training, we use the names of gold categories as the prediction targets for masked positions. During inference, we determine the final predicted category by computing the semantic distance between the averaged representations of the mask predictions and each candidate label. We constructed a dataset of 20,189 labeled policy texts from five different policy domains to evaluate InstructCDPTC. Experimental results demonstrate that InstructCDPTC achieves an F1 score of 0.824 under conditions where the sample distribution and label space of the target domain are entirely unseen, surpassing other baselines. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Digital government; Fine-grained policy text classification; Instruction tuning,0,Information Systems Frontiers,2025 261,Paulus D.; Fathi R.; Fiedrich F.; de Walle B.V.; Comes T.,On the Interplay of Data and Cognitive Bias in Crisis Information Management: An Exploratory Study on Epidemic Response,"Humanitarian crises, such as the 2014 West Africa Ebola epidemic, challenge information management and thereby threaten the digital resilience of the responding organizations. Crisis information management (CIM) is characterised by the urgency to respond despite the uncertainty of the situation. Coupled with high stakes, limited resources and a high cognitive load, crises are prone to induce biases in the data and the cognitive processes of analysts and decision-makers. When biases remain undetected and untreated in CIM, they may lead to decisions based on biased information, increasing the risk of an inefficient response. Literature suggests that crisis response needs to address the initial uncertainty and possible biases by adapting to new and better information as it becomes available. However, we know little about whether adaptive approaches mitigate the interplay of data and cognitive biases. We investigated this question in an exploratory, three-stage experiment on epidemic response. Our participants were experienced practitioners in the fields of crisis decision-making and information analysis. We found that analysts fail to successfully debias data, even when biases are detected, and that this failure can be attributed to undervaluing debiasing efforts in favor of rapid results. This failure leads to the development of biased information products that are conveyed to decision-makers, who consequently make decisions based on biased information. Confirmation bias reinforces the reliance on conclusions reached with biased data, leading to a vicious cycle, in which biased assumptions remain uncorrected. We suggest mindful debiasing as a possible counter-strategy against these bias effects in CIM. © The Author(s) 2022.",Cognitive bias; Crisis information management; Data bias; Digital resilience; Epidemics; Mindfulness,31,Information Systems Frontiers,2024 262,Huang W.,The Crystal Ball of User-Generated Content: Indication of P2P Lending Platform Failure,"User-generated content (UGC) provides us with a rich channel to aggregate public information. The study examines whether UGC could predict the failure of P2P lending platforms, which also depends on crowds’ involvement and contribution. Specifically, we examine a web forum with user comments on the P2P platforms and extract consumer opinion valence and opinion concentration with natural language processing (NLP) techniques. Time-dependent Cox regression analysis shows that consumer opinion has a strong prediction power for platform survival. If consumer opinions on a platform are positive and concentrated, a platform is more likely to survive. Besides, the two factors show a substitution effect to each other. This study deepens our understanding of UGC, which has significant implications for research. It also forms an application of information technology on risk assessment, by expanding the risk indicators to UGC-related information sources. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",P2P lending; Platform risk assessment; Text analysis; UGC,1,Information Systems Frontiers,2025 263,Rjoub G.; Wahab O.A.; Bentahar J.; Cohen R.; Bataineh A.S.,Trust-Augmented Deep Reinforcement Learning for Federated Learning Client Selection,"In the context of distributed machine learning, the concept of federated learning (FL) has emerged as a solution to the privacy concerns that users have about sharing their own data with a third-party server. FL allows a group of users (often referred to as clients) to locally train a single machine learning model on their devices without sharing their raw data. One of the main challenges in FL is how to select the most appropriate clients to participate in the training of a certain task. In this paper, we address this challenge and propose a trust-based deep reinforcement learning approach to select the most adequate clients in terms of resource consumption and training time. On top of the client selection mechanism, we embed a transfer learning approach to handle the scarcity of data in some regions and compensate potential lack of learning at some servers. We apply our solution in the healthcare domain in a COVID-19 detection scenario over IoT devices. In the considered scenario, edge servers collaborate with IoT devices to train a COVID-19 detection model using FL without having to share any raw confidential data. Experiments conducted on a real-world COVID-19 dataset reveal that our solution achieves a good trade-off between detection accuracy and model execution time compared to existing approaches. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",COVID-19 detection; Deep reinforcement learning; Edge computing; Federated learning; Internet of things (IoT); Transfer learning,35,Information Systems Frontiers,2024 264,Al-Dhaen F.; Hou J.; Rana N.P.; Weerakkody V.,Advancing the Understanding of the Role of Responsible AI in the Continued Use of IoMT in Healthcare,"This paper examines the continuous intention by healthcare professionals to use the Internet of Medical Things (IoMT) in combination with responsible artificial intelligence (AI). Using the theory of Diffusion of Innovation (DOI), a model was developed to determine the continuous intention to use IoMT taking into account the risks and complexity involved in using AI. Data was gathered from 276 healthcare professionals through a survey questionnaire across hospitals in Bahrain. Empirical outcomes reveal nine significant relationships amongst the constructs. The findings show that despite contradictions associated with AI, continuous intention to use behaviour can be predicted during the diffusion of IoMT. This study advances the understanding of the role of responsible AI in the continued use of IoMT in healthcare and extends DOI to address the diffusion of two innovations concurrently. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Awareness; Diffusion of innovation; Internet of medical things; Novelty seeking; Responsible AI,41,Information Systems Frontiers,2023 265,Tejay G.P.S.; Winkfield M.,Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance,"Organizations continue to struggle with motivating employee compliance with information systems (IS) security protocols despite implementing technical and managerial strategies. This study examines the critical role of leadership behaviors in fostering security compliance among employees. We assert that effective leadership can significantly influence adherence to IS security controls. Grounded in expectancy theory, our research model investigates how task-oriented and relationship-oriented leadership behaviors impact perceived security efforts and performance, ultimately shaping expected security outcomes. Data were collected from 407 participants through a cross-sectional survey, and structural equation modeling was employed for analysis. The findings reveal that task-oriented leadership is particularly effective in motivating IS security compliance. Furthermore, individual-level analyses highlight task-oriented leadership as the sole behavior demonstrating a direct relationship with the expected security outcomes of compliance. These insights enrich our understanding of security compliance behaviors as primarily driven by extrinsic motivation. We encourage future research to explore the role of intrinsic motivators and the potential indirect effects of relationship-oriented leadership behaviors on IS security policy compliance. By illuminating the behavioral dynamics of leadership, this study paves the way for organizations to enhance their IS security programs and cultivate a culture of compliance. © The Author(s) 2025.",Expectancy theory; IS security leadership; Security compliance; Security outcomes,8,Information Systems Frontiers,2025 266,Guo H.; Scriney M.; Liu K.,An Ostensive Information Architecture to Enhance Semantic Interoperability for Healthcare Information Systems,"Semantic interoperability establishes intercommunications and enables data sharing across disparate systems. In this study, we propose an ostensive information architecture for healthcare information systems to decrease ambiguity caused by using signs in different contexts for different purposes. The ostensive information architecture adopts a consensus-based approach initiated from the perspective of information systems re-design and can be applied to other domains where information exchange is required between heterogeneous systems. Driven by the issues in FHIR (Fast Health Interoperability Resources) implementation, an ostensive approach that supplements the current lexical approach in semantic exchange is proposed. A Semantic Engine with an FHIR knowledge graph as the core is constructed using Neo4j to provide semantic interpretation and examples. The MIMIC III (Medical Information Mart for Intensive Care) datasets and diabetes datasets have been employed to demonstrate the effectiveness of the proposed information architecture. We further discuss the benefits of the separation of semantic interpretation and data storage from the perspective of information system design, and the semantic reasoning towards patient-centric care underpinned by the Semantic Engine. © 2023, The Author(s).",Digital healthcare; FHIR; Graph database; Healthcare information systems; Knowledge graph; Ontology graph; Ostensive approach; Semantic interoperability,16,Information Systems Frontiers,2024 267,Muktadir-Al-Mukit D.; Ali M.H.,The Dynamics of Stock Market Responses Following the Cyber-Attacks News: Evidence from Event Study,"With the growing digital integration of business operations, cybersecurity risks have also increased significantly, posing a potential threat to stock prices through increased volatility. Our study investigates the impact of cyber-attacks on the stock prices of US listed firms, using a dataset of 776 incidents between 2012 and 2022. We argue that although cyber-attacks typically trigger negative stock market responses, the extent and nature of this reaction depend on several key factors, including the source and credibility of the news, the incident’s severity and distinctiveness, data privacy concerns, and the industry’s overall exposure to cyber risks. Our event study shows that firms lose $309.33 million in market value on the day a cyber-attack is reported. We observe that the negative response intensifies when cyber-attack news emerges in influential sources, indicating a wider media coverage and source credibility effect. We find that the negative reaction is more pronounced when the cyber-attack has a high consequential effect (severity). Moreover, firms that confront cyber-attacks for the first-time face overreaction from investors and greater losses than those with consecutive cyber-attacks. Sub-period analysis focusing on the 2015 Office of Personnel Management (OPM) data breach and the COVID-19 era shows more pronounced stock price impacts during the post-OPM and pre-COVID periods. Cross-sectional findings also reveal that firms with higher societal expectations for data privacy and those operating in sectors more vulnerable to cyber threats experience more negative reactions. Hence, our study provides insights for policymakers, regulators, and corporate leaders on cyber breach disclosure, transparency, timeliness and cybersecurity governance to strengthen market stability, corporate resilience, and investor confidence. © The Author(s) 2025.",Cumulative abnormal return; Cyber resilience; Cyber-attack; Data privacy; News coverage; Shareholder value,2,Information Systems Frontiers,2025 268,Bandara F.; Jayawickrama U.; Subasinghage M.; Olan F.; Alamoudi H.; Alharthi M.,Enhancing ERP Responsiveness Through Big Data Technologies: An Empirical Investigation,"Organizations are integrating big data technologies with Enterprise Resource Planning (ERP) systems with an aim to enhance ERP responsiveness (i.e., the ability of the ERP systems to react towards the large volumes of data). Yet, organizations are struggling to manage the integration between the ERP systems and big data technologies, leading to lack of ERP responsiveness. For example, it is difficult to manage large volumes of data collected through big data technologies and to identify and transform the collected data by filtering, aggregating and inferencing through the ERP systems. Building on this motivation, this research examined the factors leading to ERP responsiveness with a focus on big data technologies. The conceptual model which was developed through a systematic literature review was tested using Structural equation modelling (SEM) performed on the survey data collected from 110 industry experts. Our results suggested 12 factors (e.g., big data management and data contextualization) and their relationships which impact on ERP responsiveness. An understanding of the factors which impact on ERP responsiveness contributes to the literature on ERP and big data management as well as offers significant practical implications for ERP and big data management practice. © 2023, The Author(s).",Big data technologies; ERP responsiveness; ERP systems; Structural equation modelling; Systematic literature review,33,Information Systems Frontiers,2024 269,Johnson M.; Albizri A.; Harfouche A.,Responsible Artificial Intelligence in Healthcare: Predicting and Preventing Insurance Claim Denials for Economic and Social Wellbeing,"It is estimated that one out of seven health insurance claims is rejected in the US; hospitals across the country lose approximately $262 billion annually due to denied claims. This widespread problem causes huge cash-flow issues and overburdens patients. Thus, preventing claim denials before claims are submitted to insurers improves profitability, accelerates the revenue cycle, and supports patients’ wellbeing. This study utilizes Design Science Research (DSR) paradigm and develops a Responsible Artificial Intelligence (RAI) solution helping hospital administrators identify potentially denied claims. Guided by five principles, this framework utilizes six AI algorithms – classified as white-box and glass-box – and employs cross-validation to tune hyperparameters and determine the best model. The results show that a white-box algorithm (AdaBoost) model yields an AUC rate of 0.83, outperforming all other models. This research’s primary implications are to (1) help providers reduce operational costs and increase the efficiency of insurance claim processes (2) help patients focus on their recovery instead of dealing with appealing claims. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Analytics; Artificial intelligence; Design science; Insurance claim denials; Responsible AI; White-box models,61,Information Systems Frontiers,2023 270,Zhao G.; Chen X.; Jones P.; Liu S.; Lopez C.; Leoni L.; Dennehy D.,Understanding the Drivers of Industry 4.0 Technologies to Enhance Supply Chain Sustainability: Insights from the Agri-Food Industry,"The sustainability of agri-food supply chains (AFSCs) is severely threatened by regional and global events (e.g., conflicts, natural and human-made disasters, climate crises). In response, the AFSC industry is seeking digital solutions using Industry 4.0 (I4.0) technologies to enhance resilience and efficiency. However, why I4.0 adoption remains stubbornly low in the agri-food industry remains poorly understood. To address this gap, this study draws on middle-range theory (MRT) and uses thematic analysis, the fuzzy analytic hierarchy process, total interpretive structural modelling, and fuzzy cross-impact matrix multiplication applied to classification to produce insights from nine case studies in China that have invested in I4.0 technologies to improve their AFSC sustainability. New drivers of I4.0 unique to the agri-food industry are identified, showing how I4.0 can contribute to the environmental, economic, and social dimensions of AFSC sustainability. The results have implications for AFSC researchers and practitioners with an interest in supply chain sustainability. © The Author(s) 2024.",Agri-food supply chains; Fuzzy analytical hierarchy process; Fuzzy cross-impact matrix multiplication applied to classification analysis; Industry 4.0; Total interpretive structural modeling,13,Information Systems Frontiers,2025 271,Ahmad M.O.; Ahmad I.; Rana N.P.; Khan I.S.,An Empirical Investigation on Business Analytics in Software and Systems Development Projects,"To create competitive advantages, companies are leaning towards business analytics (BA) to make data-driven decisions. Nevertheless, users acceptance and effective usage of BA is a key element for its success. Around the globe, organizations are increasingly adopting BA, however, a paucity of research on examining the drivers of BA adoption and its continuance is noticeable in the literature. This is evident in developing countries where a higher number of systems and software development projects are outsourced. This is the first study to examine BA continuance in the context of software and systems development projects from the perspective of Pakistani software professionals. The data was collected from 186 Pakistani software professionals working in software and systems development projects. The data were analyzed using partial least squares - structural equation modelling techniques. Our structural model explains 45% variance on BA continuance intention, 69% variance on technological compatibility, and 59% variance on perceived usefulness. Our results show that confirmation has a direct impact on BA continuance intention in software and systems projects. The study has both theoretical and practical implications for professionals in the field of business analytics. © 2022, The Author(s).",Business Analytics; Continuance Intention; Data-Driven Decision; Information Systems; Technological Compatibility,12,Information Systems Frontiers,2023 272,Marjanovic O.; Murthy V.,The Emerging Liquid IT Workforce: Theorizing Their Personal Competitive Advantage,"In this paper we aim to contribute to a better understanding of an emerging phenomenon of ‘liquid workforce’, which according to industry press, is rapidly growing. Our specific focus is on the broad research questions: How do liquid IT workers remain competitive? What are suitable strategies for their management and engagement? Using the research insights from the interviews with independent liquid IT professionals working on the same mission-critical compliance program in a large financial institution, we propose a new conceptual model of their ‘personal competitive advantage’ (PCA). Drawing from the theories of human capital and social capital, we theorize PCA as a complex, mutually enhancing (a triple-helix-like) interplay of three highly-intertwined components of ‘Doing’, ‘Relating’ and ‘Becoming’. Based on the proposed model, we then articulate an initial set of strategies for management and engagement of the liquid workforce. In doing so, we expand and challenge the current IS research on IT workforce that remains focused on its retention and prevention of turnover. Instead, we propose to focus on specific management strategies for building and maintaining social capital within and beyond organizational boundaries. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Future of IT profession; IT skills; Liquid IT workforce; Management of IT professionals; Personal Competitive Advantage; Qualitative study,5,Information Systems Frontiers,2022 273,Goel K.; Bandara W.; Gable G.,Banking the Unbanked: Conceptualizing Success of the Business Correspondent Model,"The Business Correspondent (BC) model is an IT-enabled business process outsourcing initiative to provide financial services to the unbanked. It is a complex banking system involving multiple actors, system elements and settings, intended to address financial exclusion. Given the BC-Model’s potentially significant role in economic sustainability, it is important to evaluate its success. Efforts to measure the success of the BC-Model have been limited to date; this paper therefore presents a conceptual framework of BC-Model-Success consisting of six dimensions- economic, strategic, technological, customer satisfaction, employee satisfaction, and social, resulting from a three-phase study design. The relevance of the framework was empirically validated across four implementations of the BC-Model. The resulting framework provides strong theoretical foundations for understanding what BC model success is, for assisting practitioners with evaluating the success of the BC-Model and with identifying possible improvements, and for facilitating future research on the BC-Model. © 2022, The Author(s).",Business correspondent model; Business process outsourcing; Conceptualization; Financial inclusion; Multiple case studies,0,Information Systems Frontiers,2023 274,Canhoto A.I.; Keegan B.J.; Ryzhikh M.,Snakes and Ladders: Unpacking the Personalisation-Privacy Paradox in the Context of AI-Enabled Personalisation in the Physical Retail Environment,"Artificial intelligence (AI) is expected to bring to the physical retail environment the kind of mass personalisation that is already common in online commerce, delivering offers that are targeted to each customer, and that adapt to changes in the customer’s context. However, factors related to the in-store environment, the small screen where the offer is delivered, and privacy concerns, create uncertainty regarding how customers might react to highly personalised offers that are delivered to their smartphones while they are in a store. To investigate how customers exposed to this type of AI-enabled, personalised offer, perceive it and respond to it, we use the personalisation-privacy paradox lens. Case study data focused on UK based, female, fashion retail shoppers exposed to such offers reveal that they seek discounts on desired items and improvement of the in-store experience; they resent interruptions and generic offers; express a strong desire for autonomy; and attempt to control access to private information and to improve the recommendations that they receive. Our analysis also exposes contradictions in customers’ expectations of personalisation that requires location tracking. We conclude by drawing an analogy to the popular Snakes and Ladders game, to illustrate the delicate balance between drivers and barriers to acceptance of AI-enabled, highly personalised offers delivered to customers’ smartphones while they are in-store. © The Author(s) 2023.",Artificial intelligence; Geo-location; Personalisation; Personalisation-privacy paradox; Privacy; Retail,44,Information Systems Frontiers,2024 275,Nikkhah H.R.; Schlackl F.; Sabherwal R.,"Does Culture Affect Post-Adoption Privacy Concerns of Mobile Cloud Computing App Users? Insights from the US, the UK, and India","Mobile cloud computing apps have become the dominant type of mobile app, providing users with many benefits but also causing privacy concerns related to data being uploaded to the cloud. Since many mobile cloud computing apps have billions of current users around the world, the role of culture in privacy after adoption is pertinent to researchers, users, and developers. This study investigates how culture affects privacy considerations of mobile cloud app users in the post-adoption phase and how it shapes their response to developers’ institutional privacy assurances such as privacy policies and ISO 27018 certification. Based on surveys of current mobile cloud computing app users across three countries: the US (n = 1,045), the UK (n = 183), and India (n = 1,189), we find that users from different cultures differ in their considerations of privacy and in perceptions of institutional privacy assurance. The results show that cultural dimensions moderate the effects of value and risk of transferring to the cloud on continued use. We also find counterintuitive results for the direction in which uncertainty avoidance and power distance shape users’ reactions to institutional privacy assurances. Our findings suggest that MCC app developers need to be consider users’ cultures when designing and communicating their institutional privacy assurances. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Culture; Institutional privacy assurances; Mobile cloud computing app; Post-adoption; Privacy,0,Information Systems Frontiers,2025 276,Xi N.; Chen J.; Gama F.; Riar M.; Hamari J.,The challenges of entering the metaverse: An experiment on the effect of extended reality on workload,"Information technologies exist to enable us to either do things we have not done before or do familiar things more efficiently. Metaverse (i.e. extended reality: XR) enables novel forms of engrossing telepresence, but it also may make mundate tasks more effortless. Such technologies increasingly facilitate our work, education, healthcare, consumption and entertainment; however, at the same time, metaverse bring a host of challenges. Therefore, we pose the question whether XR technologies, specifically Augmented Reality (AR) and Virtual Reality (VR), either increase or decrease the difficulties of carrying out everyday tasks. In the current study we conducted a 2 (AR: with vs. without) × 2 (VR: with vs. without) between-subject experiment where participants faced a shopping-related task (including navigating, movement, hand-interaction, information processing, information searching, storing, decision making, and simple calculation) to examine a proposed series of hypotheses. The NASA Task Load Index (NASA-TLX) was used to measure subjective workload when using an XR-mediated information system including six sub-dimensions of frustration, performance, effort, physical, mental, and temporal demand. The findings indicate that AR was significantly associated with overall workload, especially mental demand and effort, while VR had no significant effect on any workload sub-dimensions. There was a significant interaction effect between AR and VR on physical demand, effort, and overall workload. The results imply that the resources and cost of operating XR-mediated realities are different and higher than physical reality. © 2022, The Author(s).",Augmented reality; Metaverse; Mixed reality; NASA Task Load Index; Virtual reality; Workload,340,Information Systems Frontiers,2023 277,Cao Y.; Li X.; Kou F.; Wan G.,"The More, the Better? Effects of Same-Side Network Externalities on Customer Loyalty in Ride-Hailing Aggregation Platforms","This study explores the dynamics of customer loyalty in ride-hailing aggregation platforms, a burgeoning segment of the sharing economy that consolidates multiple service providers into a unified interface. Leveraging perceived value theory, we analyze the “double-edged sword” effect of same-side network externalities—how perceived customer network size impacts customer loyalty in a non-linear, inverted U-shaped pattern. Data from 543 aggregation platform users reveal that moderate levels of perceived customer network size optimize loyalty, balancing the positive effects of increased utility and trust with the negative impacts of network congestion. Moreover, perceived value mediates this curvilinear relationship, while perceived driver network size—a measure of cross-side network externalities—intensifies its curvature, highlighting the critical role of interdependencies between platform participants. Our arguments and results contribute to the literature on customer loyalty on platforms, and can inform the strategic decisions of platforms that rely on same side network externalities for value creation. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Cross-side network externalities; Customer loyalty; Perceived value; Ride-hailing aggregation platforms; Same-side network externalities,2,Information Systems Frontiers,2025 278,Stavrinides G.L.; Karatza H.D.,"Security, Cost and Energy Aware Scheduling of Real-Time IoT Workflows in a Mist Computing Environment","The rapid expansion of the Internet of Things (IoT) led to the emergence of new computing paradigms, such as mist and fog computing, in order to tackle the problem of transferring vast volumes of data to remote cloud data centers. In this paper, we propose a security, cost and energy aware scheduling heuristic for real-time workflow jobs that process IoT data with various security requirements. The environment under study is a four-tier architecture, consisting of IoT, mist, fog and cloud layers. The resources in the mist, fog and cloud tiers are considered to be heterogeneous. The proposed scheduling approach is compared to a baseline strategy, which is security aware, but not cost and energy aware. The performance of both heuristics is evaluated through extensive simulation experiments, under different values of security level probabilities for the initial IoT input data of the entry tasks of the workflow jobs. The simulation results reveal that the proposed approach, not only provides a better Quality of Service (QoS) compared to the baseline strategy, but it also achieves monetary cost and energy savings. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. corrected publication 2022.",Cloud computing; Energy efficiency; Fog computing; Mist computing; Security; Workflow scheduling,12,Information Systems Frontiers,2024 279,Gupta M.; Parra C.M.; Dennehy D.,Questioning Racial and Gender Bias in AI-based Recommendations: Do Espoused National Cultural Values Matter?,"One realm of AI, recommender systems have attracted significant research attention due to concerns about its devastating effects to society’s most vulnerable and marginalised communities. Both media press and academic literature provide compelling evidence that AI-based recommendations help to perpetuate and exacerbate racial and gender biases. Yet, there is limited knowledge about the extent to which individuals might question AI-based recommendations when perceived as biased. To address this gap in knowledge, we investigate the effects of espoused national cultural values on AI questionability, by examining how individuals might question AI-based recommendations due to perceived racial or gender bias. Data collected from 387 survey respondents in the United States indicate that individuals with espoused national cultural values associated to collectivism, masculinity and uncertainty avoidance are more likely to question biased AI-based recommendations. This study advances understanding of how cultural values affect AI questionability due to perceived bias and it contributes to current academic discourse about the need to hold AI accountable. © 2021, The Author(s).",Algorithmic bias; Artificial intelligence; Culture; Ethical AI; Gender bias; Racial bias; Recommender systems; Responsible AI,89,Information Systems Frontiers,2022 280,Leuthe D.; Meyer-Hollatz T.; Plank T.; Senkmüller A.,Towards Sustainability of AI – Identifying Design Patterns for Sustainable Machine Learning Development,"As artificial intelligence (AI) and machine learning (ML) advance, concerns about their sustainability impact grow. The emerging field ""Sustainability of AI"" addresses this issue, with papers exploring distinct aspects of ML’s sustainability. However, it lacks a comprehensive approach that considers all ML development phases, treats sustainability holistically, and incorporates practitioner feedback. In response, we developed the sustainable ML design pattern matrix (SML-DPM) consisting of 35 design patterns grounded in justificatory knowledge from research, refined with naturalistic insights from expert interviews and validated in three real-world case studies using a web-based instantiation. The design patterns are structured along a four-phased ML development process, the sustainability dimensions of environmental, social, and governance (ESG), and allocated to five ML stakeholder groups. It represents the first artifact to enhance each ML development phase along each ESG dimension. The SML-DPM fuels advancement by aggregating distinct research, laying the groundwork for future investigations, and providing a roadmap for sustainable ML development. © The Author(s) 2024.",Artificial intelligence; Design patterns; ESG; Machine learning; Sustainability of AI,7,Information Systems Frontiers,2024 281,Outa F.E.; Marcel P.; Peralta V.; Vassiliadis P.,Highlighting the Importance of Intentional Aspects in Data Narrative Crafting Processes,"Data narration is the activity of crafting narratives supported by facts extracted from data exploration and analysis, using interactive visualizations. While data narration has recently attracted much attention, the process of crafting data narratives is loosely documented and has not yet been formally described. In this article, we propose a comprehensive and well-founded process to fill this need. It aims at (i) supporting the complete cycle of data narration, from the exploration of data to the visual rendering of the narrative, (ii) being flexible enough to cover a wide range of crafting practices, and (iii) being well founded upon a conceptual model of the domain. In addition, we investigate several crafting scenarios that represent typical situations and detail the workflow of one particular phase, which reflects the intentional aspects. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Data journalism; Data narrative crafting; Process,4,Information Systems Frontiers,2024 282,Hajek P.; Abedin M.Z.; Sivarajah U.,Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework,"Mobile payment systems are becoming more popular due to the increase in the number of smartphones, which, in turn, attracts the interest of fraudsters. Extant research has therefore developed various fraud detection methods using supervised machine learning. However, sufficient labeled data are rarely available and their detection performance is negatively affected by the extreme class imbalance in financial fraud data. The purpose of this study is to propose an XGBoost-based fraud detection framework while considering the financial consequences of fraud detection systems. The framework was empirically validated on a large dataset of more than 6 million mobile transactions. To demonstrate the effectiveness of the proposed framework, we conducted a comparative evaluation of existing machine learning methods designed for modeling imbalanced data and outlier detection. The results suggest that in terms of standard classification measures, the proposed semi-supervised ensemble model integrating multiple unsupervised outlier detection algorithms and an XGBoost classifier achieves the best results, while the highest cost savings can be achieved by combining random under-sampling and XGBoost methods. This study has therefore financial implications for organizations to make appropriate decisions regarding the implementation of effective fraud detection systems. © 2022, Crown.",Fraud detection; Imbalanced data; Machine learning; Mobile payment; Outlier detection,125,Information Systems Frontiers,2023 283,Krilavičius T.; De Paolis L.T.; De Luca V.; Spjut J.,eXtended Reality and Artificial Intelligence in Medicine and Rehabilitation,"This special issue focuses on the application of eXtended Reality (XR) technologies—comprising Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR)—and Artificial Intelligence (AI) in the fields of medicine and rehabilitation. AR provides support in minimally invasive surgery, where it visualises internal anatomical structures on the patient’s body and provides real-time feedback to improve accuracy, keep the surgeon’s attention and reduce the risk of errors. Furthermore, XR technologies can be used to develop applications for pre-operative planning or for training surgeons through serious games. AI finds applications both in medical image processing, for the recognition of anatomical structures and the reconstruction of 3D models, and in the analysis of biological data for patient monitoring and disease diagnosis. In rehabilitation, XR and AI can enable personalised therapy plans, increase patient engagement through immersive environments and provide real-time feedback to improve recovery outcomes. The papers in this special issue deal with rehabilitation through serious games, AI-enhanced XR applications for healthcare, digital twins and the analysis of bio/neuro-adaptive signals. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Artificial intelligence; eXtended Reality; Medicine; Rehabilitation,5,Information Systems Frontiers,2025 284,Guo T.; Zhong S.; Wang X.; Ma S.,When to Share My First-party Content: the Role of Membership Bundles in Content Platforms,"Content platforms suffer from declining subscriber growth. To address this issue, we examine an interesting strategy that competing platforms jointly launch a membership bundle, which provides consumers with simultaneous access to them at a reduced price. We investigate how the bundle approach interacts with first-party content production in shaping platforms’ pricing and content-sharing decisions. By solving a game-theoretical model, we illustrate that: first, competing platforms offer the bundle only when they are less differentiated. Second, in stark contrast with the consequence of keeping the content exclusive without the bundle, the platform is more likely to share its content with the membership bundle. Third, despite the exclusivity of first-party content, with the membership bundle, the rival platform may generate higher profit instead of always being harmed without the bundle. We enrich the understanding of how platform coopetition interacts with first-party content production and draw practical implications for platform owners. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Content platform; First-party content; Membership bundle; Network externality; Platform competition; Platform cooperation,2,Information Systems Frontiers,2025 285,Zuo M.; Angelopoulos S.; Liang Z.; Ou C.X.J.,Blazing the Trail: Considering Browsing Path Dependence in Online Service Response Strategy,"Competition on e-commerce platforms is becoming increasingly fierce, due to the ease of online searching for comparing products and services. We examine how the sequential browsing behavior of consumers can enable targeted marketing strategies on e-commerce platforms, by using clickstream data from one of the largest e-commerce platforms in Asia. We deploy duration analysis to i) explore how path dependence can better explain consumers’ sequential browsing behavior in different product categories, and ii) characterize the sequential browsing behavior of heterogeneous consumer groups. The findings of our work showcase i) the high accuracy of using sequential browsing path dependence to explain consumer behavior, ii) the patterns of their behavioral intentions and iii) the spell of the behavior of heterogeneous consumer groups. Our findings provide nuanced implications for strategically managing branding, marketing, and customer relations on e-commerce platforms. We discuss the implications of our findings for both research and practice, and we delineate an agenda for future research on the topic. © 2022, The Author(s).",Business Analytics; Consumer Behavior; Duration Analysis; E-commerce; Path Dependence,5,Information Systems Frontiers,2023 286,De Luca V.; Schena A.; Covino A.; Di Bitonto P.; Potenza A.; Barba M.C.; D’Errico G.; De Paolis L.T.,Serious Games for the Treatment of Children with ADHD: The BRAVO Project,"Children affected by attention-deficit hyperactivity disorder (ADHD) exhibit several symptoms characterized by inattention, impulsivity and motor hyperactivity that impair both school performance and everyday life. The BRAVO (Beyond the tReatment of the Attention deficit hyperactiVity disOrder) project dealt with the development of several serious games based on extended reality that help patients improve in self-control, respect for rules, attention and concentration. In order to achieve both logopaedic and behavioural educational goals, serious games were developed concerning three different categories: Topological Categories, Infinite Runner and Planning. Experimental tests conducted over a six-month period assessed the patients’ performance and the emotional impact of the games, also showing a general improvement in cognitive and behavioural functions. © The Author(s) 2024.",ADHD; Biofeedback; Emotional activation; Serious games; Virtual reality,8,Information Systems Frontiers,2025 287,Bayraktar E.; Tatoglu E.; Aydiner A.S.; Delen D.,Business Analytics Adoption and Technological Intensity: An Efficiency Analysis,"Despite the overwhelming popularity of business analytics (BA) as an evidence-based decision support mechanism, the impact of its adoption on organizational performance has received scant attention from the research community. This study aims to unfold the adoption efficiencies of BA and its applications by proposing a data envelopment analysis (DEA) methodology to holistically assess the underlying factors with respect to the level of achievement regarding organizational performance, operational performance, and financial performance. Furthermore, the study unveils the firm-level and sectoral-level discrepancies in BA adoption efficiency in different industry settings. Relying on survey data obtained from 204 executives in various industries, this study provides empirical support for the cross-industry differences in BA adoption efficiencies. The results show that the firms in low-tech industries seem to achieve the highest efficiency from adopting BA regarding its influence on firm performance. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Business analytics; Data envelopment analysis (DEA); Decision-making performance; Emerging countries; Operational performance; Organizational performance; Resource-based view; Turkey,20,Information Systems Frontiers,2024 288,Fosso Wamba S.; Queiroz M.M.; Pappas I.O.; Sullivan Y.,Artificial Intelligence Capability and Firm Performance: A Sustainable Development Perspective by the Mediating Role of Data-Driven Culture,"Artificial Intelligence (AI) tools, applications, and capabilities have received tremendous attention from industry practitioners, scholars, and policymakers. Despite the substantial progress of the literature on AI, there is a considerable scarcity of research investigating the effects of AI capability, considering the importance of a data-driven culture and whether a data-driven culture truly mediates the relationship between AI capability and firm performance from a sustainable development perspective. Anchored by the resource-based theory (RBT), we developed a high-order model of AI capability and its resources (tangible, intangible, and human). We used a two-stage approach, with PLS-SEM in the first and fsQCA in the second. The findings from the first step suggest that AI capability directly impacts firm performance and that data-driven culture mediates the relationship between AI capability and firm performance. The results from the second step indicated that different configurations of AI resources could be considered for firms to achieve high performance but that AI infrastructure is a crucial resource. Our study advances the literature on AI capability and sustainable development goals. Similarly, it contributes to moving the RBT theory forward by suggesting that AI capability is a paramount variable that substantially influences firm performance. Simultaneously, it is harmoniously connected with SDG 9 (industry, innovation, and infrastructure) and SDG 12 (responsible consumption and production). © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial intelligence capability; Data-driven culture; Firm performance; SDG 12; SDG 9; Sustainable development,62,Information Systems Frontiers,2024 289,Ferreira C.; Merendino A.; Meadows M.,Disruption and Legitimacy: Big Data in Society,"The growing availability of data and the emergence of business analytics ecosystems offer possibilities for companies developing innovative business models. However, the disruptive impact of these business models on society is not always judged favourably. This paper explores the growing tensions in the relationship between disruptive Big Data companies and society through the lens of legitimacy – a judgement about the fit and propriety of an entity, such as a company, to society. The study is based on four instrumental cases where Big Data organisations were faced with challenges to their legitimacy. The findings elaborate how digital transformations require companies to understand and manage how much to disrupt and how much to conform to social norms and values. Big Data businesses face a dynamic and paradoxical tension between the potential costs and benefits of their disruptive business models. The topic of legitimacy management is also addressed, drawing out implications for practice. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Big data; Disruption; Legitimacy,13,Information Systems Frontiers,2023 290,Yan D.; Zhang M.,The nature of statistical learningPrediction of Financial Distress for Chinese Listed Manufacturing Companies given Uncertain Financial Accounting Data Environments,"The data uncertainty in financial statements limits the reliability of assessments of a company’s financial condition, which is a challenge widely acknowledged in financial context. This study pioneers the application of robust support vector machines (RSVMs) to model the complex uncertainties in financial reporting that may involve both random errors and systematic distortions through tailored uncertainty sets within a robust optimization framework. Empirically, we apply our method to predict financial distress (FD) of Chinese listed manufacturing companies, analyzing how uncertainty set configurations affect RSVMs performance. The selected optimal form of uncertainty sets, varying across the different prediction horizons illustrate that short-term FD forecasts are more sensitive to ST company data noise, while longer horizons expose systemic gaps between reported and actual financial data, suggesting historical disclosure inflation. Further, comparative analysis demonstrates that RSVMs outperform all benchmark models that include classical L1-norm SVM and its major noise-anti variants in terms of predictive accuracy and stability, and the performance advantage widens with longer forecast horizon. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Chinese listed manufacturing companies; Financial distress prediction; Robust support vector machine; Uncertainty of financial data,0,Information Systems Frontiers,2025 291,Gubela R.M.; Lessmann S.; Stöcker B.,Multiple Treatment Modeling for Target Marketing Campaigns: A Large-Scale Benchmark Study,"Machine learning and artificial intelligence (ML/AI) promise higher degrees of personalization and enhanced efficiency in marketing communication. The paper focuses on causal ML/AI models for campaign targeting. Such models estimate the change in customer behavior due to a marketing action known as the individual treatment effect (ITE) or uplift. ITE estimates capture the value of a marketing action when applied to a specific customer and facilitate effective and efficient targeting. We consolidate uplift models for multiple treatments and continuous outcomes and perform a benchmarking study to demonstrate their potential to target promotional monetary campaigns. In this use case, the new models facilitate selecting the optimal discount amount to offer to a customer. Large-scale analysis based on eight marketing data sets from leading B2C retailers confirms the significant gains in the campaign return on marketing when using the new models compared to relevant model benchmarks and conventional marketing practices. © The Author(s) 2022.",Artificial Intelligence; Business Analytics; Machine Learning; Personalization; Uplift Modeling,5,Information Systems Frontiers,2024 292,Chen Z.; Xiao C.; Liu Y.; Hassan H.; Li D.; Liu J.; Li H.; Xie W.; Zhong W.; Huang B.,Comprehensive 3D Analysis of the Renal System and Stones: Segmenting and Registering Non-Contrast and Contrast Computed Tomography Images,"Detecting and accurately locating kidney stones, which are common urological conditions, can be challenging when using imaging examinations. Therefore, the primary objective of this research is to develop an ensemble model that integrates segmentation and registration techniques. This model aims to visualize the inner structure of the kidney and accurately identify any underlying kidney stones. To achieve this, three separate datasets, namely non-contrast computed tomography (CT) scans, corticomedullary CT scans, and CT excretory scans, are annotated to enhance the three-dimensional (3D) reconstruction of the kidney’s complex anatomy. Initially, the research focuses on utilizing segmentation models to identify and annotate specific classes within the annotated datasets. Subsequently, a registration algorithm is employed to align and combine the segmented results, resulting in a comprehensive 3D representation of the kidney’s anatomical structure. Three cutting-edge segmentation algorithms are employed and evaluated during the segmentation phase, with the most accurate segments being selected for the subsequent registration process. Ultimately, the registration process successfully aligns the kidneys across all three phases and combines the segmented labels, producing a detailed 3D visualization of the complete kidney structure. For kidney segmentation, Swin UNETR exhibited the highest Dice score of 95.21%; for stone segmentation, ResU-Net achieved the highest Dice score of 87.69%. Regarding Artery, Cortex, and Medulla segmentation, ResU-Net and 3D U-Net show comparable performance with similar Dice scores. Considering the Collecting System and Parenchyma, ResU-Net and 3D U-Net demonstrate similar performance in Dice scores. In conclusion, the proposed ensemble model shows potential in accurately visualizing the internal structure of the kidney and precisely localizing kidney stones. This advancement improves the diagnosis process and preoperative planning in percutaneous nephrolithotomy. © The Author(s) 2024.",3D kidney reconstruction; Abdominal CT scans; Percutaneous Nephrolithotomy (PCNL); Renal diseases; Segmentation and registration,6,Information Systems Frontiers,2025 293,Yeoh W.; Lee A.S.H.; Ng C.; Popovic A.; Han Y.,Examining the Acceptance of Blockchain by Real Estate Buyers and Sellers,"Buying and selling real estate is time consuming and labor intensive, requires many intermediaries, and incurs high fees. Blockchain technology provides the real estate industry with a reliable means of tracking transactions and increases trust between the parties involved. Despite the benefits of blockchain, its adoption in the real estate industry is still in its infancy. Therefore, we investigate the factors that influence the acceptance of blockchain technology by buyers and sellers of real estate. A research model was designed based on the combined strengths of the unified theory of technology acceptance and use model and the technology readiness index model. Data were collected from 301 real estate buyers and sellers and analyzed using the partial least squares method. The study found that real estate stakeholders should focus on psychological factors rather than technological factors when adopting blockchain. This study adds to the existing body of knowledge and provides valuable insights to real estate stakeholders on how to implement blockchain technology. © The Author(s) 2023.",Adoption; Blockchain; Factors; Partial least squares method; Real estate,21,Information Systems Frontiers,2024 294,Zamani E.D.; Griva A.; Conboy K.,Using Business Analytics for SME Business Model Transformation under Pandemic Time Pressure,"The COVID-19 pandemic has had an unprecedented impact on many industry sectors, forcing many companies and particularly Small Medium Enterprises (SMEs) to fundamentally change their business models under extreme time pressure. While there are claims that technologies such as analytics can help such rapid transitions, little empirical research exists that shows if or how Business Analytics (BA) supports the adaptation or innovation of SMEs’ business models, let alone within the context of extreme time pressure and turbulence. This study addresses this gap through an exemplar case, where the SME actively used location-based business analytics for rapid business model adaptation and innovation during the Covid-19 crisis. The paper contributes to existing theory by providing a set of propositions, an agenda for future research and a guide for SMEs to assess and implement their own use of analytics for business model transformation. © 2022, The Author(s).",Busines analytics; Busines model innovation; Business model adaptation; Dynamic capabilities; Exogenous shock; SMEs,28,Information Systems Frontiers,2022 295,Plachkinova M.; Menard P.,An Examination of Gain- and Loss-Framed Messaging on Smart Home Security Training Programs,"The Internet of Things (IoT) has gained popularity among home consumers due to its characteristics related to automation, information gathering, and purported physical security benefits. In an effort to capitalize on an expanding market, IoT developers have rushed products to market without proper due diligence regarding device cybersecurity. By being more focused on the utility and convenience of IoT devices without being concerned about their devices’ inherent security flaws, consumers may be unwittingly putting themselves at risk. Gain- and loss-framed messaging has been an extensively studied form of persuasive communication in other research fields but has not been previously examined in the context of information security research. Using an experimental design, we assess the efficacy of applying gain- and loss-framed principles to a security education training and awareness (SETA) program designed to bolster IoT users’ concerns related to pertinent IoT-based threats and provide information about their corresponding countermeasures. We found that for consumers with low initial IoT security concerns, loss-framed messaging is more effective in increasing security concerns. For consumers with higher initial concerns, messages focusing on desirable outcomes, regardless of an overall gain- or loss-framed message valence, are effective at increasing IoT security concerns. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Message framing; Security; SETA programs; Smart home; Training,5,Information Systems Frontiers,2022 296,Bhatt P.; Vemprala N.; Valecha R.; Hariharan G.; Rao H.R.,"User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse","Online users frequently rely on social networking platforms to transmit public concerns and raise awareness about societal issues. With many government organizations actively employing social media data in recent times, the need for processing public concerns on social media has become a critical topic of interest across academic scholars and practitioners. However, the growing volume of social media data makes it difficult to process all the issues under a single umbrella, causing to overlook the main topic of interest within communication technologies, such as privacy. For example, during the COVID-19 pandemic, arguments on privacy and health issues exploded on Twitter, with several threads centered on contact tracking, health data gathering, and its usage by government agencies. To address the challenges of rising data volumes and to understand the importance of privacy concerns, particularly among users seeking greater privacy protection during this pandemic, we conduct a focused empirical analysis of user tweets about privacy. In this two-part research, our first study reveals three macro privacy issues of discussion distilled from the Twitter corpus, subsequently subdivided into 12 user privacy categories. The second study builds on the findings of the first study, focusing on the primary difficulties highlighted in the macro privacy subjects—contact tracing and digital surveillance. Using a document clustering approach, we present implications for the focal privacy topics that policymakers, agencies, and governments should consider for offering better privacy protections and help the community rebuild. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Coronavirus; COVID-19; Hierarchical clustering; Privacy; Social Media; Text mining,13,Information Systems Frontiers,2023 297,Nasr A.K.; Rashidirad M.; Yoganathan V.; Sadaghiani A.S.,CSR marketing through social media and contextual effects on stakeholder engagement: a multinational cross-industry analysis,"Multinational Enterprises (MNEs) use social media to reach a global audience. Simultaneously, Corporate Social Responsibility (CSR) has become an important feature of MNEs’ communications with stakeholders via social media. It is, therefore, important to understand the country and industry level differences in how stakeholders engage with CSR communications of MNEs via social media. We examine this across four countries and three industries by focusing on stakeholders’ engagement with CSR (vs. non-CSR) posts on Twitter. We find significant differences across industries within countries for three separate aspects of behavioural engagement (likes, retweets and replies). In addition, CSR posts have a positive effect on stakeholder engagement based on likes and retweets at the industry-within-country level. Moreover, CSR posts are not fully effective in developed countries. Hence, achieving legitimacy through CSR on social media is a complex challenge, requiring a nuanced understanding of stakeholder reactions based on specific industry and country contexts. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",Corporate social responsibility (CSR) communications; Legitimacy theory; Multilevel Generalised Structural equation Model; Multinational enterprises (MNEs); Stakeholder Engagement,13,Information Systems Frontiers,2024 298,Serman Z.E.; Sims J.,Source Credibility Theory: SME Hospitality Sector Blog Posting During the Covid-19 Pandemic,"During the recent Covid-19 pandemic SMEs in the hospitality sector had to develop new ways of increasing consumer engagement and maintaining business activity. This study examines the effect of using blogs to counter the detrimental effect of pandemic lockdowns. A survey method was deployed with 449 respondents. Analysis used SEM PLS. The findings show trustworthiness and reputation positively affects credibility, but promotional incentives and expertise do not affect credibility. The findings also suggest that unverified information sharing mediates the relationship between credibility and loyalty. Information System (IS) researchers can systematically develop approach using big data to identify false information. This research contributes to knowledge of both IS researchers and SMEs in hospitality sector. SMEs in hospitality sector can partner IS and use this research as an example of method for recovering from crisis by the adoption of blog posts, as well as working remotely with IS researchers to explore data sources and research techniques to investigate false information. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",blogs; consumers; Covid-19; financial crisis; hospitality sector; SMEs,35,Information Systems Frontiers,2023 299,Athi Karthick V.; Majumdar A.; Bose I.,Problem of Plenty? Understanding the Impact of Choice and Information Overload on Airbnb Bookings,"Online sharing platforms offer countless choices and detailed product descriptions to consumers. In this study, we demonstrate the effect of choice and information overload on booking decisions using large-scale field data from Airbnb and observe an inverse U-shaped association. Furthermore, our results show that providing quality assurance of the product exacerbates the choice and information overload relationship. As a post-hoc analysis, we perform topic modeling to gain better insights into how product information influences booking decisions. Specifically, the post-hoc analyses show that the number of topics in the description has a positive association with the number of bookings. Furthermore, topic count moderates the information overload effect by intensifying the influence of product description on the number of bookings. Our findings have important implications for online sharing platforms, service providers, and travelers as they shed light on the detrimental effects of excessive variety and information on booking decisions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Airbnb; Choice overload; Information overload; Online sharing platforms; Product quality assurance,4,Information Systems Frontiers,2025 300,Harfouche A.; Quinio B.; Saba M.; Saba P.B.,The Recursive Theory of Knowledge Augmentation: Integrating human intuition and knowledge in Artificial Intelligence to augment organizational knowledge,"Artificial intelligence (AI) has increased the ability of organizations to accumulate tacit and explicit knowledge to inform management decision-making. Despite the hype and popularity of AI, there is a noticeable scarcity of research focusing on AI's potential role in enriching and augmenting organizational knowledge. This paper develops a recursive theory of knowledge augmentation in organizations (the KAM model) based on a synthesis of extant literature and a four-year revised canonical action research project. The project aimed to design and implement a human-centric AI (called Project) to solve the lack of integration of tacit and explicit knowledge in a scientific research center (SRC). To explore the patterns of knowledge augmentation in organizations, this study extends Nonaka's SECI (socialization, externalization, combination, and internalization) model by incorporating the human-in-the-loop Informed Artificial Intelligence (IAI) approach. The proposed design offers the possibility to integrate experts' intuition and domain knowledge in AI in an explainable way. The findings show that organizational knowledge can be augmented through a recursive process enabled by the design and implementation of human-in-the-loop IAI. The study has important implications for research and practice. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Canonical action research; Dynamic Theory of Organizational Knowledge Creation; Explainable AI; Human-Centric AI; Human-in-the-loop AI; Informed Artificial Intelligence; Knowledge augmentation,51,Information Systems Frontiers,2023 301,Namakin M.; Rouhani M.; Sabzekar M.,A Multi-objective Feature Selection Method Considering the Interaction Between Features,"Feature selection (FS) is one of the major tasks in data cleansing step in machine learning. However, multi-objective FS is more challenging because it tries to optimize two conflicting objectives, namely minimizing the feature set and classification error. In this way, evolutionary algorithms are promising solutions aimed to obtain more reliable Pareto fronts. However, unfortunately they suffer from consuming much time due to exploration in a large search space. Another issue encountered in multi-objective FS approaches is related to the correlation between features. This challenge arises because choosing such features reduces the performance of the classification. To address these challenges, we introduce a multi-objective FS approach that makes several significant contributions. First, the proposed method deals with the correlation between features through a novel probability structure. Secondly, it relies on the Pareto Archived Evolution Strategy (PAES) method, which offers many advantages, including simplicity and its ability to explore the solution space at an acceptable speed. We enhance the PAES structure in a manner that promotes the intelligent generation of offsprings. Consequently, our proposed approach benefits from the introduced probability structure to generate more promising offspring. Lastly, it incorporates a novel strategy to guide the algorithm to find the optimal subset throughout the evolutionary process. The obtained results on real-world datasets reveal a substantial enhancement in the quality of the final solutions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Conditional Probabilities; Feature Interaction; Multi-objective Feature Selection; Pareto Archived Evolution Strategy,2,Information Systems Frontiers,2025 302,Loukil Z.; Mirza Q.K.A.; Sayers W.; Awan I.,A Deep Learning based Scalable and Adaptive Feature Extraction Framework for Medical Images,"Features extraction has a fundamental value in enhancing the scalability and adaptability n of medical image processing framework. The outcome of this stage has a tremendous effect on the reliability of the medical application being developed, particularly disease classification and prediction. The challenging side of features extraction frameworks, in relation to medical images, is influenced by the anatomical and morphological structure of the image which requires a powerful extraction system that highlights high- and low- level features. The complementary of both feature types reinforces the medical image content-based retrieval and allows to access visible structures as well as an in-depth understanding of related deep hidden components. Several existing techniques have been used towards extracting high- and low-level features separately, including Deep Learning based approaches. However, the fusion of these features remains a challenging task. Towards tackling the drawback caused by the lack of features combination and enhancing the reliability of features extraction methods, this paper proposes a new hybrid features extraction framework that focuses on the fusion and optimal selection of high- and low-level features. The scalability and reliability of the proposed method is achieved by the automated adjustment of the final optimal features based on real-time scenarios resulting an accurate and efficient medical images disease classification. The proposed framework has been tested on two different datasets to include BraTS and Retinal sets achieving an accuracy rate of 97% and 98.9%, respectively. © The Author(s) 2023.",Deep learning; Features extraction; High-level features; Low-level features; Optimal features fusion,15,Information Systems Frontiers,2024 303,Chumg H.-F.; Tsao W.-C.; Cooke L.; Seaton J.; Hung I.-H.,The Impact of Pluralistic Ignorance on Knowledge-Sharing Behaviour in Virtual Teams,"Since Taiwan's economy is dominated by small and medium-sized enterprises, the formation of virtual teams is even more important for Taiwanese companies due to the impact of COVID- 19. Hence, this study draws on the virtual team climate and the theory of planned behaviour (TPB). However, it also adds pluralistic ignorance (which stems from social cognitive bias arising from universal behavioural adherence to social norms) as a key inhibitor to explore factors affecting the quantity and quality of knowledge-sharing behaviour through knowledge management systems (KMS) in virtual teams. A field survey of 528 employees from 72 companies in Taiwan and working in virtual teams was analysed utilising partial least squares structural equation modelling (PLS-SEM) to evaluate the outcomes empirically. The findings show that the virtual team climate, perceived behavioural control, and subjective norm still positively affect knowledge-sharing behaviour. However, more surprisingly, the moderating effect of pluralistic ignorance dampens the positive relationships between (1) the intention to share knowledge and knowledge-sharing behaviour and (2) the virtual team climate and knowledge-sharing behaviour within virtual teams. Finally, in addition to the practical implications for managers of knowledge-intensive companies who are keen to adopt virtual teams, this study provides several theoretical and managerial implications for relevant managers and academic researchers. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Knowledge-sharing behaviour; Partial least squares structural equation modelling (PLS-SEM); Pluralistic ignorance; Theory of Planned Behaviour (TPB); Virtual team climate; Virtual teams,0,Information Systems Frontiers,2025 304,Abedini A.; Abedin B.; Zowghi D.,"A Framework of Environmental, Personal, and Behavioral Factors of Adult Learning in Online Communities of Practice","Adult learning is a complex phenomenon that takes place over an adult’s lifetime and is not limited to a particular age. It includes a set of activities to enhance life through improving skills, knowledge and capabilities. The foundational theories of adult learning, such as andragogy theory, place the individual adult centre stage and differentiate adult learning from formal learning. They also shift the focus from the individuals to the environment in which adult learning takes place. In line with this movement, online communities of practice (OCOPs) have evolved from being considered as online environments for learning to specialised forums that allow practitioners to collaborate around a project of mutual interest. The principles of adult learning are directly applicable to engagement in OCOPs because they include practical methods founded on the belief that adults are self-directed, autonomous learners and that learning is most effective when the environment plays the role of a facilitator, rather than being just a supportive and traditional setting for learning. However, how individual adults engage in OCOPs and benefit from them is not well understood. This paper draws on social cognitive theory to examine: how environmental, personal and behavioural factors shape engagement in OCOPs. To answer this question, twenty-one interviews were conducted with members of GitHub, a large online community of practice for IT professionals. The findings revealed that adults’ engagement in OCOPs involves project-based activities on mutual interests and willingness to help others. The findings also show that engaging in online communities does not only satisfy intrinsic, well-defined, expected outcomes and shape adults’ engagement, but also has an impact on adults’ lifelong learning achievements, such as professional experience and credit recognition. Based on these findings, a revised framework for adults’ engagement in OCOPs is presented and discussed. © The Author(s) 2023.",Adult learning; Adults’ engagement in online communities of practice; Online communities of practice; Social cognitive theory,11,Information Systems Frontiers,2024 305,Salam A.F.; Dai H.; Wang L.,"Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment","Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Attribution theory; Coping theory; Identity theft; Protect motivation theory; Quadratic effect; Sense of urgency,3,Information Systems Frontiers,2022 306,Jozani M.; Williams J.A.; Aleroud A.; Bhagat S.,Emotional and Informational Dynamics in Question-Response Pairs in Online Health Communities: A Multimodal Deep Learning Approach,"Online health communities (OHCs) offer emotional and informational support to their users. However, past research has primarily treated these supports as separate, but they coexist in messages, making it essential to consider the emotional valence of text to understand the support being provided. This study examines how aligning questions and responses in OHCs reduces information gaps, and enhances support quality and perceived helpfulness. We use a labeled data set of question-response pairs to develop multimodal machine learning models to predict support interactions. Using explainable AI, we reveal the emotions within support exchanges, underscoring how emotional valence in the text determines informational support in OHCs and provide insight into the interaction between emotional and informational support. This study refines social support theory and establishes a foundation for decision aids and emotion-sensitive AI systems to deliver personalized social support tailored to users’ informational and emotional needs. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Emotional valence; Explainable AI; Informational support; Multimodal machine learning; Online health community; Social support theory,3,Information Systems Frontiers,2025 307,Berger S.; van Dun C.; Häckel B.,IT Availability Risks in Smart Factory Networks – Analyzing the Effects of IT Threats on Production Processes Using Petri Nets,"In manufacturing, concepts like the Internet of Things or Cyber-physical Systems accelerate the development from traditional production facilities towards smart factories. Thereby, emerging digital technologies increasingly connect information networks with production processes, forming complex smart factory networks (SFNs). Due to their reliance on information flows and the high degree of cross-linking, SFNs are, in particular, vulnerable to IT availability risks caused by attacks and errors. Against this backdrop, we present a modelling approach for analyzing the effects of IT threats on production processes. Based on Petri Nets, we provide modular SFN components for modelling SFN architectures and for simulating stochastic attack and error propagation. With this, we support the analysis and comparison of different SFN architectures regarding spreading effects, availability of information and production components, and associated effects on productivity. Our approach enables and serves as a foundation for decision support on SFN layouts from a risk perspective and the derivation of IT security mitigation measures in both research and practice. We evaluate our artefact by implementing and applying a software prototype in artificial and real-life settings. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",Attack propagation; Information network; IT availability risks; Petri nets; Production network; Smart factory network,7,Information Systems Frontiers,2024 308,Jha A.; Saha D.,Exploring Pure 4G Diffusion in India and its Connect with Human Development and Urbanization,"Although many countries have already forayed into 5G deployment, 4G still comprises the largest share of mobile subscribers, especially in emerging economies such as India. In this paper, we quantitatively assess the diffusion characteristics of ‘pure’ 4G mobile communication in India using popular nonlinear diffusion models, and scrutinize the association of two external factors, namely Human Development and Urbanization, with formal and informal communication channels of diffusion, in the context of 4G. Our findings highlight the crucial role external factors play in the speed and pattern of 4G diffusion across India. Notably, the 4G diffusion is predominantly driven by informal communication channels, such as word of mouth and interpersonal signalling. Typically, in regions with lower levels of Human Development and Urbanization, the informal communication channels have a greater influence on the diffusion. However, as the levels of Human Development and Urbanization go up, the formal communication channels start gathering momentum. Thus, our preliminary study sheds light on how Human Development and Urbanization interact with formal and informal communication channels to shape the diffusion of 4G in emerging economies. Our findings could furnish valuable perspectives for policymakers and stakeholders toward refining their strategies concerning infrastructure deployment, socio-economic development, and regulatory interventions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",4G; Diffusion; Human Development; India; Telecom; Urbanization,3,Information Systems Frontiers,2025 309,Lu B.; Ta L.; Dai H.; Xu X.; Yan W.; Zhang Z.,Unfreezing the Freelancers: Investigating the Strategy of Digital Platform-Based Instant Messaging Communication in Increasing Freelancers’ Response in Gig Economy,"With the rapid development of information technology, the gig labor marketplace is fast growing, with digital platform-based instant messaging (IM) playing an important role in raising freelancers’ orders, serving the intention for the crowdsourcing platforms to increase capacity to balance supply and demand. Using a large-scale field experiment on a crowdsourcing freight platform, this study investigates the impact of IM on freelancers’ response rate of orders. Our findings suggest the effects of IM depend on its content and information richness level. Task-relevant information in IM increases the freelancers’ response rate, especially for the priority commitment information, compared with order price information. In addition, although adding task-irrelevant information in IM decreases the freelancers’ response rate, it does not mean the less task-irrelevant information results in a weaker negative IM effect. Rather than that, including task-irrelevant information with a medium information richness level in IM harms the freelancers’ response to the most significant extent. Moreover, our findings reveal crowdsourcing platforms’ actions of IM to increase freelancers’ response rate are consistent with the actions to improve the order acceptance rate, thus demonstrating the critical role of increasing freelancers’ response rate in raising their interest in the final acceptance of the order serving. Our findings guide crowdsourcing platforms to design effective digital platform-based IMs to communicate with freelancers to arouse their response and interest in serving the orders. The capacity of crowdsourcing platforms thus can be dynamically adjusted and expanded to benefit their profitability. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.","Field experiment; Freelancers’ response, gig labor marketplace; Instant messaging communication",0,Information Systems Frontiers,2025 310,Jha A.K.; Verma N.K.,Social Media Platforms and User Engagement: A Multi-Platform Study on One-way Firm Sustainability Communication,"There have been multiple research studies in recent days that have analyzed the growing role of social media in firms’ communication strategy as well as the role of social media in shaping a firm’s reputation. However, most of these studies focus on one of the multiple social media platforms that firms use. In this study, we argue that there are nuances in firms’ social media communication strategies depending on the platforms. Given the rising importance of sustainability, we focus on firms’ sustainability-related communication. We analyze the impact of firms’ one-way sustainability communication over Twitter and Facebook on the respective platforms’ user engagement. The engagement has been computed as likes and shares (likes and retweets) over the firm generated one-way sustainability communication-related posts. Using a panel dataset of a 3-year period for S&P 500 firms having active social media profiles on both platforms, we demonstrate the difference in the firms’ sustainability communication on the two platforms. We also find evidence that users on both platforms have different preferences, such as messaging from firms. Using a differential metric in our analysis helps us counter the firm-level fixed effects. We find evidence suggesting that firms would do well by having different strategies for different platforms. Firms would benefit by focusing on sustainability relevant and bite-sized content on Twitter, but more positive and engaging content on Facebook. © 2023, The Author(s).",Facebook; Sentiment analysis; Social media; Sustainability; Twitter; User engagement,38,Information Systems Frontiers,2024 311,Khan W.N.; Lee J.K.; Liu S.,Is Cybersecurity a Social Responsibility?,"Cybersecurity incidents damage not only the organizations attacked, but also society in general, harming customers and stakeholders. Through the text mining of the incident database, we observed that the impact of cybersecurity incident trends became more outward-oriented causing increased risks associated with social responsibility. Thus, this study aims to validate the potential effect of cybersecurity incidents on social responsibility risks and stock price drops. To derive meaningful factors from the description of incidents, we mined the texts to extract the features of the severity of incidents and their direction of impact whether inward or outward. The severity score is derived from sentiment analysis and the impact direction by topic modeling and machine learning models including SVM, LSTM, and BERT. The effects of these incident features are studied through regression models with social responsibility risk and stock price drops as dependent variables. To conduct this study, we collected incident texts from the Privacy Rights Clearinghouse database, and social responsibility risk indices from the Privacy and Data Security index and Cyber Risk Rating scores. The subsequent short-term stock price drops are measured by Cumulative Abnormal Returns and their variations. Our analysis revealed a profound impact of cybersecurity incidents on social responsibility risk indices and stock price drops with the moderating effect of outward impact in both models. However, we recognize the incompatibility between an annual index of social responsibility risk and short-term stock price drops. Therefore, we propose a short-term social responsibility risk index for cybersecurity which can be derived from the disclosed incidents. All these scenarios support the premise that cybersecurity incidents significantly impact the social responsibility risk and may lead to potential stock price drops. © The Author(s) 2025.",Cybersecurity; Outward incidents; Sentiment analysis; Severity; Social responsibility; Stock price drops,2,Information Systems Frontiers,2025 312,Karimi M.; Dimitrov S.,To Subsidize Or Not to Subsidize: A Comparison of Market Scoring Rules and Continuous Double Auctions for Price Discovery,"We investigate which of the two most common prediction market mechanisms – market scoring rules and continuous double auctions – leads to better price discovery. The relative contribution of a particular prediction market to price discovery also depends on the total number of trades observed in that market. We use real-world prediction market price data to estimate price discovery shares of each market and their relationship to the number of trades. We find that when the number of trades is low, prediction markets that use market scoring rules have a higher speed of incorporating information into prices. When the number of trade is high, however, the continuous double auctions have a higher price discovery share. As market scoring rules require a variable cost – a subsidy – to operate, and continuous double auctions are costless; our results provide important implications for the design of prediction markets. By combining the methods for measuring price discovery and information aggregation, we introduce a new data-driven approach that can be used by researchers and practitioners to gain further insight into the exact values of the number of trades favoring the use of market scoring rules instead of continuous double auctions or vice versa. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Continuous double auction; Data driven decision making; Market scoring rule; Prediction market; Price discovery; Subsidy,0,Information Systems Frontiers,2024 313,Mukhopadhyay S.; Chauhan S.; Paul M.; Bhattacharyya S.; Upadhyay P.; Sinha S.K.,Why do few Organizations Succeed while Others Fail? Impact of Organizational Capabilities and Barriers on Digital Government Transformation,"Government and public sector organizations focus on inclusiveness, transparency, security, and effectiveness. However, amid the ongoing deregulation and competition with private sectors, there are compulsions to leverage digital technologies for improving economic performance and customer satisfaction. In the above context, little is known about the role played by organizational capabilities in technology-led transformation of government. We employ SEM technique to validate our conceptual model that investigates the role of organizational capabilities on the degree of digitalization in the government organization and data for the same was collected from 196 government officials with relevant experience. The study found that effective digital strategy formulation increases employee digital capabilities and positively impacts digitalization in government. Vendor management capability is observed to mediate the relationship between digital strategy and digitalization in government while employee digital capability has an indirect impact through vendor management. Cultural and organizational barriers do not dampen the relationship between vendor management and digitalization in government. Our results integrate the dynamic capability framework with developments in digital transformation and technology sourcing literature. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Digital government transformation; Digital strategy; Employee digital capabilities; India,1,Information Systems Frontiers,2025 314,Al Braiki A.; Al Hashemi H.A.; Denson R.; de Sylva S.; Fikry E.M.; Goyal R.; Lakinska B.; Yaraghi N.,Beyond Borders: Evaluating the Impact of Health Information Exchange on Resource Utilization in the United Arab Emirates – A Longitudinal Study,"The body of knowledge on the benefits of Health Information Exchange (HIE) services primarily consists of studies that are conducted on HIEs in the US. The important legal and economic differences between the US market and the rest of the world, significantly reduce the generalizability of the current insights on HIEs. In this research we intend to examine if the HIE adoption and usage would lead to substantial changes in resource utilization in settings outside of the US, hence improving the generalizability and external validity of the literature on HIE effectiveness. We conducted a longitudinal study of all medical providers in Abu Dhabi, United Arab Emirates between January 2019, and May 2022. Using HIE system log data, and insurance claims data we implemented Difference-in-Differences models to estimate the impact of HIE adoption reducing utilization of laboratory and pathology, and radiology imaging services as well as surgery procedures at both individual clinician and hospital levels. We further implemented panel data regression models to estimate the gradual increase in the benefits of HIE for users. On average, at the hospital level, adoption of HIE services has resulted in 24.7% reduction in pathology and laboratory orders, and 11.2% reduction in radiology imaging. At the clinician level, on average, HIE adoption leads to 7.8% reduction in pathology and laboratory orders, and 5.6% reduction in surgery procedures. These reductions are relative to the predicted increase in outcomes which would have occurred had the HIE not been implemented. We also show that the benefits of HIE happens gradually over time and as users gain more experience with the HIE, they observe better results. While our findings are consistent with the prior literature and show that HIE adoption significantly reduces the utilization of medical services, we uncover that the magnitude of these savings are different from those in the US. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Cost benefit analysis; Health information exchange; Resource utilization,2,Information Systems Frontiers,2025 315,Chan J.; Peko G.; Sundaram D.; Sadovykh V.,Application and Adoption of Emerging Technologies: From AI to Metaverse,[No abstract available],,4,Information Systems Frontiers,2025 316,Song X.; Wang B.; Lin P.-C.; Ge G.; Yuan R.; Watada J.,Scenario-Based Distributionally Robust Unit Commitment Optimization Involving Cooperative Interaction with Robots,"With the increasing penetration of renewable energy, uncertainty has become the main challenge of power systems operation. Fortunately, system operators could deal with the uncertainty by adopting stochastic optimization (SO), robust optimization (RO) and distributionally robust optimization (DRO). However, choosing a good decision takes much experience, which can be difficult when system operators are inexperienced or there are staff shortages. In this paper, a decision-making approach containing robotic assistance is proposed. First, advanced clustering and reduction methods are used to obtain the scenarios of renewable generation, thus constructing a scenario-based ambiguity set of distributionally robust unit commitment (DR-UC). Second, a DR-UC model is built according to the above time-series ambiguity set, which is solved by a hybrid algorithm containing improved particle swarm optimization (IPSO) and mathematical solver. Third, the above model and solution algorithm are imported into robots that assist in decision making. Finally, the validity of this research is demonstrated by a series of experiments on two IEEE test systems. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Distributionally robust unit commitment; Hybrid solution algorithm; Renewable generation; Robotic assistance; Scenario-based ambiguity set,3,Information Systems Frontiers,2024 317,Ameen N.; Madichie N.O.; Anand A.,Between Handholding and Hand-held Devices: Marketing Through Smartphone Innovation and Women’s Entrepreneurship in Post Conflict Economies in Times of Crisis,"There is a wide gender gap in developing countries due to a range of cultural, economic and political barriers. This is even more accentuated in post conflict economies in times of crisis. Smartphones and mobile applications can help to narrow this gap. The economic and non-economic challenges facing women entrepreneurs and the role of smartphone innovation in overcoming these challenges and developing strong marketing strategies were investigated. We drew on the 5 M model to investigate how mobile applications can support women entrepreneurs. We conducted thirty interviews with women entrepreneurs in Iraq. The findings show that mobile applications provided these entrepreneurs with innovative ways to overcome many of the challenges they face in relation to running a business. The research provides theoretical contributions by developing an integrated, multilevel analytical model on women in entrepreneurship based on extending the 5 M model with new technology-related elements. Practical, policy and managerial implications are discussed. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",5 M model; Innovation; Mobile marketing; Smartphone; Women entrepreneurs; Women’s empowerment,17,Information Systems Frontiers,2023 318,Loh X.-K.; Lee V.-H.; Loh X.-M.; Tan G.W.-H.; Ooi K.-B.; Dwivedi Y.K.,The Dark Side of Mobile Learning via Social Media: How Bad Can It Get?,"As the COVID-19 pandemic continues to spread at an unprecedented rate, many universities around the world halted physical forms of teaching and learning to stop the spread of the virus. As a result, many university students were forced to utilize online learning through channels such as mobile social media. Due to the novelty of this situation, there are many unknowns particularly with the negative influences of mobile learning via social media on university students. Thus, this study looks to examine this subject matter from the perspective of the stimulus–organism–response theory. The uniquely developed research model included four stimuli (i.e., social overload, information overload, life invasion, and privacy invasion), two organisms (i.e., technostress and exhaustion) as well as a response in terms of reduced intention to use mobile learning via social media. The responses were collected from 384 university students via an online survey and analyzed with the Partial-Least-Square-Structural-Equation-Modelling. It was found that the antecedents for both technostress and exhaustion were able to account for more than half of their respective variances. Furthermore, technostress and exhaustion were significant facilitators of the students’ reduced intention to use mobile learning via social media. In addition to the practical insights for stakeholders in the education industry, this study also posited several theoretical implications for researchers. © 2021, The Author(s).",COVID-19; Distance learning; Exhaustion; Higher education; Mobile learning; Online learning; Social media; Stimulus–organism–response; Technostress,67,Information Systems Frontiers,2022 319,Behera R.K.; Bala P.K.; Rana N.P.; Kizgin H.,A Techno-Business Platform to Improve Customer Experience Following the Brand Crisis Recovery: A B2B Perspective,"A platform is a business model that allows business-to-business (B2B) participants to connect, interacts, create and exchange value. B2B exploits social media for brand building and branding is vulnerable to attacks, which leads to a brand crisis. B2B should characterise such crisis and respond proportionally to avert damage to social listening (SL). To diminish damages, the solution is to measure customer experience (CX), especially in a crisis situation. The study proposes an analytics-enabled customer experience (AeCX) platform for emotion detection in social media and measures CX after recovering from such crisis, by exploring recovery time objective (RTO), recovery point objective (RPO), techno-business features (TBF), SL and perceived risk (PR). A quantitative research methodology is used on primary data collected from 302 B2B participants. The study reveals improvement in CX and the results provide evidence that social media channels and the TBF of AeCX have become important. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",B2B; Customer experience; Post brand crisis; Social media; Techno-business platform,20,Information Systems Frontiers,2022 320,Dwivedi Y.K.; Kshetri N.; Hughes L.; Rana N.P.; Baabdullah A.M.; Kar A.K.; Koohang A.; Ribeiro-Navarrete S.; Belei N.; Balakrishnan J.; Basu S.; Behl A.; Davies G.H.; Dutot V.; Dwivedi R.; Evans L.; Felix R.; Foster-Fletcher R.; Giannakis M.; Gupta A.; Hinsch C.; Jain A.; Jane Patel N.; Jung T.; Juneja S.; Kamran Q.; Mohamed AB S.; Pandey N.; Papagiannidis S.; Raman R.; Rauschnabel P.A.; Tak P.; Taylor A.; tom Dieck M.C.; Viglia G.; Wang Y.; Yan M.,Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse,"The Metaverse has the potential to form the next pervasive computing archetype that can transform many aspects of work and life at a societal level. Despite the many forecasted benefits from the metaverse, its negative outcomes have remained relatively unexplored with the majority of views grounded on logical thoughts derived from prior data points linked with similar technologies, somewhat lacking academic and expert perspective. This study responds to the dark side perspectives through informed and multifaceted narratives provided by invited leading academics and experts from diverse disciplinary backgrounds. The metaverse dark side perspectives covered include: technological and consumer vulnerability, privacy, and diminished reality, human–computer interface, identity theft, invasive advertising, misinformation, propaganda, phishing, financial crimes, terrorist activities, abuse, pornography, social inclusion, mental health, sexual harassment and metaverse-triggered unintended consequences. The paper concludes with a synthesis of common themes, formulating propositions, and presenting implications for practice and policy. © 2023, The Author(s).",Dark side of the metaverse; Metaverse; Negative consequences; Second life; Unintended consequences; Virtual reality; Virtual world,166,Information Systems Frontiers,2023 321,Nam K.; Dutt C.S.; Baker J.,Authenticity in Objects and Activities: Determinants of Satisfaction with Virtual Reality Experiences of Heritage and Non-Heritage Tourism Sites,"Virtual Reality (VR) is becoming an increasingly important technology in a host of industries, including tourism. VR can provide virtual experiences before, during, or in lieu of real-world visits to tourism sites. Hence, providing authentic experiences is essential to satisfy guests with the site and technology. This study analyzes survey data using PLS to identify the determinants of satisfaction with non-immersive VR experiences of heritage and non-heritage tourism sites. Results from 193 subjects reveal the linkages between system quality, object-related authenticity, activity-related authenticity, and presence, as well their relationship with satisfaction. © 2022, The Author(s).",Authenticity; Heritage; Non-heritage; Presence; Satisfaction; System quality; Tourism; Virtual reality (VR),71,Information Systems Frontiers,2023 322,Zhu H.; Xiao Y.; Chen D.; Wu J.,A Robust Rating Aggregation Method based on Rater Group Trustworthiness for Collusive Disturbance,"Rating can be obligatory for many tasks, such as film recommendation, hotel rating, and product evaluation. Aggregating ratings given by numerous raters is a necessary and effective way to obtain comprehensive evaluation of the objects. While the awareness of potential distortion for some of the targeted objects, has attracted substantial attention of researchers and motivated the designing of the robust rating aggregation method to overcome the impact of disturbance from ignorant/malicious raters in practice. In this paper, we focus on rating aggregation with collusive disturbance, which is hard to be eliminated and invalidate traditional rating aggregation methods. Therefore, we will introduce the idea of detecting collusive group into rating aggregation to develop a new method, called robust rating aggregation method based on rater group trustworthiness (RGT), which obtains four main modules: Graph Mapping, Rater Group Detection, Group Trustworthiness Calculating, and Rating Aggregation. Experimental results and analyses demonstrate that our method is more robust to collusive disturbance than other traditional methods. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Collusive Disturbance; Group Trustworthiness; Rating aggregation; Robustness,0,Information Systems Frontiers,2025 323,Jain S.; Mukhopadhyay A.,Vulnerability Assessment and Risk Management Using Text Mining and Deep Learning Approach,"Vulnerabilities in digital systems present an ever-evolving threat landscape of cyber risk, leading to unauthorized access, execution of arbitrary code, denial of service, and disclosure of sensitive information. Our study proposes text mining and deep learning-based Vulnerability Assessment and Risk Management (VARM) model to assess, quantify, and mitigate the cyber risk perpetuated by vulnerabilities. Drawing from the Protection Motivation Theory and the Cyber Kill Chain, the first module, Vulnerability Risk Assessment, evaluates the risk of cyber-attacks. This module utilizes the LDA topic modeling technique to discern which aspects of the Confidentiality-Integrity-Availability/Authenticity (CIA) security triad are compromised by exploiting different characteristics of vulnerabilities. Simultaneously, the module employs co-occurrence network analysis to comprehend the presence of correlated cyber risks. By integrating and providing this information to the Long Short-Term Memory, a recurrent neural network architecture, the module categorizes cyber risk into three types of cyber-attacks: Distributed Denial of Service, Malware, and other cyber-attacks. The second module, Vulnerability Risk Quantification, quantifies the cyber risk emanating from vulnerabilities in terms of estimated losses. Finally, guided by the Rational Choice Theory and NIST-driven vulnerability management processes, the Vulnerability Risk Mitigation module recommends a comprehensive risk mitigation strategy commensurate with the risk and severity of cyber-attacks. Any residual risk can then be transferred to cyber insurers. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Correlated cyber risk; Latent Dirichlet Allocation (LDA); Long Short-Term Memory (LSTM); Topic modelling; Vulnerability assessment and risk management,1,Information Systems Frontiers,2025 324,Sindhwani R.; Behl A.; Singh R.; Kumari S.,Can Industry 5.0 Develop a Resilient Supply Chain? An Integrated Decision-Making Approach by Analyzing I5.0 CSFs,"Advances in science and technology act as the gatekeepers of a sustainable future where a stable environment helps generate the power for innovation. Supply chains are the messengers of this euphoric future. However, when the messengers and the gatekeepers are not in sync, the flow of information is bound to stop and bring about a chaotic turn of events, the repercussions of which can be felt through the years. The same was the case with the COVID-19 pandemic, where the lack of man–machine collaboration in Industry 4.0 and the inability of firms to advance their supply chains technologically left them exposed and vulnerable to the disruptions created by the pandemic. It was an eye-opener for companies worldwide as the supply chains collapsed and production reached a standstill. Thus, a stance arises to re-evaluate the resilience capabilities of the supply chains and rethink the priorities for achieving sustainable and resilient supply chain practices. We also suggest injecting industry 5.0 technologies to meet the re-assessed priorities. For this, we have identified the criteria and CSFs of supply chain resilience using the PRISMA 2020 statement and subsequently analyzed them using PF-AHP (for finding criteria weights), m-TISM (to interpret the interrelationships of the CSFs), PF-CoCoSo (to rank the CSFs) and sensitivity analysis (to check the robustness). The results suggest cost-effectiveness as the top weighted criteria and disruption awareness as the highest priority CSF for achieving supply chain resilience. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Critical success factors; Industry 5.0; m-TISM; PF-AHP; PF-CoCoSo; Sensitivity analysis; Supply chain resilience,22,Information Systems Frontiers,2024 325,Yin Q.; Guo C.; He C.; Yan Z.,Effect of New Bundled Services on Doctors’ Online Social and Economic Returns: Evidence from an Online Health Community,"To attract more patients and improve the quality of health services, online health communities (OHCs) have launched a bundling feature that provides patients with a package of two or more existing health services for a discounted price. Existing bundling research has mostly focused on traditional industries, whereas bundled services in the field of professional health and their effects are usually neglected. Therefore, this study investigates the effects of bundling strategy on doctors’ online returns in OHCs. We focus on the effects of the launch of bundled services on separate components (doctors’ economic return) and online reputation (social return) and study the moderating effects of doctors’ characteristics on these returns. Based on analyses using a difference-in-difference model, we find that the launch of bundled services can positively affect doctors’ online reputation and part of separate components. A doctor’s tenure also moderates the effects of bundled services on doctors’ returns. Our study provides several theoretical implications for researchers and practical contributions for OHCs administrators. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Bundled Services; Economic Return; Online Health Communities (OHCs); Social Return,11,Information Systems Frontiers,2023 326,Safi R.; Browne G.J.,Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects,"Detecting and responding to information security threats quickly and effectively is becoming increasingly crucial as modern attackers continue to engineer their attacks to operate covertly to maintain long-term access to victims’ systems after the initial penetration. We conducted an experiment to investigate various aspects of decision makers’ behavior in monitoring for threats in systems that potentially have been compromised by intrusions. In checking for threats, decision makers showed a recency effect: they deviated from optimal monitoring behavior by altering their checking pattern in response to recent random incidents. Decision makers’ monitoring behavior was also adversely affected when there was an increase in security, exhibiting a risk compensating behavior through which heightened security leads to debilitated security behaviors. Although the magnitude of the risk compensating behavior was significant, it was not enough to fully offset the benefits from added security. We discuss implications for theory and practice of information security. © 2022, Springer Science+Business Media, LLC, part of Springer Nature.",Incident detection and response; Information security; Post-compromise stage; Recency effect; Risk compensating behavior,8,Information Systems Frontiers,2023 327,Apicella A.; Arpaia P.; Barbato S.; D’Errico G.; Mastrati G.; Moccaldi N.; Vallefuoco E.; Wriessnegger S.C.,Domain Adaptation for Fear of Heights Classification in a VR Environment Based on EEG and ECG,"Three levels of fear of heights were detected in subjects with different severities of acrophobia, based on the electroencephalographic (EEG) and electrocardiographic (ECG) signals. The study aims to demonstrate the feasibility of a data-fusion-based method for real-time assessment of the fear of heights intensity to integrate into adaptive Virtual Reality Exposure Therapy for acrophobia. The generalization performance of classification tasks on fear states is improved by exploiting both trait-based clustering and Domain Adaptation methods. Participants were gradually exposed to increasing height levels through a Virtual Reality (VR) scenario representing a canyon. The initial severity of fear of heights, the level of distress at each height, and the anxiety level before and after the exposure were assessed through the Acrophobia Questionnaire, the Subjective Unit of Distress, and the State and Trait Anxiety Inventory, respectively. The Simulator Sickness Questionnaire was administered to exclude possible motion sickness interference in the experiment. The EEG and ECG signals were acquired through a 32-channel headset and 1 Lead ECG derivation during the exposure to the eliciting VR scenario. Four classifiers (i.e. Support Vector Machines, Deep Neural Networks, Random Forests, and k-Nearest Neighbors) were adopted in the experimental environment. Preliminary tests were performed in a within-subject experiment, achieving the best classification accuracy of 87.1%±7.8% with a Deep Neural Network. As the cross-subject approach is concerned, three strategies, namely Domain Adaptation (DA), data fusion (combining EEG with ECG), and participant clustering (based on the acrophobia severity), were evaluated. DA resulted in the most effective strategies by determining an improvement of more than 20 % in classification accuracy. Random Forest performed the best classification accuracy for the severe acrophobia cluster with a mean of 63.6% and a standard deviation of 13.4% over three classes by exploiting Stratified Normalization. © The Author(s) 2024.",domain adaptation; Electroencephalography (EEG); fear of heights; Virtual Reality (VR),4,Information Systems Frontiers,2025 328,Singh M.P.; Sural S.; Vaidya J.; Atluri V.,A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis,"Over the past few years, several efforts have been made to enable specification and enforcement of flexible and dynamic access control policies using traditional access control (such as role based access control (RBAC), etc.) and attribute based access control (ABAC). Recently, a unified framework, named MPBAC (meta-policy based access control), has been developed to enable specification and enforcement of heterogeneous access control policies such as ABAC, RBAC and a combination of policies (such as ABAC and RBAC). However, one significant limitation is that no complete administrative model has been developed for heterogeneous access control policies. In this article, we present a complete role-based administrative model (named as RAMHAC) for managing heterogeneous access control policies. We also introduce a novel methodology for analyzing heterogeneous access control policies in the presence of RAMHAC by modeling the policies through Datalog facts and using the μ z tool. The administrative model includes a wide range of administrative relations, commands, pre-constraints and post-constraints. A comprehensive experimental evaluation demonstrates the scalability of the proposed approach. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",ABAC; Administrative model; Fixed-point analysis; MPBAC; RBAC; Security analysis,5,Information Systems Frontiers,2024 329,Shah C.S.; Krishnan S.,"ICT, Gender Inequality, and Income Inequality: A Panel Data Analysis Across Countries","ICT has been long recognized as a driver of sustainable development goals (SDGs). This study examines the relationship between ICT, gender (in)equality (SDG 5), and income inequality (SDG 10). We conceptualize ICT as an institutional actor and use the Capabilities Approach to theorize the relationships between ICT, gender inequality and income inequality. This study uses publicly available archival data to conduct a cross-lagged panel analysis of 86 countries from 2013 to 2016. The key contributions of the study include the establishment of the relationship between (a) ICT and gender inequality and (b) gender inequality and income inequality. We also make methodological contributions to the field by employing cross-lagged panel data analysis to further our understanding of the links between ICT, gender equality, and income inequality over time. Our findings have implications for both research and practice, which are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Gender inequality; ICT; Income inequality; Panel data,27,Information Systems Frontiers,2024 330,Joubert A.; Murawski M.; Bick M.,Measuring the Big Data Readiness of Developing Countries – Index Development and its Application to Africa,"The use of big data promises to drive economic growth and development and can therefore be a value-adding factor, but compared to private or public organisations, the country level is rarely investigated, and that is even more evident for developing countries. Another topic hardly ever considered in the big data research field is ‘big data readiness’, which means the level of preparation and willingness to exploit big data. We address these shortcomings in the literature and focus on the big data readiness of developing countries. Thus, the first research question is: what components are required for an index measuring big data readiness, and how can such an index be designed? We use a design science approach to develop the “Big Data Readiness Index” (BDRI), which is then applied to all African countries to answer our second research question: how do African countries perform in terms of the BDRI? Our analysis yields country rankings that show relatively high BDRI scores for coastal countries, such as South Africa, Kenya and Namibia, and for islands, such as Mauritius. Related implications for both research and policy are discussed. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Africa; Big data readiness index; Design science research; Developing countries,34,Information Systems Frontiers,2023 331,Liu R.; Kumar A.; Lee J.,Multi-level Team Assignment in Social Business Processes: An Algorithm and Simulation Study,"Business Process Management (BPM) systems usually neglect the human and social aspects (or team effects) involved in business process execution. Our work fills a large gap in literature by addressing multi-level teams that arise in business processes where teams are formed at both the task and process levels. In this paper, we develop a methodology called BPMTeams based on social network analysis for building an execution model for a social BPM. This model is used to make resource assignments to form dynamic teams that perform various team-based activities in a process. We further develop various resource assignment strategies and evaluate them using parameters estimated from a real data set in the IT incident management domain to understand how team effects play out in social business processes. The overall team effect in a process is analyzed at two levels: as a task team effect where the synergistic role of a team in a specific task is realized; and a process team effect that arises from inter-team synergies across the individual task teams in a process. The results offer some balanced insights for the interplay of these effects by highlighting the benefits and disadvantages of teams selected by a purely data-driven approach. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Data-driven approach; Incident resolution; Process team effect; Resource assignment; Social BPM; Social business process; Social network metrics; Socio-technical network; Task team effect,5,Information Systems Frontiers,2022 332,Shahi G.K.; Basyurt A.S.; Stieglitz S.; Neuberger C.,"Agenda Formation and Prediction of Voting Tendencies for European Parliament Election using Textual, Social and Network Features","As per agenda-setting theory, political agenda is concerned with the government’s agenda, including politicians and political parties. Political actors utilize various channels to set their political agenda, including social media platforms such as Twitter (now X). Political agenda-setting can be influenced by anonymous user-generated content following the Bright Internet. This is why speech acts, experts, users with affiliations and parties through annotated Tweets were analyzed in this study. In doing so, the agenda formation during the 2019 European Parliament Election in Germany based on the agenda-setting theory as our theoretical framework, was analyzed. A prediction model was trained to predict users’ voting tendencies based on three feature categories: social, network, and text. By combining features from all categories logistical regression leads to the best predictions matching the election results. The contribution to theory is an approach to identify agenda formation based on our novel variables. For practice, a novel approach is presented to forecast the winner of events. © The Author(s) 2024.",2019 European parliament election; Agenda-setting theory; Political agenda; Social media analytics; User’s voting prediction,1,Information Systems Frontiers,2025 333,Bawack R.E.; Bonhoure E.,Influencer is the New Recommender: insights for Theorising Social Recommender Systems,"Designing theory-driven social recommender systems (SRSs) has been a significant research challenge for over a decade. This study aims to identify behavioural factors that could improve the persuasiveness and quality of recommendations made by SRSs. Given both research streams’ striking similarity, it uses the recent yet rich research on social media influencers (SMI) to inform SRS research. Drawing on 72 publications, we classified 52 independent variables into 12 categories regrouped into three broad categories that characterise the relationships between the consumer and the (i) recommender system, (ii) product or brand, and (iii) and advert. The metanalysis results determined the relative importance of each category in predicting purchase intentions, placing recommender credibility and attitude towards the recommended product or brand at the top of the charts. Our findings are expected to facilitate more refined theory-building efforts and theory-driven designs in SRS research and practice. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",e-commerce; Metanalysis; Review; Social commerce; Social media influencer; Social recommender system,14,Information Systems Frontiers,2023 334,Merhi M.I.,An Assessment of the Barriers Impacting Responsible Artificial Intelligence,"Responsible Artificial Intelligence (AI) has recently gained a lot of attention, especially in the last few years. Scholars have conducted systematic literature reviews to gain more knowledge about responsible AI. However, no study has collected and evaluated the most significant barriers to responsible AI. We filled this gap in the literature by identifying eleven barriers and categorized them, using the Technology-Organization-Environment framework, into three categories. We collected data from seven experts and used the analytical hierarchy process to evaluate the importance of the barriers. The results indicated that technology, as a category, is the most important. The findings also recommended that data quality is the most vital among all eleven barriers. We offered eleven propositions as a theoretical contribution for future researchers in terms of conceptual development. We discussed the implications of the findings for research and practice. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Analytical hierarchy process; Artificial intelligence; Data quality; Ethics; Responsible AI,43,Information Systems Frontiers,2023 335,Borisov M.; Kolycheva V.; Semenov A.; Grigoriev D.,How Does the Color Palette Affect the Pricing of Abstract Paintings?,"The valuation of artwork is a fundamental issue in cultural economics. This study examines the impact of visual elements on a painting’s price. Several characteristics are evaluated such as its intricacy, points of interest, segmentation-based features, and local color features. The study also employs theories by Itten and Kandinsky, and applies mixed-effects models to assess how these characteristics impact the painting’s price. The influence of color is examined in the context of abstractionism, a highly complex art style, where the selection of color is crucial. Itten’s theory, the most acclaimed color theory in the art world, is used as a basis for this analysis since it has spawned various sub-theories and is the basis for teaching artists. A unique dataset of 3,885 paintings from Christie’s and Sotheby’s is used, and it is found that Itten’s color harmony has a low predicting power, color complexity metrics are inconsequential, and color diversity is a better predictor of the price of abstract art. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Abstractionism; Color theory; Itten’s color wheel; Mixed-effects; Paintings; Pricing,1,Information Systems Frontiers,2025 336,Hsiao L.-S.; Tsai K.-L.; Liu J.-C.; Leu F.-Y.; Lu Y.-S.; Lin I.-L.,Security among UPFs belonging to Different 5G/B5G/6G Networks,"Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF1 of a 5G, e.g., 5G1, to P’s destinations, e.g., the set {UPF2, UPF3, …UPFn}, respectively, in {5G2, 5G3, …5Gn}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC1 in 5G1 encrypts P and then sends P’s ciphertext which will be decrypted by edge computers {EC2, EC3, …ECn} where ECj is in 5Gj, 2≤j≤n. Our security scenarios include data transmission among n-parties, n≥ 2. When n= 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As n> 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",5G/B5G/6G; Edge Computer; Initial Key Agreement; n-party Cryptography; Symmetric/Asymmetric Cryptography,2,Information Systems Frontiers,2024 337,Papagiannidis E.; Enholm I.M.; Dremel C.; Mikalef P.; Krogstie J.,Toward AI Governance: Identifying Best Practices and Potential Barriers and Outcomes,"In recent years artificial intelligence (AI) has been seen as a technology with tremendous potential for enabling companies to gain an operational and competitive advantage. However, despite the use of AI, businesses continue to face challenges and are unable to immediately realize performance gains. Furthermore, firms need to introduce robust AI systems and mitigate AI risks, which emphasizes the importance of creating suitable AI governance practices. This study, explores how AI governance is applied to promote the development of robust AI applications that do not introduce negative effects, based on a comparative case analysis of three firms in the energy sector. The study illustrates which practices are placed to produce knowledge that assists with decision making while at the same time overcoming barriers with recommended actions leading to desired outcomes. The study contributes by exploring the main dimensions relevant to AI’s governance in organizations and by uncovering the practices that underpin them. © 2022, The Author(s).",AI challenges and outcomes; AI data governance; AI governance; Competitive advantage; Performance gains,107,Information Systems Frontiers,2023 338,Attili V.S.P.; Mathew S.K.; Sugumaran V.,Information Privacy Assimilation in IT Organizations,"Information privacy concerns have been rising over a few decades. As per the recent General Data Protection Regulation, organizations need to implement the highest-possible privacy settings by design and default. Following the neo-institutional theory, this study develops a model for understanding the mechanism of information privacy assimilation in Information Technology (IT) organizations. This study treats information privacy as a distinct dimension separate from security. After analyzing a sample survey data of 214 respondents from the IT industry, privacy capability and organizational culture emerged as influencing factors with a statistically significant influence on information privacy assimilation. The findings from this study support the mediating role of senior management participation between the external coercive forces and privacy-related business strategy. Business strategy also plays a mediating role between coercive/normative forces and privacy-related activities within an organization. Here the mimetic forces show a direct influence on privacy-related activities. A positive moderating effect of organizational culture on normative forces and privacy-related activities relationship; and a negative moderating effect of privacy capability on mimetic forces and privacy-related activities relationship are observed. These findings could enable senior managers to respond to institutional pressures by focusing on appropriate factors within an organization for developing effective privacy strategies and actions. This work is an extension of the pilot work that was published in Communications of the Association for Information Systems (CAIS), 2018. The prior work focuses on developing the propositions qualitatively. Building on that, we have formally defined the hypotheses, developed the appropriate survey instrument and collected the primary data which is large enough to do adequate analysis. Adopted a quantitative approach using an extensive sample survey of IT organizations, followed a more rigorous process for data collection, analysis, and discussion of the results. In addition, based on the lessons learned from the pilot study, we have updated the research model and hypotheses with a focus on privacy-related business strategy and activities. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Information privacy; Neo-institutional theory; Organizational culture; Privacy assimilation in organizations; Privacy capability; Senior management; Strategy,9,Information Systems Frontiers,2022 339,Chen Y.; Jensen S.; Albert L.J.; Gupta S.; Lee T.,Artificial Intelligence (AI) Student Assistants in the Classroom: Designing Chatbots to Support Student Success,"In higher education, low teacher-student ratios can make it difficult for students to receive immediate and interactive help. Chatbots, increasingly used in various scenarios such as customer service, work productivity, and healthcare, might be one way of helping instructors better meet student needs. However, few empirical studies in the field of Information Systems (IS) have investigated pedagogical chatbot efficacy in higher education and fewer still discuss their potential challenges and drawbacks. In this research we address this gap in the IS literature by exploring the opportunities, challenges, efficacy, and ethical concerns of using chatbots as pedagogical tools in business education. In this two study project, we conducted a chatbot-guided interview with 215 undergraduate students to understand student attitudes regarding the potential benefits and challenges of using chatbots as intelligent student assistants. Our findings revealed the potential for chatbots to help students learn basic content in a responsive, interactive, and confidential way. Findings also provided insights into student learning needs which we then used to design and develop a new, experimental chatbot assistant to teach basic AI concepts to 195 students. Results of this second study suggest chatbots can be engaging and responsive conversational learning tools for teaching basic concepts and for providing educational resources. Herein, we provide the results of both studies and discuss possible promising opportunities and ethical implications of using chatbots to support inclusive learning. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Chatbots; Conversational agents; Higher education; Inclusive learning,477,Information Systems Frontiers,2023 340,Mandal S.; Kar A.K.; Gupta S.; Sivarajah U.,Achieving Food Supply Chain Resilience During Natural Disasters Through Industry 5.0 Enablers—Empirical Insights Based on an FsQCA Approach,"The purpose of this research is to establish the necessary and sufficient conditions for food safety and security during pandemic outbreaks, focusing on the case of COVID-19 to ensure resilience of the food supply chain. The study emphasises on the complexity theory of fuzzy set Qualitative Comparative Analysis (fsQCA), to establish a result-driven definition of Industry 5.0 (I5.0) during and post pandemics. The results of this study revealed that a combination of conditions derived from pandemic policy related reforms and I5.0 enablers will assist manufacturers and suppliers in establishing food safety and security during and post the COVID-19 era in a developing economy. Food safety and security being the goal, based on a survey of 140 food companies, this study provides insights to manufacturers and policymakers to enable selective implementation of I5.0 enabling technologies and pandemic policies. © 2023, The Author(s).",Blockchain; Disaster Management; FsQCA; Industry 5.0; Supply Chain Resilience,23,Information Systems Frontiers,2023 341,Margherita E.G.; Braccini A.M.,Industry 4.0 Technologies in Flexible Manufacturing for Sustainable Organizational Value: Reflections from a Multiple Case Study of Italian Manufacturers,"In this study, we analyse the value creation of Industry 4.0 (I40) technologies in flexible manufacturing (FM) under a sustainability perspective. I40 is a popular strategy that Western manufacturing organizations adopt to face competition from low-cost producers. Organizations adopting I40 use advanced digital technologies to make production processes more flexible and increasingly automated. Several pieces of evidence confirm how I40 leads to higher productivity and higher-quality products, improving the economic performance of organizations. However, increasing automation may also lead to the reduction of human labour in the production process, which may contribute to the disappearance of jobs, the reduction of expertise and the loss of know-how in manufacturing organizations. While the literature acknowledges the technical and economic advantages of I40, the sustainability of the value created through these technologies deserves further investigation. To address the gap, we complement the IT value theory with the concept of sustainability, including the three dimensions of economic, environmental and social sustainability. We perform a multiple case study analysis of four Italian manufacturing organizations that have successfully implemented I40 technologies in FM. The cases show that I40 technologies support sustainable organizational value when they are deployed with a worker-centric approach. In this condition, the organization leverages workforce activities to continuously fine-tune the technologies and to exploit the adaptive features of the technologies to continuously improve processes. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.","Flexible manufacturing; Industry 4.0; IT value; Multiple case study, technology adoption; Social sustainability; Sustainability; Sustainable value; Triple bottom line",104,Information Systems Frontiers,2023 342,Han L.; Hou H.; Bi Z.M.; Yang J.; Zheng X.,Functional Requirements and Supply Chain Digitalization in Industry 4.0,"Industry 4.0 aims to automate traditional manufacturing and industrial practices with the aids of recently developed information technologies such as cyber-physical systems, Internet of things, big data analytics, and cloud computing. Implementation of industry 4.0 in manufacturing leads to the digitization of all manufacturing businesses including computer aided design and manufacturing, enterprise resource planning, and supply chain management (SCM). This paper focuses on the challenges and solutions in digitizing supply chains in dynamic, distributed, and decentralized business environments. The complexity and dynamics of supply chains in industry 4.0 are discussed, the performance of a supply chain is evaluated from the perspectives of costs and quality of services, and supply chain management is formulated as an optimization problem for higher requirements of quality of services, efficiency, and timeliness. The challenges of developing digitization solutions to data acquisition, data fusion, and data-driven decision-making supports are discussed in detail. The potential solutions to these challenges are proposed and the impacts on supply chain management are assessed using the data from in a list of automotive manufacturers in China. It has been found the proposed solutions will make positive and significant impact on the digitation of supply chains. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Data acquisition; Data fusion; Data-driven decision-making supports; Industrial information integration engineering; Industry 4.0; Quality of services (QoS); Supply chain digitization; Supply chain management,32,Information Systems Frontiers,2024 343,Kumar R.; Mukherjee S.; Rana N.P.,Exploring Latent Characteristics of Fake Reviews and Their Intermediary Role in Persuading Buying Decisions,"Online reviews play a significant role in shaping consumer purchase decisions. Accordingly, emergence of fake reviews has proliferated as an instrument to manipulate customers’ buying preferences. Such manifestation, however, lacks theoretical grounding and remains under researched due to two notable challenges: first, absence of conceptual underpinnings between consumers’ writing style and recommendation behavior. Second, little knowledge about the role of product characteristics underlying fake reviews and their influence on nudging product preferences. Through the lens of environmental psychology, this study uses an empirical investigation utilizing natural language processing (NLP) to uncover latent product-specific features underlying customer reviews and their impact on persuading buying preferences. As a major finding, we observe that characteristics underlying fake reviews, as opposed to genuine ones, fail to influence product recommendation or discouragement. Accordingly, we suggest firms permitting fake reviews on their portals to be aware of the limited economic advantages of such practices. © The Author(s) 2023.",E-commerce; Online reviews; Product discouragement; Product recommendation; Purchase decisions; Review manipulation; Text mining,16,Information Systems Frontiers,2024 344,Andrzejewski W.; Boinski P.,Maximal Mixed-Drove Co-occurrence Patterns,"One of the interesting types of spatio-temporal patterns is the Mixed-Drove Co-occurrence Pattern (MDCOP), which represents types of objects frequently located together in both space and time. To discover such patterns, methods based on the well-known Apriori strategy are widely used. They involve determining multi-element MDCOPs by building them up iteratively starting with the two-element patterns and then successively adding another element in each iteration. This approach can be very costly, particularly when the data is dense enough to form patterns of significant size. In this paper, we introduce a definition of a new pattern type called a Maximal Mixed-Drove Co-occurrence Pattern. We also propose a new algorithm MAXMDCOP-Miner, which resigns from popular Apriori strategy of generating candidates and, therefore, can discover long pattern without processing all their subsets. Experiments performed on synthetic and real datasets show that MAXMDCOP-Miner has high performance, in particular for dense datasets or tasks with low user-defined thresholds of spatial or time prevalence. © 2022, The Author(s).",Co-location patterns; MDCOPs; Spatial data mining; Spatio-temporal data,1,Information Systems Frontiers,2023 345,Haug A.; Staskiewicz A.M.; Hvam L.,Strategies for Master Data Management: A Case Study of an International Hearing Healthcare Company,"Data quality (DQ) issues consume a significant part of many companies’ administrative and operational costs. To reduce such costs, companies often engage in master data management (MDM) initiatives to improve their DQ. MDM is, however, not a silver bullet that solves all data quality issues, but typically there are trade-offs between different data management strategies. Such trade-offs have not received much attention in the academic literature, and conceptualizations of the strategies for implementing MDM are sparse. Thus, with the aim of conceptualizing MDM strategies and understanding their consequences, this paper conducts a longitudinal case study at a large international hearing healthcare company in which an MDM initiative was implemented. The analysis identifies consequences of centralized and decentralized MDM approaches, on which basis four distinct strategies for data management are defined. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Centralization-decentralization; Data governance; Data management; Data quality; Master data management,6,Information Systems Frontiers,2023 346,Yeh T.; Sun C.,Enhancing the Reliability of Cloud Data through Identifying Data Inconsistency between Cloud Systems,"The technologies of cloud and Internet of Things (IoT) have been extensively applied to many areas in our lives. The large amount of data collected from cloud applications and IoT devices is often maintained and processed by cloud systems. It is imperative to ensure the reliability of data stored on cloud systems when hardware failure occurs. The Apache Hadoop is one of the most popular cloud systems in academia and industry. To deal with hardware failure, its default file system, Hadoop Distributed File System (HDFS), keeps multiple duplicates of every data block it stores. Nevertheless, in the case of a total loss of a cloud, preserving multiple copies of data blocks still cannot assure their reliability. Hadoop provides a tool, distcp (distributed copy), to copy data from cloud to cloud to address this issue. Practically, data inconsistency caused by human mistakes or accidents may exist between data duplicated across clouds, which could significantly reduce the data reliability. Unfortunately, Hadoop does not provide efficient ways to locate discrepancies of duplicated data between clouds. Without data reliability, all corresponding data processing and decision making could be greatly affected. Therefore, it is crucial to detect the inconsistency between duplicated data stored on different clouds to uphold the data reliability. We designed and implemented a new scheme in Hadoop to efficiently identify data inconsistency between clouds. As a result, the reliability of data kept on clouds could be greatly enhanced. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Cloud Computing; Data Reliability; Hadoop; HDFS,1,Information Systems Frontiers,2024 347,Gittens C.L.,Remote HRI: a Methodology for Maintaining COVID-19 Physical Distancing and Human Interaction Requirements in HRI Studies,"Observing how humans and robots interact is an integral part of understanding how they can effectively coexist. This ability to undertake these observations was taken for granted before the COVID-19 pandemic restricted the possibilities of performing HRI study-based interactions. We explore the problem of how HRI research can occur in a setting where physical separation is the most reliable way of preventing disease transmission. We present the results of an exploratory experiment that suggests Remote-HRI (R-HRI) studies may be a viable alternative to traditional face-to-face HRI studies. An R-HRI study minimizes or eliminates in-person interaction between the experimenter and the participant and implements a new protocol for interacting with the robot to minimize physical contact. Our results showed that participants interacting with the robot remotely experienced a higher cognitive workload, which may be due to minor cultural and technical factors. Importantly, however, we also found that whether participants interacted with the robot in-person (but socially distanced) or remotely over a network, their experience, perception of, and attitude towards the robot were unaffected. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19 pandemic; HRI; Remote interaction; Remote-HRI; Social robots,20,Information Systems Frontiers,2024 348,Engert M.; Evers J.; Hein A.; Krcmar H.,The Engagement of Complementors and the Role of Platform Boundary Resources in e-Commerce Platform Ecosystems,"The success of digital platforms can be attributed to the engagement of autonomous complementors as exemplified by e-commerce Content Management System (CMS) platforms such as WordPress and Shopify. Platform owners provide Platform Boundary Resources (PBRs) to stimulate and control complementor engagement. Despite the increasing scholarly interest in digital platform ecosystems, their exact role in facilitating and channeling complementor engagement remains unclear. Therefore, we conducted an embedded case study on CMS platform ecosystems, comprising a total of 24 interviews with platform owners and complementors. We inductively derive five types of complementor engagement and their respective manifestations and two overarching engagement goals of complementors. Moreover, we determine the different types of PBRs utilized, including their critical effects, and distinguish between uniform and individual PBRs reflecting their respective generalizability and scalability. We discuss the findings by introducing the concepts of complementor resourcing and complementor securing and shed light on the standardization-individualization tension of PBRs faced by platform owners. © 2021, The Author(s).",Case study; Complementor engagement; Content management systems; Digital platform ecosystems; e-Commerce; Platform boundary resources,53,Information Systems Frontiers,2022 349,Koniakou V.,From the “rush to ethics” to the “race for governance” in Artificial Intelligence,"This paper engages with the emerging field of Artificial Intelligence (AI) governance wishing to contribute to the relevant literature from three angles grounded in international human rights law, Law and Technology, Science and Technology Studies (STS) and theories of technology. Focusing on the shift from ethics to governance, it offers a bird-eye overview of the developments in AI governance, focusing on the comparison between ethical principles and binding rules for the governance of AI, and critically reviewing the latest regulatory developments. Secondly, focusing on the role of human rights, it takes the argument that human rights offer a more robust and effective framework a step further, arguing for the necessity to extend human rights obligations to also directly apply to private actors in the context of AI governance. Finally, it offers insights for AI governance borrowing from the Internet Governance history and the broader technology governance field. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",AI Ethics; AI governance; Algorithms; Artificial Intelligence (AI); Human Rights; Internet Governance (IG); Science and Technology Studies (STS),45,Information Systems Frontiers,2023 350,Benramdane M.K.; Kornyshova E.; Bouzefrane S.; Maupas H.,Supervised Machine Learning for Matchmaking in Digital Business Ecosystems and Platforms,"In the digital era, organizations belonging to the same or different market segments come together in digital platforms that allow them to exchange. These organizations are unified within a Digital Business Ecosystem. However, the rapid growth of the number of these organizations accentuates the complexity of finding economic partners, customers, suppliers, or other organizations that can share economic interests. In our research, we propose a recommendation system that is implemented on such a digital platform, and which is based on matchmaking and hybrid supervised machine learning algorithms. In this paper, we provide a detailed analysis of the functioning of this system, the challenge encountered when processing the data which made it possible to highlight the similarities between the organizations that can be associated. Thus, we seek to improve the understanding and analysis of the data for the identification of partners in an optimal way. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Digital business ecosystem; Digital platform; Matchmaking; Recommender system; Supervised machine learning,4,Information Systems Frontiers,2024 351,El-Masri M.; Al-Yafi K.; Kamal M.M.,A Task-Technology-Identity Fit Model of Smartwatch Utilisation and User Satisfaction: A Hybrid SEM-Neural Network Approach,"Smartwatches are wearable devices intended to be smartphone companions that capture health data and ease access to notifications. They have also become personalisable standing as a fashion statement. This combination resulted in staggering adoption rates recently leading to question whether smartwatch users’ choice and use satisfaction emerge from utility features or from its fashion characteristics. This paper proposes and validates a fit theory to investigate the antecedents of adopters’ satisfaction. Besides evaluating fit with identity, the model assesses both perceived and actual task-technology fit of smartwatches. A questionnaire-based quantitative approach is used to collect data from about 300 smartwatch users in Qatar. To test the proposed model, data is analysed using structural equation modeling (SEM) and artificial neural networks (ANN). Furthermore, ANN sensitivity analysis ranks the importance of the fit factors affecting users’ choice during pre- and post-adoption stages. Both task-technology and technology-identity fit factors are quasi-equally important in explaining 62% of satisfaction variance. ANN analysis revealed that post-adoption satisfaction is primarily attributed to smartwatches’ ability to fit with users’ identity and secondarily to its perceived fit with tasks. Nevertheless, pre-adoption choice of smartwatches is mainly guided by their functionality. This paper is the first to propose and validate an integrated task-technology-identity fit model to explain smartwatch utilization and users’ satisfaction. The originality also lies in assessing actual task-technology fit and as perceived by users. Employing two modes of analysis revealed extra insights too. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Satisfaction; Smartwatch; Task-Technology Fit; Technology-identity fit; Utilisation,30,Information Systems Frontiers,2023 352,Gupta P.; Hooda A.; Jeyaraj A.; Seddon J.J.M.; Dwivedi Y.K.,"Trust, Risk, Privacy and Security in e-Government Use: Insights from a MASEM Analysis","Despite considerable research on the factors influencing the use of e-government, citizens are apprehensive of e-government services due to the concerns primarily related to trust, risk, security and privacy. This study presents a meta-analytic structural equation modeling (MASEM) analysis of the findings reported by 68 prior empirical studies on e-government adoption. Specifically, the model examined the direct effects of trust in government, trust in internet, perceived risk, and perceived privacy and security on e-government trust, and its impact on users’ behavioral intention to use e-government. The findings bear significant theoretical and practical implications. © The Author(s) 2024.",E-government Trust; Perceived Privacy and Security; Perceived risk; Trust in Government; Trust in Internet,23,Information Systems Frontiers,2025 353,Sewak M.; Sahay S.K.; Rathore H.,Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection,"The cybersecurity threat landscape has lately become overly complex. Threat actors leverage weaknesses in the network and endpoint security in a very coordinated manner to perpetuate sophisticated attacks that could bring down the entire network and many critical hosts in the network. To defend against such attacks, cybersecurity solutions are upgrading from the traditional to advanced deep and machine learning defense mechanisms for threat detection and protection. The application of these techniques has been reviewed well in the scientific literature. Deep Reinforcement Learning has shown great promise in developing AI solutions for areas that had earlier required advanced human cognizance. Different techniques and algorithms under deep reinforcement learning have shown great promise in applications ranging from games to industrial processes, where it is claimed to augment systems with general AI capabilities. These algorithms have recently also been used in cybersecurity, especially in threat detection and protection, where these are showing state-of-the-art results. Unlike supervised machine learning and deep learning, deep reinforcement learning is used in more diverse ways and is empowering many innovative applications in the threat defense landscape. However, there does not exist any comprehensive review of deep reinforcement learning applications in advanced cybersecurity threat detection and protection. Therefore, in this paper, we intend to fill this gap and provide a comprehensive review of the different applications of deep reinforcement learning in this field. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",5G jamming; Advanced threat protection; Deep reinforcement learning; Endpoint detection; IoT defense; Network IDS,92,Information Systems Frontiers,2023 354,Horita F.; Baptista J.; de Albuquerque J.P.,Exploring the use of IoT Data for Heightened Situational Awareness in Centralised Monitoring Control Rooms,"This paper traces the expansion of a network of IoT sensors to improve the effectiveness of a centralised control room in Brazil in anticipating natural hazards. This centralised model relies on using IoT data by highly qualified experts replacing previous smaller local structures. We draw on the notion of Situational Awareness to carry out the study. Results show that although the operators were not always familiar with the characteristics of locations, the use of IoT data heightened their situational awareness in the centralised control room by improving perception and comprehension. However, they still relied on local knowledge and learned experiences to support projection and anticipation of risks. The study highlights that although data analytics systems are capable of expanding operators’ perception of local elements, they must be complemented by local richer forms of information, needed to anticipate risks and make critical decisions with major impact on local population. © 2020, The Author(s).",Advanced ICT; Centralised monitoring control room; Digital transformation; Disaster risk monitoring; IoT big data; Situation awareness,13,Information Systems Frontiers,2023 355,Parameswaran S.; Mukherjee P.; Valecha R.,I Like My Anonymity: An Empirical Investigation of the Effect of Multidimensional Review Text and Role Anonymity on Helpfulness of Employer Reviews,"Employer review sites have grown popular over the last few years, with 86 percent of job seekers referring to reviews on these sites before applying to job positions. Though the antecedents of review helpfulness have been studied in various contexts, it has received limited attention in the employee review context. These sites provide review text in multiple dimensions, such as pros and cons. Besides, to solicit unbiased reviews, these sites allow an option of keeping reviewer information anonymous. Rooted in the diagnosticity perspective, we investigate review helpfulness focusing on the role of review text in multiple dimensions and the anonymity of the reviewers. We use a publicly available Glassdoor dataset to model review helpfulness using a Tobit regression. The results show that the review length in multiple dimensions of review text and anonymity positively impact review helpfulness. Moreover, anonymity positively moderates the review length in the cons section. As a post-hoc analysis, we perform topic modeling to gain better insights on the review text in multiple dimensions and anonymity. The post-hoc analyses show that non-anonymous reviewers discuss firm reputation in the pros section, which anonymous reviewers do not. In the cons section, non-anonymous reviewers discuss politics, unfair and unethical treatment, and prospects of the employer, while anonymous reviewers discuss incompetency of the leadership. This research has important practical implications for online review sites’ design and crafting guidelines and policies for employees writing reviews. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Anonymity; Electronic word of mouth; Helpfulness; Multidimensional review text; Online employer reviews; Topic models,8,Information Systems Frontiers,2023 356,Memarian S.; Malgonde O.S.; Kim D.J.,Unraveling the Privacy Paradox: a Comprehensive Review of Factors Behind the Discrepancy in Online Concerns and Disclosure Behavior,"Privacy Paradox is a phenomenon where individuals' online behavior regarding personal information disclosure is inconsistent with their expressed privacy concerns. In the digital era, the pervasive collection of personal data by digital marketing and e-commerce platforms leaves individuals vulnerable to privacy loss. The Privacy Calculus theory suggests that individuals opt for disclosure when perceived benefits outweigh the risks. However, the Privacy Paradox highlights discrepancies in concerns and actions. This study aims to analyze previous studies to address three research questions: What are the trends and most common contexts explored in prior studies? What relevant factors were examined in previous research concerning the factors influencing users' paradoxical behavior? Based on the analysis of paradoxical behavior, what valuable insights can be gleaned for future investigations? By reviewing and synthesizing 51 previous studies on the privacy paradox, this paper offers a comprehensive understanding of issues relevant to the Privacy Paradox, considering cognitive and psychological factors, technological aspects, and sociocultural influences, with the goal of informing future investigations and elucidating this complex behavior. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Artificial intelligence; Online privacy concerns; Personal information disclosure; Privacy calculus theory; Privacy paradox,0,Information Systems Frontiers,2025 357,Zhang J.; Wang Z.; Zhao W.; Yan Z.,The Impact of AI News on Default Risk of Chinese Listed Companies: Forecasting Based on Deep Learning,"This study explores the added impact of news reports about listed companies’ application of and focus on artificial intelligence (AI) on corporate default risk prediction under a deep learning framework. We designed a corporate default risk forecasting model for listed companies using four indicator groups: solvency and profitability, operational efficiency and growth, external macroeconomic conditions, and AI-related news. The predictive effectiveness of these indicator groups was evaluated using the Diebold-Mariano (DM) test. The results showed that deep learning overall outperformed convolutional neural networks (CNNs) and linear regression models, while matching random forest and XGBoost models. Solvency and profitability contributed the most to the improvement in predictive performance, followed by operational efficiency and growth, while AI news and external macroeconomic conditions were relatively weaker. Furthermore, the study finds that incorporating AI-related news into the model as incremental information significantly reduces prediction errors, even when all traditional financial and macroeconomic variables are included. This research demonstrates that AI-related news texts can provide a critical dynamic supplement to default risk prediction, confirming the potential value of AI news to corporate credit risk forecasting. It also offers a new theoretical perspective and a technical pathway for improving predictive model development and credit risk management practices. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",AI news; Deep learning; Default risk; Listed companies,0,Information Systems Frontiers,2025 358,Tang Z.; Shah M.; Jamal A.,Exploring the Process of Technology Socialization (TS) in the Family: ICT Adoption for Middle-aged Parents with the Influence of Adult Children,"Family is an important socialization environment for adopting information and communication technologies (ICTs). However, while existing information systems research focuses on individual factors that influence digital inequity, it tends to ignore the influence of relational/collective factors on individuals’ ICT adoption. Drawing on technology adoption, socialization, and social identity theories, this study focuses on the process of technology socialization of ICT adoption for middle-aged parents with the influence of their adult children in Chinese families. Through in-depth interviews with thematic analysis, we identify three mechanisms in the family, including creating a family shared environment, negotiating a family ICT identity and interplay, and generating digital differentiation. These findings contribute to a technology socialization framework, addressing how individuals can become digitally savvy with the influence of the socialization agents in the family. The findings have implications for ICT firms and policy makers to promote the family shared environment as a vehicle for achieving social wellbeing and digital upskilling of middle-aged adults. © The Author(s) 2023.",Digital differentiation; Digital divide; Family ICT identity; Family shared environment; IS/ICT adoption; Technology socialization,11,Information Systems Frontiers,2024 359,Xie H.; Checco A.; Zamani E.D.,The Unintended Consequences of Automated Scripts in Crowdwork Platforms: A Simulation Study in MTurk,"Crowdworkers on platforms like Amazon Mechanical Turk face growing competition as a result of the global excess supply of digital labour. As a result, many crowdworkers turn to automated scripts, which help them locate better tasks faster and to boost their earnings. However, to date, it is not clear whether and to what extent the use of such scripts influence the opportunities for those crowdworkers who do not use them. This an important aspect that warrants further exploration because it can have negative implications for the health of crowdwork platforms. In this study, we use Discrete Event Simulation to identify and quantify the unintended consequences of the excessive use of automated scripts. Our findings show that, while the use of scripts allows some crowdworkers to identify and accept far more tasks than others, in the long run, this behaviour results in their competence persistence and reputational persistence and progressively to detrimental impacts for those workers who do not use scripts, and who may ultimately be forced to exit the platform. As a result, automated scripts have negative consequences, whereby their excessive use leads to a tragedy of the commons for all platform stakeholders, including the crowdworkers, the job requesters and the platform itself. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Crowdwork; platforms; Discrete event simulation; HIT catching script; Matthew effect; Microtask; Unintended consequences,1,Information Systems Frontiers,2024 360,Boroomandi A.; Sedighi M.,Competing in the Digital Economy: The Influence of Information Visibility on Corporate Entrepreneurship,"With the development of new technologies in the digital age, the value of information has become clear. Organizations that can effectively access and use information are better able to spot opportunities and encourage innovation. This study explores how information visibility influences corporate entrepreneurship (CE), drawing on the entrepreneurial alertness (EA) model. Adopting a descriptive-correlational design and a quantitative methodology, data were collected through a structured questionnaire from 165 corporate employees and analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). The findings reveal that enhanced information visibility, particularly in terms of accessibility and approval, significantly boosts employees’ entrepreneurial alertness, which in turn fosters greater engagement in CE activities. These findings highlight the pivotal influence of digital platforms and transparent communication mechanisms in fostering entrepreneurial orientation and enabling strategic renewal across organizational contexts. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Corporate entrepreneurship; Entrepreneurship alertness; Information system; Information visibility,0,Information Systems Frontiers,2025 361,Trocin C.; Mikalef P.; Papamitsiou Z.; Conboy K.,Responsible AI for Digital Health: a Synthesis and a Research Agenda,"Responsible AI is concerned with the design, implementation and use of ethical, transparent, and accountable AI technology in order to reduce biases, promote fairness, equality, and to help facilitate interpretability and explainability of outcomes, which are particularly pertinent in a healthcare context. However, the extant literature on health AI reveals significant issues regarding each of the areas of responsible AI, posing moral and ethical consequences. This is particularly concerning in a health context where lives are at stake and where there are significant sensitivities that are not as pertinent in other domains outside of health. This calls for a comprehensive analysis of health AI using responsible AI concepts as a structural lens. A systematic literature review supported our data collection and sampling procedure, the corresponding analysis, and extraction of research themes helped us provide an evidence-based foundation. We contribute with a systematic description and explanation of the intellectual structure of Responsible AI in digital health and develop an agenda for future research. © 2021, The Author(s).",Artificial intelligence; Ethical concerns; Healthcare; Meta-data analysis; Responsible AI; Systematic literature review,134,Information Systems Frontiers,2023 362,Riar M.; Weber M.; Ebert J.; Morschheuser B.,Can Gamification Foster Trust-Building in Human-Robot Collaboration? An Experiment in Virtual Reality,"With the increasing deployment of robots to support humans in various activities, a crucial factor that has surfaced as a precondition for successful human-robot interaction (HRI) is the human’s level of trust in the robotic companion. A phenomenon that has recently shifted into the foreground for its potential to influence cognitive and affective dimensions in humans is gamification. However, there is a dearth of knowledge whether and how gamification can be employed to effectively cultivate trust in HRI. The present study investigates and compares the effects of three design interventions (i.e., non-gamified vs. gameful design vs. playful design) on cognitive and affective trust between humans and an autonomous mobile collaborative robot (cobot) in a virtual reality (VR) training experiment. The results reveal that affective trust and specific trust antecedents (i.e., a robot’s likability and perceived intelligence) are most significantly developed via playful design, revealing the importance of incorporating playful elements into a robot’s appearance, demeanor, and interaction to establish an emotional connection and trust in HRI. © The Author(s) 2025.",Cobot; Collaboration; Gamification; Human-robot interaction; Trust; Virtual reality,5,Information Systems Frontiers,2025 363,Kisekka V.; Goel S.,An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies,"Diligent compliance with Information security Policies (ISP) can effectively deter threats but can also adversely impact organizational productivity, impeding organizational task completion during extreme events. This paper examines employees’ job performance during extreme events. We use the conservation of resources (COR) theory to examine how psychological resources (individual resilience, job meaningfulness, self-efficacy) and organizational resources (incident command leadership, information availability, and perceived effectiveness of security and privacy controls) influence ISP compliance decisions and job performance during extreme events. The results show that a one-size-fits-all approach to ISP is not ideal during extreme events; ISP can distract employees from critical job tasks. We also observed that under certain conditions, psychological resources, such as individual resilience, are reserved for job performance, while others, such as self-efficacy, are reserved for ISP compliance. A post hoc analysis of data from respondents who experienced strain during a real extreme event while at work was conducted. Our discussion provides recommendations on how security and privacy policies can be designed to reflect disaster conditions by relaxing some policy provisions. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.","Extreme events; Job performance, Security policy compliance; Security behavior",9,Information Systems Frontiers,2023 364,Moqbel M.; Hewitt B.; Nah F.F.-H.; McLean R.M.,Sustaining Patient Portal Continuous Use Intention and Enhancing Deep Structure Usage: Cognitive Dissonance Effects of Health Professional Encouragement and Security Concerns,"Sustaining patient portal use is a major problem for many healthcare organizations and providers. If this problem can be successfully addressed, it could have a positive impact on various stakeholders. Through the lens of cognitive dissonance theory, this study investigates the role of health professional encouragement as well as patients’ security concerns in influencing continuous use intention and deep structure usage among users of a patient portal. The analysis of data collected from 177 patients at a major medical center in the Midwestern region of the United States shows that health professional encouragement helps increase the continuous use intention and deep structure usage of the patient portal, while security concerns impede them. Interestingly, health professional encouragement not only has a direct positive influence on continuous use intention and deep structure usage but also lowers the negative impact of security concerns on them. The research model explains a substantial variance in continuous use intention (i.e., 40%) and deep structure usage (i.e., 32%). The paper provides theoretical implications as well as practical implications to healthcare managers and providers to improve patient portal deep structure usage and sustained use for user retention. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Consumer health IT; Continuous use; Deep structure usage; Health professional encouragement; Patient portal; Security concerns,13,Information Systems Frontiers,2022 365,Kurumathur S.K.; Bhatt P.; Valecha R.; Hariharan G.; Rao H.R.,Examination of Polarization in Social Media in Aggressor-Oriented and Victim-Oriented Discourse Following Vigilantism,"In the year 2020, two real-world vigilantism incidents invited nationwide discourses on social media: the fatal shooting of two men by Kyle Rittenhouse (an aggressor) and the murder of Ahmaud Arbery (a victim). The public engaged vigorously in social media discussions of approval or disapproval of the aggressor or victim in such vigilantism incidents. While diversity of opinions is a healthy driver of advancement, extreme polarization can be a powerful barrier to achieving societal progress and human flourishing. In this paper, we first examine public opinion regarding these vigilantism incidents. We identify various issues expressed in social media conversations and find that compared to victim-oriented discourse, aggressor-oriented discourse on vigilantism displays more opinion polarization. The discourses show that aggressor-oriented vigilantism discussions largely support vigilantism, self-defense, and the right to bear arms. On the other hand, victim-oriented discourses largely disapprove of vigilantism incidents. We also find that positive emotions in discourses are more polarized compared to negative emotions. Our work has practical implications concerning polarization on social media after devastating events. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Machine Learning; Polarization; Sentiment Analysis; Social media; Topic Modeling,1,Information Systems Frontiers,2025 366,French A.M.; Shim J.P.,"From Artificial Intelligence to Augmented Intelligence: A Shift in Perspective, Application, and Conceptualization of AI","This paper provides a comprehensive examination of the ongoing debate surrounding Artificial Intelligence (AI) and its societal implications, with a particular focus on job displacement. The release of generative AI tools for public use, particularly ChatGPT, has created numerous concerns on how these tools will be used and adverse impacts on society. Augmented Intelligence has been introduced as a concept utilizing AI to enhance human capabilities but its distinction as an assistive role is ill-defined. This research provides insights into the reconceptualization of AI as Augmented Intelligence examining their differences in terms of knowledge development, decision-making, and outcomes. Through three case studies, we demonstrate the assistive role of Augmented Intelligence and how it can serve as a catalyst for job creation and cognitive enhancement. We also explore the impact of AI and IA tools as a sociotechnical system and their effect on human cognitive abilities through the theoretical lens of the Dunning Kruger Effect. We conclude with a research agenda to stimulate future directions of research. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial intelligence (AI); ChatGPT; Dunning kruger effect; Generative AI; Intelligence augmentation (IA); Machine learning,5,Information Systems Frontiers,2025 367,Chen C.-H.S.; Liu G.; Roushan G.; Nguyen B.,Exploring Information Technology Capabilities from Multiple Aspects of the Resource-Based Theory,"This study elucidates the nature of information technology (IT) capabilities by developing an integrated framework that expounds upon the hierarchy inherent within IT capabilities. This research uses qualitative interviews with 64 IT professionals grounded in the resource-based theory to delineate three layers of IT capabilities. At the foundational level, IT capabilities reflect firms’ IT-related assets, encompassing IT infrastructure, informational, and enabled assets that are valuable, rare, and inimitable. Higher up, firms’ IT capabilities manifest through competence in organising these IT-related assets effectively. Operational IT competence is instrumental in mobilising and deploying each IT-related asset, while dynamic IT capabilities represent firms’ capacity to reconfigure and assimilate various operational IT competencies. This research contributes to the field by providing an integrative theoretical understanding of how IT capabilities are formed. The proposed model addresses fragmentation in the existing literature, facilitating the development of more cohesive, evidence-based strategies for generating business value from IT. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.","Dynamic capabilities; Information technology capabilities; IT infrastructure; IT investment, Organisational capabilities; Resource-based theory",7,Information Systems Frontiers,2025 368,Méndez D.; Bontempo G.; Ficarra E.; Confalonieri R.; Díaz-Rodríguez N.,CUBIC: Unsupervised Detection of Conceptual Biases via Vision-Language Embeddings,"Deep vision models often rely on biases learned from spurious correlations in datasets. To identify these biases, methods that interpret high-level, human-understandable concepts are more effective than those relying primarily on low-level features like heatmaps. A major challenge for these concept-based methods is the lack of image annotations indicating potentially bias-inducing concepts, since creating such annotations requires detailed labeling for each dataset and concept, which is a highly labor-intensive task. To this end, we propose CUBIC (Concept embeddings for Unsupervised Bias IdentifiCation), a novel methodology that automatically discovers human-understandable concepts that can bias a classifier’s behavior. Unlike existing approaches, CUBIC does not rely on predefined bias candidates or examples of model failures tied to specific biases, as these are not always available in the data. Instead, it utilizes image-text latent space and linear classifier probes to examine how the latent representation of a superclass label—shared by all instances in the dataset—is influenced by the presence of a concept. By measuring these shifts against the normal vector to the classifier’s decision boundary, CUBIC identifies concepts that significantly influence model predictions. Our experiments demonstrate that CUBIC effectively uncovers previously unknown biases using Vision-Language Models (VLMs) without requiring knowledge of potential biases or samples linked to bias where the classifier underperforms. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Linear classifier probe; Natural language explanations; Unsupervised bias detection; Vision-Language Models (VLMs),0,Information Systems Frontiers,2025 369,Jansen B.J.; Jung S.-G.; Salminen J.,Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels,"Although the effect of hyperparameters on algorithmic outputs is well known in machine learning, the effects of hyperparameters on information systems that produce user or customer segments are relatively unexplored. This research investigates the effect of varying the number of user segments on the personification of user engagement data in a real analytics information system, employing the concept of persona. We increment the number of personas from 5 to 15 for a total of 330 personas and 33 persona generations. We then examine the effect of changing the hyperparameter on the gender, age, nationality, and combined gender-age-nationality representation of the user population. The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. The hyperparameter selection for the 990 total personas results in an average deviation of 54.5% for gender, 42.9% for age, 28.9% for nationality, and 40.5% for gender-age-nationality. A repeated analysis of two other organizations shows similar results for all attributes. The deviation occurred for all organizations on all platforms for all attributes, as high as 90.9% in some cases. The results imply that decision makers using analytics information systems should be aware of the effect of hyperparameters on the set of user or customer segments they are exposed to. Organizations looking to effectively use persona analytics systems must be wary that altering the number of personas could substantially change the results, leading to drastically different interpretations about the actual user base. © The Author(s) 2023.",Analytic bias; Hyperparameters; Machine learning; Personas,7,Information Systems Frontiers,2024 370,Ode E.; Awolowo I.F.; Nana R.; Olawoyin F.S.,Social Capital and Artificial Intelligence Readiness: The Mediating Role of Cyber Resilience and Value Construction of Smes in Resource-Constrained Environments,"Drawing on social capital theory, this study explores the antecedents of AI readiness in Small and Medium-sized Enterprises (SMEs) operating in resource-constrained environments, emphasising capabilities that mitigate cyber risks, and foster value construction in SMEs. Specifically, the study examines how structural, cognitive, and relational social capital fosters cyber resilience and contributes to proactive value construction, enhancing SMEs’ AI readiness and enabling them to construct and sustain value while safeguarding against potential cyber threats. The study adopts a Covariance-based Structural Equation Modelling (CB-SEM) approach to analyse 589 valid responses. A multi-wave data strategy with an interval cross-lagged design was implemented to reduce the risk of common method bias. The findings reveal that structural and relational capital significantly drive AI readiness, while cognitive social capital enhances cyber resilience, which is pivotal in constructing and protecting organisational value. Moreover, cyber resilience mediates the relationship between cognitive social capital and AI readiness, and enabling value construction amid cyber-related disruptions. SMEs with robust social capital networks are better equipped to leverage AI technologies for innovation and growth, construct new value streams, and defend against cyber risks, securing value in dynamic digital environments. This study contributes to the growing discourse on cybersecurity and digital transformation by offering insights into how SMEs can bolster digital innovation and construct sustainable value in the face of mounting cyber risks. © The Author(s) 2025.",AI readiness; Cyber resilience; Social capital; Value construction,7,Information Systems Frontiers,2025 371,Nguyen T.; Elbanna A.,Understanding Human-AI Augmentation in the Workplace: A Review and a Future Research Agenda,"The relationship between humans and artificial intelligence has sparked considerable debate and polarized opinions. A significant area of focus in this discourse that has garnered research attention is the potential for humans and AI to augment one another in order to enhance outcomes. Despite the increasing interest in this subject, the existing research is currently fragmented and dispersed across various management disciplines, making it challenging for researchers and practitioners to build upon and benefit from a cohesive body of knowledge. This study offers an organized literature review to synthesize the current literature and research findings, thereby establishing a foundation for future inquiries. It identifies three emerging themes related to the nature, impacts, and challenges of Human-AI augmentation, further delineating them into several associated topics. The study presents the research findings related to each theme and topic before proposing future research agenda and questions. © The Author(s) 2025.",Artificial intelligence; Automation; Digital Transformation; Human-AI augmentation; Human-AI collaboration; Human-AI symbiosis,13,Information Systems Frontiers,2025 372,Nasiri M.; Saunila M.; Ukko J.; Rantala T.; Rantanen H.,Shaping Digital Innovation Via Digital-related Capabilities,"The aim of this research was to explore the conditions under which digital innovation opportunities emerge in small and medium-sized enterprises (SMEs). The research answered the question of what capabilities are required to shape the exploitation of digital innovation, namely market offerings and the digital business process. To address the research question with a quantitative research method, data were collected through survey questionnaires distributed among 280 SMEs operating in the service and manufacturing industries in Finland. The results revealed that among four digital-related capabilities—namely human, collaboration, technical, and innovation capabilities—human, technical, and innovation capabilities contribute to market offerings, while human, collaboration, and technical capabilities contribute to the business process. © 2020, The Author(s).",Digital business process; Digital innovation; Digital transformation; Digital-related capabilities; Market offerings,91,Information Systems Frontiers,2023 373,Jain G.; Shrivastava A.; Paul J.; Batra R.,Blockchain for SME Clusters: An Ideation using the Framework of Ostrom Commons Governance,"Small and medium-sized enterprises (SMEs) organize themselves into clusters by sharing a set of limited resources to achieve the holistic success of the cluster. However, these SMEs often face conflicts and deadlock situations that hinder the fundamental operational dynamics of the cluster due to varied reasons, including lack of trust and transparency in interactions, lack of common consensus, and lack of accountability and non-repudiation. Blockchain technology brings trust, transparency, and traceability to systems, as demonstrated by previous research and practice. In this paper, we explore the role of blockchain technology in building a trustworthy yet collaborative environment in SME clusters through the principles of community self-governance based on the work of Nobel Laureate Elinor Ostrom. We develop and present a blockchain commons governance framework for the three main dimensions i.e., interaction, autonomy, and control, based on the theoretical premise of equivalence mapping and qualitative analysis. This paper examines the role of blockchain technology to act as a guiding mechanism and support the smooth functioning of SMEs for their holistic good. The study focuses on sustainability and improving productivity of SMEs operating in clusters under public and private partnership. This is the first study to address the operational challenges faced by SEMs in clusters by highlighting the dimensions of blockchain commons governance dimensions. © 2022, Crown.",Blockchain; Blockchain Governance; Blockchain Technology; Clusters; Self-governance of communities; Small- and medium-sized enterprises (SMEs); Technology Assessment,26,Information Systems Frontiers,2022 374,Arazzi M.; Nicolazzo S.; Nocera A.,A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption,"Anomaly detection for the Internet of Things (IoT) is a very important topic in the context of cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the number of threats and attacks targeting smart objects and their interactions. Behavioral fingerprinting has gained attention from researchers in this domain as it represents a novel strategy to model object interactions and assess their correctness and honesty. Still, there exist challenges in terms of the performance of such AI-based solutions. The main reasons can be alleged to scalability, privacy, and limitations on adopted Machine Learning algorithms. Indeed, in classical distributed fingerprinting approaches, an object models the behavior of a target contact by exploiting only the information coming from the direct interaction with it, which represents a very limited view of the target because it does not consider services and messages exchanged with other neighbors. On the other hand, building a global model of a target node behavior leveraging the information coming from the interactions with its neighbors, may lead to critical privacy concerns. To face this issue, the strategy proposed in this paper exploits Federated Learning to compute a global behavioral fingerprinting model for a target object, by analyzing its interactions with different peers in the network. Our solution allows the training of such models in a distributed way by relying also on a secure delegation strategy to involve less capable nodes in IoT. Moreover, through homomorphic encryption and Blockchain technology, our approach guarantees the privacy of both the target object and the different workers, as well as the robustness of the strategy in the presence of attacks. All these features lead to a secure fully privacy-preserving solution whose robustness, correctness, and performance are evaluated in this paper using a detailed security analysis and an extensive experimental campaign. Finally, the performance of our model is very satisfactory, as it consistently discriminates between normal and anomalous behaviors across all evaluated test sets, achieving an average accuracy value of 0.85. © The Author(s) 2023.","Internet of Things, Federated Learning, Blockchain, Autonomy, Reliability, Machine Learning, Privacy, Homomorphic Encryption",27,Information Systems Frontiers,2025 375,Sikora R.; Lee Y.S.,Class Imbalance Problem: A Wrapper-Based Approach using Under-Sampling with Ensemble Learning,"Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Class Imbalance; Data Mining; Machine Learning,1,Information Systems Frontiers,2025 376,Rezaeinejad S.; Rayman K.; Sauser B.; Ojha D.,How can Blockchain Contribute to Cyber Resilience? Supply Chain Analytics and Digitalization Benefits,"This paper aims to address the research question: How can blockchain technology aid in mitigating supply chain data breaches? To address the research question, we present a research model including hypothesized relationships. We conducted a between-subjects experiment to collect empirical data for testing the research model. The practice-based view provides theoretical support as well. Our results indicate that blockchain provides comprehensive data to improve supply chain analytics by which firms can better address data breaches. Moreover, empirical outcomes suggest that blockchain plays a primary role in digitalizing supply chains, which can result in improving resilience against data breaches and offering quick recovery after cyber-attack disruptions. This paper offers two primary contributions to cyber resilience. First, we provide empirical evidence explaining how integrating blockchain in supply chain digitalization can enable companies to prevent data breaches and cyber-attacks. Second, this paper builds upon past work by highlighting the critical role of supply chain analytics in supporting firms’ capabilities. © The Author(s) 2025.",Blockchain; Cyber resilience; Supply chain analytics; Supply chain digitalization,0,Information Systems Frontiers,2025 377,Shayganmehr M.; Bose I.,Have a Nice Flight! Understanding the Interplay Between Topics and Emotions in Reviews of Luxury Airlines in the Pre- and Post-Covid-19 Periods,"Few studies assessed the impact of Covid-19 on the aviation industry from the passengers’ perspective. This study examined how airline passengers’ emotions (positive and negative) and sub-emotions (joy, trust, surprise, anticipation, fear, sadness, anger, and disgust) changed in the pre-and post-Covid-19 periods. 21,463 reviews from 2014–2022 of top 10 luxury airlines were extracted from Skytrax. Using the lens of the Appraisal Theory of Emotion, the analysis revealed an increase in negative emotion and related sub-emotions after the pandemic. Using topic modeling seven similar topics (namely food, staff, customer service, board, flight, crew, and luggage) and four dissimilar topics (entertainment and drink for pre-Covid-19 and wait and Covid-19 for post-Covid-19) were identified. Regression analysis showed that the topics food and entertainment generated significant positive emotion whereas wait and customer service generated significant negative emotion. The results would help the luxury airlines to identify offerings to improve during the recovery after Covid-19. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Airlines; Covid-19; Emotion analysis; Regression analysis; Reviews; Topic modeling,8,Information Systems Frontiers,2025 378,Au C.H.; Ho K.K.W.; Chiu D.K.W.,"The Role of Online Misinformation and Fake News in Ideological Polarization: Barriers, Catalysts, and Implications","In recent years, the circulation of online misinformation and fake news has drawn our attention, given it has ideologically polarized society and has led to social instability, compromised democracies, and other consequences. Efforts on technical or behavioral dimensions on their identification are not uncommon, but these efforts inadequately addressed their roots, and thus may not stop them from creation or spreading. Using the theoretical lens of computer-mediated communications, we analyzed the ideological polarization phenomenon in Hong Kong, which has been worsening since the Umbrella Revolution in 2014. We proposed a three-stage model to illustrate the mechanism of how online misinformation and fake news leads to ideological polarization. The catalysts and barriers in each stage were also highlighted. Our analyses generate a better understanding of the mechanisms that help hinder the circulation of online misinformation and fake news, and thus, reduces the damages it caused. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Computer-mediated communication; Fake news; Misinformation; Polarization; Social media,86,Information Systems Frontiers,2022 379,Moin M.F.; Behl A.; Zhang J.Z.; Shankar A.,"AI in the Organizational Nexus: Building Trust, Cementing Commitment, and Evolving Psychological Contracts","Since the Industrial Revolution, significant technological advancements have revolutionized various manual processes and workflows entrenched for decades. Artificial Intelligence (AI) offers similar transformative potential across diverse industrial and social domains. The rapid pace of change in the AI-driven digital age presents unprecedented opportunities and challenges for sustained progress. Given the potentially profound impact of AI, this study seeks to explore its disruptive effects and challenges within organizational contexts. Drawing on the Social Exchange Theory, this research examines the relationship between psychological contract (PC) fulfillment and organizational commitment, with trust acting as a mediator and AI acceptance as a moderator. Data were collected from the service industry using a time-lagged design. The findings indicate that PC fulfillment positively influences workers’ trust and organizational commitment. Furthermore, AI acceptance attenuates the direct and indirect positive effects of PC fulfillment on job-related outcomes. This study offers valuable insights into building and maintaining trust and fostering a committed workforce amidst the digitalization era. It underscores the importance of fulfilling promissory expectations in fostering trust and commitment. Additionally, it sheds light on the disruptive effects of AI technology on critical job outcomes, emphasizing the societal and industrial implications, the future of work, and avenues for further advancements in AI technology. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial Intelligence; Organizational Commitment; Psychological Contract; Trust,7,Information Systems Frontiers,2025 380,Sigov A.; Ratkin L.; Ivanov L.A.; Xu L.D.,Emerging Enabling Technologies for Industry 4.0 and Beyond,"Rapid advances in technology have spurred tremendous progress in developing the next generation of Industry 4.0 that was initially introduced in 2011 as a German strategic initiative for revolutionizing the manufacturing sector. Ten years have passed since 2011. In these ten years, numerous new and promising technologies and applications have been developed. The original concept of Industry 4.0, including the conceptual framework, technology framework, and enabling technologies, has experienced tremendous changes. As such, the new generation of Industry 4.0 emerges, which is also called Industry 5.0. Today, we are on the cusp of the Industry 4.0 evolution supported by a new set of enabling technologies. In such evolution of Industry 4.0, future Industry 4.0 requires a combination of recently emerging new technologies, which is giving rise to the emergence of the next generation of Industry 4.0 or Industry 5.0. Such technologies originate from different disciplines, including Artificial Intelligence (AI), 5G/6G, Quantum Computing, and others. The technologies in the original Industry 4.0 framework, such as Cyber-Physical Systems, IoT, etc., will be affected by Artificial Intelligence (AI), 5G/6G, and Quantum Computing. At this present moment, the emergence of a new era of Industry 4.0 can be seen. In this paper, we briefly survey the main emerging enabling technologies in Industry 4.0 as it relates to industries. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",5G; 6G; Artificial intelligence; Emerging technology; Enabling technology; Industry 4.0; Quantum computing,132,Information Systems Frontiers,2024 381,Angiulli F.; Fassetti F.; Nisticò S.; Palopoli L.,Adversarial Anomaly Explanation,"Given a data set and one single object known to be anomalous beforehand, the outlier explanation problem consists in explaining the abnormality of the input object with respect to the data set population. The approach pursued in this paper to solve the above task consists in finding an explanation, namely, a piece of information encoding the characteristics that locate the anomalous data object far from the normal data. Our explanation consists of two components, the choice, encoding the set of features in which the anomalous object deviates from the rest of the population, and the mask, encoding the associated amount of deviation with respect to the normality. The goal here is not to explain the decisional process of a model but, rather, to provide an explanation justifying the output of the decisional process by only inspecting the data set on which the decision has been made. We tackle this problem by introducing an innovative deep learning architecture, called MMOAM, based on the adversarial learning paradigm. We assess the effectiveness of our technique over both synthetic and real data sets and compare it against state of the art outlier explanation methods reporting better performances in different scenarios. © The Author(s) 2025.",Anomaly detection; Data explainability; Deep learning; Explainable artificial intelligence; Outlier aspect mining; Outlier explanation,0,Information Systems Frontiers,2025 382,Chau M.; Deng B.; Lo K.K.; Wei D.; Wei W.,Whose Investment Advice Do You Follow? Studying the Effect of Author Attributes on Using Social Media Stock Opinions To Predict Stock Performance,"Social media have attracted a lot of attention in the financial market. Opinions on social media can serve as an indicator of future stock performance. However, prior literature shows inconsistent results when using sentiment analysis (e.g., positive and negative words) on social media to predict future stock performance. The inconsistent results suggest that omitted-variable bias may exist in the relationship between social media elements and future stock performance. To investigate this issue, this study tests the effect of author attributes on using social media to predict future stock performance. Using data collected from a popular online stock opinions forum, our results show that an author’s stated long and short positions in social media articles have a significant predictive power on future stock performance. Meanwhile, stated long position and author’s popularity partially moderate the predictive power of sentiment level on future stock return. Furthermore, we investigate whether investors’ reactions vary across market contexts by assessing the boundary condition of platform trust. Our study helps explain the inconsistent results reported in the literature. This study also provides new insights into author attributes on social media and the role they play in the financial market, as well as provides investment and management directions for individual investors, fund managers, firms, and regulators. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Author attributes; Sentiment analysis; Social media; Stock performance,0,Information Systems Frontiers,2025 383,Khacef K.; Benbernou S.; Ouziri M.; Younas M.,A Dynamic Sharding Model Aware Security and Scalability in Blockchain,"Security and scalability are considered as two major challenges in rapid and smooth deployment of blockchains in businesses, enterprises and organizations. Common belief is that the ability to scale up a blockchain lies mainly in improving the underlying technology rather than deploying new hardware. Though recent research works have applied sharding techniques in enhancing scalability of blockchains, they do not cater for addressing the joint issue of data security and scalability in blockchains. This paper proposes an approach that makes a trade-off between security and scalability when designing blockchain based systems. It designs an efficient replication model, which creates dynamic sharding wherein blocks are stored in a varying number of nodes. In order to maintain required level of security, the proposed approach shows that the replication of blockchain over peer-to-peer network is minimized as the blockchain’s length evolves according to a replication factor. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Blockchain; Scalability; Security; Sharding,7,Information Systems Frontiers,2024 384,Long Q.; Song K.,Operational Performance Evaluation of E-government Microblogs Under Emergencies Based on a DEA Method,"Microblogging has become a crucial channel for e-governments to interact with the public and has been evolving as a powerful and promising tool to address emergency management. The operational performance of an e-government microblog under emergencies plays a key role in shaping the e-government’s overall performance. This study creatively proposes a novel multi-indicator system for evaluating this operational performance in the life cycles of emergencies and applies these multiple indicators in a data envelopment analysis method to establish an evaluation model. Twenty-four e-government microblogs concentrating on the bus crash emergency in the Wanzhou district of Chongqing city are evaluated by this model. The evaluation results indicate that the proposed multi-indicator system and evaluation model are feasible and effective. This study’s findings indicate that e-governments should be encouraged to attach great importance to microblogs, pay direct attention to emergencies during their life cycles, concentrate on multi-stage evaluations to discover their performance changes across the “turning points” of emergencies, and collaborate with superior or subordinate e-governments to improve their microblogs’ operational performances. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Data envelopment analysis; E-government microblog; Emergency; Operational performance; Performance evaluation,4,Information Systems Frontiers,2022 385,Harfouche A.; Merhi M.I.; Albizri A.; Dennehy D.; Thatcher J.B.,Sustainable Development Through Technological Innovations and Data Analytics,"The integration of technological innovations and data analytics into sustainable development presents an opportunity to address pressing global challenges such as climate change, resource scarcity, and social inequities. This editorial introduces the Sustainable Development Impact Through Technological Innovations and Data Analytics (SDITIDA) framework, offering a conceptual foundation for aligning technology with the United Nations Sustainable Development Goals (SDGs). Through a rigorous review process, nine articles were selected for this special issue, showcasing interdisciplinary approaches and diverse applications of technology in sustainability. These contributions examine areas such as smart home technologies, AI maturity frameworks, blockchain-enabled agricultural practices, and big data analytics for organizational performance. Collectively, the issue highlights actionable strategies for researchers, practitioners, and policymakers, advancing the discourse on the socio-technical dimensions of sustainability and promoting equitable, sustainable outcomes. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Artificial intelligence and sustainability; Data analytics; Socio-technical systems; Sustainable Development Goals (SDGs); Technological innovations,16,Information Systems Frontiers,2024 386,Qadeer A.; Lee M.J.,HRL-Edge-Cloud: Multi-Resource Allocation in Edge-Cloud based Smart-StreetScape System using Heuristic Reinforcement Learning,"The Edge Cloud (EC) architecture aims at providing the compute power at the edge of the network to minimize the latency necessary for the Internet of Things (IoT). However, an EC endures a limited compute capacity in contrast with the back-end cloud (BC). Intelligent resource management techniques become imperative in such resource constrained environment. In this study, to achieve the efficient resource allocation objective, we propose HRL-Edge-Cloud, a novel heuristic reinforcement learning-based multi-resource allocation (MRA) framework which significantly overcomes the bottlenecks of wireless bandwidth and compute capacity jointly at the EC and BC. We solve the MRA problem by accelerating the conventional Q-Learning algorithm with a heuristic method and applying a novel linear-annealing technique. Additionally, our proposed pruning principle achieves remarkably high resource utilization efficiency while maintaining a low rejection rate. The effectiveness of our proposed method is validated by running extensive simulations in three different scales of environments. When compared with the baseline algorithm, the proposed HRL-Edge-Cloud achieves 240X, 95X and 2.4X reduction in runtime, convergence time and rejection rate, respectively, and achieves 2.34X operational cost efficiency improvement on average while satisfying the latency requirement. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Admission control; Edge cloud; Heuristic reinforcement learning; IoT; Resource allocation; Smart city; Task offloading,13,Information Systems Frontiers,2024 387,Liang Y.; Cao Y.; Guo C.; Li H.,How Long do the Heart Failure Inpatients Stay in ICU? Temporal Comorbidity Networks to Assist Clinical Decision Support Systems,"To enhance ICU Length of Stay (LoS) prediction for Heart Failure (HF) patients and unearth valuable clinical insights, this study introduces an underlying system – LoS Prediction and Analysis System (LoS-PAS). It utilizes a Temporal Comorbidity Network (TCN) to analyze patient heterogeneity and comorbidity progression over time. A proposed deep learning model integrates TCN insights, including the novel normalized LoS propensity and comorbidity propensity vector features, to predict ICU LoS in current visit. LoS-PAS provides insights into the driving factors and analyzes comorbidity patterns across age- and gender-stratified subgroups, identifying latent focal diseases and their LoS impact. Validated with real multi-center datasets, LoS-PAS enhances prediction accuracy, offers insights into disease progression, and incorporates visualization tools to assist in clinical decision-making. The results demonstrate that LoS-PAS provides evidence-based, significantly bolstering the clinical decision support system capabilities in predictive analytics and patient care optimization. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Electronic health records; Heart failure; Intensive care unit; Length of stay; Prediction; Temporal comorbidity network,0,Information Systems Frontiers,2025 388,Zhang C.; Sinha A.P.; Wang Y.,When to Target Customers for Helpful Reviews: The Evolution of Consumers’ Product Evaluations with Product Exposure,"Many online sellers send a review request only a few days after product delivery to gather customer reviews. Yet, the value of this strategy is questionable because buyers with short product exposure are unlikely to have enough time to inspect the product thoroughly and thus may not offer valuable evaluations. We address this question by examining the influence of consumers’ product exposure on the helpfulness of their reviews. Our findings suggest that those with a longer product exposure tend to produce more helpful posts. The subsequent topic modeling analyses reveal that reviewers’ assessments of product utilitarian aspects increase with product exposure. Such information is perceived as less subjective and contains more discussions on product functionality. Lastly, we found that users with prior product domain knowledge do not need a long exposure to produce helpful reviews. Businesses with an urgent need to gain reviews may target them as a priority. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Online reviews; Product domain knowledge; Product exposure; Review helpfulness; Topic modeling,6,Information Systems Frontiers,2024 389,Mombeuil C.,Consumers’ Willingness to Use Mobile Payments in Micro Business Transactions: Differences in Demographic Factors,"This study investigates the factors affecting consumers' willingness to use mobile payment systems for micro-business transactions, in a context where mobile payments are predominantly used for peer-to-peer (P2P) remittance transfers. The study considers five variables: Perceived Risks, Perceived Costs, Lifestyle Compatibility, Comparative Advantage, and trust in the mobile payment ecosystem. The study also explores whether there are differences in willingness to use mobile payments based on gender, age, and frequency of using mobile payments for P2P remittance transfers. The study uses a sample of 476 respondents and employs a structural equation model. The results indicate that only lifestyle compatibility and trust in the mobile payment ecosystem have a significant influence on consumers' willingness to use mobile payments for micro-business transactions. Additionally, the study finds no significant differences in willingness to use mobile payments across gender, age, or frequency of mobile payment usage, except for the effect of perceived risks on occasional users, where the effect is negative and significant. Overall, the findings suggest that micro-businesses interested in adopting mobile payments should focus on creating a lifestyle-compatible and trustworthy ecosystem for their customers. The study's results also imply that occasional users of mobile payments may require additional reassurance to overcome perceived risks. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Comparative advantage; Lifestyle compatibility; Perceived costs; Perceived risks; Trust in mobile payment ecosystem; Valence theory,6,Information Systems Frontiers,2024 390,Yu L.; He L.; Du J.; Wu X.,Protection or Cynicism? Dual Strategies for Coping with Privacy Threats,"Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Coping theory; Information privacy; Privacy cynicism; Privacy paradox; Protection motivation,4,Information Systems Frontiers,2025 391,Xi N.; Chen J.; Gama F.; Korkeila H.; Hamari J.,"Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse","There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into question when undertaking everyday activities (e.g., working, shopping, and learning etc.), as complex human-technology interaction required may hinder cognitive abilities such as processing of information. Therefore, this study attempts to address whether and how XR impacts abilities to recall and recognize information in daily-life settings. We investigated the effects of VR and AR in a 2 (VR: yes vs. no) × 2 (AR: yes vs. no) between-subjects design experiment related to a shopping task (N = 153) on textual (product names) and pictorial (product pictures) recognition and recall. The results show that textual information recall and pictorial information recognition did not significantly suffer in XR compared to shopping in a brick-and-mortar store. While regarding textual information recognition performance, the results show that fully physical environments offered the highest performance compared to the different XR technologies being used. Overall, the study provides important findings and guidance for the use of extended reality technologies in consumer-facing businesses, as well as the use of XR in everyday life in general. © The Author(s) 2024.",Augmented Reality; Memory; Metaverse; Retail; Virtual Reality,6,Information Systems Frontiers,2025 392,Nyamadi M.; Turel O.,Mobile Technology Addiction Effect on Risky Behaviours: the Moderating Role of Use-Regulation,"The ability to use mobile technologies anywhere and anytime has driven an important dark side known in this article as Mobile Technology Addiction (MTA). Here, we extend insights on this phenomenon by building on S–O-R theory and focusing on stimuli (flow and telepresence), organisms (mobile technology addiction), and responses (risky behaviours). This study conceptualised the moderating role of use-regulation between MTA and risky behaviours. Based on a study in the unique context of a developing country, this study adopted a stratified random sampling technique. The questionnaire was deployed through online and offline survey methods to select 528 participants from a developing country in which most internet interactions are done via mobile devices. It was found that MTA drives risky behaviours, but IS use-regulation minimises this effect. The findings provide important implications for theory and practice. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.","Flow; Mobile risky behaviours, and use-regulation; Mobile Technology Addiction (MTA); Telepresence",2,Information Systems Frontiers,2025 393,Fetais A.H.; Algharabat R.S.; Aljafari A.; Rana N.P.,Do Social Media Marketing Activities Improve Brand Loyalty? An Empirical Study on Luxury Fashion Brands,"This research aims to investigate the impact of social media marketing activities (SMMa) on brand loyalty directly and through mediating variables community engagement and lovemark. To propose a research model, we used the theories including lovemark theory, engagement theory and brand equity theory. As a result, this research investigates the impact of SMMa, community engagement, and lovemark on brand loyalty. Using an online survey, we collected data from 464 female participants who are following luxury fashion brands on major social networking sites including Facebook, Instagram, Snapchat, and Twitter. Results using PLS revealed that SMMa positively influences community engagement and lovemark. Moreover, we find positive relationships between community engagement, lovemark and brand loyalty. However, we find that SMMa has no direct influence on brand loyalty. © 2022, The Author(s).",Brand loyalty; Community engagement; Fashion brands; Lovemark; Qatar; Social media,68,Information Systems Frontiers,2023 394,Wang H.-Y.; Wang J.-H.; Zhang J.; Tai H.-W.,The Collaborative Interaction with Pokémon-Go Robot uses Augmented Reality technology for Increasing the Intentions of Patronizing Hospitality,"The aim of the present study is to present a new research model which includes both extrinsic and intrinsic determinants that influence Pokémon-Go robot users’ behavioral intention to patronize hospitality firms that draw visitors with Pokémons. Pokémon-Go Robot uses Augmented Reality technology in this study. Survey data collected from 261 usable questionnaires were tested against the research model using the structural equation modeling approach. The results present that all the proposed variables were found to be critical factors significantly influencing Pokémon-Go robot users’ patronizing intention. The application area of proposed theoretical model is new; very sparse research has been undertaken on exploring Pokémon-Go robot users’ intentions toward visiting hospitality firms attracting guests by virtual monsters. The present study mainly contributes to an understanding of the factors that actually influence Pokémon-Go robot users’ intention to patronize hospitality firms using virtual monsters to boost their sales. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Augmented Reality; Hospitality firms; Patronizing intention; Pokémon-go robot; Structural equation modeling,7,Information Systems Frontiers,2024 395,Alahakoon D.; Nawaratne R.; Xu Y.; De Silva D.; Sivarajah U.; Gupta B.,Self-Building Artificial Intelligence and Machine Learning to Empower Big Data Analytics in Smart Cities,"The emerging information revolution makes it necessary to manage vast amounts of unstructured data rapidly. As the world is increasingly populated by IoT devices and sensors that can sense their surroundings and communicate with each other, a digital environment has been created with vast volumes of volatile and diverse data. Traditional AI and machine learning techniques designed for deterministic situations are not suitable for such environments. With a large number of parameters required by each device in this digital environment, it is desirable that the AI is able to be adaptive and self-build (i.e. self-structure, self-configure, self-learn), rather than be structurally and parameter-wise pre-defined. This study explores the benefits of self-building AI and machine learning with unsupervised learning for empowering big data analytics for smart city environments. By using the growing self-organizing map, a new suite of self-building AI is proposed. The self-building AI overcomes the limitations of traditional AI and enables data processing in dynamic smart city environments. With cloud computing platforms, the self-building AI can integrate the data analytics applications that currently work in silos. The new paradigm of the self-building AI and its value are demonstrated using the IoT, video surveillance, and action recognition applications. © 2020, The Author(s).",Big data analytics; Machine learning; Self-building AI; Self-organizing maps; Smart cities,93,Information Systems Frontiers,2023 396,Kushwaha A.K.; Kar A.K.,MarkBot – A Language Model-Driven Chatbot for Interactive Marketing in Post-Modern World,"Hosting conversational responses on the official websites of products and services companies is an essential marketing aspect. With Artificial Intelligence’s help to make conversational interactivity more intuitive to existing and potential customers visiting the websites, managers can notch up the return on marketing investments. This motivated us to study empirically and develop the MarkBot framework, a chatter robot on the management design principles. The framework uses an Artificial Intelligence application to respond to a website visitor’s browse through the product catalog. Neural network (NN) architectures are known to achieve remarkable performances in synthetic text predictions. We use a long short-term memory recurrent neural network (LSTM) to predict the user’s responses through a chatbot in the current work. The proposed framework reduces the lead time for the firms to adopt MarkBot. We empirically prove using user-generated content on social media platforms like Twitter in responses and queries to digital campaigns on the same product. With new businesses failing to venture into the space of hosting a chatbot owing to no historical data or existing firms yet to host a chatbot, the proposed MarkBot fuelled by user-generated content can have a substantial managerial implication. The management frameworks used to theorize the MarkBot also make it a theoretical contribution for future Information Systems scholars to conceptualize in the marketing field. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Artificial intelligence; Chatbots; LSTM; Machine learning; Marketing; Neural networks,50,Information Systems Frontiers,2024 397,Cho J.; Park I.,Does Information Systems Support for Creativity Enhance Effective Information Systems Use and Job Satisfaction in Virtual Work?,"Virtual work has increasingly gained global popularity in the business community, with virtuality becoming integrated into traditional office work settings. As the essence of virtuality comprises geographic dispersion and information systems (IS) use, the implementation of a wide variety of novel and advanced information technologies (IT)/IS as productivity and communication tools have fueled the trend in which virtual work permeates the modern workplace. Despite the heavy use of advanced IT/IS as an integral part of virtual work, our understanding on identifying the work dynamics between IS-related antecedents and employee work outcomes in virtual work contexts is still limited. Drawing on efficacy theory, this study focuses on two important IS-related antecedents within virtual work contexts—IS support for creativity and effective IS use—and their effects on job satisfaction. Specifically, we examine the mediating effect of effective IS use on the relationship between IS support for creativity and job satisfaction above and beyond the perceived usefulness and IS satisfaction, which have previously been recognized as impactful antecedents for IS-related effectiveness. To test the posited hypotheses, data were collected (N = 504) from an online survey platform. Using multiple mediation analyses, the study results confirm our hypotheses that (1) IS support for creativity is positively related to job satisfaction in virtual work settings; and (2) effective IS use mediates the relationship between IS support for creativity and job satisfaction even after controlling for perceived usefulness and IS satisfaction, which indicates the unique explanatory power of effective IS use for increased job satisfaction in virtual work settings. Implications for theory and practice are discussed. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Effective IS use; Efficacy theory; Information systems satisfaction; Information systems support for creativity; Job satisfaction; Perceived usefulness; Virtual work,19,Information Systems Frontiers,2022 398,Oesterreich T.D.; Anton E.; Schuir J.; Teuteberg F.; Al-Busaidi A.S.; Dwivedi Y.K.,Learning from the Past to Advance the Future: Synthesizing the Meta-Analysis Landscape in Information Systems Research,"The main objective of this study is to explore the emerging patterns in the Information Systems (IS) meta-analysis landscape by reviewing a sample of 162 studies published in IS journals and conferences covering 37 years of meta-analysis research. The findings underline the diversity of topics, bodies of knowledge, as well as theories and constructs on various levels of analysis that were examined in recent decades. The key findings and recommendations help IS scholars to conceptualize their meta-analysis study design and redirect their attention to under-researched areas and methodological issues that need improvement, thus to learn from the past for advancing the future. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Guidelines; Information systems research; Literature review; Meta-analysis; Research method,2,Information Systems Frontiers,2025 399,Dzandu M.D.; Hatsu S.; De Cesare S.,Remote Working and Task Innovativeness – an Integrated Resource Based View and Antecedent-Behaviour-Consequence Perspective,"In response to the COVID-19 pandemic, organisations across the world have been adopting different strategies, including remote working (RW), to continue with their normal routines. However, little is known about the impact of RW strategy on task innovativeness, organisational performance, and employees’ continuance intention to remote work post-COVID-19. Using a variant of the resource-based view and the antecedent-behaviour-consequence models, data was collected from a total of 643 employees in the United Kingdom (UK) and Ghana; and analysed using structural equation modelling (Study 1). The results showed and confirmed a positive effect of RW strategy, information systems (IS) resource availability and capabilities on employees’ task innovativeness leading to improved organisational performance. Further, interviews were then conducted with 22 participants from Ghana and the UK (Study 2) to understand the reasons for the outcomes in Study 1. These provided a basis for employees’ continuance intention to remote work. The need to upgrade the current levels of IS resources to support job redesign and responsive workaround in times of uncertainty is highlighted for the consideration of businesses, organisations, and policymakers. © The Author(s) 2023.",COVID-19; Employee performance; Information systems; Remote working; Resource-based view; Task innovativeness,7,Information Systems Frontiers,2025 400,Setia P.; Deng K.; Pandey S.; Sambamurthy V.,"Digital Strategies for Engendering Resilient, Adaptive, and Entrepreneurial Agility: A Configurational Perspective","This study examines how different digital strategies influence agility in managing customer demand. We test the effects of digital strategies on three types of digitally-enabled demand management agility–adaptive, resilient, and entrepreneurial. Using a configurational perspective, we conceptualize digital strategies as the synergistic use of IT-driven and business-driven initiatives in selective or collective value chain domains. Configurations are used to outline three digital strategies: supply chain-oriented, marketing-oriented, and value chain-wide. Using data from a survey of 200 firms, we use configurational analysis to test the hypotheses. The results indicate that specialized–supply chain or marketing-oriented–digital strategies may be sufficient to create adaptive and resilient agility. However, a value chain-wide digital strategy is necessary to facilitate entrepreneurial agility. Results also indicate that a specialized digital strategy may suffice in less turbulent environments, but a value chain-wide digital strategy is required to manage demand management disruptions in highly turbulent environments. © 2024, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Configuration; Demand Management Agility; Digital Strategy; IT Competency; Turbulence,1,Information Systems Frontiers,2024 401,Klein G.; Assadi D.; Zwilling M.,Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset,"As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional regulatory forces versus those advocating for normative legitimacy, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Bitcoin; Cryptocurrency; Cybercrime; Cybersecurity; Institutional theory; P2P,3,Information Systems Frontiers,2025 402,Silva C.; Cunha V.A.; Barraca J.P.; Aguiar R.L.,Analysis of the Cryptographic Algorithms in IoT Communications,"The advances on recent communication paradigms brings new security and privacy challenges, mainly about personal data collection by smart devices. Resource constrained devices face serious issues to run complex cryptographic algorithms. Trying to evaluate the performance impact of those algorithms in usual and common devices used in smart homes, in this paper we tested the impact of different cryptographic algorithms in low computational devices, typically used in smart devices applied in smart homes, testing different security configurations and using the two most used transport protocols (HTTP and MQTT). The experiment measures their effects on six commonly used embedded devices in IoT WSNs: ESP8622, ESP32, and Raspberry Pi (RPi) from 1 to 4. The experiment measured the power consumption, message delay, and additional message length (bytes). Moreover, the analysis was also used to model security algorithms. The experimental results from long runs (72 hours) reveal the cryptographic solution choice is significant for the message delay and additional message length. © The Author(s) 2023.",Cryptography; IoT; Privacy; Security; Smart home; WSN,54,Information Systems Frontiers,2024 403,Tang Z.; Kim S.; Ahn H.; Kim D.J.,Making Life Easier: Exploring the Influence of Chatbot’s Prompt Competency on Citizens’ Continuance in Government Chatbot Context,"Chatbot is a software application that uses artificial intelligence techniques to simulate human-like prompt conversations with users. Governments worldwide are increasingly using chatbots to interact with their citizens and provide prompt communication services, and support related to their service activities. By synthesizing Information Systems Continuance Model and Resources Matching Theory as theoretical frameworks, this study proposes a multidimensional concept of chatbot’s prompt competency as a key driver and examines how prompt competency influences citizens ‘continuous use of government chatbots. The results of the study indicate that citizens’ continuance with government chatbots is both directly and indirectly influenced by prompt competency, expectation confirmation, and service satisfaction. Theoretical and practical implications are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Chatbot’s prompt competency; Government AI chatbot; Resource matching theory,0,Information Systems Frontiers,2025 404,Kuem J.; Zhang Y.,How Does Performance-Based Monetary Incentive Influence Cyberloafing’s Effects on Task Performance?,"With the widespread use of computers and the internet in the workplace, computer use for personal reasons during work time, or cyberloafing, has become quite common. Without a clear understanding of the consequences of cyberloafing, practitioners cannot properly design an IT policy aimed at managing employees' cyberloafing. This study aims to develop and test a model of the relationship between cyberloafing and task performance. Specifically, we attempt to demonstrate how performance-based monetary incentives and time change the role of cyberloafing in task performance. Drawing on the theory of goal setting and the capacity theory of attention, we developed research hypotheses on how cyberloafing interacts with incentives and time to influence task performance. To test the hypotheses, we conducted five 2 × 2 experiments repeatedly on 189 subjects. The results of hierarchical linear modeling showed that although cyberloafing generally worsened task performance, this relationship varied with performance-based monetary incentives. Incentives significantly diminished the negative effect of cyberloafing on task performance. However, as our theory predicted, the moderating effect of incentives decreased over time. More specifically, we found that the two-way interaction between cyberloafing and incentives was in effect during earlier phases but gradually disappeared over time. This study contributes to IS research and practice by providing valuable insights into the role of cyberloafing in task performance and how this relationship changes over time with the option of performance-based monetary incentives. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Capacity theory of attention; Cyberloafing; Hierarchical analysis; Multilevel analysis; Repeated measures; Task performance; Theory of goal-directed behavior,1,Information Systems Frontiers,2025 405,Schöbel S.; Schmitt A.; Benner D.; Saqr M.; Janson A.; Leimeister J.M.,Charting the Evolution and Future of Conversational Agents: A Research Agenda Along Five Waves and New Frontiers,"Conversational agents (CAs) have come a long way from their first appearance in the 1960s to today’s generative models. Continuous technological advancements such as statistical computing and large language models allow for an increasingly natural and effortless interaction, as well as domain-agnostic deployment opportunities. Ultimately, this evolution begs multiple questions: How have technical capabilities developed? How is the nature of work changed through humans’ interaction with conversational agents? How has research framed dominant perceptions and depictions of such agents? And what is the path forward? To address these questions, we conducted a bibliometric study including over 5000 research articles on CAs. Based on a systematic analysis of keywords, topics, and author networks, we derive “five waves of CA research” that describe the past, present, and potential future of research on CAs. Our results highlight fundamental technical evolutions and theoretical paradigms in CA research. Therefore, we discuss the moderating role of big technologies, and novel technological advancements like OpenAI GPT or BLOOM NLU that mark the next frontier of CA research. We contribute to theory by laying out central research streams in CA research, and offer practical implications by highlighting the design and deployment opportunities of CAs. © The Author(s) 2023.",Bibliometric analysis; Chatbot; ChatGPT; Conversational agent; Generative artificial intelligence; Large language models; Voice assistant,81,Information Systems Frontiers,2024 406,Schwiderowski J.; Pedersen A.B.; Beck R.,Crypto Tokens and Token Systems,"Cyptographic tokens are one of the cornerstones of the new blockchain world but the knowledge about these digital objects is still limited. In this research, we argue that crypto tokens, cryptographically secured digital tokens connected to DLT systems, form socio-technical systems through their reciprocal relationship with their foundational DLT systems. We also argue that today’s crypto token systems evolved out of earlier physical and digital token systems, a socio-technical transition facilitated by changes in the wider socio-cultural, economic, and technical environment. Based on an extensive structured literature review as well as the application of text analytics methods to more than 506 blockchain whitepapers, we develop two results: a crypto token classification built around three crypto token archetypes, and a crypto token system taxonomy. Our findings are relevant for both blockchain researchers and practitioners alike by enhancing our understanding of complex blockchain systems. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Blockchain; Classification; Taxonomy; Token system; Tokens; Topic modelling,38,Information Systems Frontiers,2024 407,McCarthy S.; Ertiö T.; Fitzgerald C.; Kahma N.,Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model,"In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted actions. While digital technologies can support this goal, our understanding of energy practices in a private household context remains nascent. This challenge is amplified by the ‘invisible’ nature of users’ interaction with energy systems and the impact of unconscious habits. Our objective is to explore how touchpoints embedded in digital sustainability platforms shape energy-efficiency behaviours among users. Building on data from semi-structured interviews and a two-hour co-creation workshop with 25 energy experts in the ECO2 project, we first identify three user representations of relevance to such platforms: energy-unaware, living in denial, and energy-aware and active. Our findings suggest that ‘static’ user representations (based on user demographics and average consumption) are giving way to socio-cognitive representations that follow users’ journeys in energy efficiency. We then develop a set of design principles to promote sustainable energy behaviours through digital sustainability platforms across user-owned, social/external, brand-owned, and partner-owned touchpoints. An analysis of user feedback from the ECO2 project shows support for our design principles across users’ journeys. Of 62 respondents covering all three representations, 76% of them intended to “implement changes in terms of energy consumption and energy efficiency”. © The Author(s) 2024.",Digital sustainability; Energy efficiency; Green IS; Multimethod study; Touchpoints; User journeys; User representations,14,Information Systems Frontiers,2024 408,Abdel-Basset M.; Mohamed R.; Chang V.,"A Multi-Criteria Decision-Making Framework to Evaluate the Impact of Industry 5.0 Technologies: Case Study, Lessons Learned, Challenges and Future Directions","Smart technologies have demonstrated striking outcomes regarding the early diagnosis of diseases and the delivery of the necessary healthcare in the last decade. However, by emphasizing the core fundamentals of social justice and sustainability, together with digitalization and smart technologies that predicate raising productivity and flexibility, Industry 5.0 has proven to achieve more efficient results. Industry 5.0 technologies provide more intelligent ways for human employees and higher efficiency development while also improving safety and performance in many applications. In this research, the contribution is focused on the healthcare and how Industry 5.0 technologies demonstrate several advantages for the healthcare sector, starting with automated and precise disease prediction, moving on to aiding medical personnel in continual surveillance and monitoring and concluding with successful digital automation of smart equipment. The objective of this study is to apply a hybrid multi-criteria decision-making approach under a neutrosophic environment to evaluate the advantages of industry 5.0 technologies in the healthcare sector. Industry 5.0 primary value is to reach human-centric, sustainable, and resilient industries. While Industry 5.0 technologies sub-values regarding the healthcare sector are determined and distinguished according to the 3-main values mentioned previously based on literature. The methodologies applied in this study are: The Analytical Hierarchy approach (AHP) evaluates the main values and sub-values. Subsequently, the effectiveness of industry 5.0 technologies according to their values to the healthcare sector are ranked by Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The approach is constructed under uncertainty based on a neutrosophic environment to achieve accuracy in the evaluation process. The results show that the most influential technology in healthcare are AI and cloud computing, while nano-technology, drone technology, and robots are at the end of the ranking. While validating the suggested technique, outcome comparisons were carried out to demonstrate the benefits of the methodologies. A sensitivity study indicates that adjusting the weightings of the sub-values has no significant effect on the ranking of technologies. © The Author(s) 2024.",AHP; Healthcare; Industry 5.0; Multi-criteria decision-making; TOPSIS,50,Information Systems Frontiers,2025 409,Spence A.M.; Behar A.; Jayadev A.,Artificial Intelligence in the Age of Uncertainty: Michael Spence in Conversation with Anurag Behar and Introduced by Arjun Jayadev,[No abstract available],,0,Information Systems Frontiers,2024 410,de Waal H.; Nyawa S.; Wamba S.F.,Consumers’ Financial Distress: Prediction and Prescription Using Interpretable Machine Learning,"This paper shows how transactional bank account data can be used to predict and to prevent financial distress in consumers. Machine learning methods were used to identify the most significant transactional behaviours that cause financial distress. We show that Random Forest outperforms the other machine learning models when predicting the financial distress of a consumer. We obtain that Fees and Interest paid stand out as primary contributors of financial distress, emphasizing the significance of financial charges and interest payments in gauging individuals’ financial vulnerability. Using Local Interpretable Model-agnostic Explanations, we study the marginal effect of transactional behaviours on the probability of being in financial distress and assess how different variables selected across all the data point selection sets influence each case. We also propose prescriptions that can be communicated to the client to help the individual improve their financial wellbeing. This research used data from a major South African bank. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Classification; Consumer financial distress; Deep learning; Explainability; Machine learning,9,Information Systems Frontiers,2024 411,Ye D.; Liu M.J.; Luo J.; Yannopoulou N.,How to Achieve Swift Resilience: the Role of Digital Innovation Enabled Mindfulness,"Contributed to by the prevalence of digital technology, various cases of new ventures achieve resilience quickly despite experiencing hardship. Growing attention has been devoted to mindfulness—being alert and acting swiftly—to explain recovery. Scholars have primarily focused on mindful resource preparation pre-crisis. Nevertheless, how to mindfully organize resources as a crisis occurs remains under-explored. Based on an inductive study of a ride-sharing vehicle venture, which rapidly became an open service platform during the COVID-19 pandemic in China, we develop a framework termed “swift resilience” to understand how new ventures mindfully organize resources, driven by digital innovation. In particular, we critically trace three mechanisms—“data-driven stretching,” “collective sharing,” and “rapid pivoting”—and develop a process model to understand how new ventures build swift resilience. Our emerging findings shed light on the scholarship of organizational resilience, mindfulness, and digital entrepreneurship, and provide guidance to managers on achieving resilience quickly. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",Digital Innovation; Mindful Organizing; Mindfulness; Organizational resilience,32,Information Systems Frontiers,2024 412,Inan D.I.; Beydoun G.; Pradhan B.,Disaster Management Knowledge Analysis Framework Validated,"In Disaster Management (DM), reusing knowledge of best practices from past experiences is envisaged as the best approach for dealing with future disasters. But analysing and modelling processes involved in those experiences is a well-known challenge. But the efficient storage of those processes to allow reuse by others in future DM endeavours is even more challenging and less discussed. Without an efficient process in place, DM knowledge reuse becomes even more remote as the effort incurred gets construed as a hindrance to more pressing activities during the execution of disaster activities. Efficiency has to also be pursued without compromising the effectiveness of the knowledge analysis and reuse. It is important to ensure that knowledge remains meaningful and relevant after it is transformed. This paper presents and validates a DM knowledge analysis framework (DMKAF 2.0) that caters for efficient transformation of DM knowledge intended for reuse. The paper demonstrates that undertaking knowledge transformation and storage in the context of its use is crucial in DM for both, effectiveness and efficiency of the transformation process. Design Science Research methodology guides the research undertaken, by informing enhancements and how the framework is evaluated. A real case study of flood DM from the State Emergency Service of Victoria State Australia is successfully used to validate these enhancements. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Agent-Oriented Modelling; Disaster Management; Knowledge Analysis; Knowledge Management; Metamodeling,5,Information Systems Frontiers,2022 413,Asongu S.A.; le Roux S.,The Role of Mobile Money Innovations in the Effect of Inequality on Poverty and Severity of Poverty in Sub-Saharan Africa,"This study investigates the role of mobile money innovations in the incidence of income inequality on poverty and severity of poverty in 42 sub-Saharan African countries over the period 1980 to 2019. Mobile money innovations are understood as the mobile used to send money and the mobile used to pay bills online while income inequality is measured with the Gini index. Poverty is measured as the poverty headcount ratio while the severity of poverty is generated as the squared of the poverty gap index. The empirical evidence is based on interactive Quantile regressions. The following main findings are established. (i) Income inequality unconditionally reduces poverty and the severity of poverty though the significance is not throughout the conditional distributions of poverty and the severity of poverty. (ii) Mobile money innovations significantly moderate the positive incidence of income inequality on poverty and the severity of poverty in some quantiles. (iii) Positive net effects are apparent exclusively in the poverty regressions. (iv) Given the negative conditional effects, policy thresholds or minimum mobile money innovation levels needed to completely nullify the positive incidence of income inequality on poverty are provided: 27.666 (% age 15 +) and 24.000 (% age 15 +) of the mobile used to send money in the 50th and 75th quantiles, respectively and 16.272 (% age 15 +) and 13.666 (% age 15 +) of the mobile used to pay bills online in the 10th and 50th quantiles, respectively. Policy implications are discussed with respect of SDG1 on poverty reduction and SDG10 on inequality mitigation. © The Author(s) 2023.",Africa; Financial inclusion; G20; I10; I20; I32; Inequality; Mobile phones; O40; Poverty,20,Information Systems Frontiers,2024 414,Polyviou A.,Digital Responsibility in Metaverse Platforms: A Policy Perspective,"Metaverses enhance and intensify online interactions by seamlessly merging with physical experiences, unlocking a wide spectrum of opportunities and challenges. With the wider adoption of metaverses, diverse and dynamic platform ecosystems are expected to emerge. While these ecosystems hold significant potential for innovation and economic growth, they also raise ethical and societal challenges, thus highlighting the need for responsible governance. This paper addresses this need at the regional level. It focuses on the case of the European Union (EU) and its efforts to shape a vision for metaverse ecosystem governance. Drawing on stakeholder contributions from the EU’s open consultation and grounded in the Platform Assessment Framework (PAF), the study analyzes how responsibility is understood and managed in metaverse ecosystems. The findings show that responsibility in metaverse ecosystems must consider not only the needs of metaverse users, as emphasized by existing literature, but also those of other key actors, including platform owners and complementors. The paper proposes a framework for fostering responsible metaverse ecosystems through governance mechanisms, continuous monitoring, and design principles. It highlights that digital responsibility should consider both the development and diffusion phases of metaverse platforms. Moreover, it argues that ensuring responsibility in metaverse ecosystems should go beyond addressing societal implications and also aim at promoting market fairness. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Digital responsibility; Ethics; Inclusion; Market fairness; Metaverse ecosystems; Platform governance; Regional policy; Trust,1,Information Systems Frontiers,2025 415,Karvelas A.; Foufoulas Y.; Simitsis A.; Ioannidis Y.,Investigating Learning Join Order Optimization Strategies for Rule-based Data Engines,"A recent trend in data management research investigates whether machine learning techniques could improve or replace core components of traditional database architectures, such as the query optimizer or selectivity and cardinality cost estimators. The preliminary approaches leverage cost-based optimizers and cost models to avoid a cold-start as they train and build learning models. In this work, we investigate whether learning could also be beneficial in rule-based optimizers, which instead of driving query execution decisions via a cost model they rely on a set of fixed rules and pre-defined heuristics. Our experimental testbed employs MonetDB, an open-source, column-store analytics data engine, and explore whether a learning model using Graph Neural Networks (GNNs) that is trained on a cost-based engine, such as PostgreSQL, could improve MonetDB optimizer’s decisions. Our initial findings reveal that our approach could improve significantly MonetDB’s query execution plans, especially as the query complexity increases whet it involves many join operators. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Cost-based optimization; Graph neural networks; Join ordering; Machine learning; Proximal policy optimization; Query optimization; Query processing; Reinforcement learning; Rule-based optimization,2,Information Systems Frontiers,2024 416,Forresi C.; Francia M.; Gallinucci E.; Golfarelli M.,Cost-based Optimization of Multistore Query Plans,"Multistores are data management systems that enable query processing across different and heterogeneous databases; besides the distribution of data, complexity factors like schema heterogeneity and data replication must be resolved through integration and data fusion activities. Our multistore solution relies on a dataspace to provide the user with an integrated view of the available data and enables the formulation and execution of GPSJ queries. In this paper, we propose a technique to optimize the execution of GPSJ queries by formulating and evaluating different execution plans on the multistore. In particular, we outline different strategies to carry out joins and data fusion by relying on different schema representations; then, a self-learning black-box cost model is used to estimate execution times and select the most efficient plan. The experiments assess the effectiveness of the cost model in choosing the best execution plan for the given queries and exploit multiple multistore benchmarks to investigate the factors that influence the performance of different plans. © 2022, The Author(s).",Cost model; Multistore; NoSQL; Query optimization,6,Information Systems Frontiers,2023 417,Leon R.-D.; Rodríguez-Rodríguez R.; Gómez-Gasquet P.; Mula J.,Knowledge Sharing in an Insurance Collaborative Supply Chains Network: A Social Network Perspective,"Abstract This research analyses collaboration among members of an insurance supply chains network based on a social network analysis (SNA) approach. A case study strategy is employed, and data are collected from the firm’s accounts in an enterprise online social network via the Yammer® platform. Several SNA techniques (cohesion analysis, multidimensional scaling analysis, cluster analysis) are applied. Firstly, this paper emphasises who the most involved suppliers are and with whom they collaborate. Secondly, it confirms that collaboration appears both within and between supply chain levels. Thirdly, it highlights firms’ tendency to focus on the external environment. Suppliers are interested in not only collaborating with the focal firm, but also with other suppliers situated at the same or a different level. This work has implications for academics and practitioners as it presents a new approach to evaluate and improve collaboration among the members of a multilevel supply chains network. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Collaborative supply chains network; Enterprise social network; Insurance sector; Knowledge sharing; Social network analysis,9,Information Systems Frontiers,2024 418,Peng D.; Yu B.,TEA: Topic Information based Extractive-Abstractive Fusion Model for Long Text Summary,"Sequence-to-sequence (seq2seq) models are widely used in abstractive text summarization tasks. The decoder of the traditional model leverages attention mechanism to generate the summary by taking the hidden state of each word as the complete semantic information of the original text. However, the hidden state of an output word only contains the semantic information of the words before and after it, which means that the semantic information of the original text is not completely captured. As a result, the generated summary lacks the important information of the original text, which affects the accuracy and readability of the abstract. To address this issue, in this paper, TEA, a topic-information-based extractive and abstractive fusion model, is proposed to generate the summary. The model consists of two modules, the BERT-based extractive module and the seq2seq-based abstractive module. The extractive module conducts sequential annotation on sentence level while the abstractive module uses the pointer-generator network to generate the summary. In the process of generating the summary, combined with the attention mechanism based on the topic information, the TextRank algorithm is employed to select N keywords, and the similarity between the keywords and the original text is calculated through the attention function, which is regarded as the weight of the topic encoding in the attention mechanism. Experimental results on Chinese dataset show that, compared with the state-of-the-art text summarization models, our proposed model effectively improves the compatibility between the generated text summary and the original text, and summarizes the content of the original text better. Further, the values of ROUGE-1, ROUGE-2 and ROUGE-L are increased by 2.07%, 3.94% and 3.53%. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Abstractive model; Neural networks; Text summarization; Topic information,1,Information Systems Frontiers,2025 419,Bogea Gomes S.; Santoro F.M.; da Silva M.M.; Iacob M.-E.,Visualization of Digital Transformation Initiatives Elements through ArchiMate Viewpoints,"Digital transformation stems from a mix of personal and corporate IT environments and involves integrating digital technologies and business processes in a digital economy. As such, organizations expect that digital transformation improves performance, increases their reach, and ensures better business results. However, there is still a lack of (i) conceptual models to provide an accurate representation of the digital transformation elements; and (ii) standard visualizations of such elements to specific stakeholders. In a previous work, a reference model to support digital transformation initiatives using ArchiMate was proposed. In this paper, we address the second part of this problem regarding the need for specific visualizations. We followed the Design Science Research approach to learn how to identify the needs of the stakeholders, extending and improving the reference model through the design of a set of architectural viewpoints. We used the well-known ArchiSurance case to demonstrate the application of the viewpoints and semi-structured interviews to evaluate the proposal, providing insights to the discussion of the results obtained. © The Author(s) 2024.",ArchiMate; Business transformation; Digital transformation; Ontology; Reference model; Viewpoint,2,Information Systems Frontiers,2025 420,Lee E.; Kim J.-Y.; Kim J.; Koo C.,Information Privacy Behaviors during the COVID-19 Pandemic: Focusing on the Restaurant Context,"The acquisition of personal information has been generally accepted in the pandemic situation as an effective measure to prevent infection, while at the same time raising concerns regarding the infringement of personal privacy. The current study aimed to propose and empirically test a research model for restaurant customers on the disclosure of personal information in a pandemic situation. Privacy calculus theory and institutional theory were applied to theoretically explain the drivers/inhibitors and behavioral responses that affect disclosure of personal information. We verified that the most influential factor on intention to disclose was “perceived benefit”, followed by “government pressure” as another strong predictor. We present theoretical and practical implications for restaurant managers and policy agencies. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19; Information Disclosure; Institutional Theory; Privacy Calculus Theory; Threat Appraisal,12,Information Systems Frontiers,2023 421,Jozani M.; Liu C.Z.; Zhu H.; Liu L.; Choo K.-K.R.,A Network Analysis of Mobile App Top Chart Appearance and Survival,"In digital markets, consistent presence on top charts plays a critical role in determining a product’s economic success. We propose that both the appearance and ranking of an app on these charts are influenced by its structural position in the product network and its connections to already successful apps. Drawing on data from the Google Play Store, this study employs social network analysis and econometric modeling to investigate how product network attributes shape top chart appearance and performance. The results reveal that connections to top apps, the strength of these ties, and network centrality significantly enhance an app’s likelihood of appearing on top charts and achieving higher ranks. However, excessive proximity to other top-performing apps may sometimes dilute visibility and reduce competitive advantage. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Mobile App Market; Product Network; Recommendation System; Social Capital Theory; Top Chart,0,Information Systems Frontiers,2025 422,Li J.; Zhang Y.; Li J.; Du J.,The Role of Sentiment Tendency in Affecting Review Helpfulness for Durable Products: Nonlinearity and Complementarity,"The online review has become an important pillar in the decision-making process for purchasing experience products, especially durable goods with relatively high prices. Using a rich data set for automobiles, we quantify the sentiment tendency expressed in textual reviews, and empirically examine the nonlinearly inverted U-shaped relationship between customer satisfaction and sentiment tendency. We then investigate the nonlinear influences of review sentiment and depth on helpfulness. Furthermore, we study the relationship between numerical rating and text contents, i.e., sentiment tendency and review depth, in promoting the review helpfulness, and quantitatively identify the complementary effect of sentiment tendency. Our results indicate that both numerical ratings and sentiments expressed in text contents contribute to an increase in review helpfulness. Compared with polarized reviews, the neutral ones better benefit helpfulness and customer satisfaction. We also find that reviews with moderate depth are more helpful. Based on the empirical findings, we discuss several managerial implications for review system designers and consumers in the durable product market. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Customer satisfaction; Durable product; Inverted U-shape; Review depth; Review helpfulness; Sentiment tendency,19,Information Systems Frontiers,2023 423,Musa A.S.; Awan I.-U.; Zahrah F.,The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation,"Rapid technological advancement can substantially impact the processes of digital forensic investigation and present a myriad of challenges to the investigator. With these challenges, it is necessary to have a standard digital forensic framework as the foundation of any digital investigation. State-of-the-art digital forensic models assume that it is safe to move from one investigation stage to the next. It guides the investigators with the required steps and procedures. This brings a great stride to validate a non-specific framework to be used in most digital investigation procedures. This paper considers a new technique for detecting active peers that participate in a peer-to-peer (P2P) network. As part of our study, we crawled the µTorrent P2P client over ten days in different instances while logging all participating peers. We then employed digital forensic techniques to analyse the popular users and generate evidence within them with high accuracy. We evaluated our approach against the standard Analysis, Design, Development, Implementation, and Evaluation (ADDIE) model for the digital investigation to achieve the credible digital evidence presented in this paper. Finally, we presented a validation case for the ADDIE model using the United States Daubert Test and the United Kingdom’s Forensic Science Regulator Guidance – 218 (FSR-G-218) and Forensic Science Regulator Guidance – 201 (FSR-G-201) to formulate it as a standard digital forensic model. © The Author(s) 2022.",ADDIE Model; Digital Forensics; Investigation; Peer-to-Peer Network; Validation,0,Information Systems Frontiers,2024 424,Hamouda E.; ElHafsi M.; Son J.,Securing Network Resilience: Leveraging Node Centrality for Cyberattack Mitigation and Robustness Enhancement,"In response to the dynamic and ever-evolving landscape of network attacks and cybersecurity, this study aims to enhance network security by identifying critical nodes and optimizing resource allocation within budget constraints. We introduce a novel approach leveraging node centrality scores from four widely-recognized centrality measures. Our unique contribution lies in converting these centrality metrics into actionable insights for identifying network attack probabilities, providing an unconventional yet effective method to bolster network robustness. Additionally, we propose a closed-form expression correlating network robustness with node-centric features, including importance scores and attack probabilities. At the core of our approach lies the development of a nonlinear optimization model that integrates predictive insights into node attack likelihood. Through this framework, we successfully determine an optimal resource allocation strategy, minimizing cyberattack risks on critical nodes while maximizing network robustness. Numerical results validate our approach, offering further insights into network dynamics and improved resilience against emerging cybersecurity threats. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Centrality measure; Network security; Node detection; Optimization; Performance evaluation,5,Information Systems Frontiers,2024 425,Oredo J.; Dennehy D.,Exploring the Role of Organizational Mindfulness on Cloud Computing and Firm Performance: The Case of Kenyan Organizations,"The popularity and use of cloud computing has largely been driven by the reported benefits on firm performance. Despite this technology providing a paradigm shift in information technology (IT) services, the process through which the adoption of cloud computing effects organizational performance in the context of developing countries is still unclear. The aim of this study is to provide a theoretical discussion that advances our understanding about the mediating and moderating roles of organizational mindfulness in the context of cloud computing adoption and organizational performance. A research model is developed and tested using structural equation modelling. A firm level cross sectional survey was conducted on a sample of 180 organizations in the financial, manufacturing and IT sectors in Kenya. The findings reveal that organizations need to systematically develop mindfulness capabilities to benefit from the adoption of cloud, and IT innovations in general. The study has implications for research and practice. © 2022, The Author(s).",Adoption; Cloud computing; Firm performance; Organizational mindfulness,10,Information Systems Frontiers,2023 426,Pramanik A.; Sarker S.; Sarkar S.; Bose I.,FGI-CogViT: Fuzzy Granule-based Interpretable Cognitive Vision Transformer for Early Detection of Alzheimer’s Disease using MRI Scan Images,"Early detection of Alzheimer’s disease (AD) is crucial for timely intervention and management of this debilitating neurodegenerative disorder. However, it demands further serious attention. State-of-the-art vision transformers for multi-class AD detection techniques cannot handle the uncertainty issue arising between various stages of AD. Moreover, AD identification based on magnetic resonance imaging (MRI) scans is likewise computationally expensive. Further, vision transformers used in AD detection often suffer from a lack of interpretability of results. To address these issues, a new vision transformer, namely Fuzzy Granule-based Interpretable Cognitive Vision Transformer (FGI-CogViT) is developed. It has three parts, namely feature extraction, fuzzy logic-based granulation, and I-CogViT-based classification. Various vision and statistical features are computed over the MRI scan image(s). The statistical features are used to obtain the disease-prone regions in terms of fuzzy granules. In these regions, uncertainty may arise among the different stages of AD. Fuzzy logic-based rules are defined to obtain the crisp granules. Instead of considering the entire image, statistical features corresponding to the crisp granules are added with vision features for classification tasks through the I-CogViT that consists of three modules, namely residual network, traditional vision transformer, and classification network. These characteristics improve the speed and accuracy of FGI-CogViT. It synergizes the robust feature extraction capabilities of vision transformers with cognitive computing principles, aiming to augment the model’s interpretability. The efficacy of the FGI-CogViT has been demonstrated over 6,460 MRI scan images. Results reveal that FGI-CogViT outperforms some state-of-the-art. Furthermore, robustness checking and statistical significance testing support the findings. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Alzheimer disease detection; Cognitive vision transformer; Interpretability; Markov tree; MRI scan,4,Information Systems Frontiers,2024 427,He Y.; Xin T.; Luo C.,Enhancing Cybersecurity Investment with FAIR-ROSI: A Responsible Cybersecurity Approach to Digital Society,"Investment in cybersecurity is critical to protect information system security, preserve organizational interests, and fulfil social responsibilities. However, due to the lack of a transparent process, investors often struggle to assess the effectiveness of their investments. Traditional return on security investment (ROSI) can be considered as an economic indicator which reflects investment efficiency, but it often emphasizes investment costs and anticipated returns while overlooks cybersecurity related metrics. This paper proposes the FAIR-ROSI model that integrates five qualitative and quantitative cybersecurity metrics with the Factor Analysis of Information Risk (FAIR) model. It combines practical qualitative and quantitative indicators to enhance the granularity of the traditional ROSI model. We then use a case study to evaluate the FAIR-ROSI model. The results from pre and post control measures shows a narrow margin between actual and projected loss values and a significantly higher ROI compared to the total security expenditure. © The Author(s) 2025.",Cybersecurity Qualitative Metrics; Cybersecurity Quantitative Metrics; Factor Analysis of Information Risk (FAIR); FAIR-ROSI Model; Return on Security Investment (ROSI); Risk Assessment,1,Information Systems Frontiers,2025 428,Albrecht T.; Baier M.-S.; Gimpel H.; Meierhöfer S.; Röglinger M.; Schlüchtermann J.; Will L.,Leveraging Digital Technologies in Logistics 4.0: Insights on Affordances from Intralogistics Processes,"Emerging digital technologies are transforming logistics processes on a large scale. Despite a growing body of knowledge on individual use cases ranging from collaborative robots to platform-based planning systems in the frontline industrial development of Logistics 4.0, organizations lack a systematic understanding of the opportunities digital technologies afford for logistics processes. To foster such understanding, this study takes an intra-organizational perspective as a central starting point for digitalization initiatives toward Logistics 4.0. It synthesizes current academic research and industrial insights from a systematic literature review and an expert interview study through an affordance lens. The result is a catalog and conceptual framework of ten digital technology affordances in intralogistics (DTAILs) and 46 practical manifestations. Thereby, this study contributes to understanding and leveraging the opportunities digital technologies afford in a leading-edge information systems application domain. It serves as a foundation for further theorizing on Logistics 4.0 and for structuring strategic discussions among organizational stakeholders. © The Author(s) 2023.",Affordance theory; Digital technology; Industry 4.0; Logistics 4.0; Logistics process; Supply chain management,28,Information Systems Frontiers,2024 429,Madan R.; Ashok M.,Making Sense of AI Benefits: A Mixed-method Study in Canadian Public Administration,"Public administrators receive conflicting signals on the transformative benefits of Artificial Intelligence (AI) and the counternarratives of AI’s ethical impacts on society and democracy. Against this backdrop, this paper explores the factors that affect the sensemaking of AI benefits in Canadian public administration. A mixed-method research design using PLS-SEM (n = 272) and interviews (n = 38) tests and explains the effect of institutional and consultant pressures on the perceived benefits of AI use. The quantitative study shows only service coercive pressures have a significant effect on perceived benefits of AI use and consultant pressures are significant in generating all institutional pressures. The qualitative study explains the results and highlights the underlying mechanisms. The key conclusion is that in the earlier stages of AI adoption, demand pull is the main driver rather than technology push. A processual sensemaking model is developed extending the theory on institutions and sensemaking. And several managerial implications are discussed. © The Author(s) 2024.",Artificial Intelligence; Institutional pressures; Institutional theory; Public administration; Sensemaking,16,Information Systems Frontiers,2025 430,Jiang M.; Qiang F.; Xu L.D.; Zhang B.; Sun Y.; Cai H.,Multilingual Interoperation in Cross-Country Industry 4.0 System for One Belt and One Road,"For the multilingual interoperation in cross-country industrial systems, character recognition is a research issue that can largely facilitate the automatic information integration of an enormous number of forms, but has not been well resolved. Character recognition using the deep convolutional neural network depends on large scale training data collection and labor-intensive labeling work to train an effective model. Synthetic data generation and data augmentation are the typical means to compensate for the scarcity of labeled training data. However, the domain shift between synthetic data and real data inevitably results in unsatisfying recognition accuracy, bringing a significant challenge. To alleviate such an issue, a recognition system with enhanced two-phase transfer learning is proposed to utilize unlabeled real data in existing industrial forms. In the framework, massive training data are generated automatically with a configurable font and character library. A proposed convolutional neural network suitable for character recognition is pre-trained with the generated training data as the source model. In the first transfer phase, the source model is adapted to the target model with real samples of a specific writing style in an unsupervised manner. In the second supervised transfer phase, the target model is further optimized with a few labels available. The recognition application is described based on the target model. The effectiveness of the proposed enhanced two-phase model transfer method is validated on the public dataset as the target domain data through systematic experiments. Furthermore, a comparison with related works is provided to show the transferability and efficiency of the proposed framework. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Convolutional neural network; Digitization of industrial forms; Industrial informatics; Multilingual interoperation; Transfer learning,4,Information Systems Frontiers,2024 431,Simona T.; Taupo T.; Antunes P.,A Scoping Review on Agency Collaboration in Emergency Management Based on the 3C Model,"Most emergency responses involve collaborative efforts from teams operating in the field and in the backstage. Collaboration within and across agencies should therefore be regarded as an essential service in emergency management. We propose a conceptual lens to analyse the technological support to collaboration services in emergency management. The proposed lens is based on the 3C Model, which regards collaboration services as the articulation and composition of three other services: communication, coordination and cooperation. Using this lens, we conduct a scoping literature review of the emergency management domain. The review contributes to better understand the relationships between collaboration services and technology support in emergency management. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",3C model; Collaboration model; Collaboration services; Emergency management,10,Information Systems Frontiers,2023 432,Rathi M.; Majumdar A.; Rathi S.,Unraveling Prosumption Behavior for Online Reviews during Environmental Uncertainty: A Stimulus-Response Perspective,"Online reviews are effective information-sharing tools due to their word-of-mouth characteristics. The extant literature has considered reviews as independent variables that influence business performance, while the environmental factors shaping these reviews remain under-explored. We examine the impact of COVID-19-related environmental uncertainties on changes in review prosumption (production and consumption) behavior. Based on the stimulus-response theory, with COVID-19 as the stimulus and prosumption as the response, we examined the changes in the characteristics of online reviews. Using the difference-in-differences methodology, we analyze online reviews of restaurants in two US cities that experienced different levels of COVID-19 impact. On the production side, we find an increased use of contextual terms and negative sentiments. On the consumption side, we find an increase in review usefulness and a decline in funniness. The results are robust, supported by coarsened exact matching and falsification tests. We conclude with a discussion of the study’s implications and contributions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Difference-in-differences; Environmental shock; Online reviews; Stimulus-response; Text mining,2,Information Systems Frontiers,2025 433,Laato S.; Mäntymäki M.; Islam A.K.M.N.; Hyrynsalmi S.; Birkstedt T.,Trends and Trajectories in the Software Industry: implications for the future of work,"In this study, we explore prominent contemporary technology trajectories in the software industry and how they are expected to influence the work in the software industry. Consequently, we build on cultural lag theory to analyze how technological changes affect work in software development. We present the results from a series of expert interviews that were analyzed using the Gioia method. Moreover, we identify a set of technology trends pertinent to software development from which we derive four main changes affecting the future of work in software development: (1) a shift toward scalable solutions, (2) increased emphasis on data, (3) convergence of IT and non-IT industries, and (4) the cloud as the dominant computing paradigm. Accordingly, this study contains insights into how technology (as an element of material culture) influences non-material culture, as exemplified by the work involved in software development. © 2022, The Author(s).",Changing nature of work; Cultural lag; Cultural lag theory; Digital transformation; Future of work; Software development; Software industry,29,Information Systems Frontiers,2023 434,Casalino G.; Castellano G.; Pasquadibisceglie V.; Zaza G.,Improving a Mirror-based Healthcare System for Real-time Estimation of Vital Parameters,"Contactless methods are widely used to measure vital signs from recorded or live videos using remote photoplethysmography (rPPG), which takes advantage of the slight skin color variation that occurs periodically on specific body regions with each blood pulse. However, existing rPPG-based solutions are typically expensive and not suitable for daily use at home for personal healthcare. To address this issue, we have recently developed a low-cost device that allows for the real-time estimation of vital signs using rPPG and can be easily integrated into any common home environment. The device consists of a smart mirror equipped with a camera that captures facial videos and extracts rPPG signals by processing video frames. One major limitation of this solution was its high sensitivity to abrupt head movements during video acquisition. This paper presents some advancements in the development of our smart device aimed at obtaining a more robust measurement of vital signs. Experimental results on live videos show that the new version of our system overcomes the limitations of the previous version, offering a more stable performance. Moreover, the new methodology shows improved performance compared to other state-of-the-art rPPG algorithms when tested on pre-recorded in-house videos from the UBFC-RPPG database. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Contact-less monitoring; Heart rate measurement; Oxygen saturation measurement; Personal healthcare; Photoplethysmography; Video processing,4,Information Systems Frontiers,2025 435,Zhu N.; Chen B.; Wang S.; Teng D.; He J.,Ontology-Based Approach for the Measurement of Privacy Disclosure,"Privacy protection has received a lot of attention in recent years since in the era of big data, abundant information about individuals can be easily acquired. Meanwhile, as a prerequisite for effective privacy protection, the measurement of privacy disclosure is essential. Although some work has been done on the evaluation of privacy disclosure via quantification for the protection of privacy, not much attention has been placed on exploring the relationships between privacy information, resulting in underestimation, if not ill-formed reasoning, of privacy disclosure. In this paper, we propose an ontology-based approach to measure privacy disclosure by exploring the relationships between privacy information based on the WordNet. We first propose an algorithm for deriving or measuring privacy disclosure based on a set of words or concepts from text data related to individuals to ensure that the disclosure of certain user privacy can still be deduced and measured even if the set of words or concepts don’t seem to be much related to it. We then perform a set of experiment by applying the proposed algorithm to some public information of ten public figures from different walks of life to evaluate the effectiveness of the algorithm and to shed some light on the characteristics of privacy disclosure in the real world in the era of big data. The work can thus serve as the foundation for the development of mechanisms for limiting or reducing privacy disclosure to achieve better protection of individual privacy. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.","Ontology; Privacy; Privacy disclosure, privacy quantification",6,Information Systems Frontiers,2022 436,Singh V.; Nanavati B.; Kar A.K.; Gupta A.,How to Maximize Clicks for Display Advertisement in Digital Marketing? A Reinforcement Learning Approach,"One of the core challenges in digital marketing is that the business conditions continuously change, which impacts the reception of campaigns. A winning campaign strategy can become unfavored over time, while an old strategy can gain new traction. In data driven digital marketing and web analytics, A/B testing is the prevalent method of comparing digital campaigns, choosing the winning ad, and deciding targeting strategy. A/B testing is suitable when testing variations on similar solutions and having one or more metrics that are clear indicators of success or failure. However, when faced with a complex problem or working on future topics, A/B testing fails to deliver and achieving long-term impact from experimentation is demanding and resource intensive. This study proposes a reinforcement learning based model and demonstrates its application to digital marketing campaigns. We argue and validate with actual-world data that reinforcement learning can help overcome some of the critical challenges that A/B testing, and popular Machine Learning methods currently used in digital marketing campaigns face. We demonstrate the effectiveness of the proposed technique on real actual data for a digital marketing campaign collected from a firm. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Big data analytics; Computational advertising; Digital marketing; Machine learning; Marketing analytics; Reinforcement learning; Upper confidence bound (UCB) algorithm,52,Information Systems Frontiers,2023 437,Chatterjee S.; Chaudhuri R.; Vrontis D.,"Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives","Domestic robots, also known as companion robots or social robots, are physical humanoid robots. They connect with online platforms which enhance their functionalities, such as voice and emotion recognition, human facial recognition, along with other Artificial Intelligence (AI) related capabilities make them special. People’s perceptions of robots are changing rapidly. The market for domestic robots is expected to grow exponentially over the next few years. As the use of domestic robots increases, people perceive different kinds of security, privacy, and legal issues with their usage. Few studies have focused on these issues. This study has attempted to understand users’ intention to use robots for household purposes and focuses on their perceptions about security, privacy, and legal issues. Reviewing the literature and the theories helped us to develop the conceptual model. The model has been validated by PLS-SEM technique. The study finds that privacy and security concerns affect households use of domestic robots. The study also finds that few people are aware of legal implications. Also, the study reveals that people expect to get many benefits from using robots for household purposes. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Domestic robot; Hedonic attitude; Privacy; Security; Use behavior; Utilitarian attitude,84,Information Systems Frontiers,2024 438,Bawack R.E.; Kamdjoug J.R.K.; Dennehy D.,Digital Platform Continuance During the Great Resignation: Evidence from Knowledge Workers in Europe and Africa,"As countries emerged from the Covid-19 pandemic, management teams faced the challenges of supporting their employees to return to the traditional office work environment, adopting hybrid work modes to ensure business continuity, and creating work conditions conducive to personal well-being. Despite the critical role of digital platforms during the pandemic, there is limited understanding of the role of digital platform continuance to retain employees during the Great Resignation phenomenon. To address this gap, this study focuses on organisational support as there is growing recognition of its importance in digital platform continuance. Using partial least square algorithms, we used the organisational support theory and information systems (IS) continuance literature to derive a research model tested on data collected from 447 knowledge workers across central Europe and Africa. The results show that management-by-objective (MBO) and support from direct managers are essential determinants of knowledge workers’ post-crisis digital platform continuance intentions. The perceived usefulness of digital platforms mediates the effect of direct manager support on digital platform continuance. We discuss how the results could extend organisational level IS continuance research and help organisations develop strategies to retain employees in this post-crisis work-related phenomenon. © The Author(s) 2023.",Digital platform; Information system continuance; Organisational Support; Post-crisis; Remote work,4,Information Systems Frontiers,2024 439,Teixeira R.; Antunes M.; Gomes D.; Aguiar R.L.,Comparison of Semantic Similarity Models on Constrained Scenarios,"The technological world has grown by incorporating billions of small sensing devices, collecting and sharing large amounts of diversified data over the new generation of wireless and mobile networks. We can use semantic similarity models to help organize and optimize these devices. Even so, many of the proposed semantic similarity models do not consider the constrained and dynamic environments where these devices are present (IoT, edge computing, 5g, and next-generation networks). In this paper, we review the commonly used models, discuss the limitations of our previous model, and explore latent space methods (through matrix factorization) to reduce noise and correct the model profiles with no additional data. The new proposal is evaluated with corpus-based state-of-the-art approaches achieving competitive results while having four times faster training time than the next fastest model and occupying 36 times less disk space than the next smallest model. © The Author(s) 2022.",Constrained datasets; Distributional profiles; IoT; NGN; Semantic Similarity; Word embeddings,7,Information Systems Frontiers,2024 440,Vassilakopoulou P.; Hustad E.,Bridging Digital Divides: a Literature Review and Research Agenda for Information Systems Research,"Extant literature has increased our understanding of the multifaceted nature of the digital divide, showing that it entails more than access to information and communication resources. Research indicates that digital inequality mirrors to a significant extent offline inequality related to socioeconomic resources. Bridging digital divides is critical for sustainable digitalized societies. Ιn this paper, we present a literature review of Information Systems research on the digital divide within settings with advanced technological infrastructures and economies over the last decade (2010–2020). The review results are organized in a concept matrix mapping contributing factors and measures for crossing the divides. Building on the results, we elaborate a research agenda that proposes [1] extending established models of digital inequalities with new variables and use of theory, [2] critically examining the effects of digital divide interventions, and [3] better linking digital divide research with research on sustainability. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Digital divide; Digital inequalities; Digitalization; Information systems research; Sustainability,353,Information Systems Frontiers,2023 441,Sharma S.K.; Mishra A.,Enablers and Inhibitors of Mobile Payments in Rural India: a Dual-Factor Theory Perspective,"This study aims to address the scant research on emerging economies, especially the rural population, which are expected to drive the significant growth of mobile payment services. We developed a research model using dual-factor theory as an overarching umbrella by considering the users’ perception of both enablers and inhibitors of mobile payments. The enablers and inhibitors of mobile payments were drawn from the extant literature, driving users’ satisfaction and leading to continued usage. To test the proposed research model, we collected responses from 412 respondents from rural settings in India. The study finds that the enablers positively affect satisfaction, and the impact of inhibitors was negative. The findings validate the importance and existence of inhibitors along with enablers of mobile payments. The findings would benefit the government, policymakers, marketers, and other stakeholders interested in digitization of the rural economy, empowerment of rural people, and rural market penetration. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Continued usage; Dual factor theory; Empowerment theory; Expectation confirmation theory; Mobile payment adoption; Satisfaction,17,Information Systems Frontiers,2023 442,Jha A.K.; Verma N.K.,Social Media Sustainability Communication: An Analysis of Firm Behaviour and Stakeholder Responses,"Social media communication, and its impact on individuals and firms, is becoming increasingly important in today’s age. Firms are utilizing social media channels for communicating their sustainability-related initiatives. The role of social media as a mode for sustainability-related communication by firms has not been widely analyzed in the extant information systems literature. Given the increasingly important role of social media for information diffusion as well as increasing awareness for sustainability practices, this is a critical area of research. In this paper, we use an analytic model to theorize, coupled with empirical analysis to test the impact of firms’ sustainability practices. We have validated our proposed hypotheses using an empirical model based on panel data of firms’ sustainability performance and their Twitter communication over a 3-year period. Through our unique mixed-method study, we add additional methodological rigour to extant social media-based research in the information systems domain. Our research has significant theoretical and managerial significance as we identify how firms utilize social media for sustainability-related communication and its corresponding impact on customer response. Our research provides actionable insights for policymakers, firms as well as investors and consumers on understanding and managing sustainability-related communications on social media. © 2022, The Author(s).",Analytical model; Social media communication; Sustainability; Twitter,34,Information Systems Frontiers,2023 443,Rajesh R.,A Grey Combined Prediction Model for Medical Treatment Risk Analysis during Pandemics,"The role of information systems (IS) were widely discoursed during the spread of the COVID-19 outbreak. We have focused on developing a decision support systems (DSS) based on a combined prediction model, that can essentially be used at the start of any pandemic. Convalescent plasma therapy is generally applied during the spread of a pandemic as a therapy method that transfuses blood plasma from the people, who have recovered from an illness to treat critical cases. We observe, analyse, and predict the risks associated with the treatment effects of convalescent plasma therapy on COVID-19 patients. Based on the secondary data, we build a prediction model to evaluate and predict the trends in the clinical characteristics and laboratory findings for critically ill patients infected with COVID-19 and treated with convalescent plasma. Here, we use a combined prediction model utilizing three models; the grey prediction model (GM (1, 1)), the residual prediction model (residual GM (1, 1)), and a back propagation artificial neural network (BP-ANN) based residual sign prediction model. Also, a validation of the results of the study has been presented at two levels. On analysis of the results from the prediction model, it is observed that the convalescent plasma therapy can show progressive signs on COVID-19 infected patients. Health practitioners can understand, analyze, and predict the potential risks of convalescent plasma therapy based on the proposed model. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",COVID-19; Grey Prediction; Pandemics; Plasma Therapy; Risk Analysis,3,Information Systems Frontiers,2025 444,Zhang L.; Wang L.; Zhu Y.,Impact of Social Networks on Digital Credit Assessment for Rural Residents: A Study using Machine Learning Methods,"Social networks have gained widespread attention as an alternative data source for credit assessment. This study constructs a social network credit dataset using real microcredit data from rural China, examining the role of network information in rural residents’ digital credit assessment from both risk disclosure and risk prediction perspectives. The findings show that social network information complements traditional credit information, and residents with higher centrality tend to have lower default probabilities. Integrating social network features into machine learning-based credit assessment models enhances the accuracy of rural residents’ credit evaluations, particularly improving the identification of non-defaulters among thin-file and subprime borrowers. These findings provide valuable insights into the combination of traditional credit information with alternative data sources, enabling more accurate and inclusive credit assessments in rural areas. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Credit assessment; Machine learning; Rural digital credit; Social networks,1,Information Systems Frontiers,2025 445,Soto Setzke D.; Riasanow T.; Böhm M.; Krcmar H.,Pathways to Digital Service Innovation: The Role of Digital Transformation Strategies in Established Organizations,"Digital technologies are radically changing how established organizations design novel services. Digital transformation (DT) strategies are executed to manage the transition from product-centric to service-centric business models based on digital technologies. However, little is known about what configurations of DT strategies lead to successful digital service innovation (DSI) in established organizations. We employ fuzzy-set Qualitative Comparative Analysis on a set of 17 case studies of DT strategies from established organizations with different industry backgrounds. We identify several distinct configurations of DT strategies that lead to successful and unsuccessful DSI. Based on these configurations, we deduce that the threat of digital disruption negatively impacts an organization’s innovation activities. Furthermore, we find that strategic partnerships can be leveraged by organizations that face an imminent threat of digital disruption while organizations with competitive advantages may rely on “do-it-yourself” approaches. Lastly, we find that the involvement of a C-level executive is a necessary requirement for successful DSI. Our results contribute to theory by integrating research on DSI and DT, providing a perspective on DSI failure, and employing a configurational research approach that allows us to highlight interdependencies between factors as well as insights into the individual factors. Furthermore, we provide actionable recommendations for executives. © 2021, The Author(s).",Digital service innovation; Digital transformation; Digital transformation strategies; Qualitative comparative analysis; Radical service innovation,157,Information Systems Frontiers,2023 446,Goldberg D.M.; Deane J.K.; Rakes T.R.; Rees L.P.,3D Printing Technology and the Market Value of the Firm,"3D printing, sometimes known as additive manufacturing or digital direct manufacturing, is an innovative manufacturing technology that has gained notoriety recently. However, despite the promising potential and popularity of the technology, there is not yet evidence of the shareholder value implications of firms’ commitments to 3D printing. In this paper, we assess the effects on shareholder wealth of 3D printing-related announcements for publicly traded firms from 2011 to 2017. We find that the stock market places significantly positive value on announcements associated with rapid prototyping or ad hoc customization applications, while the reaction to announcements related to the use of 3D printing technology for mass production was far less enthusiastic. For firms faced with the decision of whether to implement 3D printing in their manufacturing processes, our findings suggest that the market greatly values 3D printing in several important contexts, but the technology is not a universal panacea. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",3D printing; Additive manufacturing; Customization; Event study; Financial management; Rapid prototyping,13,Information Systems Frontiers,2022 447,Choudrie J.; Zamani E.; Obuekwe C.,Bridging the Digital Divide in Ethnic Minority Older Adults: an Organisational Qualitative Study,"This paper aims to explore and understand the digital divide in older adults when accepting and using smart devices within an organization. Using an in-depth single case study, the digital divide is explored and understood using technology-mediated learning for older adults when using smart devices; ie. tablet devices. The case study is based on a group of educated, older Indian adult volunteers at a local Punjabi radio station. A qualitative approach used the data collection techniques of interviews, observations, informal conversations and reference to archival documents and interpretivism for analysis. Our findings revealed that older adults with ailments have shorter lives, contrary to popular perception, can be very active in their communities, are able to use basic IT and are willing to use technology when it leads to significant tangible or intangible benefits without considering the remaining time of their lives. Contributions for policymakers and industry are also offered in this paper. © 2021, The Author(s).",Internet self-efficacy; Interpretivism; Learning models; Older adults; Qualitative study,34,Information Systems Frontiers,2022 448,Yuan S.; Das S.; Ramesh R.; Qiao C.,Availability-Aware Virtual Resource Provisioning for Infrastructure Service Agreements in the Cloud,"Service availability is a key construct in Service Level Agreements (SLA) between a cloud service provider and a client. The provider typically allocates backup resources to mitigate the risk of violating the SLA-specified uptime guarantee. However, initial backups may need to be adjusted in response to real-time failure and recovery events. In this study, we first develop a recurrent intervention at fixed intervals (RIFI) strategy that allows the provider to adjust the allocation of backup resources such that the expected total cost is minimized. Next, we focus on the limit to number of interventions, starting from single intervention strategy, as frequent reallocations may be operationally disruptive. Particularly, we provide a cost minimization approach to guide the service providers in their virtual resources management, and a specific downtime minimization approach for more mission-critical applications as a more aggressive alternative. We present computational results exploring the impact of intervention on the likelihood of SLA violation for the rest of the contract period, and evaluate parameters such as time and quantum of resource level adjustment, penalty levels desired by clients, and their influences on the backup resource provisioning strategies. We also validate our models through the analysis of use cases from Amazon Elastic Compute Cloud. Finally, we summarize this study by providing key practical managerial implications for resource deployment in the availability-aware cloud. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cloud computing; Resource adjustment; Resource provisioning; SLA,3,Information Systems Frontiers,2023 449,Marikyan D.; Papagiannidis S.; Alamanos E.,Cognitive Dissonance in Technology Adoption: A Study of Smart Home Users,"This study aims to address a research gap related to the outcomes of the use of technology when the performance falls short of initial expectations, and the coping mechanisms that users may deploy in such circumstances. By adopting Cognitive Dissonance Theory, the objectives of the study are a) to examine how dissonance, caused by the negative disconfirmation of expectations, may translate into a positive outcome and b) study how negative emotions, such as anger, guilt and regret, determine the selection of the mechanism to reduce dissonance. The theorised model was tested using a cross-sectional research design and a sample of 387 smart home users. The focus on smart home users fitted the objectives of the study due to the high expectations that users form and the challenges that the utilisation of technology sometimes causes. The collected data was analysed using structural equation modelling. Findings indicate that post-disconfirmation dissonance induces feelings of anger, guilt and regret, correlating with dissonance reduction mechanisms, which in turn have a distinctive effect on satisfaction and wellbeing. The findings of the study contribute to the discussion on expectation-disconfirmation and cognitive dissonance, by illustrating the interrelationship between emotional, cognitive and behavioural factors following the evaluation of technology performance and confirming that negative disconfirmation may result in satisfaction. © 2020, The Author(s).",Cognitive dissonance; Coping mechanisms; Digitalisation; Smart homes; Wellbeing,110,Information Systems Frontiers,2023 450,Vithayathil J.; Choudhary V.,Organizational Structure for the IT Department: Profit Center or Cost Center?,"Why do some firms organize their IT departments as profit centers whereas other firms organize IT as a cost center? These commonly employed organizational structures are characterized by information asymmetry and decision rights afforded to the IT department. The complexity of IT and its ongoing rapid evolution lead to information asymmetry where the IT department has private information about technology and cost, and the consuming departments have private information about demand. Under the cost center organizational structure, the firm sets the quality and number of IT services offered by the IT department. Whereas under a profit center structure, the IT department makes decisions on quality, price and variety of IT services. We find that the quality of IT services under the cost center decreases with greater uncertainty in demand for IT services. We also find that the cost center structure can offer higher quality IT services than the profit center structure, and consumption of IT services can be higher under the profit center structure. The preferred organizational structure does not always provide greater variety of IT services than the alternate structure. The cost center is preferred when the marginal cost of IT services is sufficiently low, or the fixed cost of quality is sufficiently high. © 2022, The Author(s).",Chargeback; Cost center; Information technology; IT; IT governance; Profit center,7,Information Systems Frontiers,2022 451,Gonsior J.; Falkenberg C.; Magino S.; Reusch A.; Hartmann C.; Thiele M.; Lehner W.,Comparing and Improving Active Learning Uncertainty Measures for Transformer Models by Discarding Outliers,"Despite achieving state-of-the-art results in nearly all Natural Language Processing applications, fine-tuning Transformer-encoder based language models still requires a significant amount of labeled data to achieve satisfying work. A well known technique to reduce the amount of human effort in acquiring a labeled dataset is Active Learning (AL): an iterative process in which only the minimal amount of samples is labeled. AL strategies require access to a quantified confidence measure of the model predictions. A common choice is the softmax activation function for the final Neural Network layer. In this paper, we compare eight alternatives on seven datasets and show that the softmax function provides misleading probabilities. Our finding is that most of the methods primarily identify hard-to-learn-from samples (commonly called outliers), resulting in worse than random performance, instead of samples, which actually reduce the uncertainty of the learned language model. As a solution, this paper proposes Uncertainty-Clipping, a heuristic to systematically exclude samples, which results in improvements for most methods compared to the softmax function. © The Author(s) 2024.",Active Learning; Calibration; Deep Neural Networks; Softmax; Transformer; Uncertainty,1,Information Systems Frontiers,2024 452,Park S.; Moon J.; Rhee C.; Choe Y.-C.,Understanding Online Music Piracy Behavior via Private Communication Channels,"In this study, we developed and tested a theoretical model to understand online music piracy behavior via email and instant messaging. We developed this theoretical model by drawing on a comprehensive literature review on music piracy, theory of reasoned action, social identity, and the deterrence theory. We collected primary data to test the hypotheses, and the results from the partial least squares analyses suggest attitude toward music file-sharing behavior and social identity positively affect intention to pirate music, whereas the perceived severity and certainty of punishment do not have significant effects on the attitude. The findings highlight the important role of social identity when a theoretical model with the concept explains music file-sharing behavior without monetary benefits in return. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Deterrence theory; Digital piracy; Music file-sharing behavior; Social identity,2,Information Systems Frontiers,2023 453,Basu B.; Sebastian M.P.; Kar A.K.,What Affects User Experience of Shared Mobility Services? Insights from Integrating Signaling Theory and Value Framework,"Shared services using digital platforms have increasingly gained prominence in recent times. Existing studies have studied several facets of ride-sharing services, but mobile app technology’s impact on user’s experience has not been explored meticulously. We attempt to study the technological artifacts which can signal about the capability of the service and thereby, reducing the informational asymmetry, stemming from lack of information and in-person communication. To address that, we adopt the Signaling Theory and Value Framework to understand the apps’ features, reflecting the shared mobility service quality to the users. We mine 212,000 and 150,000 user reviews on India’s two most extensively used shared mobility services- OLA and UBER, respectively and identify the factors affecting user experiences. We provide a novel framework by mapping these factors to theoretical lexicons. Multiple regression models show that time resources, monetary resources, perceived information protection, app usage controllability, perceived safety in e-payment mechanism, informational trust-related advantage, and participation in decision making influence the user experience of both the services significantly. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Shared mobility apps; Sharing economy; Signaling theory; Text mining; User experience; User generated contents; Value theory,1,Information Systems Frontiers,2025 454,Filelis-Papadopoulos C.K.; Kirshner S.N.; O’Reilly P.,Sustainability with Limited Data: A Novel Predictive Analytics Approach for Forecasting CO2 Emissions,"Unforeseen events (e.g., COVID-19, the Russia-Ukraine conflict) create significant challenges for accurately predicting CO2 emissions in the airline industry. These events severely disrupt air travel by grounding planes and creating unpredictable, ad hoc flight schedules. This leads to many missing data points and data quality issues in the emission datasets, hampering accurate prediction. To address this issue, we develop a predictive analytics method to forecast CO2 emissions using a unique dataset of monthly emissions from 29,707 aircraft. Our approach outperforms prominent machine learning techniques in both accuracy and computational time. This paper contributes to theoretical knowledge in three ways: 1) advancing predictive analytics theory, 2) illustrating the organisational benefits of using analytics for decision-making, and 3) contributing to the growing focus on aviation in information systems literature. From a practical standpoint, our industry partner adopted our forecasting approach under an evaluation licence into their client-facing CO2 emissions platform. © The Author(s) 2024.",Airlines; Analytics; Carbon emissions; Climate change; Forecasting,6,Information Systems Frontiers,2025 455,Marjanovic O.; Kovacevic-Opacic L.,The ‘How’ of Digital Transformation: Understanding the Micro-Processes of Digital Transformation Strategising and Internal Platformisation Coevolution,"This study contributes to emerging research on ‘the how’ of Digital Transformation (DT). Focusing on internal digital platforms, it aims to investigate how DT unfolds through mutual shaping of DT strategising and internal platformisation processes. It seeks to understand the (often hidden) micro-processes through which this mutual shaping unfolds. Based on the research insights from three case studies, interpreted through the lens of coevolution theory, we propose a theoretical model of mutual shaping of DT strategising and internal platformisation as a coevolution process that unfolds through six types of micro-processes, which are identified and theoretically explained. This research contributes to DT literature in IS by advancing the ‘how’ of DT involving internal digital platforms as well as to the coevolution theory by proposing a novel concept of anticipatory adaptation. The main practical contribution is in making visible the often-hidden inner working of DT involving internal platforms, so that it could be analysed, improved and implemented in different organisational contexts. © The Author(s) 2025.",Coevolution; Digital Transformation; Digital Transformation Strategising; Internal Digital Platforms; Micro-processes; Multi-case Study Research,0,Information Systems Frontiers,2025 456,Vasist P.N.; Krishnan S.; Azad N.; Mekoth N.,A Comparison of ‘Organizing Forces’ on Reddit and YouTube Networks: Insights From the France Riots of 2023,"Social networks are highly effective in mobilizing individuals toward collective action. However, such endeavors to rally large groups risk escalating into violent actions, eroding social unity and provoking societal unrest. The information consumption patterns vary considerably across different platforms through which it is disseminated, with platform-specific characteristics significantly impacting how users interact and disseminate information. Nevertheless, this distinctive characteristic has received minimal attention in the literature. Considering these differences, we seek to understand the mechanisms underlying information dissemination on social networks in the context of mob violence and protests. We conducted a comparative analysis of communication on the Reddit and YouTube networks about the riots in France in 2023. By utilizing social network analysis, we clarify the differences in information dissemination across these networks and contribute to information systems literature on social media actions with theoretical and methodological insights into the dissemination of information about riots. © The Author(s) 2025.",France riots; Reddit; Social movements; Social network analysis; YouTube,0,Information Systems Frontiers,2025 457,Ghobakhloo M.; Mahdiraji H.A.; Iranmanesh M.; Jafari-Sadeghi V.,"From Industry 4.0 Digital Manufacturing to Industry 5.0 Digital Society: a Roadmap Toward Human-Centric, Sustainable, and Resilient Production","The present study addresses two critical controversies surrounding the emerging Industry 5.0 agenda. Firstly, it seeks to elucidate the driving forces behind the accelerated momentum of the Industry 5.0 agenda amidst the ongoing digital industrial transformation. Secondly, it explores how the agenda’s sustainability values can be effectively realised. The study conducted a comprehensive content-centric literature synthesis and identified how Industry 4.0 shortcomings adversely impacted sustainability values. Furthermore, the study implements a novel approach that determines how and in what order the sustainability functions of Industry 4.0 should be leveraged to promote the sustainability objectives of Industry 5.0. Results reveal that Industry 4.0 has benefited economic and environmental sustainability values most at the organisational and supply chain levels. Nonetheless, most micro and meso-social sustainability values have been adversely impacted by Industry 4.0. Similarly, Industry 4.0 has been worryingly detrimental to macro sustainability values like social or economic growth equality. These contradictory implications of Industry 4.0 have pulled the Industry 5.0 agenda. However, the results identified nine sustainability functions of Industry 4.0 that, when leveraged appropriately and in the correct order, can offer important implications for realising the economic and socio-environmental goals of Industry 5.0. For example, under extreme unpredictability of business world uncertainties, the business should first leverage the automation and integration capabilities of Industry 4.0 to gain the necessary cost-saving, resource efficiency, risk management capability, and business antifragility that allow them to introduce sustainable innovation into their business model without jeopardising their survival. Various scenarios for empowering Industry 5.0 sustainability values identified in the present study offer important implications for knowledge and practice. © The Author(s) 2024.",Digital transformation; Digitalisation; Human-centricity; Industry 4.0; Industry 5.0; Resilience; Sustainability,117,Information Systems Frontiers,2024 458,Migliore G.; Wagner R.; Cechella F.S.; Liébana-Cabanillas F.,Antecedents to the Adoption of Mobile Payment in China and Italy: an Integration of UTAUT2 and Innovation Resistance Theory,"This research aims to investigate the adoption gap in mobile payment systems between Italy and China, focusing on users’ intention to adopt mobile payment. The theoretical framing considers both drivers and barriers when combines the unified theory of acceptance and use of technology 2 (UTAUT2) with innovation resistance theory (IRT). To empirically verify the proposed model, this study gathers primary data through a web-based, self-administered survey. To analyze the data, we use structural equation modeling, and to test for significant differences between the two groups we run multi-group analysis. The respondents in Italy and China present different behaviors. Social influence plays a significant role in cultures with high uncertainty avoidance, such as Italy. The tradition barrier is the only significant barrier to the adoption of mobile payment. © 2022, The Author(s).",China; Innovation resistance theory; Italy; Mobile payment; Risk barriers; UTAUT2,203,Information Systems Frontiers,2022 459,Kazancoglu Y.; Mangla S.K.; Berberoglu Y.; Lafci C.; Madaan J.,"Towards Industry 5.0 Challenges for The Textile and Apparel Supply Chain for The Smart, Sustainable, and Collaborative Industry in Emerging Economies","Industrial revolutions often seek to strengthen the separation of human and machine labor by going one step further, toward automation and digitalization, and the transfer of tough and dangerous occupations to robots. As it strives to include robots in people's daily activities and work, the introduction of concepts such as I5.0 is a step forward in enhancing human-machine interaction and provides some possibilities and challenges for firms. Therefore, this article mainly focuses on studying and concretely examining the challenges faced by businesses transitioning from I4.0 to I5.0 by providing case examples from the textile and apparel supply chain. After a detailed review of the current literature related to the I5.0 challenges, the I5.0 challenges were listed in general. Then, the fuzzy Decision-making trial and evaluation laboratory approach has adopted into the challenges to reveal causal interactions between them thus, prioritizing the substantial challenges to be focused on to influence the entire textile and apparel supply chain. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Challenges; Collaborative industry; Human-centric; Human-machine interaction; Industrial revolutions; Industry 5.0,40,Information Systems Frontiers,2024 460,Marshan A.; Nizar F.N.M.; Ioannou A.; Spanaki K.,Comparing Machine Learning and Deep Learning Techniques for Text Analytics: Detecting the Severity of Hate Comments Online,"Social media platforms have become an increasingly popular tool for individuals to share their thoughts and opinions with other people. However, very often people tend to misuse social media posting abusive comments. Abusive and harassing behaviours can have adverse effects on people's lives. This study takes a novel approach to combat harassment in online platforms by detecting the severity of abusive comments, that has not been investigated before. The study compares the performance of machine learning models such as Naïve Bayes, Random Forest, and Support Vector Machine, with deep learning models such as Convolutional Neural Network (CNN) and Bi-directional Long Short-Term Memory (Bi-LSTM). Moreover, in this work we investigate the effect of text pre-processing on the performance of the machine and deep learning models, the feature set for the abusive comments was made using unigrams and bigrams for the machine learning models and word embeddings for the deep learning models. The comparison of the models’ performances showed that the Random Forest with bigrams achieved the best overall performance with an accuracy of (0.94), a precision of (0.91), a recall of (0.94), and an F1 score of (0.92). The study develops an efficient model to detect severity of abusive language in online platforms, offering important implications both to theory and practice. © The Author(s) 2023.",Deep learning; Hate speech; Machine learning; Social media; Text analytics; Text pre-processing; Text representation,11,Information Systems Frontiers,2025 461,Dyball M.C.; Seethamraju R.,Blockchain: Exploring its Impact on the Business Models of Australian Accounting Firms,"This paper reports on a study that investigated how the business models of Australian accounting firms are impacted by audit clients using blockchain technology. Semi-structured interviews with a range of stakeholders including audit partners from big-4 accounting firms reveal that firms are gradually adapting their business models by offering value propositions that involve efficiency, complementarities and novelty, despite a formative blockchain ecosystem in Australia. This ecosystem is characterized by clients’ reluctance to use blockchain platforms for financial systems and a lack of clear direction on applicable accounting standards and consensus on blockchain standards and governance. © The Author(s) 2024.",Accounting firms; Blockchain; Business models,3,Information Systems Frontiers,2025 462,Angelopoulos S.; Canhilal K.S.; Hawkins M.A.,From Groups to Communities: A Resource Mobilization Theory Perspective on the Emergence of Communities,"Groups and communities have been key topics in the information systems (IS) research agenda. While communities are assumed to emerge at the intersection of overlapping groups and their practices, prior research has mainly focused on their dynamics and evolution. This has resulted to limited empirical support regarding the emergence of communities. We address that lacuna by tracing the emergence of communities through the prism of resource mobilization theory. In doing so, we make use of a unique longitudinal dataset and incorporate Topic Modelling, Bipartite Network Analysis, and Community Detection. We show that new communities are formed at the intersection of overlapping groups and practices. In addition, we contribute to the IS literature by demonstrating that their emergence occurs due to resource mobilization that gives rise to a shared mindset. We also reveal that multiple resources are incorporated into the practices of an emerging community. By combining large datasets and innovative computational approaches, we help IS theory and practice to move away from traditional ""what"" questions towards the more insightful ""how"" ones. We discuss the theoretical and practical implications of our work and delineate an agenda for future research on the topic. © 2023, The Author(s).",Bipartite network; Community detection; Community emergence; Latent Dirichlet allocation; Network analysis; Resource mobilization theory topic modelling,5,Information Systems Frontiers,2023 463,Rutschi C.; Berente N.; Nwanganga F.,Data Sensitivity and Domain Specificity in Reuse of Machine Learning Applications,"Data sensitivity and domain specificity challenges arise in reuse of machine learning applications. We identify four types of machine learning applications based on different reuse strategies: generic, distinctive, selective, and exclusive. We conclude with lessons for developing and deploying machine learning applications. © The Author(s) 2023.",Data sensitivity; Domain specificity; Machine learning; Reuse,3,Information Systems Frontiers,2024 464,Venumuddala V.R.; Kamath R.,Work Systems in the Indian Information Technology (IT) Industry Delivering Artificial Intelligence (AI) Solutions and the Challenges of Work from Home,"Our study is based on a workplace ethnography conducted between Jan-May 2020 in an AI research lab of an Indian service-based IT organization, whose operations shifted from co-located work to work from home (WFH) owing to the recent pandemic. The field notes of the ethnographer, working as a full-time intern in a running AI project within this lab, is the basis for the qualitative data for this study. We discuss the socio-technical aspects and the specific challenges of distributed team-working due to the WFH norms facing such emerging research units, which are rapidly diffusing across the IT industry in the offshoring context, particularly in India. We rely on work system theory as a map to bring out key findings from our ethnographic observations. The findings point to the importance of having workflows compatible with the specific work roles in such emerging work systems – particularly for the beginner roles in the AI space. Our study contributes to the IS literature by depicting the challenges of distributed teams in a relatively novel setting emerging in offshoring contexts like the Indian IT sector, and suggests implications for managers handling AI projects and tackling employee-focused Human Resource practices in such settings. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial Intelligence; Ethnography; Work from Home; Work Systems Theory,18,Information Systems Frontiers,2023 465,Flynn G.; Nagle T.; Fitzgerald C.,Data Evolution in Times of Crisis: an Organisational Mindfulness Perspective,"The Covid-19 pandemic illustrates that we are never far away from situations that have a scale and impact, which are difficult to predict. Positioned at the intersection of crisis management and resilience, this insider case-study provides the opportunity for a more complete understanding of the organisation-adversity relationship (Williams et al., 2017), by focusing on the third Covid19 wave in Ireland (Dec 2020) and resulting response by an Intensive Care Unit crisis team. The study examines the evolution of seven data supply chains that were developed to support the ICU crisis team through the surge of cases which put the highest level of strain on the Irish health system since the pandemic began. The study focuses on 289 data reviews, which triggered 63 changes each requiring a new iteration of a data supply chain. Incorporating Organisational Mindfulness as the theoretical framework, the study provides an insight into the realities of data management during a crisis but also provides a rich awareness of the complexities of data management that often go unrecognised. In doing so, the study contributes the concept of ‘mindful data’, which aids managers to understand the key characteristics of resilient data supply chains. The study also provides a rare first-hand insight into how mindful data was constructed, presented, and evolved into an essential element within the critical care environment. © The Author(s) 2022.",Critical events; Data; Organisational mindfulness; Resilience,4,Information Systems Frontiers,2024 466,Minkkinen M.; Zimmer M.P.; Mäntymäki M.,Co-Shaping an Ecosystem for Responsible AI: Five Types of Expectation Work in Response to a Technological Frame,"Governing artificial intelligence (AI) requires cooperation, although the collaboration’s form remains unclear. Technological frames provide a theoretical perspective for understanding how actors interpret a technology and act upon its development, use, and governance. However, we know little about how actors shape technological frames. In this paper, we study the shaping of the technological frame of the European ecosystem for responsible AI (RAI). Through an analysis of EU documents, we identified four expectations that constitute the EU’s technological frame for the RAI ecosystem. Moreover, through interviews with RAI actors, we revealed five types of expectation work responding to this frame: reproducing, translating, and extending (congruent expectation work), and scrutinizing and rooting (incongruent expectation work). Furthermore, we conceptualize expectation work as actors’ purposive actions in creating and negotiating expectations. Our study contributes to the literature on technological frames, technology-centered ecosystems, and RAI while also elucidating the dimensions and co-shaping of technological frames. © 2022, The Author(s).",AI; AI governance; Artificial intelligence; Ecosystems; Expectations; Technological frames,50,Information Systems Frontiers,2023 467,Ioannou A.; Lycett M.; Marshan A.,The Role of Mindfulness in Mitigating the Negative Consequences of Technostress,"IT offers significant benefits both to individuals and organisations, such as during the Covid-19 pandemic where technology played a primary role in aiding remote working environments; however, IT use comes with consequences such as ‘technostress’ – stress arising from extended use of technology. Addressing the paucity of research related to this topic, in this study, we examine the role of mindfulness and IT mindfulness to both mitigate the impact of technostress and alleviate its negative consequences; revealing that mindfulness can reduce technostress and increase job satisfaction, while IT mindfulness can enhance user satisfaction and improve task performance. Moreover, our work sheds light on the under-researched relationship between mindfulness and IT mindfulness; showing that the latter has a stronger influence on IT related outcomes; revealing the valuable role of mindfulness and IT mindfulness in the workplace and offering important implications to theory and practice. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",Cluster analysis; Mindfulness; Organisational settings; Performance; Technostress,54,Information Systems Frontiers,2024 468,Dennehy D.; Conboy K.; Ferreira J.; Babu J.,Sustaining Open Source Communities by Understanding the Influence of Discursive Manifestations on Sentiment,"Sustaining open source (OS) communities is fundamental to the long-term success of any open source software (OSS) project. An OSS project consists of a community of software developers who are part of a larger business ecosystem involving hardware and software companies. Peer review of software code, known as patch review comments, is an important quality assurance activity for OSS development that requires developers to provide feedback concerning their degree of satisfaction. Despite the importance of feedback, which can affect sentiment of OS communities, the underlying discourse has not been studied. In this study, we use Activity Theory to identify and categorise 20,651 discursive manifestations of contradictions that occurred in patch review comments of a large, evolving OS community. Unique community-specific expressions are identified and mapped to developers’ sentiment during a software release cycle. The study contributes new insights concerning discursive manifestations of contradictions as a driving force for sustaining OS communities. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Activity theory; Contradictions; Open source; Patch reviews; Sentiment analysis,7,Information Systems Frontiers,2023 469,Onjewu A.-K.E.; Hussain S.; Haddoud M.Y.,"The Interplay of E-commerce, Resilience and Exports in the Context of COVID-19","Scholars have extolled e-commerce as a pathway for sustaining firm operations in the unique circumstances of COVID-19. To add crisis time evidence to the body of work, and based on World Bank Enterprise Survey data, this inquiry interrogates 249 small manufacturing firms in Italy by examining the effect of e-commerce on (1) resilience, (2) direct exports and (3) indirect exports. The results show that while e-commerce has a positive impact on direct exports, a negative influence is recorded on indirect exports. Besides, e-commerce significantly increases resilience which, in turn, accelerates direct exports. However, resilience is found to have a trivial influence on indirect exporting. Furthermore, held as a constant, firm size demonstrates a significant and positive effect on direct and indirect exports. These fresh findings prompt implications for understanding the correlates of e-commerce, resilience and export behaviour. Practically, there are salient insights for stakeholders engaged in reviving small manufacturers’ exports for a speedy post COVID-19 recovery in Italy. © 2022, The Author(s).",COVID-19; Direct Exports; E-Commerce; Indirect Exports; Resilience; SMEs,20,Information Systems Frontiers,2022 470,Pellegrino G.; Gervasi M.; Angelelli M.; Corallo A.,A Conceptual Framework for Digital Twin in Healthcare: Evidence from a Systematic Meta-Review,"Digital Twin (DT) technology monitors, simulates, optimizes, models, and predicts the behavior of physical entities. Healthcare is a significant domain where a DT can be functional for multiple purposes. However, these diverse uses of DTs need a clear understanding of both general and specific aspects that can affect their adoption and integration. This paper is a meta-review that leads to the development of a conceptual framework designed to support the high-level evaluation of DTs in healthcare. Using the PRISMA methodology, the meta-review synthesizes insights from 20 selected reviews out of 1,075 studies. Based on this comprehensive analysis, we extract the functional, technological, and operational aspects that characterize DTs in healthcare. Additionally, we examine the structural (e.g., hierarchical) relationships among these aspects to address the various complexity scales in digital health. The resulting framework can promote the effective design and implementation of DTs, offering a structured approach for their assessment. © The Author(s) 2024.",Conceptual framework; Digital twin; Healthcare; Meta review; Systematic literature review,27,Information Systems Frontiers,2025 471,Pessoa M.E.B.T.; Roselli L.R.P.; de Almeida A.T.,Using the FITradeoff Decision Support System to Support a Brazilian Compliance Organization Program,"The technology can support multi-criteria decision-making processes, allowing managers to identify efficient solutions to complex problems in a structured and rational way. Specially, in time of crises, the use of Decision Support System (DSS) is useful since these situations demand greater accuracy in the decision-making process. Therefore, this study shows the usefulness of the Decision Support System constructed for the FITradeoff method in a practical context involving a decision-making in time of crisis. In special, in this study, the applicability of the FITradeoff DSS is discussed to solve an important problem involving a Brazilian Company. The FITradeoff DSS was employed for a compliance-program problem, in which a company sought to improve its performance in relation to the program. This problem is particularly significant in Brazil where the search for compliance programs has been increasing since the adoption of the anticorruption law. Thus, twenty-eight alternatives were created, and these alternatives were evaluated against five criteria. As a result, most of the alternatives in the top of the ranking are related to Internal Communication aspect. Hence, the DM considered that these alternatives are sufficient to direct the efforts to execute the Compliance Program, and in special this theme can be the focus in this company. Furthermore, in view of recurring crises around the world, companies must identify ways to ensure their internal processes support the sustainability of their business. For decision making in times of crisis, the DSS of the FITradeoff method is an effective tool allowing decision makers to handle complex decisions. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.",Compliance program; Decision support system; FITradeoff Method; Multi-Criteria Decision-Making/Aiding (MCDM/A),6,Information Systems Frontiers,2024 472,Chakraborty T.; Koelle M.; Schlötterer J.; Schlicker N.; Wirth C.; Seifert C.,Explanation Format does not Matter; but Explanations do - An Eggsbert study on explaining Bayesian Optimization tasks,"Bayesian Optimization (BO) is a family of methods for finding optimal parameters when the underlying function to be optimized is unknown. BO is used, for example, for hyperparameter tuning in machine learning and as an expert support tool for tuning cyberphysical systems. For settings where humans are involved in the tuning task, methods have been developed to explain BO (Explainable Bayesian Optimization, XBO). However, there is little guidance on how to present XBO results to humans so that they can tune the system effectively and efficiently. In this paper, we investigate how the XBO explanation format affects participants’ task performance, task load, understanding and trust in XBO. We chose a task that is accessible to a wide range of participants. Specifically, we set up an egg cooking scenario with 6 parameters that participants had to adjust to achieve a perfect soft-boiled egg. We compared three different explanation presentation formats: a bar chart, a list of rules and a textual explanation in a between-subjects online study with 213 participants. Our results show that adding any format of explanation presentation increases task success, reduces the number of trials needed to achieve success, and improves perceived understanding and confidence. While explanations add more information for participants to process, we found no increase in user task load. We also found that the aforementioned results were independent of the explanation format; all formats had a similar effect. This is an interesting finding for practical applications, as it suggests that explanations can be added to BO tuning tasks without the burden of designing or selecting specific explanation formats. In the future, it would be interesting to investigate scenarios of prolonged use of the explanation formats and whether they have different effects on participants’ mental models of the underlying system. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Explainable artificial intelligence; Explainable bayesian optimization; Hyperparameter tuning; Optimization; Rule explanations; Textual explanations; Visual explanations,1,Information Systems Frontiers,2025 473,Calderon G.; del Campo G.; Saavedra E.; Santamaría A.,Monitoring Framework for the Performance Evaluation of an IoT Platform with Elasticsearch and Apache Kafka,"IoT platforms are in charge of extracting and processing the data that come from IoT networks, generating additional value, and providing access to the user through usable interfaces. However, the ever growing number of devices, networks, services and applications within the IoT ecosystem, and the recently adopted edge/cloud architecture, increase the complexity. Therefore, IoT platforms should integrate monitoring and visualization tools to facilitate deployment, management and maintenance tasks. In this work, we present the implementation and performance evaluation of an IoT modular platform for distributed architectures that combines the use of Elastic Stack tools (Elasticsearch, Kibana and Beats) and Apache Kafka. We have developed a monitoring framework based on Beats agents that supervise the platform performance attending to different metrics; and adapted the Kibana visualization tools to provide friendly and accessible information to platform administrators and users. Finally, we have deployed and evaluated the IoT platform in four real use cases, identifying the factors that affect the performance of the different modules: Edge Node, Data Streaming, Cloud Server and Search Engine. © The Author(s) 2023.",Beats; Elastic Stack; Elasticsearch; IoT platfom; Kibana; Monitoring,12,Information Systems Frontiers,2024 474,Tarkasis K.; Kaparis K.; Georgiou A.C.,Enhancing Trustworthiness in Real Time Single Object Detection,"We propose a method for the dynamic evaluation of the output provided by any Real Time Object Detection Algorithm. This work focuses on single object detection from video streams and the main objective is the enhancement of the process with regard to its so-called trustworthiness based on the spatial consideration of the sequence of video frames that are fed as inputs on a Convolutional Neural Network (CNN). To this end, we propose a method that systematically tests the differences between the consecutive values returned by the employed neural network. The process identifies patterns that flag potential false positive predictions based on classic similarity metrics and evaluates the quality of the CNN results in a methodologically agnostic fashion. An extended computational illustration demonstrates the effectiveness and the potentials of the proposed approach. © The Author(s) 2025.",CNN; Real time object detection; Trustworthiness; xAI,2,Information Systems Frontiers,2025 475,Roy S.K.; Singh G.; Gruner R.L.; Dey B.L.; Shabnam S.; Muhammad S.S.; Quaddus M.,Relationship Quality in Customer-service Robot Interactions in Industry 5.0: An Analysis of Value Recipes,"The paper studies the interactions between customers and robots within the framework of Industry 5.0-driven services. Prior studies have explored several factors contributing to the quality of these interactions, with perceived value being a crucial aspect. This study uses value recipes, which refer to specific configurations of how different benefits and costs are weighed up/evaluated, as a theoretical framework to investigate the quality of relationships between customers and service robots. The study aims to shed light on the complex interplay between different value dimensions that shape customers' relationships with robots. To achieve this goal, the authors analyze what value configurations facilitate or impede high-quality relationships between customers and service robots. Fuzzy set qualitative comparative analysis (fsQCA) was used to analyze data from 326 consumers. The data reveal that value recipes comprising positive values (such as relational benefit, novelty, control, personalization, excellence, and convenience) and negative values (about privacy and effort) prove highly effective in augmenting relationship quality. Results also underscore those negative values either in isolation or in conjunction with positive values, do not impede relationship quality. The theoretical contribution of this study lies in presenting new insights into relationship dynamics between customers and service robots in an Industry 5.0 value-driven context. From a practical standpoint, the findings suggest guidelines for successfully infusing the retail landscape with more intelligent service robots. © 2023, The Author(s).",Artificial intelligence; fsQCA; Relationship quality; Retailing; Service robots; Value recipes,15,Information Systems Frontiers,2023 476,Swain A.K.; Garza V.R.,Key Factors in Achieving Service Level Agreements (SLA) for Information Technology (IT) Incident Resolution,"In this paper, we analyze the impact of various factors on meeting service level agreements (SLAs) for information technology (IT) incident resolution. Using a large IT services incident dataset, we develop and compare multiple models to predict the value of a target Boolean variable indicating whether an incident met its SLA. Logistic regression and neural network models are found to have the best performance in terms of misclassification rates and average squared error. From the best-performing models, we identify a set of key variables that influence the achievement of SLAs. Based on model insights, we provide a thorough discussion of IT process management implications. We suggest several strategies that can be adopted by incident management teams to improve the quality and effectiveness of incident management processes, and recommend avenues for future research. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Cloud-computing; IT incident resolution; IT service management; Predictive analytics; ServiceNow; Theory for predicting,16,Information Systems Frontiers,2023 477,Huber R.; Oberländer A.M.; Faisst U.; Röglinger M.,Disentangling Capabilities for Industry 4.0 - an Information Systems Capability Perspective,"Digital technologies revolutionise the manufacturing industry by connecting the physical and digital worlds. The resulting paradigm shift, referred to as Industry 4.0, impacts manufacturing processes and business models. While the ‘why’ and ‘what’ of Industry 4.0 have been extensively researched, the ‘how’ remains poorly understood. Manufacturers struggle with exploiting Industry 4.0’s full potential as a holistic understanding of required Information Systems (IS) capabilities is missing. To foster such understanding, we present a holistic IS capability framework for Industry 4.0, including primary and support capabilities. After developing the framework based on a structured literature review, we refined and evaluated it with ten Industry 4.0 experts from research and practice. We demonstrated its use with a German machinery manufacturer. In sum, we contribute to understanding and analysing IS capabilities for Industry 4.0. Our work serves as a foundation for further theorising on Industry 4.0 and for deriving theory-led design recommendations for manufacturers. © The Author(s) 2022.",Capability framework; Fourth industrial revolution; Industry 4.0; Information systems capabilities,23,Information Systems Frontiers,2024 478,Lermanda Senoceain T.; Rubio Manzano C.,When Algorithms Tell Their Story: Turning Execution Traces into Explanatory Videos by Means of a Trustworthy Architecture Based on Parse Trees,"Today, videos have established themselves as one of the most influential forms of media, not only in the entertainment field but also in education. Creating explanatory and educational videos, especially those aimed at explaining algorithms, presents a considerable challenge because trustworthiness is essential in this area. Additionally, this process demands significant effort, both in conceptualizing the execution of the algorithm and in translating the explanations into visually effective and understandable slides. To address this problem, we propose a transparent architecture for the automatic generation of explanatory videos based on the execution traces of algorithms, particularly those that utilize state-space search. This combines syntactic analysis and natural language generation modules able to transform execution traces into parse trees. From these parse trees, a set of frames that includes visual graphics and detailed textual explanations is generated. Finally, the frames are organized in sequence to produce a video narrated by a virtual teacher, providing a dynamic and accessible educational experience. The result is an expert system capable of automatically generating explanatory videos that have been evaluated by two key groups: teachers and students in the area. The evaluation was conducted using a questionnaire based on the Learning Object Review Instrument standard, which considered various aspects, such as the quality of the video and its content, the motivational capacity, and the presentation design of the material. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.",Automatic video generation; Educational technology; Natural language generation; State space search algorithms; Trustworthy architecture,0,Information Systems Frontiers,2025 479,Babalghaith R.; Aljarallah A.,Factors Affecting Big Data Analytics Adoption in Small and Medium Enterprises,"Big data analytics (BDA) has a pivotal role in improving business performance, especially in small and medium enterprises (SMEs). The objective of this study is to examine the determinants and consequences of BDA adoption for SMEs. The theoretical foundation of the study is derived from Technology-Organization-Environment (TOE) framework and Resource-Based View (RBV) theory. Using a survey of 233 SMEs in Saudi Arabia, the results reveal that technical aspects (i.e., complexity and compatibility), environmental aspects (i.e., uncertainty), and organizational aspects (i.e., top management support, organization readiness, and data-driven culture) are perceived as factors that encourage firms to adopt BDA. The study shows a strong relationship between BDA and SMEs’ performance (financial, market, and business process). The empirical work presented in this paper adds to the understanding of the motivators of BDA adoption for SMEs, and consequently the effects of BDA adoption on SME performance. Theoretical and practical implications of the results are discussed further. © The Author(s) 2024.",Adoption; Big data analytics; Resource-based view theory; Small and medium enterprises; Technological-organizational-environmental framework,9,Information Systems Frontiers,2024 480,Gupta S.; Modgil S.; Lee C.-K.; Sivarajah U.,The future is yesterday: Use of AI-driven facial recognition to enhance value in the travel and tourism industry,"This study aims to investigate the role of artificial intelligence (AI) driven facial recognition to enhance a value proposition by influencing different areas of services in the travel and tourism industry. We adopted semi-structured interviews to derive insights from 26 respondents. Thematic analysis reveals the development of four main themes (personalization, data-driven service offering, security and safety, and seamless payments). Further, we mapped the impact of AI- driven facial recognition to enhance value and experience for corporate guests. Findings indicate that AI-based facial recognition can facilitate the travel and tourism industry in understanding travelers’ needs, optimization of service offers, and value-based services, whereas data-driven services can be realized in the form of customized trip planning, email, and calendar integration, and quick bill summarization. This contributes to strengthening the tourism literature through the lens of organizational information processing theory. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Facial recognition; Organizational information processing theory; Travel and tourism industry; Value,96,Information Systems Frontiers,2023 481,Min H.; Lea B.-R.,Motivators and Inhibitors for Business Analytics Adoption from the Cross-Cultural Perspectives: A Data Mining Approach,"In the increasingly knowledge-based world economy, the multinational firm’s success often hinges on its business intelligence capability nurtured by business analytics (BA). Despite the growing recognition of BA's role in enhancing the firm’s intellectual capital and subsequent competitiveness, it is still unknown what truly motivates and inhibits BA adoption. This study aims to identify key influencing factors for BA adoption such as organizational characteristics, information security/privacy, and information technology maturity (knowledge level). In so doing, this study employed data mining and data visualization techniques to develop specific patterns of BA adoption practices based on a combined sample of 224 Korean firms and 106 U.S. firms representing various industry sectors. This study is one of the first attempts to develop practical guidelines for the successful implementation of BA based on the cross-national study of BA practices among both Korean and U.S. firms. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Business analytics; Business intelligence; Cross-cultural study; Data mining; Data visualization,5,Information Systems Frontiers,2024 482,Thanabalan P.; Vafaei-Zadeh A.; Hanifah H.; Ramayah T.,Big Data Analytics Adoption in Manufacturing Companies: The Contingent Role of Data-Driven Culture,"The objective of this paper is to investigate the factors that influence the adoption of Big Data Analytics (BDA) in manufacturing companies and examine the impact of BDA adoption on performance, while also considering the moderating effect of data-driven culture. An online questionnaire survey was conducted with medium and large manufacturing companies in Malaysia, resulting in a total of 267 responses collected through non-probability purposive sampling. The results show that technology complexity, perceived relative advantage, top management support, IT infrastructure and capabilities, normative pressure, and mimetic pressure are significant determinants of BDA adoption. Moreover, the adoption of BDA has a positive impact on financial and market performance, with data-driven culture moderating the relationship between BDA adoption and financial performance. This study highlights the critical factors that contribute to BDA adoption and its outcomes, providing manufacturing companies with awareness on this topic. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Big data analytics; Data-driven culture; Financial performance; Manufacturing firm; Market performance; TOE,13,Information Systems Frontiers,2025 483,Fuentes-Quijada G.; Ruiz-González F.; Caro A.,Enterprise Architecture and IT Governance to Support the BizDevOps Approach: a Systematic Mapping Study,"Current software development practices are transforming the governance and management of software projects with the objective of aligning software products/services with business needs, ensuring business continuity, optimizing resource allocation, and fostering strong stakeholder relationships. The innovative BizDevOps approach has emerged as a response to these challenges, since it extends DevOps by incorporating an additional cycle and involving non-IT stakeholders with a focus on business-IT alignment. The application of IT Governance practices is crucial as regards ensuring the success of complex BizDevOps projects, and this paper, therefore, presents a systematic mapping study that explores the approaches for BizDevOps and encourages DevOps proposals that will seamlessly integrate with the business lifecycle. It examines the support provided by IT Governance practices and investigates the potential roles of Enterprise Architecture. The study analyzed 86 primary studies and 11 secondary studies, revealing a lack of empirical validations and a prevalence of recommendation-oriented papers without concrete solution proposals. These findings highlight the need for further research with which to validate BizDevOps practices and provide actionable insights. © The Author(s) 2024.",Bizdevops; Devops; Enterprise architecture; IT governance; Mapping study,7,Information Systems Frontiers,2025 484,Spagnoletti P.; Ceci F.; Bygstad B.,Online Black-Markets: An Investigation of a Digital Infrastructure in the Dark,"This paper investigates the functioning of Online Black-Markets (OBMs), i.e. a digital infrastructure operating in the Dark Net that enables the exchange of illegal goods such as drugs, weapons and fake digital identities. OBMs exist notwithstanding adverse conditions such as police interventions, scams and market breakdowns. Relying on a longitudinal case study, we focus on the dynamics of interactions among actors and marketplace technologies and we identify three mechanisms explaining OBMs operations. In particular, we show that OBMs infrastructure is the result of commoditization, platformization and resilience processes. Our contribution relies on the identification of community-based mechanisms that generate the OBMs infrastructure, extending the current understanding of e-commerce and social commerce. © 2021, The Author(s).",Darknet; Digital infrastructure; Marketplace; Resilience; Social commerce,22,Information Systems Frontiers,2022 485,Fromm J.; Eyilmez K.; Baßfeld M.; Majchrzak T.A.; Stieglitz S.,Social Media Data in an Augmented Reality System for Situation Awareness Support in Emergency Control Rooms,"During crisis situations, emergency operators require fast information access to achieve situation awareness and make the best possible decisions. Augmented reality could be used to visualize the wealth of user-generated content available on social media and enable context-adaptive functions for emergency operators. Although emergency operators agree that social media analytics will be important for their future work, it poses a challenge to filter and visualize large amounts of social media data. We conducted a goal-directed task analysis to identify the situation awareness requirements of emergency operators. By collecting tweets during two storms in Germany we evaluated the usefulness of Twitter data for achieving situation awareness and conducted interviews with emergency operators to derive filter strategies for social media data. We synthesized the results by discussing how the unique interface of augmented reality can be used to integrate social media data into emergency control rooms for situation awareness support. © 2021, The Author(s).",Augmented reality; Emergency control rooms; Emergency management; Situation awareness; Social media analytics,18,Information Systems Frontiers,2023 486,Ribeiro T.F.R.; Silva F.J.M.D.; Costa R.L.D.C.,Modelling forest fire dynamics using conditional variational autoencoders,"Forest fires have far-reaching consequences, threatening human life, economic stability, and the environment. Understanding the dynamics of forest fires is crucial, especially in high-incidence regions. In this work, we apply deep networks to simulate the spatiotemporal progression of the area burnt in a forest fire. We tackle the region interpolation problem challenge by using a Conditional Variational Autoencoder (CVAE) model and generate in-between representations on the evolution of the burnt area. We also apply a CVAE model to forecast the progression of fire propagation, estimating the burnt area at distinct horizons and propagation stages. We evaluate our approach against other established techniques using real-world data. The results demonstrate that our method is competitive in geometric similarity metrics and exhibits superior temporal consistency for in-between representation generation. In the context of burnt area forecasting, our approach achieves scores of 90% for similarity and 99% for temporal consistency. These findings suggest that CVAE models may be a viable alternative for modeling the spatiotemporal evolution of 2D moving regions of forest fire evolution. © The Author(s) 2024.",Conditional variational autoencoders; Deep learning; Forecasting; Region interpolation; Spatiotemporal data,4,Information Systems Frontiers,2024 487,Wu W.; Yang Q.; Gong X.,Impulsive Social Shopping in Social Commerce Platforms: The Role of Perceived Proximity,"Since its conception, social commerce has become a key channel for shopping and in fact has gradually become the dominant way consumer’s shop. Although consumers are prone to impulsive shopping behavior on social commerce platforms, few studies have empirically investigated the psychological mechanisms underlying this behavior. To bridge this gap, we develop a model grounded in construal level theory (CLT) that investigates the role of perceived proximity with the seller in predicting consumers’ impulsive social shopping. We validate the model using a field survey of 875 consumers on a leading social commerce platform in China. Our empirical findings indicate that perceived proximity is determined by interactivity and that it prompts consumers’ cognitive (i.e., cognitive trust) and affective responses (i.e., emotional trust and emotional attachment) to the seller. Meanwhile, emotional trust and emotional attachment further induce impulsive social shopping. The theoretical and practical implications of this study are discussed. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.",Cognitive trust; Construal level theory; Emotional attachment; Emotional trust; Impulsive social shopping; Interactivity; Perceived proximity,14,Information Systems Frontiers,2024 488,Lanza-Cruz I.; Berlanga R.; Aramburu M.J.,Multidimensional Author Profiling for Social Business Intelligence,"This paper presents a novel author profiling method specially aimed at classifying social network users into the multidimensional perspectives for social business intelligence (SBI) applications. In this scenario, being the user profiles defined on demand for each particular SBI application, we cannot assume the existence of labelled datasets for training purposes. Thus, we propose an unsupervised method to obtain the required labelled datasets for training the profile classifiers. Contrary to other author profiling approaches in the literature, we only make use of the users’ descriptions, which are usually part of the metadata posts. We exhaustively evaluated the proposed method under four different tasks for multidimensional author profiling along with state-of-the-art text classifiers. We achieved performances around 88% and 98% of F1 score for a gold standard and a silver standard datasets respectively. Additionally, we compare our results to other supervised approaches previously proposed for two of our tasks, getting very close performances despite using an unsupervised method. To the best of our knowledge, this is the first method designed to label user profiles in an unsupervised way for training profile classifiers with a similar performance to fully supervised ones. © 2023, The Author(s).",Author profiling; Business intelligence; Machine learning; Natural language processing; Social media,5,Information Systems Frontiers,2024 489,Liu X.; Jiang N.; Fu M.; Cai Z.; Lim E.T.K.; Tan C.-W.,What Piques Users’ Curiosity on Open Innovation Platforms? An Analysis Based on Mobile App Stores,"Curiosity, a motivational state of exploratory behavior, is conducive to innovation diffusion by encouraging users’ exploration on open innovation platforms. Yet, despite its importance, there is a scarcity of research investigating the mechanism for piquing users’ curiosity. Accordingly, we advance a research model to unravel how platform service quality, in the form of service content quality and service delivery quality, affects users’ epistemic and perceptual curiosity via inducing their trust and distrust in a platform. Taking mobile app stores as our empirical context, we collected data from 431 users to validate our hypothesized relationships. Analytical results indicate that both dimensions of platform service quality positively influence users’ trust in platform, whereas only service delivery quality negatively influences users’ distrust in platform. Furthermore, trust in platform directly triggers curiosity whereas distrust in platform positively influences users’ feeling-of-deprivation, which in turn triggers curiosity. In this sense, our analytical results reveal the mediating roles of distrust in platform and feeling-of-deprivation in the relationship between service delivery quality and curiosity. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Curiosity; Distrust; Open innovation platforms; Platform service quality; Trust,6,Information Systems Frontiers,2023 490,Goo J.; Huang C.D.; Yoo C.W.; Koo C.,Smart Tourism Technologies’ Ambidexterity: Balancing Tourist’s Worries and Novelty Seeking for Travel Satisfaction,"Tourists deal with two intrinsic, uncertainty-driven attributes of travel, tourist worries and novelty seeking, that simultaneously affect their transaction and travel experience satisfaction. Rapid technological advances coupled with uncertainties caused by momentous events such as COVID-19 highlight the increasing significance of smart technologies in the tourism industry. This study explores the relationships between novelty and worries and travel satisfaction, as well as examines how tourists enhance their quality of trips with the use of smart tourism technologies. We find the tourists’ novelty seeking would enhance the trip experience, leading to overall travel satisfaction. In contrast, tourist worries, particularly in trip planning, would negatively affect tourists’ transaction satisfaction, which in turn impacts the overall travel experience satisfaction. As a moderator in its ambidextrous role, smart tourism technologies help tourists to develop a sense of novelty when planning and visiting a destination and mitigate the worries emanated from the uncertainty of transaction made during the pre-trip planning. Insights and implications of such findings are discussed for both theory and practice. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Novelty seeking; Smart tourism; Smart tourism technology ambidexterity; Tourist worries; Travel satisfaction; Uncertainty in travel,82,Information Systems Frontiers,2022 491,Zhao Y.; Li Y.; Wang N.; Zhou R.; Luo X.R.,A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level,"Online impulsive buying has become increasingly prevalent in e-commerce and social commerce research, yet there is a paucity of systematically examining this particular phenomenon in the paradigm of information systems. To advance this line of research, this study aims to gain insight into online impulsive buying through a meta-analysis of relevant research. Derived from 54 articles, this meta-analysis categorized the critical factors that influence online impulsive buying into the website, marketing, and affective stimuli. This study further explores the moderating effect of economic development level. The empirical results reveal that the chosen 13 main factors are significantly and positively related to online impulsive buying except for website security, price, novelty, and negative emotion. Moreover, economic development level moderates the relationship between several factors (i.e., website visual appeal, ease of use, price, promotion, pleasure, and positive emotion) and online impulsive buying. This study contributes to both theory and practice. It not only extends the impulsive buying literature to the online context by emphasizing the IT-supported website stimuli, but also provides implications for future research on online impulsive buying behavior across different economic development levels. Moreover, it provides guidelines for practitioners on how to leverage information technology to induce online impulsive buying. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Economic development level; Meta-analysis; Moderating effect; Online impulsive buying,91,Information Systems Frontiers,2022 492,Marjanovic O.; Patmore G.; Balnave N.,"Visual Analytics: Transferring, Translating and Transforming Knowledge from Analytics Experts to Non-technical Domain Experts in Multidisciplinary Teams","Today’s complex problems call for multidisciplinary analytics teams comprising of both analytics and non-technical domain (i.e. subject matter) experts. Recognizing the difference between data visualisaion (DV) (i.e. static visual outputs) and visual analytics (VA) (i.e. a process of interactive visual data exploration, guided by user’s domain and contextual knowledge), this paper focuses on VA for non-technical domain experts. By seeking to understand knowledge sharing from VA experts to non-technical users of VA in a multidisciplinary team, we aim to explore how these domain experts learn to use VA as a thinking tool, guided by their knowing-in-practice. The research described in this paper was conducted in the context of a long-term industry-wide research project called the ‘Visual Historical Atlas of the Australian Co-operatives’, led by a multidisciplinary VA team who faced the challenge tackled by this research. Using Action Design Research (ADR) and the combined theoretical lens of boundary objects and secondary design, the paper theorises a three-phase method for knowledge transfer, translation and transformation from VA experts to domain experts using different types of VA-related boundary objects. Together with the proposed set of design principles, the three-phase model advances the well-established stream of research on organizational use of analytics, extending it to the emerging area of visual analytics for non-technical decision makers. © 2022, The Author(s).",Action Design Research (ADR) project; Analytics; Data visualization; Non-technical decision makers; Visual analytics; Visual Historical Atlas of the Australian Cooperatives (VHAAC),5,Information Systems Frontiers,2023 493,Gupta S.; Kamboj S.; Bag S.,Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain,"The use of artificial intelligence (AI) in the healthcare field is gaining popularity. However, it also raises some concerns related to privacy and ethical aspects that require the development of a responsible AI framework. The principle of responsible AI states that artificial intelligence-based systems should be considered a part of composite societal and technological systems. This study attempts to establish whether AI risks in digital healthcare are positively associated with responsible AI. The moderating effect of perceived trust and perceived privacy risks is also examined. The theoretical model was based on perceived risk theory. Perceived risk theory is important in the context of this study, as risks related to uneasiness and uncertainty can be expected in the development of responsible AI due to the volatile nature of intelligent applications. Our research provides some interesting findings which are presented in the discussion section. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Digital healthcare; Perceived privacy risk; Perceived trust; Responsible artificial intelligence,74,Information Systems Frontiers,2023 494,Westland J.C.,Assessing Privacy and Security of Information Systems from Audit Data,"We investigated publicly reported security breaches of internal controls in corporate information systems to determine whether U.S. Securities and Exchange Commission (SEC) data are information bearing with respect to breaches of security and privacy. The issue has grown in importance as information systems breaches have steadily grown costlier and more frequent. Our analysis supports a high predictability for credit card breaches, portable device related breaches and breaches conducted by firm insiders. Our study also found evidence that employees are subverting particularly strict internal controls by using portable devices that can be carried outside the physical boundaries of the firm. In general, auditing and corporate data filed with the SEC was non-informative with regard to breaches involving unintended disclosures, physical losses, hacking and malware and workplace computers. Scope and fees associated with auditing are significant factors in predicting security breaches, whereas assessments of internal controls effectiveness was shown to be less significant for prediction. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Auditing; Computer fraud; Computer security; Internal control; Privacy; Security,4,Information Systems Frontiers,2022 495,Armeen I.; Niswanger R.; Tian C.,Combating Fake News Using Implementation Intentions,"The rise of misinformation on social media platforms is an extremely worrisome issue and calls for the development of interventions and strategies to combat fake news. This research investigates one potential mechanism that can help mitigate fake news: prompting users to form implementation intentions along with education. Previous research suggests that forming “if – then” plans, otherwise known as implementation intentions, is one of the best ways to facilitate behavior change. To evaluate the effectiveness of such plans, we used MTurk to conduct an experiment where we educated participants on fake news and then asked them to form implementation intentions about performing fact checking before sharing posts on social media. Participants who had received both the implementation intention intervention and the educational intervention significantly engaged more in fact checking behavior than those who did not receive any intervention as well as participants who had received only the educational intervention. This study contributes to the emerging literature on fake news by demonstrating that implementation intentions can be used in interventions to combat fake news. © The Author(s) 2024.",Fact checking; Fake news; Implementation intentions; Misinformation; User interventions,4,Information Systems Frontiers,2025 496,Zhang N.; Ruan C.; Wang X.,"You recommend, I trust: the interactive self-presentation strategies for social media influencers to build authenticity perception in short video scenes","Short video represents a novel form of social media with rich vividness and sociability, facilitating social media influencers’ (SMIs) self-presentations and endorsements. While SMIs become primary information sources through short videos, they also face challenges such as high return rates and consumer distrust. This research investigates how SMIs can effectively achieve authenticity through the design of self-presentation strategies, specifically focusing on credibility and attractiveness from a source-effect perspective. Across three studies, this research demonstrates that: (1) both credibility and attractiveness positively increase SMIs’ authenticity perception, mediated by para-social interaction; (2) credibility and attractiveness exhibit a negative interactive relationship; (3) the substitutability of credibility and attractiveness varies depending on the type of SMIs (informative vs. entertainment). This research contributes to the literature on short-video information processing and consumer attitudes toward SMIs based on authenticity building. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.",Attractiveness; Authenticity Perception; Credibility; Para-social Interaction; Short Video Scenes; Social Media Influencer Type,2,Information Systems Frontiers,2025 497,Zhang X.; Zhang X.; Luo X.; Yue W.T.,The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries,"Some have argued that online intermediaries facilitate sales of counterfeit and fake products. This study investigates the association between anti-counterfeit efforts and the revenue models implemented by intermediaries. We build a stylized analytical model to investigate the conditions under which either the advertising model or the brokerage model would lead to a higher anti-counterfeit effort. We find the intensity of market competition plays a critical role in the intermediary’s decisions on anti-counterfeit effort. Specifically, when market competition is less intense, we show that the intermediary has a greater economic incentive to combat counterfeit selling in the brokerage model than in the advertising model. We supplement empirical support to the results. In particular, using a composite score, we find the intermediary that adopts the advertising model tends to have a lower composite score than one using the brokerage model. Our results suggest the focusing on anti-counterfeit measures is more a means rather than an ends in combating counterfeit sales and the policymakers should pay more attention to the impacts from the adopted revenue model. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Advertising model; Anti-counterfeit; Brokerage model; Counterfeit; Fake products; Revenue models,8,Information Systems Frontiers,2022 498,Tabim V.M.; Ayala N.F.; Frank A.G.,Implementing Vertical Integration in the Industry 4.0 Journey: Which Factors Influence the Process of Information Systems Adoption?,"One of the key principles of Industry 4.0 is the implementation of vertical integration, which considers the integration of information systems from different hierarchical levels in a company to support decision-making with real-time data flows. Companies face challenges when they want to implement vertical integration, which is not trivial due to the risks inherent to the decision stages of adoption. We investigate the main factors influencing the different stages of adoption of vertical integration to provide a clearer view of what managers should consider at each stage. We adopt a multi-case study approach based on the investigation of ten companies that followed this adoption process. We develop a framework with 22 factors deployed in the three stages of decision (knowledge, persuasion, and final decision) and three main dimensions of analysis: technology, organization, and environment. We analyze the potential tensions between these factors and show how managers should balance such factors during the decision stages. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.",Industry 4.0; Information systems; Smart Manufacturing; Technology adoption; Vertical integration,48,Information Systems Frontiers,2024 499,Saraf N.; Bharati P.; Ravichandran T.,Does Social Capital Arise from Enterprise or Public Social Media Use? A Model of Social Media Antecedents and Consequences,"Research on the antecedents of SM and its consequences for organizations is silent on the distinctions between Enterprise SM (ESM) and Public SM (PSM) applications, as also is unclear whether PSM usage lowers or improves organizational outcomes. Our research model addresses these gaps. One, since SM usage is serendipitous and unstructured we propose that an organization’s strategic orientation is highly salient in affecting social media use. Two, we theorize why each type of SM – ESM vis-à-vis PSM contributes distinctly to organizational social capital. Data was collected from the IT industry, an ideal setting given its high clock-speed and information intensity. We find that PSM use contributes to all dimensions of social capital, over and above the contribution from ESM use. Further, as hypothesized, external orientation positively affects PSM use. The findings contribute to deepening theory to explain the link between SM use and organizational social capital, as well as introduce external orientation as novel antecedent of SM use. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Affordances; Partial Least Squares; Social capital; Social media; Survey questionnaire,4,Information Systems Frontiers,2023 500,Blesik T.; Bick M.; Kummer T.-F.,A Conceptualisation of Crowd Knowledge,"Propelled by digitalisation, crowd knowledge (CK) has gained popularity alongside a plurality of related crowd-based concepts (crowdsourcing, wisdom of crowds and collective intelligence), resulting in an inconsistent understanding of the terms and their application. Based on a structured literature review, we conceptualise CK and develop a formal definition, which is then evaluated using knowledge artefacts on different crowd-related platforms and differentiation criteria in relation to participants, context, purpose and process. The paper posits that CK is conceptually different from related concepts, due to its dynamic nature and its instantiation in the form of a CK knowledge artefact which requires a specific context and a unique knowledge-creation process. Furthermore, we discuss how the concept of CK and its associated artefact relates to established knowledge management concepts such as knowledge assets and the flow of CK in the epistemological differentiation of knowledge into tacit and explicit elements. The article contributes to the formal conceptualisation of crowd-based concepts and therefore improves understanding of existing implementations and supports the prudent design of future systems. © 2021, The Author(s).",Conceptual definition; Crowd knowledge; Crowd sourcing; Literature review,5,Information Systems Frontiers,2022 501,Nguyen T.H.; Waizenegger L.; Techatassanasoontorn A.A.,“Don’t Neglect the User!” – Identifying Types of Human-Chatbot Interactions and their Associated Characteristics,"Interactions with conversational agents (CAs) become increasingly common in our daily life. While research on human-CA interactions provides insights into the role of CAs, the active role of users has been mostly neglected. We addressed this void by applying a thematic analysis approach and analysed 1000 interactions between a chatbot and customers of an energy provider. Informed by the concepts of social presence and social cues and using the abductive logic, we identified six human-chatbot interaction types that differ according to salient characteristics, including direction, social presence, social cues of customers and the chatbot and customer effort. We found that bi-directionality, a medium degree of social presence and selected social cues used by the chatbot and customers are associated with desirable outcomes in which customers mostly obtain requested information. The findings help us understand the nature of human-CA interactions in a customer service context and inform the design and evaluation of CAs. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Chatbot; Computers Are Social Actors (CASA); Conversational agents; Customer service; Social cues; Social presence,39,Information Systems Frontiers,2022 502,Dai H.; Ge L.; Liu Y.,Information Matters: an Empirical Study of the Efficiency of On-Demand Services,"On-demand services through Internet platforms, e.g. ride-sharing, food take-out services, have emerged as a new business model. In these businesses, customers place orders on Internet platforms and get services fulfilled offline in a timely manner. In this paper, we examine the factors that affect the efficiency of on-demand food take-out services. Besides operational and road factors, we highlight the role of information integration of the ordering platform and the logistics platform. Our results show that information integration of the two platforms significantly increases service efficiency. Through integration, the logistics platform can optimize delivery dispatch based on more comprehensive and accurate historical and real-time demand and delivery information, avoiding suboptimal and short-sighted decisions. We also find that the efficiency of on-demand services depends much more on the information integration and the operational efficiency of the service provider than road conditions. We discuss the theoretical and practical implications for the business model of on-demand services. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Crowd-sourcing logistic; Delivery efficiency; Information systems; On-demand services; Online platforms,11,Information Systems Frontiers,2020 503,Bharati P.; Chaudhury A.,"Assimilation of Big Data Innovation: Investigating the Roles of IT, Social Media, and Relational Capital","In a knowledge-based economy with increasing competition, firms are under pressure to enhance their innovation capability. Social capital theory advances the idea that social capital promotes firm-level innovation. However, little is known about the process by which social capital of a firm translates into innovation outcomes such as implementation of big data initiatives. Little research has been done on what role information technology plays, if any, in this translation process. In this paper, we investigate how relational capital, a form of social capital, in the presence of social media and IT platforms, impacts innovation in the form of assimilation of big data technologies. The direct and indirect effects of the three variables: social media, relational capital and IT platform is studied. Direct effects of the three variables on big data innovation is established. Social media and IT platforms are found to significantly add to the positive relationship between relational capital and big data innovation. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Big data; Innovation; Organizational learning; Social capital theory; Social media,38,Information Systems Frontiers,2019 504,Liu J.; Timsina P.; El-Gayar O.,A comparative analysis of semi-supervised learning: The case of article selection for medical systematic reviews,"While systematic reviews are positioned as an essential element of modern evidence-based medical practice, the creation of these reviews is resource intensive. To mitigate this problem, there have been some attempts to leverage supervised machine learning to automate the article triage procedure. This approach has been proved to be helpful for updating existing systematic reviews. However, this technique holds very little promise for creating new reviews because training data is rarely available when it comes to systematic creation. In this research we assess and compare the applicability of semi-supervised learning to overcome this labeling bottleneck and support the creation of systematic reviews. The results indicated that semi-supervised learning could significantly reduce the human effort and is a viable technique for automating medical systematic review creation with a small-sized training dataset. © 2016, Springer Science+Business Media New York.",Active learning; Medical systematic reviews; Self-training; Semi-supervised learning; Text analytics; Text mining,27,Information Systems Frontiers,2018 505,Stieglitz S.; Meske C.; Ross B.; Mirbabaie M.,Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics,"In the context of events that involve public voting, such as televised competitions or elections, it has increasingly been recognized that communication data from social media is related to the outcome. Existing studies mainly analyse the number of messages and their sentiment, yet the role of different data collection periods has not been examined sufficiently. We collected Twitter data in 2015 and 2016 to examine the relationship between the audience voting of the Eurovision Song Contest and predictors based on quantity and emotions, and compared the results of using data from before and during the event. We found that the choice of time period greatly affected the results obtained. Data collected prior to the event exhibited a much stronger association with the final ranking than data collected during the event. In addition, the model based on pre-event data in 2015 showed considerable accuracy in predicting the 2016 results, illustrating the usefulness of social media data for predicting the outcomes of events outside social media. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Eurovision; Predictive analytics; Social media analytics; Time period; Twitter,15,Information Systems Frontiers,2020 506,Chung N.; Tyan I.; Han H.,Enhancing the smart tourism experience through geotag,"Geotagging which is one of the newest technologies in the smart tourism field is reckoned as being very useful for travelers in enhancing visiting experience. This study, focusing on the perspective of traveler’s readiness and technology acceptance model with hedonic view, aims at analyzing the relationships between traveler’s readiness, geotag technology perception and geotag adoption. In this study, the negative and insignificant relationship between traveler’s readiness and geotag usefulness were found. Positive relationships between traveler’s readiness and geotag ease of use and enjoyment were found. The influence of geotag ease of use on its usefulness was also found. Besides, the results show that both geotag ease of use and geotag enjoyment significantly influence its use intention. However, geotag usefulness didn’t significantly affect the geotag use intention. This study hopes to contribute in theoretical and practical ways, providing more information about how traveler’s readiness and technology perception factors influence geotag use intention. © 2016, Springer Science+Business Media New York.",Ability; Geotag; Hedonic technology acceptance model; Role clarity; Smart tourism; Social network sites; Traveler’s readiness,44,Information Systems Frontiers,2017 507,Zhu S.; Gupta A.; Paradice D.; Cegielski C.,Understanding the Impact of Immersion and Authenticity on Satisfaction Behavior in Learning Analytics Tasks,"As business analytics (BA) applications permeate across various industry sectors, the workforce needs to be trained and upskilled to meet the challenges of understanding and implementing analytics methodologies. To achieve payoffs from the resource investments in BA training, it is critical for enterprises to understand an individual’s learning behavior along with the process and outcome-centric satisfaction associated with a collaborative analytics training task. This study focuses on identifying the factors that influence the process of learning during BA training to entry-level BA users. Drawing on the theories of situated cognition, goal setting, and flow, we propose a model that explains how trainees in a group learn through a process that is influenced by the characteristics of BA training context through context authenticity, the traits of trainees through task motivation and preference towards teamwork. Using an experimental design built on data collection and a unique task of real visits to a historic cemetery, we found that context authenticity and task motivation have significant impact on focused immersion, which in turn significantly impacts process and outcome satisfaction for learning an analytics task. Results of this study extend and validate the theories of situated cognition, goal setting, and flow within the context of business analytics training. Based on these findings, we provide recommendations for practitioners for designing effective analytics tasks for better training outcomes. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Behavior; Business analytics; Context authenticity; Focused immersion; Satisfaction,18,Information Systems Frontiers,2019 508,Aswani R.; Kar A.K.; Vigneswara Ilavarasan P.,Detection of Spammers in Twitter marketing: A Hybrid Approach Using Social Media Analytics and Bio Inspired Computing,"Customer engagement is drastically improved through Web 2.0 technologies, especially social media platforms like Twitter. These platforms are often used by organizations for marketing, of which creation of numerous spam profiles for content promotion is common. The present paper proposes a hybrid approach for identifying the spam profiles by combining social media analytics and bio inspired computing. It adopts a modified K-Means integrated Levy flight Firefly Algorithm (LFA) with chaotic maps as an extension to Firefly Algorithm (FA) for spam detection in Twitter marketing. A total of 18,44,701 tweets have been analyzed from 14,235 Twitter profiles on 13 statistically significant factors derived from social media analytics. A Fuzzy C-Means Clustering approach is further used to identify the overlapping users in two clusters of spammers and non-spammers. Six variants of K-Means integrated FA including chaotic maps and levy flights are tested. The findings indicate that FA with chaos for tuning attractiveness coefficient using Gauss Map converges to a working solution the fastest. Further, LFA with chaos for tuning the absorption coefficient using sinusoidal map outperforms the rest of the approaches in terms of accuracy. © 2017, Springer Science+Business Media, LLC.",Bio inspired computing; Firefly algorithm; Machine learning; Social media analytics; Spam detection; Twitter analytics,98,Information Systems Frontiers,2018 509,Lin X.; Featherman M.; Brooks S.L.; Hajli N.,Exploring Gender Differences in Online Consumer Purchase Decision Making: An Online Product Presentation Perspective,"Gender effects remain poorly understood in the E-commerce setting. Using the selectivity model, this research further investigates gender differences in consumer Web-based purchase decisions. Specifically, gender differences in the effects of interactivity, vividness, diagnosticity, and perceived risk on subsequent consumer attitude and online purchase intentions are investigated and explained. An empirical survey-based research study in the e-commerce context found that gender differences exist in the relative influence of each antecedent. Specifically, interactivity and perceived risk influenced attitude formation more for males than females, while vividness and diagnosticity influenced attitude formation more for females than males. In addition, attitude toward online product presentation influenced purchase intention more strongly for males than females. For e-Commerce web-site designers and brand managers, our results highlight the importance of being gender aware when developing their web presence. While some sites may benefit from a gender-neutral design, others may benefit from a design based on results reported here. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",E-commerce; Gender; Gender differences; Online purchase decision; The selectivity hypothesis,199,Information Systems Frontiers,2019 510,Le-Nguyen K.; Dyerson R.; Harindranath G.,Exploring knowledge management software implementation from a knowing-in-practice perspective,"This paper draws attention to a major issue of Knowledge Management (KM) technology implementation: potential sources of incongruence between KM software and the adopting organization. Using the case of a global consultancy firm, the paper explains KM software-organization incongruences as the consequence of differences between organizational and KM software developer’s knowledge work context and practice. Such differences reflect the differing ‘situated’ knowledge work practices that KM software developers and adopting organizations deliberately acquire and evolve over time. Theoretically, this paper gives a more comprehensive account of how knowledge work practices emerged and were then embedded into the software or the organization. Practically, this study would help make organizations more aware of the factors influencing KM software adoption and implementation, particularly in the case of large firms that are characterized by high-value, text-based content for decision-making such as professional service, R&D, and healthcare organizations. © 2016, Springer Science+Business Media New York.",Implementation; Incongruence; Knowledge management; Organization; Software,4,Information Systems Frontiers,2018 511,Zhao Z.; Ma Z.; Yan L.,An Efficient Classification of Fuzzy XML Documents Based on Kernel ELM,"Data classification for distributed and heterogeneous XML data sources is always an open challenge. A considerable number of algorithms for classification of XML documents have been proposed in the literature. Yet, the existing approaches fall short in ability to classify the fuzzy XML documents. In this paper, we provide a KPCA-KELM classification framework for the fuzzy XML documents based on Kernel Extreme Learning Machine (KELM). Firstly, we propose a novel fuzzy XML document tree model to represent fuzzy XML documents. Secondly, we employ an effective vector space model to represent the semantic structure of fuzzy XML documents based on the proposed fuzzy XML document tree model. Thirdly, we classify the fuzzy XML document using KELM after feature extraction using Kernel Principal Component Analysis (KPCA). The corresponding experimental results demonstrate that our proposed KPCA-KELM approach shortens the training time while maintaining the same level of accuracy as the state-of-the-art baseline models. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Data classification; Feature extraction; Fuzzy XML; Kernel extreme learning machine (KELM),9,Information Systems Frontiers,2021 512,Yang Z.-C.,Vector Gravitation Clustering Networks,"In pattern recognition, patterns are described in terms of features. The features form feature vectors in the feature space. In the light of the phenomenon of gravitation in star clusters, we define patterns in the feature space to self-organize into clustering networks called “vector gravitation clustering networks” in this study. In the proposed clustering method, one called “vector gravitational force” is employed for the similarity measure in the feature space. Then by means of the “vector gravitational force”, patterns self-organize clustering networks called “vector gravitation clustering networks” in the feature space. The proposed clustering method is applied to experiments. The experimental results show workability of the proposed clustering method. It is revealed that patterns tend to have more called “vector gravitational force” between ones of the same categories than between ones of the different categories in the feature space. Finally, further performance analysis employing the ANOVA (“analysis of variance”) and the Newman-Keul procedure indicates potentiality of the proposed clustering method. As being inspired by the phenomenon of gravitation in star clusters and by using the “vector gravitational force” for similarity measure, “interpretability” is one obvious advantage of the proposed clustering method, and it may be viewed as one natural clustering method. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Clustering; Phenomenon of gravitation; Vector gravitation clustering networks; Vector gravitational force model,0,Information Systems Frontiers,2021 513,March S.T.; Scudder G.D.,Predictive maintenance: strategic use of IT in manufacturing organizations,"A combination of big data and predictive analytics orchestrated through the Internet of Things (IoT) offers many opportunities for researchers in Information Systems, Operations Management and Strategy to look at old problems in new ways, and to identify completely new research areas. While there is much hype, little research has been conducted that informs companies about how to profitably integrate the IoT with strategic or operational processes. This paper views the IoT through the lens of predictive maintenance -- the use of real-time data and predictive analytics algorithms to dynamically manage preventive maintenance policies. These are being used by numerous manufacturing organizations to transition from product-oriented to service-oriented business models. In particular, we analyze optimal preventive maintenance policies in an environment where equipment is subject to a deterioration, which shifts it from its initial, fully-productive state, having a specified, age-dependent failure rate to a less-productive or deteriorated state, having a different, presumably higher, age-dependent failure rate. The deterioration, itself, is a random process. © 2017, Springer Science+Business Media New York.",Internet of things; Predictive maintenance; Preventive maintenance; Strategic information systems,40,Information Systems Frontiers,2019 514,Choi H.S.; Carpenter D.; Ko M.S.,Risk Taking Behaviors Using Public Wi-Fi™,"Dramatic increases in public Wi-Fi™ (hereafter referred to as Wi-Fi) availability have occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it has significant security vulnerabilities. Despite widespread knowledge of potential vulnerabilities of public Wi-Fi, most people simply connect to it in public places. We investigated the individual calculus behind risk-taking behavior based on the theoretical foundations of risk taking behavior, technology threat avoidance theory, prospect theory, and self-determination theory. Using survey data collected from 1313 respondents in the United States, this study found that avoidance motivation, risk averting propensity, and intrinsic and extrinsic motivations affect intention to use public Wi-Fi. In addition, our results indicate that avoidance motivation is related to safeguard effectiveness, safeguard cost, and perceived threat, while risk averting propensity is associated with positive outcome history, age, gender, and education attainment. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Prospect theory; Public Wi-fi; Risk-taking behavior; Self-determination theory; Technology threat avoidance theory,11,Information Systems Frontiers,2022 515,Baur A.W.,"Harnessing the social web to enhance insights into people’s opinions in business, government and public administration","Transparency, participation, and collaboration are the core pillars of open government. For the systematic integration of citizens and other stakeholders into the policy and public value creation process, their opinions, wishes, and complaints first need to be received. In the future, including user-generated content from social media will become a main channel for the enrichment of this information base for public administrative bodies and commercial firms. However, the sheer speed of growth of this constantly updated data pool makes manual work infeasible. The automated gathering, combination, analysis, and visualization of user-generated content from various sources and multiple languages is therefore imperative. In this study, we present a design science research approach to develop a general framework (‘MarketMiner’) to handle large amounts of foreign-language user-generated content. As a first empirical application, we implement the framework in the automotive industry by analyzing Chinese automotive forums for the benefit of English-speaking users. At the same time, the ideas, methods, and insights are transferred to the public sector context, especially in light of the current challenges of a high number of political refugees from Arabic countries entering into the European Union. The results are promising in that MarketMiner can dramatically improve the utilization of multi-language, multi-source social media content. The modular set-up of the artifact allows an easy transfer to additional areas of application. © 2016, Springer Science+Business Media New York.",Business intelligence; Design science research; Open data; Open government; Participation; Public sector; Refugees; Social media analytics; Text mining; User-generated content (UGC),45,Information Systems Frontiers,2017 516,Lee C.-C.; Li C.-T.; Cheng C.-L.; Lai Y.-M.; Vasilakos A.V.,A Novel Group Ownership Delegate Protocol for RFID Systems,"In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Group ownership delegate; Homomorphic encryption; Quadratic residue; RFID; Time-bound,16,Information Systems Frontiers,2019 517,Wojciechowski A.,ETL workflow reparation by means of case-based reasoning,"Data sources (DSs) being integrated in a data warehouse frequently change their structures/schemas. As a consequence, in many cases, an already deployed ETL workflow stops its execution, yielding errors. Since in big companies the number of ETL workflows may reach dozens of thousands and since structural changes of DSs are frequent, an automatic repair of an ETL workflow after such changes is of high practical importance. In our approach, we developed a framework, called E-ETL, for handling the evolution of an ETL layer. In the framework, an ETL workflow is semi-automatically or automatically (depending on a case) repaired as the result of structural changes in DSs, so that it works with the changed DSs. E-ETL supports two different repair methods, namely: (1) user defined rules, (2) and Case-Based Reasoning. In this paper, we present how Case-Based Reasoning may be applied to repairing ETL workflows. In particular, we contribute an algorithm for selecting the most suitable case for a given ETL evolution problem. The algorithm applies a technique for reducing cases in order to make them more universal and capable of solving more problems. The algorithm has been implemented in prototype E-ETL and evaluated experimentally. The obtained results are also discussed in this paper. © 2017, The Author(s).",Case-based reasoning; Data source evolution; ETL evolution; ETL repair,18,Information Systems Frontiers,2018 518,Mirkovski K.; Yin C.; Liu L.; Yang J.,Exploring the Contingent Effect of Community Equity on Users’ Intention to Share Information,"Advancements in social commerce sites have enabled users to share and exchange product- or consumption-related information and/or experiences. Despite the growing popularity of social commerce sites, theoretical understanding of users’ intentions to share information in this new social media platform remains largely unexplored. In this study, we address the question of what motivates users’ intentions to share information in social commerce sites. We extend the literature on information sharing behavior by considering the novel context of social commerce and examining the effects of psychological motivations. Drawing on the social cognitive theory and equity theory, we further explore the moderating role of community equity on the relationship between psychological motivations and users’ intentions to share information. The analysis of survey data collected from 1089 social commerce users confirms our hypotheses. Our study advances the theoretical understanding of information sharing in this new social media context and provides guidelines for improving the features of social commerce sites. © 2017, Springer Science+Business Media, LLC.",Community equity; Intention to share information; Psychological motivations; Social commerce sites,23,Information Systems Frontiers,2019 519,Hemon A.; Lyonnet B.; Rowe F.; Fitzgerald B.,From Agile to DevOps: Smart Skills and Collaborations,"Although agile software development approaches have become increasingly prevalent, many organizations, have found they were not able to achieve a more frequent release cadence, largely due to different departmental functions operating in silos. In an effort to remove these silos, companies have moved towards DevOps. As digitalization continues, companies increasingly implement DevOps. We suggest three different stages in the agile to DevOps transition: agile, continuous integration, and continuous delivery. Based on an in-depth case study in an organization with several years’ experience in DevOps, we identify a fundamental disruption in the soft skills that software teams are expected to possess, and in the patterns of collaboration among teams. Arguably, smartness may be characterized as being flexible, teaming up with people who have a different profile, belonging to a different function, and achieving a quicker delivery schedule. In light of this, we argue that DevOps leads to greater smartness for the Information Systems function. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Agile; Collaboration; DevOps; Roles; Skills; Smartness,92,Information Systems Frontiers,2020 520,Walsh G.; Shiu E.; Hassan L.; Hille P.; Takahashi I.,Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development,"The growing internationalization of electronic commerce demands the establishment of the cross-national validity of theoretical concepts. An important concept in e-commerce is consumers’ fear of online identity theft (FOIT), which impedes consumers’ willingness to engage in online transactions and can negatively affect e-commerce revenues. The present study validates the consumer FOIT scale developed in Germany by Hille et al. (2015) in a cross-cultural setting and proposes an abbreviated version of the scale, which is approximately 35% shorter than the original. Established validation procedures with samples of online consumers from Germany, the United States, and Japan demonstrate the reliability, validity, and cross-national applicability of the short FOIT scale. In particular, this study extends Hille et al. (2015) research by examining and revealing the impact of FOIT on consumers’ prevention-focused responses. This research offers implications for both research and e-commerce managers. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cross-cultural scale validation; E-commerce; Fear of online identity theft; Prevention-focused responses,19,Information Systems Frontiers,2019 521,Mu L.; Sugumaran V.; Wang F.,A Hybrid Genetic Algorithm for Software Architecture Re-Modularization,"Software architectures have become highly heterogeneous and difficult to maintain due to software evolution and continuous change. Therefore, a software system usually must be restructured in terms of modules containing relatively dependent components to address the system complexity. However, it is challenging to re-modularize systems automatically to improve their maintainability. In this paper, we present a new mathematical programming model for the software re-modularization problem. In contrast to previous research, a novel metric based on the principle of complexity balance is introduced to address the issue of over-cohesiveness. In addition, a hybrid genetic algorithm (HGA) is designed to automatically determine high-quality re-modularization solutions. In the proposed HGA, a heuristic based on edge contraction and vectorization techniques is designed first to generate feature-rich solutions and subsequently implant these solutions as seeds into the initial population. Finally, a customized genetic algorithm (GA) is employed to improve the solution quality. Two sets of test problems are employed to evaluate the performance of the HGA. The first set includes sixteen real-world instances and the second set contains 900 large-scale simulated data. The proposed HGA is compared with two widely adopted algorithms, i.e., the multi-start hill-climbing algorithm (HCA) and the genetic algorithms with group number encoding (GNE). Experimental and statistical results demonstrate that in most cases, the HGA can guarantee better quality solutions than HCA and GNE. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Combinatorial optimization; Genetic algorithms; Heuristics; Software engineering,24,Information Systems Frontiers,2020 522,Anagnostopoulos D.; Papadopoulos T.; Stamati T.; Balta M.E.,Policy and Information Systems Implementation: the Greek Property Tax Information System Case,"This study contributes to the literature on Information Systems (IS) implementation and provides insights into how IS implementation emerges as an assemblage constituted by diverse sociomaterial practices –that is, the intertwining of humans and technology in practice– during the implementation of Greece’s Yearly Property Tax policy and information system over the period 1997–2015. Drawing on the work of Deleuze, Guattari, and Delanda on ‘assemblage theory’ and Burke’s on motive (expressed as ‘intentionality’ and ‘motivation’) we discuss IS implementation as a performative process that is shaped by assemblage agents’ intentionality and motivation and conclude that explicitly attending to these dynamics during the emergence of policy and technology as a sociomaterial assemblage contributes to a better understanding of IS implementation and its success. We propose that higher levels of motivation and intentionality are related to higher chances of successful implementation. Finally, limitations and future research directions are proposed. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Assemblage; Greece; Intentionality; IS implementation; Motivation; Performative process; Sociomateriality,7,Information Systems Frontiers,2020 523,Sun J.,Ubiquitous Computing Capabilities and User-System Interaction Readiness: An Activity Perspective,"Based on mobile computing technologies, ubiquitous systems enable people to access information anywhere and anytime. In addition to the capability of interactivity concerning inquiry processing based on user input through interfaces, ubiquitous systems may offer contextualization and personalization dealing with information filtering based on task contexts and user preferences, which help relieve user effort on the move. This study investigates how different combinations of these major ubiquitous computing capabilities affect user behavior. Using the unifying framework of Activity Theory, it conceptualizes user-system interaction as a tool-mediated activity, the different aspects of which are facilitated by interactivity, contextualization, and personalization. It is hypothesized that such capabilities shape user experiences including sense of control, motive fulfillment, and perceived understanding, which lead to how ready people are to interact with ubiquitous systems. The results from an experiment support the hypothesized relationships, and suggest that different capabilities are interdependent in their effects. The findings yield insights on how to take a systematic and balanced approach of ubiquitous system design to enhance user experiences. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Activity Theory; Contextualization; Interactivity; Personalization; Ubiquitous computing; User-system interaction,3,Information Systems Frontiers,2020 524,Ghasemian F.; Zamanifar K.; Ghasem-Aghaee N.,Composing Scientific Collaborations Based on Scholars’ Rank in Hypergraph,"Finding the right scholars for collaboration is crucial for scientific progress. In this study, a novel algorithm is proposed to find the successful team configurations for scientific collaboration in the presence of the collaboration network of scholars. In this algorithm, the collaboration network is exploited to estimate the trust level among team members and the skill level of the scholars, while a hypergraph is used to model the relations. Also, our algorithm improves the search process by directing it to the promising regions, where the probability of finding the successful teams is high. A comparison with other algorithms is done to evaluate the proposed algorithm, using the similarity to successful collaborations. Our findings show that this algorithm achieves a significantly higher performance, compared to the other algorithms. © 2017, Springer Science+Business Media New York.",Collaboration network; Hypergraph; Jaccard similarity; Scientific collaboration; Team formation algorithm,0,Information Systems Frontiers,2019 525,Ghahramani F.; Wang J.,Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective,"Healthcare is the sector that was significantly changed by the arrival of mobile devices. This study investigates how an individual using smartphones impact quality of life by changing his or her health information behavior. Our results show that individuals with a smartphone are more likely to seek and track their health information than those who with a regular cell phone, and consequently, the former experience a better quality of life. Moreover, using smartphone more likely leads to seek health information for care-givers than non-caregivers, as well as for the younger individuals than the older. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Age; Caregiver; Health information behavior; Quality of life; Smartphone,45,Information Systems Frontiers,2020 526,Kessel M.; Atkinson C.,Ranking software components for reuse based on non-functional properties,"One of the biggest obstacles to software reuse is the cost involved in evaluating the suitability of possible reusable components. In recent years, code search engines have made significant progress in establishing the semantic suitability of components for new usage scenarios, but the problem of ranking components according to their non-functional suitability has largely been neglected. The main difficulty is that a component’s non-functional suitability for a specific reuse scenario is usually influenced by multiple, “soft” criteria, but the relative weighting of metrics for these criteria is rarely known quantitatively. What is required, therefore, is an effective and reliable strategy for ranking software components based on their non-functional properties without requiring users to provide quantitative weighting information. In this paper we present a novel approach for achieving this based on the non-dominated sorting of components driven by a specification of the relative importance of non-functional properties as a partial ordering. After describing the ranking algorithm and its implementation in a component search engine, we provide an explorative study of its properties on a sample set of components harvested from Maven Central. © 2016, Springer Science+Business Media New York.",Multi-criteria decision making; Non-functional requirements; Software component ranking; Software components; Software metrics; Software quality; Software reuse; Software testing; Sorting,11,Information Systems Frontiers,2016 527,Plume C.J.; Slade E.L.,Sharing of Sponsored Advertisements on Social Media: A Uses and Gratifications Perspective,"Organisations are increasingly utilising social media to advertise to, and interact with, consumers. Sponsored advertisements embedded into targeted users’ social media feeds appear less invasive than standalone advertisements but, unlike organic postings, incur financial cost. Given that friends’ posts attract most attention, this research employs Uses and Gratifications theory to determine salient motivations for users’ intentions to share sponsored advertisements, framed in the tourism context. Survey data was collected (n = 487) and analysis revealed altruism, entertainment, socialising, and information seeking to be significant positive drivers of intention to share tourism-related sponsored advertisements on Facebook. Notably, information sharing was found to have a negative effect, while self-expression had no significant effect. In addition, the motivations were not found to significantly differ between males and females. This study contributes to theoretical understanding of users’ intentions to share sponsored advertisements within the social media environment and provides practical recommendations to help tourism marketers maximise reach. © 2018, The Author(s).",Gender differences; Sharing; Social media; Sponsored advertisements; Uses and gratifications,119,Information Systems Frontiers,2018 528,Bandyopadhyay T.; Mookerjee V.,A model to analyze the challenge of using cyber insurance,"This work analyzes and extends insurance dynamics in the context of cyber risk. Cyber insurance contracts, when used as a means to manage residual cyber risk, could behave differently from other traditional (e.g., property) insurance. One important difference arises from the complexity involved in the post-breach decision of whether and how a firm should optimally plan to claim indemnity in the event of a cyber breach. We define different types of cyber breaches leading to different claiming scenarios, whose roots lie in the impact of secondary loss caused by certain but not all types of breaches. We build a model to capture the impact of secondary loss in structuring the use of cyber insurance and then combine the backward analysis of myriad breach scenarios to derive the overall optimal decision to purchase cyber insurance. We demonstrate that the optimal purchase decision depends on the mix of the types of cyber breaches that a firm faces. Numerical experiments corroborate market observation of limited use of cyber insurance after 20 years from when these products became available. © 2017, Springer Science+Business Media New York.",Cyber insurance; Cyber risk transfer; IT security management,11,Information Systems Frontiers,2019 529,Tammpuu P.; Masso A.,Transnational Digital Identity as an Instrument for Global Digital Citizenship: The Case of Estonia’s E-Residency,"Digital identity systems appear as part of the digital infrastructure that enables individuals to participate in society as digital citizens. This paper examines the implications of Estonia’s e-residency, the transnational digital identity scheme implemented by the Estonian government in order to give non-residents of the country remote access to Estonia’s digital infrastructure and e-services, for global digital citizenship. We explain the adoption of e-residency by analyzing how individual motives to apply for a digital identity are affected by both individual-level socio-demographic characteristics and macro-level characteristics measuring digital and economic development in applicant’s country of origin. The findings suggest that individual motives to adopt e-residency vary depending on both the citizenship of applicants and the level of e-government development in the country of origin. Although attracting more citizens from digitally advanced countries, individual motives indicate that e-residency can compensate certain digital disadvantage to citizens of countries with lower levels of e-government development. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Digital citizenship; Digital identity; Digital inequality; E-government; E-residency; Virtual mobility,51,Information Systems Frontiers,2019 530,Mendling J.; Recker J.; Reijers H.A.; Leopold H.,An Empirical Review of the Connection Between Model Viewer Characteristics and the Comprehension of Conceptual Process Models,"Understanding conceptual models of business domains is a key skill for practitioners tasked with systems analysis and design. Research in this field predominantly uses experiments with specific user proxy cohorts to examine factors that explain how well different types of conceptual models can be comprehended by model viewers. However, the results from these studies are difficult to compare. One key difficulty rests in the unsystematic and fluctuating consideration of model viewer characteristics (MVCs) to date. In this paper, we review MVCs used in prominent prior studies on conceptual model comprehension. We then design an empirical review of the influence of MVCS through a global, cross-sectional experimental study in which over 500 student and practitioner users were asked to answer comprehension questions about a prominent type of conceptual model - BPMN process models. As an experimental treatment, we used good versus bad layout in order to increase the variance of performance. Our results show MVC to be a multi-dimensional construct. Moreover, process model comprehension is related in different ways to different traits of the MVC construct. Based on these findings, we offer guidance for experimental designs in this area of research and provide implications for the study of MVCs. © 2018, The Author(s).",BPMN; Conceptual modeling; Experiment; Literature review; Model viewer characteristics; Process modeling,36,Information Systems Frontiers,2019 531,Leofante F.; Ábrahám E.; Niemueller T.; Lakemeyer G.; Tacchella A.,Integrated Synthesis and Execution of Optimal Plans for Multi-Robot Systems in Logistics,"Model-based synthesis allows to generate plans to achieve high-level tasks while satisfying certain properties of interest. However, when such plans are executed on concrete systems, several modeling assumptions may be challenged, jeopardizing their real applicability. This paper presents an integrated system for generating, executing and monitoring optimal-by-construction plans for multi-robot systems. This system unites the power of Optimization Modulo Theories with the flexibility of an on-line executive, providing optimal solutions for high-level task planning, and runtime feedback on their feasibility. After presenting how our system orchestrates static and runtime components, we demonstrate its capabilities using the RoboCup Logistics League as testbed. We do not only present our final solution but also its chronological development, and draw some general observations for the development of OMT-based approaches. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Multi-robot systems; Online execution; Optimal task planning; Planning as satisfiability; Production logistics,23,Information Systems Frontiers,2019 532,Huang S.Y.; Lin C.-C.; Chiu A.-A.; Yen D.C.,Fraud detection using fraud triangle risk factors,"The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation. © 2016, Springer Science+Business Media New York.",AHP; Analytic hierarchy process; Data mining; Fraud detection; Fraud triangle; Lawshe’s approach,101,Information Systems Frontiers,2017 533,Nellen J.; Driessen K.; Neuhäußer M.; Ábrahám E.; Wolters B.,Two CEGAR-based approaches for the safety verification of PLC-controlled plants,"In this paper we address the safety analysis of chemical plants controlled by programmable logic controllers (PLCs). We consider a specification of the control program of the PLCs, extended with the specification of the dynamic plant behavior. The resulting hybrid models can be transformed to hybrid automata, for which advanced techniques for reachability analysis exist. However, the hybrid automata models are often too large to be analyzed. We propose two counterexample-guided abstraction refinement (CEGAR) approaches to keep the size of the hybrid models moderate. © 2016, Springer Science+Business Media New York.",Bounded model checking; CEGAR; Hybrid systems; Reachability analysis; Safety verification,15,Information Systems Frontiers,2016 534,Shin S.-H.; Yang S.-B.; Nam K.; Koo C.,Conceptual foundations of a landmark personality scale based on a destination personality scale: Text mining of online reviews,"Landmarks play an important role in representing tourist destinations because they symbolize a destination’s image and personality. Despite the significance of landmarks to the perception of a destination’s image and personality, a personality scale based on landmarks has not been developed. To this end, the purpose of this study is to propose a conceptual foundation of a landscape personality scale based on a destination personality scale using online travel reviews, which are regarded as more valid sources for understanding actual tourist perceptions than simple answers to survey questionnaires. The results of this study imply that the words that describe specific landmarks may differ from those that portray the entire destination and suggest that the words tourists actually use in real situations to characterize tourism resources can be distinguished from hypothetical words of a destination personality scale. Finally, the theoretical and practical implications of the research and directions for future studies are discussed. © 2016, Springer Science+Business Media New York.",Brand personality; Destination personality scale; Landmark personality scale; Landmark perspective; Online travel review; Tourism destination,19,Information Systems Frontiers,2017 535,Rubin S.H.; Bouabana-Tebibel T.; Hoadjli Y.,On the empirical justification of theoretical heuristic transference and learning,"The solution of intractable problems implies the use of heuristics. Quantum computers may find use for optimization problems, but have yet to solve any NP-hard problems. This paper demonstrates results in game theory for domain transference and the reuse of problem-solving knowledge through the application of learned heuristics. It goes on to explore the possibilities for the acquisition of heuristics for the solution of the NP-hard TSP problem. Here, it is found that simple heuristics (e.g., pairwise exchange) often work best in the context of more or less sophisticated experimental designs. Often, these problems are not amenable to exclusive logic solutions; but rather, require the application of hybrid approaches predicated on search. In general, such approaches are based on randomization and supported by parallel processing. This means that heuristic solutions emerge from attempts to randomize the search space. The paper goes on to present a constructive proof of the unbounded density of knowledge in support of the Semantic Randomization Theorem (SRT). It highlights this result and its potential impact upon the community of machine learning researchers. © 2016, Springer Science+Business Media New York (outside the USA).",Domain transference; Heuristics; Machine learning; N-puzzle; Randomization; Reuse; SRT,2,Information Systems Frontiers,2016 536,Mukherjee S.,Emerging Frontiers in Smart Environment and Healthcare – A Vision,"The second half of the twentieth century has witnessed unprecedented development and growth in information technology. What began as a foundational technology in exploring science and engineering has evolved into ground-breaking tools in most fields of endeavor. Today, rapidly expanding applications of informatics are being developed in diverse fields such as business management, transportation, environmental monitoring, building management, various aspects of healthcare, and even in fine arts. Driven by new developments in data analytics, Big Data, Artificial Intelligence and Deep Learning neural networks, enormous opportunities are opening up in therapeutic application of IT well beyond clinical diagnostic aids and computational biology. Augmentation of human mental faculties particularly with respect to multivariate analysis will drive major areas of research in the coming years. A number of potential research areas are presented in the paper. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Ambient Intelligence; Artificial Intelligence; Autism; Big Data; Deep Learning; IT; Lighting controls; Personalized Healthcare; PTSD; Smart Buildings; Smart City,18,Information Systems Frontiers,2020 537,Burns A.J.; Posey C.; Courtney J.F.; Roberts T.L.; Nanayakkara P.,Organizational information security as a complex adaptive system: insights from three agent-based models,"The management of information security can be conceptualized as a complex adaptive system because the actions of both insiders and outsiders co-evolve with the organizational environment, thereby leading to the emergence of overall security of informational assets within an organization. Thus, the interactions among individuals and their environments at the micro-level form the overall security posture at the macro-level. Additionally, in this complex environment, security threats evolve constantly, leaving organizations little choice but to evolve alongside those threats or risk losing everything. In order to protect organizational information systems and associated informational assets, managers are forced to adapt to security threats by training employees and by keeping systems and security procedures updated. This research explains how organizational information security can perhaps best be managed as a complex adaptive system (CAS) and models the complexity of IS security risks and organizational responses using agent-based modeling (ABM). We present agent-based models that illustrate simple probabilistic phishing problems as well as models that simulate the organizational security outcomes of complex theoretical security approaches based on general deterrence theory (GDT) and protection motivation theory (PMT). © 2015, Springer Science+Business Media New York.",Agent-Based Modeling (ABM); Complex Adaptive Systems (CAS); General Deterrence Theory (GDT); Information Assurance (IA); Information Security; NetLogo; Phishing; Protection Motivation Theory (PMT),35,Information Systems Frontiers,2017 538,Elakkiya R.; Vijayakumar P.; Karuppiah M.,COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking,"Infectious diseases are highly contagious due to rapid transmission and very challenging to diagnose in the early stage. Artificial Intelligence and Machine Learning now become a strategic weapon in assisting infectious disease prevention, rapid-response in diagnosis, surveillance, and management. In this paper, a bifold COVID_SCREENET architecture is introduced for providing COVID-19 screening solutions using Chest Radiography (CR) images. Transfer learning using nine pre-trained ImageNet models to extract the features of Normal, Pneumonia, and COVID-19 images is adapted in the first fold and classified using baseline Convolutional Neural Network (CNN). A Modified Stacked Ensemble Learning (MSEL) is proposed in the second fold by stacking the top five pre-trained models, and then the predictions resulted. Experimentation is carried out in two folds: In first fold, open-source samples are considered and in second fold 2216 real-time samples collected from Tamilnadu Government Hospitals, India, and the screening results for COVID data is 100% accurate in both the cases. The proposed approach is also validated and blind reviewed with the help of two radiologists at Thanjavur Medical College & Hospitals by collecting 2216 chest X-ray images between the month of April and May. Based on the reports, the measures are calculated for COVID_SCREENET and it showed 100% accuracy in performing multi-class classification. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",AI diagnostics tool; COVID-19; Deep learning; Diagnostic radiography; Machine learning; Medical diagnosis; X-rays,27,Information Systems Frontiers,2021 539,Wahyudi A.; Kuk G.; Janssen M.,A Process Pattern Model for Tackling and Improving Big Data Quality,"Data seldom create value by themselves. They need to be linked and combined from multiple sources, which can often come with variable data quality. The task of improving data quality is a recurring challenge. In this paper, we use a case study of a large telecom company to develop a generic process pattern model for improving data quality. The process pattern model is defined as a proven series of activities, aimed at improving the data quality given a certain context, a particular objective, and a specific set of initial conditions. Four different patterns are derived to deal with the variations in data quality of datasets. Instead of having to find the way to improve the quality of big data for each situation, the process model provides data users with generic patterns, which can be used as a reference model to improve big data quality. © 2018, The Author(s).",Big data; Data processing; Data quality; Information quality; Process patterns; Reference model telecom,51,Information Systems Frontiers,2018 540,Di Gangi P.M.; Johnston A.C.; Worrell J.L.; Thompson S.C.,What could possibly go wrong? A multi-panel Delphi study of organizational social media risk,"The growth of social media has crossed the boundary from individual to organizational use, bringing with it a set of benefits and risks. To mitigate these risks and ensure the benefits of social media use are realized, organizations have developed a host of new policies, procedures, and hiring practices. However, research to date has yet to provide a comprehensive view on the nature of risk associated with the use of social media by organizations. Using a multi-panel Delphi approach consisting of new entrants to the workforce, certified human resource professionals, and certified Information Technology auditors, this study seeks to understand organizational social media risk. The results of the Delphi panels are compared against a textual analysis of 40 social media policies to provide a comprehensive view of the current state of social media policy development. We conclude with directions for future research that may guide researchers interested in exploring social media risk in organizations. © 2016, Springer Science+Business Media New York.",Information security; Organizational risk framework; Risk; Social media; Social media policy; Web 2.0,22,Information Systems Frontiers,2018 541,Alirezaei E.; Parsa S.,Adaptable Cross-organizational Unstructured Business Processes via Dynamic Rule-based Semantic Network,"Rapid online adaptation to the new business requirements can improve innovation level and market competency of collaborative organizations. Complex and unstructured processes are provision e-services in collaborative networks through web service inter-connections, which unanticipated changes made it hard to manage them. In a cross-organizational domain, when partners deal with unexpected changes, the received requests are represented as complex theories, and business process adaptation will be more complicated in the occurrence of concept drifts. Rapid prediction and adaptation to new situations need concept drift detection and novel class prediction mechanism for the overall collaborative network processes in both data and control flows. In this article, a new approach to the online reflection of distributed rule concept drifts of collaborative network reference processes is introduced. The solution to the data-informed adaptation of unstructured process employed managing rule concept drifts and cross-organizational processes restructuring via the distributed model with minor updates. The method could react to the new events via an ensemble prediction mechanism. Its architecture has major components for monitoring, dynamic distributed rule reconfiguration, and partners side components. The paper suggests a service-oriented semantic network of distributed rules for e-services provision, substitution, and replacement via management of choreographed web-services. The approach has been validated and verified with real data belonging to the healthcare domain. The results prove the adaptation mechanism efficiency of the daily changes. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Business process adaptation; Choreographed web-services; Collaborative network; Ensemble prediction; Unstructured processes,4,Information Systems Frontiers,2020 542,Hassan Zadeh A.; Zolbanin H.M.; Sharda R.; Delen D.,Social Media for Nowcasting Flu Activity: Spatio-Temporal Big Data Analysis,"Contagious diseases pose significant challenges to public healthcare systems all over the world. The rise in emerging contagious and infectious diseases has led to calls for the use of new techniques and technologies capable of detecting, tracking, mapping and managing behavioral patterns in such diseases. In this study, we used Big Data technologies to analyze two sets of flu (influenza) activity data: Twitter data were used to extract behavioral patterns from a location-based social network and to monitor flu outbreaks (and their locations) in the US, and Cerner HealthFacts data warehouse was used to track real-world clinical encounters. We expected that the integration (mashing) of social media and real-world clinical encounters could be a valuable enhancement to the existing surveillance systems. Our results verified that flu-related traffic on social media is closely related with actual flu outbreaks. However, rather than using simple Pearson correlation, which assumes a zero lag between the online and real-world activities, we used a multi-method data analytics approach to obtain the spatio-temporal cross-correlation between the two flu trends and to explain behavioral patterns during the flu season. We found that clinical flu encounters lag behind online posts. Also, we identified several public locations from which a majority of posts initiated. These findings can help health authorities develop more effective interventions (behavioral and/or otherwise) during the outbreaks to reduce the spread and impact, and to inform individuals about the locations they should avoid during those periods. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Behavioral analytics; Big data; Business analytics; Location analytics; Public health; Social media,66,Information Systems Frontiers,2019 543,Arapostathis S.G.,"A Methodology for Automatic Acquisition of Flood‐event Management Information From Social Media: the Flood in Messinia, South Greece, 2016","Social network data, utilised as a VGI source, was analysed using the September 2016 flood event in Messinia, South Greece. The flood event led to damage in the urban and rural environment in the general area, and to human deaths. An innovative methodology is based on applying machine learning to classify Twitter content. Tweets were classified into the following ten categories: (i) flood identification, (ii) rain identification, (iii) consequences of the flood, (iv) expressed emotions, (v) ironic attitude to local disaster management authorities, (vi) disaster management information, (vii); volunteer actions, (viii); situation overview, (ix); social effects, and (x); weather information. Some of the categories were divided further, to quantify significant information. The classified output was sequentially geo-referenced by identifying geographic entities within the text of each post (geo-parsing) and replicating each post according to the number of geolocations. The data processing involved various geo-validations and performance metrics. The final output was used to create maps and graphs of different time periods, that provide useful insights into the flood event for disaster management purposes. The applied methodology is an evolution of previous research published by the author, this time providing complete results, based on the analysis of 100 % of the data available, with maps and graphs which demonstrate how the flood event unfolded in different time periods. The methodology is fully automated in terms of data processing, and can be applied using a script developed by the author in the R programming language. This research is a step towards the real-time delivery of advanced information for all disaster management stakeholders, from official authorities and rescue teams, to volunteers and locals who may be situated within the area of a disastrous flood occurrence. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Disaster management; Flood event management; Social Media; Volunteered Geographic Information,22,Information Systems Frontiers,2021 544,Loginova E.; Varanasi S.; Neumann G.,Towards End-to-End Multilingual Question Answering,"Multilingual question answering (MLQA) is a critical part of an accessible natural language interface. However, current solutions demonstrate performance far below that of monolingual systems. We believe that deep learning approaches are likely to improve performance in MLQA drastically. This work aims to discuss the current state-of-the-art and remaining challenges. We outline requirements and suggestions for practical parallel data collection and describe existing methods, benchmarks and datasets. We also demonstrate that a simple translation of texts can be inadequate in case of Arabic, English and German languages (on InsuranceQA and SemEval datasets), and thus more sophisticated models are required. We hope that our overview will re-ignite interest in multilingual question answering, especially with regard to neural approaches. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Cross-lingual question answering; Deep learning; Multilingual natural language processing; Multilingual question answering; Neural natural language processing; Question answering,27,Information Systems Frontiers,2021 545,Palshikar G.K.; Apte M.; Pandita D.,Weakly Supervised and Online Learning of Word Models for Classification to Detect Disaster Reporting Tweets,"Social media has quickly established itself as an important means that people, NGOs and governments use to spread information during natural or man-made disasters, mass emergencies and crisis situations. Given this important role, real-time analysis of social media contents to locate, organize and use valuable information for disaster management is crucial. In this paper, we propose self-learning algorithms that, with minimal supervision, construct a simple bag-of-words model of information expressed in the news about various natural disasters. Such a model is human-understandable, human-modifiable and usable in a real-time scenario. Since tweets are a different category of documents than news, we next propose a model transfer algorithm, which essentially refines the model learned from news by analyzing a large unlabeled corpus of tweets. We show empirically that model transfer improves the predictive accuracy of the model. We demonstrate empirically that our model learning algorithm is better than several state of the art semi-supervised learning algorithms. Finally, we present an online algorithm that learns the weights for words in the model and demonstrate the efficacy of the model with word weights. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Disaster management; Machine learning; Online learning; Text classification; Transfer learning; Tweet classification; Weakly supervised learning,16,Information Systems Frontiers,2018 546,Baksi R.P.; Upadhyaya S.J.,Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats,"Deception has been proposed in the literature as an effective defense mechanism to address Advanced Persistent Threats (APT). However, administering deception in a cost-effective manner requires a good understanding of the attack landscape. The attacks mounted by APT groups are highly diverse and sophisticated in nature and can render traditional signature based intrusion detection systems useless. This necessitates the development of behavior oriented defense mechanisms. In this paper, we develop Decepticon (Deception-based countermeasure), a Hidden Markov Model based framework where the indicators of compromise (IoC) are used as the observable features to aid in detection. This theoretical framework also includes several models to represent the spread of APTs in a computer system. The presented framework can be used to select an appropriate deception script when faced with APTs or other similar malware and trigger an appropriate defensive response. The effectiveness of the models in a networked system is illustrated by considering a real APT type ransomware. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Advanced Persistent Threats (APT); Computer security; Cyber-security; Hidden Markov Model (HMM); Ransomware,12,Information Systems Frontiers,2021 547,Ashtiani M.; Azgomi M.A.,A formulation of computational trust based on quantum decision theory,"In this paper, we propose a new formulation of computational trust based on quantum decision theory (QDT). By using this new formulation, we can divide the assigned trustworthiness values to objective and subjective parts. First, we create a mapping between the QDT definitions and the trustworthiness constructions. Then, we demonstrate that it is possible for the quantum interference terms to appear in the trust decision making process. By using the interference terms, we can quantify the emotions and subjective preferences of the trustor in various contexts with different amounts of uncertainty and risk. The non-commutative nature of quantum probabilities is a valuable mathematical tool to model the relative nature of trust. In relative trust models, the evaluation of a trustee candidate is not only dependent on the trustee itself, but on the other existing competitors. In other words, the first evaluation is performed in an isolated context whereas the rest of the evaluations are performed in a comparative one. It is shown that a QDT-based model of trust can account for these order effects in the trust decision making process. Finally, based on the principles of risk and uncertainty aversion, interference alternation theorem and interference quarter law, quantitative values are assigned to interference terms. By performing empirical evaluations, we have demonstrated that various scenarios can be better explained by a quantum model of trust rather than the commonly used classical models. © 2015, Springer Science+Business Media New York.",Attraction factors; Delegation; Order effect; Quantum decision theory (QDT); Quantum interference; Superposition axiom; Trust model,11,Information Systems Frontiers,2016 548,Kang M.D.Y.; Hovav A.,Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation,"The benchmarking of information security policies has two challenges. Organizations are reluctant to share data regarding information security and no two organizations are identical. In this paper, we attempt to propose an artifact for a benchmarking method of information security policy, which can resolve the above challenges. We employ design science methodology, activity theory and international standards to design the artifact as a proof of concept. The artifact facilitates the implementation of efficient information security policies. Organizations can utilize the artifact to analyze and benchmark information security policies. We illustrate the completeness and reliability of the artifact through a case study using information security policies from six companies. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Activity theory; Artifact; Benchmarking; Design science; Information security policy; Instrument,15,Information Systems Frontiers,2020 549,Mäntymäki M.; Hyrynsalmi S.; Koskenvoima A.,How Do Small and Medium-Sized Game Companies Use Analytics? An Attention-Based View of Game Analytics,"The widespread adoption of the freemium business model together with the introduction of cost-efficient analytics tools have made the use of analytics pervasive in the game industry. While big data and analytics have drawn extensive scholarly attention, the research focusing particularly on game analytics is scant and largely descriptive. Thus, there is a need for research focusing on how game companies employ analytics. In this study, we analyze data collected through a set of in-depth interviews of small and medium-sized freemium game developers. We identify four main roles of game analytics: 1) sense-making device, 2) decision-support system, 3) communication tool, and 4) hygiene factor. We employ the attention-based view of the firm to discuss how these roles diverge and converge in terms of organizational attention. The study advances the research on the roles and business value of analytics in the game and software industry. © 2019, The Author(s).",Analytics; Attention-based view; Big data; Free-to-play; Freemium; Game analytics; Game business; Games; Software business,30,Information Systems Frontiers,2020 550,Mikalef P.; Sharma K.; Pappas I.O.; Giannakos M.,Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study,"Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and normative. Using a mixed methods approach that builds on an eye-tracking study, followed by semi-structured interviews with 23 participants, our results indicate significant differences in the types and format of information consumed for selected versus eliminated products. Specifically, we looked at engagement, cognitive processing, and observation of consumers, since they reveal information about the mental and processing mechanisms during decision making. We find that consumers present a number of differences in terms of these measures among the different types of content, and with respect to selected versus eliminated products. The outcomes of the interviews also serve to complement these findings, providing more detailed information about the processes and emotional states of consumers during the selection process. © 2020, The Author(s).",Dual-process theory; Eye-tracking; Interviews; Online reviews; Social commerce; User-generated content,34,Information Systems Frontiers,2021 551,Heidt M.; Gerlach J.P.; Buxmann P.,Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments,"Lagging IT security investments in small and medium-sized enterprises (SME) point towards a security divide between SME and large enterprises, yet our structured literature review shows that organizational IT security research has largely neglected the SME context. In an effort to expose reasons for this divide, we build on extant research to conceptualize SME-specific characteristics in a framework and suggest propositions regarding their influence on IT security investments. Based on 25 expert interviews, emerging constraints are investigated and validated. Our findings imply that several widely held assumptions in extant IT security literature should be modified if researchers claim generalizability of their results in an SME context. Exemplary assumptions include the presence of skilled workforce, documented processes or IT-budget planning which are often un(der) developed in SME. Additionally, our study offers context-specific insights regarding particular effects of identified constraints on IT security investments for all involved stakeholders (researchers, SME, large enterprises, governments). © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Constraints; Investment; IT security; Qualitative study; SME,91,Information Systems Frontiers,2019 552,Kafle S.; de Silva N.; Dou D.,An Overview of Utilizing Knowledge Bases in Neural Networks for Question Answering,"Question Answering (QA) requires understanding of queries expressed in natural languages and identification of relevant information content to provide an answer. For closed-world QAs, information access is obtained by means of either context texts, or a Knowledge Base (KB), or both. KBs are human-generated schematic representations of world knowledge. The representational ability of neural networks to generalize world information makes it an important component of current QA research. In this paper, we study the neural networks and QA systems in the context of KBs. Specifically, we focus on surveying methods for KB embedding, how such embeddings are integrated into the neural networks, and the role such embeddings play in improving performance across different question-answering problems. Our study of multiple question answering methods finds that the neural networks are able to produce state-of-art results in different question answering domains, and inclusion of additional information via KB embeddings further improve the performance of such approaches. Further progress in QA can be improved by incorporating more powerful representations of KBs. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Knowledge base; Neural networks; Question answering,11,Information Systems Frontiers,2020 553,Weidinger J.; Schlauderer S.; Overhage S.,Is the Frontier Shifting into the Right Direction? A Qualitative Analysis of Acceptance Factors for Novel Firefighter Information Technologies,"The use of innovative information technologies such as unmanned aerial vehicles, intelligent protective clothing, or digital plans is frequently pursued to improve the effectiveness of emergency response processes. So far, however, little effort has been made to study the acceptance of such innovative information technologies by firefighters, who are supposed to use them in their daily practice. In this paper, we present the results of a qualitative study, in which we interviewed 21 members of German fire departments to gain insights into the perceived potential of seven emerging technologies from a Diffusion of Innovations perspective. The results suggest that firefighters find emerging technologies to deliver potential advantages. Factors characterizing disadvantages, the perceived compatibility, and complexity of emerging technologies were viewed as potentially substantial acceptance barriers, however. These factors ought to be taken into consideration when designing new technologies to ensure that they indeed meet the practical needs of the users. © 2017, Springer Science+Business Media, LLC.",Acceptance factors; Diffusion of Innovations Theory; Firefighter information technologies; Qualitative study,36,Information Systems Frontiers,2018 554,Roy K.C.; Chen Q.,DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification,"Ransomware is a self-propagating malware encrypting file systems of the compromised computers to extort victims for financial gains. Hundreds of schools, hospitals, and local government municipalities have been disrupted by ransomware that already caused 12.1 days of system downtime on average (Siegel 2019). This study aims at developing a deep learning-based detector DeepRan for ransomware early detection and classification to prevent network-wide data encryption. DeepRan applies an attention-based bi-directional Long Short Term Memory (BiLSTM) with a fully connected (FC) layer to model normalcy of hosts in an operational enterprise system and detects abnormal activity from a large volume of ambient host logging data collected from bare metal servers. DeepRan also classifies abnormal activity as one of the candidate ransomware attacks by extending attention-based BiLSTM with a Conditional Random Fields (CRF) model. The Term Frequency-Inverse Document Frequency (TF-IDF) method is applied to extract semantic information from high dimensional host logging data. An incremental learning technique is used to extend the model’s existing knowledge to prevent DeepRan quality degradation over time. We develop a testbed of bare metal servers and collect normal host logs of two users for 63 days (IRB-approved). 17 ransomware attacks are executed on the victim hosts, and the infected host logging data is used for validating DeepRan. Experimental results present that DeepRan produces 99.87% detection accuracy (F1-score of 99.02%) for ransomware early detection. The detector also achieves 96.5% accuracy to classify abnormal events as one of 17 candidate ransomware families. The application of incremental learning is validated as an efficient technique to enhance model quality over time. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Classification; Dataset collection; Deep learning; Ransomware detection; Testbed design,70,Information Systems Frontiers,2021 555,Sequeiros H.; Oliveira T.; Thomas M.A.,The Impact of IoT Smart Home Services on Psychological Well-Being,"Smart home services are a new generation of consumer services. Supported by the Internet of Things (IoT) technology, they deliver security, comfort, entertainment, assisted living, and efficient management of the home to improve the quality of life of consumers. As the availability of smart home services expands, there is still a lack of understanding of what motivates their continuing use and how the penetration of smart devices and services in the home environment affects individual well-being. We develop a research model combining hedonic and eudaimonic motivations with the unified theory of acceptance and use of technology 2 (UTAUT 2) to evaluate the impacts on well-being. The model is estimated using partial least squares based on a sample of 260 survey responses. The results show that hedonic motivation associated with the adoption of some smart home services moderates continuing use. Additionally, the results suggest a positive relationship between the use of IoT smart home services and well-being. Furthermore, hedonic and eudaimonic motives have a substantial effect on the use behavior of smart home services and ultimately on well-being. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Eudaimonic motivation; Hedonic motivation; IoT; Smart home services; Well-being,73,Information Systems Frontiers,2022 556,Nam K.; Baker J.; Ahmad N.; Goo J.,"Dissatisfaction, Disconfirmation, and Distrust: an Empirical Examination of Value Co-Destruction through Negative Electronic Word-of-Mouth (eWOM)","Electronic word-of-mouth (eWOM) is a key source of information for consumers and is also a vitally important source of value to business and website owners. In this study, we investigate what causes consumers to trust or distrust a review website and how value is created (or destroyed) through online reviews, which are one type of eWOM. Building on the expectation confirmation model, this study examines how consumers’ disconfirmation of previous eWOM leads to distrust of the eWOM, which in turn leads to negative eWOM and ultimately to distrust of the review website itself. Experience-based dissatisfaction directly affects the writing of negative reviews, but only indirectly influences distrust of the website. We analyze survey data collected from users of the TripAdvisor website (n = 227), with PLS results providing support for our model. Implications exist for consumers who are users of review websites as readers of eWOM, for business owners whose products and services are reviewed online, and for review website platforms. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Dissatisfaction; Distrust; Expectation confirmation; Negative eWOM; Value co-destruction,122,Information Systems Frontiers,2020 557,Joan S.P.F.; Valli S.,An enhanced text detection technique for the visually impaired to read text,"An enhanced text detection technique (ETDT) is proposed, which is expected to aid the visually impaired to overcome their reading challenges. This work enhances the edge-preserving maximally stable extremal regions (eMSER) algorithm using the pyramid histogram of oriented gradients (PHOG). Histogram of oriented gradients (HOG) derived from different pyramid levels is important while detecting maximally stable extremal regions (MSER) in the ETDT approach because it gives more spatial information when compared to HOG information from a single level. To group text, a four-line, text-grouping method is newly designed for this work. Also, a new text feature, Shapeness Score is proposed, which significantly identifies text regions when combined with the other features based on morphology and stroke widths. Using the feature vector of dimension 10, the J48 decision tree and AdaBoost machine learning algorithms identify the text regions in the images. The algorithm yields better results than the existing benchmark algorithms for the ICDAR 2011 born-digital dataset and must be improved with respect to the scene text dataset. © 2016, Springer Science+Business Media New York.",MSER; PHOG; Shapeness score; Stroke width; Text detection,15,Information Systems Frontiers,2017 558,Sasaki J.; Kitsuya M.,Development and Evaluation of Regional Information Sharing System (RISS) for Disaster Risk Reduction,"In Japan, there are many flood and tsunami disasters caused by typhoons, heavy rains and earthquakes. In this case, the residents have an evacuation time to evacuate to shelters after evacuation alerts from a governmental office. However, some people don’t try to evacuate soon. As a result, it is problem that some victims of disasters are caused because without or late evacuation and supporting. In order to prevent such a damage, we developed Regional Information Sharing System (RISS) for disaster risk reduction. The RISS includes daily required life information from regional government and regional shops, as well as disaster information, shelters’ condition and the information of support required people and support teams. In this paper, we introduce the concept of RISS and its evaluation results on a field test and the effects in a regional disaster case by multi-agent simulation. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Disaster response; Evacuation support; Information sharing; Multi-agent simulation,10,Information Systems Frontiers,2021 559,Sung Y.-S.; Wang D.; Kumara S.,Uncovering the effect of dominant attributes on community topology: A case of facebook networks,"Community structure points to structural patterns and reflects organizational or functional associations of networks. In real networks, each node usually contains multiple attributes representing the node’s characteristics. It is difficult to identify the dominant attributes, which have definitive effects on community formation. In this paper, we obtain the overlapping communities using game-theoretic clustering and focus on identifying the dominant attributes in terms of each community. We uncover the association of attributes to the community topology by defining dominance ratio and applying Pearson correlation. We test our method on Facebook data of 100 universities and colleges in the U.S. The study enables an integrating observation on how the offline lives infer online consequences. The results showed that people in class year 2010 and people studying in the same major tend to form denser and smaller groups on Facebook. Such information helps e-marketing campaigns target right customers based on demographic information and without the knowledge of underlying social networks. © 2016, Springer Science+Business Media New York.",Community detection; Community topology; Dominance ratio; Dominant attribute; Facebook; Game-theoretic clustering,4,Information Systems Frontiers,2018 560,Sharma S.; Ogunlana K.; Scribner D.; Grynovicki J.,Modeling human behavior during emergency evacuation using intelligent agents: A multi-agent simulation approach,"It is costly and takes a lot of time for disaster employees to execute several evacuation drills for a building. One cannot glean information to advance the plan and blueprint of forthcoming buildings without executing many drills. We have developed a multi-agent system simulation application to aid in running several evacuation drills and theoretical situations. This paper combines the genetic algorithm (GA) with neural networks (NNs) and fuzzy logic (FL) to explore how intelligent agents can learn and adapt their behavior during an evacuation. The adaptive behavior focuses on the specific agents changing their behavior in the environment. The shared behavior of the agent places an emphasis on the crowd-modeling and emergency behavior in the multi-agent system. This paper provides a fuzzy individual model being developed for realistic modeling of human emotional behavior under normal and emergency conditions. It explores the impact of perception and emotions on the human behavior. We have established a novel intelligent agent with characteristics such as independence, collective ability, cooperativeness, and learning, which describes its final behavior. The contributions of this paper lie in our approach of utilizing a GA, NNs, and FL to model learning and adaptive behavior of agents in a multi-agent system. The planned application will help in executing numerous evacuation drills for what-if scenarios for social and cultural issues such as evacuation by integrating agent characteristics. This paper also compares our proposed multi-agent system with existing commercial evacuation tools as well as real-time evacuation drills for accuracy, building traffic characteristics, and the cumulative number of people exiting during evacuation. Our results show that the inclusion of GA, NNs, and fuzzy attributes made the evacuation time of the agents closer to the real-time evacuation drills. © 2017, Springer Science+Business Media, LLC.",Agent-based modeling; Behavior simulation; Fuzzy logic; Human behavior; Modeling emergency; Simulation,60,Information Systems Frontiers,2018 561,Ahmad R.; Siemon D.; Gnewuch U.; Robra-Bissantz S.,Designing Personality-Adaptive Conversational Agents for Mental Health Care,"Millions of people experience mental health issues each year, increasing the necessity for health-related services. One emerging technology with the potential to help address the resulting shortage in health care providers and other barriers to treatment access are conversational agents (CAs). CAs are software-based systems designed to interact with humans through natural language. However, CAs do not live up to their full potential yet because they are unable to capture dynamic human behavior to an adequate extent to provide responses tailored to users’ personalities. To address this problem, we conducted a design science research (DSR) project to design personality-adaptive conversational agents (PACAs). Following an iterative and multi-step approach, we derive and formulate six design principles for PACAs for the domain of mental health care. The results of our evaluation with psychologists and psychiatrists suggest that PACAs can be a promising source of mental health support. With our design principles, we contribute to the body of design knowledge for CAs and provide guidance for practitioners who intend to design PACAs. Instantiating the principles may improve interaction with users who seek support for mental health issues. © 2022, The Author(s).",Artificial intelligence; Chatbot; Design science research; Mental health; Personality-adaptive conversational agent; Virtual assistant,97,Information Systems Frontiers,2022 562,Prusa J.D.; Sagul R.T.; Khoshgoftaar T.M.,Extracting Knowledge from Technical Reports for the Valuation of West Texas Intermediate Crude Oil Futures,"This paper proposes and demonstrates an approach for the often-attempted problem of market prediction, framed as classification task. We restrict our study to a widely purchased and well recognized commodity, West Texas Intermediate crude oil, which experiences significant volatility. For this purpose, nine learners using features extracted from monthly International Energy Agency (IEA) reports to predict undervalued, overvalued, and accurate valuation of the oil futures between 2003 and 2015. The often touted “Efficient Market Hypothesis” (EMH) suggests that it is impossible for individual investors to “beat the market” as market and external forces, such as geopolitical crises and natural disasters, are nearly impossible to predict. However, four algorithms were statistically better at the 95% confidence interval than “Zero-Rule” and “Random-Guess” strategies which are expected to pseudo-reflect the EMH. Furthermore, the addition of text features can significantly improve performance compared to only using price history from the oil futures data, challenging the validity of the semi-strong versions of the EMH in the crude oil market. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Crude oil market; Machine learning; Text mining,6,Information Systems Frontiers,2019 563,Choudrie J.; Pheeraphuttranghkoon S.; Davari S.,"The Digital Divide and Older Adult Population Adoption, Use and Diffusion of Mobile Phones: a Quantitative Study","Due to the changing demographics of societies around the world, ageing has become a major concern for governments and policy makers alike. What has also become clear is that the older adult consumer group and the factors affecting this age group have been studied relatively less in the literature. In this paper, we aim to investigate the adoption, usage, and diffusion of smartphones within the UK older adults so as to identify the factors encouraging or inhibiting smartphone usage and service provision within this age group. To this end, we propose a conceptual framework (Model of Smartphone Acceptance) based on a set of well-known theories of adoption and diffusion. We collected data from 984 participants living in north London and applied the Partial Least Square Structural Equation Modelling (PLS-SEM) technique to analyse the data. Our research can contribute towards reducing some of the existing digital divide within UK older adults. Moreover, businesses can benefit from our research by understanding the significant factors affecting the adoption of smartphones among the UK older population and to adapt their policies accordingly. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Adoption; North London; Older adults; Quantitative; Smartphones; United Kingdom,137,Information Systems Frontiers,2020 564,Avvenuti M.; Cresci S.; Del Vigna F.; Fagni T.; Tesconi M.,CrisMap: a Big Data Crisis Mapping System Based on Damage Detection and Geoparsing,"Natural disasters, as well as human-made disasters, can have a deep impact on wide geographic areas, and emergency responders can benefit from the early estimation of emergency consequences. This work presents CrisMap, a Big Data crisis mapping system capable of quickly collecting and analyzing social media data. CrisMap extracts potential crisis-related actionable information from tweets by adopting a classification technique based on word embeddings and by exploiting a combination of readily-available semantic annotators to geoparse tweets. The enriched tweets are then visualized in customizable, Web-based dashboards, also leveraging ad-hoc quantitative visualizations like choropleth maps. The maps produced by our system help to estimate the impact of the emergency in its early phases, to identify areas that have been severely struck, and to acquire a greater situational awareness. We extensively benchmark the performance of our system on two Italian natural disasters by validating our maps against authoritative data. Finally, we perform a qualitative case-study on a recent devastating earthquake occurred in Central Italy. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Big data; Crisis mapping; Geoparsing; Online social networks; Social media; Word embeddings,74,Information Systems Frontiers,2018 565,Malhotra N.; Sahadev S.; Leeflang P.S.H.; Purani K.,New Insights into e-Loyalty of Internet Banking Users in an Emerging Market Context: A Multilevel Analysis,"Although internet banking is considered a mature technology, digital failures and breakdowns have resulted in widespread customer dissatisfaction. However, recent examples in developed countries show that customer dissatisfaction with internet banking platforms does not necessarily erode customer loyalty. While this could be due to the strong assurance provided by institutional structures that govern the internet usage, it is not known if similar results can be found in emerging markets where internet banking technology has still not reached its saturation stage and coexists with traditional brick and mortar banking services. Thus, this study aims to develop a better understanding of the e-satisfaction-e-loyalty link in the Indian internet banking context. The moderating effects of structural assurance at the individual level and market share at the firm level are analysed on the e-satisfaction – e-loyalty link applying a multilevel modeling framework. Data collected from customers along with archival data across 21 banks in India demonstrate that structural assurance significantly moderates the e-satisfaction-e-loyalty link at the consumer level and market share regulates the link at the bank level. Also, market share is found to moderate the relationships among e-satisfaction, structural assurance, and e-loyalty. Three-way interaction results suggest that the interaction effect between e-satisfaction and structural assurance is less pronounced when market share is high rather than low. This study advances our understanding of the conditional effects of e-satisfaction on e-loyalty and elucidates how different share banks may optimize customer loyalty in an emerging market context. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",E-loyalty; E-satisfaction; Internet banking; Market share; Structural assurance,11,Information Systems Frontiers,2021 566,Wiedenhöft G.C.; Luciano E.M.; Pereira G.V.,Information Technology Governance Institutionalization and the Behavior of Individuals in the Context of Public Organizations,"This study aims to verify the effects of IT governance (ITG) institutionalization on civil servants’ behavior. The general assumption is that ITG institutionalization exerts a positive effect on behavior, provided the ITG legitimation process enhances the perception of organizational justice since transparency and equity increases. Organizational citizenship behavior (OCB) was used to understand individuals’ behavior, which describes individuals’ voluntary commitment in organizations that is not necessarily part of their contractual tasks but is essential to reach the organizational goals. In order to achieve the objective, a multi-method study was developed and operationalized in the context of a diverse range of public organizations in Rio Grande do Sul State Government in Brazil. A theoretical-empirical model was created based on literature, focus group, and interviews. A descriptive-confirmative study was operationalized through a survey with 173 Brazilian civil servants. A questionnaire was developed and validated. All hypotheses were confirmed through a partial least squares structural equation modeling (PLS-SEM) data analysis. The main theoretical contribution is the development of an ITG framework and the demonstration of a positive and significant relationship with the OCB construct. The main finding is that individual behavioral changes are encouraged by ITG institutionalization. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",IT Governance institutionalization; Organizational citizenship behavior; Partial least squares; Public organizations,20,Information Systems Frontiers,2020 567,Chin P.Y.; Evans N.; Liu C.Z.; Choo K.-K.R.,Understanding Factors Influencing Employees’ Consumptive and Contributive Use of Enterprise Social Networks,"There has been an exponential growth use of enterprise social networks for improved communication, connection, collaboration and enhanced knowledge sharing within organizations. However, the intended benefits of this social network deployment have not been fully realized due to the relative low usage among employees. This study provides an insight into the underlying factors deemed likely to influence employees’ enterprise social networks consumptive and contributive use by modifying and extending the Unified Theory of Acceptance and Use of Technology (UTAUT). An online survey was conducted and data were collected from 158 employees whose organizations are currently deploying a workplace social platform. The data were validated and analyzed using partial least square (PLS-SEM) method and Ordered Logistic Regression (OLR). Significant differences were found regarding the factors that influence consumptive and contributive use. The most influential factors for consumptive use are performance expectancy and content value, followed by facilitating conditions and effort expectancy. On the other hand, the contributive use is strongly influenced by social influence, content value and relationship expectancy. Moreover, a more balanced use pattern as measured by a smaller gap in consumptive and contributive use is shown to be positively associated with increased overall enterprise social network use. This study provides implications for managers to develop appropriate interventions to address idiosyncratic enterprise social network use patterns, minimize resistance and maximize effective utilization of the social platform among employees. This paper fulfills the need to identify important factors to be actively managed and manipulated to fully realize the benefits from the investment of enterprise social network. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Consumptive use; Contributive use; Enterprise social networks; Influencing factors,39,Information Systems Frontiers,2020 568,Kloker S.,Non-addictive Information Systems,"Addiction in the context of information technology gained increased public interest within the last years. Only recently, companies like Apple, Google, and Instagram announced to fight smartphone addiction and integrated matching features in their systems. However, if and how these features really help is still an open question. At present, there is only a very rudimentary understanding of IT-triggered disorders and addictions in information systems. Even in clinical research, there is no consensus on the nature of these addictions yet. Nevertheless, the omnipresence of information technology in our daily lives and its unpredictable effects on our moods require this problem to be addressed in a profound manner. This paper links findings from psychology and neuroscience to the information systems terminology and derives the Four-Component Model for Non-addictive Information Systems (4-NAIS). The 4-NAIS allows locating how information technology interacts with the reinforcement cycle of addictions and provides a deeper understanding of where interventions and design decisions may really help tackle IT-triggered disorders. © 2020, The Author(s).",Framework development; Internet addiction; IT-triggered disorders; Non-addictive information systems,16,Information Systems Frontiers,2020 569,Yu B.; Vahidov R.,Applying Social Interaction Theory to Negotiation Modeling: Design of E-negotiation System,"Modeling negotiations in a generic form is a persistent challenge in the design of electronic negotiation systems (ENS). ENS need to be sufficiently flexible to accommodate various types of mechanisms, as well as different roles of the participants. The current work applies social interaction theory to modeling negotiation. The purpose is to propose design principles and a model for ENS implementation. The model is presented using a representational framework for information system meta-artifacts in the spirit of design science research. System features and functions derived from the principles and model are exemplified in a system named PROSPER (a Platform Relying On Social Participation for E-market Realization). © 2017, Springer Science+Business Media New York.",Design science research; Electronic negotiation systems; Social interactions,2,Information Systems Frontiers,2019 570,Jin X.; Chun S.; Jung J.; Lee K.-H.,A fast and scalable approach for IoT service selection based on a physical service model,"Information Systems (ISs) have become one of the crucial tools for various organizations in managing and coordinating business processes. Now we are entering the era of the Internet of Things (IoT). IoT is a paradigm in which real-world physical things can be connected to the Internet and provide services through the computing devices attached. The IoT infrastructure is starting to be integrated with ISs thereby diminishing the boundaries between the physical world and the business IT systems. With the development of IoT technologies, the number of connected things and their available physical services are increasing rapidly. Thus, selecting an appropriate service that satisfies a user’s requirements from such services becomes a time-consuming challenge. To address this issue, we propose a Physical Service Model (PSM) as a common conceptual model to describe heterogeneous IoT physical services. PSM contains three core concepts (device, resource, and service) and specifies their relationships. Based on the proposed PSM, we define three types of Quality of Service (QoS) attributes and rate candidate services according to user requirements. To dynamically rate QoS values and select an appropriate physical service, we propose a Physical Service Selection (PSS) method that takes a user preference and an absolute dominance relationship among physical services into account. Finally, experiments are conducted to evaluate the performance of the proposed method. © 2016, Springer Science+Business Media New York.",Absolute dominance relationship; Internet of things; Physical service model; Physical service selection,36,Information Systems Frontiers,2017 571,Tran T.; Valecha R.; Rad P.; Rao H.R.,An Investigation of Misinformation Harms Related to Social Media during Two Humanitarian Crises,"During humanitarian crises, a large amount of information is circulated in a short period of time, either to withstand or respond to such crises. Such crises also give rise to misinformation that spreads within and outside the affected community. Such misinformation may result in information harms that can generate serious short term or long-term consequences. In the context of humanitarian crises, we propose a synthesis of misinformation harms and assess people’s perception of harm based on their work experience in the crisis response arena or their direct exposure to crises. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Harms; Humanitarian crises; Injuries; Misinformation,30,Information Systems Frontiers,2021 572,Du J.; Jing H.; Choo K.-K.R.; Sugumaran V.; Castro-Lacouture D.,An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain,"Due to industrialization and informatization of the construction industry, prefabricated construction has attracted wide attention from both research and practitioner communities. In prefabricated construction, there are exacting requirements for information sharing. Also, data in a prefabricated component supply chain tend to be dispersed in design, production, transportation and other stages. In other words, such data are significantly multi-source heterogeneous. Without an effective way of participating in supply chain dynamic collaboration, decision-making at various stages and resource allocation can be extremely challenging. This paper proposes a decision support framework for prefabricated component supply chain based on ontology and multi-agent. The framework comprises the ontology layer (i.e. provides data support for the model), the agent interaction layer (i.e. serves as the communication hub to coordinate the data transmission between modules), and the agent simulation layer (i.e. simulates interaction behavior of participants, and supports decision making). Using the Shanghai Chenxiang Road Station complex project as a case study, the paper demonstrates the validity of the proposed ontology and multi-agent based decision support framework. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Multi-agent; Ontology; Prefabricated components; Simulation; Supply chain,43,Information Systems Frontiers,2020 573,Johnson J.M.; Khoshgoftaar T.M.,The Effects of Data Sampling with Deep Learning and Highly Imbalanced Big Data,"Training predictive models with class-imbalanced data has proven to be a difficult task. This problem is well studied, but the era of big data is producing more extreme levels of imbalance that are increasingly difficult to model. We use three data sets of varying complexity to evaluate data sampling strategies for treating high class imbalance with deep neural networks and big data. Sampling rates are varied to create training distributions with positive class sizes from 0.025%–90%. The area under the receiver operating characteristics curve is used to compare performance, and thresholding is used to maximize class performance. Random over-sampling (ROS) consistently outperforms under-sampling (RUS) and baseline methods. The majority class proves susceptible to misrepresentation when using RUS, and results suggest that each data set is uniquely sensitive to imbalance and sample size. The hybrid ROS-RUS maximizes performance and efficiency, and is our preferred method for treating high imbalance within big data problems. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Artificial neural networks; Big data; Class imbalance; Data sampling; Deep learning,74,Information Systems Frontiers,2020 574,Huang C.D.; Goo J.; Behara R.S.; Agarwal A.,Clinical Decision Support System for Managing COPD-Related Readmission Risk,"Hospital readmission is an important quality-of-care indicator that reflects challenges in quality of in-patient care and the difficulty of coordination of care after the transition back into the community. It can also be a significant financial burden, especially as it relates to Medicare and Medicaid costs now and into the future. In this study, we develop a text-mining-based methodology for providing decision support to identify patients with Chronic Obstructive Pulmonary Disease (COPD), one of the leading causes of disability and mortality worldwide, that are likely to be readmitted. The proposed methodology is tested with real-life data to demonstrate how it can be used to help healthcare providers target high-risk discharged patients to reduce readmission. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Chronic obstructive pulmonary disease; Clinical decision support systems; Readmission; Text mining,10,Information Systems Frontiers,2020 575,Berger S.; Häckel B.; Häfner L.,"Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems","Ongoing digitalization accelerates the transformation and integration of physical production and traditional computing systems into smart objects and their interconnectivity, forming the Internet of Things. In manufacturing, the cross-linking of embedded systems creates adaptive and self-organizing Cyber-Physical Production Systems (CPPSs). Owing to ever-increasing cross-linking, rapid technological advances, and multifunctionality, the complexity and structural opacity of CPPSs are rapidly increasing. The development of urgently needed modeling approaches for managing such complexity and structural opacity, however, is impeded by a lack of common understanding of CPPSs. Therefore, in this paper, we contribute to a common understanding of CPPSs by defining and classifying CPPS entities and illustrating their relations. More precisely, we present a terminology, a taxonomy, and a reference model for CPPS entities, created and evaluated using an iterative development process. Thereby, we lay the foundation for future CPPS modeling approaches that make CPPS complexity and structural opacity more manageable. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cyber-physical (production) systems; Digitalization; Reference model; Smart objects; Taxonomy; Terminology,15,Information Systems Frontiers,2021 576,Lacheheub M.N.; Maamri R.,Towards a construction of an intelligent business process based on cloud services and driven by degree of similarity and QoS,"Knowledge and competence management in companies focus on resources allocation to business activities, knowledge management approaches promise a positive impact on cost structures. Moreover, with cloud computing and multi-agent systems, we can have a positive impact on business process construction. In fact, cloud computing gives us the ability to perceive resources such as unlimited computer resources. Meanwhile, multi-agent systems provide some degree of independence to achieve specific goals. Nowadays, on the web we can find a significant number of services that provide the same functionality. Hence, business process construction by reusing these services has become a challenging problem. The solution proposed in this paper, can be considerate as an enterprise solution to construct a business process using some competence and knowledge management aspects. Furthermore, the solution is based on cloud computing and agents to discover similar services and classify services according to their similarity degrees and their quality of services. © 2016, Springer Science+Business Media New York.",Agent-based cloud services; Business process construction; Cloud services; Knowledge and competence management; Quality of service; Similarity degrees,16,Information Systems Frontiers,2016 577,Bouaynaya W.,Characterization of Cloud Computing Reversibility as Explored by the DELPHI Method,"Cloud computing already raises numerous security questions related to outsourced data confidentiality. Several companies are starting to require the reversibility of their cloud computing. They want to redirect their information systems to another provider or backsourcing their activities. Cloud computing reversibility is considered to be one of the first obstacles to service development; however, few researches have been conducted on this field. We propose characterizing the reversibility of cloud computing using a deductive approach. We suggest ten research hypotheses that identify the guarantees, objectives and process of reversibility. This research is based on a three-lap Delphi method, supported by 18 experts working on cloud computing projects. This article contributes to characterizing cloud computing reversibility and parametric theorization through a new coefficient of concordance proposal. This indicator helps to assess the experts’ agreement to or rejection of a hypothesis. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cloud computing; Concordance coefficient; Delphi method; Reversibility,7,Information Systems Frontiers,2020 578,Das A.; Das S.S.,E-Government and Entrepreneurship: Online Government Services and the Ease of Starting Business,"Governments around the world are making active efforts to encourage entrepreneurship. At the same time, governments have also embraced digital technology, particularly the online delivery of government services. This paper examines the effect of offering government services online on the ease of setting up new businesses around the world. Panel data from almost 200 countries between 2002 and 2010 were assembled from multiple public databases and analyzed with fixed-effects regression models in STATA to measure how bringing more government services online affected the number of procedures required to start a new business, as well as the time and cost of these procedures. In this first multi-country time-series study of the effect of e-Government on entrepreneurship, free from the biases of cross-sectional studies, we find that providing more government services online did indeed make it easier to start up business, as did improvements in the ICT infrastructure and education level of the country. We find that the online delivery of government services benefited entrepreneurs by reducing the number of procedures needed to start a business, and by reducing the time and cost of these procedures. Our study provides strong evidence for the positive effect of e-Government on entrepreneurship. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",E-government; Entrepreneurship; Fixed-effects models; Governance; Infrastructure; L26; M13; Panel data,44,Information Systems Frontiers,2022 579,Xu Q.; Chang V.; Hsu C.-H.,Event Study and Principal Component Analysis Based on Sentiment Analysis – A Combined Methodology to Study the Stock Market with an Empirical Study,"This paper provides an improved method by introducing Sentiment Analysis into the Event Study and Principal Component Analysis. The model is constructed by using the heuristic mean-end analysis. This method enables us to take into investors’ feelings towards related stocks when we study the stock market’s reaction to a given event. This paper investigates the Chinese A-shared market over 2013–2019 to study the influence of rumors and the offsetting impact of rumor clarifications on the stock price. The results indicate that no matter investor sentiment is bullish or bearish, stock price reacts significantly to rumors before as well as when the rumor goes public. Furthermore, clarification offsets the positive abnormal returns caused by rumors with bullish sentiment substantially at a limited level. Still, after five days, it creates a positive effect like the positive rumor does on the stock price. Under the bearish sentiment, clarification brings an insignificant impact on the stock price. The results indicate that the source of rumor may not come from the media and investment decisions established on rumors would be beneficial to investors before as well as after they are published. Moreover, official clarification causes an offset effect, but it is very limited. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Event study; Principal component analysis; Rumor analysis; Sentiment analysis; Stock,30,Information Systems Frontiers,2020 580,Algharabat R.S.; Rana N.P.,Social Commerce in Emerging Markets and its Impact on Online Community Engagement,"This study aims to build on the understanding of social commerce in the emerging markets and how it influences online community engagement. The conceptual model was proposed using theories including the social support theory, the trust theory, the social presence theory, the flow theory and the service-dominant logic theory. Using Facebook online community, the data were collected from 400 respondents from Jordan and analysed using AMOS based structural equation modelling. Results revealed that social commerce constructs positively influence social support, community members’ trust and social presence. Furthermore, it was found that social support and social presence positively affect community members’ trust. We also found that community members’ trust positively influence flow whereas both community members’ trust and flow positively influence community engagement. © 2020, The Author(s).",Community engagement; Community trust; Flow; Social commerce; Social presence; Social support,79,Information Systems Frontiers,2021 581,Zamani E.D.; Pouloudi N.; Giaglis G.; Wareham J.,Accommodating Practices During Episodes of Disillusionment with Mobile IT,"This study investigates how tablet users react when technology falls short of their expectations. We deploy a data/frame model to study this process and investigate resistance-related reactions and the deployment of accommodating practices at the individual level. Analyzing user blogs that provide narratives on user interaction with tablets, we identify triggers of episodes of disillusionment and illustrate five sensemaking paths that users follow, eventually leading to one of three practices: 1) users choose to defer tasks until the situation changes, or they abandon the platform altogether; 2) they develop workarounds at different levels of proficiency; or 3) they proceed by reframing their expectations of the platform. By revealing user decision-making process during episodes of disillusionment, the findings contribute to information systems post-adoption research. At a practical level, the findings inform IT artifact and application design by offering insights on how users process discrepancies between their expectations and actual use experience. © 2019, The Author(s).",Case study; iPad; IT artifact; Sensemaking; User behavior,12,Information Systems Frontiers,2021 582,Martin N.; Matt C.; Niebel C.; Blind K.,How Data Protection Regulation Affects Startup Innovation,"While many data-driven businesses have seen rapid growth in recent years, their business development might be highly contingent upon data protection regulation. While it is often claimed that stricter regulation penalizes firms, there is only scarce empirical evidence for this. We therefore study how data protection regulation affects startup innovation, exploring this question during the ongoing introduction of the EU General Data Protection Regulation (GDPR). Our results show that the effects of data protection regulation on startup innovation are complex: it simultaneously stimulates and constrains innovation. We identify six distinct firm responses to the effects of the GDPR; three that stimulate innovation, and three that constrain it. We furthermore identify two key stipulations in the GDPR that account for the most important innovation constraints. Implications and potential policy responses are discussed. © 2019, The Author(s).",Compliance innovation; Data protection regulation; GDPR; Innovation; Privacy regulation; Regulation-exploiting innovation; Startups,76,Information Systems Frontiers,2019 583,Rana N.P.; Luthra S.; Mangla S.K.; Islam R.; Roderick S.; Dwivedi Y.K.,Barriers to the Development of Smart Cities in Indian Context,"Smart city development is gaining considerable recognition in the systematic literature and international policies throughout the world. The study aims to identify the key barriers of smart cities from a review of existing literature and views of experts in this area. This work further makes an attempt on the prioritisation of barriers to recognise the most important barrier category and ranking of specific barriers within the categories to the development of smart cities in India. Through the existing literature, this work explored 31 barriers of smart cities development and divided them into six categories. This research work employed fuzzy Analytic Hierarchy Process (AHP) technique to prioritise the selected barriers. Findings reveal that ‘Governance’ is documented as the most significant category of barriers for smart city development followed by ‘Economic; ‘Technology’; ‘Social’; ‘Environmental’ and ‘Legal and Ethical’. In this work, authors also performed sensitivity analysis to validate the findings of study. This research is useful to the government and policymakers for eradicating the potential interferences in smart city development initiatives in developing countries like India. © 2018, The Author(s).",Barriers; Fuzzy AHP; India; Prioritisation; Sensitivity analysis; Smart cities,216,Information Systems Frontiers,2019 584,Menon S.,The role of civil society groups in improving access to the DC-CAN,"This study addresses the role that civil society groups play in improving access to a high – profile middle mile network infrastructure project in Washington D.C, namely the District of Columbia - Community Access Network (DC-CAN). The District of Columbia (D.C.) received a grant through the American Recovery and Reinvestment Act’s Broadband Technology Opportunities Program to build and operationalize the DC-CAN. The District was one of the few cities to receive federal funding for broadband infrastructure. This paper utilizes a document/textual analysis technique to study the efforts of the three main civil society groups to empower the city’s citizens to take greater agency over local broadband infrastructure. Moreover the article provides a theoretically grounded narrative that explains the role of these groups on behalf of the DC-CAN using Kingdon’s framework of multiple policy streams as a conceptual foundation. © 2015, Springer Science+Business Media New York.",broadband; Community Anchor Institutions (CAIs); District of Columbia - Community Access Network (DC-CAN); Internet Service Providers (ISPs); mesh networks; multiple policy streams theory,5,Information Systems Frontiers,2017 585,Suresh S.; Ravichandran T.,Value Gains in Business Process Outsourcing: The Vendor Perspective,"Business Process Outsourcing (BPO) is a contemporary phenomenon that has gained significant traction in recent years. Like other forms of outsourcing, BPO is both beneficial and risky. While extant research has examined the risks in outsourcing for clients, a limited insight exists on the risks associated with BPO for vendors. We examine the contexts in which the value proposition of BPO varies for vendor firms based on the risks associated with the contract. The risk in this context is posited to vary based on the type of task outsourced, the outsourcing motivation of the client and the duration of the contract. Using a sample of 231 BPO announcements over a thirteen-year period, we test our hypotheses using an event study. We find that BPO creates significant value gains for vendor firms, particularly for knowledge intensive processes. In addition, vendors lost value when they were sought out to develop specific capabilities for the clients that involved knowledge intensive processes. While vendors benefited from longer duration contracts, these benefits were not found to significantly vary across the different types of tasks outsourced. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",BPO; Business process outsourcing; Event study; Outsourcing risk,7,Information Systems Frontiers,2022 586,Lomotey R.K.; Deters R.,Middleware for mobile medical data management with minimal latency,"A promise of mHealth is its capacity to facilitate the consumption of Electronic Health Record (EHR) data using mobile devices, which is central to promoting remote healthcare delivery. Our ongoing project, called SOPHRA, in collaboration with the City Hospital in Saskatoon, Canada, focuses on supporting care providers (e.g., physicians) in the collection/recording of medical data from patients remotely. A major challenge that needs to be addressed is the potential loss of communication between the mobile-clients and the health information system (HIS) during the transfer of the electronic health record (EHR). Overcoming this challenge will foster soft-real time medical data exchanges. However, the issue of communication loss can be as a result of the over-reliance on wireless networks such as Wi-Fi, which can sometimes be unstable. Thus, the goal of this work is to propose a mobile health (mHealth) architectural environment that can exploit the limited available bandwidth during the mobile medical data transfer. A middleware is proposed with the capability of managing different states of the medical data as the physicians updates the EHR. The work details the employment of the Bernoulli model as a means of determining and controlling different updates of the mHealth data for effective propagation. © 2016, Springer Science+Business Media New York.",Cloud computing; Electronic health record; Middleware; Mobile computing; Mobile devices; Synchronization,5,Information Systems Frontiers,2018 587,Kumar U.; Reganti A.N.; Maheshwari T.; Chakroborty T.; Gambäck B.; Das A.,Inducing Personalities and Values from Language Use in Social Network Communities,"A community in social networks is generally assumed to be composed of a group of individuals with similar characteristics. Although there has been a plethora of work on understanding network topologies (edge density, clustering coefficient, etc.) within an online community, the psycho-sociological compositions of social network communities have hardly been studied. The present paper aims to analyse the communities as composition of induced psycholinguistic and sociolinguistic variables (Personalities, Values and Ethics) across individuals in social media networks. The motivation behind this analysis is to understand the behavioural characteristics at individual as well as societal level in social networks. To this end, three studies were carried out on six different datasets: three Twitter corpora, two Facebook corpora, and an Essay corpus, annotated with Values and Ethics of the users. First, experiments on creating automatic models to determine the Personality and Values of individuals by analysing their language usage and social media behaviour. Second, experiments on understanding the characteristics or blend of characteristics of individuals within an online community. Finally, generation of a map of values and ethics for India, a multi-lingual and multi-cultural country. Striking similarities to general intuitive perception could be observed, i.e., the results obtained in the study resemble our general perception about the cities/towns of India. © 2017, Springer Science+Business Media, LLC.",Community; Ethics; Personality; Social network; Values,18,Information Systems Frontiers,2018 588,Didier A.; Mota A.,An algebra of temporal faults,"Faults modelling is essential to anticipate failures in critical systems. Traditionally, Static Fault Trees are employed to this end, but Temporal and Dynamic Fault Trees are gaining evidence due to their enriched power to model and detect intricate propagation of faults that lead to a failure. In previous work, we showed a strategy based on the process algebra CSP and Simulink models to obtain fault traces that lead to a failure. Although that work used Static Fault Trees, it could be used with Temporal or Dynamic Fault Trees. In the present work we define an algebra of temporal faults (with a notion of fault propagation) and prove that it is indeed a Boolean algebra. This allows us to inherit Boolean algebra’s properties, laws and existing reduction techniques, which are very beneficial for faults modelling and analysis. We illustrate our work on a simple but real case study supplied by our industrial partner EMBRAER. © 2016, Springer Science+Business Media New York.",Boolean algebra; Communicating Sequential Processes (CSP); Dynamic Fault Trees; Simulink,2,Information Systems Frontiers,2016 589,Yoo C.W.,An Exploration of the Role of Service Recovery in Negative Electronic Word-of-Mouth Management,"This study aims to investigate the factors that influence consumers’ electronic word-of-mouth (EWOM) revision behaviors and repurchase in the e-commerce context. As an overarching theory, service recovery theory is consulted and important variables, including perceived justice, service failure severity, service recovery expectation and service recovery satisfaction, are discussed to develop focal hypotheses. For the empirical testing of the proposed hypotheses, the structural equation model and measurements were designed based on relevant literature. A survey was conducted in South Korea to validate the research model. The findings illustrate that perceived justice, service failure severity and service recovery expectation significantly influence service recovery satisfaction. And it leads to intention to revise EWOM and repurchase intention. The moderating role of perceived revision request was also found in the analysis. Based on the findings, several theoretical contributions and managerial implications are discussed. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Consumer complaining behaviors; Consumer review update; Electronic commerce; Electronic word-of-mouth; Service failure; Service recovery,19,Information Systems Frontiers,2020 590,Golinko E.; Zhu X.,"Generalized Feature Embedding for Supervised, Unsupervised, and Online Learning Tasks","Feature embedding is an emerging research area which intends to transform features from the original space into a new space to support effective learning. Many feature embedding algorithms exist, but they often suffer from several major drawbacks, including (1) only handle single feature types, or users have to clearly separate features into different feature views and supply such information for feature embedding learning; (2) designed for either supervised or unsupervised learning tasks, but not for both; and (3) feature embedding for new out-of-training samples have to be obtained through a retraining phase, therefore unsuitable for online learning tasks. In this paper, we propose a generalized feature embedding algorithm, GEL, for both supervised, unsupervised, and online learning tasks. GEL learns feature embedding from any type of data or data with mixed feature types. For supervised learning tasks with class label information, GEL leverages a Class Partitioned Instance Representation (CPIR) process to arrange instances, based on their labels, as a dense binary representation via row and feature vectors for feature embedding learning. If class labels are unavailable, CPIR is naturally degenerated and treats all instances as one class. Based on the CPIR representation, GEL uses eigenvector decomposition to convert the proximity matrix into a low-dimensional space. For new out-of-training samples, their low-dimensional representation are derived through a direct conversion without a retraining phase. The learned numerical embedding features can be directly used to represent instances for effective learning. Experiments and comparisons on 28 datasets, including categorical, numerical, and ordinal features, demonstrate that embedding features learned from GEL can effectively represent the original instances for clustering, classification, and online learning. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Clustering; Dimension reduction; Feature embedding; Online learning; Representation learning; Supervised learning,15,Information Systems Frontiers,2019 591,Zheng Q.; Yang C.; Yang H.; Zhou J.,A Fast Exact Algorithm for Deployment of Sensor Nodes for Internet of Things,"The deployment problem of sensor nodes of Internet of things (IoT) can be abstracted as listing minimal dominating sets of a graph. The problem of listing all the minimal dominating sets in a graph can be converted to the problem of state space search among candidate vertex sets. The search and optimization technologies, such as the bidirectional search and branch cut, can be applied to solve the problem effectively. Our experiments show that the new algorithm can reduce the running time by at least an order of magnitude, compared to a state-of-the-art algorithm for listing all the minimal dominating sets. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Exact algorithm; Graph; Minimal dominating set; State space search,1,Information Systems Frontiers,2020 592,Benfeldt O.; Persson J.S.; Madsen S.,Data Governance as a Collective Action Problem,"While governing data as an organizational asset has clear benefits, mobilizing an organization to implement data governance remains elusive for practitioners. On that account, this paper examines why governing data is difficult in local government organizations. Based on a literature review and an empirical case study, we establish the inherent challenges and build on the notion of collective action to theorize the problem of data governance. Following an engaged scholarship approach, we collect empirical material through six group interviews with 34 representatives from 13 different Danish municipalities. We extend existing data governance research with our problem triangle that identifies and explicates the complex relations between six distinct challenges: value, collaboration, capabilities, overview, practices, and politics. We demonstrate the value in theorizing data governance as a collective action problem and argue for the necessity of ensuring researchers and practitioners achieve a common understanding of the inherent challenges, as a first step towards developing data governance solutions that are viable in practice. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Collective action; Data governance; Engaged scholarship; Local government,103,Information Systems Frontiers,2020 593,Lee Y.-J.; Keeling K.B.; Urbaczewski A.,The Economic Value of Online User Reviews with Ad Spending on Movie Box-Office Sales,"Our objective in this paper is to assess the values of online user reviews for movies compared with the sales impact of post-release ad spending for movies. We use weekly box-office sales and ad spending data for 304 movies released in the U.S. along with online ratings and user characteristics from a social network site for movies. By exploiting the fixed-effects two-stage instrumental variable approach to account for movie heterogeneity and simultaneous relationships among user reviews, ad spending and sales, we found that improving the volume and valence of ratings can have the equivalent effect that ad spending can provide. © 2017, Springer Science+Business Media, LLC.",Advertising; Fixed-effects two-stage regression; Instrumental variables; Internet marketing; Online social media; Online user reviews,21,Information Systems Frontiers,2019 594,Offei M.; Andoh-Baidoo F.K.; Ayaburi E.W.; Asamoah D.,How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?,"Online romance fraud (ORF) is a growing concern with such serious negative consequences as financial loss or suicide to the victim. Majority of empirical studies on online romance fraud using attachment, deception, protection motivation and relation theories focus on the victim. While neutralization offers insights into how individuals justify their deviant behaviors, the results have not been consistent in different contexts. In the ORF context, offenders may not only rely on justifying techniques but also rationalize their actions by denying risk both to the victim and the offender. Thus, drawing from the neutralization and denial of risk theories, we develop a research model to explain how online romance offenders justify and rationalize their intended criminal activities. To confirm our theoretical model, we collected 320 responses from individuals at Internet Cafés alleged to be online romance fraud hotspots. Our results highlight the boundary conditions of neutralization techniques in the context of online romance fraud. The study shows that denial of risk, a rationalization mechanism, moderates the relationship between denial of victim, a justification technique, and intention to commit romance fraud. This insight advances the frontiers of neutralization theory. We offer both theoretical and managerial implications of the findings. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Denial of risk theory; Internet fraud; Neutralization theory; Offenders; Online romance fraud; Scammers,30,Information Systems Frontiers,2022 595,Young E.; Aguirre B.,PrioritEvac: an Agent-Based Model (ABM) for Examining Social Factors of Building Fire Evacuation,"Fire evacuation modeling benefits from the application of social science both in terms of accuracy and external validation. This paper describes PrioritEvac, a novel agent-based model which incorporates the social dimension of group loyalty into fire evacuation and responses to fire and smoke. It uses individual priorities, making for a dynamic approach that allows greater agency and nuance. PrioritEvac is programmed in NetLogo and validated using extensive data collected from the Station nightclub fire. The statistical analysis of the results of the model indicate that, compared to historical patterns, it reproduces along multiple metrics including a mean of 114 deaths (std. dev. = 38) over 50 runs, which puts the actual result of the fire within one standard deviation of the mean results of the simulation. Overall, the mean differential along all the metrics is 79, significantly outperforming all published ABM models of the Station nightclub fire that did not incorporate social relationships. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",ABM; Agent-based model; Egress; Social relationships; The station building fire,13,Information Systems Frontiers,2021 596,Xu W.; Ou P.; Fan W.,Antecedents of ERP assimilation and its impact on ERP value: A TOE-based model and empirical test,"Drawing on the technology-organization-environment (TOE) framework and prior IT assimilation literature, we develop and test an integrated model of ERP assimilation and value in Chinese firms. We also contrast the strength of the antecedents of ERP assimilation and value across different ownership types. Our empirical results using a survey data showed that relative advantage, complexity, compatibility, top management support, organization fit, financial commitment and competitive pressure are significant predictors for ERP assimilation. We also found that the linkage from ERP assimilation to ERP value is very significant. In addition, the strength of the antecedents of ERP assimilation and value varies dramatically across different firm ownership types. Our study confirms that traditional diffusion of innovation attributes, top management support and competitive pressure are significant during the whole ERP life cycle. Our findings also emphasize and validate the importance of ERP assimilation in improving firm performance, and provide evidence for the continued debate on ERP payoff and information technology productivity paradox. In sum, these findings provide insights into how ERP assimilation and ERP value are influenced by contextual elements, and how the impacts may vary across different ownership types. © 2015, Springer Science+Business Media New York.",Business value of IT; Enterprise resource planning; Innovation attribute; Innovation diffusion; Ownership type; Technology assimilation,90,Information Systems Frontiers,2017 597,Papazafeiropoulou A.; Spanaki K.,"Understanding governance, risk and compliance information systems (GRC IS): The experts view","Although Governance, Risk and Compliance (GRC) is an emerging field of study within the information systems (IS) academic community, the concept behind the acronym has to still be demystified and further investigated. The study investigates GRC systems in depth by (a) reviewing the literature on existing GRC studies, and (b) presenting a field study on views about GRC application by professional experts. The aim of this exploratory study is to understand the aspects and the nature of the GRC system following an enterprise systems approach. The result of this study is a framework of particular GRC characteristics that need to be taken into consideration when these systems are put in place. This framework includes specific areas such as: goals and objectives, purpose of the system, key stakeholders, methodology and requirements prior to implementation, critical success factors and problems/barriers. Further discussion about the issues, the concerns and the diverse views on GRC would assist in developing an agenda for the future research on the GRC field. © 2015, The Author(s).","Enterprise Systems; Governance, Risk and Compliance Information Systems (GRC IS); System Aspects",46,Information Systems Frontiers,2016 598,Iannacci F.; Fearon C.; Pole K.,From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs,"Drawing on theories of mindfulness, this paper aims to introduce the concept of adaptive acceptance of social media policy change in the context of Business-to-Business (B2B) Small-and-Medium Enterprises (SMEs) based in the South East of England. The paper adopts a quasi-experimental design based on the analysis of multiple cases with each case replicating prior findings either literally or theoretically. The study uses a mix of survey, interview, and electronic data informed by an innovative, set-theoretic approach to distill commonalities within positive cases and differences between positive and negative cases. It shows that attracting new customers and raising the company’s profile are necessary pre-requisites for adaptive acceptance of social media policy changes. In addition, these two conditions combined with learning to use social media effortlessly are jointly sufficient for adaptive acceptance. Theoretical, practical, and methodological implications are discussed. © 2020, The Author(s).",Configurational theory; Mindfulness; Qualitative comparative analysis; Small-and-medium enterprises; Social media,17,Information Systems Frontiers,2021 599,Idowu A.; Elbanna A.,Digital Platforms of Work and the Crafting of Career Path: The Crowdworkers’ Perspective,"Work and Employment is a critical area that is undergoing major change influenced by the widespread connectivity and utilisation of the Internet and the rise of digital platforms. Crowdwork is an emerging new way of working that is witnessing exponential growth. It is surrounded by a fixed debate between opposite perspectives on its impact on workers. However, both perspectives adopt a static view that does not pay much attention to crowdworkers’ progress in their job over time. In this study, we seek to advance this debate by adopting a dynamic view of crowdwork to explore the trajectory of workers over time based on their own accounts. Through rich qualitative data and inductive analysis, the study unravels that crowdworkers craft what could be conceptualised as a career development path. It identifies five stages in this career path and workers’ efforts to mould their work demands and job-related resources to create a future for themselves. The discussion shows the fruitful insight that this approach brings to theory and practice. Limitations and future avenues for research are then discussed. © 2020, The Author(s).",Bright ICT; Career development; Crowdsourcing; Crowdwork; Digital platforms; Nigeria; Platform employment,53,Information Systems Frontiers,2022 600,Pavai G.; Geetha T.V.,Improving the freshness of the search engines by a probabilistic approach based incremental crawler,"Web is flooded with data. While the crawler is responsible for accessing these web pages and giving it to the indexer for making them available to the users of search engine, the rate at which these web pages change has created the necessity for the crawler to employ refresh strategies to give updated/modified content to the search engine users. Furthermore, Deep web is that part of the web that has alarmingly abundant amounts of quality data (when compared to normal/surface web) but not technically accessible to a search engine’s crawler. The existing deep web crawl methods helps to access the deep web data from the result pages that are generated by filling forms with a set of queries and accessing the web databases through them. However, these methods suffer from not being able to maintain the freshness of the local databases. Both the surface web and the deep web needs an incremental crawl associated with the normal crawl architecture to overcome this problem. Crawling the deep web requires the selection of an appropriate set of queries so that they can cover almost all the records in the data source and in addition the overlapping of records should be low so that network utilization is reduced. An incremental crawl adds to an increase in the network utilization with every increment. Therefore, a reduced query set as described earlier should be used in order to minimize the network utilization. Our contributions in this work are the design of a probabilistic approach based incremental crawler to handle the dynamic changes of the surface web pages, adapting the above mentioned method with a modification to handle the dynamic changes in the deep web databases, a new evaluation measure called the ‘Crawl-hit rate’ to evaluate the efficiency of the incremental crawler in terms of the number of times the crawl is actually necessary in the predicted time and a semantic weighted set covering algorithm for reducing the queries so that the network cost is reduced for every increment of the crawl without any compromise in the number of records retrieved. The evaluation of incremental crawler shows a good improvement in the freshness of the databases and a good Crawl-hit rate (83 % for web pages and 81 % for deep web databases) with a lesser over head when compared to the baseline. © 2016, Springer Science+Business Media New York.",Bayes theorem; Deep web; Incremental crawl; Information retrieval; Semantic weighted set covering algorithm; Set covering algorithm,9,Information Systems Frontiers,2017 601,Preuveneers D.; Garofalo G.; Joosen W.,Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom,"Learning management systems are service platforms that support the administration and delivery of training programs and educational courses. Prerecorded, real-time or interactive lectures can be offered in blended, flipped or fully online classrooms. A key challenge with such service platforms is the adequate monitoring of engagement, as it is an early indicator for a student’s learning achievements. Indeed, observing the behavior of the audience and keeping the participants engaged is not only a challenge in a face-to-face setting where students and teachers share the same physical learning environment, but definitely when students participate remotely. In this work, we present a hybrid cloud and edge-based service orchestration framework for multi-modal engagement analysis. We implemented and evaluated an edge-based browser solution for the analysis of different behavior modalities with cross-user aggregation through secure multiparty computation. Compared to contemporary online learning systems, the advantages of our hybrid cloud-edge based solution are twofold. It scales up with a growing number of students, and also mitigates privacy concerns in an era where the rise of analytics in online learning raises questions about the responsible use of data. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",browser; cloud and edge computing; data analytics; multi-modal engagement monitoring; privacy,16,Information Systems Frontiers,2021 602,Fox G.; James T.L.,Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study,"As personal health information is digitized and entrusted to healthcare professionals and the technology vendors that manage health information systems (e.g., electronic health records), questions continue to arise regarding how this information is used and protected. By understanding what factors shape people’s health information privacy concerns (HIPCs), organizations can better manage reactions and concerns regarding the use of new technologies and guidance can be produced to help people better protect their health information. We conduct a mixed methods study to examine antecedents to HIPC and find that individuals’ characteristics, perceptions, and experiences all play important roles in shaping HIPC. We also show that users who report high HIPC are less likely to allow their health information to be included in an electronic health record system. The study is conducted using Irish respondents and thus provides a European perspective from a country in which health information systems are not yet widespread. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.","Health information privacy concern; Health status; Information sensitivity, ownership; Legislation awareness; Media coverage; Mixed methods; Prior privacy invasion; Risk; Trust",50,Information Systems Frontiers,2021 603,Jovanovic P.; Nadal S.; Romero O.; Abelló A.; Bilalli B.,Quarry: A User-centered Big Data Integration Platform,"Obtaining valuable insights and actionable knowledge from data requires cross-analysis of domain data typically coming from various sources. Doing so, inevitably imposes burdensome processes of unifying different data formats, discovering integration paths, and all this given specific analytical needs of a data analyst. Along with large volumes of data, the variety of formats, data models, and semantics drastically contribute to the complexity of such processes. Although there have been many attempts to automate various processes along the Big Data pipeline, no unified platforms accessible by users without technical skills (like statisticians or business analysts) have been proposed. In this paper, we present a Big Data integration platform (Quarry) that uses hypergraph-based metadata to facilitate (and largely automate) the integration of domain data coming from a variety of sources, and provides an intuitive interface to assist end users both in: (1) data exploration with the goal of discovering potentially relevant analysis facets, and (2) consolidation and deployment of data flows which integrate the data, and prepare them for further analysis (descriptive or predictive), visualization, and/or publishing. We validate Quarry’s functionalities with the use case of World Health Organization (WHO) epidemiologists and data analysts in their fight against Neglected Tropical Diseases (NTDs). © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Big Data; Data Integration; Data-Intensive Flows; Metadata,23,Information Systems Frontiers,2021 604,Sivrikaya B.T.; Cebi F.; Turan H.H.; Kasap N.; Delen D.,A fuzzy long-term investment planning model for a GenCo in a hybrid electricity market considering climate change impacts,"We study the long-term generation capacity investment problem of an independent power generation company (GenCo) that functions in an environment where GenCos perform business with both bilateral contracts (BC) and transactions in the day-ahead market (DAM). A fuzzy mixed integer linear programming model with a fuzzy objective and fuzzy constraints is developed to incorporate the impacts of imprecision/uncertainty in the economic environment on the calculation of the optimal value of the GenCo’s objective function. In formulating the fuzzy objective function we also include the potential impacts of climate change on the energy output of hydroelectric power plants. In addition to formulating and solving the capacity planning/investment problem, we also performed scenario-based (sensitivity) analysis to explore how investment decisions of the GenCos change when fuzziness (tolerance) in the maximum energy output of hydroelectric units and/or drought expectation increases. The proposed model is novel and investigates the effects of factors like drought expectations of climate changes, hydroelectric power plant investments, and other power generation technology investment options. © 2016, Springer Science+Business Media New York.",bilateral contracts market; climate change; day-ahead market; energy generation; fuzzy programming; hydroelectric power; Long-term capacity planning,8,Information Systems Frontiers,2017 605,Mondal T.; Pramanik P.; Bhattacharya I.; Boral N.; Ghosh S.,Analysis and Early Detection of Rumors in a Post Disaster Scenario,"The use of online social media for post-disaster situation analysis has recently become popular. However, utilizing information posted on social media has some potential hazards, one of which is rumor. For instance, on Twitter, thousands of verified and non-verified users post tweets to convey information, and not all information posted on Twitter is genuine. Some of them contain fraudulent and unverified information about different facts/incidents - such information are termed as rumors. Identification of such rumor tweets at early stage in the aftermath of a disaster is the main focus of the current work. To this end, a probabilistic model is adopted by combining prominent features of rumor propagation. Each feature has been coded individually in order to extract tweets that have at least one rumor propagation feature. In addition, content-based analysis has been performed to ensure the contribution of the extracted tweets in terms of probability of being a rumor. The proposed model has been tested over a large set of tweets posted during the 2015 Chennai Floods. The proposed model and other four popular baseline rumor detection techniques have been compared with human annotated real rumor data, to check the efficiency of the models in terms of (i) detection of belief rumors and (ii) accuracy at early stage. It has been observed that around 70% of the total endorsed belief rumors have been detected by proposed model, which is superior to other techniques. Finally, in terms of accuracy, the proposed technique also achieved 0.9904 for the considered disaster scenario, which is better than the other methods. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Chennai floods; Disaster; Microblogs; Rumor; Twitter,50,Information Systems Frontiers,2018 606,Burns A.J.; Posey C.; Roberts T.L.,Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity,"The protection of organizational information and information systems (IS) is a socio-technical issue and requires insiders take on a more proactive set of security roles. Accordingly, we contend that insiders’ abilities to enact these diverse information security roles can be explained by behavioral complexity theory. Adapted to the security context, behavioral complexity theory stipulates that insider’s ability to take appropriate precautions against organizational security threats is explained by their (1) repertoire of security roles and associated behaviors (i.e., security behavioral repertoire) and their (2) ability to switch from role to role (i.e., security behavioral differentiation). However, beyond behavioral complexity, protecting against complex security-related threats in the workplace requires significant psychological resources of insiders. Thus, to examine the influence of behavioral complexity on insiders’ protection motivation, we develop and examine an extended model of behavioral complexity including insiders’ workplace resilience—a significant work-related psychological resource Our results fully support the extended security behavioral complexity model’s role in driving an insider’s protection motivation. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Behavioral complexity; Behavioral differentiation; Behavioral repertoire; Information security; Workplace resilience,12,Information Systems Frontiers,2021 607,Silver S.D.,Dynamics of Negative Evaluations in the Information Exchange of Interactive Decision-Making Teams: Advancing the Design of Technology-Augmented GDSS,"Applications of technology that contribute to managing decision-making teams for their objectives benefit from an explicit account of microprocessing in the information exchange of team members. While negative evaluations are well recognized as a key information type in this exchange, the micro-processing that underlies its exchange has not been well defined. Negative evaluations will be proposed to differ from other information types because of their dual properties as information and affect. We propose dynamics that are implied by the duality in negative evaluations we cite and report empirical studies that test abstract generalizations on the proposed dynamics. We then give an explicit form to exchange of negative evaluations in a numerical model of information exchange and use the model in exercises that directly demonstrate the proposed properties of negative evaluations in information exchange. Finally, we review contributions that the discourse offers to the design of AI-supported GDSSs for managerial objectives in the exchange of information in ill-structured decision making and introduce architecture of a prototype GDSS that implements quality-maximizing information exchange. Directions for subsequent study are discussed. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",AI-augmented GDSSs; Ill-structured decisions; Information exchange in teams; Negative evaluations in information typologies; Team decision-making,3,Information Systems Frontiers,2021 608,Balan U M.; Mathew S.K.,"Personalize, Summarize or Let them Read? A Study on Online Word of Mouth Strategies and Consumer Decision Process","This study integrates theories of task complexity and cognitive stopping rule to understand how complexity of information environment impacts uncertainty, effectiveness and efficiency of consumers’ decision process. Using the reviews provided by an online retailer, we develop an e-commerce environment with three levels of complexity: high with raw textual reviews, medium with attribute-level review summaries and low with web personalization strategy based on attribute preferences extracted from online reviews. In a controlled lab experiment, users took buying decisions under different levels of complexity. Our analyses of clickstream data showed that users’ effectiveness and efficiency were the highest in review based personalized environment. However, between groups who received summarized and textual reviews, the latter demonstrated apparently higher effectiveness and efficiency in decision making, which went against our anticipation. Further investigation showed that users simplified decision process when exposed to raw reviews. These results further inform reviews-based personalization strategy in e-commerce. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Complexity; Consumer behavior; E-commerce; Online word of mouth; Summarized reviews; Web personalization,14,Information Systems Frontiers,2021 609,Bandyopadhyay A.; Ganguly D.; Mitra M.; Saha S.K.; Jones G.J.F.,An Embedding Based IR Model for Disaster Situations,"Twitter (http://twitter.com) is one of the most popular social networking platforms. Twitter users can easily broadcast disaster-specific information, which, if effectively mined, can assist in relief operations. However, the brevity and informal nature of tweets pose a challenge to Information Retrieval (IR) researchers. In this paper, we successfully use word embedding techniques to improve ranking for ad-hoc queries on microblog data. Our experiments with the ‘Social Media for Emergency Relief and Preparedness’ (SMERP) dataset provided at an ECIR 2017 workshop show that these techniques outperform conventional term-matching based IR models. In addition, we show that, for the SMERP task, our word embedding based method is more effective if the embeddings are generated from the disaster specific SMERP data, than when they are trained on the large social media collection provided for the TREC (http://trec.nist.gov/) 2011 Microblog track dataset. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Information retrieval; Microblog; Twitter; Word embedding,13,Information Systems Frontiers,2018 610,Kapoor K.K.; Tamilmani K.; Rana N.P.; Patil P.; Dwivedi Y.K.; Nerur S.,"Advances in Social Media Research: Past, Present and Future","Social media comprises communication websites that facilitate relationship forming between users from diverse backgrounds, resulting in a rich social structure. User generated content encourages inquiry and decision-making. Given the relevance of social media to various stakeholders, it has received significant attention from researchers of various fields, including information systems. There exists no comprehensive review that integrates and synthesises the findings of literature on social media. This study discusses the findings of 132 papers (in selected IS journals) on social media and social networking published between 1997 and 2017. Most papers reviewed here examine the behavioural side of social media, investigate the aspect of reviews and recommendations, and study its integration for organizational purposes. Furthermore, many studies have investigated the viability of online communities/social media as a marketing medium, while others have explored various aspects of social media, including the risks associated with its use, the value that it creates, and the negative stigma attached to it within workplaces. The use of social media for information sharing during critical events as well as for seeking and/or rendering help has also been investigated in prior research. Other contexts include political and public administration, and the comparison between traditional and social media. Overall, our study identifies multiple emergent themes in the existing corpus, thereby furthering our understanding of advances in social media research. The integrated view of the extant literature that our study presents can help avoid duplication by future researchers, whilst offering fruitful lines of enquiry to help shape research for this emerging field. © 2017, The Author(s).",Information systems; Social media research; Social networks; Systematic review,999,Information Systems Frontiers,2018 611,Wijnhoven F.,Organizational Learning for Intelligence Amplification Adoption: Lessons from a Clinical Decision Support System Adoption Project,"Intelligence amplification exploits the opportunities of artificial intelligence, which includes data analytic techniques and codified knowledge for increasing the intelligence of human decision makers. Intelligence amplification does not replace human decision makers but may help especially professionals in making complex decisions by well-designed human-AI system learning interactions (i.e., triple loop learning). To understand the adoption challenges of intelligence amplification systems, we analyse the adoption of clinical decision support systems (CDSS) as an organizational learning process by the case of a CDSS implementation for deciding on administering antibiotics to prematurely born babies. We identify user-oriented single and double loop learning processes, triple loop learning, and institutional deutero learning processes as organizational learning processes that must be realized for effective intelligence amplification adoption. We summarize these insights in a system dynamic model—containing knowledge stocks and their transformation processes—by which we analytically structure insights from the diverse studies of CDSS and intelligence amplification adoption and by which intelligence amplification projects are given an analytic theory for their design and management. From our case study, we find multiple challenges of deutero learning that influence the effectiveness of IA implementation learning as transforming tacit knowledge into explicit knowledge and explicit knowledge back to tacit knowledge. In a discussion of implications, we generate further research directions and discuss the generalization of our case findings to different organizations. © 2021, The Author(s).",Analytics; Clinical decision support system; Intelligence amplification adoption; Organizational learning; System dynamics,33,Information Systems Frontiers,2022 612,Cognini R.; Corradini F.; Gnesi S.; Polini A.; Re B.,Business process flexibility - a systematic literature review with a software systems perspective,"Business Process flexibility supports organizations in changing their everyday work activities to remain competitive. Since much research has been done on this topic a better awareness on the current state of knowledge is needed. This paper reports the results of a systematic literature review to develop a map on Business Process flexibility with a special focus on software systems related aspects. It covers a spectrum of the state of the art from academic point of view. It includes 164 research works from the main computer science digital libraries. After an introduction into the topic the applied methodology is described. The output of the paper is in the form of schemes and reflections. Starting from the needs for Business Process flexibility, its impact on Business Process life-cycle is introduced. Successively instruments used to express and to support Business Process flexibility are presented together with related validation scenarios. In this paper we also highlight possible future research lines needing further investigations. In particular we identified room for future works in the area of languages for modeling flexibility, on-the-fly verification solutions, adaptation of Business Process running instances, and techniques for evolution recognition. © 2016, Springer Science+Business Media New York.",Adaptability; Business process; Business process life-cycle; Business process management; Cases study; Evolution; Flexibility; Languages; Looseness; Mechanisms; Process aware information systems; Systematic literature review; Variability,51,Information Systems Frontiers,2018 613,Seethamraju R.; Diatha K.S.; Garg S.,Intention to Use a Mobile-Based Information Technology Solution for Tuberculosis Treatment Monitoring – Applying a UTAUT Model,"There are 2.2 million cases of tuberculosis (TB) in India, with an economic burden of $3 billion per year. Efficient monitoring of TB treatment is critical and the Indian Government’s current reliance on a pen and paper system for monitoring patients’ adherence to treatment is neither effective nor scalable. Employing the unified theory of acceptance and use of technology model (UTAUT) as its theoretical foundation, this study investigates the factors influencing the acceptance and use of a mobile-based IT solution for TB treatment monitoring. Data was collected from a survey of healthcare professionals working in TB treatment clinics and analysed using partial least squares structural equation modelling. Four constructs in the UTAUT model, effort expectancy (EE), facilitating conditions (FC), performance expectancy (PE) and social influence (SI) – were found to significantly and positively influence healthcare professionals’ behavioral intention to use the proposed mobile-based IT solution, and explained 56% of the variance. Importantly, our study validates the predictive capabilities of the UTAUT model in public health service delivery context in a developing country. © 2017, Springer Science+Business Media, LLC.",Mobile; Public health; TB treatment; UTAUT model,72,Information Systems Frontiers,2018 614,Schuff D.; Corral K.; St. Louis R.D.; Schymik G.,Enabling self-service BI: A methodology and a case study for a model management warehouse,"The promise of Self-Service Business Intelligence (BI) is its ability to give business users access to selection, analysis, and reporting tools without requiring intervention from IT. This is essential if BI is to maximize its contribution by radically transforming how people make decisions. However, while some progress has been made through tools such as SAS Enterprise Miner, IBM SPSS Modeler, and RapidMiner, analytical modeling remains firmly in the domain of IT departments and data scientists. The development of tools that mitigate the need for modeling expertise remains the “missing link” in self-service BI, but prior attempts at developing modeling languages for non-technical audiences have not been widely implemented. By introducing a structured methodology for model formulation specifically designed for practitioners, this paper fills the unmet need to bring model-building to a mainstream business audience. The paper also shows how to build a dimensional Model Management Warehouse that supports the proposed methodology, and demonstrates the viability of this approach by applying it to a problem faced by the Division of Fiscal and Actuarial Services of the US Department of Labor. The paper concludes by outlining several areas for future research. © 2016, Springer Science+Business Media New York.",Analytics; Business intelligence; Model management; Modeling; Self-service,26,Information Systems Frontiers,2018 615,Haque M.F.; Krishnan R.,Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence,"Cyber Threat sharing helps with defending against cyber attacks in a timely manner. Many frameworks have been proposed for CTI sharing such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII). However, CTI sharing in a controlled and automated manner is critical. In this paper, we demonstrate Relationship Based Access Control (ReBAC) as an appropriate model for CTI sharing. We also develop an approach for automated threat detection, generation and sharing of structured CTI and taking course of actions to mitigate cyber threats. Finally, we implement an Automated Cyber Defense System in a cloud based environment. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Cyber Threat Intelligence (CTI); OpenStack; Relationship Based Access Control (ReBAC); Structured Threat Information Expression (STIX); Trusted Automated Exchange of Intelligence Information (TAXII),27,Information Systems Frontiers,2021 616,Ayaburi E.W.; Lee J.; Maasberg M.,Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective,"Contest-based intermediary crowdsourcing represents a powerful new business model for generating ideas or solutions by engaging the crowd through an online competition. Prior research has examined motivating factors such as increased monetary reward or demotivating factors such as project requirement ambiguity. However, problematic issues related to crowd contest fitness have received little attention, particularly with regard to crowd strategic decision-making and contest outcomes that are critical for success of crowdsourcing platforms as well as implementation of crowdsourcing models in organizations. Using Expectation-Confirmation Theory (ECT), we take a different approach that focuses on contest level outcomes by developing a model to explain contest duration and performance. We postulate these contest outcomes are a function of managing crowdsourcing participant contest-fitness expectations and disconfirmation, particularly during the bidding process. Our empirical results show that contest fitness expectations and disconfirmation have an overall positive effect on contest performance. This study contributes to theory by demonstrating the adaptability of ECT literature to the online crowdsourcing domain at the level of the project contest. For practice, important insights regarding strategic decision making and understanding how crowd contest-fitness are observed for enhancing outcomes related to platform viability and successful organizational implementation. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Confirmation; Contest-fitness; Crowdsourcing; Duration; Expectation; Performance,23,Information Systems Frontiers,2020 617,Choudrie J.; Patil S.; Kotecha K.; Matta N.; Pappas I.,"Applying and Understanding an Advanced, Novel Deep Learning Approach: A Covid 19, Text Based, Emotions Analysis Study","The pandemic COVID 19 has altered individuals’ daily lives across the globe. It has led to preventive measures such as physical distancing to be imposed on individuals and led to terms such as ‘lockdown,’ ‘emergency,’ or curfew’ to emerge in various countries. It has affected society, not only physically and financially, but in terms of emotional wellbeing as well. This distress in the human emotional quotient results from multiple factors such as financial implications, family member’s behavior and support, country-specific lockdown protocols, media influence, or fear of the pandemic. For efficient pandemic management, there is a need to understand the emotional variations among individuals, as this will provide insights into public sentiment towards various government pandemic management policies. From our investigations, it was found that individuals have increasingly used different microblogging platforms such as Twitter to remain connected and express their feelings and concerns during the pandemic. However, research in the area of expressed emotional wellbeing during COVID 19 is still growing, which motivated this team to form the aim: To identify, explore and understand globally the emotions expressed during the earlier months of the pandemic COVID 19 by utilizing Deep Learning and Natural language Processing (NLP). For the data collection, over 2 million tweets during February–June 2020 were collected and analyzed using an advanced deep learning technique of Transfer Learning and Robustly Optimized BERT Pretraining Approach (RoBERTa). A Reddit-based standard Emotion Dataset by Crowdflower was utilized for transfer learning. Using RoBERTa and the collated Twitter dataset, a multi-class emotion classifier system was formed. With the implemented methodology, a tweet classification accuracy of 80.33% and an average MCC score of 0.78 was achieved, improving the existing AI-based emotion classification methods. This study explains the novel application of the Roberta model during the pandemic that provided insights into changing emotional wellbeing over time of various citizens worldwide. It also offers novelty for data mining and analytics during this challenging, pandemic era. These insights can be beneficial for formulating effective pandemic management strategies and devising a novel, predictive strategy for the emotional well-being of an entire country’s citizens when facing future unexpected exogenous shocks. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID’19; Deep learning; Emotion analysis; RoBERTa; Transfer learning; Twitter,62,Information Systems Frontiers,2021 618,Ozarslan S.; Eren P.E.,MobileCDP: A mobile framework for the consumer decision process,"The consumer decision process is a widely accepted model covering consumer activities, and accordingly contains five interrelated stages: problem recognition, information search, evaluation of alternatives, purchase, and post-purchase evaluation. In order to help consumers deal with challenges associated with all these stages, mobile information systems bring significant capabilities, as in other application domains. However, related prior research is mostly restricted to the individual stages of the process. Since the stages are interrelated, and the data collected in one are also valuable for another, we propose a mobile framework designed to provide assistance in all stages of the Consumer Decision Process, named MobileCDP. A prototype is also implemented and evaluated to show the applicability of the framework. Experiments show that the functions provided by the prototype are useful, well integrated, and easy to use. Moreover, statistical analysis of the results proves that the prototype reduces time, costs, and cognitive effort of the user. © 2015, Springer Science+Business Media New York.",Consumer behavior; Consumer decision process; Mobile information systems; Mobile technologies,8,Information Systems Frontiers,2018 619,Prajapati A.; Chhabra J.K.,Information-Theoretic Remodularization of Object-Oriented Software Systems,"Software remodularization consists in reorganizing software entities into modules such that pairs of entities belonging to the same modules are more similar than those belonging to different modules. In recent years, Search-Based Software Engineering (SBSE) approach has gained unprecedented growth for solving software remodularization problem. Most of the previous studies remodularize the software system by optimizing the structural coupling and cohesion metrics as objective functions. These metrics are defined in terms of the number of structural relationships counts, rather than taking patterns of relationships. It has been observed that the computation of coupling and cohesion based on patterns of relationships (i.e., information-theory based) are more accurate than the number of relationships. This paper proposes an information-theoretic software remodularization where an entropy-based similarity measure is introduced as an objective function along with other objective functions i.e., inter-module class change coupling, intra-module class change coupling, module size index (MSI), and module count index (MCI) and is further optimized using many-objective meta-heuristic algorithm. To evaluate the effectiveness of the proposed approach, seven object-oriented software systems have been remodularized using NSGA-III, MOEA/D, IBEA, and TAA algorithms. The results are compared with existing multi-objective formulation of remodularization problem in terms of authoritative software remodularization, non-extreme distribution, and stability. The experimentation results suggest that the proposed approach can be a good alternative to improve the quality of software systems. The findings suggest that the approach is more suitable for generating remodularization solution good from both quality metrics and developers perspective. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Information theoretic technique; Search- based software engineering; Software entropy; Software remodularization,12,Information Systems Frontiers,2020 620,Hopkins N.; Tate M.; Sylvester A.; Johnstone D.,Motivations for 21st century school children to bring their own device to school,"Bring-Your-Own-Device (BYOD) is an emerging phenomenon in businesses and schools. Despite accelerating adoption in schools, the factors that affect students’ use of BYOD are still not well articulated. We used a modified version of Taylor and Todd’s (1995) decomposed Theory of Planned Behaviour (D-TPB) to evaluate antecedents to behavioural intention to use BYOD in classrooms. The descriptive results paint a mixed picture, where pupil’s own enthusiasm for the use of their own devices in the class-room seems to be higher that of other parties. The results of the model show that students’ behavioural intention to use their own device is substantially influenced by their attitude and moderately influenced by their subjective norms and perceived behavioural control. This study contributes to mid-range theory by adapting the D-TPB for the study context, and has practical implications for parents, educators and officials developing BYOD policies for schools. © 2016, Springer Science+Business Media New York.",BYOD; D-TPB; eLearning; Schools; Students,17,Information Systems Frontiers,2017 621,Raspopovic M.; Jankulovic A.,Performance measurement of e-learning using student satisfaction analysis,"The purpose of this paper is to analyze e-learning system quality through the analysis of student satisfaction and the usage of learning materials. This analysis takes into consideration both online and traditional students who are using the same e-learning system. The goal of the analysis is to identify factors which influence student satisfaction and to address heterogeneous styles and needs of both groups of students, so that future pedagogical and motivational methods in teaching and learning can be appropriately selected, developed and implemented. It was of particular interest to explore student satisfaction with quality of an e-learning system and online study approach. Reasons that may influence opinions of online and traditional students are examined and presented. The results are used to give recommendations for e-learning improvements and to propose the model with 4 groups of dimensions for performance measurement each of which best represents satisfaction of both groups of students. © 2016, Springer Science+Business Media New York.",Distance learning; E-learning; Performance measurement; Quality assessment,27,Information Systems Frontiers,2017 622,Tamilmani K.; Rana N.P.; Dwivedi Y.K.,Consumer Acceptance and Use of Information Technology: A Meta-Analytic Evaluation of UTAUT2,"Despite being regarded as the most comprehensive theory in understanding individual technology adoption – UTAUT2 theory with growing number of citations and impetus beyond IS domain face strong criticism on usage of the model in its entirety. This study located UTAUT2 based empirical studies in the Scopus and Web of Science bibliographic database through citied reference search in order to evaluate appropriate usage of UTAUT2 constructs. The meta-analysis results spanning across 60 studies with more than 122,000 cumulative observations found BI➔UB as the strongest path with all significant values. PE➔BI emerged as the most utilized path with most significant values underscoring the emphasis placed by consumers on utilitarian value. Meanwhile, with most non-significant path values the future usage of EE➔BI path is been cautioned and questioned. Finally, trust, personal innovativeness, perceived risk, attitude, and self-efficacy were found as the five topmost UTAUT2 extensions. © 2020, The Author(s).",Citation analysis; Consumer acceptance; Information technology; Meta-analysis; UTAUT2,266,Information Systems Frontiers,2021 623,Troudi A.; Zayani C.A.; Jamoussi S.; Amor I.A.B.,A New Mashup Based Method for Event Detection from Social Media,"Some events, such as terrorism attacks, earthquakes, and other events that represent tipping points, remain engraved in our memories. Today, through social media, researchers attempt to propose approaches for event detection. However, they are confronted to certain challenges owing to the noise of data propagated throughout social media. In this paper, a new mashup based method for event detection from social media is proposed using hadoop framework. The suggested approach aims at detecting real-world events by exploiting data collected from different social media sites. Indeed, the detected events are characterized by such descriptive dimensions as topic, time and location. Moreover, our approach assures a bilingual event detection. In fact, the proposed approach is able to detect events in English and French languages. In addition, our approach provides a mashup based multidimensional visualization by combining different multimedia components so as to add more details to the detected events. Furthermore, in order to overcome the problems occurring from the processing of big data, we integrated our approach into the hadoop distributed system. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Event detection; Hadoop framework; Mashup; Multidimensional; Social media,15,Information Systems Frontiers,2018 624,Elena-Bucea A.; Cruz-Jesus F.; Oliveira T.; Coelho P.S.,"Assessing the Role of Age, Education, Gender and Income on the Digital Divide: Evidence for the European Union","This paper assesses the digital divide between and within the 28 member-states of the European Union. The analysis comprised four socio-demographic contexts: age, education, gender, and income. Because of the digital divide’s complexity, a multivariate approach was applied - factor analysis with oblique rotation, which resulted in two distinct dimensions: e-Services and Social Networks. To test the significant differences of European Union positioning and European Union disparities, Multivariate Analysis of Variance and Squared Rank Test were computed. Findings show that e-Services adoption is influenced primarily by the education level of individuals, while Social Networks adoption is more affected by individuals’ age. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Age; Digital divide; Education; Gender; Income,203,Information Systems Frontiers,2021 625,Stephan E.G.; Elsethagen T.O.; Berg L.K.; Macduff M.C.; Paulson P.R.; Shaw W.J.; Sivaraman C.; Smith W.P.; Wynne A.,"Semantic catalog of things, services, and data to support a wind data management facility","Transparency and data integrity are crucial to any scientific study wanting to garner impact and credibility in the scientific community. The purpose of this paper is to discuss how this can be achieved using what we define as the Semantic Catalog. The catalog exploits community vocabularies as well as linked open data best practices to seamlessly describe and link things, data, and off-the-shelf (OTS) services to support scientific offshore wind energy research for the U.S. Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE) Wind and Water Power Program. This is largely made possible by leveraging collaborative advances in the Internet of Things (IoT), Semantic Web, Linked Services, Linked Open Data (LOD), and Resource Description Framework (RDF) vocabulary communities, which provides the foundation for our design. By adapting these linked community best practices, we designed a wind characterization Data Management Facility (DMF) capable of continuous data collection, processing, and preservation of in situ and remote sensing instrument measurements. The design incorporates the aforementioned Semantic Catalog which provides a transparent and ubiquitous interface for its user community to the things, data, and services for which the DMF is composed. © 2015, Springer Science+Business Media New York (outside the USA).",Atmosphere; Data management facility; Linked data; Linked services; Semantic web; Web of things,4,Information Systems Frontiers,2016 626,Ertek G.; Tokdemir G.; Sevinç M.; Tunç M.M.,New knowledge in strategic management through visually mining semantic networks,"Today’s highly competitive business world requires that managers be able to make fast and accurate strategic decisions, as well as learn to adapt to new strategic challenges. This necessity calls for a deep experience and a dynamic understanding of strategic management. The trait of dynamic understanding is mainly the skill of generating additional knowledge and innovative solutions under the new environmental conditions. Building on the concepts of information processing, this paper aims to support managers in constructing new strategic management knowledge, through representing and mining existing knowledge through graph visualization. To this end, a three-stage framework is proposed and described. The framework can enable managers to develop a deeper understanding of the strategic management domain, and expand on existing knowledge through visual analysis. The model further supports a case study that involves unstructured knowledge of profit patterns and the related strategies to succeed using these patterns. The applicability of the framework is shown in the case study, where the unstructured knowledge in a strategic management book is first represented as a semantic network, and then visually mined for revealing new knowledge. © 2015, Springer Science+Business Media New York.",Graph visualization; Information visualization; Knowledge generation; Knowledge representation; Semantic networks; Strategic management,21,Information Systems Frontiers,2017 627,Xu Y.; Wang L.; Xu B.; Jiang W.; Deng C.; Ji F.; Xu X.,An information integration and transmission model of multi-source data for product quality and safety,"The product quality and safety information have drawn extensive attention due to social impacts. Based on the transmission characteristics of the Web information, we constructed the information transmission models with government intervention and without government intervention based on complex network. Meanwhile, we analyzed the influence of government intervention on information transmission. Based on the BA network, we adopted the MATLAB tool to simulate the human relation model and utilized event information level, government information level, and possible panic population proportion as index to evaluate the government intervention effect. Our experimental results indicated that the intervention time, the government information platform, network connection characteristics, public inform will, and transmission will do have an intervention effect. © 2016, Springer Science+Business Media New York.",Government intervention; Industrial information integration; Information transmission model; Product quality and safety; Web information,10,Information Systems Frontiers,2019 628,Alter S.,Making Sense of Smartness in the Context of Smart Devices and Smart Systems,"Careless usage of the term smart in today’s world leads to wondering whether it means anything beyond involving a currently impressive application of IT. This paper characterizes smart and smartness in relation to describing, analyzing, and designing smart devices and systems. Examples of nominally smart devices and systems and principles that support thinking about smartness lead to a definition of smartness in the context of devices and systems. The definition leads to a classification matrix for smart capabilities organized around four categories: information processing, internal regulation, action in the world, and knowledge acquisition. Each category includes a set of separate capabilities that can be described on a continuum from not smart to somewhat smart to extremely smart based on the definition of smart. A concluding section describes how this multidimensional view of smartness can be applied in thinking about smartness while describing, analyzing, and designing devices and systems. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Smart device; Smart service system; Smart system,104,Information Systems Frontiers,2020 629,Kar A.K.,What Affects Usage Satisfaction in Mobile Payments? Modelling User Generated Content to Develop the “Digital Service Usage Satisfaction Model”,"Mobile payment services have become increasingly important in daily lives in India due to multiple planned and unplanned events. The objective of this study is to identify the determinants of usage satisfaction of mobile payments which could enhance service adoption. The “Digital Service Usage Satisfaction Model” has been proposed and validated by combining technology adoption and service science literature. First the data was extracted from Twitter based on hashtags and keywords. Then using sentiment mining and topic modelling the large volumes of text were analysed. Then network science was also used for identifying clusters among associated topics. Then, using content analysis methodology, a theoretical model was developed based on literature. Finally using multiple regression analysis, we validated the proposed model. The study establishes that cost, usefulness, trust, social influence, credibility, information privacy and responsiveness factors are more important to increase the usage satisfaction of mobile payments services. Also methodologically, this is an endeavour to validate a new approach which uses social media data for developing a inferential theoretical model. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Big data analytics; Digital Service Use; Service Quality; Mobile payments; Social Media Analytics; Usage satisfaction,214,Information Systems Frontiers,2021 630,Gupta S.; Drave V.A.; Bag S.; Luo Z.,Leveraging Smart Supply Chain and Information System Agility for Supply Chain Flexibility,"Global businesses are leveraging their analytical capabilities to develop competence over others. This study uses Organization Information Processing Theory (OIPT) in context to explain the relationship between the smart supply chain and information system flexibility to achieve an overall greater supply chain flexibility. Also, this shows that correct deployment of information processing leads to better diffusion of information throughout the system necessary for making the supply chain more adaptive in nature. This study extends the application of OIPT theory and a better understanding of analytical data processing and theoretically grounded guidance to managers in order to achieve a higher degree of flexibility in dynamic conditions. The Partial Least Square Method based on Structural Equation Modeling is used to empirically test the theoretical framework. Results from the analysis of 150 respondents indicate the strong relationship between the components of the smart supply chain and information systems agility. The research shows a positive relationship between the characteristics of smart supply chain management and modules of information system flexibility which leads to the achievement of a high level of supply chain flexibility. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Information processing; Information system agility; OIPT; Smart supply chain; Supply chain flexibility,146,Information Systems Frontiers,2019 631,Ogie R.I.; Forehead H.; Clarke R.J.; Perez P.,Participation Patterns and Reliability of Human Sensing in Crowd-Sourced Disaster Management,"Over the last ten years, there has been a significant increase in crowd-sourcing applications for disaster management. Their success depends heavily on the behaviour of social media users, acting as human sensors during disaster monitoring and emergency response. Unlike their technological counterparts, human sensors are complex social entities, contributing in different ways to their collective task and creating varying participation patterns through social media. Failing to understand these participation patterns limits our capacity to evaluate the reliability of human sensing in different contexts. Based on an analysis of flood-related information contributed by Twitter users in Jakarta during the 2014/2015 and 2015/2016 monsoonal seasons, this study establishes four categories of human sensors and their respective levels of reliability for disaster management. The results have significant implications for how we frame expectations and develop reliance on the use of social media for disaster management. Importantly, the results will serve as a useful guide for understanding levels of incentive that may be required to motivate members of the different categories of social media users during emergencies and disasters. © 2017, Springer Science+Business Media, LLC.",Crowd-sourcing; Disaster management; Emergency response; Human sensor; Social media,34,Information Systems Frontiers,2018 632,Freitas F.A.; Peres S.M.; Lima C.A.M.; Barbosa F.V.,Grammatical facial expression recognition in sign language discourse: a study at the syntax level,"Facial Expression Recognition is an already well-developed research area, mainly due to its applicability in the construction of different system types. Facial expressions are especially important in the area which relates to the construction of discourses through sign language. Sign languages are visual-spatial languages that are not assisted by voice intonation. Therefore, they use facial expressions to support the manifestation of prosody aspects and some grammatical constructions. Such expressions are called Grammatical Facial Expressions (GFEs) and they are present at sign language morphological and syntactic levels. GFEs stand out in automated recognition processes for sign languages, as they help removing ambiguity among signals, and they also contribute to compose the semantic meaning of discourse. This paper aims to present a study which applies inductive reasoning to recognize patterns, as a way to study the problem involving the automated recognition of GFEs at the discourse syntactic level in the Libras Sign Language (Brazilian Sign Language). In this study, sensor Microsoft Kinect was used to capture three-dimensional points in the faces of subjects who were fluent in sign language, generating a corpus of Libras phrases, which comprised different syntactic constructions. This corpus was analyzed through classifiers that were implemented through neural network Multilayer Perceptron, and then a series of experiments was conducted. The experiments allowed investigating: the recognition complexity that is inherent to each of the GFEs that are present in the corpus; the use suitability of different vector representations, considering descriptive characteristics that are based on coordinates of points in three dimensions, distances and angles therefrom; the need for using time data regarding the execution of expressions during speech; and particularities that are connected to data labeling and the evaluation of classifying models in the context of a sign language. © 2017, Springer Science+Business Media New York.",Grammatical facial expression; Machine learning; Pattern recognition; Sign language,21,Information Systems Frontiers,2017 633,Hawa M.; Al-Zubi R.; Darabkh K.A.; Al-Sukkar G.,Adaptive approach to restraining content pollution in peer-to-peer networks,"Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network. © 2016, Springer Science+Business Media New York.",Adaptive validation; Collusion; Distributed system; Feedback; Peer-to-peer; Pollution attack,4,Information Systems Frontiers,2017 634,Vimalkumar M.; Singh J.B.; Sharma S.K.,Exploring the Multi-Level Digital Divide in Mobile Phone Adoption: A Comparison of Developing Nations,"Mobile phones are the most accessible information and communication technology today, and they serve as the gateway to high-speed internet for large populations in developing economies. However, despite the progress, there remains a persistent disparity in mobile phone usage among users, and between users and non-users, in developing countries. However, the literature on the digital divide has paid limited attention to the multi-level nature of this gap in mobile phone adoption and use, particularly in developing countries. This research paper provides a comparative analysis of this divide in mobile phone usage in eight developing nations from Africa and Asia. Broadly, the study categorises individuals into three groups: mobile phone non-users, mobile phone users who do not use internet applications and mobile phone users who use applications that need internet access. The disparity between these users was analysed using micro-level survey data from each country. The study results show that the nature of the divide varies across countries and that the influence of socio-demographic factors is not consistent. Further, we find that there is a larger digital divide in terms of mobile phone usage in Asian countries when compared to African countries. The study recommends that policymakers and international agencies exercise caution while developing one-size-fits-all cross-country policies to address the multi-level digital divide. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Africa; Asia; Cross-country analysis; Developing countries; Digital divide; Mobile phones,39,Information Systems Frontiers,2021 635,Sicari S.; Cappiello C.; De Pellegrini F.; Miorandi D.; Coen-Porisini A.,A security-and quality-aware system architecture for Internet of Things,"Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to enabling technologies and supported services. IoT also assumes to deal with a huge amount of heterogeneous data generated by devices, transmitted by the underpinning infrastructure and processed to support value-added services. In order to provide users with valuable output, the IoT architecture should guarantee the suitability and trustworthiness of the processed data. This is a major requirement of such systems in order to guarantee robustness and reliability at the service level. In this paper, we introduce a novel IoT architecture able to support security, privacy and data quality guarantees, thereby effectively boosting the diffusion of IoT services. © 2014, Springer Science+Business Media New York.",Data quality; Internet of Things; Privacy; Security; System architecture,120,Information Systems Frontiers,2016 636,Smiti S.; Soui M.,Bankruptcy Prediction Using Deep Learning Approach Based on Borderline SMOTE,"Imbalanced classification on bankruptcy prediction is considered as one of the most important topics in financial institutions. In this context, various statistical and artificial intelligence methods have been proposed. Recently, deep learning algorithms are experiencing a resurgence of interest, and are widely used to build a prediction and classification models. To this end, we propose a novel deep learning-based approach called BSM-SAES. This approach combines Borderline Synthetic Minority oversampling technique (BSM) and Stacked AutoEncoder (SAE) based on the Softmax classifier. The aim is to develop an accurate and reliable bankruptcy prediction model which includes the features extraction process. To assess the classification performance of our proposed model, k- nearest neighbor, decision tree, support vector machine, and artificial neural network, C5.0 that are machine learning methods, are applied. We evaluate our proposed approach on the Polish imbalanced datasets. The obtained results confirm the efficiency of our proposed model compared to other machine learning models regarding predicting and classifying the financial status of a firm. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Bankruptcy prediction; Borderline SMOTE; Deep learning; Imbalanced dataset; Stacked autoencoder,111,Information Systems Frontiers,2020 637,Al-Omoush K.S.,Understanding the Impact of Intellectual Capital on E-Business Entrepreneurial Orientation and Competitive Agility: An Empirical Study,"This study empirically examines the impact of intellectual capital on the frontiers of e-business entrepreneurial orientation and how intellectual capital and e-business entrepreneurial orientation contribute to competitive agility. A questionnaire was used for data collection from telecommunication companies and obtained from a sample of 212 participants. Data analysis was conducted using a structural equation modeling approach using smart PLS. The results show the positive impact of human capital, structural capital, and relational capital on e-business entrepreneurial orientation. The findings also indicate a direct positive impact of intellectual capital and e-business entrepreneurial orientation on competitive agility. An understanding of the impact of intellectual capital, e-business entrepreneurial orientation dimensions, and their relationship with competitive agility will provide organizations with a better background and knowledge on how to foster and manage these capabilities. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Competitive agility; E-business entrepreneurial orientation; Entrepreneurship; Human capital; Intellectual capital; Relational capital; Structural capital,33,Information Systems Frontiers,2022 638,Bygstad B.; Øvrelid E.; Lie T.; Bergquist M.,Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital,"Much of the information produced in hospitals is clinical, and stored for the purposes of documentation. In practice, most of it is never used. The potential of analytics is to reuse this information for other purposes. This is easier said than done, because of technical, semantic, legal and organizational hindrances. In particular, hospitals are not organized to leverage the value of big data. In this study we ask, how can we conceptualize analytics as an integrated part of hospital processes? And, how can we develop and organize an analytics capability in a large hospital? Our empirical evidence is a longitudinal study in a high-tech hospital in Norway, where we followed the development of an analytics capability, and assessed the organizational benefits. We offer two findings. First, we show how the analytics process interacts with the hospital logistics processes in a sense- and respond cycle. Second, we demonstrate how analytics capability is built on the institutionalized network of technology, an analytics team and the administrative and clinical decision makers. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Analytics capability; Digital infrastructure; Hospital analytics,16,Information Systems Frontiers,2020 639,Choi Y.; Lee H.,Data properties and the performance of sentiment classification for electronic commerce applications,"Sentiment classification has played an important role in various research area including e-commerce applications and a number of advanced Computational Intelligence techniques including machine learning and computational linguistics have been proposed in the literature for improved sentiment classification results. While such studies focus on improving performance with new techniques or extending existing algorithms based on previously used dataset, few studies provide practitioners with insight on what techniques are better for their datasets that have different properties. This paper applies four different sentiment classification techniques from machine learning (Naïve Bayes, SVM and Decision Tree) and sentiment orientation approaches to datasets obtained from various sources (IMDB, Twitter, Hotel review, and Amazon review datasets) to learn how different data properties including dataset size, length of target documents, and subjectivity of data affect the performance of those techniques. The results of computational experiments confirm the sensitivity of the techniques on data properties including training data size, the document length and subjectivity of training /test data in the improvement of performances of techniques. The theoretical and practical implications of the findings are discussed. © 2017, The Author(s).",Comparative analysis; Data properties; Machine learning approach; Opinion mining; Sentiment classification; Sentiment orientation approach,56,Information Systems Frontiers,2017 640,Garriga M.; Renzis A.D.; Lizarralde I.; Flores A.; Mateos C.; Cechich A.; Zunino A.,A structural-semantic web service selection approach to improve retrievability of web services,"Service-Oriented Computing promotes building applications by consuming and reusing Web Services. However, the selection of adequate Web Services given a client application is still a major challenge. The effort of assessing and adapting candidate services could be overwhelming due to the “impedance” of Web Service interfaces expected by clients versus the actual interfaces of retrieved Web Services. In this work, we present a novel structural-semantic approach to help developers in the retrieval and selection of services from a service registry. The approach is based on a comprehensive structural scheme for service Interface Compatibility analysis, and WordNet as the semantic support to assess identifiers of operations and parameters. We also empirically analyze, compare and contrast the performance of three service selection methods: a pure structural approach, a pure semantic approach, and the structural-semantic (hybrid) approach proposed in this work. The experimental analysis was performed with two data-sets of real-world Web Services and a service discovery support already published in the literature. Results show that our hybrid service selection approach improved effectiveness in terms of retrievability of Web Services compared to the other approaches. © 2016, Springer Science+Business Media New York.",Semantic service selection; Service interface; Service selection; Structural service selection; Web service discovery; Web services,18,Information Systems Frontiers,2018 641,Tao Q.; Dong Y.; Lin Z.,Who can get money? Evidence from the Chinese peer-to-peer lending platform,"This paper explores how borrowers’ financial and personal information, loan characteristics and lending models affect peer-to-peer (P2P) loan funding outcomes. Using a large sample of listings from one of the largest Chinese online P2P lending platforms, we find that those borrowers earning a higher income or who own a car are more likely to receive a loan, pay lower interest rates, and are less likely to default. The credit grade assigned by the lending platform may not represent the creditworthiness of potential borrowers. We also find that the unique offline process in the Chinese P2P online lending platform exerts significant influence on the lending decision. We discuss the implications of our results for the design of big data-based lending markets. © 2017, Springer Science+Business Media New York.","China; Fintech, offline authentication; Information asymmetry; Listing outcomes; Peer-to-peer (P2P) lending",68,Information Systems Frontiers,2017 642,Anand A.; Bhatt N.; Alhazmi O.H.,Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters,"Vulnerability Discovery Models (VDMs) attempt to estimate the potential vulnerabilities present in a software that will be discovered after a software is released. A general framework is required to encompass all the attributes such as number of detectors, their skill, market share, etc. that impact the discovery of vulnerability. VDMs have been developed by various industry and researchers to assess the vulnerability trend over time. In this proposal, we try to formulate the discovery process based on the software reporters that are the legitimately working to fetch-out the vulnerabilities in a software. The available reporters present in the market impact the discovery process significantly as a vulnerability is more likely to be discovered if a greater number of users are working simultaneously. The interdisciplinary approach highlights the association of vulnerability discovery process and the number of reporters. To empirically validate the preposition, we consider three datasets and the proposed methodology perform significantly better as compared to the traditional VDMs. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Reporters; Software patch; Software security; Software vulnerability; Vulnerability discovery modeling,8,Information Systems Frontiers,2021 643,Dörndorfer J.; Seel C.,Context Modeling for the Adaption of Mobile Business Processes – An Empirical Usability Evaluation,"Nowadays, the Internet of Things (IoT) and mobile devices are ubiquitous. Both, the IoT and mobile devices contain sensors and thus can provide data about the device’s environment. The sensor data can be used to infer the current context. However, for this purpose, the sensor data have to be aggregated. In this aggregation process, several different sensors and data provided by other sources, such as databases, can be used. In order to facilitate this, the paper presents a modeling language for context modeling based on sensors. Moreover, a detailed usability evaluation of the presented context modeling language is shown. This evaluation is based on three hypotheses regarding learnability, time expenditure and effectiveness. An experiment involving an experimental group and a control group was conducted to test these three hypotheses, and the results were interpreted. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Business process management; Context modeling; Context-awareness; Domain-specific modeling language,3,Information Systems Frontiers,2022 644,Choi B.; Raghu T.S.; Vinzé A.; Dooley K.J.,Effectiveness of standards consortia: Social network perspectives,"With the rapid assimilation of e-business capabilities into generally accepted business practices, there has been a rush to ensure standards exist to allow for seamless integration and interfaces between all the concerned parties. While standards consortia have grown in number and importance in the private sector over the past decade, little is known about how effective standards consortia are in addressing the needs for developing e-business standards. The current study examines the relationships between task characteristics of e-business standards and group effectiveness of standards consortia in terms of group centralization, group cohesiveness, and group diversity. We took a case study approach and analyze email archives from the ebXML standards efforts using social network analysis techniques. The findings of the study indicate that the expanding nature of e-business standards and a broader participation of IT vendor and users must be considered in order to improve group effectiveness of standards consortia. Managerial implications of the findings are discussed. © 2017, Springer Science+Business Media New York.",E-business standards development; Group effectiveness; Social network analysis; Standards consortia; Task characteristics,3,Information Systems Frontiers,2019 645,Palanca J.; Val E.; Garcia-Fornes A.; Billhardt H.; Corchado J.M.; Julián V.,Designing a goal-oriented smart-home environment,"Nowadays, systems are growing in power and in access to more resources and services. This situation makes it necessary to provide user-centered systems that act as intelligent assistants. These systems should be able to interact in a natural way with human users and the environment and also be able to take into account user goals and environment information and changes. In this paper, we present an architecture for the design and development of a goal-oriented, self-adaptive, smart-home environment. With this architecture, users are able to interact with the system by expressing their goals which are translated into a set of agent actions in a way that is transparent to the user. This is especially appropriate for environments where ambient intelligence and automatic control are integrated for the user’s welfare. In order to validate this proposal, we designed a prototype based on the proposed architecture for smart-home scenarios. We also performed a set of experiments that shows how the proposed architecture for human-agent interaction increases the number and quality of user goals achieved. © 2016, Springer Science+Business Media New York.",Adaptive systems; Goal-oriented systems; Multi-agent systems; Service-oriented systems; Smart-home environments,28,Information Systems Frontiers,2018 646,Gardino G.B.; Meo R.; Craparotta G.,Multi-view Latent Learning Applied to Fashion Industry,"Demand forecasting is one of the main challenges for retailers and wholesalers in any industry. Proper demand forecasting gives business valuable information about potential profits and helps managers in taking targeted decisions on business growth strategies. Nowadays almost all organizations use different data sources or databases for nearly every aspect of their operations so that the knowledge on products on sale belongs to several independent views. The methodology described in this paper addresses the issue of product demand forecasting in fashion industry exploiting a multi-view learning approach. In particular, we show how the integration and connection among multiple views improves results accuracy. In real-life applications not all the views are usually available before a product is put on the market but the utility of a proper demand forecasting increases if the prediction is available before the product launch. We show that missing views can be reconstructed by means of common latent factors; in particular, this paper presents a learning procedure that describes the connection between different views. This connection allows data integration from multiple sources and can be extended to the special case of partial data representation. The nearest neighbors in the latent space play a special role for this process and for a general improvement of the forecast quality. We experimented the proposed methodology on real fashion retail sales showing that multi-view latent learning provides a system that is able to reconstruct satisfactorily non yet available views and can be used to predict the volumes of sales well before the goods are put on the market. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Fashion forecast; Latent spaces; Multi-view learning,7,Information Systems Frontiers,2021 647,Shojaiemehr B.; Rafsanjani M.K.,A supplier offer modification approach based on fuzzy systems for automated negotiation in e-commerce,"In E-commerce, numbers of transactions are increasing day by day in B2B and B2C trade. Online negotiation is possible because of automated negotiation. Autonomous entities such as agents could help in these situations. Providing an offer which has maximum utilities for both trading parties into possible shortest time is the main aim of this work. Proposed model applies issue trade-offs strategy in which multiple issues are traded-offs against one another to maximize participant satisfaction. To make trade-offs the model applies a fuzzy system approach. The automated negotiation model in this article has a process without offer generating and exchanging between buyer and supplier agents to explore time-consuming negotiation process in earlier researches. Mediator component searches an optimal offer that satisfies buyer and supplier requirements. The system will utilize fuzzy inference systems to automate negotiation process and considers two effective factors in the negotiation process: requirements and preferences. Requirements are qualitative or quantitative values which the participants assign to issues for negotiation. Preferences of the participants are priorities assigned to the issues. These values express an importance measure of the issues from a participant perspective. Analytic hierarchy process (AHP) is used to get preferences of the issues. Proposed model applies different Fuzzy Inference System (FIS) schemes for qualitative and quantitative negotiation issues to enhance the satisfaction level of buyers and suppliers. Experimental results show that how the model fulfills the main aim of our work. © 2016, Springer Science+Business Media New York.",Fuzzy inference system; Modification process; Negotiation agent; Negotiation issue; Participant offer; Recommender,16,Information Systems Frontiers,2018 648,Sanchez-Segura M.-I.; Dugarte-Peña G.-L.; Medina-Dominguez F.; Ruiz-Robles A.,A model of biomimetic process assets to simulate their impact on strategic goals,"Process assets (PAs) are acknowledged as contributing to the business value of organizations. Even so, they are still classed and employed as passive elements ready for use for special purposes. This paper considers how the evolution of active PAs over time can best influence the achievement of specific strategic objectives for decision making by CEOs regarding which PAs should be empowered and which do not require investment, etc. This proposal is formulated by rethinking PAs as dynamic elements armed with biomimetic intelligence. This means conceiving of PAs as live elements that interact and make use of swarm intelligence in order to provide a permanent overview of individual PA evolution and its impact on strategic goals. The NetLogo modelling and simulation tool was used to build the proposed model. The input for the simulation model was taken from a real experience of PAs previously identified and assessed in an information technology company. © 2016, Springer Science+Business Media New York.",Intellectual capital; Intelligent process assets; Process assets management; Strategic goals achievement,5,Information Systems Frontiers,2017 649,Schatz D.; Bashroush R.,Economic valuation for information security investment: a systematic literature review,"Research on technological aspects of information security risk is a well-established area and familiar territory for most information security professionals. The same cannot be said about the economic value of information security investments in organisations. While there is an emerging research base investigating suitable approaches measuring the value of investments in information security, it remains difficult for practitioners to identify key approaches in current research. To address this issue, we conducted a systematic literature review on approaches used to evaluate investments in information security. Following a defined review protocol, we searched several databases for relevant primary studies and extracted key details from the identified studies to answer our research questions. The contributions of this work include: a comparison framework and a catalogue of existing approaches and trends that would help researchers and practitioners navigate existing work; categorisation and mapping of approaches according to their key elements and components; and a summary of key challenges and benefits of existing work, which should help focus future research efforts. © 2016, Springer Science+Business Media New York.",Econometrics; Information security; Information systems; Managerial risk accounting; Return on security investment; Systematic literature review,64,Information Systems Frontiers,2017 650,Zhang Y.G.; Dang M.Y.; Chen H.,An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking,"This study investigates avatars’ gender and age differences in their help-seeking interactions in virtual worlds. Specifically, we conducted data collections from two popular help-supporting regions from Second Life, and performed two levels of analyses. We first examined the existence of the overall gender and age differences, and then compared and tested the detailed differences by creating three types of interaction networks based on avatar gender and avatar age, respectively. Overall, we found that the interaction networks of the same gender tended to be more centralized than the interaction networks with mixed genders. In addition, the interaction networks of the same age group tended to be more centralized than the interaction networks with mixed ages. We also found that old-aged avatars had significantly higher values than young-aged avatars in all measurement dimensions, indicating that old-aged avatars played more important roles in help-seeking interactions. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Avatar age differences; Avatar gender differences; Second life; Social interactions; Virtual worlds,23,Information Systems Frontiers,2020 651,Oztekin A.,Information fusion-based meta-classification predictive modeling for ETF performance,"This study is aimed at determining the future share net inflows and outflows of Exchange Traded Funds (ETFs). The relationship between net flows is closely related to investor perception of the future and past performance of mutual funds. The net flows for Exchange Traded Funds are expected to be less related to overall fund performance, but rather based on the characteristics of the fund that make it attractive to an individual investor. In order to explore the relationship between investor’s perception of ETFs and subsequent net flows, this study is designed to shed light on the multifaceted linkages between fund characteristics and net flows. A meta-classification predictive modeling approach is designed for the use of large data sets. Then its implementation and results are discussed. A thorough selection of fifteen attributes from each fund, which are the most likely contributors to fund inflows and outflows, is deployed in the analyses. The large data set calls for the use of a robust systematic approach to identifying the attributes of the funds that best predict future inflows and outflows of the fund. The predictive performance of the proposed decision analytic methodology was assessed via the 10-fold cross validation, which yielded very promising results. © 2016, Springer Science+Business Media New York.",Business analytics; Data mining; Decision analytics; Exchange traded funds; Meta-classification predictive modeling; Variable importance ranking,10,Information Systems Frontiers,2018 652,Mousavizadeh M.; Koohikamali M.; Salehan M.; Kim D.J.,An Investigation of Peripheral and Central Cues of Online Customer Review Voting and Helpfulness through the Lens of Elaboration Likelihood Model,"Online consumer reviews (OCRs) have become an important part of online consumers’ decision-making to purchse products. Consumers use OCRs not only to get a better understanding of the characteristics of products but also to learn about other customers’ experiences with them. Drawing upon Elaboration Likelihood Model, this research investigates the predictors of popularity and helpfulness of OCRs. The results of the study show that longer reviews, as well as those with extreme star ratings, are more popular. Moreover, the amount of hedonic and utilitarian cues in a review and its sentiment significantly influence perceptions of online consumers regarding its helpfulness. The results also show how product type moderates the effect of utilitarian and hedonic cues on helpfulness. Our results can be used by online review websites to develop more efficient methods for sorting OCRs. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Elaboration likelihood model; Online consumer reviews; Online review performance; Sentiment mining; Text mining,63,Information Systems Frontiers,2022 653,Lee K.; Lee K.Y.; Sheehan L.,Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users’ Perception of Group Harmony,"Unlike most other computing devices that are known to isolate their users, Smart Voice Assistant Speaker (SVAS) appears to improve the perception of social cohesion (i.e., Group Harmony) among its co-users. We hypothesize that the social cues emanated from the continued, and habituated, use of SVAS develop the “illusion of intimacy” which, in turn, ripples through the entire group, and help fulfill the need for social integration. The data collected from 218 families support this hypothesis. We argue that just as a puppy dog contributes to a happy family, so does the SVAS contributes to the social dynamics by making the users unconsciously fulfill their psychological needs and by increasing actual conversations among its users. Incidentally, the study compared the relative influence of three factors (the beta weight of “Hedonic Motivation” being the highest, followed by “Compatibility,” and then “Perceived Security”) that, as a whole, explain over 60% of the variance in Satisfaction of post-adoption SVAS use. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",CASA; Echo effect; Group harmony; Habit; Parasocial relationship; Ripple effect,86,Information Systems Frontiers,2020 654,Pourmasoumi A.; Kahani M.; Bagheri E.,Mining variable fragments from process event logs,"Many peer-organizations are now using process-aware information systems for managing their organizational processes. Most of these peer-organizations have shared processes, which include many commonalities and some degrees of variability. Analyzing and mining the commonalities of these processes can have many benefits from the reusability point of view. In this paper, we propose an approach for extracting common process fragments from a collection of event logs. To this end, we first analyze the process fragment literature from a theoretical point of view, based on which we present a new process fragment definition, called morphological fragments to support composability and flexibility. Then we propose a novel algorithm for extracting such morphological fragments directly from process event logs. This algorithm is capable of eliciting common fragments from a family of processes that may not have been executed within the same application/organization. We also propose supporting algorithms for detecting and categorizing morphological fragments for the purpose of reusability. Our empirical studies show that our approach is able to support reusability and flexibility in process fragment identification. © 2016, Springer Science+Business Media New York.",Cross organizational mining; Event logs; Morphological fragments; Process fragments; Reusable fragments,21,Information Systems Frontiers,2017 655,Sánchez-Segura M.-I.; Ruiz-Robles A.; Medina-Dominguez F.,Uncovering hidden process assets: A case study,"The information technology (IT) industry is not making the best possible use of its intangible process assets. The proposed process assets classification is grounded on the experience existing in the intellectual capital field. IT companies can use this classification to better identify and classify their process assets, thereby gaining an overview of the elements on which their processes depend and incrementing their intellectual capital. Two IT companies participated in a case study in which company chief executive and chief operations officers used the proposed classification, which they considered very useful, to identify a set of important process assets not previously taken into account. © 2016, Springer Science+Business Media New York.",Intangible process assets; Intellectual capital; Knowledge management; Process assets; Process improvement,7,Information Systems Frontiers,2016 656,Mukhopadhyay A.; Chatterjee S.; Bagchi K.K.; Kirs P.J.; Shukla G.K.,Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance,"Malicious external attackers commonly use cyber threats (such as virus attacks, denial-of-service (DoS) attacks, financial fraud, system penetration, and theft of proprietary information), while internal attackers resort to unauthorized access to compromise the confidentiality, integrity, and availability (CIA) of the data of individuals, organizations, and nations. This results in an opportunity cost, a loss of market capitalization, and a loss of brand equity for organizations. Organizations and nations spend a substantial portion of their information technology (IT) budgets on IT security (such as perimeter and core security technologies). Yet, security breaches are common. In this paper, we propose a cyber-risk assessment and mitigation (CRAM) framework to (i) estimate the probability of an attack using generalized linear models (GLM), namely logit and probit, and validate the same using Computer Security Institute–Federal Bureau of Investigation (CSI–FBI) time series data, (ii) predict security technology required to reduce the probability of attack to a given level in the next year, (iii) use gamma and exponential distribution to best approximate the average loss data for each malicious attack, (iv) calculate the expected loss due to cyber-attacks using collective risk modeling, (v) compute the net premium to be charged by cyber insurers to indemnify losses from a cyber-attack, and (vi) propose either cyber insurance or self-insurance, or self-protection, as a strategy for organizations to minimize losses. © 2017, Springer Science+Business Media, LLC.",Cyber insurance; Cyber-risk quantification; E-commerce; IS security; Logit and probit models; Security breach; Self-insurance,54,Information Systems Frontiers,2019 657,Abouzeid A.; Granmo O.-C.; Webersik C.; Goodwin M.,Learning Automata-based Misinformation Mitigation via Hawkes Processes,"Mitigating misinformation on social media is an unresolved challenge, particularly because of the complexity of information dissemination. To this end, Multivariate Hawkes Processes (MHP) have become a fundamental tool because they model social network dynamics, which facilitates execution and evaluation of mitigation policies. In this paper, we propose a novel light-weight intervention-based misinformation mitigation framework using decentralized Learning Automata (LA) to control the MHP. Each automaton is associated with a single user and learns to what degree that user should be involved in the mitigation strategy by interacting with a corresponding MHP, and performing a joint random walk over the state space. We use three Twitter datasets to evaluate our approach, one of them being a new COVID-19 dataset provided in this paper. Our approach shows fast convergence and increased valid information exposure. These results persisted independently of network structure, including networks with central nodes, where the latter could be the root of misinformation. Further, the LA obtained these results in a decentralized manner, facilitating distributed deployment in real-life scenarios. © 2021, The Author(s).",Crisis mitigation; Hawkes processes; Learning automata; Social media Misinformation; Stochastic optimization,11,Information Systems Frontiers,2021 658,Cena F.; Console L.; Matassa A.; Torre I.,Multi-dimensional intelligence in smart physical objects,"This paper is about characterizing intelligence in Smart Physical Objects, i.e., objects based on the tight and seamless integration of a physical and a digital counterpart. The design of these objects gives rise to new opportunities but requires taking into account a number of dimensions that contribute to smartness. In our view, supported by considerable literature on this subject, smart behavior is the result of proper combinations of several dimensions of intelligence. In the paper we analyze these dimensions, singling out different alternatives leading to different capabilities of smart objects. The contribution of the paper is to provide a framework to guide a designer in making decisions about smartness in the physical object being designed, starting from its requisites. At the same time the framework provides an effective guide to classify and compare smart physical objects according to the type and level of smartness they exhibit. We apply the approach to a set of smart physical objects showing its suitability and usefulness. © 2017, Springer Science+Business Media New York.",Design guidelines; Dimensions of intelligence; Human-object interaction; Internet of things; Levels of smartness; Smart Objects,19,Information Systems Frontiers,2019 659,Shyamasundar R.K.; Chaudhary P.; Jaiswal A.; Kuiri A.,Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models,"Ever since databases became an ubiquitous part of enterprises or businesses, security and privacy became a requirement. Traditionally, privacy was realized through various methods of database access control and relied much on the use of statically defined views, which are essentially logical constructs imposed over database tables that can alter or restrict the data that can be viewed by an user. Privacy is about the responsible maintenance of private information. This responsibility is hard to define, which is why laws are necessary. With a vast accumulation of personal data in databases, there has been a heightened awareness and concern about the storage and use of private information leading to privacy-related guidelines, regulations and legislations, Compliance with these regulations has become one of the major concerns for organizations and companies. Traditionally, privacy in databases (DBs) have been addressed through access control techniques including multi-level security (MLS) based on mandatory access control (MAC), and restricted views to the users. As view definitions to comply with regulations became quite complex for accommodating all the restrictions in one view, explicit constructs for specifying privacy policies were introduced for complying with medical regulations like HIPAA (Health Insurance Portability and Accountability Act) from USA, in relational database systems. These enabled fine grained access control (FGAC) capable of enforcing disclosure control enunciated databases. Application of information flow control that is needed for multi-level security (MLS) databases to preserve privacy among multiple users but have their challenges like new abstractions for managing information flow in a relational database system, handling transactions and integrity constraints without introducing covert channels etc. As the DBs need to work alongside information flow controlled programming languages and operating systems for tracking flows, there is a need to enforce the security policy not only on the DBMS but also on the application platform. Due to the underlying requirement of decentralization, it calls for declassification/endorsement and santization requirements on the DB. In this paper, we shall first review some of the major privacy enhancing techniques used traditionally for DBs including MLS DBs, and then explore application of decentralized information flow control models for realizing information flow secure DBs in a robust manner. Towards the end, we shall also touch upon some of the roles of anonymization and psuedonymization including inference control and differential privacy in realizing privacy in practice. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Declassification; Information flow; Privacy; Relational database; Security,5,Information Systems Frontiers,2021 660,Sousa M.J.; González-Loureiro M.,Employee knowledge profiles – a mixed-research methods approach,"The purpose of this paper is to identify different knowledge profiles in organizations and to analyze their contribution to innovation. This is done by analyzing how knowledge is integrated within the work processes by groups of workers with different characteristics (i.e. knowledge profiles). The paper uses a combination of qualitative analysis with quantitative analysis. Using Action Research methodology, several semi-structured group interviews were performed and a questionnaire was applied to employees of two organizations. In order to identify the employee’s profiles, different groups were found by means of a factorial analysis, which resulted in specific knowledge profiles. The major finding of this research was the identification of several knowledge profiles - Innovators, Integrators, Organizers and Facilitators,. An important conclusion is that integration of knowledge in day-by-day practices can boost innovation. The collection of evidences carried out helped to identify ways of integrating knowledge through the implementation of knowledge sharing routines and promotion of collaborative activities in systematic transfer processes, including problem-solving routines and participation in improvement, quality and maintenance projects. © 2016, Springer Science+Business Media New York.","Innovation; Knowledge management; Organization, profiles",12,Information Systems Frontiers,2016 661,Zhu Y.; Pan P.; Fang S.; Da Xu L.; Song J.; Zhang J.; Feng M.,The development and application of e-Geoscience in China,"In the era of big data, scientific research is entering a key stage of scientific development under the guidance of a new paradigm, “e-Science”, and the core characteristics of which are collaboration and sharing. In the past decade, e-Science has rapidly developed around the world. There are now e-Science strategic plans, projects and extensive research activities on the national and international scales that encompass particle physics, astronomy, earth science, ecology, marine science, medicine, life sciences and other disciplines. However, there is no uniform and clear understanding of the essence, characteristics, infrastructure and application of e-Geoscience. This paper first discusses and analyzes the development of e-Science in a global context and then explores its development in China. Next, the development of e-Geoscience is discussed, particularly regarding the details of its design and implementation in China, including a conceptual model, a mode of application, a logical hierarchy, and functional and technical systems. Finally, the paper introduces a typical application, called the Northeast Asia Joint Scientific Exploration and Cooperative Research Platform (NAJSECRP), which is operating in research institutions in China, Russia and Mongolia. This platform can not only provide geodata and bibliographies and promote resource sharing but also provides a collaborative research platform for scientific exploration. In practice, this platform has been shown to save costs and improve the efficiency of transnational, interdisciplinary scientific exploration and cooperative research. © 2015, Springer Science+Business Media New York.",Big data; Cloud computing; e-Geoscience; e-Science; Information sharing; Internet of Things (IoT); Northeast Asia,7,Information Systems Frontiers,2016 662,Zadeh A.; Taylor D.; Bertsos M.; Tillman T.; Nosoudi N.; Bruce S.,Predicting Sports Injuries with Wearable Technology and Data Analysis,"Injuries resulting from sports and physical activities can be persistent and pose a substantial problem for player’s economic wellbeing and quality of life. Wearable technologies in conjunction with analytics can help mitigate the risk to players by identifying injury risk factors and focusing on risk reduction. Prior to engaging in strenuous sport activities, wearables can be employed to facilitate the quantification of relevant functional capabilities, ultimately advancing the field of sports injury management. In this paper, we discuss how wearable technologies can improve the health and athletic performance of athletes by monitoring participants across many variables. A cohort of 54 army ROTC cadets participated in this study. Using Zephyr BioHarness Wearable technology, we gathered quantifiable data to generate insights that allow us to predict and prevent injuries related the wearer’s physical exertion during sporting activities. This study finds that a combination of high BMI and high mechanical loads could result in injury. Therefore, in creating an exercise program, it is imperative to ensure that mechanical load is incrementally increased through the practice season as athletes become conditioned. While, a high level repetitious mechanical load with unconditioned athletes could cause injuries in short time, it is important to impose enough mechanical loads in the training program to ensure good musculoskeletal development. While our analyses identified several factors associated with injury data during ROTC activities, other wearable variables might become significant in other situations. In summary, results from this study demonstrate that wearable technology allows players with an increased risk of injury to be identified and targeted for intervention. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Internet of things (IoTs); Predictive analytics; ROTC; Sports analytics; Sports Injuries; Wearable technology,86,Information Systems Frontiers,2021 663,Guo J.; Fung B.C.M.; Iqbal F.; Kuppen P.J.K.; Tollenaar R.A.E.M.; Mesker W.E.; Lebrun J.-J.,Revealing determinant factors for early breast cancer recurrence by decision tree,"Early breast cancer recurrence is indicative of poor response to adjuvant therapy and poses threats to patients’ lives. Most existing prediction models for breast cancer recurrence are regression-based models and difficult to interpret. We apply a Decision Tree algorithm to the clinical information of a cohort of non-metastatic invasive breast cancer patients, to establish a classifier that categorizes patients based on whether they develop early recurrence and on similarities of their clinical and pathological diagnoses. The classifier predicts for whether a patient developed early disease recurrence; and is estimated to be about 70% accurate. For an independent validation cohort of 65 patients, the classifier predicts correctly for 55 patients. The classifier also groups patients based on intrinsic properties of their diseases; and for each subgroup lists the disease characteristics in a hierarchal order, according to their relevance to early relapse. Overall, it identifies pathological nodal stage, percentage of intra-tumor stroma and components of TGFβ-Smad signaling pathway as highly relevant factors for early breast cancer recurrence. Since most of the disease characteristics used by this classifier are results of standardized tests, routinely collected during breast cancer diagnosis, the classifier can easily be adopted in various research and clinical settings. © 2017, Springer Science+Business Media New York.",Breast cancer; Classifier; Decision tree; Recurrence; Stroma; TGFβ,21,Information Systems Frontiers,2017 664,Sabi H.M.; Uzoka F.-M.E.; Langmia K.; Njeh F.N.; Tsuma C.K.,A cross-country model of contextual factors impacting cloud computing adoption at universities in sub-Saharan Africa,"Cloud computing is a new computing paradigm that is revolutionizing the way we access and use computer infrastructure and services. Universities in developing countries lag behind their Western counterparts due to lack of cutting edge technology required for teaching, collaboration, and research. The purpose of this study was to investigate the factors that impact diffusion, adoption, and usage of cloud computing at universities in sub-Saharan Africa (SSA). An adoption model was developed focusing on contextual factors and constructs from two technology adoption theories. Structural equation modelling was used for data analysis and model validation. Results from 355 valid responses to a survey of information and communication technology (ICT) experts and decision makers at universities in SSA indicated that socio-cultural factors, results demonstrability, usefulness, and data security significantly impact their propensity to recommend adoption of cloud computing in the universities. The implications of the findings and practical contributions are discussed. © 2017, Springer Science+Business Media New York.",Cloud computing; Developing countries; Education; Sub-Saharan Africa; Technology adoption,68,Information Systems Frontiers,2018 665,Hong L.; Fu C.; Wu J.; Frias-Martinez V.,Information Needs and Communication Gaps between Citizens and Local Governments Online during Natural Disasters,"A growing number of citizens and local governments are using tweets to communicate during natural disasters. A good understanding of the communication contents and behaviors is critical for disaster relief. Previous work has used crisis taxonomies or manually labeling methods to understand the content. However, such methods usually require extra efforts to find insights related to specific events. In this paper, we use a semi-automatic framework to extract specific topics from the communication contents of citizens and local governments, combined with the spatiotemporal information to explore: 1) the spatiotemporal bursts of topics; 2) the change of topics with respect to the severity of disaster; and 3) communication behaviors. We use tweets collected during 18 snowstorms in the State of Maryland, US, as a case to study. The study reveals the communication differences due to the urban-rural divide or to the severity of the snowstorms. The insights suggest that local governments could potentially adapt the context of information delivered to citizens so as to match their needs. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Citizen; Communication; Local governments; Natural disaster; Snowstorm; Social media,46,Information Systems Frontiers,2018 666,Zamani E.D.; Pouloudi N.; Giaglis G.M.; Wareham J.,Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet,"The concept of appropriation is of paramount importance for the lasting use of an Information Technology (IT) artefact following its initial adoption, and therefore its success. However, quite often, users’ original expectations are negatively disconfirmed, and instead of appropriating the IT artefact, they discontinue its use. In this study we examine the use of IT artefacts following negative disconfirmation and use Grounded Theory Method techniques to analyse 136 blogposts, collected between March 2011 – July 2017, to investigate how users appropriate or reject the tablet when technology falls short of users’ expectations. Our findings show that users overcome negative disconfirmation through a trial and error process. In doing so, we identify that users appropriate the tablet when the attained benefits significantly outweigh the risks or sacrifices stemming out of its use. We discuss our contribution within the context of the appropriation literature, and highlight that the success of IT lies with the user’s success in identifying personal use scenarios within and across diverse contexts of use. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Appropriation; Grounded theory method; Negative disconfirmation; Rejection; Tablet; Trial and error; User behaviour,20,Information Systems Frontiers,2022 667,Inan D.I.; Beydoun G.; Opper S.,Agent-Based Knowledge Analysis Framework in Disaster Management,"Disaster Management (DM) is a complex set of interrelated activities. The activities are often knowledge-intensive and time sensitive. Timely sharing of the required knowledge is critical for DM. For recurring disasters (e.g. floods), developed countries tend to have dedicated document repositories of Disaster Management Plans (DISPLANs) that can be accessed as needs arise. However, accessing the appropriate plan in a timely manner, and sharing activities between plans, often requires significant domain knowledge and intimate understanding of the plans in the first place. This paper introduces an Agent-Based (AB) knowledge analysis method to convert DISPLANs into a collection of knowledge units that can be stored into a unified repository. The repository of DM actions then enables the mixing and matching of knowledge between different plans. The repository is structured as a layered abstraction according to Meta Object Facility (MOF). We use the flood DISPLANs plans used by SES (State Emergency Service), an authoritative DM agency in New South Wales (NSW) State of Australia (hereinafter referred to as SES NSW) to illustrate and give a preliminary validation of the approach. It is illustrated by using displans along the flood-prone Murrumbidgee river in central NSW. © 2017, Springer Science+Business Media, LLC.",Agent-oriented analysis; Disaster management; Knowledge analysis; Knowledge management; Metamodeling,16,Information Systems Frontiers,2018 668,Kam H.-J.; Mattson T.; Goel S.,A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness,"In this paper, we conceptually and empirically investigate the relationship between industry and information security awareness (ISA). Different industries have unique security related norms, rules, and values, which we propose promotes different levels of organizational effort to raise their employees’ general ISA. To examine these potential industry effects, we draw on Neo-Institutional Theory (NIT) because different industries operate in unique institutional environments. We specifically theorize that the pressures from the three institutional pillars (regulative, normative, and cultural-cognitive) will affect employees across all industries but the magnitude of those effects will vary across industries, because different industries have institutionalized security practices in unique ways. To evaluate our theorized relationships empirically, we surveyed employees in the banking, healthcare, retail, and higher education industries. We found that our subjects’ perceptions of the pressures from the three institutional pillars positively affected their perceptions of how much effort their organizations exerted to raise their general ISA. However, we also found that these effects were not consistent across our surveyed employees in the different industries, especially related to the direct and moderating effect of perceived normative institutional pressures. The implication of our paper is that future behavioral information security research should consider how industry and their corresponding institutional structures might affect (positively or negatively) the relationships in our core theoretical models. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cross industry; Industry effects; Information security awareness; Neo-institutional theory (NIT); Organizational effort,21,Information Systems Frontiers,2020 669,Michiardi P.; Carra D.; Migliorini S.,Cache-Based Multi-Query Optimization for Data-Intensive Scalable Computing Frameworks,"In modern large-scale distributed systems, analytics jobs submitted by various users often share similar work, for example scanning and processing the same subset of data. Instead of optimizing jobs independently, which may result in redundant and wasteful processing, multi-query optimization techniques can be employed to save a considerable amount of cluster resources. In this work, we introduce a novel method combining in-memory cache primitives and multi-query optimization, to improve the efficiency of data-intensive, scalable computing frameworks. By careful selection and exploitation of common (sub)expressions, while satisfying memory constraints, our method transforms a batch of queries into a new, more efficient one which avoids unnecessary recomputations. To find feasible and efficient execution plans, our method uses a cost-based optimization formulation akin to the multiple-choice knapsack problem. Extensive experiments on a prototype implementation of our system show significant benefits of worksharing for both TPC-DS workloads and detailed micro-benchmarks. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Caching; Large scale computing; Optimization,10,Information Systems Frontiers,2021 670,Gan M.; Sun L.; Jiang R.,GLORY: Exploration and integration of global and local correlations to improve personalized online social recommendations,"Nowadays people manage their social circles via a variety of online social media which employ social recommendation as an important component. Among social recommendation methods, global methods take an emphasis on common tastes between people while local methods assume that new relations are established mainly through people’s common friends. However, in a real social network, both local and global relations exist, which motivate us to integrate them to improve recommendation performance. To achieve the goal, we proposed a novel hybrid method GLORY to combine global associations with local correlations for social recommendation. GLORY consists of two components: GLOBE and LORY. The former is a globalised regression model to explore the concordance between people’s preference with the relatedness of their friends. The latter is an integration method to fuse global and local correlations via a rigorous statistical model to calibrate the statistical significance of these correlations. Furthermore, we demonstrated the effectiveness of our methods via 10-fold large-scale cross-validation on three real social network datasets (Facebook, Last.fm and Epinions). Results show that GLORY significantly outperform the state-of-the-art methods while LORY is effective across various global and local methods, indicating their promising future for social recommendations. © 2017, Springer Science+Business Media, LLC.",Fisher’s combined probability test; Global and local correlations; Regression through the origin; Social network; Social recommendations,3,Information Systems Frontiers,2019 671,Kwayu S.; Lal B.; Abubakre M.,Enhancing Organisational Competitiveness Via Social Media - a Strategy as Practice Perspective,"The affordances, popularity and pervasive use of social media platforms such as Facebook, Twitter and Instagram have made these platforms attractive to organisations for enhancing their competitiveness and creating business value. Despite this apparent significance of social media for businesses, they are struggling with the development of a social media strategy as well as understanding the implications of social media on practice within their organisations. This paper explores how social media has become a tool for competitiveness and its influence on organisational strategy and practice. Using the ‘strategy as practice’ lens and guided by the interpretivist philosophy, this paper uses the empirical case of a telecom organisation in Tanzania. The findings show that social media is influencing competitiveness through imitation and product development. Also, the findings indicate how social media affects the practices within an organisation, consequently making the social media strategy an emergent phenomenon. © 2017, The Author(s).",Competitiveness; Social media strategy; Strategy as practice theory,52,Information Systems Frontiers,2018 672,Huang L.; Zhao Q.; Li Y.; Wang S.; Sun L.; Chou W.,Reliable and efficient big service selection,"Big services, both virtual (e.g., cloud services) and physical (e.g., public transportation), are evolving rapidly to handle and deal with big data. By aggregating services from various domains, big services adopt selection schemes to produce composite service solutions that meet customer requirements. However, unlike traditional service selection, a huge number of big services require some lengthy selection processes to improve the service reliability. In this paper, we propose an efficient big service selection approach based on the coefficient of variation and mixed integer programming that improves the solution in two senses: 1) minimizing the time cost and 2) maximizing the reliability. We tested our approach on real-world datasets, and the experimental results indicated that our approach is superior to others. © 2017, Springer Science+Business Media New York.",Big service; QoS; Service computing; Service selection,11,Information Systems Frontiers,2017 673,Lundmark L.W.; Oh C.; Verhaal J.C.,"A little Birdie told me: Social media, organizational legitimacy, and underpricing in initial public offerings","Drawing on the organizational legitimacy literature, we propose and test a set of hypotheses arguing that social media, an artifact of information technology, serves as a mechanism for conferring legitimacy in the market for initial public offerings (IPOs). The extant literature identifies third-party authorities, such as traditional media outlets and industry analysts, as a valuable source of organizational legitimacy. Social media and micro-blogging, however, remain outside current classifications of the phenomenon. This study theoretically develops and empirically tests a new mechanism in the legitimation process: the direct interaction with potential investors and society-at-large via social media. Our findings indicate broad support that having a Twitter account, and the extent to which a firm utilizes Twitter, is associated with systematically higher levels of IPO underpricing. Moreover, we find support that social media variables external to the firm, including number of followers and retweets, also impact the level of underpricing in an IPO. In conclusion, we highlight the emerging role of social media in processes of legitimation and invite additional research at the intersection of IS and management. © 2016, Springer Science+Business Media New York.",Initial public offerings; Organizational legitimacy; Social media; Social networks,21,Information Systems Frontiers,2017 674,Huang C.-K.; Wang T.; Huang T.-Y.,Initial Evidence on the Impact of Big Data Implementation on Firm Performance,"Big data has been widely discussed for several years. However, whether the implementation of big data really bring in observable benefits on firm performance remains a critical issue for the top management team. In this study, we investigate the association between big data implementation and the corresponding financial performance, productivity, and market value. Our results demonstrate that big data implementation is positively related to an improvement in financial performance and the market value but such effect is not stronger for first movers. Implications are discussed. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Big data; Firm performance; First mover; IT business value,51,Information Systems Frontiers,2020 675,Ullberg J.; Johnson P.,Empirical assessment of the accuracy of an interoperability prediction language,"Interoperability, defined as the satisfaction of a communication need between two or more actors, is an important aspect in many phases of an enterprise’s development. Mastering the field of interoperability is a daunting task so aid in predicting interoperability can be of great benefit. Formalisms capable of such predictions of future information system architectures are however sparse, and when employed, it is essential that the prediction is accurate. In this paper, a previously proposed interoperability modelling and prediction language is subjected to case testing and evaluated toward interoperability predictions made by practitioners and experts in the field. The results show that although there are some areas not currently covered by the framework, in general, it performs better than the intended users, and would thereby provide additional support in various development and design contexts. © 2016, Springer Science+Business Media New York.",Architecture prediction; Interoperability; Interoperability assessment; Modeling and description languages,1,Information Systems Frontiers,2017 676,El-Alfy E.-S.M.; Mohammed S.; Barradah A.F.,XHQE: A hybrid system for scalable selectivity estimation of XML queries,"With the increasing popularity of XML applications in enterprise and big data systems, the use of efficient query optimizers is becoming very essential. The performance of an XML query optimizer depends heavily on the query selectivity estimators it uses to find the best possible query execution plan. In this work, we propose a novel selectivity estimator which is a hybrid of structural synopsis and statistics, called XHQE. The structural synopsis enhances the accuracy of estimation and the structural statistics makes it scalable to the allocated memory space. The structural synopsis is generated by labeling the nodes of the source XML dataset using a fingerprint function and merging subtrees with similar fingerprints (i.e. having similar structures). The generated structural synopsis and structural statistics are then used to estimate the selectivity of given queries. We studied the performance of the proposed approach using different types of queries and four benchmark datasets with different structural characteristics. We compared XHQE with existing algorithms such as Sampling, TreeSketch and one histogram-based algorithm. The experimental results showed that the XHQE is significantly better than other algorithms in terms of estimation accuracy and scalability for semi-uniform datasets. For non-uniform datasets, the proposed algorithm has comparable estimation accuracy to TreeSketch as the allocated memory size is highly reduced, yet the estimation data generation time of the proposed approach is much lower (e.g., TreeSketch took more than 50 times longer than that of the proposed approach for XMark dataset). Comparing to the histogram-based algorithm, our approach supports regular twig quires in addition to having higher accuracy when both run under similar memory constraints. © 2015, Springer Science+Business Media New York.",Query optimization; Selectivity estimation; Structural synopsis; Twig pattern matching; XML query processing,0,Information Systems Frontiers,2016 677,Chunlin L.; LaYuan L.,Optimal scheduling across public and private clouds in complex hybrid cloud environment,"The hybrid cloud extends the private cloud model by using both local and remote resources. The private cloud will rely on the resources leased from public cloud providers for the execution of private cloud applications. The paper presents optimal scheduling across public and private clouds in complex hybrid cloud environment. The contributions of this paper have three aspects. 1) The proposed hybrid cloud scheduling policy considers the benefits of private cloud applications and public cloud provider, it can adapt to the changes in the system to find the scheduling optimization. The scheduling optimization is decomposed and conducted across the private cloud and public cloud. 2) Secondly, The paper describes negotiations in hybrid cloud marketplace and gives an example to explain how these rules are resolved by the cloud marketplace. 3) Thirdly, the paper proposes an optimal scheduling algorithm across public and private clouds. The paper also describes negotiations in hybrid cloud marketplace and gives an example to explain how these rules are resolved by the cloud marketplace. In the simulations, the profit of public cloud provider and resource utilization of the proposed algorithm are better than other related works. © 2015, Springer Science+Business Media New York.",Hybrid cloud; Private cloud; Public cloud; Scheduling,16,Information Systems Frontiers,2017 678,Mirbabaie M.; Bunker D.; Stieglitz S.; Deubel A.,Who Sets the Tone? Determining the Impact of Convergence Behaviour Archetypes in Social Media Crisis Communication,"Convergence Behaviour Archetypes (CBA) describe the behavioural traits of individuals who spontaneously and collectively move towards emergency situations. If convergence is not managed effectively, unintended crisis management issues may emerge and lead to an exacerbation of the crisis situation. Social media users express different behavioural intentions while converging on a crisis. While these behavioural intentions have been analysed in previous research, an understanding of Convergence Behaviour facilitated by social media use to an effective and smart level of control, is yet to be achieved. Manual content and social network analyses were conducted on our Twitter dataset of the Manchester Bombing 2017 and this analysis identified three dominant convergence behaviour archetypes i.e. the Helpers, the Mourners and the Detectives. These archetypes had the highest crisis communications impact regarding their retweet behaviour. This work provides a better theoretical understanding of Convergence Behaviour archetype influence and impact on crisis communication, for Information Systems research and practice. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Convergence behaviour; Crisis communication; Information systems; Social media; Social network analysis,26,Information Systems Frontiers,2020 679,Albashrawi M.; Motiwalla L.,Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative Perspective,"Over the last decade, bank industry has made a significant investment on mobile banking (MB) as an innovative tool with an expectation that MB services increase customer satisfaction. While the focus has been increasingly on MB adoption, banking research shows more value is generated with frequent and continued usage of MB services, an area that has been given little attention. This study integrates privacy and personalization into TAM theoretical model to address this gap. SEM analysis of a sample of 486 MB customers from a US local bank reveals that perceived usefulness and perceived ease of use are significant predictors of satisfaction, while satisfaction can determine continued usage intention of MB. However, the interaction effect shows statistical significance for privacy, but not for personalization. Limitations and implications for academia and industry are discussed. © 2017, Springer Science+Business Media, LLC, part of Springer Nature.",Continued usage intention; Mobile banking (MB); Personalization; Privacy; TAM,116,Information Systems Frontiers,2019 680,Soui M.; Chouchane M.; Bessghaier N.; Mkaouer M.W.; Kessentini M.,On the Impact of Aesthetic Defects on the Maintainability of Mobile Graphical User Interfaces: An Empirical Study,"As the development of Android mobile applications continues to grow and to follow up its high increase in demand and market share, there is a need for automating the evaluation of Graphical Mobile User Interfaces (GMUI) to detect any associated defects as they are perceived to lead to bad overall usability. Although, there is growth in research targeting the assessment of mobile user interfaces, there is a lack of studies assessing their impact on quality. The goal of this work is to analyze the impact of defects on the maintainability of user interfaces by studying the connection between the existence of defects and the change-proneness of user interfaces. We empirically study the impact of 8 aesthetics defects in 56 releases of 5 Android applications and examine the diffuseness of GMUI defects throughout mobile apps evolution. Then, we investigate whether infected classes are changed more frequently, and have a larger change-size than other non-infected classes in terms of Change Frequency (CF) and Change-Size (CS). Moreover, we studied the survivability and co-occurrences of GMUI defects in order to prioritize their corrections. Our empirical validation confirms that the infected user interfaces are more prone to undergo many changes than other user interfaces, and there are some severe aesthetic defects still exists even after makingmany improvements in the code that may need more maintenance efforts. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Aesthetics defects; Change-size; Correlation; Evolution of Android GMUI,6,Information Systems Frontiers,2022 681,Chandwani R.; De’ R.,Doctor-patient interaction in telemedicine: Logic of choice and logic of care perspectives,"This paper focuses on telemedicine implementation, which can be used to extend modern medical knowledge to remote areas in developing countries. By examining doctor- patient interactions in the context of a telemedicine program in India, we posit how the behaviour of the actors interacting over virtual media is determined by interplay between two dominant institutional logics, namely logic of care and logic of choice. The paper draws on the tenets of institutional logics to extend the theoretical understanding about processes of engagement of actors with a new technology and explicates how the engagement evolves with the use of technology. The research emphasizes the essential role of considering the dynamics of logic of care and logic of choice in the design and implementation process. © 2016, Springer Science+Business Media New York.",Doctor-patient interaction; India; Logic of care; Logic of choice; Qualitative study; Telemedicine,11,Information Systems Frontiers,2017 682,Chang W.-L.; Jung C.-F.,A hybrid approach for personalized service staff recommendation,"In this study, we established a novel set of service procedures that epitomize the human-centered spirit of service. By using self-organizing maps and collaborative filtering recommendation, we developed a mechanism that links the two service procedures of selecting service staff members and how customers decide tip amounts based on perceived value. Through the proposed mechanism, the recommender system could effectively predict customer preferences regarding service staff members and assign suitable members for delivering services. In addition, this study integrated the service experiences of previous customers with local tipping cultures for calculating recommended tip amounts for the reference of customers. Under this mechanism, the customer-centered spirit can be completely integrated into service procedures for effectively enhancing customer satisfaction, increasing the job satisfaction of employees, and producing a virtuous cycle of service quality improvement. © 2015, Springer Science+Business Media New York.",Collaborative filtering; Recommender system; Self-organizing maps,16,Information Systems Frontiers,2017 683,Allal-Chérif O.; Bidan M.; Makhlouf M.,Using serious games to manage knowledge and competencies: The seven-step development process,"This article explores how serious games improve knowledge and competencies management in the context of human resources management. The exploratory research, based on the conceptual framework of the SECI model from Nonaka, analyzes the performances of three serious games developed in 3 different financial companies, from France, USA and India. These three case studies will help to define a 7-step development process of a knowledge and competencies management serious game. The banking sector has interesting characteristics for this study, some of the associated knowledge being both very standardized and also highly heterogeneous. It will be shown that serious games contribute significantly to improve “socialization”, “externalization”, “combination”, and “internalization” of knowledge and that they promote benchmarking throughout the company. © 2016, Springer Science+Business Media New York.",Banking sector; Case study; Competencies; Knowledge management; SECI model; Serious game,15,Information Systems Frontiers,2016 684,Mendon S.; Dutta P.; Behl A.; Lessmann S.,A Hybrid Approach of Machine Learning and Lexicons to Sentiment Analysis: Enhanced Insights from Twitter Data of Natural Disasters,"The success factor of sentimental analysis lies in identifying the most occurring and relevant opinions among users relating to the particular topic. In this paper, we develop a framework to analyze users’ sentiments on Twitter on natural disasters using the data pre-processing techniques and a hybrid of machine learning, statistical modeling, and lexicon-based approach. We choose TF-IDF and K-means for sentiment classification among affinitive and hierarchical clustering. Latent Dirichlet Allocation, a pipeline of Doc2Vec and K-means used to capture themes, then perform multi-level polarity indices classification and its time series analysis. In our study, we draw insights from 243,746 tweets for Kerala’s 2018 natural disasters in India. The key findings of the study are the classification of sentiments based on similarity and polarity indices and identifying themes among the topics discussed on Twitter. We observe different sets of emotions and influencers, among others. Through this case example of Kerala floods, it shows how the government and other organizations could track the positive/negative sentiments concerning time and location; gain a better understanding of the topic of discussion trending among the public, and collaborate with crucial Twitter users/influencers to spread and figure out the gaps in the implementation of schemes in terms of design and execution. This research’s uniqueness is the streamlined and efficient combination of algorithms and techniques embedded in the framework used in achieving the above output, which can be integrated into a platform with GUI for further automation. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",K-means clustering; Latent Dirichlet allocation; Machine learning; Natural disasters; Sentimental analysis; Twitter,92,Information Systems Frontiers,2021 685,Bunnell L.; Osei-Bryson K.-M.; Yoon V.Y.,RecSys Issues Ontology: A Knowledge Classification of Issues for Recommender Systems Researchers,"Scholarly research has extensively examined a number of issues and challenges affecting recommender systems (e.g. ‘cold-start’, ‘scrutability’, ‘trust’, ‘context’, etc.). However, a comprehensive knowledge classification of the issues involved with recommender systems research has yet to be developed. A holistic knowledge representation of the issues affecting a domain is critical for research advancement. The aim of this study is to advance scholarly research within the domain of recommender systems through formal knowledge classification of issues and their relationships to one another within recommender systems research literature. In this study, we employ a rigorous ontology engineering process for development of a recommender system issues ontology. This ontology provides a formal specification of the issues affecting recommender systems research and development. The ontology answers such questions as, “What issues are associated with ‘trust’ in recommender systems research?”, “What are issues associated with improving and evaluating the ‘performance’ of a recommender system?” or “What ‘contextual’ factors might a recommender systems developer wish to consider in order to improve the relevancy and usefulness of recommendations?” Additionally, as an intermediate representation step in the ontology acquisition process, a concept map of recommender systems issues has been developed to provide conceptual visualization of the issues so that researchers may discern broad themes as well as relationships between concepts. These knowledge representations may aid future researchers wishing to take an integrated approach to addressing the challenges and limitations associated with current recommender systems research. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Concept mapping; Ontology acquisition; Recommendation agents; Recommender systems issues; Thematic analysis,12,Information Systems Frontiers,2020 686,Şen D.; Dönmez C.Ç.; Yıldırım U.M.,A Hybrid Bi-level Metaheuristic for Credit Scoring,"This research aims to propose a framework for evaluating credit applications by assigning a binary score to the applicant. The score is targeted to determine whether the credit application is ‘good’ or ‘bad’ in small business purpose loans. Even tiny performance improvements in small businesses may yield a positive impact on the economy as they generate more than 60% of the value. The method presented in this paper hybridizes the Genetic Algorithm (GA) and the Support Vector Machine (SVM) in a bi-level feeding mechanism for increased prediction accuracy. The first level is to determine the parameters of SVM and the second is to find a feature set that increases classification accuracy. To test the proposed approach, we have investigated three different data sets; UCI Australian data set for preliminary works, Lending Club data set for large training and testing, and UCI German and Australian datasets for benchmarking against some other notable methods that use GA. Our computational results show that our proposed method using a feedback mechanism under the hybrid bi-level GA-SVM structure outperforms other classification algorithms in the literature, namely Decision Tree, Random Forests, Logistic Regression, SVM and Artificial Neural Networks, effectively improves the classification accuracy. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Classification; Credit scoring; Feature selection; Genetic algorithm; Support vector machine,15,Information Systems Frontiers,2020 687,Kim J.; Baskerville R.L.; Ding Y.,Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online,"Online social networks (OLSNs) are electronically-based social milieux where individuals gather virtually to socialize. The behavior and characteristics of these networks can provide evidence relevant for detecting and prosecuting policy violations, crimes, terrorist activities, subversive political movements, etc. Some existing methods and tools in the fields of business analytics and digital forensics are useful for such investigations. While the privacy rights of individuals are widely respected, the privacy rights of social groups are less well developed. In the current development of OLSNs and information technologies, the compromise of group privacy may lead to the violation of individual privacy. Adopting an explorative literature review, we examine the privacy kill chain that compromises group privacy as a means to compromise individual privacy. The latter is regulated, while the former is not. We show how the kill chain makes the need for protecting group privacy important and feasible from the perspectives of social, legal, ethical, commercial, and technical perspectives. We propose a research agenda to help societies and organizations strike the proper balance between the benefits and costs of both OLSNs and investigative technologies. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Business intelligence; Digital forensics; Ethics; Information security; Online social network; Privacy,10,Information Systems Frontiers,2020 688,Zimmerling E.; Höflinger P.J.; Sandner P.G.; Welpe I.M.,A system framework for gamified Cost Engineering,"This study develops a system framework and an enterprise IT solution for integrating gamification elements to efficiently implement and continuously perform Cost Engineering. Cost Engineering is a systematic approach to manage knowledge and competencies regarding costs reduction measures throughout the life cycle of products and is technology, resource and time intensive. Gamification as a non-monetary multidimensional incentive system holds great potential to implement and establish Cost Engineering in a novel and less resource demanding manner and stipulate knowledge sharing and dissemination. Building on a review of the relevant literature we conducted 20 interviews with experts from eight companies of the German and Austrian high-tech manufacturing industry to examine the system requirements from an organizational perspective. Analyzing the interviews, we found that companies need a flexible platform where the game elements help to align management objectives with concrete tasks, meet legislative regulations and have different evaluation methods. Our proposed system framework combines the organizational and IT requirements with gamification elements to efficiently steer Cost Engineering methods and best manage knowledge and competencies. © 2016, Springer Science+Business Media New York.",Cost Engineering; Gamification; IT platform; Motivation; System framework,10,Information Systems Frontiers,2016 689,Feldman S.S.; Hikmet N.; Modi S.; Schooley B.,"Impact of Provider Prior Use of HIE on System Complexity, Performance, Patient Care, Quality and System Concerns","To date, most HIE studies have investigated user perceptions of value prior to use. Few studies have assessed factors associated with the value of HIE through its actual use. This study investigates provider perceptions on HIE comparing those who had prior experience vs those who had no experience with it. In so doing, we identify six constructs: prior use, system complexity, system concerns, public/population health, care delivery, and provider performance. This study uses a mixed methods approach to data collection. From 15 interviews of medical community leaders, a survey was constructed and administered to 263 clinicians. Descriptive statistics and analysis of variance was used, along with Tukey HSD tests for multiple comparisons. Results indicated providers whom previously used HIE had more positive perceptions about its benefits in terms of system complexity (p =.001), care delivery (p =.000), population health (p =.003), and provider performance (p =.005); women providers were more positive in terms of system concerns (p =.000); patient care (p =.031), and population health (p =.009); providers age 44–55 were more positive than older and younger groups in terms of patient care (p =.032), population health (p =.021), and provider performance (p =.014); while differences also existed across professional license groups (physician, nurse, other license, admin (no license)) for all five constructs (p <.05); and type of organization setting (hospital, ambulatory clinic, medical office, other) for three constructs including system concerns (p =.017), population health (p =.018), and provider performance (p =.018). There were no statistically significant differences found between groups based on a provider’s role in an organization (patient care, administration, teaching/research, other). Different provider perspectives about the value derived from HIE use exist depending on prior experience with HIE, age, gender, license (physician, nurse, other license, admin (no license)), and type of organization setting (hospital, ambulatory clinic, medical office, other). This study draws from the theory of planned behavior to understand factors related to physicians’ perceptions about HIE value, serving as a departure point for more detailed investigations of provider perceptions and behavior in regard to future HIE use and promoting interoperability. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Clinical informatics; Health information exchange; Medical informatics,10,Information Systems Frontiers,2022 690,Chang W.-L.,The Impact of Emotion: A Blended Model to Estimate Influence on Social Media,"The goal of this research is to devise a model of social influence with sentiment analysis and help organization discover real influential people on social media. This study takes into account the quality of post and sentiment ratio simultaneously. We discovered the meaning of sentiment behind post, retweet, and reply is more important than numbers. This research selected four targets (two politicians and two celebrities) on Twitter to examine the proposed model. The results revealed the sentiment ratio of celebrities is higher than politicians. The reason may be the celebrities posted random issues in daily life and followers all supported them. However, the politicians’ tweets are easy to provoke a conflict which may cause emotional expressions from fans or followers. Sentiment analysis can adjust numbers based on the insights of content. We also provided the h-index to identify high impact of posted topics. The results showed various topics have different impact according to h-index. In summary, the proposed model can appropriately estimate the influence of a person in social media and assist firms allocate marketing resources efficiently. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Sentiment analysis; Social influence; Social media,17,Information Systems Frontiers,2019 691,Kafeza E.; Makris C.; Rompolas G.; Al-Obeidat F.,Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter,"Relationship management has been of strategic importance for businesses that are interested to evaluate the state of the relationship with the customer and if possible to migrate customers to better and more binding states. This work addresses the problem of estimating the relationship state of a customer and examining the migration policy of the customer, using social media analytics. We propose an innovative framework, where clustering, linguistic and emotional analytics are used to automatically assign users to relationship states. Our research is of multi-disciplinary nature, where we are using existing results from surveys on users’ behavior when mitigating states to verify the semantics of our metrics, showing that they follow similar behavior. Our results show that clustering users based on communication, emotions and perceived product mix can result in an automated assignment of users to states. Furthermore, trust, commitment and homophily are defined and our results show that users are migrating states influenced by these values. Our work provides data analytics metrics for businesses that will identify and address the problem of relationship management thus improving the overall users’ satisfaction using a data analytics approach. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Business data processing; Dynamic relationship marketing; Social media analytics,7,Information Systems Frontiers,2021 692,Hbaieb A.; Khemakhem M.; Ben Jemaa M.,Virtual Machine Placement with Disk Anti-colocation Constraints Using Variable Neighborhood Search Heuristic,"In a cloud computing environment, virtual machine placement (VMP) represents an important challenge to select the most suitable set of physical machines (PMs) to host a set of virtual machines (VMs). The challenge is how to find optimal or near-optimal solution effectively and efficiently especially when VMP is considered as a NP-hard problem. However, the existing algorithms have focused mostly on compute resources when provisioning VMs and ignore storage resources. Therefore, they often generate non-optimal compute and storage resources for executing users applications. To address this problem, we outline more in details the binary linear programming (BLP) model previously proposed to solve the consolidated VMP with disk anti-colocation constraint (denoted VMcP-DAC) and we solve it using a heuristic algorithm. Our approach considers a special type of disk anti-colocation requirements to prevent Input/Output (IO) performance bottleneck. We implement a variable neighborhood search based optimization heuristic (denoted VNS-H) to solve the VMcP-DAC by minimizing both the resource wastage and the operational expenditure. To the best of our knowledge, only three studies in the literature that are devoted to VMcP-DAC problem. In two of these three works, authors proposed exact algorithms that are unable to solve large scale VMcP-DAC problem instances. For this reason, in a previous work, we proposed a decomposition based method to overcome the convergence issues for only large scale problems. In the present paper, our goal is to solve VMcP-DAC problem instances suitable for both regular and large data centers. We investigate the effectiveness of the proposed VNS-H, showing that it has a better convergence characteristics and it is more computationally efficient than compared methods from the literature. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Cloud computing; Disk anti-colocation; Resources allocation; Storage virtualization; Variable neighborhood search; Virtual machine placement,2,Information Systems Frontiers,2021 693,Yuan S.-T.D.; Hsieh C.-F.,An impactful crowdsourcing intermediary design - a case of a service imagery crowdsourcing system,"Crowdsourcing is usually implemented using an intermediary organization or directly coordinated by solution seekers. For those using an IT-based crowdsourcing intermediary, the important factors of intermediaries that impact the crowdsourcing outcome are yet unclear. In addition, little research was conducted on how to design a crowdsourcing intermediary that can address the combined challenges of considering different cognitive demand levels of solution providers’ contributions, combining contributions and evaluating contributions. This paper identifies three important factors and provides a novel design of crowdsourcing intermediary to cope with these challenges. This study uses a case that focuses on how to assist small and medium businesses (SMBs) to develop their service imageries in triggering service innovation and designing their service experiences as to fulfill the desired outcomes of customers. Through the case, the benefits of our crowdsourcing intermediary design are demonstrated and justified. The three important factors are the crowdsourcing intermediary knowledge base, generative networks and empowerment of crowd members. This study shows that the crowdsourcing process can facilitate achieving a higher chance of attaining creative solutions for SMBs’ innovation problems when the three factors are well incorporated and managed within the crowdsourcing intermediary design. This study also presents a novel design of crowdsourcing intermediary that can address the combined challenges of coping with different cognitive demand levels of crowd members and combining and evaluating crowd members’ contributions, in order to attain impactful crowdsourcing outcome. © 2016, Springer Science+Business Media New York.",Crowdsourcing intermediary; Information system design; Open innovation; Service imagery; Service value,10,Information Systems Frontiers,2018 694,Miller K.; Mansingh G.,OptiPres: a distributed mobile agent decision support system for optimal patient drug prescription,"Prescribing the right drugs for a patient is a difficult task that takes into consideration several factors. The Institute of Medicine (IOM), U.S.A., has reported based on two major studies (1999–2001 & 2006) that prescribing the wrong medication is a big problem, and the effects can sometimes be fatal. To address this problem, we designed and implemented, a distributed intelligent mobile agent-based system by the name, OptiPres. This system will be used by doctors on their smart phones while prescribing medicines. It will assist them in making more informed decisions by either choosing the optimal solution from processing a repository of past decisions or by presenting a set of possible drugs and using criteria specified by them to identify the optimal drug. The evaluation of OptiPres was done by comparing its recommended outcome of three predefined medical scenarios against the recommendations from a group of doctors and the World Health Organization (WHO) manual entitled:‘Guide to Good Prescribing’. The results indicate that OptiPres is effective in prescribing optimal drugs and in reducing the cognitive burden on doctors, especially in subjective decision making contexts where they have to consider multiple parameters. © 2015, Springer Science+Business Media New York.",Analytic hierarchy process; Case-based reasoning; CPOE; Databases; Decision support systems; Drug prescription; EHR; EMR; Mobile agents,15,Information Systems Frontiers,2017 695,Giannakos M.N.; Mikalef P.; Pappas I.O.,Systematic Literature Review of E-Learning Capabilities to Enhance Organizational Learning,"E-learning systems are receiving ever increasing attention in academia, business and public administration. Major crises, like the pandemic, highlight the tremendous importance of the appropriate development of e-learning systems and its adoption and processes in organizations. Managers and employees who need efficient forms of training and learning flow within organizations do not have to gather in one place at the same time or to travel far away to attend courses. Contemporary affordances of e-learning systems allow users to perform different jobs or tasks for training courses according to their own scheduling, as well as to collaborate and share knowledge and experiences that result in rich learning flows within organizations. The purpose of this article is to provide a systematic review of empirical studies at the intersection of e-learning and organizational learning in order to summarize the current findings and guide future research. Forty-seven peer-reviewed articles were collected from a systematic literature search and analyzed based on a categorization of their main elements. This survey identifies five major directions of the research on the confluence of e-learning and organizational learning during the last decade. Future research should leverage big data produced from the platforms and investigate how the incorporation of advanced learning technologies (e.g., learning analytics, personalized learning) can help increase organizational value. © 2021, The Author(s).",E-learning; Learning environments; Literature review; Organizational learning,82,Information Systems Frontiers,2022 696,Gjøsæter T.; Radianti J.; Chen W.,Universal Design of ICT for Emergency Management from Stakeholders’ Perspective: A Systematic Literature Review,"While Universal Design principles have been adopted in many areas to ensure that products and services are usable for the broadest possible diversity of users, there is still an open area when it comes to the emergency management domain. This article aims at providing a systematic overview of the current state of the emerging research field of Universal Design of Information and Communication Technology (ICT) for Emergency Management, and to highlight high-impact research opportunities to ensure that the increasing introduction of ICT in Emergency Management can contribute to removing barriers instead of adding more barriers, in particular for the elderly and people with disabilities. A systematic review on relevant literature on Universal Design, ICT and Emergency Management between 2008 and 2020 was employed using predefined frameworks, to answer the following questions: (1) Who are the target audiences (stakeholders) in research on Universal Design of ICT in Emergency Management in the different categories of Emergency Management ICT tools, and to what degree is Human-Centred Design and Universal Design taken into account? (2) What are the most important challenges and gaps in research on Universal Design of ICT in Emergency Management? We identify a set of gaps in the literature, indicating that there are some challenges where Universal Design is still limitedly addressed in technology development. We also derive promising future research topics based on areas that are missing in the literature. © 2020, The Author(s).",Accessibility; Emergency Management; Human-Centred Design; Universal Design of ICT,31,Information Systems Frontiers,2021 697,Delamater P.L.,Comment on “A Conceptual Framework for Quality Healthcare Accessibility: a Scalable Approach for Big Data Technologies”,"ᅟFloating Catchment Area (FCA) metrics incorporate the supply of health care resources, potential population demand for those resources, and the distance separating people and supply locations to characterize the spatial accessibility of health care resources for populations. In this work, I challenge a number of assertions offered in a recently published FCA-based paper and provide a critique of the authors' proposed metric. Within my critique, I present a number of broad observations and recommendations regarding FCA metrics and their implementation in a Geographic Information System (GIS). In doing so, I aim to initiate a broader discussion of access to health care, spatial accessibility, and FCA metrics that transcends disciplinary boundaries. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Geographic information systems; Gravity models; Health care accessibility; Health care analytics,3,Information Systems Frontiers,2018 698,Mazurova E.; Standaert W.; Penttinen E.; Tan F.T.C.,Paradoxical Tensions Related to AI-Powered Evaluation Systems in Competitive Sports,"Judging in competitive sports is prone to errors arising from the inherent limitations to humans’ cognitive and sensorial capabilities and from various potential sources of bias that influence judges. Artistic gymnastics offers a case in point: given the complexity of scoring and the ever-increasing speed of athletes’ performance, systems powered by artificial intelligence (AI) seem to promise benefits for the judging process and its outcomes. To characterize today’s human judging process for artistic gymnastics and examine contrasts against an AI-powered system currently being introduced in this context, an in-depth case study analyzed interview data from various stakeholder groups (judges, gymnasts, coaches, federations, technology providers, and fans). This exploratory study unearthed several paradoxical tensions accompanying AI-based evaluations in this setting. The paper identifies and illustrates tensions of this nature related to AI-powered systems’ accuracy, objectivity, explainability, relationship with artistry, interaction with humans, and consistency. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Artistry; Bias; Explainability; Paradoxical tensions; Sports judging,23,Information Systems Frontiers,2022 699,Gonçalves M.J.A.; Rocha Á.; Cota M.P.,Information management model for competencies and learning outcomes in an educational context,"The Bologna Process opened the door to the globalization of higher education, by creating a unified architecture that enhances the potential of higher education and encourages increasing and continuous interconnection among different higher education strategies in the world, and particularly in Europe. This paper introduces and describes an innovative model for a thorough, organized and systematic analysis of the educational context ̶ MICRA (model for identifying and classifying Competencies and Learning Outcomes), based on the official documents of the Course Units (syllabus and assessment components). The MICRA model was validated by means of a case study. Competencies and Learning Outcomes were identified in the Computer Science Course Units of the Accounting and Business Administration degree at the Institute of Accounting and Administration of Porto (ISCAP/IPP). We are aware that the adoption of this model by different institutions will contribute to the interoperability of learning outcomes, thus enhancing the mobility of teachers and students in the EHEA (European Higher Education Area) and third countries. © 2016, Springer Science+Business Media New York.",Bologna; Competencies; Interoperability; Learning outcomes; Semantic web; Syllabus; Topics,36,Information Systems Frontiers,2016 700,Chang V.,Presenting Cloud Business Performance for Manufacturing Organizations,"This paper presents a new concept, Cloud Business Performance (CBP) and describes the method of measurement, data analysis, impacts to manufacturing and case studies about CPB. Three methods can be used for CBP with two case studies illustrated. The first case study presents a small and medium manufacturing enterprise that has adopted backup services for all manufacturing transactions and records. The second case study shows a software manufacturing organization’s forecasting on their business performance and risk. Methods used, results and analysis have been fully justifiable to support the case of CBP for manufacturing organizations. We demonstrate that the use of CBP calculation and prediction analysis is useful for manufacturing organizations that adopt Cloud Computing. © 2017, Springer Science+Business Media, LLC.",CBP case studies; Cloud business performance (CBP) for manufacturing organizations; Cloud Computing manufacturing adoption; Organizational Sustainability Modeling (OSM),22,Information Systems Frontiers,2020 701,Lagos N.; Riga M.; Mitzias P.; Vion-Dury J.-Y.; Kontopoulos E.; Waddington S.; Laurenson P.; Meditskos G.; Kompatsiaris I.,Dependency modelling for inconsistency management in Digital Preservation – The PERICLES approach,"The rise of the Semantic Web has provided cultural heritage researchers and practitioners with several tools for providing semantically rich representations and interoperability of cultural heritage collections. Although indeed offering a lot of advantages, these tools, which come mostly in the form of ontologies and related vocabularies, do not provide a conceptual model for capturing contextual and environmental dependencies, contributing to long-term digital preservation. This paper presents one of the key outcomes of the PERICLES FP7 project, the Linked Resource Model, for modelling dependencies as a set of evolving linked resources. The adoption of the proposed model and the consistency of its representation are evaluated via a specific instantiation involving the domain of digital video art. © 2016, Springer Science+Business Media New York.",Dependency; Digital preservation; Digital video art; Inconsistency detection; LRM; Ontology; SPIN rules,3,Information Systems Frontiers,2018 702,Parthiban R.; Qureshi I.; Bandyopadhyay S.; Bhatt B.; Jaikumar S.,Leveraging ICT to Overcome Complementary Institutional Voids: Insights from Institutional Work by a Social Enterprise to Help Marginalized,"There is, in general, a dearth of empirical inquiries on how institutional voids are filled through institutional work in marginalized communities. Extant studies have focussed on institutional work that addresses solitary institutional void, mostly in formal settings. In this paper, we inquire the case of a social entrepreneurial venture in India that identified two complementary institutional voids (productive ageing void of the urban elderly and rural education void of children) and attempted to simultaneously address the two voids. The issue of physical distance between the two groups was overcome by enacting an ICT platform. We also show how the institutional challenges associated with the ICT implementation led them to pursue different kinds of institutional works in their context. We then identify different theoretical dimensions of institutional works that could be used in marginalized contexts. Finally, we show how the ‘complementary voids’ approach has implications for both theory and practice. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Digital social innovation; Marginalized communities; Productive ageing void; Rural education void,77,Information Systems Frontiers,2020 703,Awal G.K.; Bharadwaj K.K.,Leveraging collective intelligence for behavioral prediction in signed social networks through evolutionary approach,"The proliferation of the social Web due to increased user participation poses a challenge as well as presents an opportunity to examine the collective behavior of users for various business applications. In this work, we leverage the collective knowledge embedded in the social relationships of users on the network to predict user preferences and future behavior. We extract social dimensions in the form of overlapping communities that capture the behavioral heterogeneity in directed and signed social networks. We present an extension of signed modularity, namely Structural Balance Modularity (SBM). We first propose a metric Structural Balance Index (SBI) that determines users’ degrees of affiliation towards various communities by harnessing the concept of the generalized theory of structural balance. We then incorporate SBI into the signed modularity to define SBM. It takes into account the density as well as the sign (positive or negative) of the links between users on the network. A genetic algorithm is developed that optimizes the SBM, thereby maximizing positive intra-community connections and negative inter-community connections. The discovered latent overlapping communities represent affiliations of users with similar preferences and mutual trust relationships captured by the signs of connections exerting differential effects on users’ behaviors. Thereafter, we ascertain which communities are relevant for a targeted behavior by using discriminative learning. The computational experiments are performed on Epinions real-world dataset, and the results clearly demonstrate the effectiveness and efficacy of our proposed approach. © 2017, Springer Science+Business Media New York.",Collective behavior prediction; Collective intelligence; Community detection; Genetic algorithm; Signed social networks; Structural balance,16,Information Systems Frontiers,2019 704,Erskine M.A.; Gregg D.G.; Karimi J.; Scott J.E.,Individual Decision-Performance Using Spatial Decision Support Systems: A Geospatial Reasoning Ability and Perceived Task-Technology Fit Perspective,"Increasingly, spatial decision support systems (SDSS) help consumers, businesses and governmental entities make decisions involving geospatial data. Understanding if, and how, user- and task-characteristics impact decision-performance will allow developers of SDSS to maximize decision-making performance. Furthermore, scholars can benefit from a more comprehensive understanding of what specific characteristics influence decision-making when using an SDSS. This paper provides a synthesis of relevant research and presents a two-factor experiment (n = 200) designed to measure the impact of user- and task-characteristics on decision-performance. Using Cognitive Fit Theory (CFT) as the theoretical framework, we investigate the effect of geospatial reasoning ability (GRA), input complexity, task complexity, and user perceptions of task-technology fit (PTTF), on geospatial decision-making performance. Specifically, we measure GRA as a user-characteristic, while input- and problem-complexity are measured as task-characteristics. A partial least squares (PLS) analysis reveals the statistical significance of user- and task-characteristics on geospatial decision-making performance. Theoretical and managerial implications are discussed in detail. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Cognitive fit theory; Decision-performance; Geospatial reasoning ability; Maps; Perceived task-technology fit; Spatial decision support system; Task-characteristics; User-characteristics,26,Information Systems Frontiers,2019 705,Appio F.P.; Cimino M.G.C.A.; Lazzeri A.; Martini A.; Vaglini G.,Fostering distributed business logic in Open Collaborative Networks: an integrated approach based on semantic and swarm coordination,"Given the great opportunities provided by Open Collaborative Networks (OCNs), their success depends on the effective integration of composite business logic at all stages. However, a dilemma between cooperation and competition is often found in environments where the access to business knowledge can provide absolute advantages over the competition. Indeed, although it is apparent that business logic should be automated for an effective integration, chain participants at all segments are often highly protective of their own knowledge. In this paper, we propose a solution to this problem by outlining a novel approach with a supporting architectural view. In our approach, business rules are modeled via semantic web and their execution is coordinated by a workflow model. Each company’s rule can be kept as private, and the business rules can be combined together to achieve goals with defined interdependencies and responsibilities in the workflow. The use of a workflow model allows assembling business facts together while protecting data source. We propose a privacy-preserving perturbation technique which is based on digital stigmergy. Stigmergy is a processing schema based on the principle of self-aggregation of marks produced by data. Stigmergy allows protecting data privacy, because only marks are involved in aggregation, in place of actual data values, without explicit data modeling. This paper discusses the proposed approach and examines its characteristics through actual scenarios. © 2016, Springer Science+Business Media New York.",Business rule; Data perturbation; Open Collaborative Network; Stigmergy; Web ontology; Workflow,6,Information Systems Frontiers,2018 706,Chin A.G.; Harris M.A.; Brookshire R.,An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework,"The purpose of this research is to assess the impact of trust, when balanced with risk and benefit, on consumer intention to adopt mobile payment systems. A research model is created to assess intent based on perceived trust, along with three antecedents – privacy, security, and familiarity – and packaged with an extended valence framework that takes into account the opposing notions of perceived risk and perceived benefit. Following a pilot study of 76 participants, data is collected from a survey of 234 respondents and is analyzed using consistent Partial Least Squares (PLSc). Results indicate that perceived benefit and perceived trust are the most important influences on the intention to use mobile payment systems, and that the perceived risk of using mobile payment systems has little or no impact on intention to use. The risk result is explained by motivational avoidance theory and institutional dependence. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Mobile payment; Risk; Trust; Valence framework,93,Information Systems Frontiers,2022 707,Ezhei M.; Tork Ladani B.,Interdependency Analysis in Security Investment against Strategic Attacks,"Information security investment is of high importance in management of IT infrastructure. There are many researches focused on game theoretical modeling and analysis of security investment of interdependent firms against potential security attacks. However, these studies usually are not concerned with dynamic and strategic nature of attacks which are increasingly important features of today’s cyber systems. Strategic attackers are those who are able to substitute their investments among targets over time by shifting investments towards poorly protected targets in order to obtain more potential financial gains. In this paper we try to analyze the effects of interdependency in security investment of firms against strategic attackers. Note that although there are a limited number of works that consider the strategic nature of attack, they model the defenders as a set of isolated nodes. Hence the positive externality caused by interconnection of the firms is not considered in these models. We consider both the attackers’ actual strategic behaviors (that causes negative externality via the possibility of substituting the target) as well as structural effects of the networked firms (that leads to positive externality via attack propagation). We propose a differential game among the networked firms in which attackers act strategically. In the proposed game, by employing a linear substitution model for characterizing the process of target selection by the attacker, the open-loop Nash solutions are highlighted in an analytical form. The analytical results show how interconnectivity between firms and the strategic behavior of the attacker determines the firms’ incentives for security investment. It is shown that overinvestment or underinvestment could occur depending on the degree of interdependency among the given firms. Accordingly we designed mechanisms to encourage the firms to invest at a socially optimal level. The achieved results in this paper helps security designers to better formulate their policies in tackling strategic attackers. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Differential game; Interdependency; Security investment; Strategic attack,27,Information Systems Frontiers,2020 708,Griva A.; Bardaki C.; Pramatari K.; Doukidis G.,Factors Affecting Customer Analytics: Evidence from Three Retail Cases,"The abundance of customer behavioral data alters the design and application of customer analytics systems and approaches. Segmentation is a common customer analytics practice, but researchers highlight that traditional segmentation approaches are not enough. We coin the term “visit segmentation” and devise a visit segmentation approach. When designing or applying a new information system or approach, it is important to consider factors related to the input data, the application context, the users, and all the relevant requirements. Considering the literature, this paper identifies such factors that affect customer analytics approaches and systems. We explore how these factors affect segmentation through applying our segmentation approach to three heterogeneous retailers, e.g., the products’ variety a shopper purchases in each visit seems to be crucial to the segmentation. The more attention data analysts and designers pay to these factors, the more reliable segmentation results they will get and, thus, improved retail decisions are expected. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Business analytics; Customer analytics; Customer behavior; Customer segmentation; Retail analytics; Visit segmentation,15,Information Systems Frontiers,2022 709,Wang X.; Sun J.; Wang Y.; Liu Y.,Deepen electronic health record diffusion beyond breadth: game changers and decision drivers,"Cloud computing, financial incentive and patient-centered care are the game changers that deepen EHR diffusion beyond breadth. Based on the innovation diffusion theory (IDT), technology-organization-environment (TOE) framework and alignment literature, this study examines how these changes shape business requirement, service value and society need that drive different phases of EHR diffusion in terms of planning, adoption, usage and upgrade. A longitudinal analysis with the USA National Ambulatory Medical Care Survey (NAMCS) reveals the impacts of different drivers on EHR diffusion. In addition to quantitative results, interview observations corroborate the relationships among game changers, decision drivers and EHR diffusion. The findings provide healthcare providers, system vendors and policy-makers the insights on the best practices of promoting EHR diffusion for long-term success. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Business requirement; Cloud computing; Financial incentive; Longitudinal analysis; Service value; Society need,10,Information Systems Frontiers,2022 710,Lukyanenko R.; Wiggins A.; Rosser H.K.,Citizen Science: An Information Quality Research Frontier,"The rapid proliferation of online content producing and sharing technologies resulted in an explosion of user-generated content (UGC), which now extends to scientific data. Citizen science, in which ordinary people contribute information for scientific research, epitomizes UGC. Citizen science projects are typically open to everyone, engage diverse audiences, and challenge ordinary people to produce data of highest quality to be usable in science. This also makes citizen science a very exciting area to study both traditional and innovative approaches to information quality management. With this paper we position citizen science as a leading information quality research frontier. We also show how citizen science opens a unique opportunity for the information systems community to contribute to a broad range of disciplines in natural and social sciences and humanities. © 2019, The Author(s).",Citizen science; Crowdsourcing; Data quality; Humanities; Information quality; Information systems; Science,81,Information Systems Frontiers,2020 711,Ahn J.; Ma K.; Lee O.; Sura S.,Do big data support TV viewing rate forecasting? A case study of a Korean TV drama,"This study focuses on big data, including data from social networking sites (SNS), and data that can complement prior researches on TV viewing rate prediction. The paper analyzes the variables, which influence the average minute rating (AMR) and share rating (SHR) through regression analysis after gathering buzz data on a 20-episode drama series in Korea. The R-square value of regression analysis results shows that the consumer-generated media (CGM) variable including SNS items explained 64 % of both AMR and SHR. However, the Media variable is not statistically significant. For SNS items, the Korean SNS me2DAY and DaumYozm are statistically significant for AMR and SHR, but Twitter is not significant. This study contributes to practitioners’ ability to alleviate the hurdles of broadcasting production communities on the difficulty of predicting viewing rate in advance. Thus, it is possible to determine whether to invest production cost persistently or to adjust the broadcasting volume based on viewers’ response. © 2016, Springer Science+Business Media New York.",AMR; Big data; CGM; SHR; SNS; TV rating,9,Information Systems Frontiers,2017 712,Zhang J.; Piramuthu S.,Product recommendation with latent review topics,"Online customer reviews complement information from product and service providers. While the latter is directly from the source of the product and/or service, the former is generally from users of these products and/or services. Clearly, these two information sets are generated from different perspectives with possibly different sets of intentions. For a prospective customer, both these perspectives together provide a complementary set of information and support their purchase decisions. Given the different perspective and incentive structure, the information from these two source sets tends to be necessarily biased, clearly with the high probability of negative information omission from that provided by the product/service providers. Moreover, customers oftentimes face information overload during their attempts at deciphering existing online customer reviews. We attempt to alleviate this through mining hidden information in online customer reviews. We use a variant of the Latent Dirichlet Allocation (LDA) model and clustering to generate equivalent options that the customer could then use in their purchase decisions. We illustrate this using online hotel review data. © 2016, Springer Science+Business Media New York.",Hidden information; Latent Dirichlet Allocation; Online reviews,41,Information Systems Frontiers,2018 713,Singh P.; Dwivedi Y.K.; Kahlon K.S.; Sawhney R.S.; Alalwan A.A.; Rana N.P.,Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing,"The governments, nowadays, throughout the world are increasingly becoming dependent on public opinion regarding the framing and implementation of certain policies for the welfare of the general public. The role of social media is vital to this emerging trend. Traditionally, lack of public participation in various policy making decision used to be a major cause of concern particularly when formulating and evaluating such policies. However, the exponential rise in usage of social media platforms by general public has given the government a wider insight to overcome this long pending dilemma. Cloud-based e-governance is currently being realized due to IT infrastructure availability along with mindset changes of government advisors towards realizing the various policies in a best possible manner. This paper presents a pragmatic approach that combines the capabilities of both cloud computing and social media analytics towards efficient monitoring and controlling of governmental policies through public involvement. The proposed system has provided us some encouraging results, when tested for Goods and Services Tax (GST) implementation by Indian government and established that it can be successfully implemented for efficient policy making and implementation. © 2019, The Author(s).",Cloud computing; E-government; GST; Sentiment analysis; Social media analytics; Twitter,102,Information Systems Frontiers,2020 714,Truică C.-O.; Apostol E.-S.; Darmont J.; Assent I.,TextBenDS: a Generic Textual Data Benchmark for Distributed Systems,"Extracting top-k keywords and documents using weighting schemes are popular techniques employed in text mining and machine learning for different analysis and retrieval tasks. The weights are usually computed in the data preprocessing step, as they are costly to update and keep track of all the modifications performed on the dataset. Furthermore, calculation errors are introduced when analyzing only subsets of the dataset, i.e., wrong weighting are computed as weighting schemes use the number of documents for scoring keywords and documents. Therefore, in a Big Data context, it is crucial to lower the runtime of computing weighting schemes, without hindering the analysis process and the accuracy of the machine learning algorithms. To address this requirement for the task of computing top-k keywords and documents (which largely relies on weighting schemes), it is customary to design benchmarks that compare weighting schemes within various configurations of distributedframeworks and database management systems. Thus, we propose TextBenDS - a generic document-oriented benchmark for storing textual data and constructing weighting schemes. Our benchmark offers a generic data model designed with a multidimensional approach for storing text documents. We also propose using aggregation queries with various complexities and selectivities for constructing term weighting schemes, that are utilized in extracting top-k keywords and documents. We evaluate the computing performance of the queries on several distributed environments set within the Apache Hadoop ecosystem. Our experimental results provide interesting insights. As an example, MongoDB shows the best overall performance, while Spark’s execution time remains almost constant regardless of weighting schemes. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Benchmark; Distributed DBMSs; Distributed frameworks; Top-k documents; Top-k keywords; Weighting schemes,14,Information Systems Frontiers,2021 715,Francia M.; Marcel P.; Peralta V.; Rizzi S.,Enhancing Cubes with Models to Describe Multidimensional Data,"The Intentional Analytics Model (IAM) has been recently envisioned as a new paradigm to couple OLAP and analytics. It relies on two basic ideas: (i) letting the user explore data by expressing her analysis intentions rather than the data she needs, and (ii) returning enhanced cubes, i.e., multidimensional data annotated with knowledge insights in the form of interesting model components (e.g., clusters). In this paper we contribute to give a proof-of-concept for the IAM vision by delivering an end-to-end implementation of describe, one of the five intention operators introduced by IAM. Among the research challenges left open in IAM, those we address are (i) automatically tuning the size of models (e.g., the number of clusters), (ii) devising a measure to estimate the interestingness of model components, (iii) selecting the most effective chart or graph for visualizing each enhanced cube depending on its features, and (iv) devising a visual metaphor to display enhanced cubes and interact with them. We assess the validity of our approach in terms of user effort for formulating intentions, effectiveness, efficiency, and scalability. © 2021, The Author(s).",Data exploration; Models; Multidimensional data; OLAP,18,Information Systems Frontiers,2022 716,Aghakhani N.; Oh O.; Gregg D.G.; Karimi J.,Online Review Consistency Matters: An Elaboration Likelihood Model Perspective,"To date, online review usefulness studies have explored the independent influence of central and peripheral cues on online review usefulness. Employing the Elaboration Likelihood Model (ELM), however, we argue that central and peripheral cues are jointly, not independently, processed by online users. For this exploration, we develop and measure “review consistency” variable (i.e., level of consistency between a review text and its attendant review rating), and rating inconsistency (i.e., level of inconsistency between a review rating and the average rating). We find a positive effect of review consistency on the review usefulness. Contrary to our hypothesis, however, we find a positive effect of rating inconsistency on the review usefulness. Our results also indicate that the contingency effect of rating inconsistency on the relationship between review consistency and review usefulness. Particularly, we find that rating inconsistency negatively moderates the effect of review consistency on the review usefulness. The theoretical and practical implications of the findings are discussed. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",E-word of mouth; Machine learning; Online reviews; Review consistency; Review helpfulness; Text mining,130,Information Systems Frontiers,2021 717,Kim J.U.; Kishore R.,Do we Fully Understand Information Systems Failure? An Exploratory Study of the Cognitive Schema of IS Professionals,"Knowledge about the cognitive schema of IS professionals with respect to IS failure is crucial but lacking in the IS literature. To fill this gap, we conducted an exploratory study in which 86 experienced IS professionals categorized a comprehensive set of 70 IS failure risk items into failure clusters that they ranked in the order of their expected organizational impact. These data were analyzed using the MDSORT procedure. Findings indicate that IS professionals do not treat causes and effects as separate failure constructs but rather combine a set of related causes and effect into a single IS failure rule. Through successive refinement, a stable, reliable, and parsimonious IS failure rule schema was developed that consists of six IS failure rules. We also developed specific change agent behaviors that IS professionals can enact, or expect to be enacted by relevant other IS professionals, with respect to each of the six IS failure rules to mitigate failure risk and reduce IS failure. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Cognitive schema; Information systems failure; Information systems success; IS failure rule schema; IS professionals; MDSORT analysis,15,Information Systems Frontiers,2019 718,Yuan S.-T.D.; Hsu S.-T.,Enhancing service system design: An entity interaction pattern approach,"The notion of system thinking and the Industrial Marketing and Purchasing Group (IMP)’s findings have been emphasizing that “interaction is the basis analysis unit” of service systems or enterprises. Service system design is an attempt to change the outcome of a service ecosystem and make it more innovative in terms of figuring out not only who those entities are and what their outcomes are, but more importantly how they interact to realize their service values. The design of a service system could accordingly be viewed as changes made to the interactions. In the paper, system entity interactions are classified into patterns to become more analyzable, and different patterns can serve as measurements and guidelines for enterprises to follow and use to gain higher service value. To justify the important role of interaction in the service value creating process, a particular information system is developed and evaluated to explore the benefits of using interaction patterns for enterprise users to create their service values. © 2015, Springer Science+Business Media New York.",Alliance strategy; Interaction pattern; Service innovation; Service system design; System thinking,5,Information Systems Frontiers,2017 719,Bernaert M.; Poels G.; Snoeck M.; De Backer M.,CHOOSE: Towards a metamodel for enterprise architecture in small and medium-sized enterprises,"Enterprise architecture (EA) is a coherent whole of principles, methods, and models that are used in the design and realization of an enterprise’s organizational structure, business processes, information systems, and IT infrastructure. Recent research indicates the need for EA in small and medium-sized enterprises (SMEs), important drivers of the economy, as they struggle with problems related to a lack of structure and overview of their business. However, existing EA frameworks are perceived as too complex and, to date, none of the EA approaches are sufficiently adapted to the SME context. Therefore, this paper presents the CHOOSE metamodel for EA in SMEs that was developed and evaluated through action research in an SME and further refined and validated through case study research in five other SMEs. This metamodel is based on the essential dimensions of EA frameworks and is kept simple so that it may be applied in an SME context. The final CHOOSE metamodel includes only four essential concepts (i.e. goal, actor, operation, object), one for each most frequently used EA focus. As an example, an extract is included from the specific model that was created for the SME used in our action research. Finally, the CHOOSE metamodel is evaluated according to the dimensions essential in EA and the requirements for EA in an SME context. © 2015, Springer Science+Business Media New York.",CHOOSE; Enterprise architecture; Metamodel; Small and medium-sized enterprises,30,Information Systems Frontiers,2016 720,Ali O.; Shrestha A.; Ghasemaghaei M.; Beydoun G.,Assessment of Complexity in Cloud Computing Adoption: a Case Study of Local Governments in Australia,"This research paper assesses complexity in cloud computing adoption, using the context of the local government sector in Australia. The research utilized both cloud computing adoption literature and an Information Systems Complexity Framework to propose a complexity assessment model for cloud computing adoption. A mixed method approach was used in this research. Firstly, we conducted 21 indepth interviews with IT managers in the local governments in Australia to obtain their insights into the complexity of cloud computing adoption. Secondly, a quantitative method is used in which 480 IT staff from 47 local governments responded to an online survey to validate the proposed assessment model. The findings indicate that structural complexity of an organization (i.e., knowledge management), structural complexity of technology (i.e., technology interoperability, and data processing capability), dynamic complexity of an organization (i.e., business operations), and dynamic complexity of technology (i.e., systems integration, IT infrastructure update, and customization resources) are critical complexity aspects to be considered during cloud computing adoption. These findings provide important implications for both researchers and managers that are trying to understand the complexities involved in cloud computing adoption. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Cloud computing; Complexity; Information Systems Complexity Framework; Local government; Technology adoption,35,Information Systems Frontiers,2022 721,Mouzakitis S.; Papaspyros D.; Petychakis M.; Koussouris S.; Zafeiropoulos A.; Fotopoulou E.; Farid L.; Orlandi F.; Attard J.; Psarras J.,Challenges and opportunities in renovating public sector information by enabling linked data and analytics,"Linked Data has become the current W3C recommended approach for publishing data on the World Wide Web as it is sharable, extensible, and easily re-usable. An ecosystem of linked data hubs in the Public Sector has the potential to offer significant benefits to its consumers (other public offices and ministries, as well as researchers, citizens and SMEs), such as increased accessibility and re-use value of their data through the use of web-scale identifiers and easy interlinking with datasets of other public data providers. The power and flexibility of the schema-defying Linked Data, however, is counterbalanced by inborn factors that diminish the potential for cost-effective and efficient adoption by the Public Sector. The paper analyzes these challenges in view of the current state-of-the-art in linked data technologies and proposes a technical framework that aims to hide the underlying complexity of linked data while maintaining and promoting the interlinking capabilities enabled by the Linked Data Paradigm. The paper presents the innovations behind our proposed solutions as well as their advantages, especially for the non-expert users. © 2016, Springer Science+Business Media New York.",Analytics; Linked data; Open data; Public sector information; RDF,28,Information Systems Frontiers,2017 722,Kuko M.; Pourhomayoun M.,Single and Clustered Cervical Cell Classification with Ensemble and Deep Learning Methods,"Cervical cancer if detected early has an upward of 89% survival rate. The leading tool in identifying cervical cancer in its infancy is the Papanicolaou (Pap smear) test, which since its introduction dropped cervical cancer related deaths by 60%. The Pap smear test or Liquid-based Cytology (LBC) is a time-consuming procedure that requires a pathologist to manually identify cervical cells that may be in the middle of the processes that indicate cervical cancer. Unfortunately, due to the expenses related to conducting the Pap smear test many women are blocked from access to it and this leads to over 4000 women dying annually from cervical cancer in the United States alone. The aim of this research is to automate the methods used by pathologists in conducting the Pap smear or LBC. We show that using machine vision, ensemble learning and deep learning methods a significant portion of the Pap smear can be done automated. We set out to extract cells and cell clusters and classify those samples based on the Bethesda System for reporting cervical cytology. Achieving an accuracy of 90.4% and 91.6% for the ensemble learning and deep learning methods respectively when evaluated with a five-fold cross-validation demonstrates promise in the creation of an automated Pap smear screening test. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Cervical cancer; Cervical cytology; Convolutional neural networks; Deep learning; Ensemble learning; Liquid-based cytology; Machine learning; Machine vision; Pap smear; Unsupervised clustering,37,Information Systems Frontiers,2020 723,Rzepka C.; Berger B.; Hess T.,Voice Assistant vs. Chatbot – Examining the Fit Between Conversational Agents’ Interaction Modalities and Information Search Tasks,"Owing to technological advancements in artificial intelligence, voice assistants (VAs) offer speech as a new interaction modality. Compared to text-based interaction, speech is natural and intuitive, which is why companies use VAs in customer service. However, we do not yet know for which kinds of tasks speech is beneficial. Drawing on task-technology fit theory, we present a research model to examine the applicability of VAs to different tasks. To test this model, we conducted a laboratory experiment with 116 participants who had to complete an information search task with a VA or a chatbot. The results show that speech exhibits higher perceived efficiency, lower cognitive effort, higher enjoyment, and higher service satisfaction than text-based interaction. We also find that these effects depend on the task’s goal-directedness. These findings extend task-technology fit theory to customers’ choice of interaction modalities and inform practitioners about the use of VAs for information search tasks. © 2021, The Author(s).",cognitive fit; conversational agent; customer service; speech interaction; voice assistant,114,Information Systems Frontiers,2022 724,Miaoui Y.; Boudriga N.,Enterprise security investment through time when facing different types of vulnerabilities,"We propose in this work to use the utility theory to compute the optimal security investment over an investment horizon, considering the typologies and dynamic aspects of vulnerabilities related to the assets of a firm. A regression over a 17-year statistics available in the National Vulnerability Database is performed to predict and forecast the evolution of vulnerabilities’ rates over the investment horizon. Techniques and methodologies are proposed to compute and plan investment tranches over the whole time-horizon, while coping with budget constraints. An analysis is conducted to assess the variation of the optimal investments and the residual risk, taking into account the attitude of decision-makers towards risk. The obtained results show that : a) the optimal amount of investment in information security necessary to counter located attacks increases with the investment horizon for all types of vulnerabilities, but such an increase highly depends on the type of vulnerabilities affecting the firm; b) differently to located attacks, the optimal amount of investment in information security necessary to counter distributed attacks does not always increase with the investment horizon; and c) the optimal amount to invest in security, and the optimum value of the residual risk depend on the decision-maker attitude towards security risk. © 2017, Springer Science+Business Media New York.",Economics of security; Information security; Optimal investment; Security threats and vulnerabilities; Utility theory,20,Information Systems Frontiers,2019 725,Ferrettini G.; Escriva E.; Aligon J.; Excoffier J.-B.; Soulé-Dupuy C.,Coalitional Strategies for Efficient Individual Prediction Explanation,"As Machine Learning (ML) is now widely applied in many domains, in both research and industry, an understanding of what is happening inside the black box is becoming a growing demand, especially by non-experts of these models. Several approaches had thus been developed to provide clear insights of a model prediction for a particular observation but at the cost of long computation time or restrictive hypothesis that does not fully take into account interaction between attributes. This paper provides methods based on the detection of relevant groups of attributes -named coalitions- influencing a prediction and compares them with the literature. Our results show that these coalitional methods are more efficient than existing ones such as SHapley Additive exPlanation (SHAP). Computation time is shortened while preserving an acceptable accuracy of individual prediction explanations. Therefore, this enables wider practical use of explanation methods to increase trust between developed ML models, end-users, and whoever impacted by any decision where these models played a role. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Data analysis; Explainable Artificial Intelligence (XAI); Interpretability; Machine learning; Prediction explanation,19,Information Systems Frontiers,2022 726,Wang X.; Wang L.; Zhang L.; Xu X.; Zhang W.; Xu Y.,Developing an employee turnover risk evaluation model using case-based reasoning,"All enterprises are concerned with employee turnover risk due to the significant impact on their effectiveness and competitiveness. Evaluation of the risk is a frequent topic in the literature. However, the majority of past work has not incorporated the advancement of modern information technology, particularly in the era of Internet of Things (IoT). In this paper, we propose to use an artificial intelligence method, case-based reasoning (CBR), to develop a multi-level employee turnover risk evaluation model. The proposed model adopts multiple CBR techniques including case representation, organization and management, and retrieval and matching to evaluate employee turnover risk. Specifically, we employ an object-oriented method in case knowledge expressing, utilize relational database in case organization and management, and follow a tree-hash algorithm to retrieve the best cases. Both theoretical and practical implications of the proposed model are discussed. © 2015, Springer Science+Business Media New York.",Case-based reasoning (CBR); Employee turnover risk; IoT,17,Information Systems Frontiers,2017 727,Muhammad S.S.; Dey B.L.; Weerakkody V.,Analysis of Factors that Influence Customers’ Willingness to Leave Big Data Digital Footprints on Social Media: A Systematic Review of Literature,"Big data has been discussed extensively in existing scholarly works but scant consideration is given to customers’ willingness to generate and leave big data digital footprints on social media, especially in the light of the profusely debated issue of privacy and security. The current paper endeavours to address this gap in the literature by developing a conceptual framework. In doing so, this paper conducts a systematic review of extant literature from 2002 to 2017 to identify and analyse the underlying factors that influence customers’ willingness to leave digital footprints on social media. The findings of this review reveal that personal behaviour (intrinsic psychological dispositions), technological factors (relative advantage and convenience), social influence (social interaction, social ties and social support) and privacy and security (risk, control and trust) are the key factors that influence customers’ willingness to generate and leave big data digital footprints on social media. The conceptual framework presented in this paper advances the scholarship of technology adoption and use and provides useful direction for future empirical research for both academics and practitioners. © 2017, Springer Science+Business Media, LLC.",Big data digital footprint; Personal behaviour; Privacy and security; Social influence; Social media; Technology,89,Information Systems Frontiers,2018 728,Ju J.; Liu L.; Feng Y.,Design of an O2O Citizen Participation Ecosystem for Sustainable Governance,"Citizen participation is essential to create the public value required for sustainable governance. Offline citizen participation enables government policies through physical actions, but is not automatically quantified. Online citizen participation, especially the opinion expression, usually be facilitated by suitable incentives using a recorded participation process, but this makes only limited contribution to governance. The isolation of the processes of two participations limits their mutual promotion. Therefore, using a design science paradigm, we designed an O2O (Offline-to-Online or Online-to-Offline) citizen participation ecosystem for sustainable governance based on social exchange theory. The ecosystem includes three categories of key stakeholders: citizens, government organizations, and the O2O platform manager. Five components are specified: motivations, contextualized governance policies and strategies, offline/online citizen-to-government contributions, online/offline government-to-citizen rewards, and retention and recommendation. The ecosystem was evaluated and then improved using a case study on O2O green commuting governance in China. This study provides a reproducible framework to combine offline and online citizen participation to enhance collaborative social governance in the digital age. © Springer Science+Business Media, LLC, part of Springer Nature 2019.",Citizen participation; Design science; O2O; Social exchange; Sustainable governance,25,Information Systems Frontiers,2019 729,Jahanbanifar A.; Khendek F.; Toeroe M.,Semantic weaving of configuration fragments into a consistent system configuration,"Configuration fragments developed separately and focusing on different aspects, such as availability, security or performance of a system need to be integrated into a consistent system configuration to avoid system malfunctions. The main challenges of such integration are due to the overlapping entities and the integration relations between the entities of the different configuration fragments. In this paper we propose a model based approach for a consistent integration of configuration fragments into a system configuration. We use and extend the model weaving technique to capture the semantics of the relations between the entities of the configuration fragments. Moreover, we generate automatically the constraints corresponding to these semantic relations to complete the target system configuration profile. These constraints can be used to guard the configuration consistency during runtime modifications. © 2016, Springer Science+Business Media New York.",Availability; Configuration fragments; Consistency; Constraints; Model integration; Model weaving,3,Information Systems Frontiers,2016 730,Carpenter D.; McLeod A.; Hicks C.; Maasberg M.,Privacy and biometrics: An empirical examination of employee concerns,"Advances in authentication technology have led to a proliferation of biometric-based systems in the workplace. Although biometric technologies offer organizations a cost-effective method of increasing security, employees are often hesitant to permit use. The collection and storage of employee biometric data raises concerns about proper use of these intensely personal identifiers. This work draws from organizational privacy practices, electronic monitoring, procedural fairness, self-construal, and technology adoption theories. We investigate the effects of independent and interdependent self-construal on three newly developed dimensions of employee privacy concern related to organizational use of biometric technology. These dimensions include perceived accountability, perceived vulnerability, and perceived distrust toward the organization. We test the predictive power of our model using data from an organization deploying a new biometric system designed to track employee work assignments under the auspices of improving personnel safety. Results indicate that self-construal plays a significant role in the formulation of privacy concerns and both perceived accountability concerns and perceived vulnerability concerns are significant predictors of attitude toward using biometric technology in the workplace. © 2016, Springer Science+Business Media New York.",Biometric technology; Electronic employee monitoring; Partial Least Squares (PLS); Perceived privacy control; Privacy concerns; Self-construal,44,Information Systems Frontiers,2018 731,Rathore H.; Sahay S.K.; Nikam P.; Sewak M.,Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning,"Since the inception of Andoroid OS, smartphones sales have been growing exponentially, and today it enjoys the monopoly in the smartphone marketplace. The widespread adoption of Android smartphones has drawn the attention of malware designers, which threatens the Android ecosystem. The current state-of-the-art Android malware detection systems are based on machine learning and deep learning models. Despite having superior performance, these models are susceptible to adversarial attack. Therefore in this paper, we developed eight Android malware detection models based on machine learning and deep neural network and investigated their robustness against the adversarial attacks. For the purpose, we created new variants of malware using Reinforcement Learning, which will be misclassified as benign by the existing Android malware detection models. We propose two novel attack strategies, namely single policy attack and multiple policy attack using reinforcement learning for white-box and grey-box scenario respectively. Putting ourselves in adversary’ shoes, we designed adversarial attacks on the detection models with the goal of maximising fooling rate, while making minimum modifications to the Android application and ensuring that the app’s functionality and behaviour does not change. We achieved an average fooling rate of 44.21% and 53.20% across all the eight detection models with maximum five modifications using a single policy attack and multiple policy attack, respectively. The highest fooling rate of 86.09% with five changes was attained against the decision tree based model using the multiple policy approach. Finally, we propose an adversarial defence strategy which reduces the average fooling rate by threefold to 15.22% against a single policy attack, thereby increasing the robustness of the detection models i.e. the proposed model can effectively detect variants (metamorphic) of malware. The experimental analysis shows that our proposed Android malware detection system using reinforcement learning is more robust against adversarial attacks. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Adversarial learning; Android; Machine learning; Malware detection; Reinforcement learning; Static analysis,64,Information Systems Frontiers,2021 732,Abdullah N.S.; Indulska M.; Sadiq S.,Compliance management ontology – a shared conceptualization for research and practice in compliance management,"The diversity of stakeholders in compliance management initiatives contributes to the challenges organisations face when managing compliance, and consequently adds to the cost of compliance. In particular, there is evidence that the lack of a common or shared understanding of compliance management concepts is a barrier to effective compliance management practice. Taking an information-centric view to addressing this challenge, this paper reports on the development of an ontology intended to provide a shared conceptualisation of the compliance management domain for various stakeholders. The ontology is based on input from domain experts and practitioners, validated and refined through eight case studies, and subsequently evaluated for its usability in practice. © 2016, Springer Science+Business Media New York.",Compliance management; Compliance vocabulary; Domain ontology; Semiotics,27,Information Systems Frontiers,2016 733,Namisango F.; Kang K.; Beydoun G.,How the Structures Provided by Social Media Enable Collaborative Outcomes: A Study of Service Co-creation in Nonprofits,"This paper explains how social media drives organization-public collaborative outcomes such as social media-enabled service co-creation in non-profit organizations (nonprofits). We assume a technology affordances perspective to identify social media structures enacted through discovering functional affordances, managing constraints through privacy preferences, and constructing meaning and values, We explain how these structures relate to service co-creation. We surveyed 73 nonprofits on social media and collected 289 usable responses. We apply structural equation modeling to analyze the data. Our findings suggest that symbolic constructed meaning and values together with the organization’s privacy preferences on social media are positively related to socialization, visibility, and information sharing affordances. Unlike information sharing, socialization and visibility affordances are, in turn, positively related to service co-creation. This study advances our theoretical understanding of how social technology structures produce collaborative outcomes and offers practical insights into the cumulative value of social media. © 2021, Springer Science+Business Media, LLC, part of Springer Nature.",Functional affordances; Nonprofits; Privacy; Service co-creation; Social media; Symbolic expressions; Technology constraints,24,Information Systems Frontiers,2022 734,Büsch S.; Nissen V.; Wünscher A.,Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques,"The aim of Information Lifecycle Management (ILM) is to govern data throughout its lifecycle as efficiently as possible and effectively from technical points of view. A core aspect is the question, where the data should be stored, since different costs and access times are entailed. For this purpose data have to be classified, which presently is either done manually in an elaborate way, or with recourse to only a few data attributes, in particular access frequency. In the context of Data-Warehouse-Systems this article introduces an automated and therefore speedy and cost-effective data classification for ILM. Machine learning techniques, in particular an artificial neural network (multilayer perceptron), a support vector machine and a decision tree approach are compared on an SAP-based real-world data set from the automotive industry. This data classification considers a large number of data attributes and thus attains similar results akin to human experts. In this comparison of machine learning techniques, besides the accuracy of classification, also the types of misclassification that appear, are included, since this is important in ILM. © 2016, Springer Science+Business Media New York.",Artificial neural net; Automatic classification; Business intelligence; Computational intelligence; Data warehouse; Information lifecycle management; Machine learning; Multilayer perceptron,6,Information Systems Frontiers,2017 735,Castelli M.; Gonçalves I.; Trujillo L.; Popovič A.,An evolutionary system for ozone concentration forecasting,"Nowadays, with more than 50 % of the world’s population living in urban areas, cities are facing important environmental challenges. Among them, air pollution has emerged as one of the most important concerns, taking into account the social costs related to the effect of polluted air. According to a report of the World Health Organization, approximately seven million people die each year from the effects of air pollution. Despite this fact, the same report suggests that cities could greatly improve their air quality through local measures by exploiting modern and efficient solutions for smart infrastructures. Ideally, this approach requires insights of how pollutant levels change over time in specific locations. To tackle this problem, we present an evolutionary system for the prediction of pollutants levels based on a recently proposed variant of genetic programming. This system is designed to predict the amount of ozone level, based on the concentration of other pollutants collected by sensors disposed in critical areas of a city. An analysis of data related to the region of Yuen Long (one of the most polluted areas of China), shows the suitability of the proposed system for addressing the problem at hand. In particular, the system is able to predict the ozone level with greater accuracy with respect to other techniques that are commonly used to tackle similar forecasting problems. © 2016, Springer Science+Business Media New York.",Air quality; Evolutionary computation; Forecasting; Genetic programming; Smart cities,17,Information Systems Frontiers,2017 736,Kannisto P.; Hästbacka D.; Marttinen A.,Information Exchange Architecture for Collaborative Industrial Ecosystem,"Due to the networked nature of modern industrial business, repeated information exchange activities are necessary. Unfortunately, information exchange is both laborious and expensive with the current communication media, which causes errors and delays. To increase the efficiency of communication, this study introduces an architecture to exchange information in a digitally processable manner in industrial ecosystems. The architecture builds upon commonly agreed business practices and data formats, and an open consortium and information mediators enable it. Following the architecture, a functional prototype has been implemented for a real industrial scenario. This study has its focus on the technical information of equipment, but the architecture concept can also be applied in financing and logistics. Therefore, the concept has potential to completely reform industrial communication. © 2018, The Author(s).",Digital business ecosystem; Industrial information management; Lifecycle management; Multi-sided platform; Operations and maintenance; Systems integration,23,Information Systems Frontiers,2020 737,Kim S.L.; Teo T.S.H.; Bhattacherjee A.; Nam K.,"IS auditor characteristics, audit process variables, and IS audit satisfaction: An empirical study in South Korea","As a result of our inattention to the audit process, its antecedents, and its outcomes, the academic literature has lagged behind contemporary auditing practices as the demand for information systems audits has grown. To address this gap, we propose a model of IS audit satisfaction that includes auditor expertise (AE) and auditor role clarity (ARC) as antecedent variables that affect audit responsiveness (ARES) and audit reliability (AREL), which in turn affect audit satisfaction. We tested this model using survey data from 203 IS projects in South Korean public sector firms. Our results validate the significance of auditor characteristics (AE and ARC) and audit process variables (ARES and AREL) in shaping audit satisfaction. Implications for research and practice are discussed. © 2015, Springer Science+Business Media New York.",Audit process; Audit satisfaction; Auditor characteristics; Field survey; IS audit; South Korea; Structural equation modeling,12,Information Systems Frontiers,2017 738,Rouyendegh B.D.; Topuz K.; Dag A.; Oztekin A.,An AHP-IFT Integrated Model for Performance Evaluation of E-Commerce Web Sites,"This study presents a hybrid framework of Analytic hierarchy process and Intuitionistic Fuzzy Technique for Order of Preference by Similarity to Ideal Solution for the assessment and evaluation of E-commerce web site (EWS) performance. The proposed hybrid model enables decision makers to assess and efficiently use intuitionistic fuzzy numbers. In addition, human judgment can effectively be incorporated in the evaluation process. The present model provides an accurate classification of EWS’ performance. A numerical case study is provided to demonstrate the proposed analytic methodology to validate the efficiency and effectiveness of the hybrid model. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Analytic hierarchy process (AHP); E-commerce website (EWS); Multi-criteria decision-making (MCDM),39,Information Systems Frontiers,2019 739,Chou Y.-C.; Shao B.B.M.,Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing,"While the Internet drives the first transition of sales channels from physical stores to web storefronts, it is mobile devices like smartphones that provide the mobility and ubiquity wired desktop computers lack and that enable the second transition from e-retailing to m-retailing. Unlike the first transition that has been well studied in the literature, the follow-up transition from e-retailing to m-retailing has been under-explored. In this paper, we examine this transition by studying the timing of e-retailers’ initiation of m-retail sales channels (as years of adoption) and the performance of such adoption (as business value). We employ a theoretical contingency framework that classifies firms by the fit between characteristics of merchants and capabilities of the mobile sales channel (i.e., ubiquitous access capability and limited information search capability). We find that firms which sell time critical products and hence benefit from ubiquitous access are inclined to adopt m-retailing early. Interestingly, those firms that adopt early do not necessarily show the greatest values at all times. Instead, the type of performance metrics used matters. Apart from the distinct capabilities of the mobile sales channel, our finding suggests that dependency on existing e-retailing also has a positive effect on a firm’s m-retailing performance. Especially, the influence of e-retailing varies with the fit of a merchant with the mobile sales channel as well as the type of performance metric used. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Capabilities of mobile channel; Contingency theory; Dependency on e-retailing; Mobile retailing; Omnichannel retailing,7,Information Systems Frontiers,2021 740,Wall J.D.; Palvia P.; D’Arcy J.,Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios,"Employees are a major cause of information security vulnerabilities and breaches. Organizations implement controls, such as information security policies, fear appeals, and computer monitoring, to manage the security threats that employees pose. Behavioral information security research seeks to understand how these security controls influence employees’ behaviors. In practice, organizations adopt many coexisting security controls in security control portfolios (SCPs). Unfortunately, the complexities of SCPs are not well understood in the information security literature. To assist in studying SCPs, we present a typology and a theoretical model of security control grounded in an extension of control theory. We identify twelve types of security controls that can exist in practice based on three important control dimensions. We develop a number of propositions to explain how the complementarity of security controls in SCPs affect motivation to protect information. Our efforts produce a behaviorally grounded extension of control theory that is well suited for studying individual-level security behavior governed by complex SCPs. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Control portfolios; Control theory; Information security; Security behavior; Security controls; Typology,6,Information Systems Frontiers,2022 741,Gao L.; Waechter K.A.,Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation,"User adoption of mobile payment (m-payment) is low compared to the adoption of traditional forms of payments. Lack of user trust has been identified as the most significant long-term barrier for the success of mobile finances systems. Motivated by this fact, we proposed and tested an initial trust theoretical model for user adoption of m-payment systems. The model not only theorizes the role of initial trust in m-payment adoption, but also identifies the facilitators and inhibitors for a user’s initial trust formation in m-payment systems. The model is empirically validated via a sample of 851 potential m-payment adopters in Australia. Partial least squares structural equation modelling is used to assess the relationships of the research model. The results indicate that perceived information quality, perceived system quality, and perceived service quality as the initial trust facilitators are positively related to initial trust formation, while perceived uncertainty as the initial trust inhibitor exerts a significant negative effect on initial trust. Perceived asset specificity is found to have insignificant effect. In addition, the results show that initial trust positively affects perceived benefit and perceived convenience, and these three factors together predict usage intention. Perceived convenience of m-payment is also found to have a positive effect on perceived benefit. The findings of this study provide several important implications for m-payment adoption research and practice. © 2015, Springer Science+Business Media New York.",Information system success model; Initial trust; Mobile payment; Transaction cost economics; Valance framework,382,Information Systems Frontiers,2017 742,Ismagilova E.; Slade E.L.; Rana N.P.; Dwivedi Y.K.,The Effect of Electronic Word of Mouth Communications on Intention to Buy: A Meta-Analysis,"The aim of this research is to synthesise findings from previous studies by employing weight and meta-analysis to reconcile conflicting evidence and draw a “big picture” of eWOM factors influencing consumers’ intention to buy. By using the findings from 69 studies, this research identified best (e.g. argument quality, valence, eWOM usefulness, trust in message), promising (e.g. eWOM credibility, emotional trust, attitude towards website) and least effective (e.g. volume, existing eWOM, source credibility) predictors of intention to buy in eWOM research. Additionally, the effect size of each predictor was calculated by performing meta-analysis. For academics, understanding what influences consumers’ intention to buy will help set the agenda for future research directions; for practitioners, it will provide benefit in terms of practical guidance based on detailed analysis of specific factors influencing consumers’ intention to buy, which could enhance their marketing activities. © 2019, The Author(s).",Electronic word of mouth (eWOM); Intention to buy; Meta-analysis; Weight analysis,282,Information Systems Frontiers,2020 743,Hossain M.A.; Rahman S.,Investigating the Success of OGB in China: The Influence of Personality Traits,"Online group buying (OGB) is one of the latest types of e-commerce to find success in China. Many OGB businesses join the marketplace in China every month, creating tremendous competition. In order to understand the success factors, this study uses information systems success models and incorporates personality traits. We collected data from 408 OGB customers and found support for the model, with most variables being significant. Among the five major personality traits, extroversion, agreeableness, and conscientiousness directly impact actual purchase behaviour of Chinese OGB customers whereas neuroticism and openness to experience have no effect. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",China; IS success model; Online group buying; Personality traits,19,Information Systems Frontiers,2021 744,Khelil A.; Mesmoudi A.; Galicia J.; Bellatreche L.; Hacid M.-S.; Coquery E.,Combining Graph Exploration and Fragmentation for Scalable RDF Query Processing,"The flexibility offered by the Resource Description Framework (RDF) has led it to become a very popular standard for representing data with an undefined or variable schema using the concept of triples. Its success has resulted in many large scale multidisciplinary datasets, that have prompted the development of efficient RDF processing systems. Current approaches can be distinguished into two groups: the first, adopting the relational model storing the triples in tables, and the second creating data structures that model RDF data as a graph. The strategies of the first group are more easily scalable since they apply optimization strategies from the relational model like indexing and fragmentation. However, these approaches suffer many overheads when dealing with complex queries (e.g. compounded SPARQL graphs involving filters) persistent in existing applications. On the other hand, graph-based systems that use more complex data structures fail to efficiently manage the main memory and are not scalable in computer hardware with limited resources. In this paper, we propose a novel approach to perform queries (Basic Graph Patterns, Wildcards, Aggregations and Sorting) on RDF data. We propose to combine both RDF graph exploration with physical fragmentation of triples. In this work, we describe our graph-based storage and query evaluation models. Then, we detail the architecture of our system and we largely explain the strategy, based in the Volcano execution model, used to manage the main memory at query runtime. We conducted extensive experiments on synthetic and real datasets to evaluate the efficiency of our proposal. We compared our performance with a relational-based (Virtuoso), a graph-based (gStore) and an intensive-indexing (RDF-3X) approach. According to our evaluation, our system offers the best compromise between efficient query processing and scalability. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Fragmentation; Graph exploration; Performance; RDF; Scalability,8,Information Systems Frontiers,2021 745,Kamyabniya A.; Lotfi M.M.; Naderpour M.; Yih Y.,Robust Platelet Logistics Planning in Disaster Relief Operations Under Uncertainty: a Coordinated Approach,"Resource sharing, as a coordination mechanism, can mitigate disruptions in supply and changes in demand. It is particularly crucial for platelets because they have a short lifespan and need to be transferred and allocated within a limited time to prevent waste or shortages. Thus, a coordinated model comprised of a mixed vertical-horizontal structure, for the logistics of platelets, is proposed for disaster relief operations in the response phase. The aim of this research is to reduce the wastage and shortage of platelets due to their critical role in wound healing. We present a bi-objective location-allocation robust possibilistic programming model for designing a two-layer coordinated organization strategy for multi-type blood-derived platelets under demand uncertainty. Computational results, derived using a heuristic ε-constraint algorithm, are reported and discussed to show the applicability of the proposed model. The experimental results indicate that surpluses and shortages in platelets remarkably declined following instigation of a coordinated disaster relief operation. © 2017, Springer Science+Business Media, LLC.",Coordination; Demand uncertainty; Disaster relief operations; Heuristic ε-constraint algorithm; Platelets; Possibilistic programming,30,Information Systems Frontiers,2018 746,Bidoit N.; Colazzo D.; Malla N.; Sartiani C.,Evaluating Queries and Updates on Big XML Documents,"In this paper we present Andromeda, a system for processing queries and updates on large XML documents. The system is based on the idea of statically and dynamically partitioning the input document, so as to distribute the computing load among the machines of a MapReduce cluster. © 2017, Springer Science+Business Media New York.",Cloud computing; Map/Reduce; XML,7,Information Systems Frontiers,2018 747,Mirbabaie M.; Ehnis C.; Stieglitz S.; Bunker D.; Rose T.,Digital Nudging in Social Media Disaster Communication,"Social media has become an important channel of communication in emergency and disaster management. Emergency Management Agencies can distribute helpful and important information to the general public and also gather information to enrich their management efforts. This, however, remains challenging since several communication-related barriers occur. This study investigates how the concept of Nudging, a form of behaviour adjustment, can be applied to address these barriers. A Systematic Literature Review and qualitative social media data analysis methods were applied to explore the potential of digital nudges on social media. Twelve forms of digital nudges could be identified in the data that influenced the visibility of the messages they occurred in. The results suggest that Digital Nudging on Social Media is a promising approach to use in emergency and disaster communication. © 2020, The Author(s).",Digital nudging; Disaster communication; Emergency management; Social media,43,Information Systems Frontiers,2021 748,Akande A.; Cabral P.; Casteleyn S.,Assessing the Gap between Technology and the Environmental Sustainability of European Cities,"The growth of cities’ population increased the interest in the opportunities and challenges that Information and Communication Technology (ICT) have on carbon footprint reduction, which fosters their environmental sustainability. Using Principal Component Analysis (PCA), six ICT-related variables from European Union (EU) cities were combined into a single two-dimensional ICT index. Then, through cluster analysis, cities were clustered into four groups based on the ICT index and Carbon dioxide (CO2) emissions. Using ICT as an indicator of smartness and CO2 emissions as an indicator of sustainability, we show that it is possible for a city to be smart but not sustainable and vice versa. Results also indicate that there is a gap between cities in northern Europe, which are the top performers in both categories, and cities in south-eastern Europe, which do not perform as well. The need for a common strategy for achieving integrated smart, sustainable and inclusive growth at a European level is demonstrated. © 2019, The Author(s).",Cluster analysis; European cities; PCA; Smart cities; Sustainable cities; Urban analytics,84,Information Systems Frontiers,2019 749,Gorla N.; Chiravuri A.; Chinta R.,Business-to-business e-commerce adoption: An empirical investigation of business factors,"We develop an overarching model to explain the adoption of business-to-business e-commerce using five business factors: external environment, organizational context, decision-maker’s characteristics, technology context, and organizational learning. Data collected from IS executives was analyzed using logistic regression. Our model has a good fit with over 77 % variance explained. Findings indicate that the existence of informal interest groups, and the tolerant attitude of decision makers towards negative information about business-to-business e-commerce have significant influence on the adoption decision. In addition, our results indicate that price intensity and perceived barriers negatively affect the adoption decision. © 2015, Springer Science+Business Media New York.",B2B e-commerce adoption; Business factors; Business to Business (B2B); Electronic commerce; Information systems; IT adoption; Organizational adoption; Technology diffusion,36,Information Systems Frontiers,2017 750,Ye H.J.; Chua C.E.H.; Sun J.,Enhancing mobile data services performance via online reviews,"The prevalence of portable computational devices like smartphones and tablets has increased the popularity and importance of mobile data services (MDS). However, the flood of new MDS in the market has caused hyper-competition among MDS providers and only a few of them profit. Past studies suggest that online reviews can help MDS providers gain market attention and provide information for improving MDS applications. As a result, MDS providers can leverage reviews to innovate and profit. However, little research has empirically investigated the influences of online reviews on MDS innovation and profitability. This paper studies MDS profitability (popularity) from two angles. We posit that one strategic advantage of certain MDS providers is their ability to rapidly innovate and that innovation inspiration can be derived from reviews ubiquitous in MDS download sites. Our results show that online reviews positively impact MDS popularity directly and indirectly via increasing MDS innovation. © 2017, Springer Science+Business Media New York.",Awareness effect; Mobile data service innovation; Mobile data service popularity; Online reviews; Persuasive effect,13,Information Systems Frontiers,2019 751,Cena F.; Likavec S.; Rapp A.,Real World User Model: Evolution of User Modeling Triggered by Advances in Wearable and Ubiquitous Computing: State of the Art and Future Directions,"Over the last few years, user modeling scenery is changing. With the recent advancements in ubiquitous and wearables technologies, the amount and type of data that can be gathered about users and used to build user models is expanding. User Model can now be enriched with data regarding different aspects of people’s everyday lives. All these changes bring forth new research questions about the kinds of services which could be provided, the ways for effectively conveying new forms of personalisation and recommendation, and how traditional user modeling should change to exploit ubiquitous and wearable technology to provide these services. In this paper we follow the evolution of user modeling process, starting from the traditional User Model and progressing to RWUM - Real World User Model, which contains data from a person’s everyday life. We tried to answer the above questions and to present a conceptual framework that represents the RWUM process, which might be used as a reference model for designing RWUM-based systems. Finally, we propose some inspiring usage scenarios and design directions that can guide researchers in designing novel, robust and versatile services based on RWUM. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Adaptive systems; Internet of things; Recommender systems; Ubiquitous computing; User modeling; Wearable technologies,34,Information Systems Frontiers,2019 752,Richey M.; Gonibeed A.; Ravishankar M.N.,The Perils and Promises of Self-Disclosure on Social Media,"In addition to their professional social media accounts, individuals are increasingly using their personal profiles and casual posts to communicate their identities to work colleagues. They do this in order to ‘stand out from the crowd’ and to signal attributes that are difficult to showcase explicitly in a work setting. Existing studies have tended to treat personal posts viewed in a professional context as a problem, since they can threaten impression management efforts. These accounts focus on the attempts of individuals to separate their life domains on social media. In contrast, we present the narratives of professional IT workers in India who intentionally disrupt the boundaries between personal and professional profiles in order to get noticed by their employers. Drawing on the dramaturgical vocabulary of Goffman (1959) we shed light on how individuals cope with increased levels of self-disclosure on social media. We argue that their self-presentations can be likened to post-modern performances in which the traditional boundaries between actor and audience are intentionally unsettled. These casual posts communicate additional personal traits that are not otherwise included in professional presentations. Since there are no strict boundaries between formal front-stage and relaxed back-stage regions in these types of performance, a liminal mental state is often used, which enables a better assessment of the type of information to present on social media. © 2017, The Author(s).",Blurred boundaries; Goffman; Inference; Self-presentations; Social media,46,Information Systems Frontiers,2018 753,Marjanovic O.; Murthy V.,From product-centric to customer-centric services in a financial institution – exploring the organizational challenges of the transition process,"This research aims to contribute to an increased understanding of the strategic, cultural and other organizational challenges in a transition process from product-centric to customer-centric services. The paper describes an exploratory case study, conducted in a complex financial services organization in the context of their customer-facing services. The transition process was examined through the theoretical lens of Work System Theory (WST), following the argument made by previous researchers that service systems could be seen as work systems. This holistic theory enabled us to capture the three key phases of the transition process as work systems snapshots and through their evolving relationships show the manner in which the transitions occurred from one phase to another. This innovative approach provided the researchers with an in-depth insight into key issues related to organizational environment, strategy, customers, products and services, processes and activities, participants, and information and technologies – all relevant for each phase of the transition process. This research contributes to both information systems (IS) and service science research, bringing the key service research priority of “service infusion” to the attention of IS researchers. © 2015, Springer Science+Business Media New York.",Case study research; Customer-centric services; Organizational challenges; Transition process from product to customer orientation; Work system theory,25,Information Systems Frontiers,2016 754,Shih H.-P.; Sung P.-C.,Addressing the Review-Based Learning and Private Information Approaches to Foster Platform Continuance,"Multi-sided platforms (MSPs) play the role as tech-enabled intermediaries that provide social networking sites to serve heterogeneous customer needs via complementary offerings, fostering direct and indirect connections between customers and third parties. However, the phenomenon of switching behavior in the post-adoption would likely destruct the success of platform business that depends on repeated customers and their continuance. Such a “use-to-goal-attainment gap” reveals the information about distinct driving forces of platform continuance. From the rational perspective, we take uses and gratifications (U&G) as the theoretical vehicle to examine the private information of personal experiences. We consider review-based learning as the adaptive approach to informational cascades. From the empirical surveys of 309 TripAdvisor (Taiwan) users, we found that the review-based learning approach plays a dual-role as the competing and supplemental driver of private information to foster platform continuance. Theoretical and managerial implications of platform continuance and business are discussed accordingly. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Informational cascades; Multi-sided platforms; Platform continuance; Private information approach; Review-based learning; Uses and gratifications,3,Information Systems Frontiers,2021 755,Chen C.; Shyu M.-L.; Chen S.-C.,Weighted subspace modeling for semantic concept retrieval using gaussian mixture models,"At the era of digital revolution, social media data are growing at an explosive speed. Thanks to the prevailing popularity of mobile devices with cheap costs and high resolutions as well as the ubiquitous Internet access provided by mobile carriers, Wi-Fi, etc., numerous numbers of videos and pictures are generated and uploaded to social media websites such as Facebook, Flickr, and Twitter everyday. To efficiently and effectively search and retrieve information from the large amounts of multimedia data (structured, semi-structured, or unstructured), lots of algorithms and tools have been developed. Among them, a variety of data mining and machine learning methods have been explored and proposed and have shown their effectiveness and potentials in handling the growing requests to retrieve semantic information from those large-scale multimedia data. However, it is well-acknowledged that the performance of such multimedia semantic information retrieval is far from satisfactory, due to the challenges like rare events, data imbalance, etc. In this paper, a novel weighted subspace modeling framework is proposed that is based on the Gaussian Mixture Model (GMM) and is able to effectively retrieve semantic concepts, even from the highly imbalanced datasets. Experimental results performed on two public-available benchmark datasets against our previous GMM-based subspace modeling method and the other prevailing counterparts demonstrate the effectiveness of the proposed weighted GMM-based subspace modeling framework with the improved retrieval performance in terms of the mean average precision (MAP) values. © 2016, Springer Science+Business Media New York.",Gaussian mixture model; Semantic concept retrieval; Weighted subspace modeling,3,Information Systems Frontiers,2016 756,Liu Q.; Feng G.; Wang N.; Tayi G.K.,A multi-objective model for discovering high-quality knowledge based on data quality and prior knowledge,"Discovering knowledge from data means finding useful patterns in data, this process has increased the opportunity and challenge for businesses in the big data era. Meanwhile, improving the quality of the discovered knowledge is important for making correct decisions in an unpredictable environment. Various models have been developed in the past; however, few used both data quality and prior knowledge to control the quality of the discovery processes and results. In this paper, a multi-objective model of knowledge discovery in databases is developed, which aids the discovery process by utilizing prior process knowledge and different measures of data quality. To illustrate the model, association rule mining is considered and formulated as a multi-objective problem that takes into account data quality measures and prior process knowledge instead of a single objective problem. Measures such as confidence, support, comprehensibility and interestingness are used. A Pareto-based integrated multi-objective Artificial Bee Colony (IMOABC) algorithm is developed to solve the problem. Using well-known and publicly available databases, experiments are carried out to compare the performance of IMOABC with NSGA-II, MOPSO and Apriori algorithms, respectively. The computational results show that IMOABC outperforms NSGA-II, MOPSO and Apriori on different measures and it could be easily customized or tailored to be in line with user requirements and still generates high-quality association rules. © 2016, Springer Science+Business Media New York.",Data mining; Data quality; Decision making; KDD; Multi-objective algorithm,19,Information Systems Frontiers,2018 757,Buckley P.; O’Brien F.,The effect of malicious manipulations on prediction market accuracy,"Prediction markets are a form of group decision support system which uses a market mechanism to elicit and aggregate information from large numbers of individuals. The literature recognises their potential as decision support tools, but also notes several issues of concern regarding their utility in an organisational setting. One critical concern is the possibility that prediction markets may be subject to malicious manipulation. This paper presents a field experiment which examines the effect of such manipulations on prediction market performance. We divide a sample of 72 contracts into a control group and an experimental group. Contracts in the experimental group are manipulated by a trader with a malicious motivation. The study demonstrates that manipulations do have an effect on prediction market accuracy, but that these effects are rapidly ameliorated by rational traders and shows that fear of malicious manipulation should not preclude the use of prediction markets as organisational decision making tools. © 2015, Springer Science+Business Media New York.",Organisational decision making; Prediction market manipulation; Prediction markets,8,Information Systems Frontiers,2017 758,Beydoun G.; Abedin B.; Merigó J.M.; Vera M.,Twenty Years of Information Systems Frontiers,"Information Systems Frontiers is a leading international journal that publishes research at the interface between information systems and information technology. The journal was launched in 1999. In 2019, the journal celebrates the 20th anniversary. Motivated by this event, this paper aims to review this first twenty years of publication record to uncover trends most influential on ISF. The analysis considers various metics including citation structure of the journal, most-cited papers, the most influential authors, institutions and countries, and citing articles. Importantly, the paper presents a thematic analysis of the publications that appeared in ISF in the past 20 years. The thematic analysis is evidenced by two sources of data: First, a bibliometric analysis highlighting core topics within the past 20 years is presented. Second, a semantic analysis of keywords introduced by the authors themselves is applied. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Bibliometrics; Co-citation; VOS viewer; Web of science,36,Information Systems Frontiers,2019 759,Wu T.-H.; Huang S.-M.; Huang S.Y.; Yen D.C.,"The effect of competencies, team problem-solving ability, and computer audit activity on internal audit performance","Previous studies have investigated diverse topics in the area of computer auditing. However, few studies have empirically examined internal audit performance. Therefore, the present study examines the influences of various competencies, team problem-solving ability, and computer audit activity on internal audit performance. This study employs a survey and applies the partial least squares regression method. The results show that team problem-solving ability and computer audit activity positively influence internal audit performance, and that competencies indirectly influence internal audit performance through the mediating effects of team problem-solving ability and computer audit activity. Therefore, internal audit performance requires not only team cooperation and computer audit activity but also the competency of internal auditors. © 2016, Springer Science+Business Media New York.",CAATTs; Competency; Computer auditing; Team problem-solving ability,28,Information Systems Frontiers,2017 760,Paredes J.N.; Simari G.I.; Martinez M.V.; Falappa M.A.,NetDER: An Architecture for Reasoning About Malicious Behavior,"Malicious behavior in social media has many faces, which for instance appear in the form of bots, sock puppets, creation and dissemination of fake news, Sybil attacks, and actors hiding behind multiple identities. In this paper, we propose the NetDER architecture, which takes its name from its two main modules: Net work D iffusion and ontological reasoning based on E xistential R ules), to address these issues. This initial proposal is meant to serve as a roadmap for research and development of tools to attack malicious behavior in social media, guiding the implementation of software in this domain, instead of a specific solution. Our working hypothesis is that these problems – and many others – can be effectively tackled by (i) combining multiple data sources that are constantly being updated, (ii) maintaining a knowledge base using logic-based formalisms capable of value invention to support generating hypotheses based on available data, and (iii) maintaining a related knowledge base with information regarding how actors are connected, and how information flows across their network. We show how these three basic tenets give rise to a general model that has the further capability of addressing multiple problems at once. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Malicious behavior; Network diffusion processes; Ontological reasoning; Social media,9,Information Systems Frontiers,2021 761,Jackson S.; Wong M.S.,A cultural theory analysis of e-government: Insights from a local government council in Malaysia,"In this paper, we use the ways of life proposed by cultural theory—hierarchism, fatalism, individualism, and egalitarianism—to explain the social relations and dynamics over time, which affected the ability to implement and manage a major ICT-enabled government change initiative (e-services). This is illustrated using an in-depth case study of one local government council in Malaysia. Our analysis found culture to be evident across multiple levels, including organizational (local council), subgroup (project team, operators, user group) and individual (IT consultants) in the context of the e-services project. More specifically, various characteristics of the ways of life were salient in the e-services project, particularly during the early years—mostly, hierarchism and fatalism at the organizational and subgroup levels, and individualism at the individual level. Furthermore, the study found changes, for instance, the emergence of egalitarianism at the subgroup level over time. The paper acknowledges that in order for researchers to understand how culture influences e-government, the focus of attention needs to shift from solely concentrating on the organizational level to also understanding the dynamic and fragmented nature of culture at the group and individual levels. © 2016, Springer Science+Business Media New York.",Cultural theory; E-services; ICT and government; ICT implementation; Organizational culture,13,Information Systems Frontiers,2017 762,Dwivedi Y.K.; Janssen M.; Slade E.L.; Rana N.P.; Weerakkody V.; Millard J.; Hidders J.; Snijders D.,Driving innovation through big open linked data (BOLD): Exploring antecedents using interpretive structural modelling,"Innovation is vital to find new solutions to problems, increase quality, and improve profitability. Big open linked data (BOLD) is a fledgling and rapidly evolving field that creates new opportunities for innovation. However, none of the existing literature has yet considered the interrelationships between antecedents of innovation through BOLD. This research contributes to knowledge building through utilising interpretive structural modelling to organise nineteen factors linked to innovation using BOLD identified by experts in the field. The findings show that almost all the variables fall within the linkage cluster, thus having high driving and dependence powers, demonstrating the volatility of the process. It was also found that technical infrastructure, data quality, and external pressure form the fundamental foundations for innovation through BOLD. Deriving a framework to encourage and manage innovation through BOLD offers important theoretical and practical contributions. © 2016, The Author(s).",Big data; Innovation; Interpretive structural modelling; Linked data; Open data,118,Information Systems Frontiers,2017 763,Chatterjee S.; Rana N.P.; Dwivedi Y.K.,Assessing Consumers’ Co‐production and Future Participation On Value Co‐creation and Business Benefit: an F-P-C-B Model Perspective,"Co-production and active participation of the consumers are considered to have enhanced the value co-creation activities that would ensure business benefits of a firm. The marketing literature available does not explicitly explain the philosophy that would motivate the consumers to help to increase values for co-creation activities. In this context, attempts have been made to identify the factors that would impact on co-production and consumers’ participation to co-create values. By studying literature and theories such as theory of co-creation, theory of value creation, information processing theory, marketing theory and expectancy value theory, a conceptual model called F-P-C-B (Future Participation (F) - Co-production (P) - Co-creation (C) - Business Benefit (B)) has been developed along with nine hypotheses. The data was from 362 respondents in India and the model was tested using PLS based analysis. The study shows that it is important for the firms to shift from product-oriented activities to customer-related strategies. It is also found that for obtaining more profitability and better business results, customers should be involved in business activities by way of involving in co-design, idea generation, and other relevant activities of the firms. Moreover, the study highlights that knowledge sharing between the customers and the firm authorities ensures better business values. © 2021, The Author(s).",Business benefits; Co‐creation; Co‐production; F-P-C-B Model; Participation,72,Information Systems Frontiers,2022 764,Zafar H.; Ko M.S.; Osei-Bryson K.-M.,The value of the CIO in the top management team on performance in the case of information security breaches,"This study investigates whether presence of a CIO in the top management team (TMT) is an important indicator for better management of information, especially when an organization is involved in an information security breach incident. Using Upper Echelons Theory, our study relates the status of the CIO in an organization to organizational performance in the case of information security breaches using Tobin’s q. We argue that when an organization experiences an information security breach, the organization that has the CIO in the TMT can recover any damages or losses from the security breach incident quicker than the organization that does not. We categorize security breach incidents using the confidentiality, integrity, and availability (CIA) triad (Solomon and Chapple 2005), and conclude that having the CIO in the TMT has a significant positive impact on firm performance in the aftermath of security breach incidents. However, the degree of impact on performance varies, depending on the type of security breach. © 2015, Springer Science+Business Media New York.",Chief information officer (CIO); Information security breach; Organizational performance; Tobin’s q; Top management team (TMT),50,Information Systems Frontiers,2016 765,Yang J.; Yin C.,Exploring Boundary Conditions of the Impact of Accessibility to Mobile Networks on Employees’ Perceptions of Presenteeism: from Both Individual and Social Perspectives,"Mobile networks, such as Wi-Fi and networks provided by mobile operators, are present everywhere nowadays and help employees to deal with business-related issues. With accessibility to mobile networks, employees perceive that they are constantly reachable to others, which is defined as “presenteeism”. With the importance of presenteeism in mind, this study aims to explore under what conditions employees’ perceptions of presenteeism based on accessibility to mobile networks can be increased or reduced. Based on self-determination theory and normative social influence, both individual-level (i.e., need for autonomy and need for relatedness) and social-level (i.e., norm of responsiveness) boundary conditions are indicated. Data was collected from 223 employees who use mobile technology at work. Our empirical results show that need for relatedness positively moderates the relationships between accessibility to mobile networks on employees’ perceptions of presenteeism. We also found that norm of responsiveness negatively moderates the relationships between accessibility to mobile networks on employees’ perceptions of presenteeism. This study contributes to the literature on presenteeism as well offers guidelines for practitioners. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Accessibility; Mobile technology; Normative social influence; Presenteeism; Psychological needs,8,Information Systems Frontiers,2020 766,Crossler R.E.; Bélanger F.; Ormond D.,The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats,"Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or strong passwords. However, defense in depth requires that multiple behaviors be performed concurrently for one’s computer to be protected. Addressing this gap in prior research, this study measures 279 individuals’ computer security behaviors and analyzes them with multi-dimensional scaling. We examined three security threats: security related performance degradation, identify theft, and data loss. The results present a mapping of security behaviors performed together with other behaviors on two dimensions for each of these threats. Using expert reviews of the resulting dimensions, the study proposes that response efficacy and response cost help explain why people perform certain behaviors together. These findings can help explain inconsistent results in prior information security research because they focused on one behavior only whereas people perform various security behaviors together in an effort to mitigate specific security threats. The study informs research and practice by identifying security threat-response pairs via expert interviews, surveying individuals on how they perform multiple security behaviors concurrently to mitigate security threats, identifying why certain behaviors are performed together, and using these findings to identify reasons why IS security research has confounding results based on specific individual threat-response pairs used in prior studies. © 2017, Springer Science+Business Media New York.",Computer performance degradation; File and data loss; Identity theft; Information security; Multi-dimensional scaling; Threat mitigation,29,Information Systems Frontiers,2019 767,Cevahir A.,Index partitioning through a bipartite graph model for faster similarity search in recommendation systems,"Scalability of a recommendation system is an important factor for large e-commerce sites containing millions of products visited by millions of users. Similarity search is the core operation in recommendation systems. In this paper, we explain a framework to alleviate performance bottleneck of similarity search for very large-scale recommendation systems. The framework employs inverted index for real-time similarity search and handles dynamic updates. As the inverted index gets larger, retrieving recommendations become computationally expensive. There are various works devoted to solve this problem, such as clustering and preprocessing to compute recommendations offline. Our solution is based on bipartite graph partitioning for minimizing the affinity between entities in different partitions. Number of operations in similarity search is reduced by executing search within the closest partitions to the query. Parts are balanced, so that computational loads of partitions are almost the same, which is significant for reducing the computational cost. Sequential experiments with several different recommendation approaches and large datasets consisting of millions of users and items validate the scalability of the proposed recommendation framework. Accuracy drops only by a small factor due to partitioning, if any. Even slight improvements in recommendation accuracy are observed in our collaborative filtering experiments. © 2016, Springer Science+Business Media New York.",Bipartite graph; Collaborative filtering; Content-based recommendations; Graph partitioning; Inverted index; Recommendation systems,1,Information Systems Frontiers,2017 768,Aydin M.N.; Perdahci N.Z.,Dynamic network analysis of online interactive platform,"The widespread use of online interactive platforms including social networking applications, community support applications draw the attention of academics and businesses. The basic trust of this research is that the very nature of these platforms can be best described as a network of entangled interactions. We agree with scholars that these platforms and features necessitate the call for theory of network as a novel approach to better understand their underpinnings. We examine one of the leading online interactive health networks in Europe. We demonstrate that the interactive platform examined exhibits essential structural properties that characterize most real networks. In particular, we focus on the largest connected component, so-called a giant component (GC), to better understand network formation. Dynamic network analysis helps us to observe how the GC has evolved over time and to identify a particular pattern towards emerging a GC. We suggest that the network measures examined for the platform should be considered as novel and complementary metrics to those used in conventional web and social analytics. We argue that various stages of GC development can be a promising indicator of the strength and endurance of the interactions on the platform. Platform managers may take into account basic stages of the emergence of the GC to determine varying degrees of product attractiveness. © 2017, Springer Science+Business Media New York.",Online interactive platform; Social network analysis; Theory of network,15,Information Systems Frontiers,2019 769,Laniado D.; Volkovich Y.; Scellato S.; Mascolo C.; Kaltenbrunner A.,The Impact of Geographic Distance on Online Social Interactions,"Online social networking services entice millions of users to spend hours every day interacting with each other. The focus of this work is to explain the effect that geographic distance has on online social interactions and, simultaneously, to understand the interplay between the social characteristics of friendship ties and their spatial properties. We analyze data from a large-scale online social network, Tuenti, with about 10 million active users: our sample includes user profiles, user home locations and online social interactions among Tuenti members. Our findings support the idea that spatial distance constraints whom users interact with, but not the intensity of their social interactions. Furthermore, friendship ties belonging to denser connected groups tend to arise at shorter spatial distances than social ties established between members belonging to different groups. Finally, we show that our findings mostly do not depend on the age of the users, although younger users seem to be slightly more constrained to shorter geographic distances. Augmenting social structure with geographic information adds a new dimension to social network analysis and a large number of theoretical investigations and practical applications can be pursued for online social systems, with many promising outcomes. As the amount of available location-based data is increasing, our findings and results open the door to future possibilities: researchers would benefit from these insights when studying online social services, while developers should be aware of these additional possibilities when building systems and applications related to online social platforms. © 2017, Springer Science+Business Media, LLC.",Age factors; Geographic properties; Online interactions; Online social networks; User behavior,57,Information Systems Frontiers,2018 770,Gupta P.; Chauhan S.; Jaiswal M.P.,Classification of Smart City Research - a Descriptive Literature Review and Future Research Agenda,"Smart City (SC) has been a popular area of research and practice during the last decade. An in-depth examination of the existing literature reviews on SCs divulges the scarcity of studies classifying the literature into multiple themes and identifying the popular and less popular themes based on the number of peer reviewed research papers under respective theme. Hence, in this study, a descriptive literature review of 86 peer-reviewed papers on SCs has been conducted to bridge this gap. The findings demonstrate that themes such as SC services design and management, innovation and technology, and citizens’ engagement in design and development of SCs have been extensively studied, whereas, themes such as the social impact, governance and policy, and performance indicators and standards have received moderate attention. However, there are also less popular themes such as the implementation barriers and SC strategy. Further, this study provides a reference source to future researchers. It also delivers valuable information to the policymakers and government bodies, which are actively, involved in the SC projects. © Springer Science+Business Media, LLC, part of Springer Nature 2019.",Classification of research themes; Descriptive literature review; Smart city,84,Information Systems Frontiers,2019 771,Lei H.; Fang X.; Rajkumar T.M.; Holsapple C.,Recovering Troubled IT Projects: The Roles of Transformational Leadership and Project Complexity,"Recovery of troubled IT projects is a vital issue for many organizations. Understanding how leadership and project complexity affect a recovery process could enable organizations to do a better job in recovering troubled projects. A few studies have examined the relationship between leadership and project management. However, the recovery process and project complexity have not been integrated into the relationship between leadership and project recovery. Change leadership, leadership effectiveness, and project complexity are empirically determined to be positively associated with the recovery process based on quantitative data collected from 166 IT project team members. Leadership effectiveness is the variable that impacts the recovery process the most. And, the recovery process significantly affects product success and process success of troubled projects. The findings imply that organizations should focus more on leadership effectiveness to improve recovery processes. To facilitate the process and product success of a project recovery, organizations should rely on a recovery process that includes multiple optional remedies. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",And product success; Change leadership; Leadership effectiveness; Process success; Project complexity; Recovery process; Transformational leadership; Troubled IT project,12,Information Systems Frontiers,2022 772,Dang Y.M.; Zhang Y.G.; Morgan J.,Integrating switching costs to information systems adoption: An empirical study on learning management systems,"When evaluating a new information system, users’ experiences with the prior system, as well as characteristics of the new system, may influence their adoption behavior. However, most existing research either focuses solely on assessment of the new system using information systems adoption theories, or focuses only on the extent and types of switching costs associated with the transition from the prior system to the new one. In addition, little research has examined system switching and adoption of new learning management systems. To address these gaps, this study develops a research model that integrates the theoretical perspectives of switching costs and information systems adoption. The model is developed and tested in the context of the adoption of learning management systems. The results indicate that emotional costs and reduced performance costs can significantly influence perceived switching value. Perceived switching value, performance expectancy, effort expectancy, and social influence have significant impacts on users’ intention to use the new learning management system. © 2015, Springer Science+Business Media New York.",Information systems adoption; Leaning management systems; Switching costs,19,Information Systems Frontiers,2017 773,Shirvani F.; Beydoun G.; Perez P.; Scott W.; Campbell P.,An Architecture Framework Approach for Complex Transport Projects,"Transport infrastructure systems are very complex and expensive. Projects to procure such systems are costly, long and complex to manage. The procurement context usually includes many collaborating organizations but often with different concerns and priorities, and many interactions to other parties. This makes the procurement very complex and entangled. DoDAF, MoDAF and TRAK are three architecture frameworks (AF) that model the whole enterprise/system life cycle that includes system procurement. They are expressed as metamodels. In this paper, we analyse various procurements strategies and identify the concerns that AFs should address. The TRAK AF is then applied to a Rail procurement case study in collaboration with Transport for New South Wales (NSW) in Australia to assess its effectiveness in meeting the procurement needs. In all stages of the study, TRAK is mapped and compared to DoDAF and MoDAF to examine whether DoDAF or MoDAF can cover the inadequacies of TRAK. This paper shows that there is a considerable number of procurement needs which are overlooked by these architecture frameworks. It proposes a metamodel driven expansion to these frameworks to improve their completeness and expressiveness. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Architecture frameworks; Architecture modelling; Complex transport systems; Procurement; System of systems; Systems analysis,5,Information Systems Frontiers,2021 774,García K.; Mendoza S.; Decouchant D.; Brézillon P.,Facilitating resource sharing and selection in ubiquitous multi-user environments,"Mobile technologies have increased the interest of industry and academia in providing users with information and services anytime and anywhere. Some services are customized according to the users’ characteristics, attempting to create ubiquitous environments that enable such users to share and discover resources. However, research that addresses the creation of these environments is scant. In this article, we go further than single-user pervasive systems, by developing a support that manages shared resources in ubiquitous multi-user environments. Our contribution is a semantic matchmaking service capable of finding the most suitable resources that satisfy the users’ requirements. This service processes the users’ requests, their context, and the community participating in the resource sharing process, by respecting restrictions, the natural interaction among participants, and the changes that this interaction produces. We model the environment, shared resources, and users as dynamic entities that generate new information, which might affect the availability states of such resources. These states have been defined through the Contextual-Graphs formalism to incorporate new knowledge that can refine, extend, or customize such states, according to the users’ habits. Our matchmaking service has been deployed across the Computer Science Department of CINVESTAV-IPN research center, where it has been validated by means of several test cases. © 2016, Springer Science+Business Media New York.",Availability states; Contextual variables; Matchmaking services; Mobile applications; Shared resources; Ubiquitous environments,3,Information Systems Frontiers,2018 775,Trivedi N.; Asamoah D.A.; Doran D.,Keep the conversations going: engagement-based customer segmentation on online social service platforms,"Most businesses and organizations develop online services as a value-added offering, which is a significant revenue stream from their existing user base. Such services may be enhanced with social elements to serve as value-added tools for user attraction and retention. Social elements may allow users to post content, share information and directly interact with each other. Investments in these social features are for naught if they do not encourage users to engage on the platform effectively. However, common ways to segment customers by their engagement is hindered by the statistical nature of behavioral data based on social elements. To address this important concern, this paper presents a methodological framework for engagement-based customer segmentation able to appropriately consider signals from social elements. It argues why the traditional approaches for user segmentation is ill-suited and advocates for the integration of kernel functions with clustering to segment, identify and understand user engagement profiles. The framework is demonstrated with real data from a large, very active OSS. © 2016, Springer Science+Business Media New York.",Analytics; Big data; Clustering; Engagement analysis; Kernel k-means; Online social services,21,Information Systems Frontiers,2018 776,Geethapriya A.; Valli S.,An Enhanced Approach to Map Domain-Specific Words in Cross-Domain Sentiment Analysis,"Domain adaptation in sentiment analysis is one of the areas where a classifier trained in one domain often classifies sentiments poorly when applied to another domain due to domain-specific words. Extracting features and their relevant opinion words from different domain sources and mapping them to the target domains are herculean tasks as far as domain adaptation is concerned. In this paper, the feature extraction technique is refined by which the mapping task is enhanced. The feature extraction technique uses both the syntactic and semantic properties of the features for extracting similar words. The features are further refined by merging synonyms and by replacing negative polarity terms with the appropriate antonyms. This refinement in the feature selection improves the mapping functionality of the domain adaptation and also exploits the relationship between domain-specific words and domain-independent words from different domains. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Bipartite graph; Cross-domain; Domain adaptation; Domain-independent words; Domain-specific words; Feature merging; Opinion words; Sentiment analysis,20,Information Systems Frontiers,2021 777,Tung W.-F.; Jordann G.,Crowdsourcing social network service for social enterprise innovation,"Social enterprises (SE) have developed various innovative business models to accomplish both social and business values for years. Not few SE’s persons have observed some critical and urgent social issues as well as human problems, but just few SE’s social media or crowdsourcing services can be provided people an efficient way to interact for these social problems. Thus, the research is to solve the need which is an integrative platform of social media and crowdsourcing service to support business innovation of social enterprise. Such a SE-specific crowdsourcing social network service (SNS) facilitate people can obtain the shared resources to further achieve the projects (i.e, volunteer activities) or even start up an innovative SE (i.e., lumni, 20%+, The Big Issue). In order to achieve SE’s charitable objective, this research is to propose and design an integration of social network and crowdsourcing service – HIVE that can provide people to post ideas, share resources, or even attend the crowdsourcing projects by the different resources. Thus, HIVE can give users to seek business opportunities, collect, connect, and users’ data analysis for social and human resources. HIVE even can provide several ways to facilitate human and resource corporations to support SE’s business innovation based on six pre-defined areas of SE and deal with the critical matching process. © 2017, Springer Science+Business Media New York.",Course-related project; Crowdsourcing SNS; HIVE; SE; SE’s startup; Social enterprises,23,Information Systems Frontiers,2017 778,Klievink B.; Romijn B.-J.; Cunningham S.; de Bruijn H.,Big data in the public sector: Uncertainties and readiness,"Big data is being implemented with success in the private sector and science. Yet the public sector seems to be falling behind, despite the potential value of big data for government. Government organizations do recognize the opportunities of big data but seem uncertain about whether they are ready for the introduction of big data, and if they are adequately equipped to use big data. This paper addresses those uncertainties. It presents an assessment framework for evaluating public organizations’ big data readiness. Doing so demystifies the concept of big data, as it is expressed in terms of specific and measureable organizational characteristics. The framework was tested by applying it to organizations in the Dutch public sector. The results suggest that organizations may be technically capable of using big data, but they will not significantly gain from these activities if the applications do not fit their organizations and main statutory tasks. The framework proved helpful in pointing out areas where public sector organizations could improve, providing guidance on how government can become more big data ready in the future. © 2016, The Author(s).",Assessment; Big data; Bold; E-government; Readiness; Use,205,Information Systems Frontiers,2017 779,Krishnaswamy V.; Sundarraj R.P.,Organizational implications of a comprehensive approach for cloud-storage sourcing,"Cloud-computing facilitates consumers to source online storage-services on a pay-as-you-go basis. The sourcing of storage-as-a-service (STaaS) requires a decision maker to contend with several elements such as pricing structure, application characteristics and quality-of-service requirements, in addition to tactical considerations such as risk propensity and supplier diversification. This makes STaaS sourcing a complex task. Discussion on STaaS sourcing models addressing these aspects and their utility to decision-makers is, however, scant. In this paper, we propose a two-stage holistic approach based on Data Envelopment Analysis (DEA) and Goal programming (GP). We derive insights provided by these models from 10800 runs using market-based data. We also use an experiment to assess our hypothesis concerning the impact of task complexity on decision-quality. Both these experiments have implications for different business scenarios in the STaaS market, and for decision-making. We discuss these managerial implications, and present a prototype Decision Support System (DSS) to aid STaaS selection. © 2015, Springer Science+Business Media New York.",Cloud computing; Cloud sourcing; Multicriteria decision-making; Sourcing; STaaS; Storage-as-a-service; Task complexity,3,Information Systems Frontiers,2017 780,Chen L.-C.,Interactive Topic Search System Based on Topic Cluster Technology,"In this paper, we develop an interactive hierarchical topic search system. In our system, the generation of topic names is mainly based on the N-gram statistical language model. The construction of hierarchical tree relationships between topics is mainly based on the concept of mathematical sets. In this study, the concept of mathematical sets not only helps the system to construct a topic hierarchy tree quickly, but also allows different users to use different binary operations to generate different interactive search results. In general, this study has the following three advantages. First, the generated topic names are presented in a hierarchical form rather than a flat form. Secondly, the interactive search for this study was achieved by non-stored user search and click history. Therefore, our approach can avoid personal privacy and large storage space issues. Finally, the concept of mathematical sets not only allows us to generate topic trees in linear time, but also allows users to run all possible binary operations to meet various interactive search needs. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Binary operation; Document clustering; Hierarchical topic relationship; Interactive topic search; Natural language processing,0,Information Systems Frontiers,2021 781,Fecher K.; McCarthy L.; Porreca D.E.; Yaraghi N.,Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices’ Workflow,"To examine whether integration of Health Information Exchange (HIE) services into office workflow would have an impact on ED visits and unplanned 30-day readmission amongst the patients who were treated at the medical practice. We designed and implemented a training program at a medical practice in Western New York over a period of three months between November 2016 and January 2017. During the program, a group of health IT professionals and clinical specialists trained the staff on how to appropriately use and efficiently integrate the HIE services in their workflow. We measured the effectiveness of the program using both qualitative and quantitative methods. We employed an Interrupted Time Series (ITS) analysis to examine the effectiveness of the program on reducing the number of patients who experience an ED visit or an unplanned hospital readmission within 30 days of initial discharge. After the implementation of the training program, the rate of unplanned hospital readmissions reduced by 2.7 patients per 1000 members per month and the rate of ED visits reduced by 6.3 patients per 1000 members per month. The results indicate that educating medical practices on how to efficiently utilize the HIE services, and especially the notification systems will significantly reduce the rate of ED utilization and unplanned 30-day hospital readmissions amongst the patients of medical practices. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Health Information Exchange; Interoperability,11,Information Systems Frontiers,2021 782,Gopalakrishna-Remani V.; Jones R.P.; Camp K.M.,"Levels of EMR Adoption in U.S. Hospitals: An Empirical Examination of Absorptive Capacity, Institutional Pressures, Top Management Beliefs, and Participation","Technology adoption literature generally focuses on behavioral and structural changes necessary for successful adoption. Little explored in that literature is the factors impacting the level of adoption which will be achieved within the organization. This healthcare industry research demonstrates that higher levels of technology adoption in organizations require the influences of both internal absorptive capabilities and external institutional pressures impacting the organization. We surveyed U.S. healthcare employees to assess top management beliefs, top management participation, absorptive capacity, institutional pressures, and level of electronic medical records (EMR) adoption in clinics and hospitals. Our results indicate no direct influence of mimetic and coercive pressures on the level of EMR adoption. Normative and mimetic pressures indirectly influence EMR adoption level through top management participation. Absorptive capacity enhances top management beliefs and participation associated with EMR adoption process, resulting in higher levels of EMR adoption in U.S. hospitals. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Absorptive capacity; Institutional pressures; Level of EMR adoption; Top management beliefs; Top management participation,38,Information Systems Frontiers,2019 783,Sowmya Kamath S.; Ananthanarayana V.S.,Discovering composable web services using functional semantics and service dependencies based on natural language requests,"The processes of service discovery, selection and composition are crucial tasks in web service based application development. Most web service-driven applications are complex and are composed of more than one service, so, it becomes important for application designers to identify the best service to perform the next task in the intended application’s workflow. In this paper, a framework for discovering composable service sets as per user’s complex requirements is proposed. The proposed approach uses natural language processing and semantics based techniques to extract the functional semantics of the service dataset and also to understand user context. In case of simple queries, basic services may be enough to satisfy the user request, however, in case of complex queries, several basic services may have to be identified to serve all the requirements, in the correct sequence. For this, the service dependencies of all the services are used for constructing a service interface graph for finding suitable composable services. Experiments showed that the proposed approach was effective towards finding relevant services for simple & complex queries and achieved an average accuracy rate of 75.09 % in finding correct composable service templates. © 2017, Springer Science+Business Media New York.",Natural language processing; Semantics; Service composition; Web service discovery,8,Information Systems Frontiers,2019 784,Huang X.; Yan F.; Zhang L.; Wang K.,HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks,"Code reuse attacks such as Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) are the prevalent attack techniques which reuse code snippets named gadget in vulnerable applications and hijack control flow to achieve malicious behaviors. Existing defense techniques for code reuse attacks attempt to prevent illegal control flow transition or make locating gadgets a hard work. However, decades of the arms race proved the ability to detect and prevent advanced attacks is still outdated. In this paper, we propose HoneyGadget, a deception based approach for detecting code reuse attacks. HoneyGadget works by inserting honey gadgets into the application as decoys and keep track of their addresses once the application is loaded. During the execution phase, HoneyGadget traces the execution records using Last Branch Record (LBR), compares the LBR records with the maintained address list, and alarms code reuse attacks if some records match. HoneyGadget not only prevents code reuse attacks, but also provides LBR records for researchers to analyze patterns of these attacks. We have developed a fully functioning prototype of HoneyGadget. Our evaluation results show that HoneyGadget can capture code reuse attacks effectively and only incurs a modest performance overhead. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Control flow; Deception; Gadgets insertion; Last Branch Record,9,Information Systems Frontiers,2021 785,Rahman M.; Bose S.; Babu M.M.; Dey B.L.; Roy S.K.; Binsardi B.,Value Co-Creation as a Dialectical Process: Study in Bangladesh and Indian Province of West Bengal,"The process by which technological innovation is adopted and diffused within an industry persists as a key research interest in the existing literature. Furthermore, the innovation and diffusion of ICT (information and communications technology) in general and smartphones in particular are viewed as a useful resource to support and foster socio-economic wellbeing in developing countries. As such, sustainable design and development of smartphone industry in developing world and their contribution to socio-economic wellbeing has drawn significant research attention. In the current study, we explore and analyse various factors and their inter-relationships that initiate, support and disseminate technological innovation within the smartphone industry in Bangladesh and Indian province of West Bengal who share linguistic, historical and cultural ties. Drawing on the concept of co-creation of value we develop a dialectical perspective toward multi-stakeholder involvement in smartphone industry’s creation of value. Through in-depth interviews with senior government and private sector employees, industry experts, researchers, and small and medium enterprise owners, we conclude that the development of ancillary industries, contextually appropriate apps and innovation by small enterprises and inter-industry collaborations contribute to current and future innovation and sustainable development of smartphone industry. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Dialectic co-creation; ICT for development; Smart technology; Smartphones,31,Information Systems Frontiers,2019 786,Bashir S.; Qamar U.; Khan F.H.,WebMAC: A web based clinical expert system,"Disease diagnosis at early stages can enable the physicians to overcome the complications and treat them properly. The diagnosis method plays an important role in disease diagnosis and accuracy of its treatment. A diagnosis expert system can help a great deal in identifying those diseases and describing methods of treatment to be carried out; taking into account the user capability in order to deal and interact with expert system easily and clearly. A good way to improve diagnosis accuracy of expert systems is use of ensemble classifiers. The proposed research presents an expert system using multi-layer classification with enhanced bagging and optimized weighting. The proposed method is named as “M2-BagWeight” which overcomes the limitations of individual as well as other ensemble classifiers. Evaluation of the proposed model is performed on two different liver disease datasets, chronic kidney disease dataset, heart disease dataset, diabetic retinopathy debrecen dataset, breast cancer dataset and primary tumor dataset obtained from UCI public repository. It is clear from the analysis of results that proposed expert system has achieved high classification and prediction accuracy when compared with individual as well as ensemble classifiers. Moreover, an application named “WebMAC” is also developed for practical implementation of proposed model in hospital for diagnostic advice. © 2016, Springer Science+Business Media New York.",Bagging; Disease prediction; Ensemble technique; Expert system; Machine learning; Multi-layer,9,Information Systems Frontiers,2018 787,Mouakket S.; Sun Y.,Investigating the Impact of Personality Traits of Social Network Sites Users on Information Disclosure in China: the Moderating Role of Gender,"Social network sites (SNS) are a very popular method of online communication among university students, where users are willing to share personal and private information with other users. The purpose of this research is to investigate the possible relationships between personality traits, perceived usefulness, perceived enjoyment and information self-disclosure within SNS context. In addition, we extend our framework by investigating the moderating effect of gender on all the proposed relationships in the model. A questionnaire is developed and the convenient sampling technique is used to collect data from university students in China. Structural equation modeling approach is applied to examine the influence of personality traits on perceived usefulness and perceived enjoyment of SNS, which subsequently will positively influence users’ self-disclosure of information on SNS. Our results reveal that some personality traits consider SNS to be useful, while other personality traits consider SNS to be enjoyable. In addition, perceived enjoyment and perceived usefulness have positive influence on users’ disclosure of information on SNS. Furthermore, our findings suggest that gender differences has produced different influences between the different relations in the model. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Gender; Information disclosure; Personality traits; Social network sites,18,Information Systems Frontiers,2020 788,Ghrab A.; Romero O.; Skhiri S.; Zimányi E.,TopoGraph: an End-To-End Framework to Build and Analyze Graph Cubes,"Graphs are a fundamental structure that provides an intuitive abstraction for modeling and analyzing complex and highly interconnected data. Given the potential complexity of such data, some approaches proposed extending decision-support systems with multidimensional analysis capabilities over graphs. In this paper, we introduce TopoGraph, an end-to-end framwork for building and analyzing graph cubes. TopoGraph extends the existing graph cube models by defining new types of dimensions and measures and organizing them within a multidimensional space that guarantees multidimensional integrity constraints. This results in defining three new types of graph cubes: property graph cubes, topological graph cubes, and graph-structured cubes. Afterwards, we define the algebraic OLAP operations for such novel cubes. We implement and experimentally validate TopoGraph with different types of real-world datasets. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Graph cube; Graph mining; Graph processing; Multidimensional graph; OLAP cube,6,Information Systems Frontiers,2021 789,Singh J.P.; Kumar A.; Rana N.P.; Dwivedi Y.K.,Attention-Based LSTM Network for Rumor Veracity Estimation of Tweets,"Twitter has become a fertile place for rumors, as information can spread to a large number of people immediately. Rumors can mislead public opinion, weaken social order, decrease the legitimacy of government, and lead to a significant threat to social stability. Therefore, timely detection and debunking rumor are urgently needed. In this work, we proposed an Attention-based Long-Short Term Memory (LSTM) network that uses tweet text with thirteen different linguistic and user features to distinguish rumor and non-rumor tweets. The performance of the proposed Attention-based LSTM model is compared with several conventional machine and deep learning models. The proposed Attention-based LSTM model achieved an F1-score of 0.88 in classifying rumor and non-rumor tweets, which is better than the state-of-the-art results. The proposed system can reduce the impact of rumors on society and weaken the loss of life, money, and build the firm trust of users with social media platforms. © 2020, The Author(s).",Deep learning; Machine learning; Rumor; Twitter,58,Information Systems Frontiers,2022 790,Hansen R.R.; Larsen K.G.; Olesen M.C.; Wognsen E.R.,Formal modelling and analysis of Bitflips in ARM assembly code,"Bitflips, or single-event upsets (SEUs) as they are more formally known, may occur for instance when a high-energy particle such as a proton strikes a CPU and thereby corrupting the contents of an on-chip register, e.g., by randomly flipping one or more bits in that register. Such random changes in central registers may lead to critical failure in the execution of a program, which is especially problematic for safety- or security-critical applications. Even though SEUs are well studied in the literature, relatively little attention have been given to the formal modelling of SEUs and the application of formal methods to mitigate the consequences of SEUs. In this paper we develop a formal semantic framework for easy formal modelling of a large variety of SEUs in a core assembly language capturing the essential features of the ARM assembly language. Based on the semantic framework, we derive and formally prove correct a static analysis that enforces so-called blue/green separation in a given program. Static blue/green separation is a language-based fault detection technique relying on inlined replication of critical code. A program that has proper blue/green separation is shown to be fault-tolerant with respect SEUs in data registers. However, this technique requires specialised hardware support in order to achieve full coverage. We therefore use our semantic framework to further develop so-called gadgets, essentially small code fragments that emulate the behaviour of blue/green instructions in a safe manner. The gadgets allow us to achieve partial blue/green separation without specialised hardware support. Finally, we show how our semantic framework can be used to extract timed-automata models of ARM assembler code programs. We then apply statistical model checking to these timed-automata models enabling us to model, analyse, and quantify program behaviour in the presence of fault models that go well beyond data-flow SEUs, e.g., bitflips in program counters or in the code itself. We use this approach to provide evidence that our suggested program modifications, i.e., the use of gadgets, significantly decrease the probability of such faults going undetected. © 2016, Springer Science+Business Media New York.",Biflips; Model checking; Single-event upsets; Static analysis,3,Information Systems Frontiers,2016 791,Ghobadi S.; Campbell J.; Clegg S.,Pair programming teams and high-quality knowledge sharing: A comparative study of coopetitive reward structures,"There has been a growing research interest in understanding knowledge sharing in agile development. Yet, empirical research that sheds light on its underlying practices, such as pair programming, is evolving. This study uses insights from coopetition and software literature to focus inquiry on the relation between coopetitive rewards and high-quality knowledge sharing in pair programming teams. Theoretical hypotheses are developed and validated, suggesting that: ‘coopetitive rewards influence high-quality knowledge sharing both directly and over time through their impact on the level of knowledge sharing satisfaction’, and, ‘the impact of coopetitive rewards on high-quality knowledge sharing is dependent upon task complexity and the history of working under similar reward structure’. This study generates new understanding related to the use of rewards in pair programming teams, and offers a rigorous and replicable seven-step experimental process for simulating coopetitive structures and investigating their role in pair programming and in similar collaborative contexts. © 2015, Springer Science+Business Media New York.",Agile development; Competition; Competitive reward; Cooperation; Coopetition; Information sharing; Knowledge sharing; Pair programming; Rewards; Software team,23,Information Systems Frontiers,2017 792,Chen J.V.; Lu I.-H.; Yen D.C.; Widjaja A.E.,Factors affecting the performance of internal control task team in high-tech firms,"The rise of global trade and economic development is not only apparently grown in terms of volume but with value as well. Such spurt has evoked the risk management that is associated with export business, and can allow high-tech items fall into the hands of foreign military programs or terrorist organizations. The internal control compliance for export has set the in-house procedures for firms to adopt, facilitate, and abide with defined national export control requirements. This is crucial for firms to prevent potential violations on export rules and regulations. Introducing internal control program for export compliance can mitigate terrorist activities. This present study has taken Taiwan on board to determine the acquaintance of export risk and the implementation of internal control program through a team effort. Hence, the purpose of this study is to investigate the factors affecting the performance of internal control task team within a firm. The findings show that team-based incentives have a positive impact on team cohesion while knowledge sharing and knowledge integration have a significant impact on team performance. Furthermore, it is found that higher social-related risks and technical-related risks may increase team management risk, and the reduction in team management risk is beneficial to improve team performance. © 2016, Springer Science+Business Media New York.",Export control compliance; Internal control; Knowledge sharing; Risk management; Team cohesion; Team performance,5,Information Systems Frontiers,2017 793,Gong Y.,Estimating participants for knowledge-intensive tasks in a network of crowdsourcing marketplaces,"Crowdsourcing has become an increasingly attractive practice for companies to abstain on-demand workforce and higher level of flexibility in open contexts. While knowledge-intensive crowdsourcing is expected to be prosperous, most current crowdsourcing calls are still about general and low-priced tasks. An obstacle of conducing knowledge-intensive crowdsourcing is the lack of diversity of expertise and the small scale of crowd in isolated crowdsourcing marketplaces. In this paper, a network of crowdsourcing marketplaces is envisioned for efficient knowledge-intensive crowdsourcing and engagement of massive and diverse participants across different marketplaces. Based on an algorithm for estimating participants for knowledge-intensive crowdsourcing tasks, an experiment with 100 simulations indicates that conducting crowdsourcing tasks in a network of crowdsourcing marketplaces results in higher customer satisfaction than doing that in isolated marketplaces. This finding advocates the development of a network of crowdsourcing marketplaces to open up the potential of knowledge-intensive crowdsourcing. © 2016, Springer Science+Business Media New York.",Estimation algorithm; Flexibility; Knowledge-intensive crowdsourcing; Search friction,22,Information Systems Frontiers,2017 794,Wang Y.-N.; Jin L.; Mao H.,Farmer Cooperatives’ Intention to Adopt Agricultural Information Technology—Mediating Effects of Attitude,"Based on the technology acceptance model and technology–organization–environment framework, this study has developed a new model to explain the adoption of agricultural information technology (AIT) by farmer cooperatives from the combination perspective of individual and organization using four factors: cooperatives’ factors, environmental factors, technological factors, and leaders’ attitude towards AIT. Data was collected from a survey of farmer cooperatives and was analyzed using structural equation modelling. The model showed a good fit with findings indicating that the cooperatives’ and environmental factors positively influence the intentions of farmer cooperatives to adopt AIT. Again, the results depict that the technological factors have no significant effect. Leaders’ attitude towards AIT has a mediating effect on the relationships between the environmental, the cooperatives’, as well as the technological factors and the intentions to adopt AIT. The results will guide promotional strategies by technology providers and help government agencies better optimize policies to promote widespread use of AIT. © Springer Science+Business Media, LLC, part of Springer Nature 2019.",Agricultural information technology; Farmer cooperatives; Intention to adopt; Structural equation modelling,76,Information Systems Frontiers,2019 795,Künsemöller J.; Zhang N.; Berg K.; Soares J.,A game-theoretic evaluation of an ISP business model in caching,"Internet traffic volume is increasing and this causes scalability issues in content delivery. This problem can be addressed with different types of caching solutions. The incentives of different stakeholders to pay for these solutions are not known. However, it has been identified that Internet service providers (ISPs) need to be involved in the process of cache deployment due to their ownership of the network. This work evaluates a new business model where ISPs charge content providers (CPs) for a caching service because CPs benefit from more efficient content distribution. We provide conditions for sustainable paid in-network caching and their numerical evaluation in order to aid strategic decision-making by CPs, ISPs, and Cloud storage providers (CSPs). Although ISP caching as a paid service may not be an equilibrium, it turns out to be Pareto optimal at the right pricing. This encourages cooperation between CPs and ISPs. CSPs may choose cache friendly physical locations for their facilities in order to provide the necessary capacity to the ISPs. However, the required amounts are in all likelihood too small to be an incentive for the CSPs. ISP caching as a paid service can be an equilibrium when future benefits are considered and when the ISPs terminate caching-related improvements of service quality for clients who do not pay for caching. © 2016, Springer Science+Business Media New York.",Business model; Caching; Cloud storage; Content distribution,7,Information Systems Frontiers,2017 796,Zhang L.; Shen B.; Barnawi A.; Xi S.; Kumar N.; Wu Y.,FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia,"Existing deep learning technologies generally learn the features of chest X-ray data generated by Generative Adversarial Networks (GAN) to diagnose COVID-19 pneumonia. However, the above methods have a critical challenge: data privacy. GAN will leak the semantic information of the training data which can be used to reconstruct the training samples by attackers, thereby this method will leak the privacy of the patient. Furthermore, for this reason, that is the limitation of the training data sample, different hospitals jointly train the model through data sharing, which will also cause privacy leakage. To solve this problem, we adopt the Federated Learning (FL) framework, a new technique being used to protect data privacy. Under the FL framework and Differentially Private thinking, we propose a Federated Differentially Private Generative Adversarial Network (FedDPGAN) to detect COVID-19 pneumonia for sustainable smart cities. Specifically, we use DP-GAN to privately generate diverse patient data in which differential privacy technology is introduced to make sure the privacy protection of the semantic information of the training dataset. Furthermore, we leverage FL to allow hospitals to collaboratively train COVID-19 models without sharing the original data. Under Independent and Identically Distributed (IID) and non-IID settings, the evaluation of the proposed model is on three types of chest X-ray (CXR)images dataset (COVID-19, normal, and normal pneumonia). A large number of truthful reports make the verification of our model can effectively diagnose COVID-19 without compromising privacy. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19; Differential privacy; Federated learning; Generative adversarial networks; Privacy protection,107,Information Systems Frontiers,2021 797,Bououd I.; Skandrani S.R.; Boughzala I.; Makhlouf M.,"Impact of object manipulation, customization and social loafing on competencies management in 3D Virtual Worlds","3D Virtual Worlds (VW) are rich and promising collaboration tools limitedly introduced to support competence management, yet, extensively used to enhance knowledge sharing (KS) and support knowledge application (KA). Nevertheless, KS and KA represent a challenging medium to leverage individual as well as organization’s competencies. Characterized by a realistic visual dimension in representing work environment and a growing capacity of simulation, 3D platforms facilitate and value competence formation. Present study analyzes role of 3D VW technology unique characteristics (i.e. object manipulation and avatar and 3D environment customization) and specific personal character social loafing, on competencies acquisition. Individual performance and organizational performance were measured to assess individual and organizational competences. Answers from 144 users of 3D VWs were analyzed. Results show that social loafing has significant negative effect on knowledge sharing. Customization and object manipulation have significant, yet small moderating effect on 3D VW technology use and knowledge sharing. KS subsequent effect on KA, individual and organizational competencies are significant. Limitations and new research directions are presented. © 2016, Springer Science+Business Media New York.",3D Virtual World technology; Competence management; Individual performance; Knowledge application; Knowledge sharing; Team performance; Technology use,13,Information Systems Frontiers,2016 798,Xue G.; Xu J.; Wu H.; Lu W.; Xu L.,Incentive Mechanism for Rational Miners in Bitcoin Mining Pool,"Bitcoin is one of the most popular cryptocurrency in the world. Miners in the Bitcoin network reduce their risks through participating in mining pool. Existing mining pool systems do not consider the cost and strategy of miners. In this paper, we study two mining models: public cost model and private cost model. For the public cost model, we design an incentive mechanism, called Mining game, using a Stackelberg game. We show that Mining game is individually rational, profitable, and has the unique Stackelberg Equilibrium. For the private cost model, we formulate the Budget Feasible Reward Optimization (BFRO) problem to maximize the reward function under the budget constraint, and design a budget feasible reverse auction to solve the BFRO problem, which is computationally efficient, individually rational, truthful, budget feasible, and constant approximate. Through extensive simulations, we evaluate the performance and validate the theoretical properties of our incentive mechanisms. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Auction; Bitcoin; Incentive mechanism; Mining pool; Nash equilibrium,21,Information Systems Frontiers,2021 799,Al-Muwil A.; Weerakkody V.; El-haddadeh R.; Dwivedi Y.,Balancing Digital-By-Default with Inclusion: A Study of the Factors Influencing E-Inclusion in the UK,"Digital inclusion research has been critically important in drawing an understanding of how policies, society, organisations, and information technologies can all come together within a national environment that aspires to be a digital nation. This research aims to examine the factors influencing e-Inclusion in the UK within a digital-by-default policy for government services. This study is pursued through combining the Decomposed Theory of Planned Behaviour (DTPB) with Use and Gratification Theory (U&G) and conducting a self-administered survey targeting 510 Internet users to study the level of citizens engagement with e-government services in the UK. By incorporating gratification, trust, risk and external factors (i.e. self-efficacy, accessibility, availability, affordability) within DTPB, the proposed model of e-Inclusion used in the paper demonstrates a considerable explanatory and predictive power and offers a frame of reference to study the acceptance and usage of e-government within a national context where nearly all government transactions are digital-by-default. The findings revealed six dimensions as key inhibitors for e-Inclusion, namely: demographic, economic, social, cultural, political, and infrastructural. © 2019, The Author(s).",Digital-by-default; E-government; E-inclusion; Government services; UK,49,Information Systems Frontiers,2019 800,Swain A.K.; Cao R.Q.,Using sentiment analysis to improve supply chain intelligence,"Analysis of comments and opinions expressed in social media can be used to gather additional intelligence via market research information to better predict consumer behavior. The area of “opinion mining”, particularly sentiment analysis, aims to find, extract, and systematically analyze people’s opinions, attitudes and emotions towards certain topics. Performance of a supply chain is closely associated with the level of trust, collaboration, and information sharing among its members. In this paper, using textual “sentiment analysis”, we explore the relationship between elements of social media content generated by supply chain members and performance of supply chain. In particular, we identify specific elements of member generated supply chain related content on social media such as: information sharing, collaboration, trust, and commitment to determine their association with supply chain performance. We find information sharing and collaboration to be positively associated with supply chain performance, and these findings are consistent with previous reports in supply chain literature. In addition, ours is one of the first attempts to use sentiment analysis to analyze social media content in a supply chain context. The findings indicate that supply chain members value the sharing of relevant information and collaborative contents on social media as such efforts improve individual and overall supply chain performance. The results of this study should prove useful to other studies that utilize social media in a supply chain context, and to improve supply chain management strategies. © 2017, Springer Science+Business Media New York.",And supply chain management; Intelligent decision making; Sentiment analysis; Social media; Social network analysis,52,Information Systems Frontiers,2019 801,Kim Y.J.; Kim C.Y.; Shin Y.J.,The effects of ubiquitous healthcare service on the south Korean Economy: using input–output analysis,"Due to the rapid market penetration of smartphones and the development of context-aware ubiquitous healthcare services, the demand for ubiquitous healthcare service—to monitor patients’ longitudinal health data continuously and cope with emergency situations—has rapidly increased. Recent developments have suggested that researchers need to provide policy-makers with accessible and reliable information regarding the role of ubiquitous healthcare services. The objective of this study is to investigate the impact of ubiquitous healthcare services on the South Korean economy, using a static input–output approach. We address topics relating to the input–output model, such as the demand-driven model and inter-linkage effects, and the components inherent in an unconventional input–output model, such as the supply-driven model and the Leontief price model. The results indicate that the ubiquitous healthcare industry as a final primary production sector has strong production-inducing effects, weak price ripple effects, and marginal backward and forward linkage effects. It is also found that the industry is closely related to the electric and electronic device sector and the precision machinery sector. This is largely attributable to the convergence characteristics of industries that use wireless telecommunications, as well as those of the medical and measurement device and medical service sectors. © 2016, Springer Science+Business Media New York.",Demand-driven model; Input–output analysis; Inter-linkage effects; Leontief price model; Supply-driven model; Telemedicine; Ubiquitous healthcare,15,Information Systems Frontiers,2017 802,Karumur R.P.; Nguyen T.T.; Konstan J.A.,"Personality, User Preferences and Behavior in Recommender systems","This paper reports on a study of 1840 users of the MovieLens recommender system with identified Big-5 personality types. Based on prior literature that suggests that personality type is a stable predictor of user preferences and behavior, we examine factors of user retention and engagement, content preferences, and rating patterns to identify recommender-system related behaviors and preferences that correlate with user personality. We find that personality traits correlate significantly with behaviors and preferences such as newcomer retention, intensity of engagement, activity types, item categories, consumption versus contribution, and rating patterns. © 2017, Springer Science+Business Media, LLC.",Big-five personality traits; Newcomer retention; Personality; Recommender systems; User preferences,54,Information Systems Frontiers,2018 803,Rathee A.; Chhabra J.K.,Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java Beans,"Object-based software development in the IT-industry during the last decade has focused on reusing the already developed elements. Current software development models and technologies promote software reuse by utilizing component-oriented programming. Component-oriented programming provides more effective reuse as compared to its object-oriented language counterpart. This is because a component provides more abstractness in terms of the functionality in contrast to the object-oriented software element (e.g. class/ interface). The component-based development is highly dependent on the availability of the component library that contains well-defined and already tested functionality in terms of the available components. However, the suitable availability of such component library is still a problem. The lack of a suitable component library is tackled either by designing new components from scratch or by identifying them from the existing software systems. These identified components must be transformed as per component models, such as a Java Bean, in order to increase software reuse and faster software development, and little research has been carried out in this direction. Although many approaches have been proposed to identify components from existing systems and build a component library. But, such approaches lack in transforming the identified components as per specifications of a component model. Further identification of reusable elements also needs to be more accurate and efficient. Accuracy is dependent on the structural and semantic properties of a component. A component can consist of a single or a group of individual elements of the software, and thus identifying components from a set of all elements becomes an exponentially growing problem. Such problems can be more efficiently solved using metaheuristic algorithms. Therefore, this paper targets identifying accurately the components from a singular existing software system and transform those identified components to the Java Bean component model standard. The component identification approach of this paper is based on clustering the underlying software system by utilizing a metaheuristic search-based PSO algorithm. The clusters are identified as a group containing 2/ 3/ 4 software elements. Moreover, the used fitness function is based on the structural (based on usage for member variables) and semantic relations belonging to a software. Since the PSO algorithm is generally applied to continuous problems, whereas our formulated component identification problem is discrete (due to the representation of particles) in nature. Therefore, we have also provided a mechanism through which the PSO algorithm is modified to become applicable to discrete problems. From the obtained clusters (components), the interfaces of the components are identified by identifying independent chains in call-graphs of the underlying components. Finally, these components are transformed as per the Java Bean component model specifications. The proposed approach is validated experimentally on 7 open-source object-oriented Java software systems and results are compared with competitive approaches. The obtained results confirm the correctness of the transformed component and hence their reusability. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Component extraction; Discrete PSO; Frequent usage patterns; Interface identification; Java beans; Modelling; Reusable component,7,Information Systems Frontiers,2020 804,Prabono A.G.; Yahya B.N.; Lee S.-L.,Atypical Sample Regularizer Autoencoder for Cross-Domain Human Activity Recognition,"The sensor-based human activity recognition (HAR) using machine learning requires a sufficiently large amount of annotated data to realize an accurate classification model. This requirement stimulates the advancement of the transfer learning research area that minimizes the use of labeled data by transferring knowledge from the existing activity recognition domain. Existing approaches transform the data into a common subspace between domains which theoretically loses information, to begin with. Besides, they are based on the linear projection which is bound to linearity assumption and its limitations. Some recent works have already incorporated nonlinearity to find a latent representation that minimizes domain discrepancy based on an autoencoder that includes statistical distance minimization. However, such approach discovers latent representation for both domains at once, which causes sub-optimal representation because both domains compensate each other’s reconstruction error during the training. We propose an autoencoder-based approach on domain adaptation for sensor-based HAR. The proposed approach learns a latent representation which minimizes the discrepancy between domains by reducing statistical distance. Instead of learning representation of both domains simultaneously, our method is a two-phase approach which first learns the representation for the domain of interest independently to ensure its optimality. Subsequently, the useful information from the existing domain is transferred. We test our approach on the publicly available sensor-based HAR datasets, using cross-domain setup. The experimental result shows that our approach significantly outperforms the existing ones. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Autoencoder; Human activity recognition; Machine learning; Transfer learning,16,Information Systems Frontiers,2021 805,Yassaee M.; Mettler T.,Digital Occupational Health Systems: What Do Employees Think about it?,"A high rate of work-related accidents or diseases around the world not only threatens the health and wellbeing of employees, but also causes a considerable annual economic burden for organizations. One promising use of information technology would therefore be the management and prevention of occupational accidents and employee absenteeism. Although some companies are starting to introduce digital occupational health initiatives, there is scarce evidence about the inhibiting factors which may discourage the wide adoption of such systems in the workforce. This paper presents qualitative and quantitative data of an exploratory study, which delves into the perceptions of employees towards the use of digital occupational health systems. Our results show that employees are usually aware of the enhanced possibilities for managing and improving their health and wellbeing through such corporate initiatives. However, privacy concerns and the additional mental pressure caused by such systems, significantly diminishes an employee’s willingness to adopt them. © 2017, Springer Science+Business Media, LLC.",Digital occupational health; Mixed methods; Sensor-based systems; Technology adoption,23,Information Systems Frontiers,2019 806,Abedin B.; Babar A.,Institutional vs. Non-institutional use of Social Media during Emergency Response: A Case of Twitter in 2014 Australian Bush Fire,"Social media plays a significant role in rapid propagation of information when disasters occur. Among the four phases of disaster management life cycle: prevention, preparedness, response, and recovery, this paper focuses on the use of social media during the response phase. It empirically examines the use of microblogging platforms by Emergency Response Organisations (EROs) during extreme natural events, and distinguishes the use of Twitter by EROs from digital volunteers during a fire hazard occurred in Australia state of Victoria in early February 2014. We analysed 7982 tweets on this event. While traditionally theories such as World System Theory and Institutional Theory focus on the role of powerful institutional information outlets, we found that platforms like Twitter challenge such notion by sharing the power between large institutional (e.g. EROs) and smaller non-institutional players (e.g. digital volunteers) in the dissemination of disaster information. Our results highlight that both large EROs and individual digital volunteers proactively used Twitter to disseminate and distribute fire related information. We also found that the contents of tweets were more informative than directive, and that while the total number of messages posted by top EROs was higher than the non-institutional ones, non-institutions presented a greater number of retweets. © 2017, Springer Science+Business Media, LLC.",Australian case study; Community resilience; Emergency response organisations; Social media; Twitter,79,Information Systems Frontiers,2018 807,Silic M.; Lowry P.B.,Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes,"What is happening in hacker’s minds when they are committing criminal activities? How black hat hackers manage nerves, which is about managing fear and underlying emotions, and which tactics they employ during their decision-making process before, during and after committing a crime, is the question that could provide some initial insights on hacker’s trajectories, their switch from black hat to white hat and ultimately about their behaviors and motivations. The main difficulty in answering this question resides with the access to hacker’s data. To address this gap, we conducted interviews with 16 black hat hackers. Supported by the general strain theory and routine activity theory, we identified five techniques that they use to manage their nerves: shunting, minimization, plan B, thrill, and lens widening techniques. Each of these techniques help hackers to better manage their nerves and consequently, learn how to better cope with the fear. During their psychological decision-making processes, hackers use these five techniques to create a new mindset, behind which they hide, with the objective of minimizing and mitigating the inherent risks they encounter during their criminal activities. The theoretical importance of nerve is the key to a better understanding of black hat hacker’s illegal acts, their behaviors and ultimately their actions. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Black hat hacker; Criminology nerve management; General strain theory; Routine activity theory (RAT); Security,13,Information Systems Frontiers,2021 808,Zhang C.; Feng N.; Chen J.; Li D.; Li M.,Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities,"Firms in a close business partnership could choose to either outsource to the same or different Managed Security Service Providers (MSSPs) when making outsourcing decisions. Apart from security investments, compensation ratios, and network externalities, the firms in a close business partnership face the new challenge of correlated loss when making the outsourcing decisions. We first show that if the two firms in the business partnership outsource to the same MSSP, the security investments on the two firms are greater under positive externalities and vice versa. More importantly, we further find out that under positive externality the two firms are better off outsourcing to the same MSSP if the correlated loss level is lower (greater) than a threshold when the compensation ratios are less (greater) than 1; under negative externality the two firms are better off outsourcing to the same MSSP if the correlated loss level is lower (greater) than a threshold when the compensation ratios are greater (less) than 1. Our analytical results offer important managerial implications to firms in a close business partnership when deciding on their outsourcing strategies. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Correlated loss; Information security; Moral hazard; Outsourcing strategy; Security externality,8,Information Systems Frontiers,2021 809,Motiwalla L.; Deokar A.V.; Sarnikar S.; Dimoka A.,Leveraging Data Analytics for Behavioral Research,"Behavioral research in information systems employing quantitative methods has traditionally relied on mainly survey-based approaches to gather subjective user data. With new advances in technology such as mobile computing, wearable devices, and social media, along with computational capabilities, organizations are in a position to leverage objective data in addressing IT issues typically addressed in behavioral research. In this paper, we propose a framework for envisioning how data analytics may be leveraged in conducting behavioral research. Particularly, the framework is explained using examples from extant research along two broad avenues, namely ‘data analytics for data generation’ and ‘data analytics for model generation.’ The article also serves as an introduction to the special issue of the Information Systems Frontiers (ISF) journal on the topic of ‘Data Analytics in Behavioral Research.’. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Behavioral research; Data analytics; Data generation; Model generation,25,Information Systems Frontiers,2019 810,O’ Connor Y.; O’ Reilly P.,Examining the infusion of mobile technology by healthcare practitioners in a hospital setting,"While mobile Health (mHealth) holds much potential, the infusion of mHealth is still in its infancy and has yet to achieve sufficient attention in the Information Systems field. As a result, the objective of this paper is to identify the (a) determinants for successful infusion of mHealth by healthcare practitioners and (b) benefits healthcare practitioners perceive from infusing mHealth. A sequential mixed methods approach (case study and survey) is employed to achieve this objective. The study contributes to IS theory and practice by: (1) developing a model with six determinants (Availability, Self-Efficacy, Time-Criticality, Habit, Technology Trust, and Task Behaviour) and three individual performance-related benefits associated with mHealth infusion (Effectiveness, Efficiency, and Learning), (2) exploring undocumented determinants and relationships, (3) identifying conditions that both healthcare practitioners and organisations can employ to assist with mHealth infusion and (4) informing healthcare organisations and vendors as to the performance of mHealth in post-adoptive scenarios. © 2016, Springer Science+Business Media New York.",Infusion; mHealth; Post-adoption,27,Information Systems Frontiers,2018 811,Das S.; Mukhopadhyay A.; Saha D.; Sadhukhan S.,A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETs,"Information security breaches are of major concern for healthcare mobile ad-hoc networks (h-MANETs). In this paper, we propose a model that identifies and assesses risk in an h-MANET deployed by a healthcare institution in a disaster-prone region a priori by modeling the possible routes a hacker might follow to compromise a target. Our model proposes a novel method to compute the transition probability of each hop in the h-MANET. Next, it employs Markov theory to compute the maximum and minimum number of hops required to compromise the target for a given source-target pair. It then determines the vulnerability for all the paths comprising minimum to maximum hops only for each pair by computing their overall transition probability. Finally, our model computes the risk associated with each of these paths. Based on the calculated risk level of each path, the management can recommend an appropriate risk mitigation strategy. © 2017, Springer Science+Business Media, LLC.",Direction-based diurnal mobility; Healthcare MANET; Markov theory; Risk assessment; Risk mitigation; Transition probability,20,Information Systems Frontiers,2019 812,Cao X.; Khan A.N.; Ali A.; Khan N.A.,Consequences of Cyberbullying and Social Overload while Using SNSs: A Study of Users’ Discontinuous Usage Behavior in SNSs,"This study responds to a current phenomenon where individuals experience distress and exhaustion caused by cyberbullying and social overload while using social networking sites (SNSs). Social cognitive theory suggests that this phenomenon is caused by the interactive influences of environmental, personal, and behavioral factors, which are key unique drivers of SNS discontinuous usage intentions. This study focuses on how cyberbullying and social overload (environmental) induce distress and SNS exhaustion (personal), thereby affecting an individual’s intention to voluntarily abandon the use of SNSs (behavioral). The purpose model is tested through a sample of 314 SNS users. Empirical results indicate that cyberbullying and social overload exert a considerable impact on distress and SNS exhaustion, both of which further increase users’ intention to discontinue their usage of SNSs. This article concludes with several theoretical and practical contributions, limitations, and future research directions. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cyberbullying; Discontinuous intention; Distress; SNS exhaustion; Social overload,116,Information Systems Frontiers,2020 813,Weeger A.; Wang X.; Gewald H.; Raisinghani M.; Sanchez O.; Grant G.; Pittayachawan S.,Determinants of Intention to Participate in Corporate BYOD-Programs: The Case of Digital Natives,"Corporations continue to see a growing demand for Bring-Your-Own-Device (BYOD) programs which allow employees to use their own computing devices for business purposes. This study analyses the demand of digital natives for such programs when entering the workforce and how they perceive the benefits and risk associated with BYOD. A theoretical model building on net valence considerations, technology adoption theories and perceived risk theory is proposed and tested. International students from five countries in their final year and with relevant work experience were surveyed. The results show that the intention to enroll in a BYOD program is primarily a function of perceived benefits while risks are widely ignored. Only safety and performance risks proved to contribute significantly to the overall perceived risk. The knowledge acquired from this study is particularly beneficial to IT executives as a guide to deciding whether and how to set up or adjust corporate BYOD initiatives. © 2018, The Author(s).",Behavioral intention; Bring-your-own-device (BYOD); Digital natives; Information technology consumerization; Net valence model,27,Information Systems Frontiers,2020 814,Pereira G.V.; Macadar M.A.; Luciano E.M.; Testa M.G.,Delivering public value through open government data initiatives in a Smart City context,"By using ICT in an innovative way, governments can improve the delivery of services and interaction with stakeholders. Open data is a way to help public organizations became more open and improve interaction with stakeholders. This paper aims to identify what are the public values enhancements acquired on smart city environment that discloses open data. We propose a conceptual model to analyze the smart city initiative. We contextualized the model taking a smart city domain by analyzing three related-initiatives that comprises open data in a smart city case carried at Rio de Janeiro Operations Center (COR) in Brazil by seven deep-interviewees directly involved - from inside and outside – in this case. The findings reveal evidences that open data initiatives contribute to enhance the delivery of public value in smart city contexts. © 2016, The Author(s).",E-government; Open government data; Operations Center of Rio de Janeiro; Public value; Smart cities,233,Information Systems Frontiers,2017 815,Duran M.B.; Mussbacher G.,Investigation of feature run-time conflicts on goal model-based reuse,"A fundamental task when reusing software artifacts is to determine the most appropriate artifact for the current reuse context. Goal modeling allows modelers to capture the advantages and disadvantages of reusable candidate artifacts, which in turn helps reason about the most appropriate candidate artifact. However, goal models are rarely used in isolation for the description of an artifact, but are combined with other models that impose additional constraints on the most appropriate candidate. Furthermore, reusable artifacts are assembled into reuse hierarchies to realize an application. This paper presents a novel goal model evaluation mechanism for the selection of the most appropriate candidate, which (i) takes into account additional configuration constraints expressed with feature models and run-time constraints expressed with workflow models that may affect the selection of reusable software artifacts, (ii) considers reuse hierarchies, and (iii) establishes a history of design decisions. Furthermore, a proof-of-concept implementation of the novel evaluation mechanism is discussed. © 2016, Springer Science+Business Media New York.",Feature modeling; Goal model evaluation; Goal-oriented Requirement Language; Reuse; User Requirements Notation; Workflow modeling,16,Information Systems Frontiers,2016 816,Clapham B.; Siering M.; Gomber P.,Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets,"Algorithmic decision-making plays an important role in financial markets. Current tools in trading focus on popular companies which are discussed in thousands of news items. However, it remains unclear whether methodologies from the field of data analytics relying on large samples can also be applied to small datasets of less popular companies or whether these methodologies lead to the discovery of meaningless patterns resulting in economic losses. We analyze whether the impact of media sentiment on financial markets is influenced by two levels of investor attention and whether this impacts algorithmic decision-making. We find that the influence differs substantially between news and companies with high and low investor attention. We apply a trading simulation to outline the practical consequences of these interrelations for decision support systems. Our results are of high importance for financial market participants, especially for algorithmic traders that consider sentiment for investment decision support. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Algorithmic decision-making; Decision support systems; Investor attention; Sentiment analysis; Trading simulation; Trading strategies,13,Information Systems Frontiers,2021 817,Kizgin H.; Jamal A.; Dey B.L.; Rana N.P.,The Impact of Social Media on Consumers’ Acculturation and Purchase Intentions,"Social media has emerged as a significant and effective means of assisting and endorsing activities and communications among peers, consumers and organizations that outdo the restrictions of time and space. While the previous studies acknowledge the role of agents of culture change, it largely remains silent on the role of social media in influencing acculturation outcomes and consumption choices. This study uses self-administered questionnaire to collect data from 514 Turkish-Dutch respondents and examines how their use of social media affects their acculturation and consumption choices. This research makes a significant contribution to consumer acculturation research by showing that social media is a vital means of culture change and a driver of acculturation strategies and consumption choices. This study is the first to investigate the role of social media as an agent of culture change in terms of how it impacts acculturation and consumption. The paper discusses implications for theory development and for practice. © 2017, The Author(s).",Acculturation; Enculturation; Language preferences; Purchase intentions; Social media,104,Information Systems Frontiers,2018 818,Kanat I.; Raghu T.S.; Vinzé A.,Heads or Tails? Network Effects on Game Purchase Behavior in The Long Tail Market,"This study aims to uncover role of network effects, namely the social influence and network externalities, on purchasing of digital goods. We are particularly interested in the differences in network effects in long tail versus the head of the market. We used a novel dataset from an online game distribution platform covering 1975 games and 8000 users in this study. The results reveal that network effects are more pronounced for the tail of the market in comparison to the head of the market. For the games that are in the head of the market the purchasing may be more significantly influenced by factors unobserved in this study (such as advertising budget) yet the games in the tail benefited greatly from any change to the network effects. The games that relied on user-to-user engagement did not fare well in the tail of the market. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Digital economy; Network effects; Network externalities; Online games; Social influence,12,Information Systems Frontiers,2020 819,Bera P.,Interactions between Analysts in Developing Collaborative Conceptual Models,"Conceptual models are frequently developed as part of IS analysis and design. Development of such models involves expertise in conceptual modeling techniques, served by modeling analysts, and in the domain applications, served by domain analysts. This paper focuses on understanding how these two types of analysts interact and develop conceptual models collaboratively. The subjects as analysts were placed in pairs (one modeling and one domain) and asked to develop conceptual models collaboratively on a complex domain. The interactions during conceptual model development were analyzed using a sensemaking framework. It was found that all groups performed the reciprocal acts of modifying each other’s understanding of the concepts that were required to develop the model collaboratively. The study also indicates that the groups which had high incidence of sensebreaking acts (i.e. attempts to question the existing understanding of other) and high incidence of shared conceptualization, created higher quality conceptual models. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Collaboration; Conceptual modeling; Sensemaking; Shared conceptualization,1,Information Systems Frontiers,2021 820,Ho S.M.; Warkentin M.,Leader’s dilemma game: An experimental design for cyber insider threat research,"One of the problems with insider threat research is the lack of a complete 360° view of an insider threat dataset due to inadequate experimental design. This has prevented us from modeling a computational system to protect against insider threat situations. This paper provides a contemporary methodological approach for using online games to simulate insider betrayal for predictive behavioral research. The Leader’s Dilemma Game simulates an insider betrayal scenario for analyzing organizational trust relationships, providing an opportunity to examine the trustworthiness of focal individuals, as measured by humans as sensors engaging in computer-mediated communication. This experimental design provides a window into trustworthiness attribution that can generate a rigorous and relevant behavioral dataset, and contributes to building a cyber laboratory that advances future insider threat study. © 2015, Springer Science+Business Media New York.",Experimental design; Insider threats; Online game simulation; Sociotechnical systems; Trusted human computer interactions,19,Information Systems Frontiers,2017 821,Lee K.; Park J.; Kim I.; Choi Y.,Predicting movie success with machine learning techniques: ways to improve accuracy,"Previous studies on predicting the box-office performance of a movie using machine learning techniques have shown practical levels of predictive accuracy. Their works are technically- and methodologically-oriented, focusing mainly on what algorithms are better at predicting the movie performance. However, the accuracy of prediction model can also be elevated by taking other perspectives such as introducing unexplored features that might be related to the prediction of the outcomes. In this paper, we examine multiple approaches to improve the performance of the prediction model. First, we develop and add a new feature derived from the theory of transmedia storytelling. Such theory-driven feature selection not only increases the forecast accuracy, but also enhances the interpretability of a prediction model. Second, we use an ensemble approach, which has rarely been adopted in the research on predicting box-office performance. As a result, the proposed model, Cinema Ensemble Model (CEM), outperforms the prediction models from the past studies that use machine learning algorithms. We suggest that CEM can be extensively used for industrial experts as a powerful tool for improving decision-making process. © 2016, Springer Science+Business Media New York.",Cinema ensemble model; Feature selection; Machine learning techniques; Movie performance; Prediction model; Transmedia storytelling,49,Information Systems Frontiers,2018 822,Majumdar A.; Debnath T.; Biswas A.; Sood S.K.; Baishnab K.L.,An Energy Efficient e-Healthcare Framework Supported by Novel EO-μGA (Extremal Optimization Tuned Micro-Genetic Algorithm),"The edge/fog computing has the potential to gear up the healthcare industry by providing better and faster health services to the patients. In healthcare systems where every second is crucial, the edge computing can be helpful to reduce the time between data capture and analytics in a powerful manner. In edge computing, the network edge devices are configured in such a manner that they can handle critical analysis and make necessary decisions instead of sending the captured health data directly to the cloud. However, lifetime of the edge network is a critical factor and thus an energy efficient network architecture has to be designed to achieve the above mentioned goal. In this regard, this research presents a new extremal optimization tuned micro genetic algorithm (EO-μGA) based clustering technique for the sake of efficient routing and prolonging network lifetime by saving the battery power of network edge devices. Moreover, a novel fitness function with a set of relevant criteria of edge devices such as energy factor, average intra-cluster distance, average distance to cluster leader over data analytics center, average sleeping time, and computational load has been considered for the selection of the cluster leader which will be responsible for managing intra-cluster and inter-cluster data communication. The simulation results show that the proposed EO-μGA based clustering model offers a higher network lifetime and a least amount of transmission energy consumption per node as compared to various state of the art optimization algorithms. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",E-healthcare; Extremal optimization; Fog computing; Micro-genetic algorithm,14,Information Systems Frontiers,2021 823,Rosenberger M.; Lehrer C.; Jung R.,Integrating data from user activities of social networks into public administrations,"Linking social networks with government applications promises various benefits, such as improving citizens’ public engagement, increasing transparency and openness in government actions, and new or enhanced government services. The research goal is to drive innovation in governments through the integration of user activities from social networks into government applications. Instead of using third-party social media tools, we call for self-developing integration software, so that the government retains full control of the sensitive government data that is linked to social network user data. Following a design science approach, we developed a data model of user activities in social networks. Our 40 user activity types conceptualize the common fundamental data structure and are a means for comparing current features of ten prominent social networks. We find that a substantial share of user activities can be mutually integrated by wrapping social network Application Programming Interfaces (APIs). © 2016, Springer Science+Business Media New York.",Government; Integration; Open data; Social networks; User activities,25,Information Systems Frontiers,2017 824,de Lima Fontão A.; dos Santos R.P.; Dias-Neto A.C.,Exploiting Repositories in Mobile Software Ecosystems from a Governance Perspective,"Software organizations that maintain mobile platforms (e.g. Apple, Google, and Microsoft) open their infrastructure to attract and engage external developers to meet the demands of users. This scenario has been investigated as Mobile Software Ecosystem (MSECO). In MSECO, an organization provides content reuse repositories where users can search, download and evaluate apps, or where developers can get support materials. Such repositories are commonly inspired by reuse mechanisms and help an organization to control and evolve the whole ecosystem to keep it vibrant. In this scenario, it is important to understand how to govern MSECO as well as how reuse mechanisms can support this goal. As such, we investigated governance strategies that emerge from content reuse repositories based on four steps: (1) designing a governance process; (2) performing an initial evaluation of this process with managers who are experts in the main existing MSECO (Apple, Google, Nokia, Microsoft, and Samsung); (3) interviewing 18 MSECO managers to collect opinion about the process; and (4) conducting an exploratory analysis of the MSECO reuse repositories’ structure based on the proposed governance process. Three types of content reuse repositories (Apps’ Store, Developer’s Central, and Apps’ Management) were analyzed. As a result, this research allowed us to define a governance process from a repository perspective containing 11 activities. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Governance; Mobile application; Model; Process; Repositories; Reuse; Software ecosystems,10,Information Systems Frontiers,2019 825,Gupta M.; Kumar P.; Bhasker B.,DPRel: A Meta-Path Based Relevance Measure for Mining Heterogeneous Networks,"Mining a heterogeneous network requires measuring the relatedness between objects represented as nodes in the network. Relevance measurement on objects in a heterogeneous network is a challenging problem. Many researchers transform a heterogeneous network into the corresponding homogeneous network and then apply conventional similarity measures. However, this approach involves information loss as various path semantics are lost in the transformation process. In this paper, we study the problem of relevance measurement on objects in a heterogeneous network and propose a meta-path based semi-metric measure for relevance measurement on objects in a general heterogeneous network with a specified network schema. The proposed measure incorporates path semantics by following the specified meta-path. For measuring relatedness between objects using the proposed measure, the heterogeneous network is converted into a bipartite network consisting of source and target type objects following the specified meta-path. To validate the effectiveness of the proposed measure, we compare its performance with the existing meta-path based semi-metric measures applicable to heterogeneous networks. Experiments are performed on real-world datasets to show the effectiveness of the proposed measure. © 2017, Springer Science+Business Media, LLC.",Clustering; Heterogeneous network; Meta-path; Query task; Relevance measure,7,Information Systems Frontiers,2019 826,Rimba P.; Tran A.B.; Weber I.; Staples M.; Ponomarev A.; Xu X.,Quantifying the Cost of Distrust: Comparing Blockchain and Cloud Services for Business Process Execution,"Blockchain is of rising importance as a technology for engineering applications in cross-organizational settings, avoiding reliance on central trusted third-parties. The use of blockchain, instead of traditional databases or services, is an architectural choice in the development of a software system. Architecture impacts the non-functional qualities of systems, creating design trade-offs between these qualities. The costs of execution and storage are important non-functional qualities, but as yet little is known about them for blockchain-based systems. How expensive is it to use blockchains compared to conventional execution and storage infrastructure? We investigate this question using business process execution as a lens. Specifically, we compare the cost for computation and storage of business process execution on blockchain vs. a popular cloud service. Besides monetary cost, blockchains like Ethereum limit the complexity of new blocks by capping costs through network-defined limits. For applications using such blockchains, the limit per block, thus, translates into an upper bound on throughput scalability. First, we implement and measure the cost of business process execution on blockchain and cloud services for a business process model from a large-scale industrial dataset and an example from literature. We observe two orders of magnitude difference in this cost. Second, we illustrate how cost models can be used to project the impact of different workload assumptions. Finally, we discuss throughput scalability limits as well as trade-offs between cost and other non-functional qualities in the design of blockchain-based systems. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Blockchain; Business process; Cloud; Cost; Design,47,Information Systems Frontiers,2020 827,Diamantini C.; Lo Giudice P.; Potena D.; Storti E.; Ursino D.,An Approach to Extracting Topic-guided Views from the Sources of a Data Lake,"In the last years, data lakes are emerging as an effective and an efficient support for information and knowledge extraction from a huge amount of highly heterogeneous and quickly changing data sources. Data lake management requires the definition of new techniques, very different from the ones adopted for data warehouses in the past. In this scenario, one of the most challenging issues to address consists in the extraction of topic-guided (i.e., thematic) views from the (very heterogeneous and often unstructured) sources of a data lake. In this paper, we propose a new network-based model to uniformly represent structured, semi-structured and unstructured sources of a data lake. Then, we present a new approach to, at least partially, “structuring” unstructured data. Finally, we define a technique to extract topic-guided views from the sources of a data lake, based on similarity and other semantic relationships among source metadata. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Data lakes; DBpedia; Metadata management; Semantic similarities; Thematic views; Unstructuted data sources,23,Information Systems Frontiers,2021 828,Odusanya K.; Aluko O.; Lal B.,Building Consumers’ Trust in Electronic Retail Platforms in the Sub-Saharan Context: an exploratory study on Drivers and Impact on Continuance Intention,"Lack of trust can have a negative influence on consumers’ willingness to use electronic retail (e-tail) platforms especially in countries with weak regulations and poor consumer rights. This paper examined factors that can be employed to build consumer trust and continuance intention to use e-tail platforms in Sub-Saharan Africa. Survey data was collected from 207 respondents and analyzed using structural equation modeling with the PLS software. The results show that information quality, perceived usefulness, hedonic motivation, and perceived risk have a significant influence on consumers’ trust in e-tail platforms. The study contributes to the existing body of knowledge that guides efforts for the implementation of actions in weak institutional contexts characterized by institutional voids such as those experienced in Sub-Saharan African countries. Finally, the study provides insights that can help managers of e-tail platforms to effectively foster the development of trust in their communities. © 2020, The Author(s).",Continuance intention; Online shopping; Perceived risk; Trust,31,Information Systems Frontiers,2022 829,Idemudia E.C.; Raisinghani M.S.; Samuel-Ojo O.,The contributing factors of continuance usage of social media: An empirical analysis,"The problem of leveraging social media for establishing and sustaining consistent policies, procedures and methods of online communication can be challenging for busy professionals. To address this issue and to contribute to the literature we develop our research model to gain a deeper upstanding of the factors that influence social media continuance usage. The theoretical background for our research model are technology acceptance model and diffusion of innovation. We collected our data from college students that are enrolled in a large public university located in North America. We analyze our data using confirmatory factor analysis and structural equation modeling. The results of our data analysis show that ease of use, usefulness, and satisfaction of social media have a positive and significant influence on social media continuance usage. Also, our results show that relative advantage, compatibility, information quality, and risk of social media have a positive influence on the usefulness of social media. We discussed the results implications for theory development and practice. © 2016, Springer Science+Business Media New York.",Communication and management; Compatibility; Continuance usage; Ease of use; Information quality; Relative advantage; Risk; Satisfaction; Social media; Usefulness,30,Information Systems Frontiers,2018 830,Shen L.; Wang H.; Xu L.D.; Ma X.; Chaudhry S.; He W.,Identity management based on PCA and SVM,"A new approach for face recognition, based on kernel principal component analysis (KPCA) and support vector machines (SVMs), is presented to improve the recognition performance of the method based on principal component analysis (PCA). This method can simultaneously be applied to solve both the over-fitting problem and the small sample problem. The KPCA method is performed on every facial image of the training set to get the core facial features of the training samples. To ensure that the loss of the image information will be as less as possible, the facial data of high-dimensional feature space is projected into low-dimensional space, and then the SVM face recognition model is established to identify the low-dimensional space facial data. Our experimental results demonstrate that the approach proposed in this paper is efficient, and the recognition accuracy of the proposed method reaches 95.4 %. © 2015, Springer Science+Business Media New York.",Face recognition; Kernel function methods; Kernel principal component analysis; Pattern recognition; Support vector machine,15,Information Systems Frontiers,2016 831,Tian G.; Wang J.; He K.; Sun C.; Tian Y.,Integrating implicit feedbacks for time-aware web service recommendations,"An increasing number of Web services have been published on the Internet over the past decade due to the rapid development and adoption of the SOA (Services Oriented Architecture) standard. However, in the current state of the Web, recommending suitable Web services to users becomes a challenge due to the huge divergence in published content. Existing Web services recommendation approaches based on collaborative filtering are mainly aiming to QoS (Quality of Service) prediction. Recommending services based on users’ ratings on services are seldomly reported due to the difficulty of collecting such explicit feedback. In this paper, we report a data set of implicit feedback on real-world Web services, which consist of more than 280,000 user-service interaction records, 65,000 service users and 15,000 Web services or mashups. Temporal information is becoming an increasingly important factor in service recommendation since time effects may influence users’ preferences on services to a large extent. Based on the collected data set, we propose a time-aware service recommendation approach. Temporal information is sufficiently considered in our approach, where three time effects are analyzed and modeled including user bias shifting, Web service bias shifting, and user preference shifting. Experimental results show that the proposed approach outperforms seven existing collaborative filtering approaches on the prediction accuracy. © 2015, Springer Science+Business Media New York.",Implicit feedback; matrix factorization; Time aware; Web service recommendation,45,Information Systems Frontiers,2017 832,Charband Y.; Jafari Navimipour N.,Online knowledge sharing mechanisms: a systematic review of the state of the art literature and recommendations for future research,"Knowledge sharing is an activity through which knowledge, namely, information, skills, or expertise, is exchanged between people, friends, families, communities or organizations. Online knowledge sharing activities are flourishing with the advent of social media and digital life. However, despite of the importance of the online knowledge sharing methods and mechanisms, there is not any comprehensive and systematic study about studying and analyzing its important techniques. Therefore, the main aim of this paper, the comprehensive, detailed, and systematic study, and survey of the state-of-the-art knowledge sharing mechanisms in an online environments is provided. Also, this paper presents a systematic literature review (SLR) on the online knowledge sharing literatures up to end of 2015. We identified 348 papers, which are reduced to 251 primary studies through our paper selection process. Also, the broad overview of the literature provides insights into potential areas for further research. By providing state-of-the-art information, this survey will directly support academics and practicing professionals in their understanding of developments in online knowledge sharing mechanisms and techniques. © 2016, Springer Science+Business Media New York.",Knowledge sharing; Online environment; Online knowledge sharing,159,Information Systems Frontiers,2016 833,Ozturk A.B.; Nusair K.; Okumus F.; Singh D.,Understanding mobile hotel booking loyalty: an integration of privacy calculus theory and trust-risk framework,"With the increased popularity of mobile devices, hotels and online travel agencies have started focusing on mobile hotel booking (MHB) in recent years. However, there has been limited research on users” loyalty intentions toward MHB technology. This research attempted to provide an integrated theoretical model that examines the determinants of MHB loyalty. The proposed model, which incorporates personalization, privacy concern, trust, perceived risk, and loyalty, was tested via structural equation modeling (SEM) by using data collected from 396 MHB users. The study results demonstrated that personalization is a strong predictor of MHB users” privacy concerns, trust, and risk perceptions. In addition, privacy concern had a significant impact on trust, and trust significantly influenced perceived risk. Finally, the results revealed that trust and perceived risk were associated with loyalty. This study provides valuable theoretical contributions for researchers and practical implications for online travel agencies, hotel operators and hospitality technology vendors. © 2017, Springer Science+Business Media New York.",Hotel; Loyalty; Mobile application; Mobile booking; Personalization; Privacy; Risk; Trust,109,Information Systems Frontiers,2017 834,Xu Y.; Yin D.; Zhou D.,Investigating Users’ Tagging Behavior in Online Academic Community Based on Growth Model: Difference between Active and Inactive Users,"With the development of social interaction techniques and social tagging mechanisms, online academic community as a new platform has greatly changed the way users organize and share knowledge. The large amount of social tagging data occurred on online academic community provides us a channel to systematically understand users’ tagging behavior. Based on data collected from a specific online academic community, this research first classifies users into two categories: active and inactive users. After that, growth models (damped exponential model, normal model and fluctuating model) are employed to investigate tagging behavior for both active and inactive users. Factors that might influence the likelihood of the growth models are also identified based on multinomial logistic regression. This research expands our understanding on users’ tagging behavior and factors that may affect their tagging behavior in the context of online academic community. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Active users; Growth models; Inactive users; Online academic community; Tagging behavior,9,Information Systems Frontiers,2019 835,Meghzili S.; Chaoui A.; Strecker M.; Kerkouche E.,Verification of Model Transformations Using Isabelle/HOL and Scala,"Model transformations have proved to be powerful in the development of critical systems. According to their intents, they have been used in many domains such as models refinement, simulation, and domain semantics. The formal methods have been successful in the verification and validation of critical systems, and in particular, in the formalization of UML, BPMN, and AADL. However, little research has been done on verifying the transformation itself. In this paper, we extend our previous work using Isabelle/HOL that transforms UML State Machine Diagrams (SMD) to Colored Petri nets (CPN) models and proves that certain structural properties of this transformation are correct. For example, the structural property: “for each final state of a SMD model a corresponding place in CPN model should be generated by the transformation” is described and checked using Isabelle/HOL as invariant property. In the current work, we use Scala as environment of executing Isabelle/HOL specifications and we perform the verified transformation using Scala. Moreover, we demonstrate our approach using another case study of transforming BPMN (Business Process Model and Notation) models into Petri nets models and verify the correctness of certain structural properties of this transformation. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Business process; Colored petri nets (CPN); Formal verification; Model transformation; Model-driven engineering (MDE); Theorem Prover; Transformation correctness; UML,14,Information Systems Frontiers,2019 836,Arolfo F.; Rodriguez K.C.; Vaisman A.,Analyzing the Quality of Twitter Data Streams,"There is a general belief that the quality of Twitter data streams is generally low and unpredictable, making, in some way, unreliable to take decisions based on such data. The work presented here addresses this problem from a Data Quality (DQ) perspective, adapting the traditional methods used in relational databases, based on quality dimensions and metrics, to capture the characteristics of Twitter data streams in particular, and of Big Data in a more general sense. Therefore, as a first contribution, this paper re-defines the classic DQ dimensions and metrics for the scenario under study. Second, the paper introduces a software tool that allows capturing Twitter data streams in real time, computing their DQ and displaying the results through a wide variety of graphics. As a third contribution of this paper, using the aforementioned machinery, a thorough analysis of the DQ of Twitter streams is performed, based on four dimensions: Readability, Completeness, Usefulness, and Trustworthiness. These dimensions are studied for several different cases, namely unfiltered data streams, data streams filtered using a collection of keywords, and classifying tweets referring to different topics, studying the DQ for each topic. Further, although it is well known that the number of geolocalized tweets is very low, the paper studies the DQ of tweets with respect to the place from where they are posted. Last but not least, the tool allows changing the weights of each quality dimension considered in the computation of the overall data quality of a tweet. This allows defining weights that fit different analysis contexts and/or different user profiles. Interestingly, this study reveals that the quality of Twitter streams is higher than what would have been expected. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Big data; Data quality; Social networks; Twitter,17,Information Systems Frontiers,2022 837,Pal A.; Herath T.; De’ R.; Rao H.R.,Is the Convenience Worth the Risk? An Investigation of Mobile Payment Usage,"The popularity of mobile payment services lies in the convenient transactions they offer to users. In the age of growing cybercrime, however, mobile payment transactions carry risks of financial and data losses. It thus becomes critical to understand how risk and convenience have contrasting impacts on users’ intention to use mobile payments. To investigate this, we consider various dimensions of perceived risk and perceived convenience to understand the net effect of their negative and positive influences on the intention to use. We also examine the actual use behavior predicted by intention along with the influence of habit. The research model, tested using survey responses from a sample of 215 users along with the descriptive answers from the survey respondents, helps us draw crucial insights. The study contributes to the field in a significant manner by providing insights into the balancing effect of risk and convenience on mobile payment service usage, as well as the development of the multi-dimensional scales for the key variables of risk and convenience. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Convenience; Facets of risk; Mobile payment services; Mobile payment usage; Perceived risk,96,Information Systems Frontiers,2021 838,Antunes P.; Pino J.A.; Tate M.; Barros A.,Eliciting Process Knowledge Through Process Stories,"There are often gaps between the lived experiences of end users and the official version of processes as espoused by the organization. To understand and address these gaps, we propose and evaluate process stories, a method to capture knowledge from end users based on organizational storytelling and visual narrative theories. The method addresses two dimensions related to business processes: 1) coordination knowledge, explaining how activities enfold over time; and 2) contextual knowledge, explaining how coordination depends on other contingency factors. The method is evaluated by comparing process stories against process models officially supported by the participating organizations. The results suggest that process stories identify more activities, events, and actors than official processes, which are supported by a diversity of contextual elements. We then qualitatively analyse these elements to identify the contributions of process stories to process knowledge. Based on the quantitative and qualitative analysis, we draw several implications for business process management. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Business processes; Process knowledge; Process stories,14,Information Systems Frontiers,2020 839,Gholami R.; Molla A.; Goswami S.; Brewster C.,Green information systems use in social enterprise: the case of a community-led eco-localization website in the West Midlands region of the UK,"This study examines the intention of environmentally-oriented social enterprises to continue using Green IS (an eco-localization website here) in Herefordshire located in the West Midlands region of the United Kingdom. The Herefordshire Greenlinks (HGL) Association is a local business community that operates primarily through the HGL Website in order to help local social enterprises find and trade local eco-friendly goods and services. It is an example of a “market-based” approach to solving social and environmental issues that is inspired by a bottom-up view of community development and eco-localization. Based on the theory of uses and gratification of media use and the new environmental paradigm, we propose a research model that outlines the various factors contributing to intention to continue using an eco-localization website. The research model and its associated hypotheses were empirically tested using a dataset generated from a survey of 83 small social enterprises. The results demonstrate the importance of three different types of gratification – content, social and performance gratification as well as users’ environmental concerns in determining the intention to continue using an eco-localization website. This study contributes to the Green IS literature by extending research to the social sector environment, and it also provides practical insight for designers of such community-led eco-localization websites. © 2017, Springer Science+Business Media New York.",Green IS; IS continuance; Social enterprise; Uses and Gratifications theory,15,Information Systems Frontiers,2018 840,Li Z.; Xu R.; Cui P.; Xu L.; He W.,Geometry-based propagation of temporal constraints,"In recent years, the Internet of Things (IoT) has been introduced to offer promising solutions in many areas. A big challenge faced by the IoT is to integrate heterogeneous information sources and process information effectively. As an important element in information integration, temporal reasoning is highly related to the dynamic, sequential aspect of both the information integration and the decision making process. Focusing on temporal reasoning, this paper introduces a method to represent both qualitative and quantitative temporal constraints in a 2-dimensional (2-D) space. Meanwhile, an efficient constraint-based geometric (CG) algorithm for propagating constraints (including inherent constraints and constraint pairs) on events in a 2-D space is proposed. A geometric recombination and intersection (GRI) method, a part of the CG algorithm, is presented to propagate one constraint pair from a geometric point. The experimental results show that in terms of both constructed and realistic benchmarks, the CG algorithm outperforms the existing Floyd-Warshall’s algorithm with the time complexity of O(n3), especially for benchmarks with a large number of events. © 2016, Springer Science+Business Media New York.",2- dimensional space; Geometric method; Information integration; Internet of Things (IoT); Temporal constraints,2,Information Systems Frontiers,2017 841,Mardini M.T.; Raś Z.W.,Discovering Primary Medical Procedures and their Associations with Other Procedures in HCUP Data,"In recent years, healthcare spending has risen and become a burden on governments especially in the US. The selection of the primary medical procedure by physicians is the first step in the patient treatment process and is considered to be one of the main causes for hospital readmissions if it is not done correctly. In this paper, we propose a system that can identify with high accuracy the primary medical procedure for a newly admitted patient. We propose three approaches to anticipate which medical procedure should be primary. Additionally, we propose the procedure graph, which shows all possible paths that a new patient may undertake during the course of treatment. Finally, we extract the possible associations between the primary procedure and other procedures in the same hospital visit. The results show the ability of our proposed system to identify which procedure should be primary and extract its associations with other procedures. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Clustering; Hospital readmission reduction; Personalization; Recommender systems,3,Information Systems Frontiers,2022 842,Tanzi T.; Bertolino M.,"Autonomous Systems for Rescue Missions: Design, Architecture and Configuration Validation","In the context of disaster management, the intervention of Autonomous Systems brings many benefits to human rescuers. Autonomous Systems can quickly reach regions that may be inaccessible for humans. In addition, they can perform a rapid mapping of the impacted area and therefore enhancing the human knowledge. However, it is necessary to choose the best Autonomous Systems according to (i) mission environment and (ii) mission objectives. In this article, we describe our work on ArcTurius rover, a wheeled Autonomous System in support to disaster management. We validated its design through simulation and formal verification. A first simulation step occurs during the system definition. This allows to formally verify the design choices. A second type of simulation is performed to check the adequacy of the rover with respect to a specific mission. Thus, an Autonomous System can be adapted prior to a real mission to enhance its level of performance. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Autonomous systems; Disaster management; Modelling; Simulation,6,Information Systems Frontiers,2021 843,Kweon E.; Lee H.; Chai S.; Yoo K.,The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence,"As recent cyber-attacks have been increasing exponentially, the importance of security training for employees also has become growing ever than before. In addition, it is suggested that security training and education be an effective method for discerning cyber-attacks within academia and industries. Despite the importance and the necessity of the training, prior study did not investigate the quantitative utility of security training in an organizational level. Due to the absence of referential studies, many firms are having troubles in making decisions with respect to arranging optimal security training programs with limited security budgets. The main objective of this study is to find out a relationship between cybersecurity training and the number of incidents of organizations. Thus, this study quantified the effectiveness of security training on security incidents as the first study. This research examined the relationship among three main factors; education time, education participants, and outsourcing with numbers of cybersecurity incidents. 7089 firm level data is analyzed through Poisson regression method. Based on analysis results, we found that the negative relationship between security trainings and the occurrence of cybersecurity incidents. This study sheds light on the role of security training and education by suggesting its positive association with reducing the number of incidents in organizations from the quantitative perspective. The result of this study can be used as a referential guide for information security training decision-making procedure in organizations. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Information security incidents; Information security management; Information security training; Poisson regression analysis,75,Information Systems Frontiers,2021 844,Qasim A.; Abu-Shanab E.,Drivers of mobile payment acceptance: The impact of network externalities,"Mobile payment is an attractive option that has recently boomed because of the advent of smart phones and their applications. Despite the great potential of such technology in simplifying our lives, its uptake remains limited. As the technology acceptance fails to meet expectations, this study aims at providing a better understanding of the factors influencing mobile payment acceptance. Through an empirical investigation that couples the traditional technology acceptance factors with “network externalities” effect. This study hypothesized that performance expectancy, effort expectancy; social influence, trust, and network externality are major factors that influence the intention to use mobile payment. Results indicated that while the traditional acceptance drivers still impact customers’ willingness to adopt mobile payment, network externalities was the most influential driver of mobile payment acceptance. Results also failed to support the influence of effort expectancy. Conclusions and future work propositions are stated at the end. © 2015, Springer Science+Business Media New York.",Empirical study; Jordan; Mobile payment; Network externalities; Technology acceptance; UTAUT,207,Information Systems Frontiers,2016 845,Serrano A.; Garcia-Guzman J.; Xydopoulos G.; Tarhini A.,Analysis of Barriers to the Deployment of Health Information Systems: a Stakeholder Perspective,"This paper argues that the cross-analysis of barriers with stakeholders provides a richer picture than analyzing the barriers on their own, as most of the literature in this area does. To test this hypothesis, we used the data from 33 interviews across 19 different types of stakeholders that were involved in a telemedicine system for the Chronically-ill Patient. Our findings show encouraging results. For instance, it was found that the group of stakeholders who are directly related to the governance and policy-making identified most of the barriers. This finding may imply that this group is more aware of the challenges when implementing HIS, or it may suggest that this group poses more resistance due to the current economic and Organizational models in health care. It was also found that some barriers are cited by all stakeholders whereas others not, suggesting that some barriers may be more relevant than others. © 2018, The Author(s).",Barriers; Chronic diseases; Healthcare; Information systems; Stakeholder theory; Telemedicine,20,Information Systems Frontiers,2020 846,Peng Y.; Shi J.; Fantinato M.; Chen J.,A study on the author collaboration network in big data* ,"In order to obtain a deeper understanding of the collaboration status in the big data field, we investigated the author collaboration groups and the core author collaboration groups as well as the collaboration trends in big data by combining bibliometric analysis and social network analysis. A total of 4130 papers from 13,759 authors during the period of 2011–2015 was collected. The main results indicate that 3483 of the papers are coauthored (i.e., 84.33% of all papers) from 12,016 coauthors (i.e., 87.33% of all authors), which represent a reputable level of collaboration. On the other hand, 91.83% of all the identified coauthors have published only one paper so far, reflecting a poor level of maturity of such authors. Through social network analysis, we observed that the author collaboration network is composed of small author collaboration groups and also that the authors are mainly from the computer science & technology field. As an important contribution of our study, we further analyzed the author collaboration network, culminating in the generalization of four subnet modes, which were defined by some papers: ‘dual-core’, ‘complete’, ‘bridge’ and ‘sustainable development’. It was found that the dual-core mode stands for the stage that researchers have just begun to study big data. Beginning of big data research, the complete mode tends to joint research, both the dual-core and complete modes are mostly engaged in the same project, and the bridge mode and the sustainable development mode represent, respectively, the popular and valued directions in the big data field. The results of this study can be useful for researchers interested in finding suitable partners in the big data field. By tracking the core authors and the key author collaboration groups, one can learn about the current developments in the big data field as well as predict the development prospects of such a field. Therefore, we expect with the results of our study summarized in this paper to contribute to a faster development of the big data field. © 2017, Springer Science+Business Media New York.",Author collaboration; Bibliometric analysis; Big data; Collaborative relationship; Core author collaboration group; Social network analysis,29,Information Systems Frontiers,2017 847,Gong X.; Lee M.K.O.; Liu Z.; Zheng X.,Examining the Role of Tie Strength in Users’ Continuance Intention of Second-Generation Mobile Instant Messaging Services,"Second-generation mobile instant messaging (SMIM) is a new structure of social media facilitated by the widespread use of smartphones. It is embedded in social networks and support fundamental functions. However, tie strength, as a social network configuration, is ignored in existing SMIM studies. The present work incorporates the effect of tie strength into expectation-confirmation model, proposing the continuance intention model in the unique context of SMIM and investigating the potential driving forces (i.e., users’ satisfaction, tie strength, confirmation of values, and perceived critical mass). Results show that tie strength appears to be a negative moderating force between satisfaction and continuance intention in SMIM services and arises from the confirmation of social value. In particular, the confirmation of sense of belonging has the strongest association with tie strength enhancement, while the confirmation of self-expression is the most important driver of satisfaction. Both satisfaction and perceived critical mass directly contribute to continuance intention of SMIM users, and perceived critical mass has a stronger impact. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Continuance intention; Expectation-confirmation model; Second-generation mobile instant messaging; Social media; Tie strength,64,Information Systems Frontiers,2020 848,Xu R.; Wu C.; Zhu S.; Fang B.; Wang W.; Xu L.; He W.,A rapid maneuver path planning method with complex sensor pointing constraints in the attitude space,"Large-scale and high-resolution perception is easy to achieve for the physical world, if satellite technology was used in Internet of Things (IoT) in the future. Remote sensing satellite is superior to original method for ground target detection and environmental perception, which could be completed through onboard perception sensors. In the process of detection and perception, satellite needs to frequently perform attitude maneuver in order to meet a variety of task requirements. We have to face with multi-object, multi-sensors constrained maneuver problem. Not only the kinematic and dynamics constraints should been taken into account, but the engineering bounded constraints need to be considered. Moreover, sensor pointing constraints should be elaborated and analyzed reasonably. It is increasingly important how to achieve attitude maneuver in these complex constraints safely and rapidly. Firstly, sensor pointing constraints are translated to quadratic form in order to simplify the representation and computation in the attitude quaternion space. Secondly, we propose an improved RRT planning algorithm for spacecraft, which is able to address a variety of sensor pointing constraints. This algorithm will be used as a global planner, in which the uniformly distributed nodes in the expansion space are randomly sampled and the expanded nodes are screened out based on the comparative evaluation function. Finally, simulation results validate the advantages of the proposed algorithm. © 2016, Springer Science+Business Media New York.",Industrial information integration; Internet of Things; Path planning; Pointing constraints; Remote sensing satellite; RRT,32,Information Systems Frontiers,2017 849,Harris D.R.,Foundations of reusable and interoperable facet models using category theory,"Faceted browsing has become ubiquitous with modern digital libraries and online search engines, yet the process is still difficult to abstractly model in a manner that supports the development of interoperable and reusable interfaces. We propose category theory as a theoretical foundation for faceted browsing and demonstrate how the interactive process can be mathematically abstracted. Existing efforts in facet modeling are based upon set theory, formal concept analysis, and light-weight ontologies, but in many regards, they are implementations of faceted browsing rather than a specification of the basic, underlying structures and interactions. We will demonstrate that category theory allows us to specify faceted objects and study the relationships and interactions within a faceted browsing system. Resulting implementations can then be constructed through a category-theoretic lens using these models, allowing abstract comparison and communication that naturally support interoperability and reuse. © 2016, Springer Science+Business Media New York.",Data models; Information architecture; Interactive systems; Reusability,4,Information Systems Frontiers,2016 850,Hsu P.-F.,A Deeper Look at Cloud Adoption Trajectory and Dilemma,"Different from previous cloud adoption studies that focus on the benefits and concerns of cloud computing from a technology point of view, this study takes a deeper look at two additional firm-specific forces that could better explain firms’ cloud adoption trajectory and dilemma: Path dependency and Institutional forces. Path dependency theory argues that if a firm has invested intensively in traditional IT, it may be more capable of adopting and utilizing new IT since it has accumulated knowledge. However, the firm could also be trapped in its previous path and reluctant to migrate to cloud to avoid sunk costs and switching costs. On the other hand, institutional theory provides an external view and posit that a firm facing more institutional forces from its trading community will have more incentives, as well as pressure, to adopt cloud. We developed a cloud adoption model that features benefits, concerns, path dependency, and institutional forces as prominent antecedents to understand their competing and complementary effects, and empirically tested the proposed model using 177 firms. The results show that, path dependence is indeed an important factor affecting firms’ cloud adoption behaviors; a firm with a better IT position and more satisfying IT outsourcing experiences will have greater cloud adoption intention. Institutional forces do not directly affect cloud adoption intention. Instead, institutional forces increase perceived benefits, through which, indirectly influence cloud adoption intention. The findings delineate the trajectory and dilemma that firms face when migrating to cloud and provide insights to cloud vendors in choosing their target market. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Cloud computing; Institutional theory; Path dependency; Structural equation modeling,14,Information Systems Frontiers,2022 851,Bednar P.M.; Welch C.,Socio-Technical Perspectives on Smart Working: Creating Meaningful and Sustainable Systems,"Technological advances have made possible industrial and commercial applications of artificial intelligence, virtual reality and highly integrated manufacturing systems. It has also freed business activity from a focus on place, as both work activities and markets have been able to harness information and communication technologies in order to operate remotely. As a result, researchers have highlighted a phenomenon of ‘smart’ working. Some have pointed to a fourth Industrial Revolution (Industry 4.0) in which ‘smart’ factories use robotics to achieve high performance. There is now a suggestion of progress towards Industry 5.0, in which technological and social systems work in harmony to deliver personalised mass customization of products and services. This paper examines these developments from the perspective of unique, individual understandings of work roles and sustainability, posing the questions ‘Smart’ from whose point of view? Do smart systems promote sustainable organizations? How should design of smart systems be approached? It suggests that contemporary socio-technical systems approaches to organizational analysis are the best way to support harnessing of smart technologies in organizations. © 2019, The Author(s).",Emergence; Industry 4.0; Industry 5.0; Open systems; Smart working; Socio-technical approaches,336,Information Systems Frontiers,2020 852,Dwivedi Y.K.; Rana N.P.; Jeyaraj A.; Clement M.; Williams M.D.,Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model,"Based on a critical review of the Unified Theory of Acceptance and Use of Technology (UTAUT), this study first formalized an alternative theoretical model for explaining the acceptance and use of information system (IS) and information technology (IT) innovations. The revised theoretical model was then empirically examined using a combination of meta-analysis and structural equation modelling (MASEM) techniques. The meta-analysis was based on 1600 observations on 21 relationships coded from 162 prior studies on IS/IT acceptance and use. The SEM analysis showed that attitude: was central to behavioural intentions and usage behaviours, partially mediated the effects of exogenous constructs on behavioural intentions, and had a direct influence on usage behaviours. A number of implications for theory and practice are derived based on the findings. © 2017, The Author(s).",Attitude; Behavioural intention; MASEM; Meta-analysis; Structural equation modelling; Usage; UTAUT,1531,Information Systems Frontiers,2019 853,"Shea V.J., II; Dow K.E.; Chong A.Y.-L.; Ngai E.W.T.",An examination of the long-term business value of investments in information technology,"In this paper, we examine the effects of investments in Information Technology (IT) on the long term business values of organizations. The regression discontinuity design is used in this research to examine eight hundred and ten IT investment announcements collected from the period 1982–2007. Our results found that press releases can affect the market value of a firm by possibly providing investors with a better idea of a firm’s current and future operations and strategy. On the other hand, these press releases also appear to attract more transient investors. The attraction of transient investors likely suggests the market believes the IT investing firm is serious about its potential for growth and expansion. © 2017, Springer Science+Business Media New York.",Business value; Event study; IT investments; Regression discontinuity design,39,Information Systems Frontiers,2019 854,Tung W.-F.; Lan Y.-J.,Analyzing social choice and group ranking of online games for product mix innovation,"With the increasing populations of the smartphones and mobile devices these years, the majority of people have played the mobile or online games on their smartphones. As such users have rapidly increased, this research is to propose an innovative service that can automatically recommend the users the appropriate online games as their optional references. In order for market competition, the most online games’ enterprises need to develop and sell the newer online game products or versions continuously for the customers who like to play online games. Now that the types and markets of online games have had the more diverse along with the sustainable development of online game products over time. This research is to propose an integrative analysis from a large amount of data -users’ preference sequences. Firstly, the research utilizes a sequence recommendation technology that can be used to analyze their preference sequences of online game’s types based on other similar users’ sequence preference data. In other words, these recommended online game’s types that can be generated according to the relationships between the query user’s preferences and users themselves. All sequences from numerous data are accumulated to be the inferences of the query users’ preferences. Secondly, the research also utilizes data mining methodology to explore the possibilities of different product mix of game types from numerous user data. For the main methodology, this research uses a ‘partial user ranking algorithm’ to analyze group ranking of online games based on similar users. The purpose is to explore how the players can be recommended based on the other users’ priorities, as well as the product mix of game types which can be the potential business trends come to markets. Furthermore, this study contributes to a research implication for online game industry, and the results also could be the business references of game combinations and product design. © 2017, Springer Science+Business Media New York.",Game combination; Group ranking; Online game; Preference sequences; Social choice,3,Information Systems Frontiers,2017 855,Heinrich B.; Hopf M.; Lohninger D.; Schiller A.; Szubartowicz M.,Something’s Missing? A Procedure for Extending Item Content Data Sets in the Context of Recommender Systems,"The rapid development of e-commerce has led to a swiftly increasing number of competing providers in electronic markets, which maintain their own, individual data describing the offered items. Recommender systems are popular and powerful tools relying on this data to guide users to their individually best item choice. Literature suggests that data quality of item content data has substantial influence on recommendation quality. Thereby, the dimension completeness is expected to be particularly important. Herein resides a considerable chance to improve recommendation quality by increasing completeness via extending an item content data set with an additional data set of the same domain. This paper therefore proposes a procedure for such a systematic data extension and analyzes effects of the procedure regarding items, content and users based on real-world data sets from four leading web portals. The evaluation results suggest that the proposed procedure is indeed effective in enabling improved recommendation quality. © 2020, The Author(s).",Completeness; Data extension; Data quality; Recommender system,6,Information Systems Frontiers,2022 856,Sharma S.K.,Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling,"Higher penetration of smartphones and 3G and 4G mobile networks have led to the higher usage of smartphones for mobile banking activities. This paper identifies key antecedents influencing the mobile banking acceptance. The research extends the original Technology Acceptance Model, by incorporating two cognitive antecedents, namely, autonomous motivation and controlled motivation, in addition to trust components for understanding adoption. Data were collected from 225 mobile banking users and analyzed using an innovative two-stage research methodology. In the first stage, structural equation modeling was employed to test the research hypotheses and identify significant antecedents influencing mobile banking acceptance. In the second stage, the significant antecedents obtained from the first stage were input to a neural network model for ranking. The results showed that trust and autonomous motivation are the two main predictors influencing mobile banking acceptance. Theoretical and practical implications of findings are discussed. © 2017, Springer Science+Business Media New York.",Autonomous motivation; Controlled motivation; Mobile banking; Perceived trust; TAM,146,Information Systems Frontiers,2019 857,Lee S.J.,A review of audio guides in the era of smart tourism,"The tourism industry is intimately related to the development of technology. Currently, technology-integrated “smart tourism” provides convenience and interactivity, and offers personalized services to tourists. However, the use of the technology-mediated audio guides among tourists in cultural heritage sites is not as active as expected. The underutilization of the audio guides in palaces is confirmed by a survey at Gyeongbok-gung palace, and the underlying reasons are examined by interviewing visitors to Chateau de Versailles. This paper analyzes the low usage of audio guides as a case-study, utilizing Cohen’s basic concepts of tour guides, Dann’s tourist motivation theory and the museum ecology of Bell. Consequently, this paper confirms the multifunctional complexity of audio guides, and suggests improvement of them in functionality (user-friendliness, usability, interactivity and social functions) for program developers, and the strategic use of ICT in promotion of palaces as smart tourism destination in cultural heritage management. © 2016, Springer Science+Business Media New York.",Audio guide; Cohen’s basic concepts of tour guides; Cultural heritage sites; Smart tourism destination; Underutilization of audio guides,60,Information Systems Frontiers,2017 858,Estevam A.; Dennehy D.; Conboy K.,Using Flow Tools to Enact Control in Software Development Projects: A Cross-case Analysis,"Flow development tools and metrics are the latest in a long line of approaches designed to control and improve software development productivity and the overall quality of software produced. While there are many claims regarding the value of flow to control development activity, there is a lack of rigorous research on this topic. In this study, we use control theory as a lens to explore how flow tools and metrics are used to enact both formal and informal control modes. This qualitative study draws on a cross-case analysis of two multinationals located in Ireland that involved interviews with five software development teams distributed across Ireland, India, and the US. The findings reveal that both managers and project teams try to conduct business as usual in order to maintain their control status. This study contributes four key challenges on the use of flow tools, evidence-based recommendations on how to effectively implement flow, and a research agenda for future researchers. While the findings are within the context of flow-based software development projects, the lessons learned can be generalised to other software development contexts. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Flow; Formal control; Informal control; Software development,1,Information Systems Frontiers,2022 859,Switzer L.N.; Wang J.,An event based approach for quantifying the effects of securities fraud in the IT industry,"Detecting the incidence and impact of illegal insider trading is a difficult process since access to the actual trading records of insiders that overlap precisely with fraudulent events is difficult. This paper provides a case study of a specific IT stock in Canada that was successfully prosecuted in the Canadian court system for market manipulation and illegal insider trading violations. The study provides a quantification of the impact of insider trading activities by the President directly through his own account or through accounts under his control, and illustrates the impact of some off-exchange transactions by the impugned parties. Overall, the costs of the insider trading violations are quite high, given the significant wealth effects produced by the events surrounding this case. © 2017, Springer Science+Business Media New York.",Event studies; Insider trading; Market efficiency; Market manipulation in IT industry,2,Information Systems Frontiers,2017 860,Popovič A.; Hackney R.; Tassabehji R.; Castelli M.,The impact of big data analytics on firms’ high value business performance,"Big Data Analytics (BDA) is an emerging phenomenon with the reported potential to transform how firms manage and enhance high value businesses performance. The purpose of our study is to investigate the impact of BDA on operations management in the manufacturing sector, which is an acknowledged infrequently researched context. Using an interpretive qualitative approach, this empirical study leverages a comparative case study of three manufacturing companies with varying levels of BDA usage (experimental, moderate and heavy). The information technology (IT) business value literature and a resource based view informed the development of our research propositions and the conceptual framework that illuminated the relationships between BDA capability and organizational readiness and design. Our findings indicate that BDA capability (in terms of data sourcing, access, integration, and delivery, analytical capabilities, and people’s expertise) along with organizational readiness and design factors (such as BDA strategy, top management support, financial resources, and employee engagement) facilitated better utilization of BDA in manufacturing decision making, and thus enhanced high value business performance. Our results also highlight important managerial implications related to the impact of BDA on empowerment of employees, and how BDA can be integrated into organizations to augment rather than replace management capabilities. Our research will be of benefit to academics and practitioners in further aiding our understanding of BDA utilization in transforming operations and production management. It adds to the body of limited empirically based knowledge by highlighting the real business value resulting from applying BDA in manufacturing firms and thus encouraging beneficial economic societal changes. © 2016, Springer Science+Business Media New York.",Big data analytics; Business value; Case analysis; Operations performance,284,Information Systems Frontiers,2018 861,Elshan E.; Zierau N.; Engel C.; Janson A.; Leimeister J.M.,"Understanding the Design Elements Affecting User Acceptance of Intelligent Agents: Past, Present and Future","Intelligent agents (IAs) are permeating both business and society. However, interacting with IAs poses challenges moving beyond technological limitations towards the human-computer interface. Thus, the knowledgebase related to interaction with IAs has grown exponentially but remains segregated and impedes the advancement of the field. Therefore, we conduct a systematic literature review to integrate empirical knowledge on user interaction with IAs. This is the first paper to examine 107 Information Systems and Human-Computer Interaction papers and identified 389 relationships between design elements and user acceptance of IAs. Along the independent and dependent variables of these relationships, we span a research space model encompassing empirical research on designing for IA user acceptance. Further we contribute to theory, by presenting a research agenda along the dimensions of the research space, which shall be useful to both researchers and practitioners. This complements the past and present knowledge on designing for IA user acceptance with potential pathways into the future of IAs. © 2022, The Author(s).",Computer interaction; Human; Information systems; Intelligent agent; Research agenda; Systematic literature review,67,Information Systems Frontiers,2022 862,Golbeck J.; Gerhard J.; O’Colman F.; O’Colman R.,Scaling Up Integrated Structural and Content-Based Network Analysis,"Structural analysis of social networks can provide important insights into the clusters and important nodes. However, it is silent on the content-based reasons for importance or commonality. This additional level of insight requires sampling content from nodes and processing it to distill new insights. That is done effectively by human analysts, but as networks grow into Big Data scale, human analysis is not possible. This raises the question of whether automated techniques can mimic the same results humans find. In this paper, we demonstrate how topic modeling can be applied, filtered, and adapted to produce easy-to-understand keywords that represent important clusters in a network. Those keywords reflect the insights achieved by human analysts doing a manual content-based analysis of the network features. While humans should never be removed from the analysis process, this work shows how automated techniques can be integrated to scale humans’ ability to gain insights in large networks. © 2017, Springer Science+Business Media, LLC.",Big data; Social network analysis; Topic modeling,8,Information Systems Frontiers,2018 863,Tomašev N.,Extracting the patterns of truthfulness from political information systems in Serbia,"In modern information societies, there are information systems that track and log parts of the ongoing political discourse. Due to the sheer volume of the accumulated data, automated tools are required in order to enable citizens to better interpret political statements and promises, as well as evaluate their truthfulness. We propose an approach to use the established machine learning and data mining techniques for analyzing annotated political statements and promises available via the Serbian Truth-o-meter (Istinomer) system in order to extract and interpret the hidden patterns of truthfulness and deceit. We perform standard textual processing and topic extraction and associate topical truthfulness profiles with the promise makers, for pattern discovery and prediction. Prevailing trends in Serbian political discourse emerge as strong association rules where truthfulness is set as the target variable. The evaluated set of standard content-based prediction models exhibit a bias towards the negative outcomes, due to an overall low truthfulness rate in the data. Our results demonstrate that it is possible to use data mining within political information systems for generating insights into the workings of governments. © 2015, Springer Science+Business Media New York.",Association rules; Data mining; Information systems; Politics; Text mining; Truthfulness,1,Information Systems Frontiers,2017 864,Liu Q.; Feng G.; Tayi G.K.; Tian J.,Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach,"To make informed decisions, managers establish data warehouses that integrate multiple data sources. However, the outcomes of the data warehouse-based decisions are not always satisfactory due to low data quality. Although many studies focused on data quality management, little effort has been made to explore effective data quality control strategies for the data warehouse. In this study, we propose a chance-constrained programming model that determines the optimal strategy for allocating the control resources to mitigate the data quality problems of the data warehouse. We develop a modified Artificial Bee Colony algorithm to solve the model. Our work contributes to the literature on evaluation of data quality problem propagation in data integration process and data quality control on the data sources that make up the data warehouse. We use a data warehouse in the healthcare organization to illustrate the model and the effectiveness of the algorithm. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Artificial bee Colony algorithm; Chance-constrained programming; Data quality; Data warehouse; Optimization model,22,Information Systems Frontiers,2021 865,Valecha R.,An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407,"The nature of emergency response operations varies based on agency, county, population, leadership, etc., which leads to serious challenges to interactions between emergency responders during routine emergencies. There have been very few studies that have provided direct insights into the emergency interactions from an information processing view based on real experience from the field. With the help of a case study, this paper aims to explore inter-agency interactions by addressing two research questions: (a) how do emergency agencies interact? (b) what characterizes interactions in the different stages of an emergency? This paper develops a framework for identifying emergency interactions that illustrate the templatic and dynamic styles as well as the active and passive patterns of interactions by examining data from the emergency reports. To summarize, this paper contributes to research in areas of inter-agency cooperation and emergency management. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Emergency interactions; Emergency response; Situation awareness,12,Information Systems Frontiers,2020 866,Kendall L.; Chaudhuri B.; Bhalla A.,Understanding Technology as Situated Practice: Everyday use of Voice User Interfaces Among Diverse Groups of Users in Urban India,"As smartphones have become ubiquitous across urban India, voice user interfaces (VUIs) are increasingly becoming part of diverse groups of users’ daily experiences. These technologies are now generally accessible as a result of improvements in mobile Internet access, [-8.5pc]Biography is Required. Please provide. introduction of low-cost smartphones and the ongoing process of their localisation into Indian languages. However, when people engage with technologies in their everyday lives, they not only enact the material attributes of the artifact but also draw on their skills, social positions, prior experience and societal norms and expectations to make use of the artifact. Drawing on Orlikowski’s analytical framework of “technologies-in-practice” we engage in an interview-based exploratory study among diverse groups of users in urban India to understand use of VUIs as situated practice. We identify three technologies-in-practice emerging through enactment of VUIs on users’ smartphones: looking up, learning and leisure. We argue that – instead of asking why and how users appropriate VUIs – identifying different kinds of enactments of VUIs present researchers and practitioners with a more nuanced understanding of existing and potential use of VUIs across varied contexts. © 2020, The Author(s).",Technologies-in-Practice; Voice user interfaces; Voice-based search,36,Information Systems Frontiers,2020 867,Pukthuanthong K.; Ullah S.; Walker T.J.; Wu X.,Timely vs. delayed CEO turnover,"This paper investigates changes in company performance following timely versus delayed CEO resignations due to financial wrongdoings. A timely resignation is proactively pushed by the company, and a delayed resignation is driven by investigations initiated by the SEC or other regulatory authorities. Our results show significant negative abnormal returns following the announcement of CEO resignations. In addition, compared with timely resignations, delayed resignations experience a larger and longer lasting negative stock market reaction. This suggests that CEO resignations due to financial wrongdoings are not perceived as good news by investors, and the delayed resignations could make investors lose more confidence, possibly because of worries about the ineffective corporate governance and supervision mechanism. We have found a significant negative relationship between CEO-chairman duality and the timeliness of CEO resignations. Our results have important implications for investors and policy makers. © 2017, Springer Science+Business Media New York.",CEO resignations; CEO turnover; Duality; Financial wrongdoing,8,Information Systems Frontiers,2017 868,Li Y.; Thomas M.A.; Osei-Bryson K.-M.,Ontology-based data mining model management for self-service knowledge discovery,"Data mining (DM) models are knowledge-intensive information products that enable knowledge creation and discovery. As large volume of data is generated with high velocity from a variety of sources, there is a pressing need to place DM model selection and self-service knowledge discovery in the hands of the business users. However, existing knowledge discovery and data mining (KDDM) approaches do not sufficiently address key elements of data mining model management (DMMM) such as model sharing, selection and reuse. Furthermore, they are mainly from a knowledge engineer’s perspective, while the business requirements from business users are often lost. To bridge these semantic gaps, we propose an ontology-based DMMM approach for self-service model selection and knowledge discovery. We develop a DM3 ontology to translate the business requirements into model selection criteria and measurements, provide a detailed deployment architecture for its integration within an organization’s KDDM application, and use the example of a student loan company to demonstrate the utility of the DM3. © 2016, Springer Science+Business Media New York.","Data mining; Knowledge reuse, DM3 ontology; Model management; Self-service knowledge discovery",24,Information Systems Frontiers,2017 869,Xu F.; Luo X.R.; Zhang H.; Liu S.; Huang W.W.,Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect,"Firms have increasingly invested in information technology (IT) security to protect their information resources. Nevertheless, deciding when to invest in IT security is rather difficult for executives because of the irreversibility of spending and uncertainty of IT security investments performance. A review of the literature on IT security investments reveals that previous studies largely neglected the strategy and timing of investments. Basing on real options theory, this research examines IT security investments for the commercial exploitation strategy versus the IT security improvement strategy in terms of proactive and reactive investments. An event methodology is used to estimate the effect of IT security investment timing on the stock performance of the investments. Our results show that reactive investments for IT security improvement and proactive investments for commercial exploitation earn positive abnormal returns. Moreover, the market reacts more positively to aligned than misaligned IT security investments. The implications of the research findings are presented and discussed. © 2017, Springer Science+Business Media, LLC.",Commercial exploitation strategy; IT security improvement; IT security investment; Proactive investment; Reactive investment; Real options,23,Information Systems Frontiers,2019 870,Wang C.; Medaglia R.; Jensen T.B.,When Ambiguity Rules: The Emergence of Adaptive Governance from (In)Congruent Frames of Knowledge Sharing Technology,"As increasingly diverse stakeholders engage in technology-mediated knowledge sharing, the establishment of appropriate forms of governance becomes a challenge. Existing research highlights that successful governance is a result of congruence between different stakeholders’ views and uses of technology, but the way suitable governance can emerge in the presence of incongruent or ambiguous framings of technology is still unclear. In this article, we present a case study of a collaboration between government, industry and university stakeholders, where the social media platform WeChat is used for knowledge sharing. Using the theoretical lens of the technological frames of reference (TFR), we investigate how views and uses of technology among different stakeholders shape the emergence of governance arrangements. We find that patterns of congruence and incongruence in the stakeholders’ framings of technology for knowledge sharing lead to emergent adaptive governance practices, which are characterized by selective participation, role and capability identification, and ad-hoc decision-making. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Adaptive governance; Inter-organizational collaboration; Knowledge sharing; Social media; Technological frames of reference,9,Information Systems Frontiers,2021 871,Teo T.S.H.; Kim S.L.; Jiang L.,E-Learning Implementation in South Korea: Integrating Effectiveness and Legitimacy Perspectives,"E-learning has the potential to transform public education. Based on a theoretical framework that integrates effectiveness and social legitimacy perspectives, this paper examines e-learning implementation in South Korea, and attributes its success to policies and efforts that address and manage both e-learning technology’s effectiveness and its social legitimacy. The effectiveness of e-learning is enhanced by building efficient e-learning infrastructure, and making continuous standardization efforts, while social legitimacy is gained by establishing a sound regulatory system, applying a socially appropriate online pedagogy, raising public awareness, and building e-learning communities. The results offer valuable lessons for other countries that intend to implement e-learning in the educational sector. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",E-learning; Effectiveness; Legitimacy; South Korea,36,Information Systems Frontiers,2020 872,Smith K.S.; McCreadie R.; Macdonald C.; Ounis I.,Regional Sentiment Bias in Social Media Reporting During Crises,"Crisis events such as terrorist attacks are extensively commented upon on social media platforms such as Twitter. For this reason, social media content posted during emergency events is increasingly being used by news media and in social studies to characterize the public’s reaction to those events. This is typically achieved by having journalists select ‘representative’ tweets to show, or a classifier trained on prior human-annotated tweets is used to provide a sentiment/emotion breakdown for the event. However, social media users, journalists and annotators do not exist in isolation, they each have their own context and world view. In this paper, we ask the question, ‘to what extent do local and international biases affect the sentiments expressed on social media and the way that social media content is interpreted by annotators’. In particular, we perform a multi-lingual study spanning two events and three languages. We show that there are marked disparities between the emotions expressed by users in different languages for an event. For instance, during the 2016 Paris attack, there was 16% more negative comments written in the English than written in French, even though the event originated on French soil. Furthermore, we observed that sentiment biases also affect annotators from those regions, which can negatively impact the accuracy of social media labelling efforts. This highlights the need to consider the sentiment biases of users in different countries, both when analysing events through the lens of social media, but also when using social media as a data source, and for training automatic classification models. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Regional bias; Sentiment analysis; Social media; Terrorist attacks,18,Information Systems Frontiers,2018 873,Mertens S.; Gailly F.; Van Sassenbroeck D.; Poels G.,Integrated Declarative Process and Decision Discovery of the Emergency Care Process,"Deviations and variations are the norm rather than the exception in medical diagnosis and treatment processes. Physicians must leverage their knowledge and experience to choose an appropriate variation for each patient. However, this knowledge and experience is often tacit. Process modeling offers a way to convert tacit to explicit knowledge. Many process mining techniques have been developed due to the difficulty of doing this manually, yet, they often neglect the decisions themselves, and these proposed techniques are just one piece of a comprehensive process discovery method. In this paper, we use the Action Design Research methodology to develop a method for process and decision discovery of medical diagnosis and treatment processes. The method was iteratively improved and validated by applying it to a practical setting, which was the emergency medicine department of a hospital. An analysis of the resulting model shows that previously tacit knowledge was successfully made explicit. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Decision mining; Healthcare; Knowledge extraction; Knowledge-intensive; Process discovery; Process mining,6,Information Systems Frontiers,2022 874,Tamilmani K.; Rana N.P.; Nunkoo R.; Raghavan V.; Dwivedi Y.K.,Indian Travellers’ Adoption of Airbnb Platform,"Much of the existing scholarly debate on sharing economy to date has focused on the use of technology in developed countries. However, the recent upsurge of mobile technology adoption in developing countries has provided suitable breeding ground for sharing economy. The lack of native theories in tourism and hospitality sector with scare utilization of unified theory of acceptance and use of technology (UTAUT) provide necessity for this research. This study adapted meta-UTAUT model as theoretical lens and extended the model with hedonic motivation, trust, and self-efficacy. Based on data from 301 potential Indian consumers, the results underscored the central role of attitude that significantly mediated the effects of effort expectancy, social influence, and facilitating conditions on consumer intention to use Airbnb. Meanwhile, performance expectancy emerged as significant direct determinant of intention alongside attitude, trust, and self-efficacy. The proposed model explained as much as 65% variance on Indian consumer’s intention to use Airbnb. © 2020, The Author(s).",Adoption; Airbnb; Emerging economy; Hospitality; India; Sharing economy; Tourism; UTAUT,59,Information Systems Frontiers,2022 875,Kluza K.; Nalepa G.J.,Formal Model of Business Processes Integrated with Business Rules,"Business Processes describe the ways in which operations are carried out in order to accomplish the intended objectives of organizations. A process can be depicted using a modeling notation, such as Business Process Model and Notation. Process model can also describe operational aspects of every task; but in a properly designed model, the detailed aspects of low-level logic should be delegated to external services, especially to a Business Rule Engine. Business Rules support the specification of knowledge in a declarative manner and can be successfully used for specification of details for process tasks and events. However, there is no unified model of process integrated with rules that ensures data types consistency. Thus, the paper presents a formal description of the integration of Business Processes with Business Rules. We provide a general model for such integration as well as the model applied to a specific rule representation from the Semantic Knowledge Engineering approach. © 2018, The Author(s).",Business process modeling; Business rules; Process with rules integration,17,Information Systems Frontiers,2019 876,Manca M.; Boratto L.; Carta S.,Behavioral data mining to produce novel and serendipitous friend recommendations in a social bookmarking system,"In the last few years, social media systems have experienced a fast growth. The amount of content shared in these systems increases fast, leading users to face the well known “interaction overload” problem, i.e., they are overwhelmed by content, so it becomes difficult to come across interesting items. To overcome this problem, social recommender systems have been recently designed and developed in order to filter content and recommend to users only interesting items. This type of filtering is usually affected by the “over-specialization” problem, which is related to recommendations that are too similar to the items already considered by the users. This paper proposes a friend recommender system that operates in the social bookmarking application domain and is based on behavioral data mining, i.e., on the exploitation of the users activity in a social bookmarking system. Experimental results show how this type of mining is able to produce accurate friend recommendations, allowing users to get to know bookmarked resources that are both novel and serendipitous. Using this approach, the impact of the “interaction overload” and the “over-specialization” problems is strongly reduced. © 2015, Springer Science+Business Media New York.",Behavioral data mining; Friend recommendation; Novelty; Serendipity; Social bookmarking,25,Information Systems Frontiers,2018 877,Wu D.; Nan G.; Li M.,Optimal Piracy Control: Should a Firm Implement Digital Rights Management?,"Many firms offer digital rights management (DRM) technologies to increase the piracy cost, thereby protecting illegal copy and distribution. However, many industrial cases contradict the speculation that using DRM technologies reduces legal users’ net value. Therefore, we develop a theoretical model to examine the trade-off based on consumer heterogeneity in piracy cost sensitivity to explore under what conditions a monopoly implements DRM policy. In the model, we categorize pirates into two types according to their behaviours in the piracy process. We find that adopting DRM restriction is profitable to the firm when the level of DRM restriction is high. The optimal restriction level is the maximal technological level when piracy cost is high and the maximal technological level is higher than a threshold. In addition, we derive that the firm should implement policies to prevent downloading unauthorized products shared by other legal users from a P2P network. When both piracy cost and DRM restriction level are low, a lower piracy cost increases the firm’s profit. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cost sensitivity; Digital products; Digital rights management; Piracy; Pricing,11,Information Systems Frontiers,2020 878,Chen W.; Rabhi F.A.,Enabling user-driven rule management in event data analysis,"Event data analysis is becoming increasingly of interest to academic researchers looking for patterns in the data. Unlike domain experts working in large companies who have access to IT staff and expensive software infrastructures, researchers find it harder to efficiently manage their event data analysis by themselves. Particularly, user-driven rule management is a challenge especially when analysis rules increase in size and complexity over time. In this paper, we propose an event data analysis platform called EP-RDR intended for non-IT experts that facilitates the evolution of event processing rules according to changing requirements. This platform integrates a rule learning framework called Ripple-Down Rules (RDR) operating in conjunction with an event pattern detection component invoked as a service (EPDaaS). We have built a prototype to demonstrate this solution on real-life scenario involving financial data analysis. © 2016, Springer Science+Business Media New York.",Event data; Event meta-model; Event processing; Ripple down rules; Rule management,8,Information Systems Frontiers,2016 879,Kuem J.; Ray S.,Personality Antecedents and Consequences of Internet Addiction Vis-à-vis Internet Habit: a Theory and an Empirical Investigation,"Researchers in information systems have studied how nonintentional elements of our psychology such as personality, addiction, and even sheer habit, can waylay us from our original purpose of using information technology. This study seeks to reintegrate these elements to present a holistic framework comparing Internet addiction with Internet habit in terms of their antecedent personality factors and their consequences. We tested the framework against data from a time-lagged survey of Internet users. As hypothesized, sensation seeking, neuroticism, and dysfunctional impulsivity influenced Internet addiction. In comparison, only neuroticism and dysfunctional impulsivity were significant in Internet habit. Furthermore, Internet addiction influences relative usage and negative outcomes, and habit further increases its influence on negative outcomes. Our findings contribute to the body of knowledge by showing the personality antecedents and behavioral consequences of Internet addiction, and by highlighting the similarity, difference, and interaction between Internet habit and Internet addiction. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Addiction; Habit; Online user behavior; Personality; Structural equation modeling; Time‐lagged survey study,6,Information Systems Frontiers,2022 880,Karimikia H.; Safari N.; Singh H.,Being useful: How information systems professionals influence the use of information systems in enterprises,"Organizations are keen to obtain as much value as they can from their information systems (IS) investments. While the first-order benefits of new information systems are usually obtained when they are used routinely, the full potential of new systems is only unlocked when they are used deeply. While the support of managers and peers can encourage individuals to use systems more deeply, the latter’s lack of technical know-how means that they may not be able to allay fears or doubts that arise as they improvise and experiment with new systems to infuse them into their work processes. We use social cognitive theory to frame infusion as a learning process, where individuals model their behavior based on the behaviors of others they observe in the environment and the resources available. We argue that individual users succeed in infusing new systems into their work when they interact with IS professionals. This interaction allows users to observe the actions of IS professionals and receive knowledge and guidance from them. The results of our study show that the discretionary behaviors exhibited by IS professionals positively affect users’ perceptions of the levels of usefulness and ease of use of new systems, encouraging them to use the systems as fully as possible. This study extends our understanding of the role that the discretionary behavior of IS professionals plays in enhancing the value that organizations obtain from their new IS investments. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Discretionary behaviors; Ease of use; Improvisation; IS infusion; IS professionals; Organizational citizenship behavior; Usefulness,9,Information Systems Frontiers,2020 881,Nemeskey D.M.; Kornai A.,Emergency Vocabulary,"For disaster preparedness, a key aspect of the work is the identification, ahead of time, of the vocabulary of emergency messages. Here we describe how static repositories of traditional news reports can be rapidly exploited to yield disaster- or accident-implicated words and named entities. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Emergency; Information retrieval; Vocabulary,6,Information Systems Frontiers,2018 882,Baumann E.; Kern J.; Lessmann S.,Usage Continuance in Software-as-a-Service,"Software-as-a-service applications are experiencing immense growth as their comparatively low cost makes them an important alternative to traditional software. Following the initial adoption phase, vendors are now concerned with the continued usage of their software. To analyze the influence of different measures to improve continued usage over time, a longitudinal study approach using data from a SaaS vendor was implemented. Employing a linear mixed model, the study finds several measures to have a positive effect on a software’s usage penetration. In addition to these activation measures performed by the SaaS vendor, software as well as client characteristics were also examined, but did not display significant estimates. The findings emphasize the need for proactive activation initiatives to raise usage penetration. More generally, the study contributes novel insights into the scarcely researched field of influencing factors on SaaS usage continuance. © 2020, The Author(s).",Linear mixed models; Software-as-a-service; Usage continuance,6,Information Systems Frontiers,2022 883,Baabdullah A.M.,Factors Influencing Adoption of Mobile Social Network Games (M-SNGs): The Role of Awareness,"M-SNGs represent a high-edge technological application that has been incessantly implemented in the electronic game sector on the international level. In the persuasion towards gaining a competitive advantage in markets, M-SNGs sponsored companies should consider factors that influence citizens’ behavioural intention to use M-SNGs as successful adoption of M-SNGs relies considerably on the level to which users are completely motivated to accept it. However, in addition to the very few studies on the international level, there is only one study that directly examined this topic within the context of Saudi Arabia. Therefore, this study aims to investigate factors that influence the adoption of M-SNGs within the domain of Saudi Arabia. As such, it examines the influence of UTAUT2 independent factors (i.e. performance expectancy, effort expectancy, hedonic motivation, price value, social influence, performance expectancy, and facilitating conditions) as well as awareness factor as independent factor over dependent factor i.e. behavioural intention. Also, it examines the impact of awareness on performance expectancy. Data was collected via field survey questionnaire distributed to a convenient sample of 355 participants. The findings indicated that all proposed hypotheses are accepted and the effect of awareness over performance expectancy was the highest followed by the effect of social influence over behavioural intention. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Awareness; Consumer adoption; M-SNGs; Mobile social network games; Saudi Arabia; UTAUT2,47,Information Systems Frontiers,2020 884,Klinker K.; Wiesche M.; Krcmar H.,Digital Transformation in Health Care: Augmented Reality for Hands-Free Service Innovation,"Health care professionals regularly require access to information systems throughout their daily work. However, existing smart devices like smartphones and tablets are difficult to use at the point of care, because health care professionals require both hands during their work. Following a design science research approach including ethnographic fieldwork and prototype tests with focus groups, we find that Augmented Reality smart glass applications offer potential for service innovation in the health care sector. Our smart glass prototype supports health care professionals during wound treatment by allowing them to document procedures hands-free while they perform them. Furthermore, we investigate the use of audio based and physical interaction with the smart glasses in a within-subjects design experiment. © 2019, The Author(s).",Augmented reality; Digital transformation; Health care; Smart devices; Smart services,105,Information Systems Frontiers,2020 885,Wang Y.; Li J.; Zhao X.; Feng G.; Luo X.R.,Using Mobile Phone Data for Emergency Management: a Systematic Literature Review,"Emergency management (EM) has always been a concern of people from all walks of life due to the devastating impacts emergencies can have. The global outbreak of COVID-19 in 2020 has pushed EM to the top topic. As mobile phones have become ubiquitous, many scholars have shown interest in using mobile phone data for EM. This paper presents a systematic literature review about the use of mobile phone data for EM that includes 65 related articles written between 2014 and 2019 from six electronic databases. Five themes in using mobile phone data for EM emerged from the reviewed articles, and a systematic framework is proposed to illustrate the current state of the research. This paper also discusses EM under COVID-19 pandemic and five future implications of the proposed framework to guide future work. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19 pandemic; Emergency management; Mobile phone data; Systematic framework; Systematic literature review,43,Information Systems Frontiers,2020 886,Wang M.; Li X.; Chau P.Y.K.,Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping Context,"Photos play a critical role in online shopping. To examine their impact on consumers, most previous studies rely on human assessments to develop measures for photos. Such an approach limits the number of dimensions and samples that can be investigated in one study. This study exploits image-processing techniques to tackle this challenge. We develop a framework and differentiate two types of computer-generated measures, aggregative and decompositive measures, which may be used in different ways in empirical research. We review the major image-processing technologies that have potential to be used in consumer behavior research. To showcase the feasibility of the framework, we conduct an example study on product photos’ impact on consumer click-through. Moreover, we conduct a simulation to investigate the robustness of the framework under the attack of image-processing algorithm errors. We find that image-processing techniques with 90~95% accuracy will be sufficient for empirical research. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Econometrics; Empirical study; Image-processing; Online shopping; Simulation,20,Information Systems Frontiers,2021 887,Delgosha M.S.; Saheb T.; Hajiheydari N.,Modelling the Asymmetrical Relationships between Digitalisation and Sustainable Competitiveness: A Cross-Country Configurational Analysis,"Sustainable competitiveness (SC) encourages nations not only to meet the needs of the current generation but also to sustain or even expand national wealth in the future without depleting natural and social capital. Drawing on complexity theory, we used a configurational approach to identify under what necessary and sufficient conditions, digitalisation contributes to achieve higher SC. Shifting attention from net effects to configuration analysis improves our understanding of cross-national differences in sustainability by exploring how the digitalisation factors combine to strengthen SC power across countries. To address the complexity of this configuration, we have incorporated fsQCA and NCA techniques in the modelling of high and low levels of sustainable competitiveness recipes. Analysis of data from 127 countries advanced our perception of how access to ICT infrastructures and capabilities, combined with the adoption and usage of ICT could result in different degrees of sustainable competitiveness. Theoretically, this study contributes to the literature on digitalisation and national sustainability; and it can practically act as a guideline for policymakers to understand the complex interactions and causal configurations of digitalisation factors on sustainability. © 2020, The Author(s).",Configurational analysis; Digitalisation; fsQCA; NCA; Sustainable competitiveness,51,Information Systems Frontiers,2021 888,Wang X.; Sugumaran V.; Zhang H.; Xu Z.,A Capability Assessment Model for Emergency Management Organizations,"Natural and manmade disasters may cause a great deal of loss of life and threat to the human society. As a result, an effective emergency management organization becomes more and more significant for the purpose of minimizing loss. In this paper, a capability assessment model, namely, disaster management and control model, is proposed to provide a general guideline for different types of emergency management organization. Eight indicators are proposed for assessing the capability of the organization. The assessment process includes collecting, analyzing, reporting and planning. The result of capability assessment is divided into four levels and recommendations are presented for reporting the details of the indicators. © 2017, Springer Science+Business Media, LLC.",Assessment tool; Emergency management; Emergency management system,45,Information Systems Frontiers,2018 889,Gill A.Q.; Henderson-Sellers B.; Niazi M.,Scaling for agility: A reference model for hybrid traditional-agile software development methodologies,"The adoption of agility at a large scale often requires the integration of agile and non-agile development elements for architecting a hybrid adaptive methodology. The challenge is ”which elements or components (agile or non-agile) are relevant to develop the context-aware hybrid adaptive methodology reference architecture?” This paper addresses this important challenge and develops a hybrid adaptive methodology reference architecture model using a qualitative constructive empirical research approach. In this way, we have uncovered the agility, abstraction, business value, business policy, rules, legal, context and facility elements or components that have not been explicitly modelled or discussed in International Standards (IS) such as the ISO/IEC 24744 metamodel. It is anticipated that a context-aware hybrid adaptive methodology can be architected by using the proposed context-aware hybrid adaptive methodology reference architecture elements for a particular situation when using a situational method engineering approach. © 2016, Springer Science+Business Media New York.",Agile methods; Method engineering; Methodology architecture; Reference architecture,47,Information Systems Frontiers,2018 890,Aleroud A.; Gangopadhyay A.,Multimode co-clustering for analyzing terrorist networks,"The phenomenon of terrorism is deemed one of the fundamental challenges in national security. Creating defensive technologies to mitigate terrorist attacks requires a simultaneous investigation of contextual relationships among their various dimensions. We proposed and evaluated a graph-based methodology to analyze terrorist networks through co-clustering in a multimode basis. Since there are many heterogeneous relationships in terrorist networks depending on the dimensions used during analysis, we utilized the clustering indicators of the multimode structure discovered in bi- and multimode graphs. Objects and activities that co-occur during terrorist attacks are identified by applying conventional clustering on those indicators. The novelty of our method is in the incremental creation of the multimode structure using its bi-mode counterparts. Our approach is evaluated using these measures: clustering stability and association confidence. The experimental results yields encouraging results in terms of simultaneous clustering of heterogeneous objects in terrorist networks. © 2016, Springer Science+Business Media New York.",k-means; Multimode clustering; Singular value decomposition; Social network analysis; Terrorist networks,7,Information Systems Frontiers,2018 891,Stieglitz S.; Mirbabaie M.; Möllmann N.R.J.; Rzyski J.,Collaborating with Virtual Assistants in Organizations: Analyzing Social Loafing Tendencies and Responsibility Attribution,"Organizations increasingly introduce collaborative technologies in form of virtual assistants (VAs) to save valuable resources, especially when employees are assisted with work-related tasks. However, the effect of VAs on virtual teams and collaboration remains uncertain, particularly whether employees show social loafing (SL) tendencies, i.e., applying less effort for collective tasks compared to working alone. While extant research indicates that VAs collaboratively working in teams exert greater results, less is known about SL in virtual collaboration and how responsibility attribution alters. An online experiment with N = 102 was conducted in which participants were assisted by a VA in solving a task. The results indicate SL tendencies in virtual collaboration with VAs and that participants tend to cede responsibility to the VA. This study makes a first foray and extends the information systems (IS) literature by analyzing SL and responsibility attribution thus updates our knowledge on virtual collaboration with VAs. © 2021, The Author(s).",Organizations; Responsibility attribution; Social loafing; Virtual assistants; Virtual collaboration,26,Information Systems Frontiers,2022 892,Tesfaye B.; Augsten N.; Pawlik M.; Böhlen M.H.; Jensen C.S.,Speeding Up Reachability Queries in Public Transport Networks Using Graph Partitioning,"Computing path queries such as the shortest path in public transport networks is challenging because the path costs between nodes change over time. A reachability query from a node at a given start time on such a network retrieves all points of interest (POIs) that are reachable within a given cost budget. Reachability queries are essential building blocks in many applications, for example, group recommendations, ranking spatial queries, or geomarketing. We propose an efficient solution for reachability queries in public transport networks. Currently, there are two options to solve reachability queries. (1) Execute a modified version of Dijkstra’s algorithm that supports time-dependent edge traversal costs; this solution is slow since it must expand edge by edge and does not use an index. (2) Issue a separate path query for each single POI, i.e., a single reachability query requires answering many path queries. None of these solutions scales to large networks with many POIs. We propose a novel and lightweight reachability index. The key idea is to partition the network into cells. Then, in contrast to other approaches, we expand the network cell by cell. Empirical evaluations on synthetic and real-world networks confirm the efficiency and the effectiveness of our index-based reachability query solution. © 2021, The Author(s).",Public transport networks; Reachability queries; Spatial network databases; Temporal graphs,7,Information Systems Frontiers,2022 893,de Brito S.R.; do Socorro da Silva A.; da Mata E.C.; Vijaykumar N.L.; da Rocha C.A.J.; de Abreu Monteiro M.; Costa J.C.W.A.; Francês C.R.L.,An approach to evaluate large-scale ICT training interventions,"Despite advances in the quality and availability of information and communication technologies (ICT), the level of access and skill in using these resources remains unequal. This is particularly evident in developing countries. To reduce the gap between these levels of ICT use, organizations (both public and private) invest in the expansion of infrastructure by providing ICT access and ICT training. In this study, we demonstrate that there is a gap in current approaches to monitor and evaluate large-scale ICT training interventions. Thus, we propose an approach based on social network analysis and data mining techniques, and apply it to an online training program conducted in different regions of Brazil. The results allow us to examine different aspects of the program, such as the region of participants, the institutions driving the intervention, local indicators of telecommunications infrastructure, and local socioeconomic conditions. © 2016, Springer Science+Business Media New York.",Data mining; Developing countries; Digital divide; ICT intervention; Social network analysis; Telecentres,9,Information Systems Frontiers,2018 894,Piccialli F.; di Cola V.S.; Giampaolo F.; Cuomo S.,The Role of Artificial Intelligence in Fighting the COVID-19 Pandemic,"The first few months of 2020 have profoundly changed the way we live our lives and carry out our daily activities. Although the widespread use of futuristic robotaxis and self-driving commercial vehicles has not yet become a reality, the COVID-19 pandemic has dramatically accelerated the adoption of Artificial Intelligence (AI) in different fields. We have witnessed the equivalent of two years of digital transformation compressed into just a few months. Whether it is in tracing epidemiological peaks or in transacting contactless payments, the impact of these developments has been almost immediate, and a window has opened up on what is to come. Here we analyze and discuss how AI can support us in facing the ongoing pandemic. Despite the numerous and undeniable contributions of AI, clinical trials and human skills are still required. Even if different strategies have been developed in different states worldwide, the fight against the pandemic seems to have found everywhere a valuable ally in AI, a global and open-source tool capable of providing assistance in this health emergency. A careful AI application would enable us to operate within this complex scenario involving healthcare, society and research. © 2021, The Author(s).",Artificial intelligence; COVID-19; Deep learning; Healthcare; Machine learning; Review; SARS-CoV-2; Survey,119,Information Systems Frontiers,2021 895,Peng D.L.; Wang Y.R.; Liu C.; Chen Z.,TL-NER: A Transfer Learning Model for Chinese Named Entity Recognition,"Most of the current research on Named Entity Recognition (NER) in the Chinese domain is based on the assumption that annotated data are adequate. However, in many scenarios, the sufficient amount of annotated data required for Chinese NER task is difficult to obtain, resulting in poor performance of machine learning methods. In view of this situation, this paper tries to excavate the information contained in the massive unlabeled raw text data and utilize it to enhance the performance of Chinese NER task. A deep learning model combined with Transfer Learning technique is proposed in this paper. This method can be leveraged in some domains where there is a large amount of unlabeled text data and a small amount of annotated data. The experiment results show that the proposed method performs well on different sized datasets, and this method also avoids errors that occur during the word segmentation process. We also evaluate the effect of transfer learning from different aspects through a series of experiments. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Chinese named entity recognition; Deep learning; Natural language processing; Transfer learning,32,Information Systems Frontiers,2020 896,Trang S.; Brendel B.,A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research,"Enforcing information security policies is a key concern of information security managers. To deter employees from deviant behavior, organizations often implement sanction mechanisms. However, evidence from research regarding the efficiency of such a deterrence approach has been mixed. Drawing on this inconsistency, this paper examines the applicability of deterrence theory in information security policy compliance research. It is argued that contextual and methodological moderators play a crucial role when conceptualizing deterrence theory in security studies. Applying a meta-analysis, the results suggest that sanctions have an overall effect on deviant behavior. However, the results also indicate that this relationship is dependent on the study’s context. Deterrence theory better predicts deviant behavior in malicious contexts, cultures with a high degree of power distance, and cultures with a high uncertainty avoidance. The meta-analysis also reveals no meaningful differences arising from the methodological context in terms of scenario-based and behavior-specific measurement. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Compliance behavior; Deterrence theory; Information security policy; Meta-analysis,88,Information Systems Frontiers,2019 897,Ehrenberg A.J.; King J.L.,Blockchain in Context,"Blockchain has been used primarily in cryptocurrency applications like Bitcoin and Ethereum. These use cases show the staying power of blockchain technology and suggest additional uses such as smart contracting. We suggest these use cases, while producing knowledge, do not forecast the future of blockchain. Learning-by-doing reveals the evolution of blockchain as a sociotechnical system, suggesting that there is more to learn. Predicting how sociotechnical systems will evolve is difficult, but historical and lexical analyses suggest two areas for blockchain growth. One is provenance, authentication through recording of ownership or other control state, applicable to jewels, real property, art works, food stuffs, designer items, and anything else where genuineness is valued. The other is chain-of-custody, proving that duty of care has been faithfully executed regarding living beings (children, people in legal custody, research subjects, research animals, pets), or that inanimate things (evidence, data, representations such as photographs) have not been tampered with. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.","Bitcoin, Ethereum; Blockchain; Chain of custody; Cryptocurrency; Provenance; Sociotechnical system",47,Information Systems Frontiers,2020 898,Weerakkody V.; Irani Z.; Kapoor K.; Sivarajah U.; Dwivedi Y.K.,Open data and its usability: an empirical view from the Citizen’s perspective,"Government legislation and calls for greater levels of oversight and transparency are leading public bodies to publish their raw datasets online. Policy makers and elected officials anticipate that the accessibility of open data through online Government portals for citizens will enable public engagement in policy making through increased levels of fact based content elicited from open data. The usability and benefits of such open data are being argued as contributing positively towards public sector reforms, which are under extreme pressures driven by extended periods of austerity. However, there is very limited scholarly studies that have attempted to empirically evaluate the performance of government open data websites and the acceptance and use of these data from a citizen perspective. Given this research void, an adjusted diffusion of innovation model based on Rogers’ diffusion of innovations theory (DOI) is proposed and used in this paper to empirically determine the predictors influencing the use of public sector open data. A good understanding of these predictors affecting the acceptance and use of open data will likely assist policy makers and public administrations in determining the policy instruments that can increase the acceptance and use of open data through an active promotion campaign to engage-contribute-use. © 2016, The Author(s).",Citizens; Government; Open data; Policy; Usability,180,Information Systems Frontiers,2017 899,Zhou L.; Amadi U.; Zhang D.,"Is Self-Citation Biased? An Investigation via the Lens of Citation Polarity, Density, and Location","Traditional citation analysis methods have been criticized because their theoretical base of statistical counts does not reflect the motive or judgment of citing authors. In particular, self-citations may give undue credits to a cited article or mislead scientific development. This research aims to answer the question of whether self-citation is biased by probing into the motives and context of citations. It takes an integrated and fine-grained view of self-citations by examining them via multiple lenses — polarity, density, and location of citations. In addition, it explores potential moderating effects of citation level and associations among location contexts of citations to the same references for the first time. We analyzed academic publications across different topics and disciplines using both qualitative and quantitative methods. The results provide evidence that self-citations are free of bias in terms of citation density and polarity uncertainty, but they can be biased with respect to positivity and negativity of citations. Furthermore, this study reveals impacts of self-citing behavior on some citation patterns involving citation density, location concentration, and associations. The examination of self-citing behavior from those new perspectives shed new lights on the nature and function of self-citing behavior. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Bias; Citation analysis; Density; Location; Polarity; Self-citation,8,Information Systems Frontiers,2020 900,Kalgotra P.; Sharda R.; McHaney R.,Don’t Disturb Me! Understanding the Impact of Interruptions on Knowledge Work: an Exploratory Neuroimaging Study,"As we become more and more connected, the number of technology interruptions are increasing as well. The mechanisms by which a technology interruption takes attention away and ongoing task performance decreases need more investigation. Through neuroimaging, this paper explores how technologies can interrupt concentration, focus and attention of knowledge workers. Subjects were given reading tasks and subjected to a series of randomly timed audio interruptions. Using an electroencephalogram (EEG) measurement device, we recorded their brain waves. Consistent with the literature, we found interruptions significantly increased task completion time and decreased task performance. Neuroimaging analysis showed activity in the frontal lobe, temporal lobe and insular cortex of the participants due to interruptions. The paper also investigates differences due to gender and age. The results suggest application developers should consider underlying mechanisms of processing interruptions. © 2017, Springer Science+Business Media, LLC.",Electroencephalogram (EEG); Interruption; Knowledge work; Neuroimaging; NeuroIS,21,Information Systems Frontiers,2019 901,Mirbakhsh N.; Ling C.X.,Leveraging clustering to improve collaborative filtering,"Extensive work on matrix factorization (MF) techniques have been done recently as they provide accurate rating prediction models in recommendation systems. Additional extensions, such as neighbour-aware models, have been shown to improve rating prediction further. However, these models often suffer from a long computation time. In this paper, we propose a novel method that applies clustering algorithms to the latent vectors of users and items. Our method can capture the common interests between the cluster of users and the cluster of items in a latent space. A matrix factorization technique is then applied to this cluster-level rating matrix to predict the future cluster-level interests. We then aggregate the traditional user-item rating predictions with our cluster-level rating predictions to improve the rating prediction accuracy. Our method is a general “wrapper” that can be applied to all collaborative filtering methods. In our experiments, we show that our new approach, when applied to a variety of existing matrix factorization techniques, improves their rating predictions and also results in better rating predictions for cold-start users. Above all, in this paper we show that better quality and more quantity of these clusters achieve a better rating prediction accuracy. © 2016, Springer Science+Business Media New York.",Collaborative filtering; Matrix factorization; Recommendation system,17,Information Systems Frontiers,2018 902,Zhao W.; Zeng Q.; Zheng G.; Yang L.,The resource allocation model for multi-process instances based on particle swarm optimization,"Resource allocation in process management focuses on how to maximize process performance via proper resource allocation since the quality of resource allocation determines process outcome. In order to improve resource allocation, this paper proposes a resource allocation method, which is based on the improved hybrid particle swarm optimization (PSO) in the multi-process instance environment. Meanwhile., a new resource allocation model is put forward, which can optimize the resource allocation problem reasonably. Furthermore., some improvements are made to streamline the effectiveness of the method, so as to enhance resource scheduling results. In the end, experiments are conducted to demonstrate the effectiveness of the proposed method. © 2017, Springer Science+Business Media New York.",Genetic algorithm; Multi-process; Particle swarm optimization; Resource allocation model; Update mechanism,20,Information Systems Frontiers,2017 903,Gerpott T.J.; Meinert P.,Correlates of using the billing system of a mobile network operator to pay for digital goods and services,"In many countries mobile network operators (MNOs) offer their customers the possibility to pay for digitized content, applications or services which they buy over their mobile smartphone via the carriers’ billing systems. To date, customer take-up of this mobile carrier billing (MCB) payment option is predominantly modest. At the same time, there is little empirical evidence on individual level factors significantly associated with the acceptance of MCB payment which differentiates firstly the principal adoption of the service in the sense of a yes-or-no decision and secondly the intensity of service usage among adopters. Therefore, the present study explores correlates between a total of 10 socio-demographic, contract-, communication habits- and smartphone-related variables on the one hand and the two MCB payment acceptance criteria on the other in a sample of 5010 postpaid residential customers of the German subsidiary of a multinational MNO. In contrast to many prior investigations, MCB payment adoption and usage intensity measures in the present work reflect real (and not retrospective subjective estimates of or intended) payment behaviors. A Probit regression analysis indicates that, compared to non-adopters, customers who have paid via MCB are male, have a shorter MNO tenure, have higher mobile service spending, generate more mobile Internet traffic, send more SMS and use a smartphone whose OS manufacturer offers MCB payment on its own online market place. In the subsample of adopters of MCB payments higher mean monthly MCB settlement amounts are generated by male and older subscribers who have a shorter MNO tenure, create more mobile Internet traffic, use mobile voice telephony more and SMS less heavily and who are equipped with a smartphone whose OS manufacturer does not offer MCB payment on its online market place. Findings are discussed in terms of their implications for scholarly research on antecedents of the acceptance of novel telecommunication-based service offerings such as MCB payments and of basic levers of MNOs for improving the customer take-up of their MCB payment offerings and the usage intensity of the service among its adopters. © 2016, Springer Science+Business Media New York.",Consumer acceptance; Digital goods and services; Mobile carrier billing payment; Mobile payment services; Regression analysis; Two-part model,6,Information Systems Frontiers,2016 904,Dang Y.M.; Zhang Y.G.; Brown S.A.; Chen H.,Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system,"Information overload has been an important issue in today’s big data era where a huge amount of unstructured user-generated content in different languages is being created on the Web in every minute. Social media search systems could help with it by effectively and efficiently collecting, storing, organizing and presenting user-generated content across the Web in an organized and timely manner. However, little research has been done to examine factors that could influence user acceptance on this new type of systems. To address it, this study develops a research model by integrating Mental Workload (MWL), Task-Technology Fit (TTF), and the unified theory of acceptance and use of technology (UTAUT). The model is tested on a security-related social media search system. The results indicate that both MWL and TTF can significantly influence user acceptance. We also operationalize the multi-dimensional latent construct of MWL by developing survey-based measurement items for different dimensions. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Mental workload (MWL); Social media search system; Task-technology fit (TTF); User acceptance; User-generated content,50,Information Systems Frontiers,2020 905,Kimble C.; de Vasconcelos J.B.; Rocha Á.,Competence management in knowledge intensive organizations using consensual knowledge and ontologies,"This article describes an architecture suitable for use in a competence management system for knowledge intensive organizations (KIOs). The underlying motivation for this work is to explore the practical problems of the use of codified knowledge in knowledge management systems (KMS) in KIOs. We explore some of the key issues associated with the use of tacit and codified knowledge in KMS, and describe an architecture based on an ontology-driven framework derived from collective and consensual knowledge that acts as a structure for a formal knowledge base. We describe, in outline, a prototype competence management system based on this architecture designed to support the management of competencies in a structured way. We conclude with some observations about our approach to the representation of knowledge in a KMS and its potential value to KIOs. © 2016, Springer Science+Business Media New York.",Codified knowledge; Competence management; Consensual knowledge; Knowledge intensive organizations; Knowledge management; Ontologies; Tacit knowledge,38,Information Systems Frontiers,2016 906,Grzenda M.; Legierski J.,Towards Increased Understanding of Open Data Use for Software Development,"The way open data resources of varied type and volume are used by software applications remains only partly known. In this study, following CRoss-Industry Standard Process for Data Mining, we propose a methodology for collecting and analyzing access data describing the use of open data resources by individual software applications. The methodology includes novel categorization of the data collected at an exposition portal providing access to underlying open data portals and third-party services. Furthermore, it enables research into the use of both different open data resources and resource groups such as Big Data resources for software development. We apply the methodology to analyze the re-use of open urban data during reference software development events. The identification of open data use by individual applications is largely improved compared to baseline scenario, as shown by numerical indicators including F1 measure. Insight into re-use of data streams and actual development time is obtained. © 2019, The Author(s).",Application development; Application programming interface; Big data; Open data,13,Information Systems Frontiers,2021 907,Lee J.K.; Chang Y.; Kwon H.Y.; Kim B.,Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach,"The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research proposes to design the Internet infrastructure using the preventive cybersecurity measures of the Bright Internet, namely preventive cybersecurity protocol and identifiable anonymity protocol, and ten privacy rights derived from Europe’s General Data Protection Regulations (GDPR). We then analyze the legitimacy of the five steps of the preventive cybersecurity protocol and the four features of the identifiable anonymity protocol from the perspectives of ten privacy rights. We address the legitimacy from the perspective of potential victims’ self-defense rights. Finally, we discuss four potential risks that may occur to the innocent senders and proposed resilient recovery procedures. © 2020, The Author(s).",Bright internet; GDPR; Identifiable anonymity protocol; Preventive cybersecurity protocol; Privacy rights; Self-defense rights,41,Information Systems Frontiers,2020 908,Jones S.; Irani Z.; Sivarajah U.; Love P.E.D.,Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies,"Government organisations have been shifting to cloud-based services in order to reduce their total investments in IT infrastructures and resources (e.g. data centers), as well as capitalise on cloud computing’s numerous rewards. However, just like any other technology investments there are also concerns over the potential risks of implementing cloud-based technologies. Such concerns and the paucity of scholarly literature focusing on cloud computing from a governmental context confirm the need for exploratory research and to draw lessons for government authorities and others in order to ensure a reduction in costly mistakes. This paper therefore investigates the implementation of cloud computing in both a practical setting and from an organisational user perspective via three UK local government authorities. Through the qualitative case study enquiries, the authors are able to extrapolate perceived rewards and risks factors which are mapped against the literature so that emergent factors can be identified. All three cloud deployments resulted in varying outcomes which included key rewards such as improved information management, flexibility of work practices and also posed risks such as loss of control and lack of data ownership to the organisations. These findings derived from the aggregated organisational user perspectives will be of benefit to both academics and practitioners engaged in cloud computing research and its strategic implementation in the public sector. © 2017, The Author(s).",Case studies; Cloud computing; Local government authority; Public sector; Rewards; Risks,62,Information Systems Frontiers,2019 909,Li T.; Ma Z.,Object-stack: An object-oriented approach for top-k keyword querying over fuzzy XML,"Keyword search is the most popular technique of searching information from XML (eXtensible markup language) document. It enables users to easily access XML data without learning the structure query language or studying the complex data schemas. Existing traditional keyword query methods are mainly based on LCA (lowest common ancestor) semantics, in which the returned results match all keywords at the granularity of elements. In many practical applications, information is often uncertain and vague. As a result, how to identify useful information from fuzzy data is becoming an important research topic. In this paper, we focus on the issue of keyword querying on fuzzy XML data at the granularity of objects. By introducing the concept of “object tree”, we propose the query semantics for keyword query at object-level. We find the minimum whole matching result object trees which contain all keywords and the partial matching result object trees which contain partial keywords, and return the root nodes of these result object trees as query results. For effectively and accurately identifying the top-K answers with the highest scores, we propose a score mechanism with the consideration of tf*idf document relevance, users’ preference and possibilities of results. We propose a stack-based algorithm named object-stack to obtain the top-K answers with the highest scores. Experimental results show that the object-stack algorithm outperforms the traditional XML keyword query algorithms significantly, and it can get high quality of query results with high search efficiency on the fuzzy XML document. © 2017, Springer Science+Business Media New York.",Fuzzy XML; Keyword query; Object-oriented; Preference; Top-K,6,Information Systems Frontiers,2017 910,Lukić J.; Radenković M.; Despotović-Zrakić M.; Labus A.; Bogdanović Z.,Supply chain intelligence for electricity markets: A smart grid perspective,"Smart grid technologies are bringing innovations in electrical power industries, affecting all parts of the electricity supply chain, and leading to changes in market structure, business models and services. In this paper we introduce a model of business intelligence for a smart grid supply chain. The model is developed in order to provide electricity markets with the necessary data flows and information important for the decision making process. The proposed model offers a way to efficiently leverage the new metering architecture and the new capabilities of the grid to reap immediate business value from the huge amounts of disparate data in emerging smart grids. The model was evaluated for the Serbian electricity market in the electric power transmission company Public Enterprise “Elektromreža Srbije”. The results show that business intelligence solutions can contribute to a more effective management of smart grids, in order to ensure that companies achieve sustainability in the increasingly competitive electricity markets, while still providing the high quality services to end users. © 2015, Springer Science+Business Media New York.",Business intelligence; Electricity markets; Electricity supply chain; Key performance indicators; Smart grids,31,Information Systems Frontiers,2017 911,Hossain M.A.; Dwivedi Y.K.; Chan C.; Standing C.; Olanrewaju A.-S.,Sharing Political Content in Online Social Media: A Planned and Unplanned Behaviour Approach,"Human’s decision making is not necessarily always planned; their unplanned behaviour—determined by natural personality traits—also contributes to the decision making process. In this study, we investigate factors related to planned and unplanned behaviour to understand why people share political content in online social media. Based on an online survey of 257 social media users, our results demonstrate that the factors representing both planned (i.e., perceived social recognition and altruistic motivation) and unplanned behaviour (i.e., extroversion and impulsiveness) affect people’s political content sharing behaviour. Our study understands that sharing political content is not like sharing other forms of content such as tourist attractions—the former can provoke serious punishment in some countries. Accordingly, trait impulsiveness is negatively associated with political content sharing behaviour. We also found that collective opinion moderates people’s planned behaviour, but not their unplanned behaviour. In other words, personality traits are unaffected by others’ opinions, but traits that humans can control can be shaped by others’. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Collective opinion; Planned and unplanned/automatic behaviour; Political content; Social media,76,Information Systems Frontiers,2018 912,Zhou M.J.; Lu B.; Fan W.P.; Wang G.A.,Project description and crowdfunding success: an exploratory study,"Existing research on antecedent of funding success mainly focuses on basic project properties such as funding goal, duration, and project category. In this study, we view the process by which project owners raise funds from backers as a persuasion process through project descriptions. Guided by the unimodel theory of persuasion, this study identifies three exemplary antecedents (length, readability, and tone) from the content of project descriptions and two antecedents (past experience and past expertise) from the trustworthy cue of project descriptions. We then investigate their impacts on funding success. Using data collected from Kickstarter, a popular crowdfunding platform, we find that these antecedents are significantly associated with funding success. Empirical results show that the proposed model that incorporated these antecedents can achieve an accuracy of 73 % (70 % in F-measure). The result represents an improvement of roughly 14 percentage points over the baseline model based on informed guessing and 4 percentage points improvement over the mainstream model based on basic project properties (or 44 % improvement of mainstream’s performance over informed guessing). The proposed model also has superior true positive and true negative rates. We also investigate the timeliness of project data and find that old project data is gradually becoming less relevant and losing predictive power to newly created projects. Overall, this study provides evidence that antecedents identified from project descriptions have incremental predictive power and can help project owners evaluate and improve the likelihood of funding success. © 2016, The Author(s).",Content analysis; Crowdfunding; Empirical study; Persuasion; Predictive model,192,Information Systems Frontiers,2018 913,King J.L.; Ehrenberg A.J.,The Productivity Vampires,"The four decade old Productivity Puzzler (sometimes called the Productivity Paradox) asks why the massive investment in information technology (IT) is not accompanied by equally massive productivity improvements. The belief that IT does improve productivity is foiled by faulty measurement, but improved measurement will, at some point, demonstrate conclusively that IT improves productivity. Another view is that “Productivity Vampires” use IT to suck productivity out of organizations through mechanisms such as moving the goalposts, making things not forbidden required, and increasing cognitive load on workers. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cognitive load; Compliance; Information; Productivity; Systems; Technology,6,Information Systems Frontiers,2020 914,Ayaburi E.W.; Wairimu J.; Andoh-Baidoo F.K.,Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study,"Wireless networks are becoming the norm in the society, where hotspots afford users access to the internet through mobile devices. Unknown wireless networks, open public networks with unknown identity, pose threats as hackers can gain unauthorized access to users’ private information stored in their mobile devices. Despite the imminent dangers, individuals continue to use these networks. This study explicates a self-regulation theory model to investigate the antecedents of deficient self-regulation (DSR). We posit that both habit cues and information security experiential factors influence DSR, leading to habitual use of unknown wireless networks. The results show that perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence DSR, which subsequently influences habitual use of unknown wireless networks. This study contributes to the literature on self-regulatory theory and privacy, and also provides implications for managers in dealing with vulnerabilities posed by employees using private or corporate mobile devices on unknown wireless network. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cues; Deficient self-regulation; Habits; Privacy; Security; Unknown wireless networks,8,Information Systems Frontiers,2019 915,Limbasiya T.; Sahay S.K.; Sridharan B.,Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System,"The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and sensitive data is exchanged between a user and a doctor. When health data is transmitted over a common channel, it becomes essential to preserve various privacy and security properties in the system. Further, the number of users for remote services is increasing day-by-day exponentially, and thus, it is not adequate to deal with all users using the one server due to the verification overhead, server failure, and scalability issues. Thus, researchers proposed various authentication protocols for multi-server architecture, but most of them are vulnerable to different security attacks and require high computational resources during the implementation. To Tackle privacy and security issues using less computational resources, we propose a privacy-preserving mutual authentication and key agreement protocol for a multi-server healthcare system. We discuss the proposed scheme’s security analysis and performance results to understand its security strengths and the computational resource requirement, respectively. Further, we do the comparison of security and performance results with recent relevant authentication protocols. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Attack; Authentication; Data; Healthcare; Mullti-server; User privacy,19,Information Systems Frontiers,2021 916,Albashrawi M.; Kartal H.; Oztekin A.; Motiwalla L.,Self-Reported and Computer-Recorded Experience in Mobile Banking: a Multi-Phase Path Analytic Approach,"Mobile banking (MB) has emerged as a strategic differentiator for financial institutions. This study explores the limitations associated with using subjective measures in MB studies that solely rely on survey-based approaches and traditional structural analysis models. We incorporate an objective data analytic approach into measuring usage experiences in MB to overcome potential limitations and to provide further insight for practitioners. We first utilize a multi-phase path analytical approach to validate the UTAUT model in order to reveal critical factors determining the success of MB use and disclose any nonlinearities within those factors. Proposed data analytics approach also identifies non-hypothesized paths and interaction effects. Our sample is collected from computer-recorded log data and self-reported data of 472 bank customers in the northeastern region of USA. We have analyzed the data using the conventional structural equation modeling (SEM) and the Bayesian neural networks-based universal structural modeling (USM). This holistic approach reveals non-trivial, implicit, previously unknown, and potentially useful results. To exemplify, effort expectancy is found to relate positively (but nonlinearly) with behavioral intention and is also ranked as the most important driving factor in UTAUT affecting the MB system usage. Theoretical and practical implications are discussed and presented in terms of both academic and industry-based perspectives. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Behavioral analytics; Mobile banking; Structural equation modeling; UTAUT model,35,Information Systems Frontiers,2019 917,Hubermann B.A.; Lund B.; Wang J.,Quantum Secured Internet Transport,"Quantum computing represents an emerging threat to the public key infrastructure underlying transport layer security (TLS) widely used in the Internet. This paper describes how QKD symmetric keys can be used with TLS to provide quantum computing resistant security for existing Internet applications. We also implement and test a general hybrid key delivery architecture with QKD over long distance fibers between secure sites, and wireless key distribution over short distance within each site. Finally we show how this same capability can be extended to a TLS cipher scheme with perfect security. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Quantum computing; Quantum key distribution; Transport layer security,4,Information Systems Frontiers,2020 918,Chang V.; Abdel-Basset M.; Ramachandran M.,Towards a Reuse Strategic Decision Pattern Framework – from Theories to Practices,"This paper demonstrates our proposed Reuse Strategic Decision Pattern Framework (RSDPF) based on blending ANP and TOPSIS techniques, enabled by the OSM model with data analytics. The motivation, related work, theory, the use and deployment, and the service deployment of the framework have been discussed in details. In this paper, RSDPF framework is demonstrated by the data analysis and interpretations based on a financial service firm. The OSM model allows 3 step of processed to be performed in one go to perform statistical tests, identify linear relations, check consistency on dataset and calculate OLS regression. The aim is to identify the actual, expected and risk rates of profitability. Code and services can be reused to compute for analysis. Service integration of the RSDPF framework has been demonstrated. Results confirm that there is a high extent of reliability. In this paper, we have demonstrated the reuse and integration of the framework supported by the case study of the financial service firm with its data analysis and service to justify our research contributions – reuse and integration in statistical data mining, knowledge and heuristic discovery and finally domain transference. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",ANP and TOPSIS techniques; OSM case study; Predictive analytics pattern; Reuse and integration; RSDPF framework; Service integration for data science,32,Information Systems Frontiers,2019 919,Narducci F.; Musto C.; de Gemmis M.; Lops P.; Semeraro G.,TV-Program Retrieval and Classification: A Comparison of Approaches based on Machine Learning,"Electronic Program Guides (EPGs) are systems that allow users of media applications, such as web TVs, to navigate scheduling information about current and upcoming programming. Personalized EPGs help users to overcome information overload in this domain, by exploiting recommender systems that automatically compile lists of novel and diverse video assets, based on implicitly or explicitly defined user preferences. In this paper we introduce the concept of personal channel, on which Personalized EPGs are grounded, that provides users with potentially interesting programs and videos, by exploiting program genres (documentary, sports, …) and short textual descriptions of programs to find and categorize them. We investigate the problem of adopting appropriate algorithms for TV-program classification and retrieval, in the context of building personal channels, which is harder than a classical retrieval or classification task because of the short text available. The approach proposed to overcome this problem is the adoption of a new feature generation technique that enriches the textual program descriptions with additional features extracted from Wikipedia. Results of the experiments show that our approach actually improves the retrieval performance, while a limited positive effect is observed on classification accuracy. © 2017, Springer Science+Business Media, LLC.",Content-based filtering; Electronic program guides; Recommender systems,10,Information Systems Frontiers,2018 920,Banaeianjahromi N.; Smolander K.,Lack of Communication and Collaboration in Enterprise Architecture Development,"Enterprise architecture (EA) is widely employed to reduce complexity and to improve business–information technology (IT) alignment. Despite the efforts by practitioners and academics in proposing approaches to smoothen EA development, it is not easy to find a fully successful EA. Because EA development is a complex endeavour, it is important to understand the obstacles that practitioners face during EA development. With the grounded theory, we studied how obstacles during EA development emerged from practitioners’ point of view in 15 large enterprises. The study identifies lack of communication and collaboration as the core obstacle that can explain many other obstacles. Communication and collaboration were also harmed by other perceived EA development obstacles, including lack of knowledge and support inside organization and issues imposed by external parties, hesitation in training personnel, setting too ambitious goals, constant change of management, (lack of) clarity in EA development process, lack of budget, forcing personnel to adopt EA, lack of motivation, organizational culture, and organizational structure deficiencies. The lack of communication and collaboration caused several undesired effects to organizations, such as being unable to set common goals and achieve a shared understanding, personnel’s distrust, endangered EA governance, lack of innovation capability, lost competitive edge, and ineffective EA outputs. The study highlights that organisations should improve their communication and collaboration before embarking on EA to encounter fewer obstacles. We provide four recommendations for practitioners to improve communication and collaboration in EA development. © 2017, Springer Science+Business Media, LLC.",Communication and collaboration; Enterprise architecture; Enterprise architecture development; Grounded theory; Large enterprises; Obstacles,50,Information Systems Frontiers,2019 921,Liao R.; Balasinorwala S.; Raghav Rao H.,Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests,"Previous studies on fighting computer-assisted frauds have attempted to assist law enforcement agencies (LEAs) to better understand important aspects of motivation, opportunity and deterrence. However, there have been few empirical studies on the profiles of convicted offenders, post detection. This paper examines characteristics of frauds and their associated respective law enforcement response with particular emphasis on frauds facilitated by information technology. The findings show how the prosecution and conviction of the offenders differ among commonly-seen types of computer assisted frauds, and bring new evidence to the common association of gender and crime, severity and punishment, etc. The findings may help LEAs and legislative bodies to evaluate their current practices from the point of restorative social justice. © 2017, Springer Science+Business Media New York.",Conviction; Culpability; Frauds; Judicial outcome; Offender characteristics; Offense characteristics,12,Information Systems Frontiers,2017 922,Singh P.D.; Kaur R.; Singh K.D.; Dhiman G.,A Novel Ensemble-based Classifier for Detecting the COVID-19 Disease for Infected Patients,"The recently discovered coronavirus, SARS-CoV-2, which was detected in Wuhan, China, has spread worldwide and is still being studied at the end of 2019. Detection of COVID-19 at an early stage is essential to provide adequate healthcare to affected patients and protect the uninfected community. This paper aims to design and develop a novel ensemble-based classifier to predict COVID-19 cases at a very early stage so that appropriate action can be taken by patients, doctors, health organizations, and the government. In this paper, a synthetic dataset of COVID-19 is generated by a dataset generation algorithm. A novel ensemble-based classifier of machine learning is employed on the COVID-19 dataset to predict the disease. A convex hull-based approach is also applied to the data to improve the proposed novel, ensemble-based classifier’s accuracy and speed. The model is designed and developed through the python programming language and compares with the most popular classifier, i.e., Decision Tree, ID3, and support vector machine. The results indicate that the proposed novel classifier provides a more significant precision, kappa static, root means a square error, recall, F-measure, and accuracy. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Artificial intelligence; Corona virus; COVID-19; Ensemble classifier; Machine learning; Quality of service,25,Information Systems Frontiers,2021 923,Zhu X.N.; Peko G.; Sundaram D.; Piramuthu S.,Blockchain-Based Agile Supply Chain Framework with IoT,"Agile supply chains facilitate sustainability through higher effectiveness and lower wastage. Agile supply chain frameworks in extant literature are designed for static supply chains and high-granular data that are only available at fixed periods. With the increasing interest in the Internet of Things (IoT) and blockchain technology for supply chain visibility and trust and the potential availability of fine-granular real-time data from related sensor networks, there is a need to reconsider existing agile supply chain frameworks. IoT and blockchain technology together reinforce the provision of trusted visibility that facilitates ease of tracking and tracing that is required in agile supply chains. We study existing agile supply chain frameworks and their characteristics – both positive and negative – and use this information to develop an agile supply chain framework that incorporates recent developments in IoT and blockchain technology. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Agile supply chain framework; Blockchain; IoT; RFID,54,Information Systems Frontiers,2022 924,Vallejos S.; Alonso D.G.; Caimmi B.; Berdun L.; Armentano M.G.; Soria Á.,Mining Social Networks to Detect Traffic Incidents,"Social networks are usually used by citizens to report or complain about traffic incidents that affect their daily mobility. Automatically finding traffic-related reports and extracting useful information from them is not a trivial task, due to the informal language used in social networks, to the lack of geographic metadata, and to the large amount of non traffic-related publications. In this article, we address this problem by combining Machine Learning and Natural Language Processing techniques. Our approach (a) filters publications that report traffic incidents in social networks, (b) extracts geographic information from the textual content of the publications, and (c) provides a broadcasting service that clusters all the reports of the same incident. We compared the performance of our approach with state of the art approaches and with a popular traffic-specific social network, obtaining promising results. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Machine learning; Natural language processing; Social networks; Traffic incident detection,19,Information Systems Frontiers,2021 925,Bordino I.; Ferretti A.; Gullo F.; Pascolutti S.,GarNLP: A Natural Language Processing Pipeline for Garnishment Documents,"Basic elements of the law, such as statuses and regulations, are embodied in natural language, and strictly depend on linguistic expressions. Hence, analyzing legal contents is a challenging task, and the legal domain is increasingly looking for automatic-processing support. This paper focuses on a specific context in the legal domain, which has so far remained unexplored: automatic processing of garnishment documents. A garnishment is a legal procedure by which a creditor can collect what a debtor owes by requiring to confiscate a debtor’s property (e.g., a checking account) that is hold by a third party, dubbed garnishee. Our proposal, motivated by a real-world use case, is a versatile natural-language-processing pipeline to support a garnishee in the processing of a large-scale flow of garnishment documents. In particular, we mainly focus on two tasks: (i) categorize received garnishment notices onto a predefined taxonomy of categories; (ii) perform an information-extraction phase, which consists in automatically identifying from the text various information, such as identity of involved actors, amounts, and dates. The main contribution of this work is to describe challenges, design, implementation, and performance of the core modules and methods behind our solution. Our proposal is a noteworthy example of how data-science techniques can be successfully applied to a novel yet challenging real-world context. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Applied data science; Categorization; Garnishment; Information extraction; Legal documents; Named entity recognition; Natural language processing; Supervised learning; Word embeddings,5,Information Systems Frontiers,2021 926,Mohr H.; Walter Z.,Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers,"Set in the backdrop of ever escalating data breach incidents, this paper investigates the seeming paradox between elevated consumer information security concerns reported in surveys and lax consumer security behavior exhibited online. Results from our experiment show that when asked about their information security perceptions, consumers evaluate the issue of information security based on the elaboration likelihood model. As a result, they express concerns. However, when consumers are actually shopping online, they do not separately evaluate the issue of information security. Instead, they mostly transfer their trust in an online retailer to the trusting belief that their information will be secure. This is one of the main reasons why, counter to their elevated security concerns expressed in surveys, consumers engage in lax security practices when they conduct business online. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Elaboration likelihood model; Online shopping; Perceived information security; Trust; Trust transfer,25,Information Systems Frontiers,2019 927,Nguyen T.T.; Maxwell Harper F.; Terveen L.; Konstan J.A.,User Personality and User Satisfaction with Recommender Systems,"In this study, we show that individual users’ preferences for the level of diversity, popularity, and serendipity in recommendation lists cannot be inferred from their ratings alone. We demonstrate that we can extract strong signals about individual preferences for recommendation diversity, popularity and serendipity by measuring their personality traits. We conducted an online experiment with over 1,800 users for six months on a live recommendation system. In this experiment, we asked users to evaluate a list of movie recommendations with different levels of diversity, popularity, and serendipity. Then, we assessed users’ personality traits using the Ten-item Personality Inventory (TIPI). We found that ratings-based recommender systems may often fail to deliver preferred levels of diversity, popularity, and serendipity for their users (e.g. users with high-serendipity preferences). We also found that users with different personalities have different preferences for these three recommendation properties. Our work suggests that we can improve user satisfaction when we integrate users’ personality traits into the process of generating recommendations. © 2017, Springer Science+Business Media, LLC.",Big-five personality traits; Human factors; Personality; Recommendation diversity; Recommendation popularity; Recommendation serendipity; Recommender systems; User preferences,99,Information Systems Frontiers,2018 928,Sun Y.; Tan W.,Combining Spatial Optimization and Multi-Agent Temporal Difference Learning for Task Assignment in Uncertain Crowdsourcing,"In recent years, spatial crowdsourcing has emerged as an important new framework, in which each spatial task requires a set of right crowd-workers in the near vicinity to the target locations. Previous studies have focused on spatial task assignment in the static crowdsourcing environment. These algorithms may achieve local optimality by neglecting the uncertain features inherent in real-world crowdsourcing environments, where workers may join or leave during run time. Moreover, spatial task assignment is more complicated when large-scale crowd-workers exist in crowdsourcing environments. The large-scale nature of task assignments poses a significant challenge to uncertain spatial crowdsourcing. In this paper, we propose a novel algorithm combining spatial optimization and multi-agent temporal difference learning (SMATDL). The combination of grid-based optimization and multi-agent learning can achieve higher adaptability and maintain greater efficiency than traditional learning algorithms in the face of large-scale crowdsourcing problems. The SMATDL algorithm decomposes the uncertain crowdsourcing problem into numerous sub-problems by means of a grid-based optimization approach. In order to adapt to the change in the large-scale environment, each agent utilizes temporal difference learning to handle its own spatial region optimization in online crowdsourcing. As a result, multiple agents in SMATDL collaboratively learn to optimize their efforts in accomplishing the global assignment problems efficiently. Through extensive experiments, we illustrate the effectiveness and efficiency of our proposed algorithms on the experimental data sets. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Crowdsourcing applications; Dynamic task assignment; Online learning; Reinforcement learning; Spatial optimization,4,Information Systems Frontiers,2020 929,Cruz-Jesus F.; Oliveira T.; Bacao F.; Irani Z.,Assessing the pattern between economic and digital development of countries,"This paper analyzes the digital development of 110 countries and its relationship with economic development. Using factor analysis, we combined seven ICT-related variables into a single measure of digital development. This measure was then used as the dependent variable in an OLS model that allows non-linear effects, with the GDP per capita of countries as the explanatory variable. Our findings are substantive in that the correlation between economic and digital development was found to be not linear, being much stronger in poorer countries, a finding not commonly seen in the literature. As a result, future studies that focus on the relationship between economic and digital developments may benefit from our findings, by postulating this type of relationship. In our model we were able to explain 83 % of the variation in the digital development of countries, compared to just 72 % if considering only a linear relationship. © 2016, Springer Science+Business Media New York.",Developing countries; Diffusion; Digital divide; E-inclusion; Information society; Technology adoption,99,Information Systems Frontiers,2017 930,Xiao L.; Mi C.; Zhang Y.; Ma J.,Examining Consumers’ Behavioral Intention in O2O Commerce from a Relational Perspective: an Exploratory Study,"Online-to-offline (O2O) commerce is a new e-business model that is popular among consumers and profitable for e-vendors. However, limited studies have been conducted to understand consumer behavior in this context. Based on commitment–trust theory and trust transfer theory, we conducted an exploratory study to explore consumers’ repurchase intention and sharing intention in the O2O commerce context from the relational viewpoint. Two studies were conducted using a web-based survey and Partial Least Squares were used to analyze the data. In Study 1, the results indicated that various targets of trust and commitment have significant effects on repurchase intention and sharing intention. Trust can be transferred both inter-channel and intra-channel in O2O commerce. Moreover, the effect of trust in O2O platforms on commitment is mediated by trust in user community and trust in merchants. To demonstrate the generalizability and external robustness of the results, we replicated the research model in Study 2 using data from a more representative sample. The replicated study produced similar results. This research provides an initial understanding of consumer behavior in the O2O commerce context and contributes to trust transfer theory and commitment–trust theory. Further, this research benefits companies undertaking O2O business by enabling them to better understand how to improve consumer repurchasing intention and sharing intention to succeed in the e-business industry. © 2017, Springer Science+Business Media, LLC, part of Springer Nature.",Commitment–trust theory; O2O commerce; Repurchase intention; Sharing intention; Trust transfer theory,47,Information Systems Frontiers,2019 931,Bankins S.; Formosa P.; Griep Y.; Richards D.,AI Decision Making with Dignity? Contrasting Workers’ Justice Perceptions of Human and AI Decision Making in a Human Resource Management Context,"Using artificial intelligence (AI) to make decisions in human resource management (HRM) raises questions of how fair employees perceive these decisions to be and whether they experience respectful treatment (i.e., interactional justice). In this experimental survey study with open-ended qualitative questions, we examine decision making in six HRM functions and manipulate the decision maker (AI or human) and decision valence (positive or negative) to determine their impact on individuals’ experiences of interactional justice, trust, dehumanization, and perceptions of decision-maker role appropriateness. In terms of decision makers, the use of human decision makers over AIs generally resulted in better perceptions of respectful treatment. In terms of decision valence, people experiencing positive over negative decisions generally resulted in better perceptions of respectful treatment. In instances where these cases conflict, on some indicators people preferred positive AI decisions over negative human decisions. Qualitative responses show how people identify justice concerns with both AI and human decision making. We outline implications for theory, practice, and future research. © 2022, The Author(s).",Algorithmic management; Artificial intelligence; Artificial intelligence at work; Ethical AI; Human resource management; Interactional justice,140,Information Systems Frontiers,2022 932,Talegaon S.; Krishnan R.,A Formal Specification of Access Control in Android with URI Permissions,"A formal specification of access control yields a deeper understanding of any operating system, and facilitates performing security analysis of the OS. In this paper, we provide a comprehensive formal specification of access control in Android (ACiA). Prior work is limited in scope, furthermore, recent developments in Android concerning dynamic runtime permissions require rethinking of its formalization. Our formal specification includes three parts, the user-initiated operations (UIOs) and app-initiated operations (AIOs) - which are distinguished based on the initiating entity, and the URI permissions which are utilized in sharing temporary access to data. We also studied the evolution of URI permissions from API 10 (Gingerbread) to API 22 (Lollipop), and a brief discussion on this is included in the paper. Formalizing ACiA allowed us to discover many peculiar behaviors pertaining to ACiA. In addition to that, we discovered two significant issues with permissions in Android which were reported to Google. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Access control; Android; Formal model; System permissions; URI permissions,3,Information Systems Frontiers,2021 933,El-Haddadeh R.,Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services,"Digital innovative technologies have enabled organisations to create opportunities to support their competitive advantage. In this regard, realising the dynamics influencing the adoption of these technologies becomes critical to their success. While much attention has been focused on the technological development, implementation and employees’ adoption, little has been done to examine the specifics of digital innovation influencing technology uptake in organisations. Drawing from Technology Organisation and Environment framework, this paper examines the factors affecting innovation dynamics adoption in the context of cloud computing for SMEs. The findings obtained from IT and senior managers highlight that while innovative IT capabilities, organisational innovativeness, perceived innovation risk, perceived innovation barriers influence the likelihood for SMEs adopting cloud computing as an innovative solution, IT innovation-driven competitiveness has limited influence. As such, this demonstrates how understating the specifics of innovation dynamics can help in offering the required support for SMEs in sustaining success. © 2019, The Author(s).",Innovation dynamics; Organisational adoption; digital transformation; SMEs; cloud computing; TOE,103,Information Systems Frontiers,2020 934,Tang H.; Lee C.B.P.; Choong K.K.,Consumer decision support systems for novice buyers – a design science approach,"For business-to-consumer e-commerce to have a significant impact, consumer decision support systems (CDSS) must accommodate a wide variety of online buyers. The popular parameter-based CDSS (PCDSS) are limited by their inability to help novice consumers in their purchase of highly differentiated products. Drawing on Cognitive Fit Theory, we propose that a needs-based CDSS (NCDSS) that derives product selections based on user specified usage context is suitable for buyers without sufficient expertise in the product category. We adopt a design science paradigm to develop several approaches that serve this purpose. The effectiveness of our design is empirically evaluated through a user study in a simulated scenario. The results show that in general, the proposed needs-based decision supporting mechanisms significantly outperform the conventional PCDSS when applied to aid e-buyers to make purchase decisions. Moreover, they can also be utilized as the complement of the popular PCDSS in order to enable purchase decision support for online shoppers at various expertise levels. © 2016, Springer Science+Business Media New York.",Cognitive fit theory; Consumer decision support systems; Design science; Opinion mining,10,Information Systems Frontiers,2017 935,Jia L.; Song X.; Hall D.,Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective,"With the increase in the use of various mobile devices, mobile payments have become a crucial driver for commerce success. However, the percentage of consumers who use or continue using mobile payments in the US is low. This study adopts information technology (IT) ecosystem view and transfer of learning theory and explores the effects of five types of technology use habits on consumers’ intention to continue using mobile payments. Results indicate that consumers’ online shopping, mobile service use, and cell phone use habits have a positive relationship with their mobile payment use habit, positively affecting their intention to continue using mobile payments. Theoretical and practical implications of the findings are presented. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",IT ecosystem; Mobile payment; Post adoption; Technology use habit; Transfer of learning,25,Information Systems Frontiers,2022 936,Pal A.; De’ R.; Herath T.,The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in India,"Mobile payment technology has aided in socio-economic development through financial inclusion and protective security during crises. However, there is a gap in understanding whether this technology has the potential for sustainable development that encompasses individual emancipation and environmental growth beyond social and economic change. To evaluate mobile payments role in sustainable human-centric development, we develop a framework based on the theories by two influential development economists—Schumacher and Sen (Schumacher 2011; Sen 2001). The framework includes features like the low-cost technology, easy implementation and operability, usefulness to local people, and scope for creative appropriation. We conducted an in-depth field study through interviews with merchants and consumers to evaluate the framework. We triangulate our findings with publicly available secondary survey data. Our findings indicate that along with the features like low-cost, easy installation and operability, users reported that the mobile payment technology, unlike cash transactions, can also afford creative uses such as reflection on past expenses. The paper contributes to the field of ICT4D with the framework that can be used by future studies. The investigation reveals developmental implications towards the need for greater inclusion of local small-scale vendors. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Demonetization; Human empowerment; ICT4D; Mobile payments; Schumacher; Sen’s freedoms; Sustainable development,45,Information Systems Frontiers,2020 937,Prakasam N.; Huxtable-Thomas L.,Reddit: Affordances as an Enabler for Shifting Loyalties,"This paper examines the affordances of Reddit, a digital media platform where Users share and discuss content. The aim of the study was to understand the affordances of Reddit, and how the affordances of Reddit through various features of the platform lead to outcomes, specifically those relating to political loyalty and the creation of political narratives. The study contributes an insight into the evolution and understanding of affordances as a result of examining the ways in which individuals who were previously members of another political group constructed narratives around switching their support to the Trump campaign in the 2016 US presidential elections. The study specifically focusses on an exclusive membership community called r/The_Donald. As a result of analysing posts on common themes using Qualitative Content Analysis (QCA), we conclude that the features enable membership of a community to be rewarded, switched or denied. As a result, this study has identified five affordances of Reddit, which include credibility, expressing oneself freely, echoing beliefs, creating membership and the meta-affordance ‘Redpilling’. The outcomes of these affordances are that ingroups are created, support can be switched, extreme or hateful views are legitimised and a new brand of conservatism is given credibility. This in turn is concluded to have realised impacts outside of the virtual environment in this case on the self-reported behaviours of voters. © 2020, The Author(s).",Affordances; Digital media; Membership; Political; Reddit; Trumpism,30,Information Systems Frontiers,2021 938,Rana N.P.; Dwivedi Y.K.; Lal B.; Williams M.D.; Clement M.,Citizens’ adoption of an electronic government system: towards a unified view,"Sluggish adoption of emerging electronic government (eGov) applications continues to be a problem across developed and developing countries. This research tested the nine alternative theoretical models of technology adoption in the context of an eGov system using data collected from citizens of four selected districts in the state of Bihar in India. Analysis of the models indicates that their performance is not up to the expected level in terms of path coefficients, variance in behavioural intention, or the fit indices of the models. In response to the underperformance of the alternative theoretical models to explain the adoption of an eGov system, this research develops a unified model of electronic government adoption and tests it using the same data. The results indicate that the proposed research model outperforms all alternative models of technology adoption by explaining 77 % of variance in behavioural intention, with acceptable values of fit indices and significant relationships between each pair of hypothesised factors. © 2015, The Author(s).",Adoption; Citizen; e-District; Electronic government; India; Unified model,336,Information Systems Frontiers,2017 939,Zeleti F.A.; Ojo A.,Open data value capability architecture,"To gain insight into customer’s needs and stay competitive, open data-driven organizations must acquire capabilities to generate different kinds of values from open data. With respect to open data capabilities, scholarly efforts articulating the nature and types of open data capabilities are very limited. To bridge this knowledge gap, we construct a theoretically-grounded open data value capability architecture that explains how open data-driven organizations can identify, map, develop and plan open data value capabilities. To demonstrate and validate the capability architecture, we implemented the architecture in two open data-driven organizations in Ireland. The application of the architecture revealed eight new open data value capabilities: Knowledge of data standards and Data on the Web Best Practices, Knowledge of data value, Data Strategy, Aggregation process (GPS), Database architecture, Knowledge of graph data models, Verifying data integrity, and Web-based front-end. We conclude that the Open data capability domain is yet to mature. Thus, more scholarly and empirical research is necessary in this area. © 2016, Springer Science+Business Media New York.",Open data; Open data value capabilities; Open data value chain; Organizational capabilities,35,Information Systems Frontiers,2017 940,Manouchehri N.; Nguyen H.; Koochemeshkian P.; Bouguila N.; Fan W.,Online Variational Learning of Dirichlet Process Mixtures of Scaled Dirichlet Distributions,"Data clustering as an unsupervised method has been one of the main attention-grabbing techniques and a large class of tasks can be formulated by this method. Mixture models as a branch of clustering methods have been used in various fields of research such as computer vision and pattern recognition. To apply these models, we need to address some problems such as finding a proper distribution that properly fits data, defining model complexity and estimating the model parameters. In this paper, we apply scaled Dirichlet distribution to tackle the first challenge and propose a novel online variational method to mitigate the other two issues simultaneously. The effectiveness of the proposed work is evaluated by four challenging real applications, namely, text and image spam categorization, diabetes and hepatitis detection. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Diabetes; Dirichlet process mixtures of scaled Dirichlet distributions; Hepatitis; Infinite mixture models; Online variational learning; Spam categorization,12,Information Systems Frontiers,2020 941,Dai H.; Salam A.F.,"An Empirical Assessment of Service Quality, Service Consumption Experience and Relational Exchange in Electronic Mediated Environment (EME)","This study examines how service quality and service consumption experience affect long-term relational exchange in the EME to provide insights into consumers’ perception of service consumption experience and its potential influence on the development of long-term exchange relationship between consumers and service providers in the EME. An analytical framework is developed and tested to validate a comprehensive research model of service consumption experience, its formative dimensions and its antecedents and consequents. The proposed research model is empirically assessed and validated using a sample of 772 respondents. This study contributes to the development of the service consumption experience construct in the EME and informs firms in developing an integrated experiential strategy to meet customer requirements and expectations to further improve customer loyalty and word-of mouth communication in the EME. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",eService; Relational exchange; Service; Service consumption; Service experience in EME; Service quality,6,Information Systems Frontiers,2020 942,Shrivastava R.K.; Hota C.,UnderTracker: Generating Robust Binaries Using Execution Flow Traces,"Programs are developed in a manner so that they execute and fulfill their intended purpose. In doing so, programmers trust the language to help them achieve their goals. Binary hardening is one such concept that prevents program behavior deviation and conveys the programmer’s intention. Therefore, to maintain the integrity of the program, measures need to be taken to avoid code-tampering. The proposed approach enforces code verification from instruction-to-instruction by using the programmer’s intended control flow. UnderTracker implements execution flow at the instruction cache by utilizing the read-only data-cache available in the program. The key idea is to place a control transfer code in data-cache and call it from instruction cache via labels. UnderTracker injects labels into the binary without affecting the semantics of the program. After the code execution starts, it verifies every control point’s legality before passing the control to the next instruction, by passively monitoring the execution flow. We proposed a cache-based monitoring method to verify code integrity. In this, we used side-channel information to monitor the program’s execution state. This monitoring system uses a sliding window scheme to detect the violation of code integrity with high reliability. This paper proposes an efficient technique, called UnderTracker to strengthen the binary integrity of an I/O intensive running program, with the nominal overhead of only 5-6% on top of the normal execution. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.",Cache-based monitoring; Execution flow verification; Superblock; Systems security,1,Information Systems Frontiers,2021 943,Dang-Pham D.; Pittayachawan S.; Bruno V.; Kautz K.,Investigating the diffusion of IT consumerization in the workplace: A case study using social network analysis,"IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging topic which recently attracted the attention of researchers and practitioners. This research adopted social network analysis techniques to investigate the determinants of the social influence that resulted in IT consumerization, as well as the structural features of such influence’s network. By testing theoretically-based hypotheses with the exponential random graph modeling approach, our findings suggested that IT consumerization’s influence tended to occur between employees in the same department, coming especially from those who frequently gave work advice, life advice, and organizational updates to others, as well as those who were trusted for expertise by colleagues. The research revealed that IT consumerization’s influence was highly transitive, hierarchical, and non-reciprocal. The research concluded by elaborating future directions about the adoption of social network analysis techniques in technology adoption research, as well as practical recommendations about harnessing the determinants of such influence to manage IT consumerization. © 2017, Springer Science+Business Media, LLC.",Exponential random graph modeling; Information systems; IT consumerization; Social network analysis; System adoption; Technology adoption,11,Information Systems Frontiers,2019 944,Wani M.; Raghavan V.; Abraham D.; Kleist V.,Beyond utilitarian factors: User experience and travel company website successes,"Travel websites are extensively used by travelers for their travel bookings, yet little is known about the hedonic effectiveness of such experiences for the customer. The end users of these websites are customers who may not always be sophisticated information system (IS) users. Further, traditional utility based measures of customer evaluation are dated with respect to the interactive nature of the technology in use and the hedonic benefits that may result from the use of the technology. The evaluation of IS needs to include hedonic measures facilitated by the interactive technology in addition to the traditional utility based measures. We propose and test an evaluation model for retail travel websites that combines the traditional utility based measures with hedonic measures which collectively create a more comprehensive measure for the IS evaluation of consumer focused websites. Thus rooted in theory, the model extends DeLone and McLean’s model of IS Success by adding the construct of User Experience. The model was tested on a sample of 255 customers of travel websites targeted at the Indian market. The results indicate that both utility based and hedonic measures are important factors for customer IS (travel website in this study) evaluation. The larger implications for theory and practice of IS evaluation are explained. © 2017, Springer Science+Business Media New York.",DeLone and McLean models; Hedonic benefits; Information systems; System success; Travel websites; User experience,46,Information Systems Frontiers,2017 945,Kaur H.; Ahsaan S.U.; Alankar B.; Chang V.,A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets,"With the rise in cases of COVID-19, a bizarre situation of pressure was mounted on each country to make arrangements to control the population and utilize the available resources appropriately. The swiftly rising of positive cases globally created panic, anxiety and depression among people. The effect of this deadly disease was found to be directly proportional to the physical and mental health of the population. As of 28 October 2020, more than 40 million people are tested positive and more than 1 million deaths have been recorded. The most dominant tool that disturbed human life during this time is social media. The tweets regarding COVID-19, whether it was a number of positive cases or deaths, induced a wave of fear and anxiety among people living in different parts of the world. Nobody can deny the truth that social media is everywhere and everybody is connected with it directly or indirectly. This offers an opportunity for researchers and data scientists to access the data for academic and research use. The social media data contains many data that relate to real-life events like COVID-19. In this paper, an analysis of Twitter data has been done through the R programming language. We have collected the Twitter data based on hashtag keywords, including COVID-19, coronavirus, deaths, new case, recovered. In this study, we have designed an algorithm called Hybrid Heterogeneous Support Vector Machine (H-SVM) and performed the sentiment classification and classified them positive, negative and neutral sentiment scores. We have also compared the performance of the proposed algorithm on certain parameters like precision, recall, F1 score and accuracy with Recurrent Neural Network (RNN) and Support Vector Machine (SVM). © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",COVID-19; Heterogeneous Euclidean overlap metric (H-EOM); Hybrid heterogeneous support vector machine (H-SVM); Recurrent neural network (RCN); Sentiment analysis; Twitter,190,Information Systems Frontiers,2021 946,Liu F.; Xu D.,Social Roles and Consequences in Using Social Media in Disasters: a Structurational Perspective,"Disaster management officials, as well as the general public, are increasingly using social media to communicate. Such usage has resulted in new and emergent social consequences for disaster management and has reformed the roles of its relevant stakeholders. However, the existing literature on social media use in disasters is still preliminary and incomplete, and does not capture the change in social roles that stakeholders have taken and the consequences of the actions that people take in using social media. In this paper, by using Structuration theory as a meta-theory and by analysing the posts and comments in three officials’ Facebook fan pages in three different disasters, we theorize the social structures (i.e., social roles and social consequences) and the human actions taken by both the public and the disaster management officials during disasters. Furthermore, we explain how the social structures emerge out of the human actions involved, and how the social structures further shape those actions. Our research provides theoretical and practical insights into how the usage of social media in disasters benefits disaster management and reinforces the roles of the different stakeholders. © 2017, Springer Science+Business Media, LLC.",Disaster management; Facebook; Social media; Structuration theory,47,Information Systems Frontiers,2018 947,Karimi S.,"Cross-visiting Behaviour of Online Consumers Across Retailers’ and Comparison Sites, a Macro-Study","Extant academic research provides a comprehensive view of online consumer behaviour on a single website, paying less attention to the integrated environment in which websites operate. Retailers’ products, however, are not only available on their own website, but also through other connected channels such as comparison sites. Our limited knowledge of consumers’ integrated behaviour across the entire market poses difficulties to design effective online strategies. At the same time, practitioners have mainly focused on website performance measures, ignoring the reasons behind the behaviour of consumers. A deeper understanding of consumers who visit different websites or, cross-visit, can inform successful online channel strategies. This macro-level study aims to bridge this gap by investigating how the usage behaviour on retailers’ websites and comparison sites influences each other, using large-scale industry-based data. A new measure of ‘cross-visiting’ behaviour is introduced and examined. © 2019, The Author(s).",Comparison sites; Cross-visiting; E-services; Search behaviour; Usage behaviour,6,Information Systems Frontiers,2021 948,Yang Z.; Sun J.; Zhang Y.; Wang Y.,Peas and carrots just because they are green? Operational fit between green supply chain management and green information system,"Green supply chain management (GSCM) and green information system (GIS) are two strategic endeavors of external and internal orientations for the sustainable development of an organization. This study identifies the common dimensions between the two IT-enabled innovations in terms of environment protection, process control and organization support, and conceptualizes their operational fit. Compared with the commonly used perceived fit to measure how well IT infrastructure supports business activities, the operationalization of GSCM-GIS fit is based on both fit-as-profile-deviation and fit-as-moderation approaches to capture the synergy of GSCM and GIS practices along their common dimensions. Empirical evidence supports that operational fit as the result of functional deployment has expected long-term implications on environmental and social performances; whereas the implementation of both GSCM and GIS as the result of strategic planning has relatively short-term impacts on operational and economic performances. © 2016, Springer Science+Business Media New York.",Green information systems; Green supply-chain management; Operational fit; Organizational performances; Sustainable development,37,Information Systems Frontiers,2018 949,Chandran D.; Alammari A.M.,Influence of Culture on Knowledge Sharing Attitude among Academic Staff in eLearning Virtual Communities in Saudi Arabia,"Knowledge sharing is a significant component of success in knowledge management. In Saudi Arabia, knowledge management is often lacking when it comes to knowledge sharing adoption, especially between academic staff. This research aims to investigate various factors of knowledge sharing adoption for eLearning communities in Saudi Arabia and to examine the effect of culture as a moderating role on the relationships between these factors and academics’ attitude. Therefore, a framework is aimed at sharing knowledge within the eLearning communities is developed. Data has been collected from public universities in Saudi Arabia. Partial Least Square approach has been applied to analyse the data. The results show individual factors (such as openness in communication, interpersonal trust) and technology acceptance factors (perceived usefulness and perceived ease of use) significantly influence knowledge sharing attitude, while the relationship between people self-motivation and knowledge sharing attitude is insignificant. Subjective norm and attitude significantly impact behavioral intention toward knowledge sharing adoption in Saudi universities’ eLearning communities. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",eLearning; Knowledge sharing; Saudi Arabia; Virtual communities,27,Information Systems Frontiers,2021 950,Pengnate S.F.; Sarathy R.; Arnold T.J.,The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation,"This study develops a scale to measure individual differences in the centrality of visual website aesthetics (CVWA) and then examines the impact of the CVWA on users’ responses. Drawing on the concept of individual differences in the centrality of product aesthetics (CVPA), we conducted a series of three experiments to examine the CVWA. In the first experiment, the CVPA measure was used to assess online users’ CVWA and test the CVWA’s effects on online user responses, which included perceived visual appeal, trust, and intention to use the websites. In the second experiment, the CVWA measure was developed and validated. Finally, in the third experiment, the effects of the CVWA were examined using the CVWA measure. Overall, our findings suggest that the moderating effects of the CVWA are strong when users interact with websites with a high level of visual appeal and when the CVWA is captured using the CVWA measure. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Centrality of visual website aesthetics; E-commerce; Visual appeal; Website design,5,Information Systems Frontiers,2021 951,Panda S.K.; Jana P.K.,Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment,"Cloud computing is one of the most successful technologies that offer on-demand services through the Internet. However, datacenters of the clouds may not have unlimited capacity which can fulfill the demanded services in peak hours. Therefore, scheduling workloads across multiple clouds in a federated manner has gained a significant attention in the recent years. In this paper, we present four task scheduling algorithms, called CZSN, CDSN, CDN and CNRSN for heterogeneous multi-cloud environment. The first two algorithms are based on traditional normalization techniques, namely z-score and decimal scaling respectively which are hired from data mining. The next two algorithms are based on two newly proposed normalization techniques, called distribution scaling and nearest radix scaling respectively. All the proposed algorithms are shown to work on-line. We perform rigorous experiments on the proposed algorithms using various synthetic as well as benchmark datasets. Their performances are evaluated through simulation run by measuring two performance metrics, namely makespan and average cloud utilization. The experimental results are compared with that of existing algorithms to show the efficacy of the proposed algorithms. © 2016, Springer Science+Business Media New York.",Cloud computing; Cloud utilization; Makespan; Multi-cloud environment; Normalization; Task scheduling,61,Information Systems Frontiers,2018 952,Uchida O.; Tajima S.; Kajita Y.; Utsu K.; Murakami Y.; Yamada S.,Development and Implementation of an ICT-based Disaster Prevention and Mitigation Education Program for the Young Generation,"Japan is one of the disaster-prone countries. Then, various disaster education is conducted in schools and local communities for alleviating the damage caused by disasters. However, according to various surveys, disaster prevention awareness among young people is known to be lower than in other age groups in Japan. Therefore, we worked with Kanagawa Prefecture, Japan, on establishing an ICT-based program on disaster prevention and mitigation to raise awareness of disaster prevention and mitigation among young people. The program is based on the workshop consisting of town watching and group discussion using DITS/DIMS (disaster information tweeting and mapping system) proposed in the previous studies. In this paper, we introduce the contents of the established education program on disaster prevention and mitigation for the young generation. Moreover, we report on the results of the workshops for disaster prevention and mitigation using this program at several junior high and high schools in Kanagawa Prefecture, Japan. The results of the post-questionnaire show that many participants had a positive impression on the developed disaster education program. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Disaster education; Disaster information; Disaster prevention and mitigation; Social media; Town watching; Twitter,20,Information Systems Frontiers,2021 953,Alzadjali K.; Elbanna A.,Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman,"Cloud computing technology presents a case of centralised digital infrastructure that requires adherence to standards and planned approach for its adoption and implementation. There is little knowledge on how institutions could influence the successful migration to the cloud considering the known challenges of adopting technology infrastructure. This research questions: How can institutions positively influence the adoption of cloud computing services? It examines the case of adopting government cloud computing in Sultanate of Oman. It adopts concepts from institutional theory as a theoretical lens to synthesis and explains empirical results. The study shows the practices that exerted institutional forces and the role they play in the successful adoption and migration to cloud services. It reveals that not all institutional forces carry equal weight in their influence, and this depends on the context of adoption. In the case study, we found that both coercive and mimetic forces to be playing prominent roles in pushing the adoption and migration to the cloud forward easing potential resistance from normative forces. We conceptualise this as a smart intervention that took the context of adoption seriously into consideration and was tailored accordingly. Implications for research and practice are discussed. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Cloud adoption; Cloud computing; Digital infrastructure; Institutional theory; Isomorphic mechanisms,26,Information Systems Frontiers,2020 954,Tonelli A.O.; de Souza Bermejo P.H.; Aparecida dos Santos P.; Zuppo L.; Zambalde A.L.,It governance in the public sector: a conceptual model,"Information technology governance (ITG) has been identified as an organizational ability of great importance for IT strategic alignment and the delivery of business though IT. However, the results and contribution of ITG are poorly understood. This work presents an explanatory model of the effects of IT governance mechanisms on IT and organizational performance of public organizations. To test the model, data was collected from a survey conducted in 146 Brazilian public organizations. Partial least squares analysis was applied to test the proposed model. The results indicate that (i) IT performance is positively correlated with organizational performance, (ii) relational mechanisms between IT and a business are determinant factors for the performance of IT, and also positively correlated with organizational performance, and (iii), decision structure and process maturity are not significantly correlated with IT performance. © 2015, Springer Science+Business Media New York.",Information technology governance; IT management; IT performance; Organizational performance; Strategic alignment,52,Information Systems Frontiers,2017 955,Zolbanin H.M.; Delen D.; Crosby D.; Wright D.,A Predictive Analytics-Based Decision Support System for Drug Courts,"This study employs predictive analytics to develop a decision support system for the prediction of recidivism in drug courts. Based on the input from subject matter experts, recidivism is defined as the violation of the treatment program requirements within three years after admission. We use two data processing methods to improve the accuracy of predictions: synthetic minority oversampling and survival data mining. The former creates a balanced data set and the latter boosts the model’s performance by adding several new, informative variables to the data set. After running several tree-based machine learning algorithms on the input data, random forest achieved the best performance (AUROC = 0.884, accuracy = 80.76%). Compared with the original data, oversampling and survival data mining increased AUROC by 0.068 and 0.018, respectively. Their combined contribution to AUROC was 0.088. We present a simplified version of decision rules and explain how the decision support system can be deployed. Therefore, this paper contributes to the analytics literature by illustrating how date/time variables - in applications where the response variable is defined as the occurrence of some event within a certain period - can be used in data management to improve the performance of predictive models and the resulting decision support systems. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Drug court; Machine learning; Predictive analytics; Survival data mining,12,Information Systems Frontiers,2020 956,Huberman B.A.; Lund B.,A Quantum Router For The Entangled Web,"Qubit transmission protocols are presently point-to-point, and thus restrictive in their functionality. A quantum router is necessary for the quantum Internet to become a reality. We present a quantum router design based on teleportation, as well as mechanisms for entangled pair management. The prototype was validated using a quantum simulator. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Internet; Quantum; Router; Teleportation,11,Information Systems Frontiers,2020 957,Keil M.; Culnan M.; Dinev T.; Xu H.,"Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith","In October 2019, the information systems community was shocked and saddened to learn that H. Jeff Smith had passed away after battling lymphoma. While primarily known for his pioneering work on privacy, Jeff made a number of significant contributions to the field of information systems. In this invited editorial, we examine the impact of Jeff’s scholarship on the areas of data governance, consumer privacy, and project status reporting. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Consumer privacy; Data governance; Privacy; Project status reporting,5,Information Systems Frontiers,2019 958,Shen J.; Majid B.-N.; Xie L.; Mao J.; Pang Z.; Feng Y.; Xu L.; Tenhunen H.; Zou Z.; Zheng L.,Interactive UHF/UWB RFID tag for mass customization,"Mass customization (MC) under the context of the Internet of Things (IoT) is expected to reform the traditional mass manufacturing. To contribute to MC from information communication and user interaction aspects, this work proposes an Ultra-High Frequency (UHF) RFID tag with an Impulse-Radio Ultra-Wide Band (IR-UWB) transmitter and an inkjet-printed Electrochromic (EC) display. First, compared to the conventional UHF RFID tags, the proposed tag shows the advantage of higher transmission data rate with still low power consumption. The response time in multi-tag accessing scenarios can be reduced to less than 500 ms per 1000 tags by the pipeline of the tag responses in IR-UWB link and the reader acknowledgments in UHF RFID link as well as by reducing the length of empty slots. Second, the tag is integrated with a flexible EC display manufactured by inkjet-printing on the polyimide substrate. It works as an automatically refreshed paper label that offers an intuitive human-to-device interface to improve the efficiency of the offline workers. To conquer the material variations and make use of the long retention time of the printed EC display, its threshold voltage is utilized and a feedback comparator enabling the display driver by the threshold voltage is designed. A System-on-Chip (SoC) is implemented in UMC 0.18 μm CMOS process. According to the experimental results: 1) the IR-UWB transmitter achieves 1.02 V pulse amplitude and 900 ps pulse duration with 18 pJ/pulse energy consumption; 2) the EC display driver automatically refreshes the display when the image fades out, and consumes 1.98 μW per 1 cm2 display size to retain an image. The UHF/UWB RFID display tag integrated on polyimide substrate is conceptually demonstrated at the end of the paper. © 2016, Springer Science+Business Media New York.",Impulse-radio ultra-wide band (IR-UWB); Inkjet-printed Electrochromic (EC) polyimide display; Internet-of-Things (IoT); Mass customization (MC); Ultra-High Frequency (UHF) RFID,7,Information Systems Frontiers,2017 959,Choksuchat C.; Chantrapornchai C.,Practical parallel string matching framework for RDF entailments with GPUs,"Resource Description Framework (RDF) is a commonly used format for semantic web processing. It basically contains strings representing items and their relationships which can be queried or inferred. In this paper, we propose a framework for processing large RDF data sets. It is based on Brute-force string matching on GPUs (BFG). Graphics Processing Units (GPUs) are used as a parallel platform that allows thousands of threads to find RDF data. Our search algorithm is customized to suit the nature of RDF processing and GPU memory architecture. Then, the algorithm is integrated into the proposed framework for computing queries and chaining rules for RDF data. Experiments show that utilizing these algorithms can achieve the speedup of 7 times for querying and for forward chaining compared to using the sequential version. The proposed framework can achieve a string comparison rate of 67,000 comparisons per second using 2 GPUs. © 2016, Springer Science+Business Media New York.",CUDA; Entailment; Parallel string matching; RDF query,2,Information Systems Frontiers,2018 960,Panda S.K.; Gupta I.; Jana P.K.,Task scheduling algorithms for multi-cloud systems: allocation-aware approach,"Cloud computing has gained enormous popularity for on-demand services on a pay-per-use basis. However, a single data center may be limited in providing such services, particularly in the peak demand time as it may not have unlimited resource capacity. Therefore, multi-cloud environment has been introduced in which multiple clouds can be integrated together to provide a unified service in a collaborative fashion. However, task scheduling in such environment is much more challenging than that is used in the single cloud environment. In this paper, we propose three allocation-aware task scheduling algorithms for a multi-cloud environment. The algorithms are based on the traditional Min-Min and Max-Min algorithm and extended for multi-cloud environment. All the algorithms undergo three common phases, namely matching, allocating and scheduling to fit them in the multi-cloud environment. We perform extensive simulations on the proposed algorithms and test with various benchmark and synthetic datasets. We evaluate the performance of the proposed algorithms in terms of makespan, average cloud utilization and throughput and compare the results with the existing algorithms in such system. The comparison results clearly demonstrate the efficacy of the proposed algorithms. © 2017, Springer Science+Business Media New York.",Average cloud utilization; Batch scheduling; Cloud computing; Makespan; Max-Min; Min-Min; Multi-cloud environment,47,Information Systems Frontiers,2019 961,Requeno J.I.; Merseguer J.; Bernardi S.; Perez-Palacin D.; Giotis G.; Papanikolaou V.,Quantitative Analysis of Apache Storm Applications: The NewsAsset Case Study,"The development of Information Systems today faces the era of Big Data. Large volumes of information need to be processed in real-time, for example, for Facebook or Twitter analysis. This paper addresses the redesign of NewsAsset, a commercial product that helps journalists by providing services, which analyzes millions of media items from the social network in real-time. Technologies like Apache Storm can help enormously in this context. We have quantitatively analyzed the new design of NewsAsset to assess whether the introduction of Apache Storm can meet the demanding performance requirements of this media product. Our assessment approach, guided by the Unified Modeling Language (UML), takes advantage, for performance analysis, of the software designs already used for development. In addition, we converted UML into a domain-specific modeling language (DSML) for Apache Storm, thus creating a profile for Storm. Later, we transformed said DSML into an appropriate language for performance evaluation, specifically, stochastic Petri nets. The assessment ended with a successful software design that certainly met the scalability requirements of NewsAsset. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Apache storm; Petri nets; Software performance; Software reuse; UML,14,Information Systems Frontiers,2019 962,de Vreede G.-J.; Briggs R.O.; de Vreede T.,Exploring a Convergence Technique on Ideation Artifacts in Crowdsourcing,"Convergence is a collaborative activity in which members of group focus on what they consider the most promising or important contributions resulting from an ideation activity. Convergence is critical in helping a group focus their efforts on issues that are worthy of further attention. In the current study, we further research in this area by exploring and characterizing the effects of a particular convergence intervention, the FastFocus technique, in the context of a crowdsourcing project. We conducted an exploratory case study of artifacts generated by a crowd of managers addressing a real problem identification and clarification task in a large financial services organization. Using an online crowdsourcing tool, a professional facilitator led participants during preset periods through a convergence activity that focused on the brainstorming contributions that had been generated prior. To better understand the effects of the convergence technique on the group’s ideas, we compared the raw problem statements to the final output of the convergence activities in terms of the number of unique ideas present, as well as the ambiguity of the ideas. Using the FastFocus convergence technique reduced the number of concepts by 76%. Ambiguity was reduced from 45% in the set of problem statements to 3% in the converged set of problem statements. We demonstrate with these findings that the outcomes of group convergence processes in real settings can be measured, enabling future research which seeks to evaluate and understand convergence in groups. Aspects of brainstorming instructions were also identified that may make it possible to reduce the ambiguity of problem statements. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Collaboration; Collaboration engineering; Convergence; Crowdsourcing; Facilitation; Information overload; ThinkLets,6,Information Systems Frontiers,2022 963,Ustek-Spilda F.; Vega D.; Magnani M.; Rossi L.; Shklovski I.; Lehuede S.; Powell A.,A Twitter-Based Study of the European Internet of Things,"We present a methodology integrating social media data, data from qualitative research and network analysis. Qualitative insights gained from ethnographic fieldwork are used to collect and annotate social network data, and social media data is used as part of the ethnography to identify relevant actors and topics. The methodology is presented in the context of an analysis of the Internet of Things in the European context. © 2020, The Author(s).",Data science; Ethnography; Internet of Things; Methodology; Triangulation; Twitter,8,Information Systems Frontiers,2021 964,Dang D.; Pekkola S.,Institutional Perspectives on the Process of Enterprise Architecture Adoption,"Organizations often adopt enterprise architecture (EA) when planning how best to develop their information technology (IT) or businesses, for strategic management, or generally for managing change initiatives. This variety of different uses affects many stakeholders within and between organizations. Because stakeholders have dissimilar backgrounds, positions, assumptions, and activities, they respond differently to changes and the potential problems that emerge from those changes. This situation creates contradictions and conflicts between stakeholders that may further influence project activities and ultimately determine how EA is adopted. In this paper, we examine how institutional pressures influence EA adoption. Based on a qualitative case study of two cases, we show how regulative, normative, and cognitive pressures influence stakeholders’ activities and behaviors during the process of EA adoption. Our contribution thus lies in identifying roles of institutional pressures in different phases during the process of EA adoption and how it changes overtime. The results provide insights into EA adoption and the process of institutionalization, which help to explain emergent challenges in EA adoption. © 2019, The Author(s).",EA adoption; Enterprise architecture; Institutional theory; Institutionalization process,22,Information Systems Frontiers,2020 965,Tam C.; Santos D.; Oliveira T.,Exploring the influential factors of continuance intention to use mobile Apps: Extending the expectation confirmation model,"The use of mobile applications (apps) has been growing in the world of technology, a phenomenon related to the increasing number of smartphone users. Even though the mobile apps market is huge, few studies have been made on what makes individuals continue to use a mobile app or stop using it. This study aims to uncover the factors that underlie the continuance intention to use mobile apps, addressing two theoretical models: Expectation confirmation model (ECM) and the extended unified theory of acceptance and use of technology (UTAUT2). A total of 304 questionnaires were collected by survey to test the theoretical framework proposal, using structural equation modelling (SEM). Our findings indicate that the most important drivers of continuance intention of mobile apps are satisfaction, habit, performance expectancy, and effort expectancy. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Continuance usage; Expectation confirmation model (ECM); Extended unified theory of acceptance and use of technology (UTAUT2); Mobile applications (apps),464,Information Systems Frontiers,2020 966,Zheng C.; Yu X.; Jin Q.,How user relationships affect user perceived value propositions of enterprises on social commerce platforms,"Social commerce is a popular topic issue in the academic field. Prior research mostly focused on the effectiveness of social commerce on consumers. However, the effect of social commerce on electronic commerce enterprises has rarely been involved. By combining social network theories, information theories, and the value theory of electronic commerce, with information quality and credibility as the path, this study investigates how inter-user relationship on a social commerce platform affect user’s perceptions of the value proposition of electronic commerce enterprises. The results show that the instrumental inter-user relationships can significantly improve a consumer’s perceptions of a product’s quality and information, and then improve the perception of efficiency value proposition and novelty value proposition of electronic commerce enterprises. The expressive relationships between users can effectively improve the expression of consumer awareness of product credibility, and thus enhance the consumer’s perception of the value proposition of electronic commerce enterprises. © 2017, Springer Science+Business Media New York.",Electronic commerce; Information credibility; Information quality; Social commerce; Value proposition,48,Information Systems Frontiers,2017 967,Jou C.,Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules,"Along with the popularity of the world wide web, data volumes inside web databases have been increasing tremendously. These deep web contents, hidden behind the query interfaces, are of much better quality than those in the surface web. Internet users need to fill in query conditions in the HTML query interface and click the submit button to obtain deep web data. Many deep web contents related applications, like named entity attribute collection, topic-focused crawling, and heterogeneous data integration, are based on understanding schema of these query interfaces. The schema needs to cover mappings of input elements and labels, data types of valid input values, and range constraints of the input values. Additionally, to extract these hidden data, the schema needs to include many form submission related information, like cookies and action types. We design and implement a Heuristics-based deep web query interface Schema Extraction system (HSE). In HSE, texts surrounding elements are collected as candidate labels. We propose a string similarity function and use a dynamic similarity threshold to cleanse candidate labels. In HSE, elements, candidate labels, and new lines in the query interface are streamlined to produce its Interface Expression (IEXP). By combining the user’s view and the designer’s view, with the aid of semantic information, we build heuristic rules to extract schema from IEXP of query interfaces in the ICQ dataset. These rules are constructed through utilizing (1) the characteristics of labels and elements, and (2) the spatial, group, and range relationships of labels and elements. Supplemented with form submission related information, the extracted schemas are then stored in the XML format, so that they could be utilized in further applications, like schema matching and merging for federated query interface integration. The experimental results on the TEL-8 dataset illustrate that HSE produces effective performance. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Deep web; Heuristic rules; Query interface; Schema extraction; String similarity; XML,8,Information Systems Frontiers,2019 968,Chang W.-L.; Chen Y.-P.,Way too sentimental? a credible model for online reviews,"Online reviews and word of mouth are crucial to consumers. We proposed a model on the basis of a sentiment analysis in terms of positive and negative words and the concept of credibility of reviewers. This study used TripAdvisor to examine the proposed model and selected 10 out of 271 hotels in Las Vegas between January and February 2015. We also collected 116 samples around world to prove the feasibility and validity. Through sentiment analysis, we determined that the overall ranking of the 10 hotels decreased. The credibility factor has a higher influence on hotel ranking than the sentiment analysis does. These results revealed that negative emotions and low-credibility reviews have a high influence on hotel ranking. The findings from participants also confirmed emotional text in review title and content and credibility of reviewer are important for adjusting original rating. © 2017, Springer Science+Business Media New York.",Credibility; Online reviews; Prospect theory; Sentiment analysis,27,Information Systems Frontiers,2019 969,Cabitza F.; Locoro A.; Batini C.,Making Open Data more Personal Through a Social Value Perspective: a Methodological Approach,"In this paper, we address the problem of assessing the social value of open data. While the number of open data initiatives increases and many data sets are currently available to lay people, common citizens and end users, a still limited number of studies specifically address how to improve open data understandability, their usability by common users and the measurability of their value in terms of concrete outcomes and benefits for the intended communities and the individual who appropriate those data, to make them more personal and hence more valuable. Our goal is to contribute to the success of open data initiatives by defining a methodology by which to assess their perceived social value. In this paper, we present the conceptual content of the methodology, that is its main concepts and logic structure, and discuss it by means of an empirical user study in which we applied it to real-life open data sets and involving a large sample of prospective consumers of those open data. In particular, we focus on the health care domain in order to improve the welfare of the citizens that need health care services and use the Web to look for relevant information to address those situated needs. Among our main findings, we discovered a clear preference for visual information formats by women with respect to men, and a clear preference for hospitals ranking by disease for senior people with respect to younger. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Health care; Hospital care; Human-data interaction; Open data; Social value,16,Information Systems Frontiers,2020 970,Xia B.; Bai Y.; Yin J.; Li Y.; Xu J.,LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling,"System logs that trace system states and record valuable events comprise a significant component of any computer system in our daily life. Each log contains sufficient information (i.e., normal and abnormal instances) that assist administrators in diagnosing and maintaining the operation of systems. If administrators cannot detect and eliminate diverse and complex anomalies (i.e., bugs and failures) efficiently, running workflows and transactions, even systems, would break down. Therefore, the technique of anomaly detection has become increasingly significant and attracted a lot of research attention. However, current approaches concentrate on the anomaly detection analyzing a high-level granularity of logs (i.e., session) instead of detecting log-level anomalies which weakens the efficiency of responding anomalies and the diagnosis of system failures. To overcome the limitation, we propose an LSTM-based generative adversarial network for anomaly detection based on system logs using permutation event modeling named LogGAN, which detects log-level anomalies based on patterns (i.e., combinations of latest logs). On the one hand, the permutation event modeling mitigates the strong sequential characteristics of LSTM for solving the out-of-order problem caused by the arrival delays of logs. On the other hand, the generative adversarial network-based model mitigates the impact of imbalance between normal and abnormal instances to improve the performance of detecting anomalies. To evaluate LogGAN, we conduct extensive experiments on two real-world datasets, and the experimental results show the effectiveness of our proposed approach on the task of log-level anomaly detection. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Anomaly detection; Generative adversarial network; Log-level anomaly; Permutation event modeling,43,Information Systems Frontiers,2021 971,Hlee S.; Lee J.; Moon D.; Yoo C.,The acceptance of ‘intelligent trade shows’: Visitors’ evaluations of IS innovation,"Trade Shows (TSs) provide “high-quality information,” as thousands of specialists and experts are gathered in one place at one time. Thus, information technology systems become essential for TSs. This study explores the characteristics of TSs’ onsite Information Technology (IT). This study aim to explore the relationships among onsite IT usage, visitors’ effectiveness and perception through the innovation characteristics (i.e., relative advantage, compatibility, and complexity). The study was conducted at a representative TS in Korea and used a survey approach to empirically understand the perception of onsite IT usage. The findings suggest that the four characteristics of product intelligence are influential factors of TSs’ onsite IT. Among them, relative advantage and compatibility had positive impacts on TS effectiveness, while complexity did not. In addition, discussions of the results, theoretical and practical implications for practitioners, limitations, and suggestions for future studies are presented. © 2016, Springer Science+Business Media New York.",Diffusion of innovation theory (DIT); Product intelligence theory (PIT); Trade show intelligence; Visitors’ effectiveness,11,Information Systems Frontiers,2017 972,Martinez-Gil J.; Paoletti A.L.; Pichler M.,A Novel Approach for Learning How to Automatically Match Job Offers and Candidate Profiles,"Automatic matching of job offers and job candidates is a major problem for a number of organizations and job applicants that if it were successfully addressed could have a positive impact in many countries around the world. In this context, it is widely accepted that semi-automatic matching algorithms between job and candidate profiles would provide a vital technology for making the recruitment processes faster, more accurate and transparent. In this work, we present our research towards achieving a realistic matching approach for satisfactorily addressing this challenge. This novel approach relies on a matching learning solution aiming to learn from past solved cases in order to accurately predict the results in new situations. An empirical study shows us that our approach is able to beat solutions with no learning capabilities by a wide margin. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",e-Recruitment; Human resources management systems; Knowledge engineering,19,Information Systems Frontiers,2020 973,Chang H.H.; Tsai Y.-C.; Fu C.-S.; Chen S.-H.; De Peng Y.,Exploring the antecedents and consequences of technology and knowledge integration mechanisms in the context of NPD,"In order to provide new products that are more innovative and are suited to customer needs, enterprises have started to look for assistance from external partners. Consequently, as firms launch new product development (NPD), it has become more critical to determine a method by which to integrate technology and knowledge together and to enhance absorptive capability (AC) of firms in the process of information, technology and knowledge sharing. This study thus combines the concepts of corporate social capital (CSC), intellectual capital, and AC, and discusses the influence of internal/external resource integration on technology integration mechanisms (TIM) and knowledge integration mechanisms (KIM), as well as AC’s effect on NPD. Three hundred and ninety-four valid responses were collected and partial least squares structural equation modeling was adopted for data analysis. The results show that interaction ties and the shared language of CSC positively affect TIM, while human capital and organizational capital have positive influences on KIM. In addition, TIM and KIM both have significant and positive influences on AC and AC further influences NPD performance. Therefore, this study suggests that firms have to establish interaction bases for utilizing external knowledge to assist in NPD, and this can be achieved by offering a friendly environment to encourage employees to be more willing to contribute their knowledge. © 2016, Springer Science+Business Media New York.",Absorptive capacity (AC); Knowledge integration mechanism (KIM); New product development (NPD); Technology integration mechanism (TIM),18,Information Systems Frontiers,2016 974,Thambusamy R.; Palvia P.,U.S. Healthcare Provider Capabilities and Performance: the Mediating Roles of Service Innovation and Quality,"Rapid advancements in information and communication technologies (ICT) combined with improvements in socioeconomic standards of living have led to an increase in consumers’ demands for personal services in a variety of industries including healthcare. Despite the tremendous potential of Health Information Technology (HIT), the healthcare industry lags behind in the use of HIT to effectively deliver innovative services. In this study, we combine the capabilities perspective and an adapted Capability-Quality-Performance (CQP) model to investigate the roles service innovation and quality play in the relationship between a healthcare provider’s IT-enabled capabilities and provider performance. We propose that IT-enabled capabilities by themselves do not lead to improved healthcare provider performance. It is how those capabilities are manipulated and utilized that determines the competitive advantage the healthcare provider can gain over its competitors. The theory-based model was empirically tested using a survey of 202 U.S. healthcare organizations. Results of exploratory hypotheses testing showed that service innovation and quality play significant roles in mediating the relationship between IT-enabled capabilities and healthcare provider performance. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Capabilities perspective; Healthcare provider performance; IT-enabled capabilities; Service innovation; Service quality,13,Information Systems Frontiers,2020 975,Chu V.W.; Wong R.K.; Chi C.-H.; Zhou W.; Ho I.,The design of a cloud-based tracker platform based on system-of-systems service architecture,"Devices embedded with position tracking facilities are now widely available, such as smartphones, smartwatches, vehicle location trackers, etc. However, data mining and advanced analytics are rarely bundled with these devices that limits their utility. In this paper, we present the design of a generic, programmable position tracking platform, namely CQtracker. In particular, this platform is incorporated with a cloud-based engine of advanced analytics. CQtracker is constructed based on a concept of system-of-systems service architecture to deliver data-system-as-a-service. It is designed for the consumption by a variety of spatio-temporal applications. Spatio-temporal data exhibit strong heterogeneous patterns, data sparseness and distribution skewness. Hence, they are difficult to analyze. CQtracker reveals relationships and structures from these data by self-regularized time-varying dynamic Bayesian networks. In addition, a Bayesian parameter estimation approach is applied to an epidemic model for outbreak predictions. Sample applications are presented in this paper, in which CQtracker successfully reveals the evolution of time-varying structures from traffic trajectories. © 2017, Springer Science+Business Media New York.",Data-system-as-a-service; Mashup; Service architecture; Service composition; System-of-systems,10,Information Systems Frontiers,2017 976,Dijkman R.; Lammers S.V.; de Jong A.,Properties that influence business process management maturity and its effect on organizational performance,"BPM maturity is a measure to evaluate how professionally an organization manages its business processes. Previous research provides evidence that higher BPM maturity leads to better performance of processes and of the organization as a whole. It also claims that different organizations should strive for different levels of maturity, depending on their properties. This paper presents an empirical investigation of these claims, based on a sample of 120 organizations and looking at a selection of organizational properties. Our results reveal that higher BPM maturity contributes to better performance, but only up to a point. Interestingly, it contradicts the popular belief that higher innovativeness is associated with lower BPM maturity, rather showing that higher innovativeness is associated with higher BPM maturity. In addition, the paper shows that companies in different regions have a different level of BPM maturity. These findings can be used as a benchmark and a motivation for organizations to increase their BPM maturity. © 2015, The Author(s).",Business process; Business process management; Innovativeness; Maturity; Performance,52,Information Systems Frontiers,2016 977,Yang M.; Jiang J.; Kiang M.; Yuan F.,Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision,"Recent years have witnessed the rapid growth of an emerging digital healthcare service – online medical consultation (OMC). Despite its popularity, many OMC platforms have encountered issues in initial adoption and continuance use among patients. We posit that many of the hesitation and resistance may arise from a lack of trust toward OMC, which is a complex phenomenon that involves both interpersonal and technological-oriented considerations. This study seeks to clarify the conceptualization of online trust in the context of OMC. It compares two plausible explanations (i.e., trust as a direct cause vs. trust as a moderator) regarding how interpersonal and technological trust contributes to the service continuance decision in OMC. By contextualizing the valence framework, we identify the critical factors in making the risk-benefit assessment of patients’ OMC decision. We conduct an online survey of 365 experienced OMC users and analyze our structural model using a partial least square approach. Our results show that the multidimensional conceptualization approach, which incorporates both interpersonal and technological aspects of trust, is superior to the unitary approach. Besides, our findings suggest that the role trust plays in determining service continuance decisions in OMC is more of a direct cause than a qualifier that buffers the impacts of risk-benefit evaluation. We believe the findings can help both researchers and practitioners recognize the multidimensional perspective of trust and better understand the role trust plays in OMC and other online healthcare delivery problems. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.",Digital platform; Multidimensionality; Online healthcare consultation; Online trust; Partial least square; Valence framework,49,Information Systems Frontiers,2022 978,Jha A.K.; Bose I.,Linking Drivers and Outcomes of Innovation in IT Firms: The Role of Partnerships,"A better understanding of the linkage between the objectives and outcomes of innovation will enable firms to plan better for effective utilization of their resources for generation of innovation. The current study enhances the understanding of relationships between the intent to innovate and eventual outcome as the intent to innovate drives complex processes and resource allocation that leads to a successful innovation. We analyze the World Bank innovation survey data of IT firms in China and find that drivers of innovation significantly impact the configuration elements of the innovation phenomenon within firms and influence how firms execute collaboration with external partners. This is turn impacts the product and process innovation generated by the firm. The findings imply that firms should decide about their choice of partners for innovation and the mode of engagement with the partners based on the drivers for innovation. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Innovation configuration; Innovation drivers; Process innovation; Product innovation; Technological innovation,8,Information Systems Frontiers,2021 979,Hausken K.; Welburn J.W.,Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits,"Two players strike balances between allocating resources for defense and production of zero-day exploits. Production is further allocated into cyberattack or stockpiling. Applying the Cobb Douglas expected utility function for equivalent players, an analytical solution is determined where each player’s expected utility is inverse U shaped in each player’s unit defense cost. More generally, simulations illustrate the impact of varying nine parameter values relative to a benchmark. Increasing a player’s unit costs of defense or development of zero-days benefits the opposing player. Increasing the contest intensities over the two players’ assets causes the players to increase their efforts until their resources are fully exploited and they receive zero expected utility. Decreasing the Cobb Douglas output elasticity for a player’s stockpiling of zero-days causes its attack to increase and its expected utility to eventually reach a maximum, while the opposing player’s expected utility reaches a minimum. Altering the Cobb Douglas output elasticities for a player’s attack or defense contests towards their maxima or minima causes maximum expected utility for both players. © 2020, The Author(s).",Attack; C72; Classification Numbers: C70; Cyber security; D72; D74; Defense; Game; Production; Vulnerability; Zero-days,3,Information Systems Frontiers,2021 980,Thomas M.; Costa D.; Oliveira T.,Assessing the role of IT-enabled process virtualization on green IT adoption,"Green Information Technology (IT) tools and practices contribute to environmental sustainability and business processes virtualization. To assess whether IT-enabled process virtualization capabilities impact organizational Green IT initiatives, Bose and Luo 2011 proposed a conceptual model that combines three theories: technology-organization-environment framework, process virtualization theory, and diffusion of innovation theory. We conducted an empirical analysis of data from 251 European firms, and found that environment context (competition intensity and regulatory support) was more important to Green IT initiatives than organization or technology context. Technology factors (sensory readiness, relationship readiness, synchronism readiness, and identification and control readiness) facilitating process virtualization were not found significant to organizational Green IT initiatives. © 2015, Springer Science+Business Media New York.",Diffusion of innovation (DOI); Green IT; Process virtualization; Process virtualization theory (PVT); Technology-organization-environment (TOE),68,Information Systems Frontiers,2016 981,Sprenger M.; Mettler T.; Winter R.,A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions,"The ongoing integration of Information Technology (IT) into various areas of our lives has led to a plethora of digital products and services. To survive competition in the long run, these offerings not only have to keep up with constant technological developments, but also have to adapt from a business point of view. Managers of these digital businesses have to especially focus on the design and evolution of their busi-ness’ revenue mechanisms to ensure the viability of their offerings. The related decisions are not trivial, as managers have to be aware of the relevant contextual factors and have to react quickly to changes in the environment. This paper proposes a viability theory for digital businesses described by 17 propositions that may guide managers in the design of revenue mechanisms and thereby support the evolution as well as the viability of a digital business. © Springer Science+Business Media New York 2016.",Digital business; Evolution; Managerial decision support; Revenue mechanisms; Viability theory,9,Information Systems Frontiers,2017 982,Chen Q.; Li J.-W.; Liu J.-G.; Han J.-T.; Shi Y.; Guo X.-H.,Borrower Learning Effects: Do Prior Experiences Promote Continuous Successes in Peer-to-Peer Lending?,"There are a large amount of studies on the impact of individual experience on learning outcome, which ignore the conditioning and implicitly assume that the learning behaviors are bound to arise. This study develops a two-stage conceptual model for the interpretation of individual learning, and aims to explore how individual’s prior experience affects the initiating of subsequent learning behavior first and then impacts the success of subsequent learning behavior. Using a large sample of loan application data over a five-year period from a Chinese P2P lending platform Renrendai, we found strong evidence that both prior successes and prior failures can motivate borrowers to take subsequent borrowing behaviors again. However, in regard to the impact of individual experience on learning outcome, our finding in online environment is contrary to the prevalent view in organizational learning—“we learn more effectively in failure than in success”. Specifically, we found only successes can lead to desirable success whereas failures can’t, which indicates that borrowers with failure experience are willing to repeat borrowing but unable to learn from their failures. Further, we find a beneficial interaction effect between borrower’s prior successes and prior failures on subsequent borrowing success. These results are robust across a variety of settings. Our study enriches the understanding of individual learning by focusing not only on outcome improvement but also on conditioning. Moreover, we investigate learning process in an online environment which is anonymous and lack of peer communication that offline organizations have, we draw some different findings. Our findings also offer practical insights for borrowers under financial difficulties and platform managers to correctly interpret prior experience and enhance the probability of subsequent funding success in P2P lending. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Experience; Failure; Learning; Peer-to-Peer (P2P) lending; Success,10,Information Systems Frontiers,2021 983,Deokar A.V.; Tao J.,OrgMiner: A Framework for Discovering User-Related Process Intelligence from Event Logs,"Process Intelligence refers to the extraction and analysis of valuable knowledge nuggets embedded in business process instances/event logs or enterprise applications, for the purpose of supporting various decision-making processes. Researchers and practitioners mine such event logs using Process Mining and Analytics (PMA) techniques that help analyze business processes across three perspectives: control flow, organization, and data. While previous PMA studies have made advances toward the control flow and data flow perspectives, there is limited research toward the organizational perspective of process intelligence. In this study, we propose an organizational mining framework, OrgMiner, that supports constructing organizational models from event logs. The framework utilizes the notion of behavioral patterns, which rely on the weak order relations appearing in event logs. The various modules and knowledge elements in the framework are described in detail. The components of the framework support identifying, selecting, and applying behavioral patterns using different metrics for organizational mining purposes. The derived organizational models can be used to support decision making in scenarios such as task assignment, resource allocation, as well as role-based access control. Compared to extant studies, the proposed approach does not assume prior availability of explicit process models. Additionally, the process patterns presented in this study can be used as building blocks, so that researchers and practitioners can use them directly or extend them further to identify complex organizational processes. A case study is presented to evaluate the feasibility and effectiveness of the OrgMiner framework. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",Behavioral patterns; Business process management; Organizational mining; Process analytics; Process mining,9,Information Systems Frontiers,2021 984,Afflerbach P.; Hohendorf M.; Manderscheid J.,Design it like Darwin - A value-based application of evolutionary algorithms for proper and unambiguous business process redesign,"Business process management (BPM) is an acknowledged source of corporate performance. Despite the mature body of knowledge, computational support is considered as a highly relevant research gap for redesigning business processes. Therefore, this paper applies Evolutionary Algorithms (EAs) that, on a conceptual level, mimic the BPM lifecycle – the most popular BPM approach – by incrementally improving the status quo and bridging the trade-off between maintaining well-performing design structures and continuously evolving new designs. Beginning with describing process elements and their characteristics in matrices to aggregate process information, the EA then processes this information and combines the elements to new designs. These designs are then assessed by a function from value-based management. This economic paradigm reduces designs to their value contributions and facilitates an objective prioritization. Altogether, our triad of management science, BPM and information systems research results in a promising tool for process redesign and avoids subjective vagueness inherent to current redesign projects. © 2016, Springer Science+Business Media New York.",Business process management; Business process redesign; Computational process management; Evolutionary algorithms; Genetic programming; Value-based business process management,11,Information Systems Frontiers,2017 985,Li X.; Whinston A.B.,Analyzing Cryptocurrencies,"Cryptocurrencies, such as Bitcoin, have been an important factor in some economic activities. For example, Bitcoin is the main payment method for ransomware attackers and retailers on the Darknet. It is therefore useful to understand the features of cryptocurrencies and their economic implications. In this research, we use bitcoin, Ether, and XRP, the three cryptocurrencies with the highest market values as of this writing, as well as Libra, which is forthcoming and topical, as examples to analyze their features. Specifically, we argue that these cryptocurrencies are fundamentally different due to differences in the following factors: the identity management of their ledger writers, their consensus algorithms, and their coin supply. We discuss how these factors determine cryptocurrency performance, including security, privacy, and financial influence. We also discuss potential research topics around these cryptocurrencies that are still open. © 2019, Springer Science+Business Media, LLC, part of Springer Nature.",Bitcoin; Blockchain; Cryptocurrency; Ether; Libra; XRP,51,Information Systems Frontiers,2020 986,Khan A.; Krishnan S.; Arayankalam J.,The Role of ICT Laws and National Culture in Determining ICT Diffusion and Well-Being: A Cross-Country Examination,"ICT-induced legal and regulatory challenges, including security and privacy risks, are on the rise. Despite that, there is a dearth of research emphasizing the role of ICT laws and understanding its effect on the level of ICT diffusion and the well-being of a country. Drawing on Dror’s law and social change framework, and grounding the discussion on the literature on ICT diffusion, the perspective of perceived risk, Hofstede’s typology of national culture, and the technological determinism theory, this study (1) explores the effect of maturity of ICT laws in a country on ICT diffusion among its citizens and businesses; (2) understands how this relationship is contingent on the national cultural dimensions; and (3) explicates the role of ICT diffusion in promoting the well-being. The research model is examined using publicly available data from 83 countries, and the findings suggest that sound ICT laws are necessary for achieving a greater diffusion of ICTs and improving well-being. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.",ICT diffusion; Maturity of ICT laws; National culture; Security and privacy issues; Well-being,26,Information Systems Frontiers,2022 987,Fraga A.; Llorens J.; Génova G.,Towards a Methodology for Knowledge Reuse Based on Semantic Repositories,"Although reuse is generally considered a good practice within software engineering, several problems dissuade its industrial application and a new viewpoint is needed. This paper presents a new perspective of reuse based on improved retrieval techniques for semantic content (knowledge). This approach, called Universal Knowledge Reuse Methodology (UKRM), drops the investment costs needed in systematic reuse, including the cost of traceability in the process, and reduces the chaos of ad-hoc reuse. UKRM makes reuse independent of the type of content, the context where it will be reused, and even the user that demands it. The paper includes an incremental experiment in order to validate the feasibility of this proposal. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Ad-hoc reuse; Knowledge reuse; Reuse; Reuse and integration in domain transference; Reuse methodology; ROI problems; Semantic repositories; Systematic reuse,9,Information Systems Frontiers,2019 988,Herrmann K.; Voigt H.; Rausch J.; Behrend A.; Lehner W.,Robust and simple database evolution,"Software developers adapt to the fast-moving nature of software systems with agile development techniques. However, database developers lack the tools and concepts to keep the pace. Whenever the current database schema is evolved, the already existing data needs to be evolved as well. This is usually realized with manually written SQL scripts, which is error-prone and explains significant costs in software projects. A promising solution are declarative database evolution languages, which couple both schema and data evolution into intuitive operations. Existing database evolution languages focus on usability but do not strive for completeness. However, this is an inevitable prerequisite to avoid complex and error-prone workarounds. We present CoDEL which is based on an existing language but is relationally complete. We precisely define its semantic using relational algebra, propose a syntax, and formally validate its relational completeness. Having a complete and comprehensive database evolution language facilitates valuable support throughout the whole evolution of a database. As an instance, we present VaCo, a tool supporting developers with variant co-evolution. Given a variant schema derived from a core schema, VaCo uses the richer semantics of CoDEL to semi-automatically co-evolve this variant with the core. © 2017, Springer Science+Business Media New York.",Co-Evolution; Database evolution; Evolution language; Relational completeness,14,Information Systems Frontiers,2018 989,Luong T.T.; Sivarajah U.; Weerakkody V.,Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?,"Agile development methodologies (ADM) have become a widely implemented project management approach in Information Systems (IS). Yet, along with its growing popularity, the amount of concerns raised in regard to human related challenges caused by applying ADM are rapidly increasing. Nevertheless, the extant scholarly literature has neglected to identify the primary origins and reasons of these challenges. The purpose of this study is therefore to examine if these human related challenges are related to a lack of Emotional Intelligence (EI) by means of a quantitative approach. From a sample of 194 agile practitioners, EI was found to be significantly correlated to human related challenges in agile teams in terms of anxiety, motivation, mutual trust and communication competence. Hence, these findings offer important new knowledge for IS-scholars, project managers and human resource practitioners, about the vital role of EI for staffing and training of agile managed IS-projects. © 2019, The Author(s).",Agile; Emotional intelligence; Information systems; Project management,29,Information Systems Frontiers,2021 990,Porra J.; Lacity M.; Parks M.S.,“Can Computer Based Human-Likeness Endanger Humanness?” – A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can’t Have”,"Digital assistants engage with us with increasingly human-like conversations, including the expression of human emotions with such utterances as “I am sorry…”, “I hope you enjoy…”, “I am grateful…”, or “I regret that…”. By 2021, digital assistants will outnumber humans. No one seems to stop to ask if creating more digital companions that appear increasingly human is really beneficial to the future of our species. In this essay, we pose the question: “How human should computer-based human-likeness appear?” We rely on the philosophy of humanness and the theory of speech acts to consider the long-term consequences of living with digital creatures that express human-like feelings. We argue that feelings are the very substance of our humanness and therefore are best reserved for human interaction. © 2019, The Author(s).",Artificial intelligence; Colonial systems; Computer based information systems; Digital assistants; Emotions; Ethics; Evolution; Existential philosophy; Feelings; Future generations; Human-likeness; Humanness; Information colonies; Realistic digital humans; Robots; Self; Speech act theory; User interface design,49,Information Systems Frontiers,2020 991,Terroso-Saenz F.; Valdes-Vela M.; Skarmeta-Gomez A.F.,A complex event processing approach to detect abnormal behaviours in the marine environment,"Over the last years, many data-sources have become available to monitor the marine traffic. This has motivated the development of support systems to automatically detect vessels’ behaviours of interest. The present work states a novel approach in this domain following the Complex Event Processing (CEP) paradigm. As a proof of concept, a CEP-based system has been developed to timely detect a set of vessel’s abnormal behaviours by performing an event-based processing of Automatic Identification System data. Experiments based on real-world and synthetic data proved the suitability and feasibility of the proposal. © 2015, Springer Science+Business Media New York.",Abnormal behaviour; Automated identification system; Complex event processing; Vessel traffic service,27,Information Systems Frontiers,2016 992,Babik D.; Singh R.; Zhao X.; Ford E.W.,What you think and what I think: Studying intersubjectivity in knowledge artifacts evaluation,"Miscalibration, the failure to accurately evaluate one’s own work relative to others' evaluation, is a common concern in social systems of knowledge creation where participants act as both creators and evaluators. Theories of social norming hold that individual’s self-evaluation miscalibration diminishes over multiple iterations of creator-evaluator interactions and shared understanding emerges. This paper explores intersubjectivity and the longitudinal dynamics of miscalibration between creators' and evaluators' assessments in IT-enabled social knowledge creation and refinement systems. Using Latent Growth Modeling, we investigated dynamics of creator’s assessments of their own knowledge artifacts compared to peer evaluators' to determine whether miscalibration attenuates over multiple interactions. Contrary to theory, we found that creator’s self-assessment miscalibration does not attenuate over repeated interactions. Moreover, depending on the degree of difference, we found self-assessment miscalibration to amplify over time with knowledge artifact creators' diverging farther from their peers' collective opinion. Deeper analysis found no significant evidence of the influence of bias and controversy on miscalibration. Therefore, relying on social norming to correct miscalibration in knowledge creation environments (e.g., social media interactions) may not function as expected. © 2015, Springer Science+Business Media New York.",Intersubjectivity; Knowledge artifacts; Latent classes; Longitudinal analysis; Miscalibration; Peer-evaluation,12,Information Systems Frontiers,2017 993,Plachkinova M.; Vo A.; Bhaskar R.; Hilton B.,A conceptual framework for quality healthcare accessibility: a scalable approach for big data technologies,"Healthcare accessibility research has been of growing interest for scholars and practitioners. This manuscript classifies prior studies on the Floating Catchment Area methodologies, a prevalent class of methodologies that measure healthcare accessibility, and presents a framework that conceptualizes accessibility computation. We build the Floating Catchment Method General Framework as an IT artifact, following best practices in Design Science Research. We evaluate the utility of our framework by creating an instantiation, as an algorithm, and test it with large healthcare data sets from California. We showcase the practical application of the artifact and address the pressing issue of access to quality healthcare. This example also serves as a prototype for Big Data Analytics, as it presents opportunities to scale the analysis vertically and horizontally. In order for researchers to perform high impact studies and make the world a better place, an overarching framework utilizing Big Data Analytics should be seriously considered. © 2016, Springer Science+Business Media New York.",Big data analytics; Big data for decision support; Geographic information systems; Healthcare accessibility; Healthcare analytics,32,Information Systems Frontiers,2018 994,Poblet M.; García-Cuesta E.; Casanovas P.,"Crowdsourcing roles, methods and tools for data-intensive disaster management","Mobile technologies, web-based platforms, and social media have transformed the landscape of disaster management by enabling a new generation of digital networks to produce, process, and analyse georeferenced data in real time. This unprecedented convergence of geomobile technologies and crowdsourcing methods is opening up multiple forms to participate in disaster management tasks. Based on empirical research, this paper first proposes a conceptualisation of crowdsourcing roles and then analyses methods and tools based on a combination of two variables: (i) types of data being processed; (ii) involvement of the crowds. The paper also surveys a number of existing platforms and mobile apps leveraging crowdsourcing in disaster and emergency management with the aim to contribute to the discussion on the advantages and limits of using crowdsourcing methods and tools in these areas. © 2017, Springer Science+Business Media New York.",Crowdsourcing; Data management; Disaster management; Microtasking; Mobile technologies; Online platforms; Ontologies,85,Information Systems Frontiers,2018 995,Rudra K.; Sharma A.; Ganguly N.; Imran M.,Classifying and Summarizing Information from Microblogs During Epidemics,"During a new disease outbreak, frustration and uncertainties among affected and vulnerable population increase. Affected communities look for known symptoms, prevention measures, and treatment strategies. On the other hand, health organizations try to get situational updates to assess the severity of the outbreak, known affected cases, and other details. Recent emergence of social media platforms such as Twitter provide convenient ways and fast access to disseminate and consume information to/from a wider audience. Research studies have shown potential of this online information to address information needs of concerned authorities during outbreaks, epidemics, and pandemics. In this work, we target three types of end-users (i) vulnerable population—people who are not yet affected and are looking for prevention related information (ii) affected population—people who are affected and looking for treatment related information, and (iii) health organizations—like WHO, who are interested in gaining situational awareness to make timely decisions. We use Twitter data from two recent outbreaks (Ebola and MERS) to build an automatic classification approach useful to categorize tweets into different disease related categories. Moreover, the classified messages are used to generate different kinds of summaries useful for affected and vulnerable communities as well as health organizations. Results obtained from extensive experimentation show the effectiveness of the proposed approach. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.",Classification; Epidemic; Health crisis; Summarization; Twitter,42,Information Systems Frontiers,2018 996,Ismagilova E.; Hughes L.; Rana N.P.; Dwivedi Y.K.,"Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework","The complex and interdependent nature of smart cities raises significant political, technical, and socioeconomic challenges for designers, integrators and organisations involved in administrating these new entities. An increasing number of studies focus on the security, privacy and risks within smart cities, highlighting the threats relating to information security and challenges for smart city infrastructure in the management and processing of personal data. This study analyses many of these challenges, offers a valuable synthesis of the relevant key literature, and develops a smart city interaction framework. The study is organised around a number of key themes within smart cities research: privacy and security of mobile devices and services; smart city infrastructure, power systems, healthcare, frameworks, algorithms and protocols to improve security and privacy, operational threats for smart cities, use and adoption of smart services by citizens, use of blockchain and use of social media. This comprehensive review provides a useful perspective on many of the key issues and offers key direction for future studies. The findings of this study can provide an informative research framework and reference point for academics and practitioners. © 2020, The Author(s).",Interaction framework; Literature review; Privacy; Risk; Security; Smart cities,321,Information Systems Frontiers,2022 997,Mahroof K.; Weerakkody V.; Onkal D.; Hussain Z.,Technology as a Disruptive Agent: Intergenerational Perspectives,"This study explores how British South Asian parents perceive their children’s technology consumption through their collectivist lenses and interdependent values. The findings for this qualitative study indicate that second and third generation South Asian parents acknowledge the benefits of children’s technology use; but largely perceive technology as a disruptive agent, whereby children are becoming isolated and increasingly independent within the household. The analysis aims to understand how parents view their children’s relationship with others as a result of technology consumption. Accordingly, this paper proposes an extension of the Construal of self conceptualisation and contributes a Techno-construal matrix that establishes a dyadic connection between technology consumption and cultural values. Overall, the study reveals that children display less inter-reliance and conformance typically associated with collectivist cultures, resulting from their technology use. Consequently, parents interpret their children’s shift from interdependence to more independence as a disruptive and unsettling phenomenon within the household. © 2018, The Author(s).",Asian; Children; Collectivism; Interdependence; Parenting; Technology,7,Information Systems Frontiers,2020 998,Xu Z.; Xuan J.; Liu Y.; Choo K.-K.R.; Mei L.; Hu C.,Building spatial temporal relation graph of concepts pair using web repository,"Mining semantic relations between concepts underlies many fundamental tasks including natural language processing, web mining, information retrieval, and web search. In order to describe the semantic relation between concepts, in this paper, the problem of automatically generating spatial temporal relation graph (STRG) of semantic relation between concepts is studied. The spatial temporal relation graph of semantic relation between concepts includes relation words, relation sentences, relation factor, relation graph, faceted feature, temporal feature, and spatial feature. The proposed method can automatically generate the spatial temporal relation graph (STRG) of semantic relation between concepts, which is different from the manually generated annotation repository such as WordNet and Wikipedia. Moreover, the proposed method does not need any prior knowledge such as ontology or the hierarchical knowledge base such as WordNet. Empirical experiments on real dataset show that the proposed algorithm is effective and accurate. © 2016, Springer Science+Business Media New York.",Knowledge graph; Semantic relations; Temporal and spatial mining; Web repository,12,Information Systems Frontiers,2017 999,Hossain M.A.; Quaddus M.; Islam N.,Developing and validating a model explaining the assimilation process of RFID: An empirical study,"In this research we studied the assimilation process of a technological innovation (i.e. technovation) called Radio Frequency Identification (RFID). Like many other technovations, RFID is considered as a revolutionary one, but its assimilation is an evolutionary process. Here, we extended the conventional assimilation theories and initiated an intellectual argument by introducing extension as an important stage of assimilation, which is contextual and highly relevant for RFID assimilation process. Data for the empirical tests were collected via survey from 221 livestock farms in Australia that are using RFID for livestock identification and tracing. We examined ten Technology-Organization-Environmental (TOE) factors on four stages of RFID assimilation process. Empirical results, based on Partial Least Square (PLS)-based Structural Equation Modelling (SEM), suggest that assimilation of RFID technovation does involve four stages: initiation, adoption, routinization, and extension. We also found that one single factor may have different effect on different stages of assimilation, which may even be different directioned. For instance, external environmental uncertainty has a positive impact on RFID adoption while it has a negative impact on RFID extension. The paper discusses the results and practical implications in detail. © 2014, Springer Science+Business Media New York.",Adoption; Assimilation; Diffusion; Extension; RFID; Routinization; Technological innovation,39,Information Systems Frontiers,2016 1000,Karunagaran S.; Mathew S.K.; Lehner F.,Differential cloud adoption: A comparative case study of large enterprises and SMEs in Germany,"Cloud computing is widely advertised as a technology-based service model and an emerging business model which is highly beneficial for the adopting organizations. But, academic landscape lacks sufficient empirical studies of cloud adoption at firm-level, and the existing cloud adoption factors are mostly anecdotal in nature. A multiple case study approach was used to extract and compare adoption characteristics of SMEs and large firms in Germany, based on the Technology-Organization and Environment (TOE) framework. The study shows that there exist important differences between SMEs and large enterprises regarding the cloud adoption factors. The results further show that large firms perceive characteristics of the cloud to be more complicated and not easy to implement compared to SMEs which contradicts the popular belief that large firms are forerunners in adopting innovations and, the widely publicized cost benefits of cloud services are perceived to be in favor of SMEs. © 2017, Springer Science+Business Media, LLC.",Cloud computing; Comparative study; Innovation adoption; Technology adoption; TOE,42,Information Systems Frontiers,2019 1001,Deokar A.V.; El-Gayar O.F.,Decision-enabled dynamic process management for networked enterprises,"Enterprises in today's networked economy face numerous information management challenges, both from a process management perspective as well as a decision support perspective. While there have been significant relevant advances in the areas of business process management as well as decision sciences, several open research issues exist. In this paper, we highlight the following key challenges. First, current process modeling and management techniques lack in providing a seamless integration of decision models and tools in existing business processes, which is critical to achieve organizational objectives. Second, given the dynamic nature of business processes in networked enterprises, process management approaches that enable organizations to react to business process changes in an agile manner are required. Third, current state-of-the-art decision model management techniques are not particularly amenable to distributed settings in networked enterprises, which limits the sharing and reuse of models in different contexts, including their utility within managing business processes. In this paper, we present a framework for decision-enabled dynamic process management that addresses these challenges. The framework builds on computational formalisms, including the structured modeling paradigm for representing decision models, and hierarchical task networks from the artificial intelligence (AI) planning area for process modeling. Within the framework, interleaved process planning (modeling), execution and monitoring for dynamic process management throughout the process lifecycle is proposed. A serviceoriented architecture combined with advances from the semantic Web field for model management support within business processes is proposed. © Springer Science+Business Media, LLC 2010.",Dynamic process management; Knowledge work; Model management,14,Information Systems Frontiers,2011 1002,Masud M.M.; Khan L.; Thuraisingham B.,A scalable multi-level feature extraction technique to detect malicious executables,"We present a scalable and multi-level feature extraction technique to detect malicious executables. We propose a novel combination of three different kinds of features at different levels of abstraction. These are binary n-grams, assembly instruction sequences, and Dynamic Link Library (DLL) function calls; extracted from binary executables, disassembled executables, and executable headers, respectively. We also propose an efficient and scalable feature extraction technique, and apply this technique on a large corpus of real benign and malicious executables. The above mentioned features are extracted from the corpus data and a classifier is trained, which achieves high accuracy and low false positive rate in detecting malicious executables. Our approach is knowledge-based because of several reasons. First, we apply the knowledge obtained from the binary n-gram features to extract assembly instruction sequences using our Assembly Feature Retrieval algorithm. Second, we apply the statistical knowledge obtained during feature extraction to select the best features, and to build a classification model. Our model is compared against other feature-based approaches for malicious code detection, and found to be more efficient in terms of detection accuracy and false alarm rate. © 2007 Springer Science+Business Media, LLC.",Disassembly; Feature extraction; Malicious executable; n-gram analysis,69,Information Systems Frontiers,2008 1003,Chau M.; Ball G.L.; Huang J.; Chen J.; Zhao J.L.,Global IT and IT-enabled services,"Several topics that were covered during the IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE) held in September 2008, in Tianjin, China, are presented. The symposium focused on the globalized information management, a multidisciplinary covering such fields as computer science, industrial engineering, information systems, management science and engineering, and operations management. The research in global IT and IT-enabled services covers a wide spectrum of topics that include business processes and management in a global setting, such as global workflow technologies and applications, global information system integration and interaction, and global knowledge management. One of the topics focused on the importance of business process modeling technologies and security requirements in order to derive a trust federation from formally described business process models.",,2,Information Systems Frontiers,2011 1004,Fugini M.G.; Pernici B.; Ramoni F.,Quality analysis of composed services through fault injection,"Web service composition can be adopted to develop information systems through integration of services to obtain complex composed services. While interfaces of services are known at composition time, the quality of a composed service may depend on the ability of its component services to react to unforeseen situations, such as data quality problems and service coordination problems. In this work, we propose an approach to analyze the quality of composed services using fault injection techniques, by inspecting the reaction of a composed process to injected faults; the aim is to assess the process quality in terms of fault monitoring and, more generally, fault tolerance capabilities. The component services are analyzed either as black-boxes, when only input and output messages are considered or as white-boxes, when data sources used by services are considered. A test bed is illustrated on a selected example, and results of extensive testing are discussed and framed into a process analysis methodology. © 2008 Springer Science+Business Media, LLC.",Complex composed services; Fault injection; Information systems quality; Process testing; Web service analysis,14,Information Systems Frontiers,2009 1005,Warren M.; Leitch S.,Hacker Taggers: A new type of hackers,"Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being the work of a hacker however little is known about hacker subgroups, their rationale and ethical views. This paper focuses upon hacker subgroups and their activities and in particular the new hacker subgroup identified as 'Hacker Taggers'. © 2010 Springer Science + Business Media, LLC.",Australia and ethics; Hacker Taggers; Hackers,14,Information Systems Frontiers,2010 1006,Wei C.; Khoury R.; Fong S.,Web 2.0 Recommendation service by multi-collaborative filtering trust network algorithm,"Recommendation Services (RS) are an essential part of online marketing campaigns. They make it possible to automatically suggest advertisements and promotions that fit the interests of individual users. Social networking websites, and the Web 2.0 in general, offer a collaborative online platform where users socialize, interact and discuss topics of interest with each other. These websites have created an abundance of information about users and their interests. The computational challenge however is to analyze and filter this information in order to generate useful recommendations for each user. Collaborative Filtering (CF) is a recommendation service technique that collects information from a user's preferences and from trusted peer users in order to infer a new targeted suggestion. CF and its variants have been studied extensively in the literature on online recommending, marketing and advertising systems. However, most of the work done was based on Web 1.0, where all the information necessary for the computations is assumed to always be completely available. By contrast, in the distributed environment of Web 2.0, such as in current social networks, the required information may be either incomplete or scattered over different sources. In this paper, we propose the Multi-Collaborative Filtering Trust Network algorithm, an improved version of the CF algorithm designed to work on the Web 2.0 platform. Our simulation experiments show that the new algorithm yields a clear improvement in prediction accuracy compared to the original CF algorithm. © 2012 Springer Science+Business Media, LLC.",Collaborative Filtering; Recommendation system; Social network; Web 2.0,26,Information Systems Frontiers,2013 1007,Loukas A.; Damopoulos D.; Menesidou S.A.; Skarkala M.E.; Kambourakis G.; Gritzalis S.,MILC: A secure and privacy-preserving mobile instant locator with chatting,"The key issue for any mobile application or service is the way it is delivered and experienced by users, who eventually may decide to keep it on their software portfolio or not. Without doubt, security and privacy have both a crucial role to play towards this goal. Very recently, Gartner has identified the top ten of consumer mobile applications that are expected to dominate the market in the near future. Among them one can earmark location-based services in number 2 and mobile instant messaging in number 9. This paper presents a novel application namely MILC that blends both features. That is, MILC offers users the ability to chat, interchange geographic co-ordinates and make Splashes in real-time. At present, several implementations provide these services separately or jointly, but none of them offers real security and preserves the privacy of the end-users at the same time. On the contrary, MILC provides an acceptable level of security by utilizing both asymmetric and symmetric cryptography, and most importantly, put the user in control of her own personal information and her private sphere. The analysis and our contribution are threefold starting from the theoretical background, continuing to the technical part, and providing an evaluation of the MILC system. We present and discuss several issues, including the different services that MILC supports, system architecture, protocols, security, privacy etc. Using a prototype implemented in Google's Android OS, we demonstrate that the proposed system is fast performing, secure, privacypreserving and potentially extensible. © Springer Science+Business Media, LLC 2010.",Chat; Location-based services; Mobile social networking; Privacy; Security; Spatial messaging; Virtual communities,14,Information Systems Frontiers,2012 1008,Shih H.-P.; Huang E.,Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community,"People participate in virtual communities (VCs) for knowledge sharing or social interaction. However, most studies of VCs have focused on elucidating knowledge sharing rather than predicting virtual social interactions. This study considers ""quality of online discussion"" an appropriate metric for assessing group-level outcomes of virtual social interactions, and thus for predicting member willingness to sustain an ongoing relationship with a virtual community (VC). This study develops a research model, grounded in Web interactivity, social identity and social bond theories, for predicting the quality of online discussion in terms of cognitive and social influences. Empirical results from an online survey of a VC verify distinct direct and indirect social influences (perceived internalization bonds and perceived identification bonds) and cognitive influences (perceived communication and perceived control). Implications for academics and practitioners are also discussed. © 2012 Springer Science+Business Media, LLC.",Cognitive influence; Online discussion; Social bond theory (SBT); Social identity theory (SIT); Social influence; Virtual communities (VCs); Virtual social interactions; Web interactivity,41,Information Systems Frontiers,2014 1009,Umer S.; Afzal M.; Hussain M.; Latif K.; Ahmad H.F.,Autonomous mapping of HL7 RIM and relational database schema,"Healthcare systems need to share information within and across the boundaries in order to provide better care to the patients. For this purpose, they take advantage of the full potential of current state of the art in healthcare standards providing interoperable solutions. HL7 V3 specification is an international message exchange and interoperability standard. HL7 V3 messages exchanged between healthcare applications are ultimately recorded into local healthcare databases, mostly in relational databases. In order to bring these relational databases in compliance with HL7, mappings between HL7 RIM (Reference Information Model) and relational database schema are required. Currently, RIM and database mapping is largely performed manually, therefore it is tedious, time consuming, error prone and expensive process. It is a challenging task to determine all correspondences between RIM and schema automatically because of extreme heterogeneity issues in healthcare databases. To reduce the amount of manual efforts as much as possible, autonomous mapping approaches are required. This paper proposes a technique that addresses the aforementioned mapping issue and aligns healthcare databases to HL7 V3 RIM specifications. Furthermore, the proposed technique has been implemented as a working application and tested on real world healthcare systems. The application loads the target healthcare schema and then identifies the most appropriate match for tables and the associated fields in the schema by using domain knowledge and the matching rules defined in the Mapping Knowledge Repository. These rules are designed to handle the complexity of semantics found in healthcare databases. The GUI allows users to view and edit/re-map the correspondences. Once all the mappings are defined, the application generates Mapping Specification, which contains all the mapping information i.e. database tables and fields with associated RIM classes and attributes. In order to enable the transactions, the application is facilitated with the autonomous code generation from the Mapping Specification. The Code Generator component focuses primarily on generating custom classes and hibernate mapping files against the runtime system to retrieve and parse the data from the data source-thus allows bi-directional HL7 to database communication, with minimum programming required. Our experimental results show 35-65% accuracy on real laboratory systems, thus demonstrating the promise of the approach. The proposed scheme is an effective step in bringing the clinical databases in compliance with RIM, providing ease and flexibility. © 2011 Springer Science+Business Media, LLC.",Code generation; Health Level 7; Interoperability; Mapping; Relational database,14,Information Systems Frontiers,2012 1010,Chang S.-I.; Yen D.C.; Ng C.S.-P.; Chang I.-C.; Yu S.-Y.,An ERP system performance assessment model development based on the balanced scorecard approach,"Previously completed research has not been significant when regarding the aspect of deriving a model for measuring the performance of an Enterprise Resource Planning (ERP) system. Therefore, this research attempts to present an objective and quantitative assessment model based on the Balance Scorecard approach for the purpose of appraising the performance of the ERP system. The methodology used in this research involves the Grounded Theory, Expert Questionnaire, the Analytic Hierarchy Process, and the Fuzzy Theory to filter out and develop the KPIs for the ERP system performance assessment model. It is expected that such a model may be used by enterprises to assess the efficiency of the ERP system during the various stages of management and support within the system. Finally, this assessment model is verified in a case company through the examination of its unbiased and quantifiable assessment approach. This result allows us to further understand authentic efficiency, and explore if enterprises have fulfilled their proposed objectives after the introduction of the ERP system. © 2009 Springer Science+Business Media, LLC.",Analytic hierarchy process; Balanced scorecard; Enterprise resources planning (ERP); Fuzzy theory; Grounded theory,28,Information Systems Frontiers,2011 1011,Fedorowicz J.; Gogan J.L.,Reinvention of interorganizational systems: A case analysis of the diffusion of a bio-terror surveillance system,"Innovation diffusion theory proposed that adopters-whether individuals or organizations-sometimes reinvent an innovation as they gain experience using it. Reinvention can enhance (or impede) the likelihood of an IS innovation's acceptance and further diffusion. This paper reports on a case study of BioSense, an interorganizational system that was designed as an early detection tool for bio-terror attacks and subsequently modified to better serve this need as well as to operate as a public health system for pinpointing geographic clusters of dangerous/acute disease outbreaks. By examining the interplay among the political and organizational dynamics and technical properties of the BioSense system, we shed light on processes affecting reinvention in an interorganizational context. We discuss our findings in light of theories of the diffusion and reinvention of innovations. We use Rogers' (1995) list of factors supporting reinvention to structure the discussion of the fidelity and uniformity of the innovation within the processes it supports in adopting health services organizations. © 2009 Springer Science+Business Media, LLC.",Adaptability and flexibility; Bioterrorism; Diffusion of innovation; E-government; Fidelity and uniformity; Interorganizational System; Reinvention,24,Information Systems Frontiers,2010 1012,Roztocki N.; Weistroffer H.R.,Investments in enterprise integration technology: An event study,"This study examines stock market reactions to investments in enterprise resource planning and enterprise application integration technologies, using signaling theory concepts as explaining theory. The empirical results presented in this paper indicate that financial markets differentiate among technologies that companies invest in to integrate their information systems. In addition, this study confirms that technology maturity, financial health of the investing company, and stock market conditions are important factors influencing the stock market reaction. © 2013, Springer Science+Business Media New York.",Enterprise application integration; Enterprise resource planning; Event study; Integration technology; Market value; Signaling theory,15,Information Systems Frontiers,2015 1013,Sveen F.O.; Rich E.; Jager M.,Overcoming organizational challenges to secure knowledge management,"Incident management systems have the potential to improve security dramatically but often experience problems stemming from organizational, interpersonal and social constraints that limit their effectiveness. These limits may cause underreporting of incidents, leading to erroneous perceptions of the actual safety and security situation of the organization. The true security situation may be better understood and underreporting may be reduced if underlying systemic issues surrounding security incident management are taken into account. A dynamic simulation, based on the parallel experience of industrial incident management systems, illustrates the cumulative effects of rewards, learning, and retributions on the fate of a hypothetical knowledge management system designed to collect information about events and incidents. Simulation studies are part of an ongoing research project to develop sustainable knowledge and knowledge transfer tools that support the development of a security culture. © 2007 Springer Science+Business Media, LLC.",Incident management; Knowledge management; Organizations; Security; Simulation; System dynamics,24,Information Systems Frontiers,2007 1014,Yang J.; Liu C.; Shang Y.; Cheng B.; Mao Z.; Liu C.; Niu L.; Chen J.,A cost-aware auto-scaling approach using the workload prediction in service clouds,"Service clouds are distributed infrastructures which deploys communication services in clouds. The scalability is an important characteristic of service clouds. With the scalability, the service cloud can offer on-demand computing power and storage capacities to different services. In order to achieve the scalability, we need to know when and how to scale virtual resources assigned to different services. In this paper, a novel service cloud architecture is presented, and a linear regression model is used to predict the workload. Based on this predicted workload, an auto-scaling mechanism is proposed to scale virtual resources at different resource levels in service clouds. The auto-scaling mechanism combines the real-time scaling and the pre-scaling. Finally experimental results are provided to demonstrate that our approach can satisfy the user Service Level Agreement (SLA) while keeping scaling costs low. © 2013 Springer Science+Business Media New York.",Cost-aware; Scalability; Service cloud; Workload prediction,117,Information Systems Frontiers,2014 1015,Rhee S.-H.; Bae H.; Choi Y.,Enhancing the efficiency of supply chain processes through web services,"Among business enterprises, keen competition is accelerating the introduction of Supply Chain Management (SCM). SCM entails the utilization of cutting-edge information technology in elaborately designing, managing and integrating supply chain processes so that participating companies' processes are interoperational at the global level. Recently, new Business Process Management (BPM) technology has attracted much attention as an indispensable tool for managing the supply chain synthetically and systematically. This next-generation technology, a great advance on existing BPM systems, can greatly enhance overall process efficiency in run-time. The critical path(s) in a process, and the slack time of each task, being the typical determiners of supply chain process efficiency, are the basis of a method, proposed in this paper, of efficiently executing global supply chain processes. The proposed method acts as a dispatching rule that can guide prioritization of the tasks in order to improve the run-time efficiency of supply chain processes. We provide several simulated results to demonstrate the effectiveness of our method, propose a web-service-based system architecture for the communication of the run-time data of tasks among processes in heterogeneous environments, and present a prototype of the system implemented. © Springer Science+Business Media, LLC 2007.",Business Process Management; Dispatching rule; Process efficiency; Process interoperability; Supply Chain Management; Web service,16,Information Systems Frontiers,2007 1016,Hong J.; Kook J.; Lee S.; Kwon D.; Yi S.,T-LEACH: The method of threshold-based cluster head replacement for wireless sensor networks,"In wireless sensor networks, power is the most essential resource because each sensor node has limited batteries. Many kinds of existing clustering protocols have been developed to balance and maximize lifetime of the sensor nodes in wireless sensor networks. These protocols select cluster heads periodically, and they considered only 'How can we select cluster heads energy-efficiently?' or 'What is the best selection of cluster heads?' without considering energy-efficient period of the cluster heads replacement. Unnecessary head selection may dissipate limited battery power of the entire sensor networks. In this paper, we present T-LEACH, which is a threshold-based cluster head replacement scheme for clustering protocols of wireless sensor networks. T-LEACH minimizes the number of cluster head selection by using threshold of residual energy. Reducing the amount of head selection and replacement cost, the lifetime of the entire networks can be extended compared with the existing clustering protocols. Our simulation results show that T-LEACH outperformed LEACH in terms of balancing energy consumption and network lifetime. © 2008 Springer Science+Business Media, LLC.",Cluster head replacement; Cluster head selection; Clustering protocols; Energy-efficiency; Wireless sensor networks,134,Information Systems Frontiers,2009 1017,Cavdur F.; Kumara S.,A network view of business systems,"In this paper, we present a novel business network construction approach, where the nodes of the network correspond to the names of the companies in a particular stock market index, and its links show the co-occurrence of two company names in daily news. Our approach consists of two phases, in which search for the company names in the news articles and network construction operations are performed, respectively. To increase the quality of results, each article is classified as business news or not business news before these operations, and only the articles that are classified as business news are considered for network construction. The resulting network presents a visualization of the business events and company relationships during the corresponding time period. We study both co-occurrences as well as single occurrences of company names in the articles scanned in our analysis. © 2012 Springer Science+Business Media, LLC.",Algorithms; Business systems; Financial systems; Networks; Text mining,3,Information Systems Frontiers,2014 1018,Gottschalk P.,Knowledge management technology for organized crime risk assessment,"Information and communication technology is applied by law enforcement agencies in intelligence and investigation work. Assessment of risk caused by criminal gangs is an example of risk and technology in policing. This paper applies the knowledge management technology stage model to criminal risk assessment. © Springer Science + Business Media, LLC 2009.",Criminal business; Information technology; Law enforcement; Police investigation; Risk analysis; Stages of technology,8,Information Systems Frontiers,2010 1019,Ipe M.; Raghu T.S.; Vinze A.,Information intermediaries for emergency preparedness and response: A case study from public health,"Information intermediaries play a critical role in information supply chains for emergency preparedness. Yet, their responsibilities have not been adequately examined in the literature. Using a state public health department as an exemplar, we explore the roles and challenges experienced by one intermediary organization as it faced the unique challenges of deploying a public health emergency preparedness system. We further discuss the influence of stakeholder participation and commitment, inter-organizational collaboration, issues related to organizational structure and resources, and the challenges specific to developing and institutionalizing an IT system for emergency preparedness. Based on the public health case, a set of propositions focused on trust, coordination, information sharing and incentive alignment are developed to illustrate the role of information intermediaries. © 2009 Springer Science+Business Media, LLC.",Coordination; Disaster management; Intermediaries; Public health,21,Information Systems Frontiers,2010 1020,Zo H.; Nazareth D.L.; Jain H.K.,End-to-end reliability of service oriented applications,"As organizations move towards adopting a service oriented architecture that permits the coexistence of multiple technology environments, an increasing number of applications will be developed through the assembly of existing software components with standard web service interfaces. These components with web service interfaces may be available in-house, or may be supplied or hosted by external vendors. The use of multiple services, possibly utilizing different technologies, providers, locations, and sources, has implications for the end-to-end reliability of these applications to support a business process. Selecting the best service for individual tasks in a business process does not guarantee the most effective overall solution, particularly if criteria other than functional characteristics are employed. This paper examines reliability issues associated with applications developed within service oriented architecture. It develops a measure for deriving end-to-end application reliability, and develops a model to help select appropriate services for tasks in the business process which accommodate the redundant and overlapping functionality of available services and planned redundancy in task support to satisfy the reliability requirement of the resulting application. A genetic algorithm approach is adopted to select promising services to assemble the application using end-to-end reliability as the criterion of interest. An application to a real-world business process illustrates the effectiveness of the approach. © 2011 Springer Science+Business Media, LLC.",Application reliability; Service oriented architecture; Services composition; Web services,10,Information Systems Frontiers,2012 1021,Butler T.; McGovern D.,"A conceptual model and IS framework for the design and adoption of environmental compliance management systems: For special issue on governance, risk and compliance in IS","Environmental concerns have led to a significant increase in the number and scope of compliance imperatives governing electrical, electronics, and IT products across global regulatory environments. This is, of course, in addition to general compliance and risk issues generated by the Sarbanes-Oxley Act, data protection and information privacy legislation, ethics and integrity regulations, IT governance concerns, and so on. While the latter dimensions of enterprise-wide governance, compliance, and risk (GRC) are far from straightforward, the complexity and geographical diversity of environment-based regulatory sources cause considerable problems for organisations in the electrical, electronics and IT sectors. Although a variety of enterprise-level information systems are presently available to help manage compliance and reduce risk across all areas, a majority of firms still employ ad-hoc solutions. This paper focuses on the very-much underexplored issue of environmental compliance and risk. The first objective of this exploratory study is to delineate the problems facing GRC and Environmental Health and Safety (EH&S) functions in dealing with environmental regulations globally and to identify how these problems are being solved using Environmental Compliance Management Systems (ECMS). The second objective is to propose a processbased conceptual model and related IS framework on the design and adoption of ECMS that will inform future research and, it is hoped, the IS adoption decisions of GRC and EH&S practitioners. © Springer Science+Business Media, LLC 2012.",Enterprise systems; Environment; Environmental compliance management systems; Governance; IS framework; IT; Risk and compliance,44,Information Systems Frontiers,2012 1022,Lo J.,The information technology workforce: A review and assessment of voluntary turnover research,"Despite the numerous studies on the topic of IT employee turnover and recommendations to organizations on how to retain their employees, the general turnover trend of IT professionals remains high. The need for further research on IT turnover has been called for by many, but much of the literature continues to conduct similar studies using the same constructs, and these studies find similar results. Now is the time to turn our research attention to directions that have been unexplored or less explored. Newer research directions for the IT turnover literature will provide insights for refining and easing the impact of turnover on organizations. As we embark on new research frontiers in the IT turnover phenomenon, a comprehensive review and assessment of the state of the literature may facilitate future research in building off of existing knowledge. This paper reviews and assesses the existing literature on the voluntary turnover of IT employees, identifies the areas where research has matured, and raises directions for future research that are less chartered. © 2013, Springer Science+Business Media New York.",Information systems workforce; Information technology workforce; IT employees; IT professionals; IT workers; Literature review; Voluntary turnover research,63,Information Systems Frontiers,2015 1023,Sun Y.; Huang J.Z.; Meng X.,Integrating constraints to support legally flexible business processes,"Flexible collaboration is a notable attribute of Web 2.0, which is often in the form of multiple users participating different activities that together complete a whole business process. In such an environment, business processes may be dynamically customized or adjusted, as well as the participants may be selected or attend uncertainly. So how to ensure the legitimacy of a business process for both security and business is increasingly critical. In this paper, we investigate this problem and introduce a novel method to support legally flexible business processes. The proposed Constraint-based Business Process Management Model incorporates constraints into the standard activities composing a business process, where the security constraints place restrictions on participants performing the activities and business constraints restrict the dependencies between multiple activities. By the assembly operations, business processes can be dynamically generated and adjusted with activities, that are obliged to the specified constraints. Several algorithms are presented to verify the consistency of constraints and the soundness of the generated business processes, as well as to perform the execution planning to guarantee the correct execution of a business process on the precondition of satisfying all constraints. We present an illustrative example and implement a prototype for the proposed model that is an application of property rights exchange for supporting legal business processes. © Springer Science + Business Media, LLC 2009.",Authorization; Business process; Constraint; Flexibility,6,Information Systems Frontiers,2011 1024,Sadiq S.; Zur Muehlen M.; Indulska M.,"Governance, risk and compliance: Applications in information systems","The Special Issue of Information Systems Front presents selected best papers from the 1st International Workshop on Governance, Risk and Compliance - Applications in Information Systems (GRCIS), which was held in conjunction with the 20th International Conference on Advanced Information Systems Engineering (CAiSE 2008). The first paper, entitled 'RiskM: A multi-perspective modeling method for IT risk assessment' presents a modeling approach that facilitates visual representation of risks and a process for the assessment of IT risks. The second paper, entitled 'The enactment of risk categories: The role of information systems in organizing and re-organizing risk management practices in the energy industry' presents a longitudinal case study to explore the use of information systems for risk management in the utility sector. Another paper, entitled 'Effective Information Technology (IT) Governance Mechanisms: An IT Outsourcing Perspective', presents a theory-based model of effective IT governance and discuss the outcomes of the empirical testing of the model.",Compliance management; Governance; Risk,7,Information Systems Frontiers,2012 1025,Jerman-Blažič B.,Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading,"The paper introduces the basic problems of investment in new technologies in an operator telecommunication network. Investment in technologies for delivering broadband services at the metropolitan and backbone levels from technical and economic point of view are evaluated and assessed. In particular, the paper deals with an empirical study and a techno-economic analysis of two key broadband technologies used for upgrading metropolitan and backbone networks: SDH and WDM. The study is based on two basic measures, i.e., CAPEX and OPEX, while the financial assessment of the overall technology deployment uses two economic evaluation measures, i.e., Net Present Value and the Internal Rate of Return. The study is focused on the network of Telekom Slovenije, the incumbent operator in Slovenia. The data used in the study was supplied by the operator. The study showed that in long-term WDM appears to be a more economic solution than the SDH technology. The study pointed out also that any techno-economic evaluation in the area of telecommunication network backbone upgrading should be always based on calculation of several indexes as none of the known indexes taken individually is capable to provide complete picture of the required investment cost and the benefits arising from the used solution. © 2007 Springer Science+Business Media, LLC.",Network backbone upgrading; Network investment economics; Techno-economic modelling; Telecommunications & Broadband technology,8,Information Systems Frontiers,2008 1026,Madsen S.; Bødker K.; Tøth T.,Knowledge transfer planning and execution in offshore outsourcing: An applied approach,"In this paper, we report from a longitudinal project about knowledge transfer conducted in a major financial company headquartered in Denmark and an offshore development center located in Bangalore, India. We identify the main knowledge transfer challenges experienced by the case company. The challenges inform the conceptual design of a systematic five-step approach to the company’s knowledge transfer. Our main contribution is to illustrate how extant research can be applied to understand and solve the knowledge transfer challenges of a particular company in a way that fits with the outsourcing setup and the company culture. We also draw attention to the fact that client side managers play a crucial role in determining how and with what priority knowledge transfer can take place. Our research indicates that a first, important step towards ensuring successful knowledge transfer in outsourcing is to focus on the training and support of client side managers. © 2014, Springer Science+Business Media New York.",Engaged scholarship; Knowledge transfer; Offshoring; Outsourcing,9,Information Systems Frontiers,2015 1027,Fogués R.L.; Such J.M.; Espinosa A.; Garcia-Fornes A.,BFF: A tool for eliciting tie strength and user communities in social networking services,"The use of social networking services (SNSs) such as Facebook has explosively grown in the last few years. Users see these SNSs as useful tools to find friends and interact with them. Moreover, SNSs allow their users to share photos, videos, and express their thoughts and feelings. However, users are usually concerned about their privacy when using SNSs. This is because the public image of a subject can be affected by photos or comments posted on a social network. In this way, recent studies demonstrate that users are demanding better mechanisms to protect their privacy. An appropriate approximation to solve this could be a privacy assistant software agent that automatically suggests a privacy policy for any item to be shared on a SNS. The first step for developing such an agent is to be able to elicit meaningful information that can lead to accurate privacy policy predictions. In particular, the information needed is user communities and the strength of users' relationships, which, as suggested by recent empirical evidence, are the most important factors that drive disclosure in SNSs. Given the number of friends that users can have and the number of communities they may be involved on, it is infeasible that users are able to provide this information without the whole eliciting process becoming confusing and time consuming. In this work, we present a tool called Best Friend Forever (BFF) that automatically classifies the friends of a user in communities and assigns a value to the strength of the relationship ties to each one. We also present an experimental evaluation involving 38 subjects that showed that BFF can significantly alleviate the burden of eliciting communities and relationship strength. © 2013 Springer Science+Business Media New York.",Information retrieval; Privacy; Social media; Social network; Tie strength,38,Information Systems Frontiers,2014 1028,Kapoor K.K.; Dwivedi Y.K.; Williams M.D.,Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service,"The interbank mobile payment service (IMPS) is a very recent technology in India that serves the very critical purpose of a mobile wallet. To account for the adoption and use of IMPS by the Indian consumers, this study seeks to compare three competing sets of attributes borrowed from three recognized pieces of work in the area of innovations adoption. This study aims to examine which of the three sets of attributes better predicts the adoption of IMPS in an Indian context. The research model is empirically tested and validated against the data gathered from 323 respondents from different cities in India. The findings are analysed using the SPSS analysis tool, which are then discussed to derive the key conclusions from this study. The research implications are stated, limitations listed and suggestions for future research on this technology are then finally made. © 2014, Springer Science+Business Media New York.",Adoption; DOI; IMPS; Intention; PCI,131,Information Systems Frontiers,2015 1029,Shin Y.M.; Lee S.C.; Shin B.; Lee H.G.,Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes,"Key supplier-side factors that affect the usage level of mobile Internet were identified and the procedural mechanism among the independent and dependent variables was investigated. For this, a research model was introduced to describe associations among four external variables (access quality, service variety, cost rationality, and ease of use), an intermediate variable (usefulness) and a dependent variable (the usage level of mobile Internet). Through the on-line survey, data were gathered from actual mobile Internet users. Confirmatory factor analysis and path analysis were applied to test the overall integrity of the research model and of proposed hypotheses. All four external variables affected user perceptions on the usefulness of mobile Internet. Among them, service variety and cost rationality had a relatively larger influence on perceived usefulness. Perceived usefulness of the mobile Internet had a positive effect on its usage, confirming the important role of usefulness as a significant mediator between the four external variables and the dependent variable. Meanwhile, the cost rationality was the only external variable with direct influence on the MI usage. Theoretical and practical implications of the study results are discussed. © 2009 Springer Science+Business Media, LLC.",Mobile data services; Mobile internet; Mobile internet services; Post-adoption usage; Technology acceptance,90,Information Systems Frontiers,2010 1030,Xu L.; Tan W.; Zhen H.; Shen W.,An approach to enterprise process dynamic modeling supporting enterprise process evolution,"This study presents an evolutionary approach to support dynamic enterprise modeling for enterprise process cooperative scheduling and management. In this paper, an evolutionary dynamic enterprise process modeling method was proposed from the concepts of enterprise process evolution to zero-time enterprise modeling and layered complex enterprise modeling. Based on an autonomous agent development platform, an agent-based enterprise collaborative modeling environment has been implemented by integrating several software resource agents that wrap main function modules of EPMS. Scheduling strategies, algorithms, and process-driven cooperative scheduling mechanism are also discussed. © 2008 Springer Science+Business Media, LLC.",Enterprise information systems; Enterprise modeling; Enterprise process modeling; Enterprise process scheduling; Evolutionary approach,67,Information Systems Frontiers,2008 1031,Mazhelis O.; Tyrväinen P.,Economic aspects of hybrid cloud infrastructure: User organization perspective,"Adoption of cloud infrastructure promises enterprises numerous benefits, such as faster time-to-market and improved scalability enabled by on-demand provisioning of pooled and shared computing resources. In particular, hybrid clouds, by combining the private in-house capacity with the on-demand capacity of public clouds, promise to achieve both increased utilization rate of the in-house infrastructure and limited use of the more expensive public cloud, thereby lowering the total costs for a cloud user organization. In this paper, an analytical model of hybrid cloud costs is introduced, wherein the costs of computing and data communication are taken into account. Using this model, a cost-efficient division of the computing capacity between the private and the public portion of a hybrid cloud can be identified. By analyzing the model, it can be shown that, given fixed prices for private and public capacity, a hybrid cloud incurs the minimum costs. Furthermore, it is shown that, as the volume of data transferred to/from the public cloud increases, a greater portion of the capacity should be allocated to the private cloud. Finally, the paper illustrates analytically that, when the unit price of capacity declines with the volume of acquired capacity, a hybrid cloud may become more expensive than a private or a public cloud. © 2011 Springer Science+Business Media, LLC.",Cost model; Cost optimization; Hybrid cloud; Price elasticity; Steepness of quantity discount,39,Information Systems Frontiers,2012 1032,Kamel I.; Chen B.,A novel memory management scheme for residential gateways,"Home gateways must manage services despite limited memory resources. In home gateway models (e.g., OSGi), services are implemented as software bundles (or plug-ins) that can be downloaded from the Internet and executed in the gateway. Services, in gateways, are not independent; they collaborate and complement each other. The problem we are solving is as follow: when the gateway runs out of memory, which service(s) will be stopped or kicked out of memory to start a new service? The problem was initially inspired by the FTTH (Fibre To The Home) trail project in Japan with NTT because of the limited memory in Panasonic set-top-box IP-STB. Note that stopping a given service means that all the services that depend on it will be stopped too. Because of the service dependencies, traditional memory management techniques, such as best fit, first fit, or worst fit, are not suitable. Our goal is to minimize the total number of stopped services while fulfilling the request of the new service. In this paper, we present two algorithms for service replacement and memory management in home gateways. The algorithms take into consideration the dependencies between different services, in addition to the amount of memory occupied by each service. The first one achieves optimal solution in O(n 2) time and O(nh) space, using dynamic programming. However, the optimal solution requires substantial memory and CPU resources. Then we propose a heuristic that compute solutions very close to the optimal but with much less time and space requirements. We carry simulation experiments to evaluate the effectiveness of the proposed techniques and compare them with traditional memory management techniques. © 2008 Springer Science+Business Media, LLC.",Memory management; Pervasive computing; Smart homes,0,Information Systems Frontiers,2009 1033,Cheong M.; Lee V.C.S.,A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter,"The study of terrorism informatics utilizing the Twitter microblogging service has not been given apt attention in the past few years. Twitter has been identified as both a potential facilitator and also a powerful deterrent to terrorism. Based on observations of Twitter's role in civilian response during the recent 2009 Jakarta and Mumbai terrorist attacks, we propose a structured framework to harvest civilian sentiment and response on Twitter during terrorism scenarios. Coupled with intelligent data mining, visualization, and filtering methods, this data can be collated into a knowledge base that would be of great utility to decision-makers and the authorities for rapid response and monitoring during such scenarios. Using synthetic experimental data, we demonstrated that the proposed framework has yielded meaningful graphical visualizations of information, to reveal potential response to terrorist threats. The novelty of this study is that microblogging has never been studied in the domain of terrorism informatics. This paper also contributes to the understanding of the capability of conjoint structured data and unstructured content mining in extracting deep knowledge from noisy twitter messages, through our proposed structured framework. © 2010 Springer Science+Business Media, LLC.",Civilian response; Data mining; Demographic analysis; Microblogging; Sentiment analysis; Terrorism informatics; Twitter; Visualization,178,Information Systems Frontiers,2011 1034,Kang Z.; Wang H.; Hung P.C.K.,WS-CDL+ for web service collaboration,"Web services are becoming the prominent paradigm for distributing, computing, and electronic business, while there is an increasing surge to provide online Business-to-Business collaborations. The Web Services Choreography Description Language (WS-CDL) is a Web service specification developed by W3C, in order to provide peer-to-peer collaborations for participants from different parties. Despite the great research interests it has received during recent years, no practical or even prototype execution engine has been built for WS-CDL, which is, however, essential to test and evaluate the properties of WS-CDL when doing research on it, and also a crucial component to put WS-CDL into the application field. This paper implements an execution engine for WS-CDL, which has never been built before, and enhance its functionalities and usability by introducing six extended features into the execution engine, namely WS-CDL+. Several experiments are then done to test the functionalities and performance of the execution engine, making sure that it works properly according to the WS-CDL+ specification and its performance is acceptable. Finally, the whole paper is concluded, as well as the discussion of the application perspectives of WS-CDL/WS-CDL+. © 2007 Springer Science+Business Media, LLC.",Collaboration; Execution engine; Web service; WS-CDL+,16,Information Systems Frontiers,2007 1035,Venkatesh A.,Digital home technologies and transformation of households,"The basic dynamic with respect to home-based technology is that technologies play a key role in relation to home life. a mediating technology is one that acts as a facilitator between user and their living environment. a transformational technology is one which alters family life and activities in some fundamental ways. Digital homes are homes which utilizes information appliances and a home-based network to connect household appliances to each other and to the outside Internet world. There have been several high-profile digital home projects undertaken by private citizens. Digital home technologies are also beginning to find their ways into homes not necessarily by the world's richest by middle-income families. Digital homes are expected to develop some very useful properties. that include improved security, upgradeable home appliances, on-demand video programming, and safety mechanisms to allow the elderly to continue living at home.",Digital home; Home and activity centers; Home as living space; Smart appliances,55,Information Systems Frontiers,2008 1036,Carter L.; Weerakkody V.,E-government adoption: A cultural comparison,"E-government diffusion is an international phenomenon. This study compares e-government adoption in the U.K. to adoption in the U.S. In particular, this study seeks to determine if the same factors are salient in both countries. Several studies have explored citizen acceptance of e-government services in the U.S. However, few studies have explored this phenomenon in the U.K. To identify the similarities and differences between the U.K. and the U.S. a survey is conducted in the U.K. and the findings are compared to the literature that investigates diffusion in the U.S. This study proposes a model of e-government adoption in the U.K. based on salient factors in the U.S. A survey is administered to 260 citizens in London to assess the importance of relative advantage, trust and the digital divide on intention to use e-government. The results of binary logistic regression indicate that there are cultural differences in e-government adoption in the U.K. and the U.S. The results indicate that of the prevailing adoption constructs, relative advantage and trust are pertinent in both the U.S. and the U.K., while ICT adoption barriers such as access and skill may vary by culture. Implications for research and practice are discussed. © 2008 Springer Science+Business Media, LLC.",Consumer; Digital divide; E-government; Residential; Technology adoption; Trust,376,Information Systems Frontiers,2008 1037,Barclay C.,Towards an integrated measurement of IS project performance: The project performance scorecard,"Determining the contribution of information system (IS) projects is a difficult endeavour. This research presents a framework for evaluating and measuring IS project performance that seek to address this problem while moving away from the reliance on the traditional assessment method (time, cost, specifications). When IS projects fail or succeed is difficult to determine what conditions enabled the outcome. However, if we are to develop a higher level of IS project management competence we need frameworks that can help in assessing IS project outcomes while critically reflecting and learning from IS project management practices. The Project Performance Scorecard (PPS) recommended here is one framework that can help to advance our understanding IS project management and evaluation approaches. This framework integrates concepts from existing models of IS success, the Balanced Scorecard and project management practices. A case study approach is used to illustrate the use of the PPS, and offers insights into how it can be useful in assessing the performance of IS projects. © 2008 Springer Science+Business Media, LLC.",Balanced scorecard; IS evaluation; IS Projects; IS Success; Performance measurement; Project management; Project performance scorecard (PPS); Project success,53,Information Systems Frontiers,2008 1038,Wang Y.; Zeng D.; Zhu B.; Zheng X.; Wang F.,Patterns of news dissemination through online news media: A case study in China,"Along with the rapid development of online news production and consumption, information spreads rapidly among news portals through reprinting and re-posting. Understanding the dissemination process of online news has important implications for policy making, crisis management, and brand imaging. As the frequency of news reprinting between two news portals expresses the social relationship between them, the topological properties of complex networks of news portals indicate the dynamic patterns of online news dissemination. This research is the first study that examines patterns and organizational structure of online news networks based on historical data collected from more than one thousand Chinese news portals. Main findings reveal that information can spread widely and rapidly through online news portals. Specifically, some major news portals exchange information with each other frequently and they exchange information with small news portals directly, implying that hot-spot events, even they are first reported by a small news portal, can be re-posted by many major news portals in a short time and then spread over the Internet quickly. The dense connections between many major news portals ensure that the spread will not be influenced greatly by the refusal to report typical events of a small part of major news portals. © 2012, Springer Science+Business Media, LLC.",Dynamic pattern; Information diffusion; Online news; Social network analysis,13,Information Systems Frontiers,2014 1039,Janssen M.; Lee J.; Bharosa N.; Cresswell A.,Advances in multi-agency disaster management: Key elements in disaster research,"Multi-agency disaster management requires collaboration among geographically distributed public and private organizations to enable a rapid and effective response to an unexpected event. Many disaster management systems often lack the capability to cope with the complexity and uncertainty. In this introduction to the special issues on advances in multi-agency disaster management we discuss the role of information, enterprise architecture, coordination and related human efforts aimed at improving multi-agency disaster management. The paper concludes that although there is a common body of knowledge, disaster management is still an under-developed area. There is a need to relate practice and theory by using human-centered approaches such that disaster management can realize its full potential. © 2009 Springer Science+Business Media, LLC.",Adaptivity; Coordination; Disaster management; Enterprise architecture,159,Information Systems Frontiers,2010 1040,Tseng V.S.; Yu H.-H.; Yang S.-C.,Efficient mining of multilevel gene association rules from microarray and gene ontology,"Some recent studies have shown that association rules can reveal the interactions between genes that might not have been revealed using traditional analysis methods like clustering. However, the existing studies consider only the association rules among individual genes. In this paper, we propose a new data mining method named MAGO for discovering the multilevel gene association rules from the gene microarray data and the concept hierarchy of Gene Ontology (GO). The proposed method can efficiently find out the relations between GO terms by analyzing the gene expressions with the hierarchy of GO. For example, with the biological process in GO, some rules like Process A (up) → Process B (up) cab be discovered, which indicates that the genes involved in Process B of GO are likely to be up-regulated whenever those involved in Process A are up-regulated. Moreover, we also propose a constrained mining method named CMAGO for discovering the multilevel gene expression rules with user-specified constraints. Through empirical evaluation, the proposed methods are shown to have excellent performance in discovering the hidden multilevel gene association rules. © 2009 Springer Science+Business Media, LLC.",Association rules mining; Data mining; Gene expression analysis; Gene ontology; Microarray; Multi-level association rules,10,Information Systems Frontiers,2009 1041,Hermida J.M.; Meliá S.; Montoyo A.; Gómez J.,Applying model-driven engineering to the development of Rich Internet Applications for Business Intelligence,"Business Intelligence (BI) applications have been gradually ported to the Web in search of a global platform for the consumption and publication of data and services. On the Internet, apart from techniques for data/knowledge management, BI Web applications need interfaces with a high level of interoperability (similar to the traditional desktop interfaces) for the visualisation of data/knowledge. In some cases, this has been provided by Rich Internet Applications (RIA). The development of these BI RIAs is a process traditionally performed manually and, given the complexity of the final application, it is a process which might be prone to errors. The application of model-driven engineering techniques can reduce the cost of development and maintenance (in terms of time and resources) of these applications, as they demonstrated by other types of Web applications. In the light of these issues, the paper introduces the Sm4RIA-B methodology, i.e.; a model-driven methodology for the development of RIA as BI Web applications. In order to overcome the limitations of RIA regarding knowledge management from the Web, this paper also presents a new RIA platform for BI, called RI@BI, which extends the functionalities of traditional RIAs by means of Semantic Web technologies and B2B techniques. Finally, we evaluate the whole approach on a case study - the development of a social network site for an enterprise project manager. © 2012 Springer Science+Business Media New York.",Knowledge management; Model-driven Web engineering; Rich Internet Applications; Sm4RIA,8,Information Systems Frontiers,2013 1042,Hussain S.; Erdogen S.Z.; Park J.H.,Monitoring user activities in smart home environments,"Wireless sensor networks (WSNs) enable smart environments to create pervasive and ubiquitous applications, which give context-aware and scalable services to the end users. In this paper, we propose an architecture and design of a web application for a sensor network monitoring. Further, the variation in received signal strength indicator values is used for knowledge extraction. Experiments are conducted in an in-door room environment to determine the activities of a person. For instance, a WSN consisting of Moteiv's Tmote Sky sensors is deployed in a bedroom to determine the sleeping behavior and other activities of a person. © 2008 Springer Science+Business Media, LLC.",Intelligent monitoring; Pervasive computing; Smart home environments; Ubiquitous computing; Wireless sensor network,20,Information Systems Frontiers,2009 1043,Scott J.E.; Gregg D.G.; Choi J.H.,Lemon complaints: When online auctions go sour,"“Lemon” complaints reveal that online auction experiences can turn sour. Theory on information asymmetry explains how “lemons” could drive high quality items away from a market leaving a dominance of poor quality goods. In this paper we analyze “lemon” complaints using content analysis and hierarchical logistic regression. In the data collection of 306 complaints from 8 product categories in online auctions, the results show that compared to standard products “lemons” are much more likely if the product category is for functional items, such as computers and consumer electronics; non-standard items with product description complexity, such as collectibles; and fragile items, such as pottery and glassware. Contrary to expectations, clothing and jewelry, representing sensory products, did not have a statistically significant impact on the frequency of “lemons”. Although two seller negative feedback rating measures did predict non-receipt of goods, seller and buyer ratings and experience did not predict “lemons”. © 2012, Springer Science+Business Media New York.",Feedback; Information asymmetry; Lemons; Online auctions; Quality,7,Information Systems Frontiers,2015 1044,Farahmand F.; Spafford E.H.,Understanding insiders: An analysis of risk-taking behavior,"There is considerable research being conducted on insider threats directed to developing new technologies. At the same time, existing technology is not being fully utilized because of non-technological issues that pertain to economics and the human dimension. Issues related to how insiders actually behave are critical to ensuring that the best technologies are meeting their intended purpose. In our research, we have investigated accepted models of perceptions of risk and characteristics unique to insider threat, and we have introduced ordinal scales to these models to measure insider perceptions of risk. We have also investigated decision theories, leading to a conclusion that prospect theory, developed by Tversky and Kahneman, may be used to describe the risk-taking behavior of insiders and can be accommodated in our model. Our results indicate that there is an inverse relationship between perceived risk and benefit by insiders and that their behavior cannot be explained well by the models that are based on the traditional methods of engineering risk analysis and expected utility. We discuss the results of validating that model with forty-two senior information security executives from a variety of organizations. We also discuss how the model may be used to identify characteristics of insiders' perceptions of risk and benefit, their risk-taking behavior and how to frame insider decisions. Finally, we recommend understanding risk of detection and creating a fair working environment to reduce the likelihood of committing criminal acts by insiders. © 2010 Springer Science+Business Media, LLC.",Behavior; Insider; Perception; Prospect theory; Risk,50,Information Systems Frontiers,2013 1045,Kamsu-Foguem B.; Tchuenté-Foguem G.; Foguem C.,Using conceptual graphs for clinical guidelines representation and knowledge visualization,"The intrinsic complexity of the medical domain requires the building of some tools to assist the clinician and improve the patient's health care. Clinical practice guidelines and protocols (CGPs) are documents with the aim of guiding decisions and criteria in specific areas of healthcare and they have been represented using several languages, but these are difficult to understand without a formal background. This paper uses conceptual graph formalism to represent CGPs. The originality here is the use of a graph-based approach in which reasoning is based on graph-theory operations to support sound logical reasoning in a visual manner. It allows users to have a maximal understanding and control over each step of the knowledge reasoning process in the CGPs exploitation. The application example concentrates on a protocol for the management of adult patients with hyperosmolar hyperglycemic state in the Intensive Care Unit. © 2012 Springer Science+Business Media, LLC.",Conceptual graphs; Intensive care units; Knowledge representation; Medical protocols; Visual reasoning,33,Information Systems Frontiers,2014 1046,Satoh I.,Location-aware communications in smart environments,"We present a location-aware communication approach for smart home environments that is based on a symbolic location model that represents the containment relationships between physical objects, computing devices, and places. The approach enables people and devices to discover and connect with communication partners based on their co-locations. It also provides non-smart objects, including home appliances, everyday objects, and places, with virtual counterparts, which both represent them and work as proxies for their targets. We present the design for this approach and describe its implementation and applications. © 2008 Springer Science+Business Media, LLC.",Location-awareness; Smart space; Symbolic location model,4,Information Systems Frontiers,2009 1047,Muthaiyah S.; Kerschberg L.,Virtual organization security policies: An ontology-based integration approach,"This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO). The goal is to develop a common domain model for security policy via semantic mapping. This mitigates interoperability problems that exist due to heterogeneity in security policy data among various (VO) and (RO) in the semantic web. We propose to carry out integration or mapping for only one aspect of security policy, which is authorization policy. Other aspects such as integrity, repudiation and confidentiality will be addressed in future work. We employ various tools such as Protégé, RacerPro and PROMPT to show proof of concept. © 2007 Springer Science+Business Media, LLC.",Ontology mapping; Security policy domain model; Security policy ontology; Semantic mapping,11,Information Systems Frontiers,2007 1048,Hong S.-J.; Thong J.Y.L.; Moon J.-Y.; Tam K.-Y.,Understanding the behavior of mobile data services consumers,"Due to rapid advances in the Internet and wireless technologies, a ubiquitous computing world is becoming a reality in the form of mobile computing. At the center of this phenomenon is mobile data services which arise from the convergence of advanced mobile communication technologies with data services. Despite the rapid growth in mobile data services, research into consumers' usage behavior is scarce. This study attempts to identify and empirically assess the factors that drive consumers' acceptance of mobile data services. A research model based on the decomposed theory of planned behavior and incorporating factors that represent personal needs and motivations in using mobile data services is presented. The model is tested via an online survey of 811 consumers of four categories of mobile data services (i.e., communications, information content, entertainment, and commercial transactions) associated with different usage contexts. We found that attitude, social influence, media influence, perceived mobility, and perceived monetary value influence consumers' intention to continue usage of mobile data services. In addition, perceived ease of use, perceived usefulness, and perceived enjoyment influence attitude toward continued usage of mobile data services. Finally, separate analysis of the different categories of mobile data services highlights the influence of individual usage context on consumers' behavior. © 2008 Springer Science+Business Media, LLC.",Consumer behavior; Decomposed theory of planned behavior; Mobile data services; Mobile phones; Online survey; Technology acceptance,215,Information Systems Frontiers,2008 1049,Salem R.; Boussaïd O.; Darmont J.,Active XML-based Web data integration,"Today, the Web is the largest source of information worldwide. There is currently a strong trend for decision-making applications such as Data Warehousing (DW) and Business Intelligence (BI) to move onto the Web, especially in the cloud. Integrating data into DW/BI applications is a critical and time-consuming task. To make better decisions in DW/BI applications, next generation data integration poses new requirements to data integration systems, over those posed by traditional data integration. In this paper, we propose a generic, metadata-based, service-oriented, and event-driven approach for integrating Web data timely and autonomously. Beside handling data heterogeneity, distribution and interoperability, our approach satisfies near real-time requirements and realize active data integration. For this sake, we design and develop a framework that utilizes Web standards (e.g.; XML and Web services) for tackling data heterogeneity, distribution and interoperability issues. Moreover, our framework utilizes Active XML (AXML) to warehouse passive data as well as services to integrate active and dynamic data on-the-fly. AXML embedded services and changes detection services ensure near real-time data integration. Furthermore, the idea of integrating Web data actively and autonomously revolves around mining events logged by the data integration environment. Therefore, we propose an incremental XML-based algorithm for mining association rules from logged events. Then, we define active rules dynamically upon mined data to automate and reactivate integration tasks. Finally, as a proof of concept, we implement a framework prototype as a Web application using open-source tools. © 2013 Springer Science+Business Media New York.",Active rules; Event mining; Integration services; Metadata; Real-time Web data integration,22,Information Systems Frontiers,2013 1050,Martens B.; Teuteberg F.,Decision-making in cloud computing environments: A cost and risk based approach,"In this article a sophisticated formal mathematical decision model is developed that supports the selection of Cloud Computing services in a multisourcing scenario. The objective is to determine the selection of appropriate Cloud Computing services offered by different providers. In order to do so, we consider cost as well as risk factors which are relevant to the decision scope. For example, coordination costs, IT service costs, maintenance costs and the costs of taken risks were compared. Risks are modeled by means of the three common security objectives integrity, confidentiality and availability. The managerial implications of the model lie in the sustainable decision support and the comprehensive decision approach. The formal model is prototypically implemented using a software tool and examined with the help of a simulation study in three realistic scenarios and a sensitivity analysis. © 2011 Springer Science+Business Media, LLC.",Cloud computing; Decision model; IT outsourcing; Risk management; Simulation study,152,Information Systems Frontiers,2012 1051,Panaousis E.A.; Politis C.; Birkos K.; Papageorgiou C.; Dagiuklas T.,Security model for emergency real-time communications in autonomous networks,"Towards the proliferation of architectures, tools and applications that have the potential to be used during an emergency rescue mission, we present a framework for emergency real-time communication using autonomous networks, called emergency Mobile Ad-hoc Networks (eMANETs). By eMANETs we refer to networks that are deployed in emergency cases where default telecommunications infrastructure has failed. Our goal is to design a security framework that will secure real-time communications during emergency rescue scenarios. The proposed framework consists of a secure routing protocol, intrusion detection provision and security extension for real-time communications using peer-to-peer overlays.We envisage that the results of this work will aid and serve the needs of any society against any event that threatens serious damage to human welfare or to the environment. © Springer Science+Business Media, LLC 2010.",Emergency; MANET; P2PSIP; Routing; Security; VoIP,11,Information Systems Frontiers,2012 1052,Romero D.; Molina A.,VO breeding environments & virtual organizations integral business process management framework,"This paper presents a set of guidelines in terms of business process for VO Breeding Environments (VBEs) and Virtual Organizations (VOs) management based-on ECOLEAD Project Results. A detail description of an Integral Business Process Management (I-BPM) Framework, using Business Process Modeling Notation (BPMN) is presented. The I-BPM framework describes a set of process models that depict what happens during each VBE and VO management processes, taking the point of view of an external observer, to provide rationale of activities that should be carried out by a set of VBE actors to achieve the expected business process results. © 2009 Springer Science+Business Media, LLC.",Business process management; Collaborative networked organizations; Competency; Governance; Management; Membership; Negotiation; Ontology; Performance; Profiling; Strategy; Trust; Value systems; Virtual organizations; VO breeding environments,55,Information Systems Frontiers,2009 1053,Lkhamsuren D.; Tanaka Y.,PadSpace: A new framework for the service federation of web resources,"End-users need a simple and interactive tool for service composition development. A PadSpace proposes an extension of a typical Linda-like coordination model (tuplespace) to provide mechanisms for the interoperation among Web applications, Web services and end-users' local functional resources. First, a PadSpace provides an end-user supporting tool for composing Web applications, Web services, and local visual resources based on the meme media architecture without writing any program codes. It enables end-users to directly manipulate visual components, and to create new composite components for the creation of services that use Web applications, Web services, and local functional resources. Second, a PadSpace provides a spreadsheet-based service-coordination tool for end-users to orchestrate multiple Web applications, Web services, and local functional resources. Finally, we show some new applications of service composition and service orchestration. © 2011 Springer Science+Business Media, LLC.",Distributed computing; Graphical user interface; Service composition; Service orchestration,1,Information Systems Frontiers,2013 1054,Gutierrez-Garcia J.O.; Sim K.M.,GA-based cloud resource estimation for agent-based execution of bag-of-tasks applications,"Executing bag-of-tasks applications in multiple Cloud environments while satisfying both consumers' budgets and deadlines poses the following challenges: How many resources and how many hours should be allocated? What types of resources are required? How to coordinate the distributed execution of bag-of-tasks applications in resources composed from multiple Cloud providers?. This work proposes a genetic algorithm for estimating suboptimal sets of resources and an agent-based approach for executing bag-of-tasks applications simultaneously constrained by budgets and deadlines. Agents (endowed with distributed algorithms) compose resources and coordinate the execution of bag-of-tasks applications. Empirical results demonstrate that the genetic algorithm can autonomously estimate sets of resources to execute budget-constrained and deadline-constrained bag-of-tasks applications composed of more economical (but slower) resources in the presence of loose deadlines, and more powerful (but more expensive) resources in the presence of large budgets. Furthermore, agents can efficiently and successfully execute randomly generated bag-of-tasks applications in multi-Cloud environments. © 2011 Springer Science+Business Media, LLC.",Bag-of-tasks applications; Cloud computing; Cloud resource estimation; Cloud resource management; Genetic algorithms; Multiagent systems,30,Information Systems Frontiers,2012 1055,Liu X.; Wang G.A.; Johri A.; Zhou M.; Fan W.,Harnessing global expertise: A comparative study of expertise profiling methods for online communities,"Building expertise profiles in global online communities is a critical step in leveraging the range of expertise available in the global knowledge economy. In this paper we introduce a three-stage framework that automatically generates expertise profiles of online community members. In the first two stages, document-topic relevance and user-document association are estimated for calculating users’ expertise levels on individual topics. We empirically compare two state-of-the-art information retrieval techniques, the vector space model and the language model, with a Latent Dirichlet Allocation (LDA) based model for computing document-topic relevance as well as the direct and indirect association models for computing user-document association. In the third stage we test whether a filtering strategy can improve the performance of expert profiling. Our experimental results using two real datasets provide useful insights on how to select the best models for profiling users’ expertise in online communities that can work across a range of global communities. © 2012, Springer Science+Business Media, LLC.",Expert finding; Global expertise; Information retrieval; Online communities,37,Information Systems Frontiers,2014 1056,Plaza M.,Team performance and information system implementation: Application of the progress curve to the earned value method in an information system project,"Although the Earned Value Method (EVM), a multi-dimensional project control system, has been widely used since 1960, there has been little research focused specifically on its application in IS implementation. The management of IS projects-including the accurate forecasting of project duration-is complicated by the strong impact of the learning curve on the effectiveness of EVM. This study makes new contributions by advancing formulas for the accurate prediction of project duration, and by developing a decision support model in which the learning curve is fully integrated with EVM, and performance changes due to learning are isolated from other factors affecting project duration. The study makes three contributions to the understanding and use of EVM in IS implementation: (1) It provides an extended version of EVM, (2) it provides an illustration of the application of EVM to a real project situation based on empirical data from an ERP implementation project, and (3) it provides a theoretical basis for empirical studies of IS project control techniques. The decision support model can be used to determine both the learning curve coefficient and the project completion date during the early stages of a project, and it thus offers a significant practical contribution to the management of IS projects. © 2008 Springer Science+Business Media, LLC.",Decision support models; Earned value method; Information systems implementation; Organizational learning; Project management,21,Information Systems Frontiers,2008 1057,Retzer S.; Yoong P.; Hooper V.,Inter-organisational knowledge transfer in social networks: A definition of intermediate ties,"A social network perspective helps identify and analyse informal knowledge transfer among people and organisations with the aim to recommend organisational interventions and improvements, for example in the form of Information and Communication Technology (ICT) support. This paper particularly focuses on a key concept of social network analysis (SNA), the concept of tie strength, in an inter-organisational knowledge transfer context. Tie strength describes the strength of a social relationship. In the past, SNA literature with a knowledge management context has often emphasized the importance of strong and/or weak ties rather than of intermediate (medium strong) ties in a social network. Nevertheless, in this study, intermediate ties are identified as the dominant links among key groups of organisation in a social network. Intermediate ties also help connect otherwise weakly linked organisations. Moreover, a definition of intermediate ties in the context of knowledge management is introduced. With the help of cluster analysis and an investigation into the levels of reciprocity, intermediate ties can be clearly defined in a social network. Due to their importance for knowledge transfer in a social network, intermediate ties should be primarily supported, for example by appropriate ICT. © Springer Science+Business Media, LLC 2012.",Intermediate ties; Knowledge transfer; Social network analysis; Tie strength,26,Information Systems Frontiers,2012 1058,Zuo Y.,Secure and private search protocols for RFID systems,"In many real world applications, there is a need to search for RFID tagged items. In this paper, we propose a set of protocols for secure and private search for tags based on their identities or certain criteria they must satisfy. When RFID enabled systems become pervasive in our life, tag search becomes crucial. Surprisingly, the problem of RFID search has not been widely addressed in the literature. We analyzed the privacy and security features of the proposed tag search protocols, and concluded that our protocols provide tag identity privacy, tag source location privacy, and tag-reader communication privacy. For the first time, we propose a formal method to securely search RFID tags which satisfy certain search criteria. © 2009 Springer Science+Business Media, LLC.",Privacy; Protocol; RFID; Security; Tag search,21,Information Systems Frontiers,2010 1059,Gotterbarn D.,"The ethics of video games: Mayhem, death, and the training of the next generation","There is a significant and previously unidentified ethics problem with many e-games; many of them are designed in such a way that they encourage and train game players to follow a narrow and dangerous model of decision making. It is argued that extending this model of decision making beyond an e-game's virtual reality has significant negative societal consequences. Unfortunately most e-game courses focus primarily on game engine design and other technical issues. E-game curricula and e-game designers need to follow standards which recognize this ethical concern and recognize that their work is not independent from the societal impacts of the technology they develop. Modifying design approaches can reduce the problems caused by the ethical decision making model. © 2010 Springer Science + Business Media, LLC.",Video game curricula; Video game ethics,12,Information Systems Frontiers,2010 1060,Gupta A.; Sharda R.; Greve R.A.,You've got email! Does it really matter to process emails now or later?,"Email consumes as much as a quarter of knowledge workers' time in organizations today. Almost a necessity for communication, email does interrupt a worker's other main tasks and ultimately leads to information overload. Though issues such as spam, email filtering and archiving have received much attention from industry and academia, the critical problem of the timing of email processing has not been studied much. It is common for many knowledge workers to check and respond to their email almost continuously. Though some emails may require very quick responses, checking emails almost continuously may lead to interruptions in regular knowledge work. Managing email processing can make a significant difference in an organization's productivity. Previous research on this topic suggests that perhaps the best way to minimize the effect of interruptions is to process email frequently for example, every 45 min. In this study, we focus on studying email response timing approaches to optimize the communication times and yet reduce the interruptive effects. We investigate previous recommendations by performing a twophase study involving rigorous simulation experiments. Models were developed for identifying efficient and effective email processing policies by comparing various ways to reduce interruptions for different types of knowledge workers. In contrast to earlier research findings, results indicate that significant productivity improvements could be achieved through the use of some email processing policies while helping attain a balance between email response time and task completion time. Findings also suggest that the best policy may be to respond to email two to four times a day instead of every 45 min or continuously, as is common with many knowledge workers. We conclude by presenting many research opportunities for analytical and organizational IS researchers. © Springer Science+Business Media, LLC 2010.",Email management; Interruption; Performance; Simulation modeling,39,Information Systems Frontiers,2011 1061,Lai K.-C.; Yu Y.-F.,A scalable multi-attribute hybrid overlay for range queries on the cloud,"Cloud computing has become a promising paradigm as next generation computing model, by providing computation, software, data access, and storage services that do not need to know the location of physical resources interconnected across the globe providing such services. In such an environment, important issues as information sharing and resource/service discovery arise. In order to overcome critical limitations in centralized approaches for information sharing and resource/service discovery, this paper proposes a framework of a scalable multi-attribute hybrid overlay featured with decentralized information sharing, flexible resource/service discovery, fault tolerance and load balancing. Additionally, the proposed hybrid overlay integrates a structured P2P system with an unstructured one to support complex queries. Mechanisms such as load balancing and fault tolerance implemented in our proposed system to improve the overall system performance are also discussed. Experimental results show that the performance of the proposed approach is feasible and stable, as the proposed hybrid overlay improves system performance by reducing the number of routing hops and balancing the load by migrating requests. © 2011 Springer Science+Business Media, LLC.",Cloud; Hybrid overlay; Multi-attribute; Peer-to-peer; Range query; Scalability,10,Information Systems Frontiers,2012 1062,Roberts N.C.,Tracking and disrupting dark networks: Challenges of data collection and analysis,"The attack on September 11, 2001 set off numerous efforts to counter terrorism and insurgencies. Central to these efforts has been the drive to improve data collection and analysis. Section 1 summarizes some of the more notable improvements among U.S. government agencies as they strive to develop their capabilities. Although progress has been made, daunting challenges remain. Section 2 reviews the basic challenges to data collection and analysis focusing in some depth on the difficulties of data integration. Three general approaches to data integration are identified-discipline-centric, placed-centric and virtual. A summary of the major challenges in data integration confronting field operators in Iraq and Afghanistan illustrates the work that lies ahead. Section 3 shifts gears to focus on the future and introduces the discipline of Visual Analytics-an emerging field dedicated to improving data collection and analysis through the use of computer-mediated visualization techniques and tools. The purpose of Visual Analytics is to maximize human capability to perceive, understand, reason, make judgments and work collaboratively with multidimensional, conflicting, and dynamic data. The paper concludes with two excellent examples of analytic software platforms that have been developed for the intelligence community-Palantir and ORA. They signal the progress made in the field of Visual Analytics to date and illustrate the opportunities that await other IS researchers interested in applying their knowledge and skills to the tracking and disrupting of dark networks. © 2010 Springer Science+Business Media, LLC (outside the USA).",Analysis and fusion; Dark networks; Data collection; Visual analytics,21,Information Systems Frontiers,2011 1063,Mouttham A.; Kuziemsky C.; Langayan D.; Peyton L.; Pereira J.,"Interoperable support for collaborative, mobile, and accessible health care","E-Health systems, through their use of Internet and wireless technologies, offer the possibility of near real-time data integration to support the delivery and management of health care. In practice, the wide range of choice in technologies, vendors, protocols, formats, and information representations can make even simple exchanges of information between systems problematic. Much of the focus on healthcare interoperability has been on resolving interoperability issues of system to system information exchanges. But issues around people to people interactions and people to system interactions are just as important to address from an interoperability point of view. In this paper, we identify interoperability deficiencies in collaborative care delivery and develop a methodology in two parts. In the first part, an ontology is developed to represent collaborative care delivery. In the second part, the ontology is used to design an architecture for interoperable clinical information system design. We then use a case study in palliative care to provide a proof of concept of the methodology. The case study provides an inventory of the interoperability requirements for palliative care and a perspective on the design and implementation of a people oriented clinical information system that supports collaborative health care delivery in palliative care. © 2011 Springer Science+Business Media, LLC.",Collaborative care delivery; Ontology; People and process interoperability; Process interoperability,47,Information Systems Frontiers,2012 1064,Ngai E.W.T.; Poon J.K.L.; Suk F.F.C.; Ng C.C.,Design of an RFID-based healthcare management system using an information system design theory,"This design science research study describes the design and development of a Radio Frequency Identification (RFID)-based Healthcare Management System (RHMS) for the healthcare industry. We examined the use of RFID technology as the key enabler for building the RHMS to deliver higher business values and provide effective support in transforming and optimizing healthcare practices in the industry. In this study, a prototype RHMS was built and implemented in a quasi-real world setting. The results validate the practical viability of the proposed system architecture. We show that the Information System Design Theory used to develop the RHMS could form the basis for further research. We hope the proposed system architecture and the developed prototype system from this study will help support and further the efforts of both academics and practitioners in RFID research. © 2009 Springer Science+Business Media, LLC.",Healthcare Management System; Information System Design Theory; Radio frequency identification (RFID),77,Information Systems Frontiers,2009 1065,Chiu D.K.W.; Yueh Y.T.F.; Leung H.-F.; Hung P.C.K.,Towards ubiquitous tourist service coordination and process integration: A collaborative travel agent system architecture with semantic web services,"With the recent advances in Internet and mobile technologies, there are increasing demands for ubiquitous access to tourist information systems for service coordination and process integration. However, due to disparate tourist information and service resources such as airlines, hotels, tour operators, it is still difficult for tourists to use them effectively during their trips or even in the planning stage. Neither can current tourist portals assist tourists proactively. To overcome this problem, we propose a Collaborative Travel Agent System (CTAS) based on a scalable, flexible, and intelligent Multi-Agent Information System (MAIS) architecture for proactive aids to Internet and mobile users. We also employ Semantic Web technologies for effective organization of information resources and service processes. We formulate our MAIS architecture for CTAS further with agent clusters based on a case study of a large service-oriented travel agency. Agent clusters may comprise several types of agents to achieve the goals involved in the major processes of a tourist's trip. We show how agents can make use of ontology from the Semantic Web to help tourists better plan, understand, and specify their requirements collaboratively with the CTAS. We further illustrate how this can be successfully implemented with Web service technologies to integrate disparate Internet tourist resources. To conclude, we discuss and evaluate our approach from different stakeholders' perspectives. © 2008 Springer Science+Business Media, LLC.",Collaborative process integration; Multi-agent information system; Ontology; Semantic Web services; Tourist information system; Ubiquitous computing,61,Information Systems Frontiers,2009 1066,Molla A.,Identifying IT sustainability performance drivers: Instrument development and validation,"IT firms vary in their performance to improve the environmental sustainability of their own operations and in their ability to provide products and solutions that enable and transform the environmental sustainability of other industries. In the parlance of the balanced scorecard, performance has two dimensions, that is, ""drivers"" and ""outcomes"". The drivers, also known as leading performance indicators, refer to learning and innovation, processes, and customer value propositions. The outcomes, also known as lagging performance indicators, refer to financial results. This study has developed and validated an instrument to measure the environmentally sustainable IT performance (eSITP) drivers. We established the nomological network of the eSITP by drawing from several theoretical domains in the areas of innovation antecedents and values, balanced performance measurement and IT and eco-sustainability. Based on a survey of 133 IT firms, we developed and validated a four-dimension, 17 items eSITP instrument covering eco-learning, eco-process, eco-brand and eco-value governance. The instrument is validated by following a seven step rigorous process. The paper breaks new ground from both research and practice perspectives. The instrument makes it easier for other researchers who wish to explain the leading (drivers) and lagging (outcomes) of IT firms' environmental sustainability and for IT business managers who want to improve their environmental sustainability performance. © 2013 Springer Science+Business Media New York.",Eco-Brand; Eco-Learning; Eco-Process; Eco-Value; Green IS; Green IT; IT for Green; Performance; Sustainability,54,Information Systems Frontiers,2013 1067,Gao M.; Liu K.; Wu Z.,"Personalisation in web computing and informatics: Theories, techniques, applications, and future research","Recently, personalised search engines and recommendation systems have been widely adopted by users who require assistance in searching, classifying, and filtering information. This paper presents an overview of the field of personalisation systems and describes current state-of-the-art methods and techniques. It reviews approaches for (1) user profiling, including behaviour, preference, and intention modelling; (2) content modelling, comprising content representation, analysis, and classification; and (3) filtering methods for recommendation, classified into four main categories: rule-based, content-based, collaborative, and hybrid filtering. The paper also discusses personalisation systems in different domains, and various techniques and their limitations. Finally, it identifies several issues and possible directions for further research that can improve recommendation capabilities and enhance personalised systems. © 2009 Springer Science+Business Media, LLC.",Information filtering; Personalisation; Recommendation; User profile,125,Information Systems Frontiers,2010 1068,Hertel M.; Wiesent J.,Investments in information systems: A contribution towards sustainability,"Empirical research has determined that information systems (IS) can abate far more emissions than they produce. By using its transformative power, Green IS can build energy efficiency along the entire business value chain and thus contribute to sustainable development that goes well beyond that of Green Information Technology (Green IT). However, from a business perspective there is still prevailing uncertainty with regard to the economic viability and optimal extent of Green IS investments. In this paper, we conceptualize a decision model for an IS investment that increases a company's energy efficiency. We analyze and compare the costs associated with the investment and the realized energy cost savings. Furthermore, we examine the influence of fluctuating energy prices on investment decisions. By integrating risk and return into one decision calculus, we determine an optimal degree of investment, which avoids over-investment while promoting energy efficiency, and therefore establishes the long-term coherence of economic and environmental sustainability. Finally, we demonstrate that reduced exposure to risky energy prices results in comparatively larger investments, thereby implying a higher optimal investment degree, assuming the involvement of risk-averse decision-makers. © 2013 Springer Science+Business Media New York.",Business value of IS; Energy informatics; Environmental/economic sustainability; Green IS/IT,44,Information Systems Frontiers,2013 1069,Bharati P.; Zhang C.; Chaudhury A.,Social media assimilation in firms: Investigating the roles of absorptive capacity and institutional pressures,"Firms are increasingly employing social media to manage relationships with partner organizations, yet the role of institutional pressures in social media assimilation has not been studied. We investigate social media assimilation in firms using a model that combines the two theoretical streams of IT adoption: organizational innovation and institutional theory. The study uses a composite view of absorptive capacity that includes both previous experience with similar technology and the general ability to learn and exploit new technologies. We find that institutional pressures are an important antecedent to absorptive capacity, an important measure of organizational learning capability. The paper augments theory in finding the role and limits of institutional pressures. Institutional pressures are found to have no direct effect on social media assimilation but to impact absorptive capacity, which mediates its influence on assimilation. © 2013 Springer Science+Business Media New York.",Absorptive capacity; Information systems assimilation; Innovation; Institutional theory; Social media; Web 2.0,82,Information Systems Frontiers,2014 1070,Wang P.; Chao K.-M.; Lo C.-C.,Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory,"Most existing QoS-aware Service Discovery and Selection (QSDS) schemes use linguistic terms to describe the QoS satisfaction degree when ranking competing alternatives. However, such schemes determine the degree of QoS satisfaction using fuzzy set membership functions, and cannot therefore take negative evidence (i.e., consumer dissatisfaction) into account. By contrast, vague sets provide the ability to represent both positive and negative evidence when modeling uncertain objects. Accordingly, the present study proposes a new satisfaction-based Web service ranking method for QSDS problems involving a group of online service consumers with imprecise and inconsistent expectations and degrees of satisfaction regarding multiple QoS criteria. Importantly, the proposed approach overcomes the uncertainty regarding the difference between the users’ expectations and their degree of satisfaction inherent in Dempster–Shafer (D-S) evidence theory. Overall, the results show that the proposed scheme provides an effective means of solving the problem of vague and ill-defined information in the QSDS decision-making process. © 2013, Springer Science+Business Media New York.",Evidence theory; QoS; Satisfaction degree; Service discovery; Vague sets,9,Information Systems Frontiers,2015 1071,Pencheva E.; Atanasov I.,Third party application control on quality of service in IP based multimedia networks,"The paper investigates the capabilities for open access to resource management in convergent networks. Based on the analysis of policy and charging control functions in Internet Protocol Multimedia Subsystem (IMS), requirements for third party application control on quality of service (QoS) are identified. The functionality of Open Service Access (OSA) and Parlay X interfaces is evaluated for support of dynamic QoS control. An approach to design of OSA compliant application programming interfaces to QoS management in IMS networks is presented. The interface methods are mapped onto the messages of network control protocols such as Diameter and Session Initiation Protocol (SIP). The application view of authorized QoS resources for SIP session is modeled. Implementation issues concerning behavioral equivalence of the authorized QoS resources model and SIP session state model are discussed. © Springer Science+Business Media, LLC 2010.",Open access; Policy and charging control; Quality of service,6,Information Systems Frontiers,2012 1072,Lee H.J.; Ahn H.J.; Kim J.W.; Park S.J.,Capturing and reusing knowledge in engineering change management: A case of automobile development,"The development of complex products, such as automobiles, involves engineering changes that frequently require redesigning or altering the products. Although it has been found that efficient management of knowledge and collaboration in engineering changes is crucial for the success of new product development, extant systems for engineering changes focus mainly on storing documents related to the engineering changes or simply automating the approval processes, while the knowledge that is generated from collaboration and decision-making processes may not be captured and managed easily. This consequently limits the use of the systems by the participants in engineering change processes. This paper describes a model for knowledge management and collaboration in engineering change processes, and based on the model, builds a prototype system that demonstrates the model's strengths. We studied a major Korean automobile company to analyze the automobile industry's unique requirements regarding engineering changes. We also developed domain ontologies from the case to facilitate knowledge sharing in the design process. For achieving efficient retrieval and reuse of past engineering changes, we used a case-based reasoning (CBR) with a concept-based similarity measure. © Springer Science+Business Media, LLC 2006.",Automobile development; Case-based reasoning; Engineering change management; Knowledge capturing; Knowledge reuse; Semantic web,88,Information Systems Frontiers,2006 1073,Demaagd K.; Bauer J.M.,Modeling the dynamic interactions of agents in the provision of network infrastructure,"Although next-generation information network infrastructure is prerequisite for continued economic growth, the United States is losing ground in important areas relative to peer countries. Businesses and regulators have grown concerned that the U.S. lacks the correct regulatory and business incentives to upgrade the existing network. Due to the complex and dynamic nature of the interdependencies in the ICT value network, traditional methods of public policy and management analysis have proven inadequate to fully understand the issues and possible solutions. This paper discusses a novel Genetic Programming (GP) approach to the problem. Although only a first step towards addressing the problem, the GP discovered several interesting results stemming from the complex interactions. For example, telecommunications companies would actually be hurt by the option to charge discriminatory prices but application providers would benefit. © Springer Science+Business Media, LLC 2010.",Evolutionary algorithms; Internetm; Net neutrality; Network infrastructure,5,Information Systems Frontiers,2011 1074,Qin J.; Zhou Y.; Chen H.,A multi-region empirical study on the internet presence of global extremist organizations,"Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations' Internet presence would allow us to better understand extremist organizations' technical sophistication and their propaganda plans. In this work, we explore an integrated approach for collecting and analyzing extremist Internet presence. We employed automatic Web crawling techniques to build a comprehensive international extremist Web collection. We then used a systematic content analysis tool called the Dark Web Attribute System to analyze and compare these extremist organizations' Internet usage from three perspectives: technical sophistication, content richness, and Web interactivity. By studying 1.7 million multimedia Web documents from around 224 Web sites of extremist organizations, we found that while all extremist organizations covered in this study demonstrate high level of technical sophistication in their Web presence, Middle Eastern extremists are among the most sophisticated groups in both technical sophistication and media richness. US groups are the most active in supporting Internet communications. Our analysis results will help domain experts deepen their understanding on the global extremism movements and make better counter-extremism measures on the Internet. © 2010 Springer Science+Business Media, LLC.",Extremism; Internet; Web mining,29,Information Systems Frontiers,2011 1075,Ma J.; Orgun M.A.,Formalising theories of trust for authentication protocols,"This paper discusses a formal approach for establishing theories of trust for authentication systems which can be used to reason about how agent beliefs evolve through time. The goal of an authentication system is to verify and authorise users in order to protect restricted data and information, so trust is a critical issue for authentication systems. After authentication, two principals (people, computers, services) should be entitled to believe that they are communicating with each other and not with intruders. So, it is important to express such beliefs precisely and to capture the reasoning that leads to them. In this paper, we focus on analysis of agent beliefs in dynamic environments using a temporalised belief logic, obtained by adding a temporal logic onto a belief logic. Working through a well-known authentication protocol, namely Kerberos, we discuss how to express principal beliefs involved in authentication protocols and the evolution of those beliefs based on a series of observations of agents as a consequence of communication. Our approach could be used for designing, verifying and implementing authentication protocols. © 2007 Springer Science+Business Media, LLC.",Agents; Authentication protocols; Belief logic; Trust theory,10,Information Systems Frontiers,2008 1076,Umberger M.; Lumbar S.; Humar I.,Modeling the influence of network delay on the user experience in distributed home-automation networks,"Today's modern home-automation systems and services (HASS) frequently communicate over public telecommunications networks, such as the Internet. Unfortunately, these communication networks do not usually provide sufficient quality (i.e., a predictable delay), which is generally assured in fieldbus HASS networks. Consequently, the user-perceived quality of experience (QoE) cannot be maintained at a satisfactory level when using different HASS devices communicating over an IP-based network. The data transferred over the Internet can experience a non-negligible delay that can have a considerable influence on the QoE. For this reason, the main goal of our research was to measure the influence of the network delay on a subjective QoE assessment, while interacting with some frequently used HASS tasks. The results show that users are satisfied if the delay is kept below 0.8 s, and that they can tolerate delays of over 2 s (depending on the level of the HASS task interactivity). Since such a user-perceived subjective QoE assessment is both time-consuming and expensive we also propose objective QoE assessment models to represent the influence of network delay on a subjective QoE assessment for various HASS tasks. © Springer Science+Business Media, LLC 2010.",Home-automation system and services; Network delay; Objective QoE assessment model; Quality of experience; Subjective QoE assessment,6,Information Systems Frontiers,2012 1077,Banerjee P.K.; Ma L.C.,Routinisation of B2B E-commerce by small firms: A process perspective,"Prior research on e-business based on the TOE framework and the factor based variance approach have yielded mixed results in that differences exist in terms of the identified technology, organisation and environmental factors and their influence at different steps of the routinisation trajectory. In this research we probe deeper into the routinisation phenomenon and investigate the process in a bid to understand 'when' and 'why' certain TOE factors become crucial determinants at different stages of the routinisation process. The context of our study is integration of B2B e-markets by four small firms. Our findings from interpretive case studies indicate that changes in organisational characteristic (such as IT infrastructure), environmental characteristics (such as e-business usage in the industry), and perceptions of e-business (risk and benefit) over time influenced movement along the routinisation trajectory. There is evidence that in high risk e-business, the ability to conduct trials with controlled risk is a crucial determinant of progression from initial to continued usage. Also, contrary to the independent effects of the organisation, environment and technology characteristics assumed in prior research, we found that it is the interaction effect of the three factors that determined initial attitude, initial usage and continued usage. Based on our findings we develop a process model of e-business routinisation and discuss the theoretical and practical implications. © 2011 Springer Science+Business Media, LLC.",B2B E-Markets; E-Business; Interpretivist case study; Process theory; Risk; Routinisation; Small firm; Technology adoption; TOE framework,29,Information Systems Frontiers,2012 1078,Aubert B.A.; Beaurivage G.; Croteau A.-M.; Rivard S.,Firm strategic profile and IT outsourcing,"IT outsourcing research has often been at the transaction level, focusing on the role of the characteristics of the IT activities as the antecedents of outsourcing decisions. The present study extends past research efforts examining the relationships between organizational level variables-in particular the business strategy-and the decision to outsource. Results show that prospectors and analyzers are more aggressive in their use of outsourcing for IT operations. However, no differences between the behaviour of the different strategic groups were found for maintenance activities, suggesting that these activities are too far from the core of the organization to be influenced by strategic profile. © 2008 Springer Science+Business Media, LLC.",IT outsourcing; Strategic profile,28,Information Systems Frontiers,2008 1079,Poba-Nzaou P.; Uwizeyemungu S.; Raymond L.; Paré G.,Motivations underlying the adoption of ERP systems in healthcare organizations: Insights from online stories,"To face their changing environment, a growing number of healthcare institutions are investing in ERP systems as their basic technological infrastructure, highlighting a phenomenon that recalls the earlier popularity of the ERP movement in the manufacturing and financial sectors. Based on the analysis of 180 stories published on ERP vendors' websites, the primary aim of this study is to identify, characterize and contextualize the motivations that lead to the adoption of these systems in healthcare organizations. Our findings first indicate that these motivations can be classified into six broad categories, namely technological, managerial-operational, managerial-strategic, clinical-operational, clinical-strategic, and financial. Moreover, three clusters of healthcare organizations were identified with regard to these motivations, and labelled as taking a ""business"", ""clinical"" or ""institutional"" view of ERP adoption decisions. Given the specificities of IT adoption in the healthcare sector, the importance of these results from a theoretical standpoint lies in filling a knowledge gap in both the ERP and health IT research domains. From a practical standpoint, these results are of interest for policy makers and healthcare managers that must deal with continuous increases in healthcare costs and major demographic changes, and thus need to improve the efficiency and quality of healthcare services provided to patients through IT-based innovations. © 2012 Springer Science+Business Media, LLC.",ERP systems; Healthcare organizations; Motivations; Organizational adoption,57,Information Systems Frontiers,2014 1080,Li N.; Sun M.; Bi Z.; Su Z.; Wang C.,A new methodology to support group decision-making for IoT-based emergency response systems,"An emergency response system (ERS) can assist a municipality or government in improving its capabilities to respond urgent and severe events. The responsiveness and effectiveness of an ERS relies greatly on its data acquisition and processing system, which has been evolved with information technology (IT). With the rapid development of sensor networks and cloud computing, the emerging Internet of things (IoT) tends to play an increasing role in ERSs; the networks of sensors, public services, and experts are able to interact with each other and make scientific decisions to the emergencies based on real-time data. When group decision making is required in an ERS, one critical challenge is to obtain the good understanding of massive and diversified data and make consensus group decisions under a high-level stress and strict time constraint. Due to the nature of unorganized data and system complexity, an ERS depends on the perceptions and judgments of experts from different domains; it is challenging to assess the consensus of understanding on the collected data and response plans before appropriate decisions can be reached for emergencies. In this paper, the group decision-making to emergency situations is formulated as a multiple attribute group decision making (MAGDM) problem, the consensus among experts is modeled, and a new methodology is proposed to reach the understanding of emergency response plans with the maximized consensus in course of decision-making. In the implementation, the proposed methodology in integrated with computer programs and encapsulated as a service on the server. The objectives of the new methodology are (i) to enhance the comprehensive group cognizance on emergent scenarios and response plans and (ii) to accelerate the consensus for decision making with an intelligent clustering algorithm, (iii) to adjust the experts’ opinions without affecting the reliability of the decision when the consensus cannot be reached from the preliminary decision-making steps. Partitioning Around Medoids (PAM) has been applied as the clustering algorithm, Particle Swarm Optimization (PSO) is deployed to adjust evaluation values automatically. The methodology is applied in a case study to illustrate its effectiveness in converging group opinions and promoting the consensus of understanding on emergencies. © 2013, Springer Science+Business Media New York.",Consensus modeling; Emergency response system (ERS); Multiple attribute group decision making (MAGDM); Particle swarm optimization (PSO); Partition around medoid (PAM); The Internet of Things (IoT),66,Information Systems Frontiers,2014 1081,Shen L.; Callaghan V.; Shen R.,Affective e-Learning in residential and pervasive computing environments,"This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider city environment. In support of this vision we describe two cutting edge ICT environments which combine to form a holistic connected future learning environment. The first is the iSpace, a specialized digital-home test-bed that represents the kind of high-tech, context aware home-based learning environment we envisage future learners using, the second a sophisticated pervasive e-Learning platform that typifies the educational delivery platform our research is targeting. After describing these environments we then present our research that explores how emotion evolves during the learning process and how to leverage emotion feedback to provide adaptive e-Learning system. The motivation driving this work is our desire to improve the performance of the educational experience by developing learning systems that recognize and respond appropriately to emotions exhibited by learners. Finally we report on the results about the emotion recognition from physiological signals which achieved a best-case accuracy rate of 86.5% for four types of learning emotion. To the best of our knowledge, this is the first report on emotion detection by data collected from close-to-real-world learning sessions. We also report some finding about emotion evolution during learning, which are still not enough to validate Kort's learning spiral model. © 2008 Springer Science+Business Media, LLC.",Adoption; Affective computing; E-Learning; ICT; Pervasive computing; Residential environments,30,Information Systems Frontiers,2008 1082,Rhee S.-H.; Cho N.W.; Bae H.,Increasing the efficiency of business processes using a theory of constraints,"In this study, a Theory of Constraints (TOC)-based method was developed to enhance the efficiency of business processes. Whereas the TOC has been employed in manufacturing processes, the present paper shows that it can be effective also for Business Process Management (BPM). In order to apply the TOC to business processes, a Drum-Buffer-Rope (DBR) scheduling method for a Business Process Management System (BPMS) was developed. A procedure by which business process efficiency can be improved using these concepts is presented. To validate our approach, a series of simulations of a real banking process was conducted, on the basis of which the applicability of the proposed method was analyzed. Based on the analysis results, we show that the TOC-based method can improve business process efficiency, particularly under heavy workloads with limited resources. And we suggest, accordingly, several guidelines that can be followed for the efficient management of business processes. © 2010 Springer Science + Business Media, LLC.",Business process efficiency; Business process management; Drum-Buffer-Rope; Simulation; Theory of constraints,32,Information Systems Frontiers,2010 1083,He D.D.; Yang J.; Compton M.; Taylor K.,Authorization in cross-border eHealth systems,"Modern eHealth systems require collaborations between individual social entities such as hospitals, medical centers, emergency services and community services. Security and privacy are critical issues in this interoperability challenge. In an eHealth system that crosses different administrative domains, individual organisations usually define their authorization control policies independently. When a collaboration opportunity arises a number of issues may be raised. For example, is the collaboration possible given the authorization policies of collaboration participants? How can policy inconsistencies among collaboration participants be identified and resolved? What kind of authorization control support is needed as the collaboration proceeds? In this paper, we analyze different types of collaborations and provide insights into authorization control in individual organisations as well as in collaboration activities. We propose a model to capture the necessary elements for specifying authorization policy for cross-border collaboration. Based on the model, various inconsistencies between authorization policies from different business units are discussed and handling strategies are suggested according to the intended collaboration types. We also briefly discuss how a description logic reasoner can be used to test whether two set of policies are suitable for collaboration. This work lays a foundation for policy development, negotiation and enforcement for cross-border collaboration. © 2011 Springer Science+Business Media, LLC.",Authorization control; eHealth; Health system interoperability; Service composition; Web service collaboration,7,Information Systems Frontiers,2012 1084,Swar B.; Moon J.; Oh J.; Rhee C.,Determinants of relationship quality for IS/IT outsourcing success in public sector,"Relationship has become an influential aspect for the success of IS/IT outsourcing projects. Although some studies have explored the issues of IS/IT outsourcing relationship in the past, these studies are limited to the private sectors. Whereas, studies implicate that the issues related to private and public sectors should be addressed differently. Therefore the main purpose of this study is to examine the IS/IT outsourcing relationship in the public sector by determining relationship quality factors. Based on the social exchange and the relational exchange theories a relationship model is proposed and hypotheses are tested. Ninety three IS/IT outsourcing projects in the public sector of Korea are examined and the results indicate that the outsourcing success is greatly determined by relationship quality. This study will serve as useful guidelines in understanding how to develop a successful IS/IT outsourcing relationships for IT practitioners in the public sector and the vendors undertaking those outsourced projects. © Springer Science+Business Media, LLC 2012.",IS/IT outsourcing; IS/IT outsourcing in public sector; Outsourcing success; Relational exchange theory; Relationship quality; Social exchange theory,62,Information Systems Frontiers,2012 1085,Khoshgoftaar T.M.; Gao K.; Napolitano A.; Wald R.,A comparative study of iterative and non-iterative feature selection techniques for software defect prediction,"Two important problems which can affect the performance of classification models are high-dimensionality (an overabundance of independent features in the dataset) and imbalanced data (a skewed class distribution which creates at least one class with many fewer instances than other classes). To resolve these problems concurrently, we propose an iterative feature selection approach, which repeated applies data sampling (in order to address class imbalance) followed by feature selection (in order to address high-dimensionality), and finally we perform an aggregation step which combines the ranked feature lists from the separate iterations of sampling. This approach is designed to find a ranked feature list which is particularly effective on the more balanced dataset resulting from sampling while minimizing the risk of losing data through the sampling step and missing important features. To demonstrate this technique, we employ 18 different feature selection algorithms and Random Undersampling with two post-sampling class distributions. We also investigate the use of sampling and feature selection without the iterative step (e.g., using the ranked list from a single iteration, rather than combining the lists from multiple iterations), and compare these results from the version which uses iteration. Our study is carried out using three groups of datasets with different levels of class balance, all of which were collected from a real-world software system. All of our experiments use four different learners and one feature subset size. We find that our proposed iterative feature selection approach outperforms the non-iterative approach. © 2013, Springer Science+Business Media New York.",Class imbalance; Date sampling; High dimensionality; Iterative feature selection; Software defect prediction,73,Information Systems Frontiers,2014 1086,Alaranta M.; Henningsson S.,An approach to analyzing and planning post-merger IS integration: Insights from two field studies,"Information systems (IS) integration is among the most challenging tasks in corporate mergers and acquisitions (M&As). In this paper we propose and illustrate the use of an approach to analyzing and planning post-merger IS integration that extends general theory for IS planning, considering the specific characteristics of the M&A context. We highlight that planning effectiveness is possible to achieve in fundamentally different ways, dependent on the characteristics of the merger or acquisition at hand. © 2008 Springer Science+Business Media, LLC.",Integration; IS integration; IS planning; IS Strategy; M&A; Post-acquisition integration; Post-merger integration,40,Information Systems Frontiers,2008 1087,Costa G.J.M.; Silva N.S.A.,Knowledge versus content in e-learning: A philosophical discussion,"Historically education has been supported by technology; however, during the past three decades electronic technologies for educational purposes have been used to achieve better learning outcomes. There are two propositions regarding the use of computers for educational purposes; that is, people can learn ""from"" technologies or people can learn ""with"" technologies. The, e-learning literature reveals that technological and instructional perceptions are diffuse. Furthermore, only recently have the ethical and cultural issues been considered. The philosophical discussion within this paper considers these issues and explores the idea of knowledge or content in e-learning, teasing out the differences between these two concepts. In order to contextualize the debate, the literature is reviewed, and a philosophical debate using an inquiry example is presented. © 2010 Springer Science + Business Media, LLC.",Content; E-learning; Knowledge; Philosophical argument,14,Information Systems Frontiers,2010 1088,Hung P.C.K.; Chiu D.K.W.; Fung W.W.; Cheung W.K.; Wong R.; Choi S.P.M.; Kafeza E.; Kwok J.; Pun J.C.C.; Cheng V.S.Y.,End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach,"With the recent adoption of service outsourcing, there have been increasing general demands and concerns for privacy control, in addition to basic requirement of integration. The traditional practice of a bulk transmission of the customers' information to an external service provider is no longer adequate, especially in the finance and healthcare sectors. From our consultancy experience, application-to-application privacy protection technologies at the middleware layer alone are also inadequate to solve this problem, particularly when human service providers are heavily involved in the outsourced process. Therefore, we propose a layered architecture and a development methodology for enforcing end-to-end privacy control policies of enterprises over the export of personal information. We illustrate how Web services, augmented with updated privacy facilities such as Service Level Agreement (SLA), Platform for Privacy Preferences Project (P3P), and the P3P Preference Exchange Language (APPEL), can provide a suitable interoperation platform for service outsourcing. We further develop a conceptual model and an interaction protocol to send only the required part of a customer's record at a time. We illustrate our approach for end-to-end privacy control in service outsourcing with a tele-marketing case study and show how the software of the outsourced call center can be integrated effectively with the Web services of a bank to protect privacy. © Springer Science+Business Media, LLC 2007.",APPEL; Layered architecture; Need-to-know principle; P3P; Privacy policies; SLA; Web service integration,40,Information Systems Frontiers,2007 1089,Sharma G.; Qiang Y.; Wenjun S.; Qi L.,Communication in virtual world: Second life and business opportunities,"Second Life is an online 3D virtual world imagined and created by its residents. The residents can communicate, explore, participate in social activities, create and trade virtual properties and services. The most common communication media used in Second Life are text, voice, instant messaging and video conferencing. The purpose of the current study is to investigate why people communicate in Second Life and opportunities of making real business value. An online survey from Second Life residents was performed to study communication behavior and business opportunities in Second Life. The theoretical backgrounds used in this study were the communication theory and social systems and word of mouth communications for consumer learning. The result was focused on the effectiveness and superiority of communication in Second Life among other social networking sites such as Facebook, Myspace and Youtube. The communication is significant to policy makers, managers and leaders for information sharing and decision making. © 2012 Springer Science+Business Media, LLC.",Business opportunities; Communication; Online games; Second Life; Social networking; Virtual world,33,Information Systems Frontiers,2013 1090,Hong D.; Chiu D.K.W.; Shen V.Y.; Cheung S.C.; Kafeza E.,Ubiquitous enterprise service adaptations based on contextual user behavior,"Recent advances in mobile technologies and infrastructures have created the demand for ubiquitous access to enterprise services from mobile handheld devices. Further, with the invention of new interaction devices, the context in which the services are being used becomes an integral part of the activity carried out with the system. Traditional human-computer interface (HCI) theories are now inadequate for developing these context-aware applications, as we believe that the notion of context should be extended to different categories: computing contexts, user contexts, and physical contexts for ubiquitous computing. This demands a new paradigm for system requirements elicitation and design in order to make good use of such extended context information captured from mobile user behavior. Instead of redesigning or adapting existing enterprise services in an ad hoc manner, we introduce a methodology for the elicitation of context-aware adaptation requirements and the matching of context-awareness features to the target context by capability matching. For the implementation of such adaptations, we propose the use of three tiers of views: user interface views, data views, and process views. This approach centers on a novel notion of process views to ubiquitous service adaptation, where mobile users may execute a more concise version or modified procedure of the original process according to their behavior under different contexts. The process view also serves as the key mechanism for integrating user interface views and data views. Based on this model, we analyze the design and implementation issues of some common ubiquitous access situations and show how to adapt them systematically into a context-aware application by considering the requirements of a ubiquitous enterprise information system. © 2007 Springer Science+Business Media, LLC.",Context; Context-aware application; Design issues; Enterprise workforce management; HCI; Process views; Three-tier architecture; Ubiquitous information system,41,Information Systems Frontiers,2007 1091,Schwieren J.; Vossen G.,ID-Services: An RFID middleware architecture for mobile applications,"The use of RFID middleware to support application development for and integration of RFID hardware into information systems has become quite common in RFID applications where reader devices remain stationary, which currently represents the largest part of all RFID applications in use. Another field for applying RFID technology which is offering a huge set of novel possibilities and applications are mobile applications, where readers are no longer fixed. In order to address the specific issues of mobile RFID-enabled applications and to support developers in rapid application development, we present ID-Services, an architecture for an RFID middleware that is designed to support mobile applications. The ID-Services approach has been used to implement MoVIS (Mobile Visitor Information System), a mobile application which allows museum visitors to request individually adapted multimedia information about exhibits in an intuitive way. © 2009 Springer Science+Business Media, LLC.",Architecture; Middleware; Mobile computing; Mobile RFID; RFID,4,Information Systems Frontiers,2010 1092,Møller C.; Chaudhry S.S.; Jørgensen B.,Complex service design: A virtual enterprise architecture for logistics service,"This paper presents an interdisciplinary systems approach to service modeling, design and deployment. The study is based on a longitudinal case study of the development process of a complex logistic service system based on an advanced logistics model. The case examines the development of a Virtual Enterprise Architecture (VEA) for an automatic high-speed transport and sorting system applied in airports for baggage handling. The study traces the evolution of the system from the early conceptual phases to a successful commercial service deployed at Changi, Singapore Airport. The study is conducted using a retrospective analysis of the case using a design science research approach. The paper evaluates and discusses the issues of creating and designing a new complex logistics service, distinct from the physical product, based on an advanced discrete event-based simulation model. The paper concludes by presenting a generalized and validated conceptual framework for a VEA based on an advanced simulation model. The paper thus contributes to the field of service systems and service management by identifying a novel approach to effective design of a new service. © 2008 Springer Science+Business Media, LLC.",Case study; Design science research; Service modeling; Virtual enterprise architecture,18,Information Systems Frontiers,2008 1093,Sterling S.R.; O'Brien J.; Bennett J.K.,Advancement through interactive radio,"This paper describes the rationale, design and implementation of a system for increasing the status women in developing communities. AIR (Advancement through Interactive Radio) gives female community radio listeners a voice with which to respond to programming and to create programming content. We first describe the cost of excluding women from Information and Communication Technologies (ICT) for development, and explore how community radio represents an opportunity for inclusion. We draw upon feasibility studies and site visits in Southeast Kenya to support the introduction of a mechanism that enables women to ""talk back"" to the community radio station. Using the principles of Participatory Action Research (PAR), we argue that women will be more likely to benefit from technology-mediated opportunities for development if they themselves produce information that contributes to their advancement, rather than simply consuming information provided by others. Finally, we describe the design and implementation of simple communications device that supports this model for use in communities that are, and will remain for some time, off the electrical and cellular grid. This hand-held device enables women to record voice feedback and news for community radio. This feedback is then routed asynchronously back to the radio station through a probabilistic, delay-tolerant network, where the feedback can inform subsequent broadcasts and facilitate additional discussion. We conclude with a technical summary of the AIR prototype. © 2009 Springer Science+Business Media, LLC.",Community radio; Delay-tolerant networks; Development; ICT; Women,15,Information Systems Frontiers,2009 1094,Fung C.K.; Hung P.C.K.,Information and knowledge management in online rich presence services,"The special issue of Information System Front aims to examine the information and knowledge management model in rich presence service for the next generation applications. In the first paper 'Feasilibility and A Case Study on Content Optimization Services on Cloud', Wong focuses on content optimization services that modify and reorganize content to reduce the size of content and enhance the performance of processing on the content. The second paper 'Web 2.0 Recommendation Service by Multi-Collaborative Filtering Trust Network Algorithm' Wei and co-researchers present a Multi-Collaborative Filtering. Next the third paper 'QoS-Aware Multi-Granularity Service Composition', Feng and co-researchers discuss the challenge of multi-granularity service composition. Chen and Paik present a methodology to build a global social service network based on link data principles with linked social services in their paper, 'Improving Efficiency of Service Discovery Using Linked Data-based Service Publication'.",,6,Information Systems Frontiers,2013 1095,Wang S.; Wang H.,Organizational schemata of e-portfolios for fostering higher-order thinking,"The information technology of online e-portfolio systems have been widely used during the past several years along with the diffusion of electronic teaching-learning systems. However, for the time being e-portfolio is viewed more as an assessment tool or a showcase tool, but less as an active learning tool. The current generic e-portfolio systems store artifacts in the chronological order on the course basis, providing few facets for active thinking. The question of how we can make e-portfolio a useful learning tool to improve students' learning outcomes is still open to research. Among various students' learning outcomes, higher-order thinking has become an important outcome of education. One vision of education evolution is to change the modes of thinking of students. This study is to meet the challenge of e-portfolios by investigating a significant research question: how e-portfolios can be used as a learning tool for students to foster higherorder thinking. Specifically, this study proposes an ontological approach to organizational schema of e-portfolios so that e-portfolios can be logically and dynamically organized into thinking-driven networks. The ontological schemata can serve as visible maps for the virtual e-portfolios repository shared by all teachers and students to foster higher-order thinking. A case study that implements a prototype of organizational schemata of e-portfolios demonstrates the usefulness of the proposed approach for fostering higher-order thinking. © Springer Science+Business Media, LLC 2012.",Business education; E-learning; E-portfolio; Higher-order thinking; Information systems education; Learning objects; Object-oriented; Ontology; Semantic Web; System analysis and design; User-computer interface,19,Information Systems Frontiers,2012 1096,Wong A.K.S.; Chan L.W.C.; Liu Y.,Automating object-oriented integration and visualization of multidisciplinary biomedical data in radiology workflow: Compartmental PACS model,"This paper is aimed to present a novel compartmental PACS model for the automatic object-oriented integration and visualization of heterogeneous data for the multidisciplinary biomedical studies in the midst of the imaging services in radiology department. The generic PACS is conceptually partitioned into two compartments: service and integration. The service compartment supports the routine imaging service by connecting the imaging modalities to the web client workstations through a single fault-tolerant hardware. The integration compartment is synthesized by open source and open standard software tools to perform the long-term archiving of imaging cases and to integrate the images with the related data from other clinical disciplines. The prototype of the compartmental PACS model has been successfully implemented in the Department of Health Technology and Informatics (HTI) at the Hong Kong Polytechnic University (PolyU). Multi-disciplinary study on a cardiovascular case is considered as an example in this paper to demonstrate the seamless integration and web-based visualization of heterogeneous data from radiology, ophthalmology, cardiology and hematology. The implementation of the compartmental PACS model demonstrates a deliberative system design for allocating mission-critical components at the clinical frontline of imaging services and long-term archiving components at the backend. The integrative feature of object-oriented long-term archive addresses the comprehensive needs of patient-centered multidisciplinary biomedical studies. © 2009 Springer Science+Business Media, LLC.",Digital imaging and communications in medicine; Multidisciplinary communication; Patient-centered care; Picture archiving and communications systems,3,Information Systems Frontiers,2009 1097,Alamri S.; Taniar D.; Safar M.,Indexing moving objects for directions and velocities queries,"Moving object databases are required to support different types of queries with a large number of moving objects. New types of queries namely directions and velocity queries (DV queries), are to be supported and covered. The TPR-tree and its successors are efficient indexes that support spatio-temporal queries for moving objects. However, neither of them support the new DV queries. In this paper, we propose a new index for moving objects based on the TPR*-tree, named Direction and Velocity of TPR* -tree or DV-TPR*-tree, in order to build data a structure based on the spatial, direction and velocity domains. DVTPR*- tree obtains an ideal distribution that supports and fulfils the new query types (DV queries). Extensive performance studies show that the query performance of DV-TPR*-tree outperforms the TPR-tree and its= successors. ©Springer Science+Business Media, LLC 2012.",Index structure; Moving objects; Query processing,19,Information Systems Frontiers,2013 1098,Stula M.; Krstinic D.; Seric L.,Intelligent forest fire monitoring system,"This paper presents iForestFire, an Environmental Monitoring Information System for forest fire protection. The system is composed of several components, each having a particular function. Automatic fire detection is a crucial component of the system. It is based on various complex image processing algorithms. Complexity of the system also emerges from integration, based on multi agent technology, of different environment information. The presented system contributes to the environment protection and is in use in Croatia for several years. © Springer Science+Business Media, LLC 2011.",Data organization; Environmental Monitoring Information Systems; Fire protection; Image processing; Software architecture,34,Information Systems Frontiers,2012 1099,Zhou T.; Lu Y.; Wang B.,Examining online consumers’ initial trust building from an elaboration likelihood model perspective,"Due to the high perceived risk and low switching costs, it is critical for online vendors to foster consumers’ initial trust in order to facilitate their online transactions. The extant research has focused on using the technology acceptance model to examine initial trust, and has seldom disclosed the processes through which initial trust develops. Drawing on the elaboration likelihood model, this research examined online consumers’ initial trust building when visiting a new website for the first time. The results indicated that initial trust develops along dual routes including a central route represented by argument quality and a peripheral route represented by source credibility. Selfefficacy significantly moderates the effect of argument quality on initial trust. In addition, we found the direct effects of both cultural variables-uncertainty avoidance and individualism-on initial trust. © Springer Science+Business Media New York 2014.",Argument quality; Elaboration likelihood model; Initial trust; Source credibility,95,Information Systems Frontiers,2016 1100,Sun H.; Yang J.; Xu L.,CoBTx-Net: A model for business collaboration reliability verification,"Collaborative business process can become unreliable when business partners collaborate in a peer- based fashion without central control. Therefore, reliability checking becomes an important issue that needs to be dealt with for any generic solution in managing business collaboration. In this paper, we propose a novel Choreographical Business Transaction Net (CoBTx-Net) to model collaborative business process and to manage the collaboration by individual participants. Furthermore three reliability properties named Time-embedded dead marking freeness, Inter-organizational dead marking freeness, and Collaborative soundness are defined based on CoBTx-Net to verify (1) the violation of time constraint, (2) collaborative logic conflicts, and (3) the improper termination from individual organizations. © 2008 Springer Science+Business Media, LLC.",Collaborative business process; Hierarchical colored Petri Net; Peer based collaboration; Reliability verification,3,Information Systems Frontiers,2009 1101,Ghattas J.; Soffer P.,Evaluation of inter-organizational business process solutions: A conceptual model-based approach,"Collaboration and coordination between organizations are necessary in today's business environment, and are enabled by inter-organizational processes. Many approaches for the construction of such processes have been proposed in recent years. However, due to the lack of standard terminology it is hard to evaluate and select a solution that fits a specific business scenario. The paper proposes a conceptual model which depicts the nature of interaction between organizations through business processes under specific business requirements that emphasize the privacy and autonomy of the participating organizations. The model is generic, and relies on the generic process model (GPM) framework and on Bunge's ontology. Being generic and theory-based, we propose to use the model as a basis for comparing and evaluating design and implementation-level approaches for inter-organizational processes. We demonstrate the evaluation procedure by applying it to three existing approaches. © 2008 Springer Science+Business Media, LLC.",Autonomy; Business process design; Conceptual model; CWM; Flexibility; Inter-organizational processes; P2P; Privacy; RosettaNet,13,Information Systems Frontiers,2009 1102,Martinez-Gil J.; Aldana-Montes J.F.,Semantic similarity measurement using historical google search patterns,"Computing the semantic similarity between terms (or short text expressions) that have the same meaning but which are not lexicographically similar is an important challenge in the information integration field. The problem is that techniques for textual semantic similarity measurement often fail to deal with words not covered by synonym dictionaries. In this paper, we try to solve this problem by determining the semantic similarity for terms using the knowledge inherent in the search history logs from the Google search engine. To do this, we have designed and evaluated four algorithmic methods for measuring the semantic similarity between terms using their associated history search patterns. These algorithmic methods are: a) frequent co-occurrence of terms in search patterns, b) computation of the relationship between search patterns, c) outlier coincidence on search patterns, and d) forecasting comparisons. We have shown experimentally that some of these methods correlate well with respect to human judgment when evaluating general purpose benchmark datasets, and significantly outperform existing methods when evaluating datasets containing terms that do not usually appear in dictionaries. © 2013 Springer Science+Business Media New York.",Information integration; Semantic similarity; Web Intelligence,21,Information Systems Frontiers,2013 1103,Chen W.; Kuo S.-Y.; Chao H.-C.,Service integration with UPnP agent for an ubiquitous home environment,"Consumer electronics and intelligent appliances can be successful and widely used in a smart or ubiquitous home environment. Service integration had become an important issue for system development. In this paper, we present an approach for UPnP devices connecting to outer networks via UPnP aware gateway. We develop service on a smart campus network based on enhanced UPnP technologies as an example. Under such framework, intelligent system provides users individual information at the right place and the right time. © 2008 Springer Science+Business Media, LLC.",Information technology; Ubiquitous computing; UPnP,8,Information Systems Frontiers,2009 1104,Kalra N.; Lauwers T.; Dewey D.; Stepleton T.; Dias M.B.,Design of a braille writing tutor to combat illiteracy,"Less than 3% of the 145 million blind people living in developing countries are literate (Helander, Prejudice and dignity: An introduction to community-based rehabilitation. New York: UNDP 1998). This low literacy rate is partly due to the lack of trained teachers and the challenges associated with learning to write braille on a traditional slate and stylus. These challenges include writing from right to left, writing mirrored images of letters, and receiving significantly delayed feedback. Extensive conversations with the Mathru Educational Trust for the Blind near Bangalore, India, revealed the need for a robust, low-power, low-cost braille writing tutor. We present an iterative and participatory process resulting in the creation and refinement of a prototype braille writing tutor system. This system uses a novel input device to capture a student's activity on a slate using a stylus and uses a range of techniques to teach braille writing skills to both beginner and advanced students. We report on lessons learned from the implementation of this project and from a 6-week pilot study at Mathru, and outline future directions for improvement. © 2009 Springer Science+Business Media, LLC.",Braille; Developing nations; Intelligent tutoring systems; User-centered design,12,Information Systems Frontiers,2009 1105,Gräuler M.; Freundlieb M.; Ortwerth K.; Teuteberg F.,"Understanding the beliefs, actions and outcomes of sustainability reporting: An experimental approach","IS researchers have identified substantial research gaps within the IS community regarding sustainability. Therefore, this paper pursues an experimental approach to investigate online sustainability reports (SRs) which are a common instrument for corporate sustainability communication. The applied research approach examines not only which properties of SRs enhance the readers' willingness to read a SR, but also to what extent SRs can influence the readers' actions and impact corporate image. Within the course of this paper, a belief-action-outcome (BAO) model and a corresponding experimental design, which examines SRs in three phases (i.e. before reading, during reading and after reading), are developed and conducted; subsequently the results are empirically analysed. Finally, implications for practitioners and researchers in the field of sustainability and especially sustainability reporting are demonstrated. Furthermore, possible starting points for future research are discussed. The results indicate that a sophisticated SR that satisfies the readers' expectations has a significant impact on corporate image and the readers' actions (i.e. buying and recommending products, investing and considering to work for the reporting company), which qualifies sustainability reporting as an important channel for corporate communication. © 2013 Springer Science+Business Media New York.",Acceptance; Belief-action-outcome model; Corporate social responsibility; Experiment; Sustainability reporting,16,Information Systems Frontiers,2013 1106,Bandyopadhyay T.; Liu D.; Mookerjee V.S.; Wilhite A.W.,Dynamic competition in IT security: A differential games approach,"Hackers evaluate potential targets to identify poorly defended firms to attack, creating competition in IT security between firms that possess similar information assets. We utilize a differential game framework to analyze the continuous time IT security investment decisions of firms in such a target group. We derive the steady state equilibrium of the duopolistic differential game, show how implicit competition induces overspending in IT defense, and then demonstrate how such overinvestment can be combated by innovatively managing the otherwise misaligned incentives for coordination. We show that in order to achieve cooperation, the firm with the higher asset value must take the lead and provide appropriate incentives to elicit participation of the other firm. Our analysis indicates that IT security planning should not remain an internal, firm-level decision, but also incorporate the actions of those firms that hackers consider as alternative targets. © 2012, Springer Science+Business Media, LLC.",Competing defense; Cyber defense; Dynamic games; Investment in IT security; IT security,24,Information Systems Frontiers,2014 1107,Ray P.; Lewis L.,Managing cooperation in e-business systems,"E-Business management involves monitoring and controlling all forms of business transactions conducted over the Internet, extranets, and related communications technologies and services. As such, it includes the management of networks, systems, and software applications. E-Business management is beginning to depend increasingly on knowledge of the cooperative aspects of partners in a business chain and the cooperative aspects of stake-holders in e-business operations. The study of cooperation offers many opportunities to apply social network analyses to derive software solutions for the management of e-business. This article provides a methodology and case study that recognises the dimension of cooperation among a multiplicity of organisations, coined ""Awareness-based Cooperative Management."" It is aimed towards the design or re-engineering of effective e-business management systems, where the key concept involves the degree of awareness held by e-business stake-holders. Awareness is defined in terms of stake-holder interactions and artefacts used in those interactions such as buyer specifications, requests for proposals, offers, service level agreements, and the like. Since awareness is an indispensable, albeit an inherently vague concept, we cast it and reason about it with the apparatus of fuzzy logic. © 2008 Springer Science+Business Media, LLC.",Awareness; Design patterns; E-business; E-business management; Fuzzy reasoning; Social networks,7,Information Systems Frontiers,2009 1108,Becker J.; Delfmann P.; Dietrich H.-A.; Steinhorst M.; Eggert M.,Business process compliance checking – Applying and evaluating a generic pattern matching approach for conceptual models in the financial sector,"Given the strong increase in regulatory requirements for business processes the management of business process compliance becomes a more and more regarded field in IS research. Several methods have been developed to support compliance checking of conceptual models. However, their focus on distinct modeling languages and mostly linear (i.e., predecessor-successor related) compliance rules may hinder widespread adoption and application in practice. Furthermore, hardly any of them has been evaluated in a real-world setting. We address this issue by applying a generic pattern matching approach for conceptual models to business process compliance checking in the financial sector. It consists of a model query language, a search algorithmand a corresponding modelling tool prototype. It is (1) applicable for all graph-based conceptual modeling languages and (2) for different kinds of compliance rules. Furthermore, based on an applicability check, we (3) evaluate the approach in a financial industry project setting against its relevance for decision support of audit and compliance management tasks. © Springer Science+Business Media New York 2014.",Business process compliance management; Business process modeling; Conceptual modeling; Model checking; Model querying; Patternmatching compliance checking,34,Information Systems Frontiers,2016 1109,Zhou S.; Zhang Z.; Luo Z.; Wong E.C.,A lightweight anti-desynchronization RFID authentication protocol,"Radio frequency identification (RFID) technology has been widely used in ubiquitous infrastructures. However, resource constraint in the low-cost RFID systems has posed potential risks such as privacy and security problems, becoming adoption barrier for RFID-based applications. In this paper, current security issues in RFID are introduced firstly. Then, we propose a lightweight Anti-desynchronization privacy preserving RFID authentication protocol. It is particularly suitable for the low-cost RFID environment for only the capacity of one-way hash function and XOR operation is needed. In this lightweight Anti-desynchronization RFID authentication protocol, the back-end server keeps the history of the random key update to prevent the active attackers from de-synchronizing the shared secret between the tag and the back-end server. The security and the performance of the proposed protocol are analyzed as well. © 2009 Springer Science+Business Media, LLC.",Anti-desynchronization; Authentication protocol; Lightweight; Radio frequency identification,48,Information Systems Frontiers,2010 1110,Lim J.; Suh T.; Gil J.; Yu H.,Scalable and leaderless Byzantine consensus in cloud computing environments,"Traditional Byzantine consensus in distributed systems requires n ≥ 3f + 1, where n is the number of nodes. In this paper, we present a scalable and leaderless Byzantine consensus implementation based on gossip, requiring only n ≥ 2f + 1 nodes. Unlike conventional distributed systems, the network topology of cloud computing systems is often not fully connected, but loosely coupled and layered. Hence, we revisit the Byzantine consensus problem in cloud computing environments, in which each node maintains some number of neighbors, called local view. The message complexity of our Byzantine consensus scheme is O(n), instead of O(n2). Experimental results and correctness proof show that our Byzantine consensus scheme can solve the Byzantine consensus problem safely in a scalable way without a bottleneck and a leader in cloud computing environments. © 2013 Springer Science+Business Media New York.",Byzantine fault tolerance; Cloud computing; Consensus; Gossip,17,Information Systems Frontiers,2014 1111,Goldschmidt P.,Managing the false alarms: A framework for assurance and verification of surveillance monitoring,"This article discusses methods to support assurance of surveillance monitoring and compliance verification knowledge management (CV-KM). The discussion includes aspects of primary monitoring systems, the different environments in which they operate, the verification problem solving and decision making tasks, the problem structure, and the coordination of the review process to facilitate truth maintenance and regulatory Meta rules. Based on the ALCOD (Alert Coding) prototype developed with the Surveillance Division of the Australian Stock Exchange (ASX), the surveillance operation is considered a primary monitoring function with the analysis of the resulting output the second-tier monitoring function-the assurance component. © 2007 Springer Science+Business Media, LLC.",Complex environments; False positive management; Primary monitoring systems (PMS); Second tier monitoring; Simple environments; Suspected non-compliance event (SNCE),9,Information Systems Frontiers,2007 1112,Chew E.K.,iSIM: An integrated design method for commercializing service innovation,"Service innovation is focused on customer value creation. At its core, customer centric service innovation is technology-enabled, human-centered, and process-oriented. To profit from such innovation, firms need an integrated cross-disciplinary, holistic method to design and commercialize service innovation. From diverse but interrelated strands of theories from service science, strategic management, organization science and information systems literatures, this article develops a new integrated design method, known as iSIM (integrated Service Innovation Method), for simultaneous service innovation and business model design for sustained customer value co-creation with the firm. Following design science research method, the article theoretically defines and integrates iSIM’s seven constitutive design process-elements: service strategy, customer type / value proposition, service concept, service system, customer experience, service architecture and monetization into a coherent and end-to-end aligned integrated design method. It explains how iSIM would be holistically and iteratively practiced by practitioners, and conceptually exemplifies its utility via telco and Amazon case studies using secondary data. Perspectives on iSIM from selected practitioners are discussed which confirm iSIM’s potential utility for their business. Managerial implications of implementing the iSIM and potential areas for further research are also discussed. © 2015, Springer Science+Business Media New York.",Business model; Customer experience; Service architecture; Service concept; Service design; Service innovation,33,Information Systems Frontiers,2016 1113,Zhao Y.; Zhu Q.,Evaluation on crowdsourcing research: Current status and future direction,"Crowdsourcing is one of the emerging Web 2.0 based phenomenon and has attracted great attention from both practitioners and scholars over the years. It can facilitate the connectivity and collaboration of people, organizations, and societies. We believe that Information Systems scholars are in a unique position to make significant contributions to this emerging research area and consider it as a new research frontier. However, so far, few studies have elaborated what have been achieved and what should be done. This paper seeks to present a critical examination of the substrate of crowdsourcing research by surveying the landscape of existing studies, including theoretical foundations, research methods, and research foci, and identifies several important research directions for IS scholars from three perspectives - the participant, organization, and system - and which warrant further study. This research contributes to the IS literature and provides insights for researchers, designers, policy-makers, and managers to better understand various issues in crowdsourcing systems and projects. © 2012 Springer Science+Business Media, LLC.",Collective intelligence; Crowdsourcing; Mass collaboration; Problem-solving; Research progress; Socio-technical systems; Web 2.0,451,Information Systems Frontiers,2014 1114,Mitrokotsa A.; Rieback M.R.; Tanenbaum A.S.,Classifying RFID attacks and defenses,"RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID communication so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed. © 2009 The Author(s).",Classification; RFID attacks; RFID security,197,Information Systems Frontiers,2010 1115,Ramesh R.; Rao H.R.,Information Systems Frontiers: Editorial,"Several achievements of Information Systems Frontiers to meet the needs by providing timely research occurring at the IS/IT field in both academia and the industrial professions, are discussed. ISF is increasingly using advanced methodology for providing accurate information to meet industry and academic needs. It is focusing on the integration of multi-disciplinary interfaces. It is an international scholarly journal designed to manage the contributing academic disciplines and link academia with industry. It aims to publish original, well-written, self-contained contributions, which present novel research and innovation in IS/IT that advance the field fundamentally and significantly. It is also focusing on privacy, trust, information assurance and intellectual property in the telecom systems.",,1,Information Systems Frontiers,2008 1116,Mousannif H.; Khalil I.; Kotsis G.,Collaborative learning in the clouds,"Cloud computing has emerged as one of the most highly discussed topics both in the academic community and in the computing industry. While most of the work that has been conducted to explore this field focuses either on establishing the basis for cloud computing or almost exclusively on the issues surrounding security and data privacy, this paper takes the first exploratory step into exploring the actual internal working of cloud computing and demonstrates its viability for organizations, more specifically educational establishments . The paper starts by introducing the most important key clouds computing concepts, including virtualization technologies, Web services and Service Oriented Architectures (SOA), and distributed computing. Light will be then shed on the impact and potential benefits of cloud computing on teaching and learning in educational institutions. The paper closes by describing building a private cloud inside educational institution and highlights its offerings for students, staff and lecturers. © Springer Science+Business Media New York 2013.",Cloud computing; Private clouds; Virtualization,17,Information Systems Frontiers,2013 1117,Tanergüçlü T.; Maraş H.; Gencer C.; Aygüneş H.,A decision support system for locating weapon and radar positions in stationary point air defence,"In this study, a decision support system (DSS) based on the interactive use of location models and geographical information systems (GIS) was developed to determine the optimal positions for air defence weapons and radars. In the location model, the fire units are considered as the facilities to be located and the possible approach routes of air vehicles are treated as demand points. Considering the probability that fire by the units will miss the targets, the objective of the problem is to determine the positions that provide coverage of the approach routes of the maximum number of weapons while considering the military principles regarding the tactical use and deployment of units. In comparison with the conventional method, the proposed methodology presents a more reliable, faster, and more efficient solution. On the other hand, owing to the DSS, a battery commander who is responsible for air defence becomes capable of determining the optimal weapon and radar positions, among the alternative ones he has identified, that cover the possible approach routes maximally. Additionally, he attains the capability of making such decisions in a very short time without going to the field over which he will perform the defence and hence without being subject to enemy threats. In the decision support system, the digital elevation model is analysed using Map Objects 2.0, the mathematical model is solved using LINGO 4.0 optimization software, and the user interface and data transfer are supported by Visual Basic 6.0. © Springer Science+Business Media, LLC 2012.",Air defence; Decision support system; Facility location; Geographical information systems; Maximum expected covering model,24,Information Systems Frontiers,2012 1118,Brooks L.; Alam M.S.,Designing an information system for updating land records in Bangladesh: Action design ethnographic research (ADER),"Information Systems (IS) has developed through adapting, generating and applying diverse methodologies, methods, and techniques from reference disciplines. Further, Action Design Research (ADR) has recently developed as a broad research method that focuses on designing and redesigning IT and IS in organizational contexts. This paper reflects on applying ADR in a complex organizational context in a developing country. It shows that ADR requires additional lens for designing IS in such a complex organizational context. Through conducting ADR, it is seen that an ethnographic framework has potential complementarities for understanding complex contexts thereby enhancing the ADR processes. This paper argues that conducting ADR with an ethnographic approach enhances design of IS and organizational contexts. Finally, this paper aims presents a broader methodological framework, Action Design Ethnographic Research (ADER), for designing artefacts as well as IS. This is illustrated through the case of a land records updating service in Bangladesh. © 2014, The Author(s).",Action design ethnographic research; Action design research; Bangladesh; Land records; Service delivery,1,Information Systems Frontiers,2015 1119,Fang F.; Parameswaran M.; Zhao X.; Whinston A.B.,An economic mechanism to manage operational security risks for inter-organizational information systems,"As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdependent security risk they add is a problem affecting market efficiency. Connected organizations become part of entire networks, and are subject to threats from the entire network; but members' security profile information is private, members lack incentives to minimize impact on peers and are not accountable. We model the problem as a signaling-screening game, and outline an incentive mechanism that addresses these problems. Our mechanism proposes formation of secure communities of organizations anchored by Security Compliance Consortium (SCC), with members held accountable to the community for security failures. We study the interconnection decisions with and without the mechanism, and characterize conditions where the mechanism plays roles of addressing moral hazard and hidden information issues by screening the organizations' security types and/or by providing them incentives to improve. We also discuss the welfare gains and the broad impact of the mechanism. © 2012 Springer Science+Business Media, LLC.",Economic mechanisms; Economics of information systems; Information security; Inter-organizational information systems; Risk management,22,Information Systems Frontiers,2014 1120,Chen W.-B.; Zhang C.,An automated bacterial colony counting and classification system,"Bacterial colony enumeration is an essential tool for many widely used biomedical assays. However, bacterial colony enumerating is a low throughput, time consuming and labor intensive process since there may exist hundreds or thousands of colonies on a Petri dish, and the counting process is usually manually performed by well-trained technicians. In this paper, we introduce a fully automatic yet cost-effective bacterial colony counter which can not only count but also classify colonies. Our proposed method can recognize chromatic and achromatic images and thus can deal with both color and clear medium. In addition, the proposed method is software-centered and can accept general digital camera images as its input. The counting process includes detecting dish/plate regions, identifying colonies, separating aggregated colonies, and reporting colony counts. In order to differentiate colonies of different species, the proposed counter adopts one-class Support Vector Machine (SVM) with Radial Basis Function (RBF) as the classifier. Our proposed counter demonstrates a promising performance in terms of both precision and recall, and is robust and efficient in terms of labor-and time-savings. © 2009 Springer Science+Business Media, LLC.",Bacterial colony counting; Biomedical image mining; Classification; Clustering; One-class SVM; Segmentation,46,Information Systems Frontiers,2009 1121,Weerakkody V.; Irani Z.; Lee H.; Osman I.; Hindi N.,"E-government implementation: A bird’s eye view of issues relating to costs, opportunities, benefits and risks","After more than a decade of comprehensive research work in the area of electronic government (e-government), no attempt has yet been made to undertake a systematic literature review on the costs, opportunities, benefits and risks that influence the implementation of e-government. This is particularly significant given the various related challenges that governments have faced over the years when implementing e-government initiatives. Hence, the aim of this paper is to undertake a comprehensive analysis of relevant literature addressing these issues using a systematic review of 132 studies identified from the Scopus online database and Google Scholar together with a manual review of relevant papers from journals dedicated to electronic government research such as Electronic Government, an International Journal (EGIJ), International Journal of Electronic Government Research (IJEGR) and Transforming Government: People, Process, and Policy (TGPPP). The overall review indicated that although a large number of papers discuss costs, opportunities, benefits and risks, treatment of these issues have tended to be superficial. Moreover, there is a lack of empirical studies which can statistically evaluate the performance of these constructs in relation to the various e-government systems. Therefore, this research would help governments to better analyse the impact of costs, opportunities, benefits and risks on the success of e-government systems and its pre-adoption from an implementation perspective. © 2013, Springer Science+Business Media New York.",Benefits; COBRA; Costs; e-government; Opportunities; Risks,84,Information Systems Frontiers,2015 1122,Wang C.; Xu L.,Parameter mapping and data transformation for engineering application integration,"Enterprise applications may be classified into management applications used by managerial staffs for making decisions on business operations, and engineering applications used by engineers for solving multidisciplinary design problems. In the literature, enterprise application integration is extensively addressed in the context of management applications, but insufficiently discussed in the engineering disciplines. Practitioners in manufacturing industries have for a long time feel the increasing need of integrating engineering applications, in order to accelerate product development paces and improve design qualities. Integrating engineering applications used in the multiple engineering disciplines has to cope with a number of challenges. This paper focuses on one of the critical issues: parameter mapping and data transformation, which is of pivotal importance to integrating engineering applications. Design parameter mapping provides a consistent approach to data extraction, storage, display and manipulation among different data sources. Data transformation describes the operational logic of parsing input/output files, extracting and transforming data, and maintaining consistency among multiple data sources. © 2008 Springer Science+Business Media, LLC.",Data transformation; Engineering application integration; Multidisciplinary design optimization; Parameter mapping,38,Information Systems Frontiers,2008 1123,Dong Y.; Lian S.,Automatic and fast temporal segmentation for personalized news consuming,"Automatic news program segmentation and classification becomes a hot topic, which reorganizes the news program according to the news' topics, and provides the on-demand services to mobile consumers or Internet/ home TV consumers. This paper presents a personalized news consuming system, including the system architecture, consumption steps and key techniques. Then, focused on the core technique, i.e., video temporal segmentation, the automatic video temporal segmentation method is proposed, evaluated and compared with existing ones. Experimental results show that the proposed scheme is computational efficient and gets higher correct detection rate. These properties make it a suitable choice for the personalized news consuming system. © Springer Science+Business Media, LLC 2010.",News segmentation; Personalized news consuming; Shot boundary detection (SBD); Video temporal segmentation,6,Information Systems Frontiers,2012 1124,Li N.; Li X.; Shen Y.; Bi Z.; Sun M.,Risk assessment model based on multi-agent systems for complex product design,"Design of a complex product takes a long and intricate process, and mostly, it has the multidisciplinary nature. The design can become even challenging if the product to be designed is totally new since numerous technical challenges and uncertainties are involved. In this paper, the risk assessment for complex product design is discussed, and the quantification of the risk is focused. A new risk model has been proposed; which is based on Multi-Agent Systems (MAS). With the consideration of the similarity between the design of a product and that of an adaptive system, a hierarchical network is used to represent the design process based on an agent-based approach. In the proposed model, the concept of material flow is conceived to describe the interactions among agents, and the risks associated with the design activities are analyzed using the probabilistic assessment tools to simulate the risk propagation. The risk assessment is parameterized and implemented in the platform of the Recursive Porous Agent Simulation Toolkit (Repast), and the risk level was quantified by using the Monte Carlo Simulation method. To demonstrate the effectiveness of the proposed model, experiments are conducted with two typical scenarios, and simulation results are analyzed in details. Finally, the future work based on the developed model is discussed. © 2013, Springer Science+Business Media New York.",Multi-agent systems; Quantitative simulation; Risk assessment; Risk propagation,27,Information Systems Frontiers,2015 1125,Lee N.; Bae J.K.; Koo C.,A case-based reasoning based multi-agent cognitive map inference mechanism: An application to sales opportunity assessment,"In order to propose a new cognitive map (CM) inference mechanism that does not require artificial assumptions, we developed a case-based reasoning (CBR) based mechanism called the CBRMCM (Case-Based Reasoning based Multi-agent Cognitive Map). The key idea of the CBRMCM mechanism involves converting all of the factors (nodes) that constitute the CM into intelligent agents that determine their own status by checking status changes and relationship with other agents and the results being reported to other related node agents. Furthermore, the CBRMCM is deployed when each node agent references the status of other related nodes to determine its own status value. This approach eliminates the artificial fuzzy value conversion and the numerical inference function that were required for obtaining CM inference. Using the CBRMCM mechanism, we have demonstrated that the task of analyzing a sales opportunity could be systematically and intelligently solved and thus, IS project managers can be provided with robust decision support. © Springer Science+Business Media, LLC 2011.",Case-Based Reasoning (CBR); Case-Based Reasoning based Multi-agent Cognitive Map (CBRMCM); Cognitive Map (CM; Sales opportunity assessment cases,9,Information Systems Frontiers,2012 1126,Hassan M.M.; Hossain M.S.; Sarkar A.M.; Huh E.-N.,Cooperative game-based distributed resource allocation in horizontal dynamic cloud federation platform,"Distributed resource allocation is a very important and complex problem in emerging horizontal dynamic cloud federation (HDCF) platforms, where different cloud providers (CPs) collaborate dynamically to gain economies of scale and enlargements of their virtual machine (VM) infrastructure capabilities in order to meet consumer requirements. HDCF platforms differ from the existing vertical supply chain federation (VSCF) models in terms of establishing federation and dynamic pricing. There is a need to develop algorithms that can capture this complexity and easily solve distributed VM resource allocation problem in a HDCF platform. In this paper, we propose a cooperative game-theoretic solution that is mutually beneficial to the CPs. It is shown that in non-cooperative environ-ment, the optimal aggregated benefit received by the CPs is not guaranteed. We study two utility maximizing cooperative resource allocation games in a HDCF environment. We use price-based resource allocation strategy and present both centralized and distributed algorithms to find optimal solutions to these games. Various simulations were carried out to verify the proposed algorithms. The simulation results demonstrate that the algorithms are effective, showing robust performance for resource allocation and requiring minimal computation time. © Springer Science+Business Media, LLC 2012.",Cooperative games; Distributed resource allocation; Horizontal dynamic cloud federation; Vertical supply chain federation,70,Information Systems Frontiers,2014 1127,García-Moya L.; Kudama S.; Aramburu M.J.; Berlanga R.,Storing and analysing voice of the market data in the corporate data warehouse,"Web opinion feeds have become one of the most popular information sources users consult before buying products or contracting services. Negative opinions about a product can have a high impact in its sales figures. As a consequence, companies are more and more concerned about how to integrate opinion data in their business intelligence models so that they can predict sales figures or define new strategic goals. After analysing the requirements of this new application, this paper proposes a multidimensional data model to integrate sentiment data extracted from opinion posts in a traditional corporate data warehouse. Then, a new sentiment data extraction method that applies semantic annotation as a means to facilitate the integration of both types of data is presented. In this method, Wikipedia is used as the main knowledge resource, together with some well-known lexicons of opinion words and other corporate data and metadata stores describing the company products like, for example, technical specifications and user manuals. The resulting information system allows users to perform new analysis tasks by using the traditional OLAP-based data warehouse operators. We have developed a case study over a set of real opinions about digital devices which are offered by a wholesale dealer. Over this case study, the quality of the extracted sentiment data is evaluated, and some query examples that illustrate the potential uses of the integrated model are provided. © 2013 Springer Science+Business Media New York.",Data warehouses; OLAP; Sentiment analysis; Text processing,28,Information Systems Frontiers,2013 1128,Chen X.; Zheng Q.; Guan X.,An OVAL-based active vulnerability assessment system for enterprise computer networks,"Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the security vulnerabilities. However, current vulnerability assessment methods may encounter the issues of high false positive rates, long computational time, and requirement of developing attack codes. Moreover, they are only capable of locating individual vulnerabilities on a single host without considering correlated effect of these vulnerabilities on a host or a section of network with the vulnerabilities possibly distributed among different hosts. To address these issues, an active vulnerability assessment system NetScope with C/S architecture is developed for evaluating computer network security based on open vulnerability assessment language instead of simulating attacks. The vulnerabilities and known attacks with their prerequisites and consequences are modeled based on predicate logic theory and are correlated so as to automatically construct potential attack paths with strong operation power of relational database management system. The testing results from a series of experiments show that this system has the advantages of a low false positive rate, short running periods, and little impact on the performance of audited systems and good scalability. The security vulnerabilities, undetectable if assessed individually in a network, are discovered without the need to simulate attacks. It is shown that the NetScope system is well suited for vulnerability assessment of large-scale computer networks such as campus networks and enterprise networks. Moreover, it can also be easily integrated with other security tools based on relational databases. © 2008 Springer Science+Business Media, LLC.",Attack path; Network security; Open vulnerability assessment language; Predicate logic; Relational database management system; Security vulnerability,11,Information Systems Frontiers,2008 1129,Narang P.; Hota C.,Game-theoretic strategies for IDS deployment in peer-to-peer networks,"This work studies the problem of optimal positioning of Intrusion Detection Systems (IDSs) in a Peer-to-Peer (P2P) environment involving a number of peers and super-peers. This scenario applies to network architectures like that of Gnutella, Skype or Tor, which involve a huge number of leaf-peers and a selected number of super-peers who have higher responsibilities in the network. A malicious entity may become part of the P2P network by joining from any part of the network. It can attack a super-peer and thus disrupt the functioning of the P2P network. Peers may try to secure the network by running IDSs at certain strategically-chosen locations in the network. But a deterministic schedule of running and positioning the IDSs can be observed and thwarted by an adversary. In this paper, we explore the problem of strategically positioning IDSs in a P2P network with a randomized, game-theoretic approach. Our approach distributes the responsibility of running the IDSs between the peers in a randomized fashion and minimizes the probability of a successful attack. © 2015, Springer Science+Business Media New York.",Game theory; Intrusion detection; Peer-to-peer,9,Information Systems Frontiers,2015 1130,Zhou T.,Examining continuous usage of location-based services from the perspective of perceived justice,"Due to the privacy risk associated with using location-based services (LBS), users are often reluctant to adopt and use them. Drawing on the justice theory, this research identified the factors affecting continuous usage of LBS. Perceived justice reflects a set of fairness perceptions and involves three dimensions: distributive justice, procedural justice and interactional justice, which reflect outcome fairness, process fairness and treatment fairness, respectively. We conducted data analysis with structural equation modeling (SEM). The results show that procedural justice is the main factor affecting privacy risk, whereas distributive justice is the main factor affecting perceived usefulness. Privacy risk and perceived usefulness influence continuous usage. Thus mobile service providers need to improve users' perceived justice to facilitate their usage of LBS. © 2011 Springer Science+Business Media, LLC.",LBS; Perceived justice; Perceived usefulness; Privacy risk,33,Information Systems Frontiers,2013 1131,Demirkan H.; Sen S.; Goul M.; Nichols J.,Ensuring reliability in B2B services: Fault tolerant inter-organizational workflows,"In the age of Business-To-Business (B2B) collaboration, ensuring reliability of workflows underlying inter-organizational business processes is of significant importance. There are, however, quite a few challenges towards achieving seamless operation. Such challenges arise from heterogeneity in infrastructure and coordination mechanism at participant organizations, as well as time and cost associated with recovery from failure. Our research presents foundations for a reliable scheme for recovery from failure of workflow processes spanning through multiple business entities. First, a system model is adapted from the mobile computing literature that serves to establish the requirements to be enforced by each participating organization. In our model, we adopt the Maximal Sequence Path (MSP) approach from Yoo et al. (Lecture Notes in Artificial Intelligence 2132:222-236, 2001), as a means of decomposing workflows into mobile agent-driven processes that communicate via web services at each organization. This decomposition ensures defining logical points within the dynamics of a workflow instance for locating accurate and consistent states of the system for recovery in case of a failure. Then, a set of algorithms for various business scenarios are developed and presented as practical solutions. These algorithms are shown to create checkpoints such that the system is always in a globally consistent state. As such, these algorithms constitute a set of standards that can be incorporated in business process management suites that support reliable interorganizational collaboration. © Springer Science+Business Media, LLC 2011.",Business process management; Fault tolerance; Mobile computing; Reliability; Workflow management systems,6,Information Systems Frontiers,2012 1132,Wang S.; Hsu C.-H.; Liang Z.; Sun Q.; Yang F.,Multi-user web service selection based on multi-QoS prediction,"In order to find best services to meet multi-user's QoS requirements, some multi-user Web service selection schemes were proposed. However, the unavoidable challenges in these schemes are the efficiency and effect. Most existing schemes are proposed for the single request condition without considering the overload of Web services, which cannot be directly used in this problem. Furthermore, existing methods assumed the QoS information for users are all known and accurate, and in real case, there are always many missing QoS values in history records, which increase the difficulty of the selection. In this paper, we propose a new framework for multi-user Web service selection problem. This framework first predicts the missing multi-QoS values according to the historical QoS experience from users, and then selects the global optimal solution for multi-user by our fast match approach. Comprehensive empirical studies demonstrate the utility of the proposed method. © 2013 Springer Science+Business Media New York.",Multi-user; QoS; QoS prediction; Service selection; Web services,53,Information Systems Frontiers,2014 1133,Peinl R.; Maier R.,Simknowledge - Analyzing impact of knowledge management measures on team organizations with multi agent-based simulation,"Even though there is abundant literature on successful cases of organizations applying knowledge management (KM) measures, many KM initiatives have failed to achieve their knowledge and business goals. In order to foster decisions about the design of such initiatives, information is required on success factors and barriers when selecting KM measures. Multi agent-based simulation (MABS) is suggested as instrument to investigate potential effects of KM measures on dependent variables such as sharing of knowledge in organizations or business performance. For such a simulation, the concept of knowledge sharing, influencing factors and their impact on business and knowledge goals are modeled based on an extensive multi-disciplinary literature survey. An extensive domain model is operationalized in a simulation model which is then further simplified and implemented in a MABS tool used for a series of experiments contrasting results with/without KM measures, specifically skill and experience management. Skill management is found highly sensitive with respect to conditions of application and has no significant impact on knowledge or business goals. Experience management positively impacts knowledge and business goals. Personal documentation leads to specialist, project debriefings to generalist knowledge workers. Finally, the paper discusses the simulation's limitations and further areas of application. © Springer Science+Business Media, LLC 2010.",Knowledge management; Knowledge sharing; Knowledge work; Multi agent-based simulation; Team organization,10,Information Systems Frontiers,2011 1134,Cumbie B.A.; Sankar C.S.,Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process,"Given the difficulties and criticality of information sharing in a multi-agency setting, this paper looks at the IT governance mechanisms used to promote information sharing via shared boundary objects in the disaster response and recovery process. A longitudinal, descriptive case study relates the experiences of a community of disaster recovery stakeholders from a coastal region as they work together to share digital geospatial data on the community's physical utility infrastructure. Previous research is affirmed and extended in four empirically grounded research propositions addressing the nature of shared boundary objects, multi-agency governance, multi-agency performance metrics, and governance alignment. No exact governance configuration is deemed superior (except maybe avoidance of anarchy); however, there is a strong tendency not only to centralize, but also to retain localized control. © 2012 Springer Science+Business Media, LLC.",Disaster response and recovery; Information sharing; IT governance; Multi-agency governance; Shared boundary objects,20,Information Systems Frontiers,2012 1135,Barolli L.; Koyama A.; Durresi A.; De Marco G.,A web-based e-learning system for increasing study efficiency by stimulating learner's motivation,"Due to the opportunities provided by the Internet, more and more people are taking advantage of distance learning courses and during the last few years enormous research efforts have been dedicated to the development of distance learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is about 30%. One of the reasons is the low study desire when the learner studies the learning materials. In this research, we propose an interactive Web-based e-learning system. The purpose of our system is to increase the e-learning completion rate by stimulating learner's motivation. The proposed system has three subsystems: the learning subsystem, learner support subsystem, and teacher support subsystem. The learning subsystem improves the learner's study desire. The learner support subsystem supports the learner during the study, and the teacher support subsystem supports the teacher to get the learner's study state. To evaluate the proposed system, we developed several experiments and surveys. By using new features such as: display of learner's study history, change of interface color, encourage function, ranking function, self-determination of the study materials, and grouping of learners, the proposed system can increase the learning efficiency. © Springer Science+Business Media, LLC 2006.",E-learning; Grouping of learners; Increase of learning efficiency; Stimulating learner's motivation; Web-based systems,39,Information Systems Frontiers,2006 1136,Pencheva E.; Atanasov I.,Engineering of web services for internet of things applications,"This paper addresses web services for Internet of Things (IoT) applications. The research focus is on IoT applications for mobile monitoring and third party’s database access. Both web services design aspects and deployment issues are studied. By synthesis of functional abstraction for configuration management and performance monitoring, an approach to design RESTful web services for mobile monitoring is suggested. In addition to traditional operations supported by Database Management Systems, web services’ operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party’s database access. Web services deployment issues concern the access control aimed to prevent from overloading. A formal method for a model-based load evaluation of SOA (Service Oriented Architecture) application server is suggested. The method takes into account the distributed server architecture and the processing of heterogeneous traffic. The SOA application server’s utilization is evaluated by simulation. © Springer Science+Business Media New York 2014.",Application programming interfaces; Application server utilization evaluation; Database abstraction; Device management; Machine-to-Machine communications; Mobile monitoring,21,Information Systems Frontiers,2016 1137,Bharosa N.; Lee J.; Janssen M.,Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises,"Although various scholars have researched issues regarding disaster management, few have studied the sharing and coordinating of information during disasters. Not much empirical data is available in this field and there is sparse insight into the factors that may impede or facilitate information sharing and coordination among stakeholders. In this paper, we provide an overview of the relevant obstacles and challenges by examining existing literature and then investigating a series of multi-agency disaster management exercises, using observations and a survey. Although all the people who took part in our study agree that sharing information is important, for the success of their own organization as well as the exercise as a whole, the extent to which information is actually being shared among organizations is often limited by a number of factors that can be attributed to the community, agency and individual level. We found that relief workers are often more concerned with receiving information from others than with providing information to others who may benefit. Incentives for sharing information, understanding each other's work-processes and the usability of information systems have shown positive effects on information sharing and coordination. The findings of our study have been formulated using six grounded propositions, which can be used by system designers and policy-makers upon validation in further research. We also provide directions for future research. © 2009 Springer Science+Business Media, LLC.",Coordination; Crisis; Field exercise; Information sharing; System design,388,Information Systems Frontiers,2010 1138,Liu C.; Li Q.; Zhao X.,Challenges and opportunities in collaborative business process management: Overview of recent advances and introduction to the special issue,"Modern business process management expands to cover the partner organisations' business processes across organisational boundaries, and thereby supports organisations to coordinate the flow of information among organisations and link their business processes. With collaborative business processes, organisations can create dynamic and flexible collaborations to synergically adapt to the changing conditions, and stay competitive in the global market. Due to its significant potential and value, collaborative business processes are now turning to be an important issue of contemporary business process management, and attracts lots of attention and efforts from both academic and industry sides. In this paper, we review the development of B2B collaboration and collaborative business processes, provide an overview of related issues in managing collaborative business processes, and discuss some emerging technologies and their relationships to collaborative business processes. Finally, we introduce the papers that are published in this special issue. © 2008 Springer Science+Business Media, LLC.",Business process management; Collaborative business process; Pervasive computing; Process change and evolvement; Service-oriented architecture,79,Information Systems Frontiers,2009 1139,Fernández-Vilas A.; Díaz-Redondo R.P.; Servia-Rodríguez S.,IPTV parental control: A collaborative model for the Social Web,"Whether traditional TV or Internet multimedia content, parental control systems based on the intermediate filtering criteria of broadcasters or content producers may be not flexible enough. From parent’s perspective, the ideal scenario would be one in which they could dynamically decide about the suitability of any content. Since this desired scenario entails many practical problems, we propose an intermediate solution where parents delegate the decision of blocking any piece of TV content on a trustworthy set of parents. Our approach provides a collaborative parental control model based on two pillar: (1) a parenting social network where parents interact, freely give their opinion about TV content and tag this content (collaborative tagging); and (2) a model of trust relationship between parents. Regarding the deployment of parental control, we introduce a parental monitoring system for DVB-IPTV content, which is based on social technologies. The proposal combines information from the service provider and from parents in a social network to predict whether content should be blocked. © 2014, Springer Science+Business Media New York.",Collaborative tagging; Folksonomy; IPTV; Parental monitoring; Recommender; Social trust; Tag cloud,3,Information Systems Frontiers,2015 1140,Nath H.V.; Mehtre B.M.,Analysis of a multistage attack embedded in a video file,"In 1990s, burglars used to break into house, while the residents were viewing some interesting television shows. This type of attacks happened mainly in the physical world and it was expected that cyber world is free from such crimes. Unfortunately, this is not true. A skilled hacker could compromise a system, while the user is viewing (an interesting) video file. Quite often computer users, use their machines for viewing (interesting) videos. Such users may be naive users or could even be those who work on mission critical systems, like banking, defence, nuclear power-plant, space agencies etc. So playing a video file can lead to high security risk. In this paper, we have analysed video files, for detecting multistage attacks. We found that some video files contain malicious link through which an exploit gets downloaded into the host machine. The contribution of this paper is the discovery of novel attacks that are hidden (by perpetrator) in innocuous video files with the objective of staging a targeted attack in multiple stages. Finally, we propose a new method for detection of such attacks (carried through video files) using API calls. © 2015, Springer Science+Business Media New York.",APTs; Drive-by-download attack; Malicious video file; Multi-stage attacks; Novel attacks; Targeted attacks,3,Information Systems Frontiers,2015 1141,Coffey P.; Tate M.; Toland J.,"Small business in a small country: Attitudes to ""green"" IT","New Zealand is a small country and most of its businesses are small with 96 % of all enterprises employing fewer than 20 people. New Zealand takes pride in its ""clean green"" image, however small and medium sized businesses (SMEs) have limited resources, low awareness of the environmental impacts of the technologies they use, and perceive relatively few imperatives for changing their practices. In this paper we use institutional theory to frame a study of the factors which influence SMEs to adopt Green IS/IT practices. We found a diversity of viewpoints that suggest that adopting a one size fits all approach around encouraging organizations to adopt Green IS/IT is unlikely to be successful. However, it is doubtful that leadership in this area will arise in the small business sector, and coercive pressure from Government or other regulatory bodies is likely to be required. Market-place imperatives from customers and large players in supply chains can also be significant. Institutional theory was further used to understand the relative importance of these different pressures. These findings have relevance in other contexts as SMEs are the dominant form of business in many countries around the world and SMEs are estimated to have a combined contribution of around 70 % in terms of global pollution. © 2013 Springer Science+Business Media New York.",Economies of scale; Green IS/IT; Institutional theory; New Zealand; SMEs,32,Information Systems Frontiers,2013 1142,Kabir M.E.; Wang H.; Bertino E.,A role-involved purpose-based access control model,"This paper presents a role-involved purposebased access control (RPAC) model, where a conditional purpose is defined as the intention of data accesses or usages under certain conditions. RPAC allows users using some data for a certain purpose with Conditions (For instance, Tony agrees that his income information can be used for marketing purposes by removing his name). The structure of RPAC model is investigated after defining access purposes, intended purposes and conditional purposes. An algorithm is developed with role-based access control (RBAC) to achieve the compliance computation between access purposes (related to data access) and intended purposes (related to data objects). Access purpose authorization and authentication in the RPAC model are studied with the hierarchical purpose structure. According to the model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers' data. It extends role-based access control models to a further coverage of privacy preservation in database management systems by adopting purposes and conditional intended purposes and to achieve a fine-grained access control. The work in this paper helps enterprises to circulate a clear privacy promise, and to collect and manage user preferences and consent. © Springer Science+Business Media, LLC 2011.",Access control; Conditional purpose; Privacy,46,Information Systems Frontiers,2012 1143,Choe Y.C.; Park J.; Chung M.; Moon J.,Effect of the food traceability system for building trust: Price premium and buying behavior,"Facing a series of food-related accidents, consumers worldwide have become more concerned with the safety of the food they consume. The Food Traceability System has been introduced in many countries to reduce the uncertainties originating in the food purchasing process by providing information about the entire food process, from farm to table, in terms of quality and safety. However, this relatively new information system has not yet been explored with an academic approach. The main goal of this study was to determine whether reduced uncertainty provides benefits for producers and consumers, thereby warranting the adoption of the food traceability system. We also analyzed the factors and mechanisms that explain consumer behavior within the system. We have modified and applied the uncertainty model of Pavlou et al. (MIS Quarterly 31(1):105-136, 2007) derived from the principal-agent perspective in order to fulfill our research objectives. Through a survey conducted in Korea, we found that Korean consumers were not only willing to purchase greater quantities of food, but also willing to pay more for food managed with the traceability system. The results of this study indicate that the mitigated uncertainty given by the traceability system plays a key role in price premium and purchase intention. In addition, mitigated uncertainty has a larger impact on purchase intention than on price premium, implying that consumers are inclined to buy more rather than pay more. These results provide valuable suggestions for producers for how to deal with increased costs resulting from adoption of the system. We also found that in the context of the Food Traceability System, perceived uncertainty was mitigated as a result of a reduced fear of seller opportunism originating from increased trust and reduced information asymmetry originating from increased product diagnosticity, informativeness, and trust. Reduced fear of seller opportunism had a stronger impact than reduced information asymmetry on perceived mitigated uncertainty. © 2008 Springer Science+Business Media, LLC.",Food traceability systems; Pavlou's TAM; Price premium; Uncertainty,134,Information Systems Frontiers,2009 1144,Sipior J.C.; Ward B.T.,"Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation","The class of software which is ""surreptitiously installed on a user's computer and monitors a user's activity and reports back to a third party on that behavior"" is referred to as spyware ""(Stafford and Urbaczewski in Communications of the AIS 14:291-306, 2004)"". It is a strategic imperative that software vendors, who either embed surreptitious data collection and other operations in legitimate software applications or whose software is unwittingly used as a delivery vehicle for surreptitious operations, understand users' perceptions of trust, privacy, and legal protection of such software to remain competitive. This paper develops and tests a research model to explore application software users' perceptions in the use of software with embedded surreptitious operations. An experiment was undertaken to examine whether the presence of spyware in application software impacts users' perceptions and beliefs about trustworthiness of the application software, privacy control of the software vendor, United States legal protection, and overall trust of the software vendor. The results indicate users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi-dimensional construct reveals a software vendor's competence in appropriately using private user information collected and the user's belief that the vendor will abide by acceptable principles in information exchange are important influences in gaining users' overall trust in a vendor. User trust in software utilization is critical for a software vendor's success because without it, users may avoid a vendor's software should the presence of spyware be discovered. Software vendors should respond to the strategic necessity to gain users' trust. Vendors must institute proactive and protective measures to demonstrate that their software should be trusted. These protections could take the form of technological approaches or government legislation, or both. © 2007 Springer Science+Business Media, LLC.",Legal protection; Privacy; Spyware; Trust,5,Information Systems Frontiers,2008 1145,Nsakanda A.L.; Diaby M.; Cao Y.,An aggregate inventory-based model for predicting redemption and liability in Loyalty Reward Programs industry,"We propose a predictive model of redemption and liability to support short, medium, and long term planning and operational decision-making in Loyalty Reward Programs (LRPs). The proposed approach is an aggregate inventory model in which the liability of points is modeled as a stochastic process. An illustrative example is discussed as well as a real-life implementation of the approach to facilitate use and deployment considerations in the context of a frequent flyer program, an airline industry based LRP. © Springer Science+Business Media, LLC 2010.",Accumulation; Forecasting; Liability; Loyalty Reward Programs; Markov chain; Redemption,12,Information Systems Frontiers,2011 1146,Li G.; Wei M.,Everything-as-a-service platform for on-demand virtual enterprises,"While constructing virtual enterprises, it is crucial to flexibly integrate heterogeneous business resources and processes of different business partners and make them collaborate dynamically. Keeping involved IT systems or components as autonomous and loose-coupled services, the ""Everything as a Service"" concept supports flexible integration of heterogeneous applications. We adopt this concept and analyze the challenges in virtual enterprise construction, then propose a service platform for on-demand virtual enterprises. The platform supports flexible integration of networked resources, and facilitates virtual enterprise construction with business process utility, trusted service composition and data service centric business collaborations. At the end of the paper, together with a case study, experimental evaluations in contexts of concurrent multi-users are presented, showing the effectiveness and performance of the platform. © 2012 Springer Science+Business Media, LLC.",Cloud computing; Dynamic collaborations; Service oriented architectures; Service oriented computing; Virtual enterprises; Web based services,18,Information Systems Frontiers,2014 1147,Chen W.; Paik I.,Improving efficiency of service discovery using Linked data-based service publication,"It is considered that Web services have had a tremendous impact on the web as a potential silver bullet for supporting a distributed service-based economy on a global scale. However, despite the outstanding progress, their uptake on a web scale has been significantly less than initially anticipated due to higher usage thresholds. For instance, it is a hard task for service provider to seek appropriate semantic information such as OWL ontologies for service annotation in the service publication stage due to the fact that nowadays we are suffering from serious lack of available and ubiquitous ontologies for global consensus. Also it is not realistic for query users who do not possess much semantic knowledge to specify their requests with associated semantic information in the service discovery stage. In this paper, we propose a methodology to build a global social service network based on Link data principles for reducing the using thresholds. First, we propose Linked social service which is published on the open web by following Linked data principles with social link, and then we suggest a new platform for constructing a global social service network based on Linked social service. Then, an approach is proposed to enable exploitation of global social service network, providing Linked Social Service as a Service. Finally, experimental results show that the Linked social service can reduce the using threshold by enabling exploring service to service based on the global social service network. © 2012 Springer Science+Business Media, LLC.",Global social service network; Link-as-you-go; Linked data; Social link,25,Information Systems Frontiers,2013 1148,Yuan S.-T.D.; Chiu P.-W.,Persuasive narrative advertisement generator: A microenterprise service innovation perspective,"In the era of the service economy, service innovation is a means to cope with fierce competition within a fast-changing industry. However, most microenterprises are at a competitive disadvantage in that they have limited resources and information for putting service innovation into their business practice. Owing to their inferior situation, microenterprises often do not think service innovation is related to them, nor do they have the bravery to engage their innovation endeavors. This paper presents a novel and automatic approach that can generate persuasive narrative advertisements in the form of customized motivation stories intended to encourage microenterprises to consider innovation just as the protagonist does in a story. This study adopts a three-act structure as the story framework and takes advantage of Story of Mind elements, service innovation types and microenterprise individual information as the story elements. Our approach and its information system uses Probabilistic Extended FSMs to model the story frameworks and the story elements. The approach proposed here has preliminary been justified through the observational and analytical evaluation method and is believed to shed light on the development of automated persuasive narrative communications for electronic services. © 2015, Springer Science+Business Media New York.",Microenterprise; Motivation; Narrative advertising; Probabilistic extended FSM; Qualitative interpretation data analysis; Service innovation; Story generator,3,Information Systems Frontiers,2016 1149,Li J.; Wang H.J.; Bai X.,An intelligent approach to data extraction and task identification for process mining,"Business process mining has received increasing attention in recent years due to its ability to provide process insights by analyzing event logs generated by various enterprise information systems. A key challenge in business process mining projects is extracting process related data from massive event log databases, which requires rich domain knowledge and advanced database skills and could be very labor-intensive and overwhelming. In this paper, we propose an intelligent approach to data extraction and task identification by leveraging relevant process documents. In particular, we analyze those process documents using text mining techniques and use the results to identify the most relevant database tables for process mining. The novelty of our approach is to formalize data extraction and task identification as a problem of extracting attributes as process components, and relations among process components, using sequence kernel techniques. Our approach can reduce the effort and increase the accuracy of data extraction and task identification for process mining. A business expense imbursement case is used to illustrate our approach. © 2015, Springer Science+Business Media New York.",Business process management; Computational experiments; Data extraction; Process mining; Task identification; Text mining,28,Information Systems Frontiers,2015 1150,Scheepers H.; Scheepers R.,A process-focused decision framework for analyzing the business value potential of IT investments,"A key consideration during investment decision making is the overall business value potential of an information technology (IT) solution. The complexity of the contemporary IT landscape is increasing. As information systems and technologies become more advanced and interconnected, they often impact multiple business processes in the organization. This in turn increases the complexity of IT investment decisions. This paper describes a decision framework for considering investments in information technologies that impact multiple business processes in the organization. The decision framework is illustrated via a case study of a small business that invested in mobile and wireless computing. The microcosm of the small business serves to illustrate some aspects of the business value derived from information technology investments that are often challenging to isolate in more complex organizational environments. The decision framework can support managers to analyze the overall business value returns arising from the 'ripple effect' of an IT investment on core and ancillary business processes. In the decision framework, the business value ripple effect is analyzed via a vertical dimension that emanates from core business processes to ancillary processes, and a horizontal dimension that extends over time. © 2008 Springer Science+Business Media, LLC.",Business value; Decision framework; Mobile and wireless technology; Small and medium enterprises,35,Information Systems Frontiers,2008 1151,Shen A.X.L.; Cheung C.M.K.; Lee M.K.O.; Chen H.,How social influence affects we-intention to use instant messaging: The moderating effect of usage experience,"With the advent of Web 2.0, the business world is fast changing its way of communicating and collaborating. In this study, we regarded the use of instant messaging in team collaboration as a social behavior and examined the changing roles of social influence processes in the formation of usage we-intention (i.e. social intention). Building on the belief-desire-intention model and the social influence theory, an integrated model was developed and empirically tested using survey data collected from 482 students. The results demonstrated that desire partially mediates the effects of group norm and social identity on we-intention to use. In addition, the effect of group norm is more significant for users with lower usage experience, whereas the effect of social identity is more significant for users with higher usage experience. We believe this study provides several important implications for both research and practice. © Springer Science + Business Media, LLC 2009.",Desire; Experience; Instant messaging; Social computing; Social influence; We-intention; Web 2.0,148,Information Systems Frontiers,2011 1152,Choi R.H.; Wong R.K.,VXQ: A visual query language for XML data,"XML is the standard way of representing and storing rapidly-growing semi-structured data on the Internet. While XQuery has been proposed by W3C as the standard query language for XML data, the complexity of the language is the major overhead for users to express the queries and for software to process the queries efficiently. Considering mobile devices are more popular than desktop computers, expressing and/or processing XQuery becomes even more cumbersome on mobile devices. This paper proposes a visual XQuery specification language called VXQ. By intuitive abstractions of XML and XQuery, the proposed system can generate XQuery queries for users with little knowledge about XML and the language. The proposed visual language is easier to use and more expressive than previous proposals, and is also suitable for mobile devices where typing is not desired. Furthermore, we extend our proposed visual XQuery to support query rewriting and optimization for multiple XQuery systems. Experiments show that, in practice, our query rewriting reduces the query execution time significantly. © 2014, Springer Science+Business Media New York.",Mobile data; Query visualization; XML; XQuery,5,Information Systems Frontiers,2015 1153,Liu C.-L.; Yang H.-L.,Applying ontology-based blog to detect information system post-development change requests conflicts,"Post-development change requests are user requirements for information systems changes after development. Conflicts might occur as contradictive or inconsistent relationships between requests and existing system design. Detecting conflicts in post-developmenet change requests is an important task during requests management processes. To address this topic, this article proposes an ontology-based blog for automatically discovering conflicts in the extended use-case models of requests from users. This study proposed an information system maintenance process. The proposed approach applies ontologies to represent domain knowledge. A set of rules are used to detect conflicts. This study developed a prototype and invited two companies to evaluate it. Usage feedback opinions about ontology-based blog from two companies indicated the usefulness. The ontology-based blog is a relatively new approach which bridge requirements blogs with a formal and machine interpretable representational model. The automatic conflicts detection capability of the ontology-based blog can reduce the labor cost in requirements analysis phase. © 2011 Springer Science+Business Media, LLC.",Information system maintenance; Ontologies; Ontology-based blog; Requirements conflict detection,10,Information Systems Frontiers,2012 1154,Wang G.A.; Liu X.; Wang J.; Zhang M.; Fan W.,Examining micro-level knowledge sharing discussions in online communities,"Online communities of practice have become a popular knowledge source for both individuals and organizations. It is important to understand how to facilitate virtual knowledge sharing in online communities. Existing studies generally focus on system design factors or motivations behind knowledge sharing behavior. In this study we aim to investigate the knowledge sharing processes in online communities and identify process patterns that are indicative of effective knowledge sharing processes. We propose a computational framework to examine individual knowledge sharing processes in online communities from a process perspective. Our empirical evaluations show that effective knowledge sharing processes have distinct structural characteristics and communication network patterns compared to unhelpful knowledge sharing processes. Our research findings have practical implications for online community practitioners. © 2015, Springer Science+Business Media New York.",Communication network; Computer-mediated communication; Knowledge sharing; Network structural analysis; Online community,20,Information Systems Frontiers,2015 1155,Gerpott T.J.; Thomas S.; Weichert M.,"Usage of established and novel mobile communication services: Substitutional, independent or complementary?: An empirical study of residential mobile network operator customers in Germany","Past scholarly empirical work on consumption interrelationships between various categories of mobile network operator (MNO) services is mainly limited to established short message service (SMS) and voice calling. Research exploring the interplay between the consumption levels of these two MNO-provided services and the use intensity of the novel offering to access the Internet via cellular radio infrastructures (= mobile Internet [MI]) is scarce. This gap is addressed in the present article. Based on a review of theoretical perspectives on consumption relationships across mobile services a positive interdependence between the use intensities of the two traditional services and MI access is hypothesized. In addition, supplementary hypotheses and research questions on associations between personal background characteristics, device type and MI adoption time of cell customers on the one side and levels of SMS and voice service usage on the other are developed. ""System-captured"" measures on individual real service consumption behaviors and the remaining study variables are extracted from customer and billing data archives of the German subsidiary of a large international MNO. Regression analysis of data from 8,312 customers of this MNO indicates that MI use intensity (average monthly volume of mobile IP traffic generated by a subscriber in May and June 2011) is positively related to monthly number of SMS sent and outbound mobile voice minutes. The interrelationships are highly statistically significant but the absolute effect sizes are merely of ""small"" relevance. Age and male gender are strongly negatively related to SMS consumption. Subscription to an unmetered tariff scheme for SMS and voice has substantial influence both on SMS sent and outgoing voice minutes. SMS use intensity appears to be less price sensitive than outgoing voice minute quantities. The study variables explain only a negligibly small proportion of variance in incoming voice minutes. Practical implications for MNO and directions for future research are discussed. © 2012 Springer Science+Business Media, LLC.",Consumer behaviors; Consumption interrelationships; Device types; Mobile Internet use; Mobile voice service; Short message service (SMS); Use intensity,13,Information Systems Frontiers,2014 1156,Yu X.; Zhang Y.; Zhang T.; Wang L.; Hu J.; Zhao J.; Li X.,A model-driven development framework for enterprise Web services,"The growing scale and complexity of the enterprise computing systems under distributed and heterogeneous environments present new challenges to system development, integration, and maintenance. In this paper, we present a model driven Web service development framework to combat these challenges. The framework capitalizes on the unified modeling language (UML) profile for enterprise distributed object computing (EDOC), MDA (model-driven architecture) and Web services. Within the framework, firstly, a general PIM (platform independent models) is created using the EDOC CCA structural specification and CCA choreography specification which defines the general functions of a system. Secondly, the general PIM is broken down into sub-PIMs according to functional decomposition, each of which can provide service independently and will be implemented in a Web service. Thirdly, all of the PIMs are transformed to Web service interface models for publication and invoking. Afterward, transform each PIM to a BPEL specified Web service orchestration model. Finally, supported by model transform techniques, the sub EDOC PIMs are implemented into Web services on specific platforms. Automatic model transformation is the key to this framework, therefore, the transformation from EDOC CCA models to WSDL specified Web service interface models and the transformation from EDOC CCA models to BPEL specified Web service orchestration models are deeply discussed, and the detailed transformation rules are proposed. A case study is also provided to demonstrate the effectiveness of these rules and the merits of this framework. © 2007 Springer Science+Business Media, LLC.",EDOC; Model-driven development; Web services,17,Information Systems Frontiers,2007 1157,Huang S.Y.; Lee C.-H.; Chiu A.-A.; Yen D.C.,How business process reengineering affects information technology investment and employee performance under different performance measurement,"Business Process Reengineering (BPR) is an approach for business process transformation and unconstrained reshaping of all business processes. This study examines the impact of BPR on information technology (IT) investment and employee performance. In this study, it is considered to be likely that employee performance will be improved by performance measurement, and thus, we intend to set up a performance measurement process which is similar to the employee’s goal setting. To this end, this study examines the relationship existed between performance measurement and performance. The obtained results show a positive relation existing between IT and BPR implementation, and employee performance and BPR implementation. Moreover, the empirical result supports that performance measurement associated with cost reduction and lead time shortening in the internal processes and quality improvement in the external processes can improve the performance. © 2014, Springer Science+Business Media New York.","Business process reengineering, BPR; Information technology, IT; Performance, Performance measurement",36,Information Systems Frontiers,2015 1158,Ajila S.A.; Gakhar A.S.; Lung C.H.,Aspectualization of code clones—an algorithmic approach,"System Modularity has positive effects on software maintainability, reusability, and understandability. One factor that can affect system modularity is code tangling due to code clones. Code tangling can have serious cross-cutting effects on the source code and thereby affect maintainability and reusability of the code. In this research we have developed an algorithmic approach to convert code clones to aspects in order to improve modularity and aid maintainability. Firstly, we use an existing code-clone detection tool to identify code clones in a source code. Secondly, we design algorithms to convert the code clones into aspects and do aspect composition with the original source code. Thirdly, we implement a prototype based on the algorithms. Fourthly, we carry out a performance analysis on the aspects composed source code and our analysis shows that the aspect composed code performs as well as the original code and even better in terms of execution times. © 2013, Springer Science+Business Media New York.",Algorithm; Aspects mining; Code clones; Modularity; Performance analysis; Reuse,3,Information Systems Frontiers,2014 1159,Brown S.A.,"Household technology adoption, use, and impacts: Past, present, and future","Since the 1980s, researchers have been studying the phenomenon associated with technology being diffused to the household. In this paper, three themes in that stream of research, specifically adoption, use, and impacts, are explored. Key studies from prior research within each theme are discussed and directions for future research are offered. The directions for future research range from investigating adoption issues associated with the digital divide to understanding the impacts of new technology and social networking sites on individuals and families. The evolving nature of the technology continues to offer interesting research directions and challenges, with the study of unintended consequences of technology use presenting, perhaps, the greatest opportunities. © 2008 Springer Science+Business Media, LLC.",Adoption; Household; Technology impacts; Technology use,50,Information Systems Frontiers,2008 1160,Zhao J.L.; Tanniru M.; Zhang L.-J.,Services computing as the foundation of enterprise agility: Overview of recent advances and introduction to the special issue,"The advancement of web services in the last few years has spurred a number of revolutionary concepts in information technology and management including service-oriented architectures, service-oriented computing, and services science, management and engineering, which can be collectively called as ""services computing."" Services computing is a new research field that goes beyond traditional computing disciplines as it includes not only architectural, programming, deployment, and other engineering issues, but also management issues such as business component modeling, business process design, and service delivery. In this paper, we provide an overview of emerging research concepts in services computing without attempting to unify them as it will take sometime for the field to become mature. In addition, we take a position that the ultimate goal of services computing is to create the necessary technological and managerial foundation to support enterprise agility. In this short paper, we give an overview of services computing, describe its relationship to enterprise agility, and discuss basic technical and managerial issues. Finally, we introduce the papers that are published in this special issue. © Springer Science+Business Media, LLC 2007.","Agile enterprises; Service science, management and engineering (SSME); Service-oriented architecture; Service-oriented computing; Services computing; Services science; Web services",96,Information Systems Frontiers,2007 1161,Cavdur F.; Kumara S.,Network mining: Applications to business data,"This research addresses the problem of analyzing the temporal dynamics of business organizations. In particular, we concentrate on inferring the related businesses, i.e.; are there groups of companies that are highly correlated through some measurement (metric)? We argue that business relationships derived from general literature (i.e.; newspaper articles, news items etc.) may help us create a network of related companies (business networks). On the other hand, relative movement of stock prices can give us an indication of related companies (asset graphs). We also expect to see some relationships between these two kinds of networks. We adapt the asset graph construction approach from the literature for our asset graph implementations, and then, define our methodology for business network construction. Finally, an introduction to the exploration of some relationships between the asset graphs and business networks is presented. © 2012 Springer Science+Business Media, LLC.",Algorithms; Business systems; Financial systems; Network mining; Networks; Stock market,4,Information Systems Frontiers,2014 1162,Piramuthu S.,Vulnerabilities of RFID protocols proposed in ISF,"RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not surprisingly, this continues to be a very active area for research and development. Recently, the Information Systems Frontiers Journal published two papers dealing with RFID authentication protocols. The protocols introduced in these papers, however, are vulnerable to attacks from an active adversary.We identify some existing vulnerabilities in these authentication protocols. © Springer Science+Business Media, LLC 2010.",Cryptography; Protocol; RFID,12,Information Systems Frontiers,2012 1163,Zheng X.; Zeng D.; Wang F.-Y.,Social balance in signed networks,"The theory of social balance, also called structural balance, is first proposed by Heider in 1940s, which is utilized to describe the potential social dynamics process. This theory is of great importance in sociology, computer science, psychology and other disciplines where social systems can be represented as signed networks. The social balance problem is hard but very interesting. It has attracted many researchers from various fields working on it over the past few years. Many significant theories and approaches have been developed and now exhibit tremendous potential for future applications. A comprehensive review of these existing studies can provide us significant insights into understanding the dynamic patterns of social systems. Yet to our investigation, existing studies have not done this, especially from a dynamical perspective. In this paper, we make an attempt towards conducting a brief survey of these scientific activities on social balance. Our efforts aim to review what has been done so far in this evolving area. We firstly introduce the fundamental concepts and significant properties of social balance. Then we summarize the existing balance measures and present detecting/partitioning algorithms, as well as important empirical investigations in both physical world and cyberspace. We next mainly focus on describing and comparing the fundamental mechanisms of the dynamics models. Several existing problems not yet satisfactorily solved in this area are also discussed. © 2014, Springer Science+Business Media New York.",Dynamics model; Empirical study; Signed networks; Social balance,75,Information Systems Frontiers,2015 1164,Chivers H.; Clark J.A.; Nobles P.; Shaikh S.A.; Chen H.,Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise,"Insider attacks are often subtle and slow, or preceded by behavioral indicators such as organizational rule-breaking which provide the potential for early warning of malicious intent; both these cases pose the problem of identifying attacks from limited evidence contained within a large volume of event data collected from multiple sources over a long period. This paper proposes a scalable solution to this problem by maintaining long-term estimates that individuals or nodes are attackers, rather than retaining event data for post-facto analysis. These estimates are then used as triggers for more detailed investigation. We identify essential attributes of event data, allowing the use of a wide range of indicators, and show how to apply Bayesian statistics to maintain incremental estimates without global updating. The paper provides a theoretical account of the process, a worked example, and a discussion of its practical implications. The work includes examples that identify subtle attack behaviour in subverted network nodes, but the process is not network-specific and is capable of integrating evidence from other sources, such as behavioral indicators, document access logs and financial records, in addition to events identified by network monitoring. © 2010 Springer Science+Business Media, LLC.",Bayesian; Behavioural; Evidence; Insider; Intrusion detection; Network; Security; Subtle attack,22,Information Systems Frontiers,2013 1165,Lee J.; Lee J.-N.; Tan B.C.Y.,Antecedents of cognitive trust and affective distrust and their mediating roles in building customer loyalty,"The present research investigates how trust and distrust differently mediate in customer perceptions of various web features in the process of building customer loyalty. Assuming trust and distrust are different in their psychological aspects, we propose that trust is a cognitively active construct, whereas distrust is an affectively active construct. To support this proposal, we select six antecedents of trust and distrust and hypothesize their different relationships as follows: 1) Antecedents with capability-based elements, such as site convenience and content relevance, are associated with trust; 2) Antecedents with relationship-affecting elements, such as customer involvement and web fraud, are associated with distrust; 3) Antecedents with both elements, such as content truthfulness and customer responsiveness, are associated with both trust and distrust. A survey is conducted on 279 online shopping mall users in Korea, and the result shows that most of the foregoing hypotheses are supported. The finding suggests: 1) Trust emerges when customers expect positive result with confidence, thereby implying that it is cognitively activated; 2) Distrust emerges when customers suspect that the seller has a vicious motivation, thereby implying that it is affectively activated. From these premises, the present study contributes to the literature by showing how trust and distrust are different, and why they should be managed differently to establish customer loyalty. © 2012, Springer Science+Business Media New York.",Affect; Cognition; Customer loyalty; Distrust; Trust,80,Information Systems Frontiers,2015 1166,Hossain M.A.; Quaddus M.,Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts,"Understanding the adoption factors of a technological innovation is crucial. However, it is a wild assumption that these factors are of similar importance for mandatory and voluntary adoption. Hence, understanding the distinction is critical because, more than often an innovation is adopted with different organizational objectives—though operate in a same industry for a same application. The purpose of this study is to compare the organizational adoption factors of a technological innovation in mandatory and voluntary setting, taking Radio Frequency Identification (RFID) technology as the case innovation. The results indicate that perceptions of the adopters differ significantly on technological, organizational, and environmental characteristics and expectation when the contexts are different. Multi-group analysis confirms that, among the technological factors, compatibility is the major concern in a mandatory setting whereas cost and expected-benefits are the main for voluntary adoption; organization’s attitude is more important than organizational resources—in both contexts; and, external pressure is important both in mandatory as well as voluntary environment. © 2014, Springer Science+Business Media New York.",Adoption; Environment; Expectation; Mandatory; RFID; Voluntary,18,Information Systems Frontiers,2015 1167,Panchenko O.; Plattner H.; Zeier A.B.,Efficient storage and fast querying of source code,"Enabling fast and detailed insights over large portions of source code is an important task in a global development ecosystem. Numerous data structures have been developed to store source code and to support various structural queries, to help in navigation, evaluation and analysis. Many of these data structures work with tree-based or graph-based representations of source code. The goal of this project is to elaborate a data storage that enables efficient storing and fast querying of structural information. The naive adjacency list method has been enhanced with the use of recent data compression approaches for column-oriented databases to allow no-loss albeit compact storage of fine-grained structural data. The graph indexing has enabled the proposed data model to expeditiously answer fine-grained structural queries. This paper describes the basics of the proposed approach and illustrates its technical feasibility. © 2010 Springer Science+Business Media, LLC.",Global code repository; Source code analysis; Source code search; Structural information,2,Information Systems Frontiers,2011 1168,Fan S.; Kang L.; Zhao J.L.,Workflow-aware attention tracking to enhance collaboration management,"Current Workflow Management Systems only capture the start time and end time of tasks and it is difficult for managers to track how much time is actually spent on a particular task if multiple tasks are performed concurrently. Thus, managers may have problems accurately arranging tasks and evaluating costs. In order to facilitate collaboration management in multitasking environments, we propose a workflow-aware attention tracking framework that integrates the concept of attention with workflow models. We first design the meta-model of workflow-aware attention tracking. We further derive seven rules for attention tracking in multitasking collaboration using Object Constraint Language. Based on the rules and meta-model, we develop a procedure for attention rule verification, and present an architecture for workflow-aware attention tracking systems. This research contributes to workflow management by adding attention awareness for collaboration management in multitasking environments. © 2015, Springer Science+Business Media New York.",Accountability; Attention tracking; Collaboration management; Meta-model; Workflow management system,5,Information Systems Frontiers,2015 1169,Woo J.; Ivezic N.; Cho H.,Agile test framework for business-To-business interoperability,"Business-To-business (B2B) applications are tested routinely for conformance and interoperability against a set of data exchange standards before deployment. However, the existence of many data exchange standards, planned utilizations, deployment environments, and testing scenarios makes it difficult to develop reusable testing tools. To address this challenge, we propose the Agile Test Framework (ATF), which consists of a test case design and test execution model. Test case is defined at two levels: Abstract and executable. The abstract level addresses issues related to human understanding and the executable level addresses issues related to machine processing. The test execution model addresses issues related to both reusability and plug-compatibility. The ATF allows the test engineer to generate test cases for a variety of standards and scenarios. Thus, it increases reusability, extensibility, and efficiency compared to other test frameworks. © Springer Science+Business Media, LLC 2011.",Agile Test Framework (ATF; Business-To-business (B2B) integration; Conformance testing; Interoperability testing; Standards; Test automation; Test case generation,4,Information Systems Frontiers,2012 1170,Singh R.I.; Sumeeth M.; Miller J.,A user-centric evaluation of the readability of privacy policies in popular web sites,"This paper reports on a formal subject-based experiment, which seeks to evaluate the readability of privacy policy statements found on the Internet. This experiment uses 50 participants and privacy policies collected from 10 of the most popular web sites on the Internet. It evaluates, using a cloze test, the subjects' ability to comprehend the content of these privacy policies. The paper also compares its results with the results from previous studies on this topic. In general, it finds that privacy policies are ""difficult"" to comprehend. © 2010 Springer Science+Business Media, LLC.",Cloze test; Privacy policies; Privacy statements; Readability formulas; Top ten privacy statements; Triangulation,31,Information Systems Frontiers,2011 1171,Chien B.-C.; Hu C.-H.; Ju M.-Y.,Learning fuzzy concept hierarchy and measurement with node labeling,"A concept hierarchy is a kind of general form of knowledge representation. Most of the previous researches on describing the concept hierarchy use tree-like crisp taxonomy. However, concept description is generally vague for human knowledge; crisp concept description usually cannot represent human knowledge actually and effectively. In this paper, the fuzzy characteristics of human knowledge are studied and employed to represent concepts and hierarchical relationships among the concepts. An agglomerative clustering scheme is proposed to learn hierarchical fuzzy concepts from databases. Further, a novel measurement approach is developed for evaluating the effectiveness of the generated fuzzy concept hierarchy. The experimental results show that the proposed method demonstrates the capability of accurate conceptualization in comparison with previous researches. © 2008 Springer Science+Business Media, LLC.",Clustering; Concept hierarchy; Fuzzy concept hierarchy; Fuzzy confidence; Fuzzy entropy,7,Information Systems Frontiers,2009 1172,Nguyen B.V.; Burstein F.; Fisher J.,Improving service of online health information provision: A case of usage-driven design for health information portals,"Health information portals (HIPs) are now well-established channels for providing reliable and relevant health information as a service to health information consumers. The concept of a smart health information portal was proposed to improve the search experience of HIP users, advancing HIPs learning capability by looking at usage data. This paper describes a design-science research project which utilized insights from usage data to address search issues. A conceptual approach and an architecture to enable usage-driven capability are described. We propose two specific applications, a HIP-specific content issue reporting tool and a topic search feature, to demonstrate how usage data can enhance HIP operations and users’ search experience. Based on the demonstrated implementations and empirical analysis, this paper also discusses how usage-driven design can lead to improved service in online health information provision. © 2014, Springer Science+Business Media New York.",Design research; Health information portal; Usage data analysis; Usage-driven design,19,Information Systems Frontiers,2015 1173,Seethamraju R.,Adoption of Software as a Service (SaaS) Enterprise Resource Planning (ERP) Systems in Small and Medium Sized Enterprises (SMEs),"Enterprise Resource Planning (ERP) systems are now offered on the cloud under the Software as a Service (SaaS) model. For small and medium sized enterprises (SMEs), this is considered the best opportunity to take advantage of the capabilities of an ERP system without the investment and management costs associated with the on-premise model. Using a cross-sectional field study conducted across four case study organizations, this study investigated the determinants and challenges in the adoption of SaaS ERP systems by SMEs. The study found that the determining factors in deciding to adopt SaaS ERP are software vendor’s reputation in the market, software fit to the business, the potential willingness of the vendor to support the customer throughout the product life cycle, the vendor’s participation in co-creation of value for customers and the generic benefits of implementing an integrated ERP system. With switching considered a costly option, accounting shift of capital costs to operating expenses is considered advantageous by firms. Competitive pressures faced by the enterprise, external factors, concerns about data security and system performance have no influence on adoption decision, according to this study. Change management and increasing the effectiveness of use are challenges, but the willingness of the software vendor to work with organizations’ requests for changes and improvements and the continuous co-creation of value through improved product offerings is reassuring to the firms in the post-implementation phase. © 2014, Springer Science+Business Media New York.",Adoption; ERP; SaaS; SMEs,210,Information Systems Frontiers,2015 1174,Li M.; Liu L.; Yin L.; Zhu Y.,A process mining based approach to knowledge maintenance,"The quality of knowledge in the knowledge repository determines the effect of knowledge reusing and sharing. Knowledge to be reused should be checked in advance through a knowledge maintenance process. The knowledge maintenance process model is difficult to be constructed because of the balance between the efficiency and the effect. In this paper, process mining is applied to analyze the knowledge maintenance logs to discover process and then construct a more appropriate knowledge maintenance process model. We analyze knowledge maintenance logs from the control flow perspective to find a good characterization of knowledge maintenance tasks and dependencies. In addition, the logs are analyzed from the organizational perspective to cluster the performers who are qualified to do the same kinds of tasks and to get the relations among these clusters. The proposed approach has been applied in the knowledge management system. The result of the experiment shows that our approach is feasible and efficient. © 2010 Springer Science+Business Media, LLC.",Knowledge maintenance; Knowledge management; Process mining,23,Information Systems Frontiers,2011 1175,Rana N.P.; Dwivedi Y.K.; Williams M.D.,A meta-analysis of existing research on citizen adoption of e-government,"The purpose of this paper is to perform a weight-analysis and to undertake a meta-analysis of findings reported in published research on the adoption and diffusion of e-government. Usable data relating to e-government adoption research were collected from 103 empirical studies. Of those 103 articles, only 63 used a range of different constructs with appropriate correlation values required for performing a weight- and meta-analysis. Diagrammatic representation has been presented using significant as well as non-significant relationships from all 103 publications. A broader analysis of research on adoption and diffusion of e-government also reflects that although a large number of theories and theoretical constructs were borrowed from the reference disciplines, their utilization by e-government researchers appears to be largely random in approach. This paper also acknowledges the theoretical contribution, the limitations of this study, and suggests further research directions for the continued work. © 2013, Springer Science+Business Media New York.",Citizen adoption; E-Government; Meta-analysis; Theoretical constructs; Weight analysis,209,Information Systems Frontiers,2015 1176,Shareef M.A.; Kumar V.; Dwivedi Y.K.; Kumar U.,Service delivery through mobile-government (mGov): Driving factors and cultural impacts,"The mobile-Government (mGov) service system is conducted through an open network, and it is virtual. This service mode and pattern change inevitably necessitates a behavioral change in citizen attitudes and intentions. Nevertheless, this new pattern of service delivery through mGov has hardly been systematically investigated by any researchers. The objective of this current research is twofold. First, we attempt to reveal the sources of beliefs for developing intention toward the mGov (ITM) system. Then, as the second objective, we investigate cultural influence as the reason for a difference in consumer attitudes and intentions toward mGov. In this regard, the empirical study was conducted in Bangladesh and the USA, which have potential differences in the cultural traits listed by Hofstede. From our statistical analysis, we have identified the sources of beliefs for both Bangladeshi and USA consumers.We observed clear differences in sources of beliefs and their influence on attitudes leading to intention, which demonstrates support for our second objective which was designed to verify the cultural impacts on belief-attitude relations.We understand that these different sources of beliefs influence cognitive, affective, and connative attitudes toward mGov in different ways. © Springer Science+Business Media New York 2014.",Attitude; Belief; Consumer behaviors; Cross-culture; Hofstede’s cultural traits; Intention; Mobile innovation; Mobile-government (mGov),93,Information Systems Frontiers,2016 1177,Bunker D.; Levine L.; Woody C.,Repertoires of collaboration for common operating pictures of disasters and extreme events,"Disasters are dynamic, emergent scenarios involving diverse stakeholders in complex decision making and as such, disaster response systems must account for these conditions. We suggest that emergency service agencies should consider supplementing their traditional command and control approaches and common operating pictures (COP), with purposeful collaborative approaches. These would facilitate the generation of common operating pictures incorporating dynamic and emergent characteristics, providing a range of options with which to better respond to disasters. Collaborative management and negotiated integration of information represent a paradigmatic shift in our thinking about disaster response. We have utilized McCann’s (1983) Social Problem Solving Negotiated Arrangements (SPS-NA) to highlight problems with conventional approaches during three disaster scenarios. As a result of lessons learned from this analysis we suggest that developing supplementary repertoires of collaboration would have a positive impact on improved COP for effective disaster response outcomes. © 2014, Springer Science+Business Media New York.",Collaboration; Common operating pictures; Disaster response; Extreme events; Negotiated arrangements,44,Information Systems Frontiers,2015 1178,Fisher J.; Hirschheim R.; Jacobs R.,Understanding the outsourcing learning curve: A longitudinal analysis of a large Australian company,"Outsourcing continues to capture the attention of researchers as more companies move to outsourcing models as part of their business practice. Two areas frequently researched and reported in the literature are the reasons why a company decides to outsource, and outsourcing success factors. This paper describes an in-depth, longitudinal case study that explores both the reasons why the company decided to outsource and factors that impact on success. The paper describes how Alpha, a very large Australian communications company, approached outsourcing and how its approach matured over a period of 9 years. The paper concludes that although a number of reasons are proposed for a company's decision to outsource, lowering costs was the predominant driver in this case. We also describe other factors identified as important for outsourcing success such as how contracts are implemented, the type of outsourcing partner arrangement, and outsourcing vendor capabilities. © 2008 Springer Science+Business Media, LLC.",Case study; Interpretative analysis; IT services; Learning curve; Longitudinal analysis; Outsourcing; Phases of outsourcing,69,Information Systems Frontiers,2008 1179,Kim S.; Cho N.W.; Lee Y.J.; Kang S.-H.; Kim T.; Hwang H.; Mun D.,Application of density-based outlier detection to database activity monitoring,"To prevent internal data leakage, database activity monitoring uses software agents to analyze protocol traffic over networks and to observe local database activities. However, the large size of data obtained from database activity monitoring has presented a significant barrier to effective monitoring and analysis of database activities. In this paper, we present database activity monitoring by means of a density-based outlier detection method and a commercial database activity monitoring solution. In order to provide efficient computing of outlier detection, we exploited a kd-tree index and an Approximated k-nearest neighbors (ANN) search method. By these means, the outlier computation time could be significantly reduced. The proposed methodology was successfully applied to a very large log dataset collected from the Korea Atomic Energy Research Institute (KAERI). The results showed that the proposed method can effectively detect outliers of database activities in a shorter computation time. © 2010 Springer Science+Business Media, LLC.",Approximated k-nearest neighbors; Database monitoring; Density-based outlier detection; Intrusion detection; kd-tree,25,Information Systems Frontiers,2013 1180,Ma J.; Zeng D.; Zhao H.,Modeling the growth of complex software function dependency networks,"Software engineering efforts can potentially benefit much from a good understanding of the structures of existing software systems and the processes governing their development. Towards that end, we study software systems by means of the complex network analysis framework. We model a software package as a network, with nodes representing the functions in the package and edges representing the dependencies among the functions. Our empirical analysis of five widely-adopted open-source software packages reveals a set of interesting features of such networks, which cannot be adequately reproduced by existing complex network models. We then set out to develop a new network growth model, explicitly imitating generally-advocated software development principals, such as divide-and-conquer, modularization, high intra-module cohesion, and low inter-module coupling. Results of our analytical derivations and numeric studies show that our model can more closely reproduce the particular features exhibited by real-world software packages, thus hopefully better explaining the phenomena of concern. © Springer Science+Business Media, LLC 2012.",Cohesion and coupling; Complex networks; Network growth model; Software systems,16,Information Systems Frontiers,2012 1181,Han S.; Youn H.Y.; Song O.,Efficient category-based service discovery on multi-agent platform,"Today, multi-agent technologies are widely used for realizing prevalent ubiquitous computing applications, in which service discovery is a critical task for finding a particular service instance. While JADE is a popular system for multi-agent applications, its directory facilitator (DF) used for service discovery employs a sequential search approach, which shows degraded performance when the number of registered services becomes large. This paper proposes a new DF scheme employing the category-based classification and search approach. It greatly reduces the search space and allows accurate matchmaking. The DF implemented with the proposed approach and JADE-DF are compared in terms of query response time and memory space requirement. It demonstrates that the proposed DF allows faster query processing than JADE-DF and requires smaller memory space, especially for a large number of services and queries of multiple parameters. © Springer Science+Business Media, LLC 2010.",Agent platform; Category based search; Context-awareness; Middleware; Service discovery,4,Information Systems Frontiers,2012 1182,Ali S.; Green P.,Effective information technology (IT) governance mechanisms: An IT outsourcing perspective,"Effective IT governance will ensure alignment between IT and business goals. Organizations with ineffective IT governance will suffer due to poor performance of IT resources such as inaccurate information quality, inefficient operating costs, runaway IT project and even the demise of its IT department. This study seeks to examine empirically the individual IT governance mechanisms that influence the overall effectiveness of IT governance. Furthermore, this study examines the relationship of effective IT governance, the extent of IT outsourcing decisions within the organizations, and the level of IT Intensity in the organizations. We used structural equation modeling analysis to examine 110 responses from members of ISACA (Information Systems and Audit Control Association) Australia in which their organizations have outsourced their IT functions. Results suggest significant positive relationships between the overall level of effective IT governance and the following mechanisms: the involvement of senior management in IT, the existence of ethic or culture of compliance in IT, and corporate communication systems. © Springer Science+Business Media, LLC 2012.",Australia; IT Governance; IT Intensity; IT Outsourcing; SEM,159,Information Systems Frontiers,2012 1183,Rao R.A.; De’ R.,Technology assimilation through conjunctures – a look at IS use in retail,"We study the assimilation of information technology by an organization establishing itself in the emerging retail industry in India. We highlight the need for conducting a holistic analysis of the assimilation process that considers the role of various organizational actors, the socio-technical environment, the exogenous factors and the historical context under which the organization is operating. We adopt strong structuration theory, a refinement of Giddens’ structuration theory, as the theoretical lens for studying the technology assimilation process. We combine this with actor network theory to incorporate the socio-technical perspectives. An organization in the Indian retail industry is selected as the empirical context. We analyzed the assimilation process as a series of conjunctures and illustrate how the socio-technical changes, the situated actions and the conjuncture’s context influence the assimilation process. We also highlight the influence of historical context, and the role of organizational actors and actants in the technology assimilation process. © 2014, Springer Science+Business Media New York.",Actor network theory; Conjunctures; Retail information systems; Strong structuration theory; Technology assimilation,9,Information Systems Frontiers,2015 1184,Hayne S.C.; Troup L.J.; McComb S.A.,"""Where's Farah?"": Knowledge silos and information fusion by distributed collaborating teams","The Cognitively-Based Rapid Assessment Methodology (C-RAM) system manages multiple-user interactions as users work with multiple information sources. Further, it allows users to view, exchange, organize, and combine the information available and it facilitates group decision-making. Three-member teams, randomly assigned in either the (a) view others' whiteboards or (b) cannot view others' whiteboards conditions, completed an intelligence analysis and mission planning task. Each team member was given access to a virtual whiteboard populated with decision cards (DCards) containing intelligence information constrained to a specific area of expertise. DCards can be assessed (rated) for decision impact and importance and team members have access to all DCards regardless of experimental condition. Team members who can view their teammates' whiteboards during collaborative activities achieve significantly higher performance. When compared to teams unable to view others' whiteboards, they move their own DCards less frequently, add fewer additional DCards to their own whiteboards, and rate others' DCards less frequently. Additionally, rating one's own DCards is the only process positively related team performance. © 2010 Springer Science+Business Media, LLC.",Collaboration; Decision making; Knowledge management; Shared cognition,11,Information Systems Frontiers,2011 1185,Kim S.; Garrison G.,Investigating mobile wireless technology adoption: An extension of the technology acceptance model,"This research represents a theoretical extension of the Technology Acceptance Model (TAM), which IS researchers have used to explain technologies' perceived usefulness and individuals intention to use it. The authors developed a model, referred to as the Mobile Wireless Technology Acceptance Model (MWTAM), to test the relationship between theoretical constructs spanning technological influence processes (Perceived Ubiquity, and Perceived Reachability) and cognitive influence processes (Job Relevance, Perceived Usefulness, and Perceived Ease of Use) and their impact on Behavioral Intention. MWTAM is assessed using data collected from an online survey and analyzed using AMOS 5.0. Results provide evidence to support MWTAM as both the technological and cognitive influence processes accounted for 58.7% of the variance explained in an individual's Behavioral Intention toward using mobile wireless technology. Additionally, the path coefficients between constructs ranged from 0.241 to 0.572 providing further evidence to support the theoretical extension of TAM. © 2008 Springer Science+Business Media, LLC.",Mobile wireless technology; Technology acceptance model; Technology adoption,241,Information Systems Frontiers,2009 1186,He S.; Song R.; Chaudhry S.S.,Service-oriented intelligent group decision support system: Application in transportation management,"In today’s ever changing consumer driven market economy, it is imperative for providers to respond expeditiously to the changes demanded by the customer. This phenomenon is no different in the transportation sector in which a service-oriented Group Decision Support System (GDSS) provides an important role in transportation enterprise to effectively manage and rapidly respond to the varying needs of the customer. In this paper, we explore the integration problem of service-oriented system and intelligence technology through the use of a GDSS. Initially, we analyze a service-oriented architecture and then, propose the design architecture of a service-oriented GDSS. Next, we put forward a general framework that integrates the intelligent techniques as a component into the architecture of service oriented GDSS. In addition, we illustrate how Artificial Intelligence techniques can resolve the conflicts of distributed group decisions. The paper is concluded by providing a number of applications in the railway management system that demonstrates the benefits of the utilization of a service oriented intelligent GDSS. © 2013, Springer Science+Business Media New York.",Artificial intelligence; Group decision support system; Management; Service-oriented architecture; Transportation,27,Information Systems Frontiers,2014 1187,Li P.; Rao H.R.,An examination of private intermediaries' roles in software vulnerabilities disclosure,"Software vulnerability disclosure has generated much interest and debate. Recently some private intermediaries have entered this market. This paper examines the effects of such private intermediaries on optimal timing of disclosure policy made by public intermediaries and vendors' reactions. Our analysis of private intermediaries' role suggests that public intermediary's optimal disclosure time does not change with private intermediary's participation. However, a vendor's patch time increases when the probability of information leakage is low, if not non-existent. In other words, private intermediaries' service decreases a vendor's willingness to deliver quick patches. Empirical evidence with 1493 vulnerability observations from CERT/CC and other 326 different vulnerability observations from iDefense provided support for our analytical results. © 2007 Springer Science+Business Media, LLC.",Disclosure; Private intermediary; Software vulnerability,22,Information Systems Frontiers,2007 1188,Tan K.H.; Wong W.P.; Chung L.,Information and Knowledge Leakage in Supply Chain,"The current world of post industrial value generation sees companies increasingly analyzing their internal operations against their external organizations to identify supply/demand fluctuations along the supply chain. Within these integrated relationships between internal and external parties in the supply chain, knowledge and information have become very important production resources. The existence and success of an increasing number of organizations strongly depend on their capabilities to utilize knowledge and information for profit generation. By managing more efficient information sharing, the volume of company confidential information passing through the supply chain increases, and this brings about more incidences of knowledge leakage and information leakage. A survey by PricewaterhouseCoopers in 2014 shows information security spending over the next 12 months would increase 60.27 % in Asia and 48.98 % in all regions. This emphasizes the importance of information privacy and therefore the necessity to study the information and knowledge leakage in integrated supply chain. The objectives of this study are to investigate the factors triggering information and knowledge leakage and create a mitigation framework to soften the impact of leakages on performance. The above objectives will be met by formulating and examining several hypotheses of a conceptualized information leakage (IL) and knowledge leakage (KL) framework. A case study derived from a structured interview is adopted as a methodology in this research. As a result, this paper contributes a novel theoretical model that characterizes information and knowledge leakage in an integrated supply chain. Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management. © 2015, Springer Science+Business Media New York.",Information; Knowledge leakage; Supply chain management,74,Information Systems Frontiers,2016 1189,Foorthuis R.; van Steenbergen M.; Brinkkemper S.; Bruls W.A.G.,A theory building study of enterprise architecture practices and benefits,"Academics and practitioners have made various claims regarding the benefits that Enterprise Architecture (EA) delivers for both individual projects and the organization as a whole. At the same time, there is a lack of explanatory theory regarding how EA delivers these benefits. Moreover, EA practices and benefits have not been extensively investigated by empirical research, with especially quantitative studies on the topic being few and far between. This paper therefore presents the statistical findings of a theory-building survey study (n = 293). The resulting PLS model is a synthesis of current implicit and fragmented theory, and shows how EA practices and intermediate benefits jointly work to help the organization reap benefits for both the organization and its projects. The model shows that EA and EA practices do not deliver benefits directly, but operate through intermediate results, most notably compliance with EA and architectural insight. Furthermore, the research identifies the EA practices that have a major impact on these results, the most important being compliance assessments, management propagation of EA, and different types of knowledge exchange. The results also demonstrate that projects play an important role in obtaining benefits from EA, but that they generally benefit less than the organization as a whole. © 2015, UWV (Uitkeringsinstituut Werknemers Verzekeringen).",Architectural insight; Benefits; Compliance; Enterprise architecture; Exploratory study; Formative measurement; Organizational performance; Partial least squares; Projects; Question-driven research,84,Information Systems Frontiers,2016 1190,Rana N.P.; Dwivedi Y.K.; Williams M.D.; Weerakkody V.,Investigating success of an e-government initiative: Validation of an integrated IS success model,"The purpose of this paper is to examine the success (by measuring intention to use and user satisfaction) of the online public grievance redressal system (OPGRS) from the perspective of the citizens of India. The success of this e-government system is examined using an integrated IS success model. The model developed includes the constructs such as system quality, information quality, service quality, perceived usefulness, perceived ease of use, perceived satisfaction, perceived risk, and behavioral intention. The proposed integrated research model of IS was validated using the response taken from 419 citizens from different cities of India. The empirical outcomes provided the positive significant connections between all 12 hypothesised relationships between eight constructs. The empirical evidence and discussion presented in the study can help the government to improve upon and fully utilise the potential of the OPGRS as a useful tool toward a transparent and corruption free country. © 2014, Springer Science+Business Media New York.",DeLone and McLean; E-government; India; Online public grievance redressal system; OPGRS; Seddon,239,Information Systems Frontiers,2015 1191,Tesoriero R.; Gallud J.A.; Lozano M.; Penichet V.M.R.,Enhancing visitors' experience in art museums using mobile technologies,"Mobile technologies are present in our daily life and the functionality of these devices should not be restricted to support phone calls or to organize people's work. We live in a world of connectivity and mobile devices allow users to access a great variety of resources using IR, Wi-Fi, RFID, Bluetooth, GPS, GPRS, and so on. In particular, PDA and smartphones are being successfully applied to cultural heritages as an alternative to traditional audio-guides. These electronic guides are offered to users in order to make the visit to the exhibition more pleasant and effective. Our research group has been working in the design and development of mobile software for art museums based on PDA for the past four years. During this period two systems were developed. This paper summarizes the basic features of both applications. The first one is currently operating in a real museum. These applications have been designed by applying a user-centered development process and the main goal of these systems is to improve visitors' satisfaction by using the PDA while visiting the museum. As the result of usability evaluations performed with real users on the first application, the definition, implementation and evaluation of a new system was conceived. Moreover, the paper describes how personalization issues influenced the development of the system. Location-awareness, internationalization, HCI patterns, language adaptation to visitors and accessibility issues were the most important contributions to personalize the application. The final evaluation performed on the system has proved that the main goals initially stated were successfully achieved. © 2012 Springer Science+Business Media, LLC.",Art museums; HCI patterns; Location-awareness; Mobile devices; Ubiquitous computing; User centered design; User centered development,35,Information Systems Frontiers,2014 1192,Sun J.; Qu Z.,Understanding health information technology adoption: A synthesis of literature from an activity perspective,"The vast body of literature on health information technology (HIT) adoption features considerably heterogeneous factors and demands for a synthesis of the knowledge in the field. This study employs text mining and network analysis techniques to identify the important concepts and their relationships in the abstracts of 979 articles of HIT adoption. Through the lens of Activity Theory, the revealed concept map of HIT adoption can be viewed as a complex activity system involving different users, technologies and tasks at both the individual level and the social level. Such a synthesis not only discloses the current knowledge domain of HIT adoption, but also provides guidance for future research on HIT adoption. © 2014, Springer Science+Business Media New York.",Activity theory; Health information technology; Literature synthesis; Network analysis; System adoption; Text mining,32,Information Systems Frontiers,2015 1193,Yang C.-G.; Lee H.-J.,A study on the antecedents of healthcare information protection intention,"This study investigates the antecedents of HIPI (Healthcare Information Protection Intention) of HIS (Healthcare Information Systems) users by introducing a model which incorporates constructs from GDT (General Deterrence Theory) and PMT (Protection Motivation Theory). The results show that (1) a clear awareness of the consequences of security threats increases HIS users’ understanding on the severity of healthcare information leakage, and thus may decreases abuse of HIS by users; (2) user satisfaction with the security system may make them have self-efficacy that they can handle the medical information leakage issue by themselves; and (3) although HIS users are realizing the consequences of healthcare information leakage, they think that they are unlikely to encounter such situations. The results imply that in order to increase HIPI of HIS users, ongoing security education is needed and motivating users to protect healthcare information through their satisfaction with the security system is important. © Springer Science+Business Media New York 2015.",General deterrence theory; Healthcare information system; Induction control intention; Protection intention; Protection motivation theory; Self-defense intention,33,Information Systems Frontiers,2016 1194,Laumer S.; Eckhardt A.; Trunk N.,Do as your parents say? - Analyzing it adoption influencing factors for full and under age applicants,"The article suggests a model for examining the adoption of e-recruiting by individuals. The model is empirically evaluated using survey data from 323 full and under age applicants. The results explain substantial parts of the individual adoption decision. Interestingly, the relative importance of the adoption drivers varies with age, social environment and the level of education. While, as expected, overall Performance Expectancy is the major force behind adopting e-recruiting, the relative importance of the other factors differs a lot. Whereas Facilitating Conditions came out as an important driver for under age pupils, full age students by contrast are highly driven by the influence of their peer groups and the communication of the respective company they apply for. A major outcome is that the Subjective Norm of family and friends, teachers and professors has a weaker influence for under age pupils who mostly live with their parents than for the group of students who already left home to study at college. Consequentially we assume that the social influence of peer groups on an individual's adoption differs with respect to age, social environment and level of education. This should be investigated more carefully in future adoption research as it might provide an answer for the varying significance of Subjective Norm in adoption research. © Springer Science + Business Media, LLC 2008.",E-recruiting; Household; Is adoption/diffusion; Partial least squares; Subjective Norm,35,Information Systems Frontiers,2010 1195,Goo J.,Structure of service level agreements (SLA) in IT outsourcing: The construct and its measurement,"The increased reliance of companies on IT outsourcing has turned management attention to a set of skills of managing relationships with service providers. While some recent studies have shown that the contracting ability to effectively manage relational exchanges can improve various dimensions of organizational performance, there has been relatively little analysis of how firms strategically use contracts to successfully manage their interfirm relationships. As an extension of past studies emphasizing the importance of the contract and service level agreements (SLA), the study develop an inclusive and conceptually sound framework for structuring SLA in IT outsourcing arrangements drawing upon control theory. Along with a careful description of measurement development as well as rigorous statistical validations, it contributed to instrument development for a set of 11 first-order SLA contractual factors and their relationships with three second-order substantive factors. The results of the study are framed as a tool for benchmarking SLA structuring efforts as well as a foundation for the future study of managing IT outsourcing relationships. The study suggests empirically testing of (1) the complementarity or substitutability between formal contract and relational governance, (2) institution based trust as an initial trust building mechanism, and (3) IT outsourcing success from a contractual perspective as potential areas of future research using the results of the study. © Springer Science + Business Media, LLC 2008.",Control theory; Itoutsourcing relationships; Measurement development; Second-order construct; Service level agreements (SLA),52,Information Systems Frontiers,2010 1196,Poindexter J.C.; Earp J.B.; Baumer D.L.,An experimental economics approach toward quantifying online privacy choices,"The importance of personal privacy to Internet users has been extensively researched using a variety of survey techniques. The limitations of survey research are well-known and exist in part because there are no positive or negative consequences to responses provided by survey participants. Such limitations are the motivation for this work. Experimental economics is widely accepted by economists and others as an investigative technique that can provide measures of economic choice-making that are substantially more accurate than those provided by surveys. This paper describes our efforts at applying the techniques of experimental economics to provide a foundation for (a) estimating the values that consumers place on privacy and various forms of security (encryption, HIPAA, etc.) and for (b) quantifying user responses to changes in the Internet environment. The contribution of this study is a better understanding of individual decision-making in the context of benefits and costs of making private information available to Internet sites. Preliminary results from a series of pilot studies are consistent with optimizing behaviors, indicating that continued application of experimental economics techniques in the quantification of Internet user actions in privacy/security space will be illuminating. Our results show that Internet users place great value on security measures, both regulatory and technical, that make identity theft much less likely. Our Web-based experiments indicate that privacy- and security- enhancing protections are likely to be subject to moral hazard responses, as participants in our online experiments became more aggressive in their Internet usage with greater protection in place. © Springer Science+Business Media, LLC 2006.",Internet; Personal privacy; Security,18,Information Systems Frontiers,2006 1197,Dwivedi Y.K.; Wastell D.; Laumer S.; Henriksen H.Z.; Myers M.D.; Bunker D.; Elbanna A.; Ravishankar M.N.; Srivastava S.C.,Research on information systems failures and successes: Status update and future directions,"Information systems success and failure are among the most prominent streams in IS research. Explanations of why some IS fulfill their expectations, whereas others fail, are complex and multi-factorial. Despite the efforts to understand the underlying factors, the IS failure rate remains stubbornly high. A Panel session was held at the IFIP Working Group 8.6 conference in Bangalore in 2013 which forms the subject of this Special Issue. Its aim was to reflect on the need for new perspectives and research directions, to provide insights and further guidance for managers on factors enabling IS success and avoiding IS failure. Several key issues emerged, such as the need to study problems from multiple perspectives, to move beyond narrow considerations of the IT artifact, and to venture into underexplored organizational contexts, such as the public sector. © 2014, Springer Science+Business Media New York.",Change management; IS failure; IS implementation; IS success; Technochange; Work systems,377,Information Systems Frontiers,2015 1198,Zeng D.; Wei D.; Chau M.; Wang F.,Domain-specific Chinese word segmentation using suffix tree and mutual information,"As the amount of online Chinese contents grows, there is a critical need for effective Chinese word segmentation approaches to facilitate Web computing applications in a range of domains including terrorism informatics. Most existing Chinese word segmentation approaches are either statistics-based or dictionary-based. The pure statistical method has lower precision, while the pure dictionary-based method cannot deal with new words beyond the dictionary. In this paper, we propose a hybrid method that is able to avoid the limitations of both types of approaches. Through the use of suffix tree and mutual information (MI) with the dictionary, our segmenter, called IASeg, achieves high accuracy in word segmentation when domain training is available. It can also identify new words through MI-based token merging and dictionary updating. In addition, with the proposed Improved Bigram method IASeg can process N-grams. To evaluate the performance of our segmenter, we compare it with two well-known systems, the Hylanda segmenter and the ICTCLAS segmenter, using a terrorism-centric corpus and a general corpus. The experiment results show that IASeg performs better than the benchmarks in both precision and recall for the domain-specific corpus and achieves comparable performance for the general corpus. © 2010 Springer Science+Business Media, LLC.",Chinese segmentation; Heuristic rules; Mutual information; N-gram; Suffix tree; Ukkonen algorithm,34,Information Systems Frontiers,2011 1199,Norta A.; Eshuis R.,Specification and verification of harmonized business-process collaborations,"In the area of business-to-business (B2B) collaboration, original equipment manufacturers (OEMs) are confronted with the problem of spending a considerable time and effort on coordinating suppliers across multiple tiers of their supply chains. By supporting inter-organizational business-process collaborations with service-oriented technology, a scope for more efficient and effective supply-chain coordination is anticipated. This paper defines a formal framework, called eSourcing, for specifying structurally harmonized inter-organizational business-process collaborations. The framework permits verification of harmonized processes before their enactment. Moreover, the framework uses private and public layers to protect competitive knowledge of the individual partners. In the research project CrossWork, the eSourcing framework has been integral for harmonizing on an external level the intra-organizational business processes of a service-consuming and one or many service-providing organizations. © 2010 Springer Science + Business Media, LLC.",b2b; Business process; Collaboration; e-business; eSourcing; Inter-organizational; Service orientation; Supply chain; Visibilities,36,Information Systems Frontiers,2010 1200,Soper D.S.; Demirkan H.; Goul M.,An interorganizational knowledge-sharing security model with breach propagation detection,"The increasing adoption of Service Oriented Architecture (SOA) is allowing more and more companies to integrate themselves in interorganizational netchain environments wherein knowledge assets can be electronically shared with selected business partners. The dynamic nature of these environments implies a need for organizations to protect and monitor the flow of their valuable knowledge assets throughout the netchain if they hope to maintain their long-term competitive positions. In this paper, we propose an interorganizational knowledge-sharing security model that integrates the value chain reference model (VCOR), the federated enterprise reference architecture model (FERA), and multidimensional data warehouse technologies to allow for the proactive monitoring of shared knowledge assets across an SOA-based netchain. The proposed architecture is novel In that it supports dynamic policy revision through the automated detection of knowledge-sharing breaches within a netchain-a process whose viability is demonstrated using network flow theory and a series of simulations. Existing business intelligence infrastructures can be readily modified to support the proposed model, as multidimensional data warehousing has already been adopted in many organizations. © 2007 Springer Science+Business Media, LLC.",Business intelligence; Collaboration; Interdependence; Knowledge security; Netchain; Supply chain,20,Information Systems Frontiers,2007 1201,Meng S.; Chiu D.K.W.; Kafeza E.; Wenyin L.; Li Q.,Automated management of assets based on RFID triggered alarm messages,"Asset management has long been considered as an important issue in enterprises. With the maturing of the Radio Frequency Identification (RFID) technology, automated management of assets (particularly for mobile ones) in an enterprise using RFID becomes practical. We have developed a RFID-based Asset Management System (RAMS) for a large telecommunication enterprise and this paper details how we maintain the whole life-cycle of assets from their acquisition, transfer, maintenance, audit taking, to retirement. Our system also displays spatial information of assets on an electronic geographical map using Web-based Geographical Information System (WebGIS) technology. Further asset security is improved by automated notification of asset movement and malfunction alarm through Short Message System (SMS). To improve the sending time of the alarm SMSs that have high priority, we also develop a Maximum Position First (MPF) speed-up algorithm for their scheduling. Our initial deployment shows that our system can improve the availability of assets and reduce the asset management cost dramatically. © 2009 Springer Science+Business Media, LLC.",Asset management; Exception handling; Message scheduling; RFID; SMS; WebGIS,20,Information Systems Frontiers,2010 1202,Own H.S.; Yahyaoui H.,Rough set based classification of real world Web services,"We propose in this paper a rough set based classification technique for real world Web services. The set of Web service quality attributes is reduced to a core set, which represents the most relevant set of attributes. Such reduction is achieved through the analysis of the QWS dataset using rough set theory. The core set is then used during the training phase to derive a minimal set of decision rules. These rules are applied during the classification phase to classify real world Web services into one of four categories: Platinum, Gold, Silver, and Bronze. Our experimental results show that the use of rough set theory to classify QWS services allows to have better classification accuracy results compared to other classification techniques, which have been recently applied on QWS. © 2014, Springer Science+Business Media New York.",Classification; Quality of service; Reduction; Rough set theory; Web services,15,Information Systems Frontiers,2015 1203,Nysveen H.; Pedersen P.E.,Consumer adoption of RFID-enabled services. Applying an extended UTAUT model,"In this article, an extended version of the unified theory of acceptance and use of technology (UTAUT) is applied to explore the significance of various antecedents of acceptance of eight versions of a radio frequency identification (RFID) enabled service. The results show significant influences from performance expectancy, effort expectancy and technology anxiety on attitude to use RFID-enabled services, while facilitating conditions and attitude to use both have significant influences on intention to use the services. Looking into potential moderating influences, gender moderates most of the relationships in the model while age and experience with identification technology do not seem to be relevant moderators. Exploring the potential moderating influence of context experience, experience of the service context is found to moderate some of the relationships in themodel. Managerial implications point to the importance of developing useful and user-friendly services and of communicating the user friendliness to potential customers to avoid the potential negative influence of technology anxiety. Service development and market communication should be sensitive to gender and context experience. © Springer Science+Business Media New York 2014.",Adoption; RFID; Structural equation modeling (SEM); Unified theory of acceptance and use of technology (UTAU?T),66,Information Systems Frontiers,2016 1204,Fominykh M.; Prasolova-Førland E.; Divitini M.; Petersen S.A.,Boundary objects in collaborative work and learning,"Boundary objects are artifacts, processes, concepts and other entities that provide bridges across boundaries and act as shared references that are meaningful for learners and collaborators with different backgrounds. In this paper, we explore cooperation in a cross-disciplinary and cross-cultural context, focusing on the opportunities for learning that arise at different boundaries and on corresponding boundary objects to facilitate both collaboration and learning. We present and discuss a study we conducted within a Cooperation Technology course. The discussion provides implications for collaboration support across boundaries, including insights on why they are important, how to facilitate their creation, and how to use technologies for that. The implications are formulated as instruction for designing university courses, but can be used in a wider context. © 2015, Springer Science+Business Media New York.",Boundary objects; Collaborative learning; Cooperation technology; Course design,20,Information Systems Frontiers,2016 1205,Andoh-Baidoo F.K.; Osei-Bryson K.-M.; Amoako-Gyampah K.,Effects of firm and IT characteristics on the value of e-commerce initiatives: An inductive theoretical framework,"We explore the theoretical foundations on how firm and IT characteristics explain the market value variations in e-commerce initiatives by examining the announcements of 946 e-commerce initiatives in the public media. Our approach combines the Event study methodology and Decision tree induction to examine the main and interaction effects of IT and firm characteristics on Cumulative Abnormal Returns (CAR). In particular, we generate complex interaction models that can guide e-commerce investment decisions so managers can know, for example, which combination of IT and firm characteristics are more likely to be viewed positively by investors. The selected study variables as well as explanation of the proposed framework are informed by innovation, resource-based view, transaction cost economics and complementarity theories.We have inductively developed a set of propositions that can be deductively tested to assess the validity of our proposed theoretical framework. Hence our study provides an initial roadmap for theory development on e-commerce and CAR. © Springer Science+Business Media, LLC 2012.",CAR; Decision tree induction; E-commerce announcements; Event study; Inductive theory; IT and firm characteristics; Market value,22,Information Systems Frontiers,2012 1206,Wang Y.; Yin J.,A reliable scheduling method in equipment grid using provenance information,"Scheduling resources in grid is an open difficult problem due to resource fluctuations. A fuzzy scheduling method using provenance information is proposed. In this method, resource dispatch probability is dynamically adjusted according to user feedback information, which is user appreciation information represented by fuzzy variables. To minimize the influence of cheating, collusive and decrying of user appreciations, provenance information is used to estimate trust factor of each user appreciation during resource dispatch probability adjustment process. Simulation results confirm capability of the proposed method to effectively reduce impacts of malicious user appreciations and increase user satisfactions. © 2013 Springer Science+Business Media New York.",Equipment grid; Provenance; Scheduling,1,Information Systems Frontiers,2013 1207,Samoilenko S.,Information systems fitness and risk in IS development: Insights and implications from chaos and complex systems theories,"Information Systems Development often takes place within a complex and uncertain socio-technical environment. The use of methodologies is considered an appropriate way of reducing risks of failures of the ISD projects, allowing for managing of the complexity of the process and product of ISD. Traditional functionalist methodologies, however, are not adequately equipped for dealing with non-linear interactions endemic to such complex social systems as IS. This paper examines IS development from the perspective of the complex systems behavior and chaos theory. It offers insights and implications for augmenting traditional approaches to ISD that could lead to better strategies for managing complexities in the ISD process and the behavior of an IS. © 2008 Springer Science+Business Media, LLC.",Chaos theory; Complex systems theory; Complexity; IS development,13,Information Systems Frontiers,2008 1208,Baghdadi Y.,Reverse engineering relational databases to identify and specify basic Web services with respect to service oriented computing,"Service-oriented computing (SOC) is the computing paradigm that utilizes services as a fundamental building block. Services are self-describing, open components intended to support composition of distributed applications. Currently, Web services provide a standard-based realization of SOC due to: (1) the machine-readable format (XML) of their functional and nonfunctional specifications, and (2) their messaging protocols built on top of the Internet. However, how to methodologically identify, specify, design, deploy and manage a sound and complete set of Web services to move to a service-oriented architecture (SOA) is still an issue. This paper describes a process for reverse engineering relational database applications architecture into SOA architecture, where SQL statements are insulated from the applications, factored, implemented, and registered as Web services to be discovered, selected, and reused in composing e-business solutions. The process is based on two types of design patterns: schema transformation pattern and CRUD operations pattern. First, the schema transformation pattern allows an identification of the services. Then the CRUD operations pattern allows a specification of the abstract part of the identified services, namely their port types. This process is implemented as a CASE tool, which assists analysts specifying services that implement common, reusable, basic business logic and data manipulation. © Springer Science+Business Media, LLC 2006.",Application architecture; CASE tool; CRUD operations pattern; Relational databases; Reverse engineering process; Service-oriented architecture; Service-oriented computing; Transformation pattern; Web services,20,Information Systems Frontiers,2006 1209,Sasaki H.,A computing theory for collaborative and transparentc decision making under time constraint,"In this paper, we present a computing theory on the accelerated critical point of selection of proper strategies between collaboration and competition and its mathematical analysis for collaborative and transparent decision making under ""time constraint"", i.e., cost of time pressure, which decision makers face in negotiation. Web 2.0 provides a useful digital environment to support various time-stressed human behaviors for collaborative decision making. However, little research has examined the collaborative behavior under time constraint on the Internet in its designs and implementations on electronically supported decision making. Those systems are implemented in black boxes so that we need transparent designs of decision support systems to promote collaboration by time-stressed decision makers. The essential problem on collaborative decision making under time constraint is the discovery and evaluation on the critical point of selection of proper strategies between collaboration and competition. Most of the current decision support systems accept the half of maximum acceptable time for negotiation as a critical point, a priori, though that conventional point is often late for proper decision making. The proposed theory shows that a critical point is to be accelerated at the one-third of maximum acceptable time for negotiation. We have formulated the proposed computing theory based on mathematical formulation, and checked its feasibility in its applications to a case study. The proposed theory promotes collaborative and transparent decision making in consideration of the properties of stakes under time pressure by selecting the strategy of collaboration or competition at themuch earlier stage. © Springer Science + Business Media, LLC 2009.",Collaboration; Computing theory; Decision making; Mathematical formulation; Time constraint; Transparency,14,Information Systems Frontiers,2011 1210,Li L.; Xu L.; Jeng H.A.; Naik D.; Allen T.; Frontini M.,Creation of environmental health information system for public health service: A pilot study,"Despite more than a decade of research on medical information systems, deficiencies exist in our capability of establishing an effective environmental health information infrastructure. In this research, we present a pilot study on creating a feasible environmental health information infrastructure. The newly-developed environmental health information system is a web-based platform that integrates databases, decision-making tools, geographic information systems for supporting public health service and policy making. The study, which is a part of a comprehensive effort known as Environmental Public Health Tracking proposed by the Center for Disease Control and Prevention, opens the door for future research on a large scale nation-wide healthcare information infrastructure. © 2008 Springer Science+Business Media, LLC.",Decision-making; Environmental health; Geographic information systems; Healthcare service; Information network; Integrated information system; Internet medicine; Public health,74,Information Systems Frontiers,2008 1211,Reay I.; Beatty P.; Dick S.; Miller J.,Privacy policies and national culture on the internet,"The Web today enables consumers and vendors to conduct business almost without regard to physical location. However, this does not mean that all barriers are removed; culturally-based assumptions about the behavior of the other party can lead to major misunderstandings. We study the differences in privacy-sensitive decisions made by website operators (which can be expected to vary between cultures) as one particular example of these differing assumptions. In particular, we seek to understand whether new norms of behavior may be emerging as online vendors recognize the damage privacy invasions do to consumers' trust. We present a large-scale empirical study of privacysensitive actions across cultures on the Internet. Our study is based on an automated analysis of P3P documents posted on the 100,000 most popular websites. We find that the adoption of P3P, as well as specific company policies, vary across cultural dimensions. The analysis also suggests that discrepancies exist between concerns for information privacy and the adoption of privacy enhancing technologies within a culture. © Springer Science+Business Media, LLC 2011.",Cultural analysis; Cultural dimensions; Electronic commerce; P3P; Privacy enhancing technologies; Privacy on the web,17,Information Systems Frontiers,2013 1212,Janjua N.K.; Hussain F.K.; Hussain O.K.,Semantic information and knowledge integration through argumentative reasoning to support intelligent decision making,"The availability of integrated, high quality information is a pre-requisite for a decision support system (DSS) to aid in the decision-making process. The introduction of semantic web ensures the seamless integration of information derived from diverse sources and transforms the DSS to an adoptable and flexible SemanticWeb-DSS (Web-DSS).However, due to the monotonic nature of the layered development of semantic web, it lacks the capability to represent, reason and integrate incomplete and conflicting information. This, in turn, renders an enterprise incapable of knowledge integration; that is, integration of information about a subject that could potentially be incomplete, inconsistent and distributed among different Web-DSS within or across enterprises. In this article, we address the issues of incomplete and inconsistent semantic information and knowledge integration by using argumentation and argumentation schemes. We discuss the Argumentation-enabled Information Integration Web-DSS (Web@IDSS) along with its syntax and semantics for semantic information integration, and devise a methodology for sharing the results of Web@IDSS in Argument Interchange Format (AIF) format. We also discuss Argumentation-enabled Knowledge Integration Web-DSS (Web@KIDSS) for semantic knowledge integration. We provide formal syntax and semantics for the Web@KIDSS, propose a conceptual framework, and describe it in detail. We present the algorithms for knowledge integration and the prototype application for validation of results. © Springer Science+Business Media New York 2013.",Argumentation; Argumentation schemes; Information integration; Semantic web; Web based DSS,28,Information Systems Frontiers,2013 1213,Skillicorn D.B.,Computational approaches to suspicion in adversarial settings,"Intelligence and law enforcement agencies collect large datasets, but have difficulty focusing analyst attention on the most significant records and structures within them. We address this problem using suspicion, which we interpret as relevant anomaly, as the measure associated with data records and individuals. For datasets collected about widespread activities in which the signs of adversarial activity are rare, we suggest ways to build predictive models of suspicion. For datasets collected as the result of lawful interception, we suggest a model of suspicion spreading using the social network implied by the intercepted data. © 2010 Springer Science+Business Media, LLC.",Adversarial data analysis; Counterterrorism; Edge prediction; Fraud; Law enforcement; Lawful interception; Social networks,10,Information Systems Frontiers,2011 1214,Sun Y.; Upadhyaya S.,Secure and privacy preserving data processing support for active authentication,"Keystroke dynamics and mouse movements are effective behavioral biometric modalities for active authentication. However, very little is done on the privacy of collection and transmission of keyboard and mouse data. In this paper, we develop a rule based data sanitization scheme to detect and remove personally identifiable and other sensitive information from the collected data set. Preliminary experiments show that our scheme incurs on average 5.69 % false negative error rate and 0.64 % false positive error rate. We also develop a data transmission scheme using the Extensible Messaging and Presence Protocol (XMPP) to guarantee privacy during transmission. Using these two schemes as a basis, we develop two distinct architectures for providing secure and privacy preserving data processing support for active authentication. These architectures provide flexibility of use depending upon the application environment. © 2015, Springer Science+Business Media New York.",Privacy; Sanitization; Security; XMPP,16,Information Systems Frontiers,2015 1215,Zeng B.; Tan L.,A unified framework for evaluating test criteria in model-checking-assisted test case generation,"Testing is often cited as one of the most costly operations in testing dependable systems (Heimdahl et al. 2001). A particular challenging task in testing is test-case generation. To improve the efficiency of test-case generation and reduce its cost, recently automated formal verification techniques such as model checking are extended to automate test-case generation processes. In model-checking-assisted test-case generation, a test criterion is formulated as temporal logical formulae, which are used by a model checker to generate test cases satisfying the test criterion. Traditional test criteria such as branch coverage criterion and newer temporal-logic-inspired criteria such as property coverage criteria (Tan et al. 2004) are used with model-checking-assisted test generation. Two key questions in model-checking-assisted test generation are how efficiently a model checker may generate test suites for these criteria and how effective these test suites are. To answer these questions, we developed a unified framework for evaluating (1) the effectiveness of the test criteria used with model-checking-assisted test-case generation and (2) the efficiency of test-case generation for these criteria. The benefits of this work are three-fold: first, the computational study carried out in this work provides some measurements of the effectiveness and efficiency of various test criteria used with model-checking-assisted test case generation. These performance measurements are important factors to consider when a practitioner selects appropriate test criteria for an application of model-checking-assisted test generation. Second, we propose a unified test generation framework based on generalized Büchi automata. The framework uses the same model checker, in this case, SPIN model checker (Holzmann 1997), to generate test cases for different criteria and compare them on a consistent basis. Last but not least, we describe in great details the methodology and automated test generation environment that we developed on the basis of our unified framework. Such details would be of interest to researchers and practitioners who want to use and extend this unified framework and its accompanying tools. © Springer Science+Business Media New York 2013.",Model checking; Performance evaluation; Test case generation; Test criteria,3,Information Systems Frontiers,2014 1216,Ahmed F.; Capretz L.F.,A business maturity model of software product line engineering,"In the recent past, software product line engineering has become one of the most promising practices in software industry with the potential to substantially increase the software development productivity. Software product line engineering approach spans the dimensions of business, architecture, software engineering process and organization. The increasing popularity of software product line engineering in the software industry necessitates a process maturity evaluation methodology. Accordingly, this paper presents a business maturity model of software product line, which is a methodology to evaluate the current maturity of the business dimension of a software product line in an organization. This model examines the coordination between product line engineering and the business aspects of software product line. It evaluates the maturity of the business dimension of software product line as a function of how a set of business practices are aligned with product line engineering in an organization. Using the model presented in this paper, we conducted two case studies and reported the assessment results. This research contributes towards establishing a comprehensive and unified strategy for a process maturity evaluation of software product lines. © 2010 Springer Science+Business Media, LLC.",Business process; Maturity evaluation; Organizational management; Software process assessment; Software process model; Software product line,18,Information Systems Frontiers,2011 1217,Zhou T.,Understanding user adoption of location-based services from a dual perspective of enablers and inhibitors,"Location-based services (LBS) can present the personalized information and services to users based on their positions and contexts. This may improve users’ experience and bring a positive utility to them. However, their privacy concern may be aroused and perceived risk be increased because LBS need to utilize their location information. From a dual perspective of enablers and inhibitors, this research examined the factors affecting user adoption of LBS. Enablers include perceived usefulness and trust, whereas the inhibitor is privacy risk. The results indicate that contextual offering is the main factor affecting trust, whereas ubiquitous connection is the main factor affecting perceived usefulness. Privacy concern affects privacy risk. Trust has significant effects on perceived usefulness and privacy risk. And these three factors predict user adoption and usage behavior. © 2013, Springer Science+Business Media New York.",LBS; Perceived usefulness; Privacy concern; Trust,44,Information Systems Frontiers,2015 1218,Roman R.; Lopez J.; Dugeon O.; Lacoste M.; Plaza P.Y.; Bel M.,Advanced secure multimedia services for digital homes,"Our society is becoming increasingly more IT-oriented, and the images and sounds that reflect our daily life are being stored mainly in a digital form. This digital personal life can be part of the home multimedia contents, and users demand access and possibly share these contents (such as photographs, videos, andmusic) in an ubiquitous way: From any location and with any device. The purpose of this article is twofold. First, we introduce the Feel@Home system, whose main objective is to enable the previously mentioned vision of an ubiquitous digital personal life. Second, we describe the security architecture of Feel@Home, analyzing the security and privacy requirements that identify which threats and vulnerabilities must be considered, and deriving the security building blocks that can be used to protect both IMS-based and VPN-based solutions. © Springer Science+Business Media, LLC 2010.",Content sharing; Digital home; Multimedia; Privacy; Security,1,Information Systems Frontiers,2012 1219,Park J.H.; Hsu C.-H.; Arabnia H.R.,Intelligent systems and smart homes,"The special issue of Information Systems Front journal presents selected papers from the 2007 International Workshop on Intelligent Systems and Smart Homes (WISH-07) organized at Canada from August 28-September 1st, 2007. In the paper 'Service Integration with UPnP Agent for a Ubiquitous Home Environment', Wally Chen and co-researchers proposed an approach for UPnP devices connecting to outer networks via UPnP aware gateway. They also developed several service oriented applications in a smart campus based on the proposed framework. The paper 'A Novel Memory Management Scheme for Residential Gateways' by Ibrahim Kamel and Beizhong Chen presents two algorithms for service replacement and memory management in home gateways. Ichiro Satoh presents a location-aware communication approach for smart home environments that is based on a symbolic location model that represents the containment relationships between physical objects, computing devices, and places, in his paper, 'Location-aware Communications in Smart Environments'.",,7,Information Systems Frontiers,2009 1220,Chang Y.-S.; Sheu R.-K.; Yuan S.-M.; Hsu J.-J.,Scaling database performance on GPUs,"The market leaders of Cloud Computing try to leverage the parallel-processing capability of GPUs to provide more economic services than traditions. As the cornerstone of enterprise applications, database systems are of the highest priority to be improved for the performance and design complexity reduction. It is the purpose of this paper to design an in-memory database, called CUDADB, to scale up the performance of the database system on GPU with CUDA. The details of implementation and algorithms are presented, and the experiences of GPU-enabled CUDA database operations are also shared in this paper. For performance evaluation purposes, SQLite is used as the comparison target. From the experimental results, CUDADB performs better than SQLite for most test cases. And, surprisingly, the CUDADB performance is independent from the number of data records in a query result set. The CUDADB performance is a static proportion of the total number of data records in the target table. Finally, this paper comes out a concept of turning point that represents the difference ratio between CUDADB and SQLite. © 2011 Springer Science+Business Media, LLC.",CUDA; GPU; In-Memory Database; SQLite,12,Information Systems Frontiers,2012 1221,Claes J.; Vanderfeesten I.; Gailly F.; Grefen P.; Poels G.,The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling,"After observing various inexperienced modelers constructing a business process model based on the same textual case description, it was noted that great differences existed in the quality of the produced models. The impression arose that certain quality issues originated from cognitive failures during the modeling process. Therefore, we developed an explanatory theory that describes the cognitive mechanisms that affect effectiveness and efficiency of process model construction: the Structured Process Modeling Theory (SPMT). This theory states that modeling accuracy and speed are higher when the modeler adopts an (i) individually fitting (ii) structured (iii) serialized process modeling approach. The SPMT is evaluated against six theory quality criteria. © 2015, The Author(s).",Business process modeling; Cognitive fit; Explanatory theory; Process of process modeling; Structured process modeling,34,Information Systems Frontiers,2015 1222,Baloian N.; Zurita G.,Achieving better usability of software supporting learning activities of large groups,"Many business schools around the world offer courses to train their students in acquiring so called “soft skills”, such as working in teams for decision making or sharing information to collaboratively solve complex problems. These courses often include learning activities where students are asked to generate ideas, discuss them, rank them and select the best ones. In order to develop their IT skills, students are often asked to take advantage of available IT technologies for supporting this task. If geographical location information is prominently used to provide context information about the ideas students propose and discuss, this activity can be classified as geo-collaborative. Free software available from the web has often been used to support this kind of work, like Google Maps, for geo-referencing the ideas, the text editor of Google Drive for describing them and Twitter or Facebook to exchange messages and comments. These applications are robust and suitable for use by large groups of students engaged in a situated learning activity. In the context of a learning activity taking place in a business school in Chile, the authors observed students for four semesters collaboratively using these tools to identify ways of improving life or solving problems in certain areas of the city which have to be georeferenced on a map. They had to generate proposals, discuss them and select the ten best. Through feedback provided by students, we identified problems regaring information overload, the lack of support for collaboration and unsatisfactory usability. From these findings we derived requirements for software especially designed to support this learning activity and have a tool that offers better usability. A prototype was developed to cope with these requirements. It was used for two semesters and evaluated under the same conditions when students used free and/or standard software. The experiment yielded positive results and gave us valuable insight on how to implement main features of a system supporting learning activities for large groups that includes decision making, blogging and geo-collaboration. © 2015, Springer Science+Business Media New York.",Collaborative learning; Geo-collaboration; Situated learning theory,6,Information Systems Frontiers,2016 1223,Sheng Q.Z.; Zeadally S.; Luo Z.; Chung J.-Y.; Maamar Z.,Ubiquitous RFID: Where are we?,"After over a half century of development, radio-frequency identification (RFID) is beginning to move into mainstream applications for automatic identification. RFID is widely seen today as one of the key enabling technologies of the ""Internet of Things"". However, many challenges still need to be addressed before we can fully benefit from this nascent and ubiquitous technology. In this paper, we present the state of the art of RFID technology and discuss the challenges and open issues in developing next generation RFID applications. © 2009 Springer Science+Business Media, LLC.",Internet of things; Radio-frequency identification (RFID); RFID data integration; RFID data management; RFID framework; Security and privacy,40,Information Systems Frontiers,2010 1224,Oaks P.; Ter Hofstede A.,Guided interaction: A mechanism to enable ad hoc service interaction,"Ad hoc interaction between web services and their clients is a worthwhile but seemingly distant goal. At present, most of the interest in web services is focused on pre-planned B2B interaction. Clients interact with services using advance knowledge of the data and sequence requirements of the service and pre-programmed calls to their interfaces. This type of interaction cannot be used for ad hoc interaction between services and their clients such as mobile devices moving in and around rich dynamic environments because clients may not have the necessary knowledge in advance. For unplanned ad hoc interaction an interaction mechanism is required that does not require clients to have advance knowledge of programmatic service interfaces and interaction sequences. The mechanism must ensure clients with different resources and diverse competencies can successfully interact with newly discovered services by providing assistance such as disambiguation of terminology, alternative types of inputs, and context sensitive error reporting when necessary. This paper introduces a service interaction mechanism called guided interaction. Guided interaction is designed to enable clients without prior knowledge of programmatic interfaces to be assisted to a successful outcome. The mechanism is grounded in core computing primitives and based on a dialogue model. Guided interaction has two parts; the first part is a language for the exchange of information between services and their clients. The second part is a language for services to create interaction plans that allow them to gather the data they require from clients in a flexible way with the provision of assistance when necessary. An interpreter uses the plan to generate and interpret messages in the exchange language and to manage the path of the dialogue. © Springer Science+Business Media, LLC 2007.",Ad hoc; Guided; Interaction; Web services,6,Information Systems Frontiers,2007 1225,Op Het Veld B.; Hohlfeld D.; Pop V.,Harvesting mechanical energy for ambient intelligent devices,"This paper deals with mechanical energy harvesters, power management and energy storage devices as important building blocks for wireless autonomous sensor networks. The basic task of the harvester is to convert vibrational into electrical energy. As these energy harvesting devices shrink in dimensions, while still providing sufficient energy, they will be key enablers for wireless autonomous sensor networks. For such a purpose, vibration harvesters are being investigated which feature a footprint of 1 cm2 and an average power harvesting level of 100 μW. A detailed description of the design and fabrication for the piezoelectric, electrostatic and electromagnetic harvester is given. Furthermore, the interaction between a piezoelectric vibration energy harvester, the power converter and the energy storage system is investigated. A system level approach, including mechanical and electrical domains, is pursued for impedance matching between both domains in order to investigate the physical design aspects of the energy harvester on the electrical domain. Two matching methods, such as complex and real matching, are presented and compared to each other. Finally, several energy storage systems are briefly presented in order to store the irregular available scavenged energy and supply the functional circuitry in the system like sensor(s), signal processing and transceiver. In order to reduce power consumption, the transceiver operates in pulsed load condition which makes the energy storage system crucial. © 2009 Springer Science+Business Media, LLC.",Electromagnetic; Electrostatic; Energy harvester; Energy storage; Impedance matching; Piezoelectric; Power management,19,Information Systems Frontiers,2009 1226,Raghu T.S.; Woo W.; Mohan S.B.; Rao H.R.,Market reaction to patent infringement litigations in the information technology industry,"Intellectual property portfolios that include unique inventions and discoveries are potentially inimitable resources that provide strategic leverage to Information Technology (IT) firms. The increasing patent related litigations in the IT industry, and the high costs associated with litigations make this an economically significant activity. Taking a market oriented view to this issue we investigate the economic impact of patent infringement litigation on both the plaintiff and the defendant firms in IT industry. Event study methodology is used to assess the effect of the litigation on the stock market returns around the date of litigation announcement as well as the date of settlement/ termination. Our results suggest that the news of patent infringement litigation was unfavorably accepted in the stock market for the defendants. On the other hand, abnormal returns for plaintiff firms around litigation announcement date as well as settlement/termination date were significantly positive. We find evidence to the effect that patent litigations are not zero-sum games since combined abnormal returns for the plaintiff and defendant firms are negative. Patents belonging to the electronic and electric categories are more likely to influence market returns, whereas computer and communications patent categories are less likely to do so. Patent importance (as measured by patent citations) is found to be an important contributor to market's evaluation of a patent litigation's impact. © 2007 Springer Science+Business Media, LLC.",Event study; Intellectual property; IT innovations; Litigations; Patents,63,Information Systems Frontiers,2008 1227,Tung W.-F.; Yuan S.-T.; Wu Y.-C.; Hung P.,Collaborative service system design for music content creation,"This article presents a novel collaborative service system (CSS) design methodology supporting the work of multiple participating users and collaborative services processes. The CSS application of music content creation paradigm called DesignStorming as it pertains to CSS modeling and developing. CSS is an interactive service system that can be systematic service innovation and automatic semi-automated value co-creation between service providers and customers to enhance service productivity. The objectives of this research are threefoldâ""€to propose a novel design methodology for CSS, to incorporate simple service machine (SSM) and intelligent service machine (ISM) for CSS, and to demonstrate a CSS application of music content creation. SSM is a road map that can be used to define the salient attribute elements for CSS design. According to the predefined SSM, ISM conducts modeling the cognitive process of service exchanges and service provision, their knowledge representations, and value co-production process for a computerized CSS. DesignStorming demonstrates how a CSS can be automated the interactive communications and problem solving processes during the music content creation work. The CSS application involves the three system components: 1) Ontology Developer, 2) SFGA Partnership Matcher, and 3) Co-created Value Appraiser. In addition, a service evaluation model is described and evaluated, so that some of their important characteristics can be identified. Such a comprehensive design methodology can provide the foundation for building future more diversified and innovative collaborative service system. © 2012 Springer Science+Business Media, LLC.",Collaborative service systems; CSS; Intelligent service machine; Semantic-based fuzzy genetic algorithm; Semi-automated value co-creation; Service science,12,Information Systems Frontiers,2014 1228,Ma J.; Huang Q.,Does better Internet access lead to more adoption? A new empirical study using household relocation,"In the past decade, governments around the world have made significant investments to improve Internet access in underserved areas. Yet there is scant evidence on how effective these measures are at increasing Internet adoption and narrowing the digital divide. In this paper, we empirically investigate the effect of the supply of Internet access on Internet adoption. The main empirical challenge is the issue of endogeneity, as Internet service providers (ISPs) selectively enter markets based on local demand characteristics. We propose a novel solution to this problem using a panel dataset of households that relocate to different Internet access supply conditions. We find that the supply of Internet access has little effect on Internet adoption: underserved markets—those with fewer than 4 ISPs—exhibit levels of adoption comparable to well-served markets with plenty of service providers. Our findings suggest that the highly touted government initiatives to boost Internet access in underserved areas are likely to have limited impact on adoption rate in those regions. © 2014, Springer Science+Business Media New York.",Digital divide; Endogeneity; ICT adoption; Natural experiment; Specification testing,7,Information Systems Frontiers,2015 1229,Corbett J.,Using information systems to improve energy efficiency: Do smart meters make a difference?,"The large-scale generation of electricity is a major contributor to increasing levels of greenhouse gas emissions, putting pressure on the industry to reduce its environmental impacts. Electricity utility companies are looking to two strategies to help make this happen: the smart grid and demand-side management. Viewing the challenge from an IS perspective, this study attempts to answer the question: do smart grid information systems and technologies make a difference in utilities' efforts to promote energy efficiency? Drawing on organizational information processing theory and extending it by integrating the concept of information waste, two competing hypotheses are developed and tested using hierarchical regression and data from 543 U.S. electricity utilities. The model, incorporating four levels of metering devices, is found to explain a high portion of the variance in energy efficiency effects of demand-side management programs. This suggests that there are IS-enabled information processing capacities within smart meters that have a significant influence on utilities' EDM effectiveness. However, the results also point to the potential for both positive and negative effects. Implications of these findings for practice and future research directions are discussed. © 2013 Springer Science+Business Media New York.",Demand-side management; Energy efficiency; Energy informatics; Green IS; Information processing; Information waste; Smart grid; Sustainability,60,Information Systems Frontiers,2013 1230,Phan B.V.; Pardede E.; Rahayu W.,On the improvement of active XML (AXML) representation and query evaluation,"Active XML (AXML) as intensional data aims to exploit potential computing powers of XML, Web services and P2P architecture. It is considered a powerful extension of XML to deal with dynamic XML data from autonomous and heterogeneous data sources on a very large scale via Web services. However,AXML is still at an immature stage and various issues need to be investigated before it can be accepted widely. This paper will focus on two issues facing the current AXML system, namely the representation and the query process. We propose superior representation and improved query evaluation for AXML. For justification purposes, we compare our proposed algorithms with the existing algorithms. ©Springer Science+Business Media, LLC 2012.",Active XML; AXML query evaluation algorithm; AXML representation,5,Information Systems Frontiers,2013 1231,Vishwanath A.,Diffusion of deception in social media: Social contagion effects and its antecedents,"What makes deceptive attacks on social media particularly virulent is the likelihood of a contagion effect, where a perpetrator takes advantage of the connections among people to deceive them. To examine this, the current study experimentally stimulates a phishing type attack, termed as farcing, on Facebook users. Farcing attacks occur in two stages: a first stage where phishers use a phony profile to friend victims, and a second stage, where phishers solicit personal information directly from victims. In the present study, close to one in five respondents fell victim to the first stage attack and one in ten fell victim to the second stage attack. Individuals fell victim to a level 1 attack because they relied primarily on the number of friends or the picture of the requester as a heuristic cue and made snap judgments. Victims also demonstrated a herd mentality, gravitating to a phisher whose page showed more connections. Such profiles caused an upward information cascade, where each victim attracted many more victims through a social contagion effect. Individuals receiving a level 2 information request on Facebook peripherally focused on the source of the request by using the sender’s picture in the message as a credibility cue. © 2014, Springer Science+Business Media New York.",Computer-mediated communication and collaboration; IT diffusion and adoption; Laboratory experiments; Online deception; Phishing; Social contagion; Social media,50,Information Systems Frontiers,2015 1232,Thuan N.H.; Antunes P.; Johnstone D.,Factors influencing the decision to crowdsource: A systematic literature review,"Crowdsourcing is currently attracting much attention from organisations for its competitive advantages over traditional work structures regarding how to utilise skills and labour and especially to harvest expertise and innovation. Prior research suggests that the decision to crowdsource cannot simply be based on perceived advantages; rather multiple factors should be considered. However, a structured account and integration of the most important decision factors is still lacking. This research fills the gap by providing a systematic literature review of the decision to crowdsource. Our results identify nine factors and sixteen sub-factors influencing this decision. These factors are structured into a decision framework concerning task, people, management, and environmental factors. Based on this framework, we give several recommendations for managers making the crowdsourcing decision. © 2015, Springer Science+Business Media New York.",Crowdsourcing; Crowdsourcing decision; Organisational decision making; Systematic literature review,96,Information Systems Frontiers,2016 1233,Afsarmanesh H.; Msanjila S.S.; Camarinha-Matos L.M.,Technological research plan for active ageing,"The ePAL initiative aimed at developing a roadmap for extension of professional active life of the retiring and retired knowledge workers in developed countries and specifically in Europe. Three main perspectives are identified in this roadmap, and defined to comprehensively address relevant dimensions of the ePAL environment. These three perspectives consist of: (1) the technological perspective that addresses the needed technology and the support services, (2) the societal perspective that addresses both the human factors and the societal aspects, and (3) the organizational perspective that addresses both the economic / managerial and governmental aspects of these environments. This document however aims to zoom in on the technological perspective of the roadmap. Following a brief description of the three main perspectives of the ePAL environment, it introduces the four main ICT research and development areas that are identified for strengthening and realization of active ageing. The technological perspective of the ePAL's vision constitutes a substantial part of the roadmap recommendations. © The Author(s) 2011.",Active ageing; Collaborative networks; Roadmap; Technological perspective,4,Information Systems Frontiers,2012 1234,Poggi N.; Carrera D.; Gavaldà R.; Ayguadé E.; Torres J.,A methodology for the evaluation of high response time on E-commerce users and sales,"The widespread adoption of high speed Internet access and it’s usage for everyday tasks are causing profound changes in users’ expectations in terms of Web site performance and reliability. At the same time, server management is living a period of changes with the emergence of the cloud computing paradigm that enables scaling server infrastructures within minutes. To help set performance objectives for maximizing user satisfaction and sales, while minimizing the number of servers and their cost, we present a methodology to determine how user sales are affected as response time increases. We begin with the characterization of more than 6 months of Web performance measurements, followed by the study of how the fraction of buyers in the workload is higher at peak traffic times, to then build a model of sales through a learning process using a 5-year sales dataset. Finally, we present our evaluation of high response time on users for popular applications found in the Web. © 2012, Springer Science+Business Media New York.",Business modeling; Conversion rates; E-commerce; Resource management; Web performance,27,Information Systems Frontiers,2014 1235,Lee M.; Lee J.,The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet,"This research examines the responses of online customers to a publicized information security incident and develops a model of retreative behaviors triggered by such a security incident. The model is empirically tested using survey data from 192 users of a recently compromised website. The results of the data analyses suggest that an information security incident can cause a measurable negative impact on customer behaviors, although the impact seems to be largely limited to that particular website. The tested model of retreative behaviors indicates that perceived damage and availability of alternative shopping sources can significantly increase retreative behaviors of victimized customers, while perceived relative usefulness and ease-of-use of the website show limited effects in reducing such behaviors. © Springer Science+Business Media, LLC 2012.",Information security; Online customer Behavior; Online privacy; Perceived damage; Perceived risk; Retreative behaviors; Security incident; Shopping alternatives,37,Information Systems Frontiers,2012 1236,Hsu I.-C.,Personalized web feeds based on ontology technologies,"The rapid development of the social Web has resulted in diverse Web 2.0 applications for accessing various Web feeds such as Weblogs, news headlines, business products, real time information and Podcasts. Due to the masses of Web feeds available on the Internet, a major challenge is how to access them efficiently. Conventional methods of manually finding and matching keyword for Web feeds are time-consuming and inaccurate. This study addresses this issue by defining a Personalized Web Feeds Framework (PWFF) for integrating ontology technologies into Web feeds and user profiles. The proposed PWFF is used to develop an Ontology-based Personalized Web Feed Platform (OPWFP) that provides customized Web feeds for personnel needs. To demonstrate the feasibility of OPWFP, the experimental results illustrate the efficiency and effectiveness of the proposed approach. © 2011 Springer Science+Business Media, LLC.",Ontology; RSS; Semantic web; Web 2.0; Web feed,18,Information Systems Frontiers,2013 1237,Bu Z.; Zhang C.; Xia Z.; Wang J.,An FAR-SW based approach for webpage information extraction,"Automatically identifying and extracting the target information of a webpage, especially main text, is a critical task in many web content analysis applications, such as information retrieval and automated screen reading. However, compared with typical plain texts, the structures of information on the web are extremely complex and have no single fixed template or layout. On the other hand, the amount of presentation elements on web pages, such as dynamic navigational menus, flashing logos, and a multitude of ad blocks, has increased rapidly in the past decade. In this paper, we have proposed a statistics-based approach that integrates the concept of fuzzy association rules (FAR) with that of sliding window (SW) to efficiently extract the main text content from web pages. Our approach involves two separate stages. In Stage 1, the original HTML source is pre-processed and features are extracted for every line of text; then, a supervised learning is performed to detect fuzzy association rules in training web pages. In Stage 2, necessary HTML source preprocessing and text line feature extraction are conducted the same way as that of Stage 1, after which each text line is tested whether it belongs to the main text by extracted fuzzy association rules. Next, a sliding window is applied to segment the web page into several potential topical blocks. Finally, a simple selection algorithm is utilized to select those important blocks that are then united as the detected topical region (main texts). Experimental results on real world data show that the efficiency and accuracy of our approach are better than existing Document Object Model (DOM)-based and Vision-based approaches. © Springer Science+Business Media New York 2013.",Fuzzy association rule; Information extraction; Sliding window; Statistics-based; Topical region,10,Information Systems Frontiers,2014 1238,Fang X.; Holsapple C.W.,"Impacts of navigation structure, task complexity, and users' domain knowledge on Web site usability-an empirical study","It is essential for designers of Web sites to understand what navigation structure results in better usability for knowledge acquisition tasks of varying complexity and the Web site users with different level of domain knowledge. Literature shows that multiple factors may exert influence on Web site usability. Navigation structure, task complexity, and user domain knowledge level are among of those factors. Hypotheses are developed about the usability of alternative navigation structures, with different task complexity and user domain knowledge level. Experiments are designed and conducted to test these hypotheses in terms of user performance (accuracy, speed) in accomplishing sets of simple and comparatively complex knowledge acquisition tasks. User perceptions of usability are also measured. Two rounds of experimentation are performed, one with participants who have been trained in the domain of production and operations management, the other with participants who have not been trained in this domain. The results show that a usage-oriented hierarchy or a combined hierarchy are navigation structures associated with statistically significantly higher performance usability than a subject-oriented hierarchy, for both simple and relatively complex knowledge acquisition task sets. A statistically significant effect of domain knowledge on the perception aspect of usability is identified. The study contributes to enhancing the comprehension of researchers, practitioners, and educators about design and usability of Web site navigation structures. © 2010 Springer Science+Business Media, LLC.",Domain knowledge level; Knowledge acquisition; Navigation structure; Task complexity; Web site usability,18,Information Systems Frontiers,2011 1239,Mansingh G.; Rao L.; Osei-Bryson K.-M.; Mills A.,Profiling internet banking users: A knowledge discovery in data mining process model based approach,"Analysing datasets using data mining techniques can enhance decision making in organizations. However, to ensure that the full potential of these techniques is realised it is important that decision makers understand there are Knowledge Discovery and Data Mining (KDDM) processes that are mature enough to be adopted. This paper demonstrates the benefits of using a KDDM process to evaluate survey data for internet banking users in Jamaica which includes demographic as well as attitudinal and behavioral variables. The major benefits of following this process include the selection of a set of models, rather than a single model, which are more relevant to the business/research objectives and use of a more targeted knowledge discovery process as the data mining analyst is now directed to consider the effects the decisions in each phase will have on subsequent phases. This leads to more relevant knowledge being extracted from the data mining process. © 2013, Springer Science+Business Media New York.",Clustering; Decision tree; Demographic and attitudinal profiling; Internet banking; Knowledge Discovery in Data Mining,19,Information Systems Frontiers,2015 1240,Elbanna A.; Linderoth H.C.J.,The formation of technology mental models: the case of voluntary use of technology in organizational setting,"The use of information systems in organisations presents one of the early signs of success. Hundreds of studies have generated a wealth of knowledge on systems use across a broad range of technologies and theoretical approaches. However, new types of technologies and organisations continue to pose challenges to systems use. The case of open systems that are offered to users on a voluntary basis presents one of those challenges for two reasons: 1) the systems are open in the sense that they could be configured in many ways depending on users finding use cases and possible applications; 2) the system use is voluntary and hence there is no organisational push. They bring users’ choice and active finding of use cases to the centre of their success. This study questions why and how users choose to engage (or not to engage) with open technology on a voluntary basis and how and why its use options and potential unfold? It examines a longitudinal case study (1994–2012) on the voluntary use of telemedicine. The findings reveal that users’ perception of open technology in a voluntary setting is formed through a continuous interplay between users’ technology mental models, professional identity, institutional traditions and arrangements and work practices. If perceived to be in contradiction with professional identity, institutional traditions and arrangements or work practices, users’ technology mental models are fixated on the misfit and the misfit is thereby reinforced. Hence, users do not try to find use cases or think of possible applications. However, institutional entrepreneurs could break this self-fulfilling prophecy by influencing both the technology mental models of users and the institutional arrangements. © 2014, Springer Science+Business Media New York.",Institutional setting; IS-success; IS-use; Mental models; Open technology; Telemedicine; Voluntary use,28,Information Systems Frontiers,2015 1241,Zhang S.; Tjortjis C.; Zeng X.; Qiao H.; Buchan I.; Keane J.,Comparing data mining methods with logistic regression in childhood obesity prediction,"The epidemiological question of concern here is ""can young children at risk of obesity be identified from their early growth records?"" Pilot work using logistic regression to predict overweight and obese children demonstrated relatively limited success. Hence we investigate the incorporation of non-linear interactions to help improve accuracy of prediction; by comparing the result of logistic regression with those of six mature data mining techniques. The contributions of this paper are as follows: a) a comparison of logistic regression with six data mining techniques: specifically, for the prediction of overweight and obese children at 3 years using data recorded at birth, 6 weeks, 8 months and 2 years respectively; b) improved accuracy of prediction: prediction at 8 months accuracy is improved very slightly, in this case by using neural networks, whereas for prediction at 2 years obtained accuracy is improved by over 10%, in this case by using Bayesian methods. It has also been shown that incorporation of non-linear interactions could be important in epidemiological prediction, and that data mining techniques are becoming sufficiently well established to offer the medical research community a valid alternative to logistic regression. © 2009 Springer Science+Business Media, LLC.",Accuracy; Machine learning; Medical data mining; Prediction; Public health,104,Information Systems Frontiers,2009 1242,Formica A.,Similarity reasoning for the semantic web based on fuzzy concept lattices: An informal approach,"Similarity Reasoning in the presence of vague information is becoming fundamental in several research areas and, in particular, in the Semantic Web. Fuzzy Formal Concept Analysis (FFCA) is a generalization of Formal Concept Analysis (FCA) for modeling uncertainty information. Although FFCA has become very interesting for supporting different activities for the development of the Semantic Web, in the literature it is usually addressed at a technical level and intended for a restricted audience. This paper proposes a similarity measure for FFCA concepts. The key notions underlying the proposed approach are presented informally, in order to reach a broad audience of readers. © 2012 Springer Science+Business Media, LLC.",Fuzzy formal concept analysis; Semantic web; Similarity reasoning,17,Information Systems Frontiers,2013 1243,Liu Q.; Liu Z.,A comparison of improving multi-class imbalance for internet traffic classification,"Most research of class imbalance is focused on two class problem to date. A multi-class imbalance is so complicated that one has little knowledge and experience in Internet traffic classification. In this paper we study the challenges posed by Internet traffic classification using machine learning with multi-class unbalanced data and the ability of some adjusting methods, including resampling (random under-sampling, random over-sampling) and cost-sensitive learning. Then we empirically compare the effectiveness of these methods for Internet traffic classification and determine which produces better overall classifier and under what circumstances. Main works are as below. (1) Cost-sensitive learning is deduced with MetaCost that incorporates the misclassification costs into the learning algorithm for improving multi-class imbalance based on flow ratio. (2) A new resampling model is presented including under-sampling and over-sampling to make the multi-class training data more balanced. (3) The solution is presented to compare among three methods or to compare three methods with original case. Experiment results are shown on sixteen datasets that flow g-mean and byte g-mean are statistically increased by 8.6 % and 3.7 %; 4.4 % and 2.8 %; 11.1 % and 8.2 % when three methods are compared with original case. Cost-sensitive learning is as the first choice when the sample size is enough, but resampling is more practical in the rest. © 2012 Springer Science+Business Media, LLC.",Cost-sensitive learning; Internet traffic classification; Multi-class imbalance; Resampling,23,Information Systems Frontiers,2014 1244,Ly L.T.; Rinderle-Ma S.; Göser K.; Dadam P.,"On enabling integrated process compliance with semantic constraints in process management systems: Requirements, challenges, solutions","Key to broad use of process management systems (PrMS) in practice is their ability to foster and ease the implementation, execution, monitoring, and adaptation of business processes while still being able to ensure robust and error-free process enactment. To meet these demands a variety of mechanisms has been developed to prevent errors at the structural level (e.g., deadlocks). In many application domains, however, processes often have to comply with business level rules and policies (i.e., semantic constraints) as well. Hence, to ensure error-free executions at the semantic level, PrMS need certain control mechanisms for validating and ensuring the compliance with semantic constraints. In this paper, we discuss fundamental requirements for a comprehensive support of semantic constraints in PrMS. Moreover, we provide a survey on existing approaches and discuss to what extent they are able to meet the requirements and which challenges still have to be tackled. In order to tackle the particular challenge of providing integrated compliance support over the process lifecycle, we introduce the SeaFlows framework. The framework introduces a behavioural level view on processes which serves a conceptual process representation for constraint specification approaches. Further, it provides general compliance criteria for static compliance validation but also for dealing with process changes. Altogether, the SeaFlows framework can serve as formal basis for realizing integrated support of semantic constraints in PrMS. © Springer Science+Business Media, LLC 2012.",Adaptive process management systems; Compliance validation; Process verification; Semantic constraints,82,Information Systems Frontiers,2012 1245,Stefanovic M.; Matijević M.; Erić M.; Simic V.,Method of design and specification of web services based on quality system documentation,"In this paper, we present a method for development and specification of web services based on the quality system documentation. The general assumption is that service oriented architecture is based on business services and these business services mostly correspond to exchanged documentation in a real business system. Documentation of a quality system is recognized in form of documents that describe business processes in a real business system and identify exchanged documentation with environment. Presented method uses documentation of quality system and documentation flow for web service specification. We developed the CASE tool for web service specification based on a new approach, and we compare it to other existing tools. © 2008 Springer Science+Business Media, LLC.",DQMS; Specification; Web service,4,Information Systems Frontiers,2009 1246,Duarte L.; Carriço L.,Designing for geo-referenced in-situ therapeutic scenarios,"Cognitive behavioral therapy and social competences and skills training sometimes rely on in-situ activities to improve the patients’ condition. As the process evolves, therapists concede some autonomy to patients, allowing them to carry out those activities without the need for the former’s presence. The ability to remotely track patient’s activities provides an interesting solution to ensure their success, still encouraging their autonomy. This paper presents the design process and evaluation of a remote group monitoring and communication system for these two types of procedures. We use traditional group communication directives and augment them with geo-referenced information, empowering therapists with critical data to track their patients live and remotely. We describe the design process of a high-fidelity prototype and discuss the results from an experimental study that assessed the system from a usability and functionality perspectives. Results fueled an interesting discussion regarding how geo-referenced information help users maintaining awareness when multi-tasking. © 2015, Springer Science+Business Media New York.",Cognitive behavioral therapy; Geo-location; Group monitoring; Social competences and skills training,2,Information Systems Frontiers,2016 1247,Lu B.; Hirschheim R.; Schwarz A.,Examining the antecedent factors of online microsourcing,"In this paper, we empirically investigate what motivates firms to engage in the new outsourcing practice known as online microsourcing. Five antecedent factors involved in making online microsourcing decisions, mainly representing economic and strategic considerations, were identified based on prior research. Our research model was tested with data collected from one of the primary online microsourcing platforms. Our findings suggested that online microsourcing decisions are made more for the convenience of management and for strategic reasons than for purposes of cost reduction. Thus, this study indicates the relevance of a resource-based theory for online microsourcing. Because online microsourcing is generally characterized by small outsourcing deals, with small firms as clients, this paper introduces a new outsourcing practice to the current outsourcing landscape. Finally implications for theory and practice are presented. © 2013, Springer Science+Business Media New York.","Antecedent factors; Online microsourcing, Crowdsourcing; Outsourcing decisions; Resource-based theory",25,Information Systems Frontiers,2015 1248,Heras S.; Botti V.; Julián V.,An ontological-based knowledge-representation formalism for case-based argumentation,"In open multi-agent systems, agents can enter or leave the system, interact, form societies, and have dependency relations with each other. In these systems, when agents have to collaborate or coordinate their activities to achieve their objectives, their different interests and preferences can come into conflict. Argumentation is a powerful technique to harmonise these conflicts. However, in many situations the social context of agents determines the way in which agents can argue to reach agreements. In this paper, we advance research in the computational representation of argumentation frameworks by proposing a new ontological-based, knowledge-representation formalism for the design of open MAS in which the participating software agents are able to manage and exchange arguments with each other taking into account the agents’ social context. This formalism is the core of a case-based argumentation framework for agent societies. In addition, we present an example of the performance of the formalism in a real domain that manages the requests received by the technicians of a call centre. © 2014, Springer Science+Business Media New York.",Agreement technologies; Argumentation; Multi-agent systems,8,Information Systems Frontiers,2015 1249,Dwivedi Y.K.; Lal B.; Mustafee N.; Williams M.D.,Profiling a decade of Information Systems Frontiers' research,"This article analyses the first 10 years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors' backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions. © 2008 Springer Science+Business Media, LLC.",Information Systems Frontiers (ISF); IS research; Meta-analysis; Research method; Research profile,51,Information Systems Frontiers,2009 1250,Khan Y.A.; El-Attar M.,Using model transformation to refactor use case models based on antipatterns,"Use Case modeling is a popular technique for documenting functional requirements of software systems. Refactoring is the process of enhancing the structure of a software artifact without changing its intended behavior. Refactoring, which was first introduced for source code, has been extended for use case models. Antipatterns are low quality solutions to commonly occurring design problems. The presence of antipatterns in a use case model is likely to propagate defects to other software artifacts. Therefore, detection and refactoring of antipatterns in use case models is crucial for ensuring the overall quality of a software system. Model transformation can greatly ease several software development activities including model refactoring. In this paper, a model transformation approach is proposed for improving the quality of use case models. Model transformations which can detect antipattern instances in a given use case model, and refactor them appropriately are defined and implemented. The practicability of the approach is demonstrated by applying it on a case study that pertains to biodiversity database system. The results show that model transformations can efficiently improve quality of use case models by saving time and effort. © 2014, Springer Science+Business Media New York.",Antipatterns; Model transformation; Refactoring; UML; Use case modeling quality attributes; Use cases,18,Information Systems Frontiers,2016 1251,Gosain S.,Realizing the vision for web services: Strategies for dealing with imperfect standards,"Organizations considering the adoption of the web services framework for their Information Technology (IT) applications are confronted with a period of technological ferment, as standards for supporting non-trivial business process functionality are not yet in place. Evolving standardization poses challenges in the form of inter-temporal dependencies as organizations' conformance to the standards that emerge in the future is contingent on their current design choices that need to be made ex-ante without complete information of how standards will evolve. At the same time, there are significant early-mover benefits to be gained by executing an IT strategy using web services as a cornerstone. This paper draws upon coordination theory to develop a conceptual framework outlining three approaches for organizations to deal with changing standardization regimes: (a) The dependencies across components, conforming to different standardization regimes, are continually bridged through intermediary services (e.g., using a protocol adapter that translates to an unanticipated emergent standard), (b) The dependencies across components are minimized through loose coupling so that standardization regime changes for any component have a minimal impact on other components (e.g., encapsulating the functionality susceptible to design change into a module with abstract interfaces), and (c) The impacted components are rapidly reconfigurable as and when standardization regime changes (e.g., by building in ""extension"" features into applications). The risk for organizations investing in web services can be further managed by mechanisms such as organization's attention to signals from the periphery, undertaking low-risk experiments to learn in different areas, and bricolage-like improvisations of their legacy components at hand. © Springer Science+Business Media, LLC 2007.",Coordination theory; Imperfect standards; Web services,10,Information Systems Frontiers,2007 1252,Hwang Y.-C.; Yuan S.-T.,Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom,"Ubiquitous e-service is one of the most recent links in the chain of evolution that has characterized the different eras of the internetworking environment. In order to leap the trust barrier for the users to embrace these ubiquitous e-services, we present a collaborative iTrust e-service for exploring proximal collective wisdom in the ad-hoc ubiquitous environment. By highlighting the homophily of e-service participants, these isolated individuals can be treated as a group with proximity. Proximity thus enables ad-hoc e-service participants to contribute their strength for ubiquitous collective wisdom. Simulation outcomes for trust decision quality enhancement show significant improvement over traditional designs. The iTrust e-service makes it possible for users to collaborate with the nearby user groups for establishing a reliable and trustworthy interaction environment. It also facilitates and empowers the potential benefits of various ubiquitous e-service applications. © 2008 Springer Science+Business Media, LLC.",Ad-Hoc ubiquitous environment; Proximal collective wisdom; Trust; Ubiquitous e-service,2,Information Systems Frontiers,2009 1253,Klenk S.; Dippon J.; Fritz P.; Heidemann G.,Interactive survival analysis with the OCDM system: From development to application,"Medical data mining is currently actively pursued in computer science and statistical research but not in medical practice. The reasons therefore lie in the difficulties of handling and statistically analyzing medical data. We have developed a system that allows practitioners in the field to interactively analyze their data without assistance of statisticians or data mining experts. In the course of this paper we will introduce data mining of medical data and show how this can be achieved for survival data. We will demonstrate how to solve common problems of interactive survival analysis by presenting the Online Clinical Data Mining (OCDM) system. Thereby the main focus is on similarity based queries, a new method to select similar cases based on their covariables and the influence of these on their survival. © 2009 Springer Science+Business Media, LLC.",Medical data mining; Regression based distance measures; Survival analysis; User centered data mining,9,Information Systems Frontiers,2009 1254,Li X.; Liu J.; Sheng Q.Z.; Zeadally S.; Zhong W.,TMS-RFID: Temporal management of large-scale RFID applications,"In coming years, there will be billions of RFID tags living in the world tagging almost everything for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of event processing of RFID applications. Since most RFID applications are time sensitive, we propose a notion of Time To Live (TTL), representing the period of time that an RFID event can legally live in an RFID data management system, to manage various temporal event patterns. TTL is critical in the ""Internet of Things"" for handling a tremendous amount of partial event-tracking results. Also, TTL can be used to provide prompt responses to time-critical events so that the RFID data streams can be handled timely. We divide TTL into four categories according to the general event-handling patterns. Moreover, to extract event sequence from an unordered event stream correctly and handle TTL constrained event sequence effectively, we design a new data structure, namely Double Level Sequence Instance List (DLSIList), to record intermediate stages of event sequences. On the basis of this, an RFID data management system, namely Temporal Management System over RFID data streams (TMS-RFID), has been developed. This system can be constructed as a stand-alone middleware component to manage temporal event patterns. We demonstrate the effectiveness of TMS-RFID on extracting complex temporal event patterns through a detailed performance study using a range of high-speed data streams and various queries. The results show that TMS-RFID has a very high throughput, namely 170,000-870,000 events per second for different highly complex continuous queries. Moreover, the experiments also show that the main structure to record the intermediate stages in TMS-RFID does not increase exponentially with the number of events. These results demonstrate that TMS-RFID not only supports high processing speeds, but is also highly scalable. © 2009 Springer Science+Business Media, LLC.",RFID data management; RFID event processing; TTL; Unordered event stream,18,Information Systems Frontiers,2011 1255,Beck R.; Beimborn D.; Weitzel T.; König W.,Network effects as drivers of individual technology adoption: Analyzing adoption and diffusion of mobile communication services,"Adoption research has largely ignored the dynamic impact of network effects on technology adoption and diffusion. For example, some technologies become more attractive the more social peers use them as well. But adoption at the same time increases the value for the peers and thereby their adoption decisions as well. Unfortunately, interdependencies like these make adoption and diffusion patterns very complex. Drawing on network effect theory, we develop an adoption and diffusion model that explicitly considers the role of direct and indirect network effects for individual technology adoption, using mobile commerce adoption as application example. By applying a simulation approach we can exemplify and analyze the fundamental adoption dynamics given rise to by network effects. We thereby propose a way of how to incorporate network effects into adoption research and disclose the role of the technology diffusion lifecycle for individual adoption. © 2008 Springer Science+Business Media, LLC.",Diffusion; Diffusion cycle model; Dynamic diffusion processes; Intertemporal consumer choice; Network effect theory,37,Information Systems Frontiers,2008 1256,Rottman J.W.; Lacity M.C.,A US Client's learning from outsourcing IT work offshore,"Based on 45 interviews and significant documentation, we explore the offshore outsourcing experiences of a US-based biotechnology company. This company offshore outsourced 21 IT projects to six suppliers in India. Senior managers and the official documents from the Program Management Office consistently reported that offshore outsourcing was successful in reducing the company's IT costs. But interviews with knowledgeable participants actually managing the projects suggest that many projects were not successful in meeting cost, quality, and productivity objectives. We found evidence that this company's offshore strategy to simply replace domestic contractors with cheaper, offshore suppliers was a poor fit with its social and cultural contexts. Specifically, we found that strong social networks between the company's internal IT employees and domestic contractors were not easily replicated with offshore suppliers. Furthermore, the internal project management processes were often incompatible with offshore suppliers' processes. This paper also analyzes seven project characteristics that differentiate highly-rated projects from poorly-rated projects. These project characteristics are type of IT work, size of supplier firm, location of supplier employees (onsite/offshore), dollar value of the contract, duration of the project, timing of the project, and client unit managing the project. The paper concludes with four overall insights for clients and suppliers. © 2007 Springer Science+Business Media, LLC.",IT; Offshore; Outsourcing,56,Information Systems Frontiers,2008 1257,Hsu C.-H.; Chao H.-C.; Hyuk Park J.,Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems,"With the emergence of wireless RFID technologies, the problem of Anti-Collision has been arousing attention and instigated researchers to propose different heuristic algorithms for advancing RFID systems operated in more efficient manner. However, there still have challenges on enhancing the system throughput and stability due to the underlying technologies had faced different limitation in system performance when network density is high. In this paper, we present a Threshold Jumping (TJ) and a Wrap-Around Scan (WAS) techniques, which are query tree based approaches, aiming to coordinate simultaneous communications in high density RFID environments, to speedup tag identification, to increase the overall read rate and to improve system throughput in large-scale RFID systems. The main idea of the Threshold Jumping is to limit the number of collisions. When the number of collisions exceeds a predefined threshold, it reveals that tag density in RF field is too high. To avoid unnecessary enquiry messages, the prefix matching will be moved to next level of the query tree, alleviating the collision problems. The method of setting frequency bound indeed improves the efficiency in high density and randomly deployed RFID systems. However, in irregular or imbalanced RFID networks, inefficient situation may happen. The problem is that the prefix matching is performed in single direction level-order scheme, which may cause an imbalance query tree on which the right sub-tree always not been examined if the identification process goes to next level before scan the right sub-tree due to threshold jumping. By scanning the query tree from right to left in alternative levels, i.e., wrap-around, this flaw cold be ameliorated. To evaluate the performance of proposed techniques, we have implemented the TJ and the WAS method along with the query tree protocol. The simulation results show that the proposed techniques provide superior performance in high density environments. It is shown that the TJ and WAS are effective in terms of increasing system throughput and minimizing identification delay. © 2009 Springer Science+Business Media, LLC.",Query tree; Tag anti-collision; Threshold jumping; Wrap-around scan,25,Information Systems Frontiers,2011 1258,Sabat H.K.,Spectrum acquisition strategies adopted by wireless carriers in the USA,"This comprehensive review paper integrates concepts and viewpoints to understand the strategies adopted by the wireless carriers in the USA when acquiring mobile wireless spectrum. In the mobile wireless industry, the key industry and business drivers are the investments made by network operators. Of these cost drivers, the most influential on the industry's dynamics are the capital investments, which include spectrum acquisition investments. This paper provides a review of, and integrates new theories and research results of a group of original papers on spectrum strategies. The concepts and viewpoints are developed based on inferences drawn across these papers, and extensive studies on the evolution of spectrum market and acquisition patterns amongst carriers during the wireless spectrum distributions in the U.S. over the past 15 years. © 2007 Springer Science+Business Media, LLC.",Asset exchange; Auction; Designated regions; Divestitures; Equity holding; Mergers and acquisitions; Spectrum acquisition strategies; Spectrum leasing; Spectrum markets; Spectrum resale,9,Information Systems Frontiers,2008 1259,Madhusudan T.,A web services framework for distributed model management,"Distributed model management aims to support the wide-spread sharing and usage of decision support models. Web services is a promising technology for supporting distributed model management activities such as model creation and delivery, model composition, model execution and model maintenance to fulfill dynamic decision-support and problem solving requests. We propose a web services based framework for model management (called MM-WS) to support various activities of the model management life cycle. The framework is based on the recently proposed Integrated Service Planning and Execution (ISP & E) approach for web services integration. We discuss encoding of domain knowledge (as individual models) and utilize the MM-WS framework to interleave synthesis of composite models with their execution. A prototypical implementation with an example is used to illustrate the utility of the framework to enable distributed model management and knowledge integration. Benefits and issues of using the framework to support model-based decision-making in organizational contexts are outlined. © Springer Science+Business Media, LLC 2007.",Distributed model management; Model composition; Model reuse; Web services,21,Information Systems Frontiers,2007 1260,Xiong H.; Zhang D.; Zhang D.; Gauthier V.; Yang K.; Becker M.,MPaaS: Mobility prediction as a service in telecom cloud,"Mobile applications and services relying on mobility prediction have recently spurred lots of interest. In this paper, we propose mobility prediction based on cellular traces as an infrastructural level service of telecom cloud. Mobility Prediction as a Service (MPaaS) embeds mobility mining and forecasting algorithms into a cloud-based user location tracking framework. By empowering MPaaS, the hosted 3rd-party and value-added services can benefit from online mobility prediction. Particularly we took Mobility-aware Personalization and Predictive Resource Allocation as key features to elaborate how MPaaS drives new fashion of mobile cloud applications. Due to the randomness of human mobility patterns, mobility predicting remains a very challenging task in MPaaS research. Our preliminary study observed collective behavioral patterns (CBP) in mobility of crowds, and proposed a CBP-based mobility predictor. MPaaS system equips a hybrid predictor fusing both CBP-based scheme and Markov-based predictor to provide telecom cloud with large-scale mobility prediction capacity. © 2013 Springer Science+Business Media New York.",Collective behaviors; Mobile cloud computing; Mobility prediction; Telecom cloud; Telecommunication system,16,Information Systems Frontiers,2014 1261,Lai J.-Y.; Ulhas K.R.; Lin J.-D.,Assessing and managing e-commerce service convenience,"Due to the burgeoning growth of electronic commerce (EC or e-commerce), online shopping has become a key competitive strategy for online retailers (e-retailers) to attract more customers, expand market boundaries, and create more benefits. Service convenience (SERVCON), a concept of benefit and related to customer satisfaction and retention, has received increasing attention and is now treated as an important factor in shopping behavior. Unfortunately, the literature on convenience has explored only traditional retailers. Thus, this research attempts to apply the results of marketing and information management (IM) research concerning customer service convenience with e-retailers. Based on a survey of 304 online shoppers (e-shoppers) in Taiwan, a 14-item e-commerce service convenience (EC-SERVCON) instrument was constructed. We then construct an EC-SERVCON managerial grid for managers to use in formulating strategy for improving service convenience. The instrument, findings, and implications of this study will be valuable to researchers and practitioners interested in designing, implementing, and managing e-commerce. © 2012 Springer Science+Business Media, LLC.",E-commerce; E-retailer; Online shopping; Scale development; Service convenience,45,Information Systems Frontiers,2014 1262,Hashmi M.; Governatori G.; Wynn M.T.,Normative requirements for regulatory compliance: An abstract formal framework,"By definition, regulatory rules (in legal context called norms) intend to achieve specific behaviour from business processes, and might be relevant to the whole or part of a business process. They can impose conditions on different aspects of process models, e.g., control-flow, data and resources etc. Based on the rules sets, norms can be classified into various classes and sub-classes according to their effects. This paper presents an abstract framework consisting of a list of norms and a generic compliance checking approach on the idea of (possible) execution of processes. The proposed framework is independent of any existing formalism, and provides a conceptually rich and exhaustive ontology and semantics of norms needed for business process compliance checking. Apart from the other uses, the proposed framework can be used to compare different compliance management frameworks (CMFs). © 2015, Springer Science+Business Media New York.",Business process regulatory compliance; Compliance frameworks; Normative requirements; Norms; Norms compliance,63,Information Systems Frontiers,2016 1263,Zhu X.; Oates T.,Finding story chains in newswire articles using random walks,"Massive amounts of information about news events are published on the Internet every day in online newspapers, blogs, and social network messages. While search engines like Google help retrieve information using keywords, the large volumes of unstructured search results returned by search engines make it hard to track the evolution of an event. A story chain is composed of a set of news articles that reveal hidden relationships among different events. Traditional keyword-based search engines provide limited support for finding story chains. In this paper, we propose a random walk based algorithm to find story chains. When breaking news happens, many media outlets report the same event. We have two pruning mechanisms in the algorithm to automatically exclude redundant articles from the story chain and to ensure efficiency of the algorithm. We further explore how named entities and word relevance can help find relevant news articles and improve algorithm efficiency by creating a co-clustering based correlation graph. Experimental results show that our proposed algorithm can generate coherent story chains without redundancy. The efficiency of the algorithm is significantly improved on the correlation graph. © Springer Science+Business Media New York 2013.",Information overload; Named entities; Random walk,9,Information Systems Frontiers,2014 1264,Wang L.; Xu L.; Liu R.; Wang H.H.,An approach for moving object recognition based on BPR and CI,"A recognition and classification method of multiple moving objects in traffic based on the combination of the Biomimetic Pattern Recognition (BPR) and Choquet Integral (CI) is proposed. The recognition process consists of three stages. At the first stage, vehicles and pedestrians are detected in video images and the area, the shape and the velocity features are obtained by classical methods. At the second stage, BPR is used to classify the Zernike moments extracted at the first stage. At the last stage, CI is then adopted for multi-features fusion based on the output of BPR, and the area and the velocity features obtained at the first stage to improve the recognition accuracy. Experiment results show that this approach is efficient. © Springer Science + Business Media, LLC 2008.",Computer vision; Enterprise information systems; Information systems; Object recognition; Transportation,10,Information Systems Frontiers,2010 1265,O'Hagan A.M.J.; Sadiq S.; Sadiq W.,Evie - A developer toolkit for encoding service interaction patterns,"Facilitation of collaborative business processes across organizational and infrastructural boundaries continues to present challenges to enterprise software developers. One of the greatest difficulties in this respect is achieving a streamlined pipeline from business modeling to execution infrastructures. In this paper we present Evie - an approach for rapid design and deployment of event driven collaborative processes based on significant language extensions to Java that are characterized by abstract and succinct constructs. The focus of this paper is to provide proof of concept of Evie's expressability using a recent benchmark known as service interaction patterns. While the patterns encapsulate the breadth of required business process semantics the Evie language delivers a rapid means of encoding them at an abstract level, and subsequently compiling and executing them to create a fully fledged Java-based execution environment. © 2008 Springer Science+Business Media, LLC.",Event brokering; Harmonized messaging; Process execution language; Service interaction,1,Information Systems Frontiers,2009 1266,Tang Y.; Cerutti F.; Oren N.; Bisdikian C.,Reasoning about the impacts of information sharing,"Shared information can benefit an agent, allowing others to aid it in its goals. However, such information can also harm, for example when malicious agents are aware of these goals, and can then thereby subvert the goal-maker’s plans. In this paper we describe a decision process framework allowing an agent to decide what information it should reveal to its neighbours within a communication network in order to maximise its utility. We assume that these neighbours can pass information onto others within the network. The inferences made by agents receiving the messages can have a positive or negative impact on the information providing agent, and our decision process seeks to assess how a message should be modified in order to be most beneficial to the information producer. Our decision process is based on the provider’s subjective beliefs about others in the system, and therefore makes extensive use of the notion of trust with regards to the likelihood that a message will be passed on by the receiver, and the likelihood that an agent will use the information against the provider. Our core contributions are therefore the construction of a model of information propagation; the description of the agent’s decision procedure; and an analysis of some of its properties. © 2014, Springer Science+Business Media New York.",Impacts; Information sharing; Risk; Trust,4,Information Systems Frontiers,2015 1267,Kim M.; Song J.; Triche J.,Toward an integrated framework for innovation in service: A resource-based view and dynamic capabilities approach,"Organizations today desire strategies that place them on the frontiers of service innovation. In this research, we provide a novel research framework that incorporates resources and capabilities and how they affect elements of service innovation. This research draws on the resource-based view of the firm to define firm’s internal resources and outside (i.e., relational) capabilities. Because firms compete in a dynamically changing market, we introduce dynamic service capabilities as three distinct processes that allow resources and relational capabilities to affect components of service innovation. Three propositions are introduced in addition to specific examples of promising future empirical work using service-oriented firms. This study aims to contribute to service innovation through a theoretical foundation in which we posit how firms develop their service innovation through a dynamic service capabilities framework. Contributions to theory and practice are discussed in addition to limitations to the study. © 2014, Springer Science+Business Media New York.",Dynamic service capabilities; Resource-based view; Service innovation; Value co-creation,105,Information Systems Frontiers,2015 1268,Hoffmann J.; Weber I.; Governatori G.,On compliance checking for clausal constraints in annotated process models,"Compliance management is important in several industry sectors where there is a high incidence of regulatory control. It must be ensured that business practices, as reflected in business processes, comply with the rules. Such compliance checks are challenging due to (1) the different life cycles of rules and processes, and (2) their disparate representations. (1) requires retrospective checking of process models. To address (2), we herein devise a framework where processes are annotated to capture the semantics of task execution, and compliance is checked against a set of constraints posing restrictions on the desirable process states. Each constraint is a clause, i.e., a disjunction of literals. If a process can reach a state that falsifies all literals of one of the constraints, then that constraint is violated in that state, and indicates non-compliance. Naively, such compliance can be checked by enumerating all reachable states. Since long waiting times are undesirable, it is important to develop efficient (low-order polynomial time) algorithms that (a) perform exact compliance checking for restricted cases, or (b) perform approximate compliance checking for more general cases. Herein, we observe that methods of both kinds can be defined as a natural extension of our earlier work on semantic business process validation. We devise one method of type (a), and we devise two methods of type (b); both are based on similar restrictions to the processes, where the restrictions made by methods (b) are a subset of those made by method (a). The approximate methods each guarantee either of soundness (finding only non-compliances) or completeness (finding all non-compliances). We describe how one can trace the state evolution back to the process activities which caused the (potential) non-compliance, and hence provide the user with an error diagnosis. © Springer Science+Business Media, LLC 2012.",Business process design; Compliance checking; Compliant process design; Formal process verification,45,Information Systems Frontiers,2012 1269,Arora A.; Nandkumar A.; Telang R.,Does information security attack frequency increase with vulnerability disclosure? An empirical analysis,"Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has been controversial. On one hand are those who propose full and instant disclosure whether the patch is available or not and on the other hand are those who argue for limited or no disclosure. Which of the two policies is socially optimal depends critically on how attack frequency changes with disclosure and patching. In this paper, we empirically explore the impact of vulnerability information disclosure and availability of patches on attacks targeting the vulnerability. Our results suggest that on an average both secret (non-published) and published (published and not patched) vulnerabilities attract fewer attacks than patched (published and patched) vulnerabilities. When we control for time since publication and patches, we find that patching an already known vulnerability decreases the number of attacks, although attacks gradually increase with time after patch release. Patching an unknown vulnerability, however, causes a spike in attacks, which then gradually decline after patch release. Attacks on secret vulnerabilities slowly increase with time until the vulnerability is published and then attacks rapidly decrease with time after publication. © Springer Science+Business Media, LLC 2006.",Disclosure policy; Economics; Patching; Risk management; Software vulnerability,92,Information Systems Frontiers,2006 1270,Nagulendra S.; Vassileva J.,"Providing awareness, explanation and control of personalized filtering in a social networking site","Social networking sites (SNSs) have applied personalized filtering to deal with overwhelmingly irrelevant social data. However, due to the focus of accuracy, the personalized filtering often leads to “the filter bubble” problem where the users can only receive information that matches their pre-stated preferences but fail to be exposed to new topics. Moreover, these SNSs are black boxes, providing no transparency for the user about how the filtering mechanism decides what is to be shown in the activity stream. As a result, the user’s usage experience and trust in the system can decline. This paper presents an interactive method to visualize the personalized filtering in SNSs. The proposed visualization helps to create awareness, explanation, and control of personalized filtering to alleviate the “filter bubble” problem and increase the users’ trust in the system. Three user evaluations are presented. The results show that users have a good understanding about the filter bubble visualization, and the visualization can increase users’ awareness of the filter bubble, understandability of the filtering mechanism and to a feeling of control over the data stream they are seeing. The intuitiveness of the design is overall good, but a context sensitive help is also preferred. Moreover, the visualization can provide users with better usage experience and increase users’ trust in the system. © 2015, Springer Science+Business Media New York.",Online communities; Personalized Filtering; SNS; Social network; Visualization,29,Information Systems Frontiers,2016 1271,Fang S.; Xu L.; Zhu Y.; Liu Y.; Liu Z.; Pei H.; Yan J.; Zhang H.,An integrated information system for snowmelt flood early-warning based on internet of things,"Floods and water resource management are major challenges for human in present and the near future, and snowmelt floods which usually break out in arid or semi-arid regions often cause tremendous social and economic losses, and integrated information system (IIS) is valuable to scientific and public decision-making. This paper presents an integrated approach to snowmelt floods early-warning based on geoinformatics (i.e. remote sensing (RS), geographical information systems (GIS) and global positioning systems (GPS)), Internet of Things (IoT) and cloud services. It consists of main components such as infrastructure and devices in IoT, cloud information warehouse, management tools, applications and services, the results from a case study shows that the effectiveness of flood prediction and decision-making can be improved by using the IIS. The prototype system implemented in this paper is valuable to the acquisition, management and sharing of multi-source information in snowmelt flood early-warning even in other tasks of water resource management. The contribution of this work includes developing a prototype IIS for snowmelt flood early-warning in water resource management with the combination of IoT, Geoinformatics and Cloud Service, with the IIS, everyone could be a sensor of IoT and a contributor of the information warehouse, professional users and public are both servers and clients for information management and services. Furthermore, the IIS provides a preliminary framework of e-Science in resources management and environment science. This study highlights the crucial significance of a systematic approach toward IISs for effective resource and environment management. © 2013, Springer Science+Business Media New York.",Cloud services; e-Science; Geoinformatics; Integrated information system; Internet of things; Snowmelt flood early-warning,127,Information Systems Frontiers,2015 1272,Sengupta A.; Schiller S.Z.,"FlexRFID: A design, development and deployment framework for RFID-based business applications","The surge of RFID technology and ensuing competition in the RFID vendor market has increased the complexity of integration of RFID into current business processes. To address this problem, we present FlexRFID, a modeling template composed of state indicators, conditions, a simulation engine, and a device-independent deployment architecture for rapid prototyping of control applications using RFID and sensor hardware. The modeling technique is based on Moore Machines, a variant of finite state automata that allow states to be associated with outputs. With FlexRFID, users design applications by modeling business logic via transition of states based on sensor events. Outputs associated with individual states can handle operational characteristics of the application. In this article, we present the modeling methodology and demonstrate how organizations can develop complex applications easily using FlexRFID. We believe that the simplicity and flexibility of FlexRFID will lead to the development of RFID applications quickly even with limited resources. In addition, the parking entry application presented in our paper demonstrates FlexRFID's capability of being used in business application context, as well as in research, training, and teaching. © 2009 Springer Science+Business Media, LLC.",Application; Design; FlexRFID; Modeling; RFID,6,Information Systems Frontiers,2010 1273,Guajardo J.; Škorić B.; Tuyls P.; Kumar S.S.; Bel T.; Blom A.H.M.; Schrijen G.-J.,"Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions","Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices. © 2008 Springer Science+Business Media, LLC.",Fuzzy extractor; Helper data algorithm; Intrinsic PUF; Key distribution; LC-PUFs; Physical unclonable functions; Sensor nodes; SRAMs,62,Information Systems Frontiers,2009 1274,Chakraborty S.; Sen A.K.; Bagchi A.,Addressing the valuation problem in multi-round combinatorial auctions,"Multi-round combinatorial auctions have been infrequently employed for essentially two reasons, the computational complexity of the Winner Determination Problem, and the need to provide information feedback to bidders to enable them to bid meaningfully. Here we take a fresh look at the second issue. In business environments, a bidder’s valuation of a package can change in response to signals from other bidders. In the absence of feedback, bidders are forced to expend time and resources to determine these package valuations as accurately as possible. We propose a multi-round combinatorial auction scheme with inter-round feedback called RevalSlot that helps a bidder to converge to an appropriate valuation for a package. This is likely to prove attractive to bidders and thereby increase bidder participation. We also propose a simplified version of the scheme called RevalBundle that requires fewer solutions of the Winner Determination Problem. © 2014, Springer Science+Business Media New York.",Information feedback; Multi-round combinatorial auction; Package valuation; Valuation problem,0,Information Systems Frontiers,2015 1275,Kankanhalli A.; Hahn J.; Tan S.; Gao G.,Big data and analytics in healthcare: Introduction to the special section,[No abstract available],,124,Information Systems Frontiers,2016 1276,Feng Z.; Peng R.; Wong R.K.; He K.; Wang J.; Hu S.; Li B.,QoS-aware and multi-granularity service composition,"Composition of Web services can be very complex, and usually involves multiple atomic services and varieties of message exchange patterns. Worst still, with the increasing amount of available services with varying granularity and quality, selecting the best combination of services becomes very challenging. This paper addresses the issues on multi-granularity service composition with awareness of the service quality. In particular, we consider how a new service composition plan is produced, while preserving its original observable behaviors of a service that are shown to the service user, by substituting the service with another service or a set of services of finer or coarser grain. The new plan aims to have services of better quality (if the corresponding underlying services are available). To achieve this, we firstly define a behavioral signature model to capture observable behaviors of services. We then present that two service composition plans are choreography equivalent if they comply with the same behavioral signature model. We then propose a behavioral extracting algorithm to obtain the behavioral signature model from a service composition plan. We also present a method to determine choreography equivalence. Finally we briefly describe our prototype implementation that captures all these proposed algorithms. © 2012 Springer Science+Business Media, LLC.",Automatic; Behavioral compliance; Granularity; QoS; Service composition,12,Information Systems Frontiers,2013 1277,Chen R.; Sharma S.K.,Self-disclosure at social networking sites: An exploration through relational capitals,"In this research the authors examine member self-disclosure phenomenon at social networking sites. Self-disclosure enables member interactions, service customizations, and digital content generation and hence self-disclosure is imperative to the success of social networking sites. Drawing upon Social Capital Theory, we develop a succinct research model that examines the role of relational capitals in member disclosure behavior. This model also investigates the intricate relationships among relational capitals such as trust, reciprocity, and identification. This researchmodel has been validated through survey data collected from 222 social networking site users and the analysis results provide strong support to the hypothesized relationships. The current study generates new knowledge on the exact role of relational capitals in sustaining social networking sites and it also informs the service providers of social networks to identify strategies that promote member disclosure. © Springer Science+Business Media, LLC 2011.",Identification; Reciprocity; Social capital; Social networking; Trust,90,Information Systems Frontiers,2013 1278,Turner J.W.; Reinsch N.L.,Successful and unsuccessful multicommunication episodes: Engaging in dialogue or juggling messages?,"This paper describes instances of multicommunicating-or engaging in more than one conversation at a time. It uses a critical incident technique to explore successful and unsuccessful incidents of multicommunicating from the perspective of 201 MBA students. Additionally, we asked which media individuals pair together when multicommunicating. We found very frequent pairing of the telephone (which provides partial compartmentalization but no flexibility of tempo) with electroric text (which provides both compartmentalization and flexibility of tempo). We also found that respondents provide a variety of reasons for labeling a particular episode as ""unsuccessful."" In many cases the person seemed to describe an episode as unsuccessful when the person or a communicating partner had exceeded his or her ability to juggle multiple conversations as demonstrated by communication errors. © Springer Science + Business Media, LLC 2009.",Communication technology; Critical incident; Instant message; Media use; Multicommunicating; Self presentation,34,Information Systems Frontiers,2010 1279,Hermoso R.; Lopes Cardoso H.; Fasli M.,From roles to standards: a dynamic maintenance approach using incentives,"Social coordination has been addressed in multi-agent systems, making use of concepts such as institutions, norms, commitments, conventions, roles, or trust. In this paper, we argue the need to tackle open and dynamic environments with yet another concept: the notion of a standard, seen as a measurable and non-committing expectation. Not much work has been done in the field of multi-agent systems addressing the evolving nature of roles, especially in open systems, in which changes in the population bring about changes in the expectations generated from roles. Using standards measured from roles as the focus of attention, we propose an incentive-based mechanism to maintain roles over time. This approach is put in contrast with reorganization, which is needed when incentives are not cost-effective. Different search algorithms are proposed to illustrate incentive-based maintenance. Some empirical results are shown based on the principal-agent model from economics. © 2014, Springer Science+Business Media New York.",Artificial societies; Incentives; Standards,3,Information Systems Frontiers,2015 1280,Fuentes-Lorenzo D.; Morato J.; Gómez J.M.,Knowledge management in biomedical libraries: A semantic web approach,"In recent years, technological advances in high-throughput techniques and efficient data gathering methods, coupled with a world-wide effort in computational biology, have resulted in an enormous amount of life science data available in repositories devoted to biomedical literature. These repositories lack the ability to attain an effective and accurate search. Using semantic technologies as the key for interoperation enables searching and processing of biomedical literature in a more efficient way. However, emerging semantic applications take for granted specific knowledge that biomedical researchers may not have. This paper presents design principles for easy-to-use biomedical semantic applications by means of ontology-based annotations and faceted search. The proposed approach is backed with a usable prototype that shows the breakthroughs of adding these principles to a biomedical digital library where identifying and searching information are critical aspects for non-semantic Web experts. © 2009 Springer Science+Business Media, LLC.",Annotation; Biomedical data; Digital libraries; Faceted browsing; Semantic web; Usability,23,Information Systems Frontiers,2009 1281,Hsu J.Y.-J.; Lin K.-J.; Chang T.-H.; Ho C.-J.; Huang H.-S.; Jih W.-R.,Parameter learning of personalized trust models in broker-based distributed trust management,"Distributed trust management addresses the challenges of eliciting, evaluating and propagating trust for service providers on the distributed network. By delegating trust management to brokers, individual users can share their feedbacks for services without the overhead of maintaining their own ratings. This research proposes a two-tier trust hierarchy, in which a user relies on her broker to provide reputation rating about any service provider, while brokers leverage their connected partners in aggregating the reputation of unfamiliar service providers. Each broker collects feedbacks from its users on past transactions. To accommodate individual differences, personalized trust is modeled with a Bayesian network. Training strategies such as the expectation maximization (EM) algorithm can be deployed to estimate both server reputation and user bias. This paper presents the design and implementation of a distributed trust simulator, which supports experiments under different configurations. In addition, we have conducted experiments to show the following. 1) Personal rating error converges to below 5% consistently within 10,000 transactions regardless of the training strategy or bias distribution. 2) The choice of trust model has a significant impact on the performance of reputation prediction. 3) The two-tier trust framework scales well to distributed environments. In summary, parameter learning of trust models in the broker-based framework enables both aggregation of feedbacks and personalized reputation prediction. © Springer Science+Business Media, LLC 2006.",Distributed trust management; Expectation maximization; Parameter learning; Personalized feedback rating; Probabilistic trust model; Reputation mechanism,14,Information Systems Frontiers,2006 1282,Mehresh R.; Upadhyaya S.,Surviving advanced persistent threats in a distributed environment – Architecture and analysis,"Designing robust mission-critical systems demands bringing together fault tolerance and security. The emergence of Advanced Persistent Threats (APT) has further added to the challenge of meeting mission assurance goals. Despite the advances in mission survivability, the existing solutions remain ineffective against APTs. In this paper, we propose a novel survivability architecture against APTs in a distributed environment. It involves tamper-resistant and surreptitious detection and node-to-node verification of suspicious events. The solution aims to identify Attacker Intent, Objectives and Strategies (AIOS) and to design targeted recoveries that promote survivability. Its security strength has been theoretically analyzed, while the performance and scalability aspects are measured via simulation. Our simulations demonstrate high scalability with respect to network size and application runtime and the time overhead for long running applications can be easily kept under 1 % of original runtime by carefully adjusting the security strength. © 2015, Springer Science+Business Media New York.",Intrusion detection; Mission-critical systems; Simulation; Tamper-resistant monitoring,8,Information Systems Frontiers,2015 1283,Jennex M.E.; Zyngier S.,Security as a contributor to knowledge management success,"Security is an important topic, but is it important for Knowledge Management (KM)? To date, little mainstream KM research is coming through with a security focus. This paper asks why, and proposes that security be integrated into KM success models. The Jennex and Olfman (International Journal of Knowledge Management 2(3):51-68, 2006) KM success model is used to illustrate how security, specifically risk management, and the National Security Telecommunications and Information System Security Committee (NSTISSC) security model can be applied to KM management support and governance and KM Strategy. Finally, two case studies are provided that illustrate the application of risk management through governance to KM. © 2007 Springer Science+Business Media, LLC.",Knowledge management; Knowledge management governance; Knowledge management strategy; Knowledge management success; Knowledge transfer; Security,79,Information Systems Frontiers,2007 1284,Hausken K.,Returns to information security investment: Endogenizing the expected loss,"This paper endogenizes the value of an information set which has to be produced and protected. The profit is inverse U shaped in security investment and production effort. The breach probability is commonly assumed to decrease convexly in security investment, which means that modest security investment is sufficient to deter most perpetrators. We allow the breach probability to be not only convex, but concave, which means that substantial security investment is needed to deter most perpetrators. Convexity versus concavity depends on the security environment, perpetrators, technology, and law enforcement. A firm strikes a balance between producing and protecting an information set dependent on seven model parameters for production, protection, convexity, concavity, vulnerability, and resource strength. © 2012 Springer Science+Business Media New York.",Information production; Information protection; Returns assumptions; Security investment,21,Information Systems Frontiers,2014 1285,Sorkhoh I.; Mahdi K.A.; Safar M.,Estimation algorithm for counting periodic orbits in complex social networks,"Complex networks can store information in form of periodic orbits (cycles) existing in the network. This cycle-based approach although computationally intensive, it provided us with useful information about the behavior and connectivity of the network. Social networks in most works are treated like any complex network with minimal sociological features modeled. Hence the cycle distribution will suggest the true capacity of this social network to store information. Counting cycles in complex networks is an NP-hard problem. This work proposed an efficient algorithm based on statistical mechanical based Belief Propagation (BP) algorithm to compute cycles in different complex networks using a phenomenological Gaussian distribution of cycles. The enhanced BP algorithm was applied and tested on different networks and the results showed that our model accurately approximated the cycles distribution of those networks, and that the best accuracy was obtained for the random network. In addition, a clear improvement was achieved in the cycles computation time. In some cases the execution time was reduced by up to 88% compared to the original BP algorithm. © Springer Science+Business Media New York 2013.",Algorithms; Complex networks; Design; Performance; Theory,2,Information Systems Frontiers,2013 1286,Hu D.; Sun S.X.; Leon Zhao J.; Zhao X.,Strategic choices of inter-organizational information systems: A network perspective,"As cooperation in a networked manner increases via various inter-organizational information systems (IOISs), it is important to choose appropriate IOISs for different types of organizations in the network environment. In this study, we analyzed customer-supplier relationships among organizations in five industries using social network analysis (SNA) methods and empirical data, aiming to help organizations strategically choose appropriate IOISs. Three types of customer-supplier networks were identified based on the network centralization comparison rate: customer-centric, supplier-centric and balanced networks. Based on the empirical findings in our analysis, we then propose strategies about how to choose appropriate IOISs for the firms in these networks and discuss the pros and cons of the choices. To the best of our knowledge, this is the first empirical research that applied SNA methods to study customer-supplier networks in the context of inter-organizational information systems. © Springer Science+Business Media, LLC 2010.",Customer-supplier networks; Inter-organizational information systems; Social network analysis,9,Information Systems Frontiers,2011 1287,Wang S.; Zheng S.; Xu L.; Li D.; Meng H.,"A literature review of electronic marketplace research: Themes, theories and an integrative framework","In this paper, we presented a literature review of the current status of electronic marketplace (EM) research. It consists of 109 journal articles published in 19 journals that are appropriate outlets for electronic commerce research. The results show that an increasing volume of EM research has been conducted from diverse theoretical perspectives. Based on content analysis, we identified eight research themes, five types of methodologies and six categories of background theories which most EM researches were grounded in. By combining research themes and the patterns of the background theories, an integrative framework of EM was proposed to represent the paradigms of EM researches. The framework shows that EM phenomena can be addressed from three perspectives: information systems, inter-organizational/social structure and strategic management perspectives. This framework suggests a parsimonious and cohesive way to explain key EM research issues such as EM adoption, success and impact. © 2008 Springer Science+Business Media, LLC.",Electronic marketplace; Integrative framework; Literature review; Research theme,62,Information Systems Frontiers,2008 1288,Bell D.; De Cesare S.; Iacovelli N.; Lycett M.; Merico A.,A framework for deriving semantic web services,"Web service-based development represents an emerging approach for the development of distributed information systems. Web services have been mainly applied by software practitioners as a means to modularize system functionality that can be offered across a network (e.g., intranet and/or the Internet). Although web services have been predominantly developed as a technical solution for integrating software systems, there is a more business-oriented aspect that developers and enterprises need to deal with in order to benefit from the full potential of web services in an electronic market. This 'ignored' aspect is the representation of the semantics underlying the services themselves as well as the 'things' that the services manage. Currently languages like the Web Services Description Language (WSDL) provide the syntactic means to describe web services, but lack in providing a semantic underpinning. In order to harvest all the benefits of web services technology, a framework has been developed for deriving business semantics from syntactic descriptions of web services. The benefits of such a framework are two-fold. Firstly, the framework provides a way to gradually construct domain ontologies from previously defined technical services. Secondly, the framework enables the migration of syntactically defined web services toward semantic web services. The study follows a design research approach which (1) identifies the problem area and its relevance from an industrial case study and previous research, (2) develops the framework as a design artifact and (3) evaluates the application of the framework through a relevant scenario. © Springer Science+Business Media, LLC 2007.",Harmonization; Ontological modeling; Scoping; Semantic web services; Service content interpretation,42,Information Systems Frontiers,2007 1289,Templeton G.F.; Schmidt M.B.; Taylor G.S.,Managing the diffusion of organizational learning behavior,"This paper addresses the need for organizations to manage the transformation from traditional hierarchical models to 'learning organizations.' We propose a five-stage methodology useful in the diffusion of behaviors associated with organizational learning (OL) theory. The stages of OL diffusion are (1) agenda-setting, (2) matching, (3) restructuring, (4) clarifying, and (5) routinizing. Each stage involves both managerial (structural) or member (cultural) influences on organizational memory (OM). Salient definitions are provided and the OM aspects and deliverables associated with each OL diffusion stage are discussed. This research provides a theoretically-driven approach to help change agents diffuse and realize the potential of OL behavior in the firm. © 2008 Springer Science+Business Media, LLC.",Diffusion; Innovation; Organizational learning; Organizational memory; Technology,7,Information Systems Frontiers,2009 1290,Kim Y.J.; Song S.; Sambamurthy V.; Lee Y.L.,"Entrepreneurship, knowledge integration capability, and firm performance: An empirical study","From the knowledge-based view, an organization is considered an entity that integrates and distributes knowledge to produce products and services. Knowledge is acknowledged as a sustainable basis of competitive advantage that many organizations possess. Entrepreneurial activity also has been viewed as an essential feature for organizations to survive and prosper in today's turbulent environment. In this study, we explore the effect of entrepreneurship on organizational performance through knowledge integration capability. Our research model depicts the firm as a knowledge integration institution that produces its offerings through specialized knowledge integration capability that consists of learning culture, knowledge management process, and information technology capability. The results show a strong support for the relationship between entrepreneurship and knowledge integration capability. We also found that the effect of entrepreneurial activities on firm performance was mediated by knowledge integration capability. © 2011 Springer Science+Business Media, LLC.",Corporate entrepreneurship; Knowledge management; Knowledge-based view; Organizational performance,53,Information Systems Frontiers,2012 1291,Chang R.I.; Wang T.-C.; Wang C.-H.; Liu J.-C.; Ho J.-M.,Effective distributed service architecture for ubiquitous video surveillance,"Video surveillance systems are playing an important role to protect lives and assets of individuals, enterprises and governments. Due to the prevalence of wired and wireless access to Internet, it would be a trend to integrate present isolated video surveillance systems by applying distributed computing environment and to further gestate diversified multimedia intelligent surveillance (MIS) applications in ubiquity. In this paper, we propose a distributed and secure architecture for ubiquitous video surveillance (UVS) services over Internet and error-prone wireless networks with scalability, ubiquity and privacy. As cloud computing, users consume UVS related resources as a service and do not need to own the physical infrastructure, platform, or software. To protect the service privacy, preserve the service scalability and provide reliable UVS video streaming for end users, we apply the AES security mechanism, multicast overlay network and forward error correction (FEC), respectively. Different value-added services can be created and added to this architecture without introducing much traffic load and degrading service quality. Besides, we construct an experimental test-bed for UVS system with three kinds of services to detect fire and fallincident features and record the captured video at the same time. Experimental results showed that the proposed distributed service architecture is effective and numbers of services on different multicast islands were successfully connected without influencing the playback quality. The average sending rate and the receiving rates of these services are quite similar, and the surveillance video is smoothly played. © Springer Science+Business Media, LLC 2010.",AES security mechanism; Cloud computing; Forward error correction; Multicast overlay network; Multimedia intelligent surveillance; Ubiquitous video surveillance,14,Information Systems Frontiers,2012 1292,Adiele C.,Towards promoting interactivity in a B2B web community,"The convergence of social and technological networks have given impetus to web communities (WCs) as a business enabler in the virtual marketplace. WCs have evolved from social phenomena that have no business dimension to a powerful tool that most successful organizations leverage to create interactions among customers or suppliers of a company's product. WC becomes economically interesting with the increasing size of the community where members are active participants in sharing ideas and knowledge. There are inherent problems, however, associated with the increasing size of a WC, especially determining the contributions of members in sustaining the community's interactivity and techniques to promote interactivity in the community. B2C Web community (B2C-WC) has been extensively discussed in the literature. Not much, however, has been done in the area of B2B Web community (B2B-WC). In this paper, we present an interactivity model that dynamically measures the contributions of members of a B2B-WC, and also determines the community's interactivity level. We design promotional techniques tailored to meet individual member's needs in a B2B-WC. We use extensive simulation studies to evaluate the performance of our model under various conditions. © Springer Science + Business Media, LLC 2009.",B2B; Behavior theories; Filter mechanism; Interactivity model; Simulation; Web 2.0; Web community,14,Information Systems Frontiers,2011 1293,Ziekow H.; Günther O.,Sharing RFID and complex event data among organizations,"Integrating RFID data from various sources in a value chain is an important requirement for leveraging the full potential of the technology. To facilitate this crucial integration, the global standardization organization GS1 is currently developing a range of service specifications. Yet, the services specified so far do not enable event-based interaction schemes and do not leverage the detection of distributed complex events. In this paper we propose to fill this gap by means of a peer-to-peer based broker network that can realize event-based interaction on top of existing specifications. For this infrastructure we present a new method to improve in-network processing. As shown by our experiments, our method significantly reduces overall system load by exploiting a priori knowledge about the observed processes. © 2009 Springer Science+Business Media, LLC.",Administrative data processing; Data sharing; Network architecture and design,2,Information Systems Frontiers,2010 1294,Pal J.; Lakshmanan M.; Toyama K.,"""my child will be respected"": Parental perspectives on computers and education in Rural India","Public spending on computer centers in rural Indian public schools raise questions about the value of expensive modern technology in extremely resource-strapped environments. Arguments for or against providing computers in low-income schools have appeared in policy circles, academia, teacher conferences, and philanthropic discussions, with passionate rhetoric from all sides. We present the results of a qualitative study of computer-aided learning centers in schools catering primarily to Below Poverty Line (BPL) families in four districts of rural Karnataka, South India. Here, we held a series of open-and close-ended discussions with parents of children from these schools on issues such as aspirations, quality of schooling, and the perception of computers more generally. The research reveals a range of voices on hopes for the next generation, perceived value of computer courses and higher education, and the perceived changes in villages after the arrival of computers in their local schools. It emerges that for many parents, the computer has an immense symbolic value-separate from its functional value-that is tied to social and economic ascendancy. We find that this symbolic value derives from associations that parents imbibe from their various interactions with people using computers in a range of situations. We find in our interviews a heightened sense of mystique over the technology and its potential, across people with varying levels of first-hand experience and understanding of computers. We find that notions of change and hope are situated within an environment of great fear about the future of agriculture. We argue here that this, alongside a widespread existing discourse about computers in media and public life in India, mostly emerging from urban middle-classes ideas around technology, help spur a strong sense of expectation that the computers can dramatically change social prospects even among the poorest and most excluded. From competing with English as the gateway to power, to impacting dowry costs for female youth, interviews show a myriad of expectations from technology, creating what we see as a strong case for a nuanced look at the discourse and mythology of computers and technology in developing regions. © 2009 The Author(s).",Developing nations; Human factors; Rural areas; Technology social factors,36,Information Systems Frontiers,2009 1295,Morohoshi H.; Huang R.; Ma J.,A user-friendly platform for developing and accessing grid services,"This article presents an enhanced platform that provides a friendly environment of developing grid services and accessing grid services over Globus Toolkit 3 (GT3). This platform includes a class of functions for processing parameters input from a developer via GUI, a class of functions for generating files required for defining a grid service specified, and a class of functions for creating client program and facilitating accesses of the deployed services. As a result, the development and access of grid services requires less special expert knowledge of a developer at the server side and users at the client side, the efficiency of developing and accessing grid services can be improved. This paper describes our design ideas, necessary functions, and implementations. The comparisons with other related toolkits are given and the extended version of the platform on top of the web service environment rather than GT3. © Springer Science+Business Media, LLC 2006.",Automation of file generation; Globus toolkit; Grid development platform; Grid service; User-friendly interface,3,Information Systems Frontiers,2006 1296,Cho V.; Chan A.,An integrative framework of comparing SaaS adoption for core and non-core business operations: An empirical study on Hong Kong industries,"Software as a Service (SaaS), which offers the possibility to cover both core and non-core business operations of a company, has profoundly transformed traditional outsourcing approaches. As SaaS represents promising solutions for a variety of business processes, it is important to identify a theoretical framework to evaluate SaaS adoption for these two types of operations. We propose an integrative framework to evaluate SaaS adoption by including four perspectives–economic savings, strategic influences, management attitudes toward ownership and vendor’s service quality; and formulate hypotheses to predict the difference in SaaS adoption for core and non-core business operations. We validate our framework using data from 269 companies across different industries in Hong Kong. The results support the integrative framework. Perceived cost advantage has a positive influence on SaaS adoption for non-core business operations, whereas a gap in IT capabilities has a positive influence on SaaS adoption for core business operations. Furthermore, perceived service quality has a positive influence, and management attitude toward ownership and control has a negative influence on SaaS adoption for both types of operations. © 2013, Springer Science+Business Media New York.",Core business operations; Hong Kong industries; Non-core business operations; SaaS adoption,39,Information Systems Frontiers,2015 1297,Nguyen T.B.; Hoeglund-Isaksson L.; Wagner F.; Schoepp W.,Mitigation Efforts Calculator (MEC),"The Mitigation Efforts Calculator (MEC) has been developed by the International Institute for Applied Systems Analysis (IIASA) as an online tool to compare greenhouse gas (GHG) mitigation proposals by various countries for the year 2020. In this paper, first we introduce the MEC conceptual model, i.e. the methodology and system architecture. We then discuss the abstract formulation of four different international greenhouse gas trading regimes that are conceivable. Hereafter, the optimization process and its output results, namely cost curves are presented. Finally, we illustrate the MEC as a tool for interactively evaluating complex cost curve information in the context of GHG mitigation targets as currently discussed in international climate policy circles. ©Springer Science+Business Media, LLC 2012.",Business intelligence; Cost curves; Decision model; Interactive system; Optimisation,3,Information Systems Frontiers,2013 1298,Ashraf M.; Hanisch J.; Swatman P.,ICT intervention in the 'Chandanbari' Village of Bangladesh: Results from a field study,"The United Nations, the World Bank and the International Telecommunication Union purport that information and communication technology (ICT) interventions improve development in third world countries. Hence, developing countries are rushing to implement various ICT interventions in urban-rural areas aiming to engender local or national development. Through an interpretive case study of an ICT intervention in the Chandanbari village area of Bangladesh, this research describes some challenges surrounding ICT interventions. From background literature concerning bridging the digital-divide we emphasise users' capability, local context and local content during the planning and implementation of ICT interventions. We apply Heeks' (eDevelopment Briefing, 3(1), 1-2, 2005) information chain model to improve understanding of ICT-led development at the community/individual level. Our findings uncover considerable interest in ICT interventions from the community/individuals; however, there are challenges to the long-term acceptance of ICT interventions, such as the socio-cultural issues of gender discrimination and cultural barriers. © 2008 Springer Science+Business Media, LLC.",Bangladesh; Chandanbari Village; Developing countries; Digital divide; Gonokendra; ICT intervention/project,29,Information Systems Frontiers,2009 1299,Panigrahi S.; Sural S.; Majumdar A.K.,Two-stage database intrusion detection by combining multiple evidence and belief update,"Insider threats have gained prominence and pose the most challenging threats to a database system. In this paper, we have proposed a new approach for detecting intrusive attacks in databases by fusion of information sources and use of belief update. In database intrusion detection, only intra-transactional features are not sufficient for detecting attackers within the organization as they are potentially familiar with the day-to-day work. Thus, the proposed system uses inter-transactional as well as intra-transactional features for intrusion detection. Moreover, we have also considered three different sensitivity levels of table attributes for keeping track of the malicious modification of the highly sensitive attributes more carefully. We have analyzed the performance of the proposed database intrusion detection system using stochastic models. Our system performs significantly better compared to two intrusion detection systems recently proposed in the literature. © 2010 Springer Science+Business Media, LLC.",Bayesian learning; Database security; Dempster-Shafer theory; Insider attack; Intrusion detection; Suspicion score,27,Information Systems Frontiers,2013 1300,Lauras M.; Benaben F.; Truptil S.; Charles A.,Event-cloud platform to support decision-making in emergency management,"The challenge of this paper is to underline the capability of an Event-Cloud Platform to support efficiently an emergency situation. We chose to focus on a nuclear crisis use case. The proposed approach consists in modeling the business processes of crisis response on the one hand, and in supporting the orchestration and execution of these processes by using an Event-Cloud Platform on the other hand. This paper shows how the use of Event-Cloud techniques can support crisis management stakeholders by automatizing non-value added tasks and by directing decision-makers on what really requires their capabilities of choice. If Event-Cloud technology is a very interesting and topical subject, very few research works have considered this to improve emergency management. This paper tries to fill this gap by considering and applying these technologies on a nuclear crisis use-case. © 2013, Springer Science+Business Media New York.",Business process modeling; Cloud-computing; Complex-event processing; Decision-making support; Emergency management; Service-oriented architecture,15,Information Systems Frontiers,2015 1301,Zhu C.; Zhu Q.; Zuzarte C.; Ma W.,Optimization of generic progressive queries based on dependency analysis and materialized views,"Progressive queries (PQ) are a new type of queries emerging from numerous contemporary database applications such as e-commerce, social network, business intelligence, and decision support. Such a PQ is formulated on the fly in several steps via a set of inter-related step-queries (SQ). In our previous work, we presented a framework to process a restricted type of PQs. However, how to process generic PQs remains an open problem. In this paper, we develop a novel technique to efficiently process generic PQs based on materialized views. The SQs of an in-process PQ can utilize the results of previous SQs not only from the same PQ but also from other in-process and completed PQs. The key idea is to create a multiple query dependency graph (MQDG), which captures the data source dependency relationships among SQs from multiple PQs. A mathematic model is developed to estimate the benefit of keeping the result of an SQ as a materialized view (critical SQ/node) based on the MQDG. The kept materialized views are used to improve the performance of the future SQs. Strategies for constructing the MQDG and identifying the critical SQs for materialization by using the MQDG are presented. To manage the storage of the materialized views, we introduce two approaches – one employs a greedy method and the other adopts a dynamic programming (DP) based method. Strategies are also suggested to reduce the input problem size for the DP procedure. Experimental results demonstrate that our technique is quite promising in efficiently processing PQs. © 2014, Springer Science+Business Media New York.",Database; Materialized view; Progressive query; Query optimization; Query processing,4,Information Systems Frontiers,2016 1302,Gencer C.; Aydogan E.K.; Celik C.,A decision support system for locating VHF/UHF radio jammer systems on the terrain,"In this study, a mathematical model is suggested concerning the location of VHF/UHF frequency radio jammer systems to the terrain parts to conduct single frequency or sequential frequency jamming, and then a decision support system (DSS), based on the suggested model, is formed. Location problem is modelled by the maximum covering location problem and LINGO-8 package program is used to solve the model. Interaction with the user is provided via the MS-Excel program in the DSS. In the application part of the study, a scenario was set up and the model was run for the two cases, weighted and equally weighted situations of the targets. With the same scenario, backup positions for the jammer systems were tried to be determined and solutions for the scenario were evaluated. © 2007 Springer Science+Business Media, LLC.",Covering location problem; Decision support system; Maximum covering location problem; VHF/UHF radio jammer,10,Information Systems Frontiers,2008 1303,Begier B.,Users' involvement may help respect social and ethical values and improve software quality,"Global informatization brings potential threats. It is possible to reduce them if software developers are aware of those threats and if customers insist on eliminating them. The survey described in the paper shows that future programmers are aware of numerous threats associated with global informatization. Many threats may be reduced by users' involvement in the software process. Software developers should learn and develop cooperation with users, as emphasized in agile methodologies. It is a task for academic teachers to promote collaboration between software authors and users, to show how to organize it, and to convince programmers that it is valuable. Users' involvement requires changes in the software life cycle and in the set of established processes. Such changes, in the form of additionally established processes and phases in the software development cycle, are identified in the paper. One recommended process is the software product assessment intended to elicit feedback from users. Users' involvement may help to respect ethical and social values and to produce software adapted to user expectations. © 2010 Springer Science + Business Media, LLC.",Agile approach; Feedback from users; Primary and supporting processes in software development; Social threats; Software quality; Threats related to extensive informatization; Users' involvement,16,Information Systems Frontiers,2010 1304,Emam A.,Intelligent drowsy eye detection using image mining,"Cell phones, MP4 players, and GPS all distract drivers, forcing them to divide their attention to what is happening outside and what is happening inside the vehicle. Preventing drivers from falling asleep at the wheel and drifting off on the road is an increasingly hard task but a solution can be achieved with today’s technology: by capturing driver’s eye gaze and thus the level of their exhaustion, the potential for safer roads is real. Today, image mining systems can automatically extract important information from an image dataset which can then be used to classify images and image relationship that been applied in different areas. The basic challenge in image mining research area is to determine how image level pixel representation in an original image can be used and constructed to then identify meaningful information or form relationships. In this research Intelligent Drowsy Eye Detection, using an Image Mining (IDEDIM) system is proposed. The proposed architecture would use different feature extraction techniques and three data mining classification techniques to aid with accurate information collection. Two thousand left and right eye images were used to test the developed system by Discrete Wavelet Transform (DWT), Statistical features, and Local binary pattern (LBP) feature extraction techniques. The extracted features were used as input for Decisions Tree C5.0, K Nearest Neighbor (KNN), and the Support Vector Machine (SVM) Classifier. After several experimental sets, the C5.0 and KNN classifier were performing better than SVM classifier. Based on the results, we recommend the inclusion of LBP and DWT in conjunction with C5.0 with KNN as a classification technique. To validate the achieved results, Receiver Operating Characteristic (ROC) curve is used to compare among the proposed classifiers. The proposed system can be integrated with the existing subsystem into real time Drowsy Detection System to achieve excellent accuracy and performance. © 2014, Springer Science+Business Media New York.",Classification; Decisions Tree C5.0; Eye image mining; Feature extraction; Image mining; K Nearest Neighbor (KNN); Support Vector Machine (SVM),8,Information Systems Frontiers,2015 1305,Lacity M.C.; Iyer V.V.; Rudramuniyaiah P.S.,Turnover intentions of Indian IS professionals,"One of the major challenges facing the Indian IT services industry is the high rate of turnover among Indian IS professionals. Turnover rates have been reported as high as 100% annually. Despite the serious problem, we are unaware of any academic research that has studied the determinants of turnover among Indian IS professionals. We aim to contribute to the literature by understanding Turnover Intentions of Indian IS professionals. We developed an initial model of Turnover Intentions based on the IS and Organizational Behavior literatures. The most commonly identified determinants of Turnover Intentions in these literatures were Organizational Commitment (emotional attachment to an organization) and Job Satisfaction. However, the research that identified these determinants was primarily tested on Western workers. We assessed the applicability of this model by interviewing 25 Indian IS professionals. We found strong support that Job Satisfaction affects Turnover Intentions among Indian IS professionals. However, Organizational Commitment was found to be a troublesome construct. Many Indian participants did not relate to the concept of an emotional attachment to an organization. Instead, they talked in terms that better mapped to the construct Organizational Satisfaction. The interviews also uncovered another important determinant of Turnover Intention: Social Norms. Social Norms, as evidenced by significant family pressure to reside in the same city as the employee's family, emerged as a major reason for Turnover Intentions. Our revised model identifies Job Satisfaction, Organizational Satisfaction, and Social Norms as the main determinants of Turnover Intentions among Indian IS Professionals. We also identify four implications for practice. The most worrisome implication for Western clients is that Indian IS professionals do not like performing routine IT maintenance work or merely programming from predefined specifications-the bulk of work sent offshore. Indian IS professionals preferred client-facing activities, design and development work. © 2007 Springer Science+Business Media, LLC.",Indian IS professionals; Job attraction; Job satisfaction; Job stress; Organizational commitment; Organizational satisfaction; Perceived organizational support; Social norms; Turnover,106,Information Systems Frontiers,2008 1306,Teng H.-Y.; Lin C.-N.; Hwang R.-H.,A self-similar super-peer overlay construction scheme for super large-scale P2P applications,"Unstructured peer-to-peer (P2P) overlay networks with two-layer hierarchy, comprising an upper layer of super-peers and an underlying layer of ordinary peers, are used to improve the performance of large-scale P2P applications like content distribution and storage. In order to deal with continuous growth of participating peers, a scalable and efficient super-peer overlay topology is essential. However, there is relatively little research conducted on constructing such super-peer overlay topology. In the existed solutions, the number of connections required to be maintained by a super-peer is in direct proportion to the total number of super-peers. For super large-scale P2P applications, i.e. the number of participating peer is over 1,000,000, these solutions are not scalable and impractical. Therefore, in this paper, we propose a scalable hierarchical unstructured P2P system in which a self-similar square network graph (SSNG) is proposed to construct and maintain the super-peer overlay topology adaptively. The SSNG topology is a constant-degree topology in which each node maintains a constant number of neighbor nodes. Moreover, a simple and efficient message forwarding algorithm is presented to ensure each super-peer to receive just one flooding message. The analytical results showed that the proposed SSNG-based overlay is more scalable and efficient than the perfect difference graph (PDG)-based overlay proposed in the literature. © 2013 Springer Science+Business Media New York.",Constant-degree; Forwarding algorithm; Self-similar; Super-peer overlay; Unstructured P2P system,9,Information Systems Frontiers,2014 1307,Hausken K.,Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability,"Four kinds of marginal returns to security investment to protect an information set are decrease, first increase and then decrease (logistic function), increase, and constancy. Gordon, L. A. and Loeb, M. (ACM Trans. Inf. Syst. Secur., 5:438-457, 2002). find for decreasing marginal returns that a firm invests maximum 37% (1∈/∈e) of the expected loss from a security breach, and that protecting moderately rather than extremely vulnerable information sets may be optimal. This article presents classes of all four kinds where the optimal investment is no longer capped at 1∈/∈e. First, investment in information security activities for the logistic function is zero for low vulnerabilities, jumps in a limited ""bang-bang"" manner to a positive level for intermediate vulnerabilities, and thereafter increases concavely in absolute terms. Second, we present an alternative class with decreasing marginal returns where the investment increases convexly in the vulnerability until a bound is reached, investing most heavily to protect the extremely vulnerable information sets. For the third and fourth kinds the optimal investment is of an all-out ""bang-bang"" nature, that is, zero for low vulnerabilities, and jumping to maximum investment for intermediate vulnerabilities. © Springer Science+Business Media, LLC 2006.",Concavity; Convexity; Information protection; Information security breach; Linearity; Logistic function; Returns assumptions; Security investment; Vulnerability,112,Information Systems Frontiers,2006 1308,Chebotko A.; Chang S.; Lu S.; Fotouhi F.,Secure XML querying based on authorization graphs,"XML is rapidly emerging as a standard for data representation and exchange over theWorld Wide Web and an increasing amount of sensitive business data is processed in XML format. Therefore, it is critical to have control mechanisms to restrict a user to access only the parts of XML documents that she is authorized to access. In this paper, we propose the first DTD-based access control model that employs graph matching to analyze if an input query is fully acceptable, fully rejectable, or partially acceptable. In this way, there will be no further security overhead for the processing of fully acceptable and rejectable queries. For partially acceptable queries, we propose a graph-matching based authorization model for an optimized rewriting procedure in which a recursive query (query with descendant axis '//') will be rewritteninto an equivalent recursive one if possible and into a non-recursive one only if necessary, resulting queries that can fully take advantage of structural join based query optimization techniques. Moreover, we propose an index structure for XML element types to speed up the query rewriting procedure, a facility that is potentially useful for applications with large DTDs. Our performance study results showed that our algorithms armed with rewriting indexes are promising. © Springer Science+Business Media, LLC 2010.",Access control; Authorization graph; Authorization model; Security; XML,3,Information Systems Frontiers,2012 1309,Zhang X.; Maruping L.M.,Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values,"This paper extends prior research in household technology adoption by incorporating the role of espoused cultural values. Specifically, we theorize that espoused cultural values-individualism/collectivism, masculinity/ femininity, power distance, uncertainty avoidance, and long-term orientation-play an important role in affecting consumers' behaviors by altering consumers' belief structures-attitudinal beliefs, normative beliefs, and control beliefs. Our theoretical model predicts that the impact of consumers' belief structures on household technology adoption intention varies across consumers with different cultural values. Propositions are provided to explain how different cultural mechanisms moderate the relationships between consumers' beliefs and household technology adoption intention. The paper concludes with theoretical implications, future research directions, and practical implications. © 2008 Springer Science+Business Media, LLC.",Belief structures; Consumer behavior; Espoused culture; Household technology adoption; Intention,65,Information Systems Frontiers,2008 1310,Peng D.; Wang X.; Zhou A.,VsLattice: A vector-based conceptual index structure for web service retrieval,"With the rising adoption of web services, effective management of web services becomes a critical issue in making the paradigm of service-oriented computing more practical. In this paper, a novel structure, called Vector-based service Lattice ( VsLattice), is devised to index web services in a semantic way. Each web service is modeled as a group of Service Operation Vectors (SOVs) in the vector space, and each SOV represents an operation provided by the service. The web services, SOVs and the relationship between web services and SOVs form the Conceptual Indexing Context (CIC) of a given service collection. In the CIC, web services that provide similar operations (functions) are conceptually indexed by the same Operation Vector Concepts (OVCs). The underlying relationships among the OVCs are captured with the VsLattice, which is constructed by adopting the traditional concept lattice in a CIC. By taking advantage of the information obtained from the VsLattice, a new representation of SOV is devised. Based on this representation, a novel service retrieval model and the implemental system are developed to retrieve web services efficiently. The performance and retrieving quality of the proposed approach has been evaluated through a series of experiments. © 2007 Springer Science+Business Media, LLC.",Conceptual index structure; Formal concept analysis; Information retrieval; Web service; XML web service,4,Information Systems Frontiers,2007 1311,Natchetoi Y.; Wu H.; Babin G.; Dagtas S.,EXEM: Efficient XML data exchange management for mobile applications,"In the past decade, the number of mobile devices has increased significantly. These devices are in turn showing more computational capabilities. It is therefore possible to envision a near future where client applications may be deployed on these devices. There are, however, constraints that hinder this deployment, especially the limited communication bandwidth and storage space available. This paper describes the Efficient XML Data Exchange Manager (EXEM) that combines context-dependent lossy and lossless compression mechanisms used to support lightweight exchange of objects in XML format between server and client applications. The lossy compression mechanism reduces the size of XML messages by using known information about the application. The lossless compression mechanism decouples data and metadata (compression dictionary) content. We illustrate the use of EXEM with a prototype implementation of the lossless compression mechanism that shows the optimization of the available resources on the server and the mobile client. These experimental results demonstrate the efficiency of the EXEM approach for XML data exchange in the context of mobile application development. © 2007 Springer Science+Business Media, LLC.",Lossless compression; Lossy compression; Mobile business applications; XML compression,14,Information Systems Frontiers,2007 1312,Son S.; Sim K.M.,Adaptive and similarity-based tradeoff algorithms in a price-timeslot-QoS negotiation system to establish cloud SLAs,"Since participants in a Cloud may be independent bodies, some mechanisms are necessary for resolving the different preferences to establish a service-level agreement (SLA) for Cloud service reservations. Whereas there are some mechanisms for supporting SLA negotiation, there is little or no negotiation support involving price, time slot, and QoS issues concurrently for a Cloud service reservation. For the concurrent price, timeslot, and QoS negotiation, a tradeoff algorithm to generate and evaluate a proposal which consists of price, timeslot, and QoS proposals is necessary. The contribution of this work is designing a multi-issue negotiation mechanism to facilitate 1) concurrent price, time slot, and QoS negotiations including the design of QoS utility functions and 2) adaptive and similarity-based trade-off proposals for price, time slots, and level of QoS issues. The tradeoff algorithm referred to as “adaptive burst mode” is especially designed to increase negotiation speed, total utility, and to reduce computational load for evaluating proposals by adaptively generating concurrent set of proposals. The empirical results obtained from simulations carried out using an agent-based testbed suggest that using the negotiation mechanism, (i) a consumer and a provider agent have a mutually satisfying agreement on price, time slot, and QoS issues in terms of the aggregated utility and (ii) the fastest negotiation speed with (iii) comparatively lower number of evaluated proposals in a negotiation. © 2013, Springer Science+Business Media New York.",Agent-based cloud computing; Cloud service reservation; Cost-models and economics of grid/cloud computing; Multi-issue negotiation; QoS negotiation; Service level agreement,31,Information Systems Frontiers,2015 1313,Ilk N.; Zhao J.L.; Goes P.; Hofmann P.,Semantic enrichment process: An approach to software component reuse in modernizing enterprise systems,"In today's dynamic business environments, organizations are under pressure to modernize their existing software systems in order to respond to changing business demands. Service oriented architectures provide a composition framework to create new business functionalities from autonomous building blocks called services, enabling organizations to quickly adapt to changing conditions and requirements. Characteristics of services offer the promise of leveraging the value of enterprise systems through source code reuse. In this respect, existing system components can be used as the foundation of newly created services. However, one problem to overcome is the lack of business semantics to support the reuse of existing source code. Without sufficient semantic knowledge about the code in the context of business functionality, it would be impossible to utilize source code components in services development. In this paper, we present an automated approach to enrich source code components with business semantics. Our approach is based on the idea that the gap between the two ends of an enterprise system-(1) services as processes and (2) source code-can be bridged via similarity of data definitions used in both ends. We evaluate our approach in the framework of a commercial enterprise systems application. Initial results indicate that the proposed approach is useful for annotating source code components with business specific knowledge. © 2010 Springer Science+Business Media, LLC.",Enterprise systems; Information retrieval; Service-oriented architecture; Systems modernization,11,Information Systems Frontiers,2011 1314,Nevo S.; Wade M.; Cook W.D.,An empirical study of IT as a factor of production: The case of Net-enabled IT assets,"A great deal of research in the information systems field has focused on the link between IT and firm-level outputs, like productivity and performance. This paper critically examines the economic assumptions and methodological approaches that underlie much of this work. Three important issues and gaps are identified. First, the functional form of the relationship between IT and firmlevel outputs has been inconsistently specified, or overlooked. Second, multiple input and output variables are often arbitrarily combined. Third, the characteristics of IT as a factor of production have not been tested in the era of Net-enabled IT assets. This paper sheds light on these issues by analyzing an appropriate dataset in a two-stage process. In the first stage, data envelopment analysis (DEA) is employed in order to derive a meaningful measure for IT productivity from a compilation of input and output variables. This measure is treated as a dependent variable in a multivariate regression analysis during the second stage. The paper confirms the diminishing marginal productivity and input substitutability of IT for the subcategory of Net-enabled IT assets. © Springer Science + Business Media, LLC 2008.",Data envelopment analysis; Diminishing marginal productivity; Economics of is; Input substitutability; IT productivity; Net-enabled itassets,6,Information Systems Frontiers,2010 1315,Olla P.; Choudrie J.,Mobile technology utilization for social development in developing countries: An ethnographic futures research study,"This exploratory paper aims to apply a qualitative, method known as Ethnographic Futures Research (EFR) to predict the future for mobile phones when used for social development in developing countries. The EFR approach was used in a participatory manner to provide scenarios of the future for mobile phone growth. By employing EFR there is an opportunity to consider different paradigms of mobile services creation deployment in developing environments where historically tele-center models are shown to be unsustainable. The implication of this research study is the provision of a novel way of determining diffusion strategies within regions displaying increasing mobile services adoption patterns. In terms of decision making, this research provides an alternative approach to considering scenarios using a qualitative approach, something amiss within decision support systems literature. © 2013 Springer Science+Business Media New York.",Ethnographic futures research; Futures research; Mobile utilisation; Participatory EFR; Social development,10,Information Systems Frontiers,2014 1316,Xu S.,The concept and theory of material flow,"This paper, for the first time, presents seven main theories under the Material Flow (MF) Theory, namely ""Material flow theory"", ""Comprehensive MF theory"", ""MF element theory"", ""MF nature theory"", ""MF science and technology theory"", ""MF engineering theory"" and ""MF industry theory"". The paper points out that the MF is the collective term for the flow of macroscopic goods and that of microcosmic substances. The material flow is not only an economic phenomenon, but also social and natural ones. There is not only economic MF, but also social and natural ones. The economic MF is the core for the MF, and the social and natural MF is the basis for the MF; no matter whether in nature, society or economic circles, the MF comprises of five basic elements: Material, Flow, Owner, Region and Time, among which Material is the core one; the MF is divided into intrinsic and extrinsic ones by nature. Its intrinsic natures include Material, Flow, Owner, Region and Time; its extrinsic natures include Party, Service, Management, Technology and Economy. The MF science and technology is a scientific and technological field with very strong comprehensibility, dealing with subjects including natural science, engineering technology and science, and human and social studies; the MF engineering is a syntheses comprising of six MF elements or six MF forces. The MF's hard science and technology and its soft science and technology can be applied to national economy in the most efficient way, with the fundamental purpose to benefit the mankind; the MF is not only an industry, but also a backbone industry, and even a backbone industry group. The paper provides some insights into future enterprise integration in a global supply chain environment. © 2008 Springer Science+Business Media, LLC.",Comprehensive MF theory; Enterprise integration; Global supply chain; Material flow theory; MF element theory; MF engineering theory; MF industry theory; MF nature theory; MF science and technology theory; MF theory,20,Information Systems Frontiers,2008 1317,Yan X.; Wang J.; Chau M.,Customer revisit intention to restaurants: Evidence from online reviews,"One of the generally recognized marketing principles is that retaining customers is more profitable than winning prospective customers. Therefore, how to retain existing customers and improve their repeat purchases is an important consideration for practitioners to gain profit. The purpose of this study is to investigate factors influencing customer revisit intention to restaurants by analyzing online reviews. We used regression analysis to analyze quantitative scores of 10,136 restaurant reviews collected from an online life community in China, and found that food quality, price and value, service quality, and atmosphere are the antecedents of restaurant customers’ revisit intention, and that restaurant type moderates the effect of customer satisfaction with service quality, atmosphere, and price and value on revisit intention. We also used text mining technology to identify detailed evaluation indicators in each dimension and explore customers’ evaluation behavior characteristics. We found that food quality and, price and value have four indicators while service quality and atmosphere have two indicators. The results are useful for restaurant operators to take effective actions to attract more customers to revisit. © 2013, Springer Science+Business Media New York.",Customer satisfaction; Online reviews; Regression analysis; Revisit intention; Text mining,140,Information Systems Frontiers,2015 1318,Hossain M.A.; Quaddus M.,Developing and validating a hierarchical model of external responsiveness: A study on RFID technology,"Information Systems researchers demonstrate that organizations are very often influenced by external environment; success of an organization and its associated industry is largely dependent on how they respond to the external factors. Although a number of external factors have been explored in literature, still little is known on their degree of impact and hence their relative importance. Therefore, advancing research on organizational external (environmental) responsiveness requires clarifying the theoretical conceptualizations and validating the associated dimensions. After conducting an extensive literature search followed by a qualitative and quantitative study, the current study develops and validates a multi-dimensional hierarchical model of external responsiveness and investigates its effect on adoption intention. The findings of the study show that; in the context of Radio Frequency Identification (RFID) technology, external responsiveness is a third-order, reflective construct which is reflected by external pressure (further is reflected by government pressure, market pressure, mimetic pressure, and normative pressure), external support (reflected by government support, vendor support, and associative support), and external uncertainty (reflected by market and technology uncertainty). Moreover, the impact of the third-order and second-order constructs on the endogenous variable (i.e. intention to adopt RFID) is examined and found to have positive influences. This study is the first reported attempt that categorizes the dimensions of external responsiveness and validates with empirical data. This study concludes with implications and future research directions. © 2014, Springer Science+Business Media New York.",External environment; Higher-order hierarchical model; Responsiveness; RFID,14,Information Systems Frontiers,2015 1319,O'Grady M.J.; O'Hare G.M.P.; Chen J.; Phelan D.,Distributed network intelligence: A prerequisite for adaptive and personalised service delivery,"Mobile computing is undoubtedly one of the predominant computer usage paradigms in operation today. The implications of what might be cautiously termed a usage paradigm shift have still not crystallised fully, either for society, or those envisaging a new raft of applications and services for mobile users. However, fundamental to the current and future success of mobile computing are mobile telecommunications networks. Such networks have been a success story in their own right in recent years, both as traditional voice carriers and, increasingly importantly, as a conduit of mobile data. The potential for new mobile data applications is immense, but, crucially, this potential is severely compromised by two factors inherent in mobile computing: limited bandwidth and computationally restricted devices. Hence, the academic and commercial interest in harnessing intelligent techniques as a means of mitigating these concerns, and ensuring the user experience is a satisfactory one. In this paper, the broad area of intelligence in telecommunications networks is examined, and issues relating to the deployment of intelligent technologies are explored. In particular, the potential of intelligent agents is identified as a viable mechanism for realising a full end-to-end deployment of intelligence throughout the network, including possibly the most crucial component: the end user's device. As an illustration of the viability of this approach, a brief description of a mobile blogging application is presented. © 2008 Springer Science+Business Media, LLC.",Context-aware computing; Intelligent agents; Mobile computing; Mobile telecommunications; Personalisation,13,Information Systems Frontiers,2009 1320,Pedersen T.; Dyrkolbotn S.; Ågotnes T.,Reasoning about reasons behind preferences using modal logic,"Preferences play a crucial role in the theory of rationality, and therefore also to computational social choice and artificial intelligence. In formal models it is usually assumed that preferences are primitive objects, and little concern is devoted to the question of how they are formed or where they come from. Recent work in rational choice theory challenges this assumption, however, and aims to give more internal structure to the notion of a preference. The focus so far has been on modeling faculties of individual agents, such as their mood, mindset, and motivating reasons. In this paper we contribute to this development by developing a modal logic for reasoning about preferences that depend on a set of motivationally salient properties. The main result is a translation showing how reasoning in this logic can be captured by reasoning in a standard modal logic (KT with universal modality). It follows that reasoning systems and algorithms developed for modal logic (with universal modality) can be employed for reasoning about reason-based preferences. We then discuss how the approach can be generalised to the multi-agent case, and allows us to reason about agents who disagree because they are motivated by different factors, and who might be able to reach consensus simply by changing their perspective. © 2014, Springer Science+Business Media New York.",Agreement technologies; Modal logic; Reason-based preferences; Typology of disagreement,2,Information Systems Frontiers,2015 1321,Barjis J.; Gupta A.; Sharda R.,Knowledge work and communication challenges in networked enterprises,"A modern enterprise is a heavily wired and networked socio-technical system where multiple components play in symphony to yield a competitive position in the ear of digital economy. While the underling communication and interaction systems facilitate knowledge workers to carry out the enterprise mission and furnish service to the society, there are many other aspects that rather have adverse effects on the productivity of an enterprise and interruption of knowledge workers, which pose a serious scientific challenge. In this paper, we briefly discuss certain challenging aspects of knowledge work and communication processes in networked enterprises that require more profound scientific attention in networked enterprises. This paper introduces the problem, identifies some specific research challenges, and then briefly discusses emerging research that addresses some of these challenges. © The Author(s) 2010.",Communication modeling; Communication simulation; Email handling; Knowledge management; Knowledge worker; Organizational communication; Organizational interruption,21,Information Systems Frontiers,2011 1322,Huang S.Y.; Wu T.-H.; Chiu A.-A.; Yen D.C.,Measurements of mislead threshold of company graph distortion,"Graphical information has been widely used in businesses and organizations to display, report and analyze financial information. If the graphical information is inadequately manipulated and employed like the distorted graphs, it may well mislead peoples’ judgment and hence lead their company/organization into a disaster. The study of Mather et al. (Accounting and Business Research 35(2), 147-159, 2005) shows that the graphical distortion of bar chart can be measured by using the relative graph discrepancy index (RGD). The purpose of this research is to find out what level of measurement distortion will mislead users by conducting an experimental study. Research results show that financial graphs tend to mislead users when they are distorted by over ±5 % of the RGD. This threshold should be employed as a means for auditing the related graph distortions. © 2014, Springer Science+Business Media New York.",Audit standard; Graph distortion; Information disclosure; Measurement; Website financial information,2,Information Systems Frontiers,2015 1323,Gutierrez F.J.; Ochoa S.F.; Zurita G.; Baloian N.,Understanding student participation in undergraduate course communities: A case study,"Participation is the cornerstone of any community. Promoting, understanding and properly managing it allows not only keeping the community sustainable, but also providing personalized services to its members and managers. This article presents a case study in which student participation in a course community was motivated using two different extrinsic mechanisms, and mediated by a software platform. The results were compared with a baseline community of the same course, in which participation was not motivated by external means. The analysis of these results indicates that managing a partially virtual course community requires the introduction of monitoring services, community managers and extrinsic mechanisms to motivate participation. These findings allow community managers to improve their capability for promoting participation and keeping the community sustainable. The findings also raise several implications that should be considered in the design of software supporting this kind of community, when managing the participation of its members. © 2015, Springer Science+Business Media New York.",Community structure; Partially virtual communities; Socio-technical analysis; Undergraduate course communities; User interaction patterns,6,Information Systems Frontiers,2016 1324,Cong Z.; Fernandez A.; Billhardt H.; Lujak M.,Service discovery acceleration with hierarchical clustering,"This paper presents an efficient Web Service Discovery approach based on hierarchical clustering. Conventional web service discovery approaches usually organize the service repository in a list manner, therefore service matchmaking is performed with linear complexity. In this work, services in a repository are clustered using hierarchical clustering algorithms with a distance measure from an attached matchmaker. Service discovery is then performed over the resulting dendrogram (binary tree). In comparison with conventional approaches that mostly perform exhaustive search, we show that service-clustering method brings a dramatic improvement on time complexity with an acceptable loss in precision. © 2014, Springer Science+Business Media New York.",Hirerachical clustering; Service discovery; Service matchmaking,32,Information Systems Frontiers,2015 1325,Cheung B.C.F.; Ting S.L.; Tsang A.H.C.; Lee W.B.,A methodological approach to optimizing RFID deployment,"The interest of adopting RFID continues to grow in many industries, ranging from supply chain automation to healthcare management. However, dynamics of the operating environment is one of the major challenges that impede RFID deployment. Even though numerous researchers focus on controlled laboratory experiments to enhance the success of deployment, it is found that system performance in the actual production environment may differ significantly from that conducted in a controlled laboratory, resulting in poor deployment result. To cope with this situation, this paper proposes an RFID Deployment Optimizer (RFIDDO), which is a generic methodology for optimizing the RFID configuration to provide objective, quantifiable data about the data capture performance of RFID readers for comparing and optimizing RFID applications in a scientific manner. A case study has also been conducted in a logistics company to demonstrate the implementation of RFIDDO and provide contextual details to help other firms in coping with the environmental dynamics in the journey of RFID deployment. © 2012, Springer Science+Business Media New York.",Deployment optimization; Performance measurement; Radio-frequency identification (RFID); Supply chain automation,4,Information Systems Frontiers,2014 1326,Solaimani S.; Bouwman H.; Itälä T.,Networked enterprise business model alignment: A case study on smart living,"One of the first steps in innovation projects and entrepreneurial initiative involves formulating a Business Model (BM) that describes the value creation, delivery and capturing logic of a business idea. However, when formulating a BM for networked enterprises, the alignment of the collective BM, supporting the joint service or product on offer, and the underlying operational processes of the networked businesses, need to be taken into account. This paper analyses the concept of Business Model Alignment (BMA) based on qualitative case studies of two Smart Living projects in Finland and China. To begin with, a Business Model framework (STOF) is applied to describe the high-level BM. Next, the Value, Information and Process (VIP) framework is applied to analyse BMA. The case studies show that an analytical framework, such as the VIP model, helps reveal the hurdles that may undermine BMA and, as a result, obstruct BM implementation. This paper contributes to existing BM literature by identifying the steps that are necessary to move from an abstract, often strategy-driven BM, of collaborating enterprises towards an aligned BM that can be implemented. This paper also contributes to theory formation by identifying the issues that play a role in achieving BMA. © 2013, Springer Science+Business Media New York.",Alignment; Business model; Case study; Health and care platforms; Implementation; Smart living,32,Information Systems Frontiers,2015 1327,Oh O.; Agrawal M.; Rao H.R.,Information control and terrorism: Tracking the Mumbai terrorist attack through twitter,"This paper analyzes the role of situational information as an antecedent of terrorists' opportunistic decision making in the volatile and extreme environment of the Mumbai terrorist attack. We especially focus on how Mumbai terrorists monitored and utilized situational information to mount attacks against civilians. Situational information which was broadcast through live media and Twitter contributed to the terrorists' decision making process and, as a result, increased the effectiveness of hand-held weapons to accomplish their terrorist goal. By utilizing a framework drawn from Situation Awareness (SA) theory, this paper aims to (1) analyze the content of Twitter postings of the Mumbai terror incident, (2) expose the vulnerabilities of Twitter as a participatory emergency reporting system in the terrorism context, and (3), based on the content analysis of Twitter postings, we suggest a conceptual framework for analyzing information control in the context of terrorism. © 2010 Springer Science+Business Media, LLC.",Information control; Mumbai terrorist attack; Situation awareness; Twitter,181,Information Systems Frontiers,2011 1328,Choi J.-W.; Oh D.-I.,Tag-only aging-counter localization for the R-LIM2 system,"With the large number of items stored in present-day libraries, locating the exact position of an item is time-consuming. This is true not only for poorly managed libraries, but also for well maintained libraries. In the former case, the problem is rather serious. Even though an item may be somewhere in the library, the fundamental role of the library may not be fulfilled, if a user cannot locate the item. In the latter case, a user still needs to perform a tedious shelf search to locate the item. In the first version of the RFID-based Library Management (R-LIM) system, we attached expensive RFID antennas to every shelf, to acquire localization information about the items. However, the solution was not cost-effective, due to the large number of RFID antennas needed. Therefore, in this study, we propose tag-only aging-counter localization for R-LIM, which does not require shelf antennas to determine book locations. In this more recent version, viz., the R-LIM2 system, we replace expensive antennas with inexpensive RFID tags, which enables us to build an affordable system. By associating RFID tags attached to books with those attached to shelves, via periodic tag scans, we determine the exact location of books. This paper describes the aging-counter localization algorithm developed for R-LIM2, and explains how it can be integrated with other parts of the system to locate a book in a search. © 2009 Springer Science+Business Media, LLC.",Aging counter; Book retrieval; Library; Localization; R-LIM2; RFID,2,Information Systems Frontiers,2011 1329,Hwang Y.-C.; Yuan S.-T.; Weng J.-H.,A study of the impacts of positive/negative feedback on collective wisdom-case study on social bookmarking sites,"The core spirit for web 2.0 is collective wisdom (i.e., the contribution of users, and the creation of value through the interaction between users). Social bookmarking sites integrate all kind of contents on the Internet (especially those generated by users), and play the role of pivot between content production and consumption. This paper mainly investigates how the positive/negative feedbacks would impact the quality of the collective wisdom within the autonomous service environments (i.e., the social bookmarking sites). Our research findings show that the performance of social bookmarking sites has a tradeoff between collective filtering (i.e., results of positive feedbacks) and front page update frequency that should be carefully managed for ensuring the good quality in collective wisdom and service performance. Moreover, the negative feedback could also shape the collective wisdom and stabilize the system performance. The research findings are believed to provide some managerial guidelines for web 2.0 sites design and operations. © Springer Science + Business Media, LLC 2009.",Agent-based modeling and simulation; Collective wisdom; Positive/negative impact; Social bookmarking site,19,Information Systems Frontiers,2011 1330,Sun Y.; Tan W.; Li L.; Shen W.; Bi Z.; Hu X.,A new method to identify collaborative partners in social service provider networks,"The interactions among service providers are represented as a social network to support service-oriented collaborations across multiple manufacturing enterprises. The combination of service-oriented computing and social network facilitates the connection and collaboration within enterprises. It is essential to identify a group of prosperous collaborative partners in a social network in a prompt and efficient way, especially when the number of alternative service providers is large. However, traditional exhaustive searching approaches are inapplicable in identifying a host enterprise and constitutive members due to the prohibitive computations. In this paper, a new and efficient approach has been proposed to identify service providers optimally based on existing social relations. Three innovations in the proposal are (i) a set of new concepts has been defined to construct a social service provider network; (ii) based on remodeling the social graph, the betweenness centrality algorithm has been enhanced to efficiently find the leader who serves as the host enterprise of a given engineering project; (iii) to improve the efficiency of computation, an innovative algorithm is proposed to identify the collaborative partners by confining the searching space in the set of connector nodes. For the validation purpose, the experimental simulation is conducted and the results have demonstrated that the proposed algorithms outperform several existing algorithms in terms of computation time in dealing with the increasing number of enterprises. © 2015, Springer Science+Business Media New York.",Business alliance formation; Collaborative computing; Service-oriented computing; Social network; System integration,27,Information Systems Frontiers,2016 1331,Goles T.; Hawk S.; Kaiser K.M.,Information technology workforce skills: The software and IT services provider perspective,"It is now commonplace for an organization to turn to external firms for the provision of IT services and software. As technology advances and the business environment continues to evolve, a key challenge facing IT software and service providers is identifying critical skill sets, both today and in the future. The challenge is compounded as a result of the continuing growth of outsourcing and the increasing demand for technology solutions. This paper explores that challenge through a survey of IT software and service providers. We extend and complement previous studies of non-IT firms by comparing skills sought by non-IT organizations with those of IT services and software providers. Results indicate that, surprisingly, software and services providers place more emphasis on business domain and project management skills than on technical skills. This has implications for the hiring and retention practices of managers, and for academic curriculum and course offerings. © 2008 Springer Science+Business Media, LLC.",Capabilities; IT; Outsourcing; Skills; Software and service providers; Workforce,85,Information Systems Frontiers,2008 1332,Janssen M.; van der Voort H.; van Veenstra A.F.,Failure of large transformation projects from the viewpoint of complex adaptive systems: Management principles for dealing with project dynamics,"Many large transformation projects do not result in the outcomes desired or envisioned by the stakeholders. This type of project is characterised by dynamics which are both caused by and result of uncertainties and unexpected behaviour. In this paper a complex adaptive system (CAS) view was adopted in order to better understand project dynamics and identify management principles for dealing with them. A case study of a large transformation project in the Netherlands was carried out, in which six patterns were found through which project dynamics could be identified. A logical consequence of the immense complexity of the case study’s project dynamics was that stakeholders lost sight of the overall goals, focussed on managing incidents and approached the project in an ad hoc way. Informed by CAS theory, we present seven management principles that respect the dynamics of this type of project and can aid in coping with project dynamics. © 2014, Springer Science+Business Media New York.",Adoption; Complex adaptive systems; Design; Failure; Transformation; XBRL,57,Information Systems Frontiers,2015 1333,Li C.; Li L.,Collaboration among mobile agents for efficient energy allocation in mobile grid,"The use of mobile devices in grid environments may have two interaction aspects: Devices are considered as users of grid resources or as grid resources providers. Due to the limitation constraints on energy and processing capacity of mobile devices, their integration into the Grid is difficult. In this paper, we investigate the cooperation among mobile devices to balance the energy consumption and computation workloads. Mobile devices can have different roles such as buyer devices and seller devices. In the mobile grid, the energies of mobile devices are uneven, energy-poor devices can exploit other devices with spare energy. Our model consists of two actors: A buyer device agent represents the benefits of mobile buyer device that intends to purchase energy from other devices. A seller device agent represents the profits of mobile seller device that is willing to sell spare energy to other devices. The objective of optimal energy allocation in mobile grid is to maximize the utility of the system without exceeding the energy capacity, expense budget and the deadline. A collaboration algorithm among mobile agents for efficient energy allocation is proposed. In the simulation, the performance evaluation of collaboration algorithm among mobile agents is conducted. © Springer Science+Business Media, LLC 2011.",Device collaboration; Mobile agent; Mobile grid,10,Information Systems Frontiers,2012 1334,Awan I.,Mobility management for m-commerce requests in wireless cellular networks,"Increasing number of sophisticated services provided by the current wireless communication systems have caused a significant transition from E-commerce to M-commerce. Enterprises have provided considerable new opportunities to promote their businesses accessible from small mobile devices such as personal digital assistant (PDA) or mobiles phones. These facilities are envisioned as the most convenient way of using M-commerce. Using such services from mobile phones or PDAs equipped with GSM/GPRS involve effective mobility management mechanisms in cellular networks-a popular architecture for wireless networks. Success of such systems will largely depend on the reliable connection for the roaming users. Consequently, Quality of Service (QoS) provision is one of the most challenging issues in the heterogeneous wireless network-based m-commerce systems. Such m-commerce systems enable users to roam between different wireless networks operators and geographical areas while providing interactive broadband services and seamless connectivity. This paper presents an analytical framework to model scarce channels in any cell for maximizing channel utilization and efficient handling of handover requests. Typical numerical experiments are presented to validate the analytical solution against simulation to study the effect of bursty traffic upon the performance of the cell in any cellular networks. © Springer Science+Business Media, LLC 2006.",M-commerce; Performance evaluation; Wireless handover mechanism,7,Information Systems Frontiers,2006 1335,Lai W.W.K.; Chiu D.K.W.; Feng Z.,A collaborative food safety service agent architecture with alerts and trust,"With the recent advances in Internet and mobile technologies, there are increasing demands for ubiquitous access to food safety information for service integration and gathering first hand information. However, due to disparate food trading information among different food suppliers throughout the food supply chain such as food importers, food wholesalers, food retailers, it is still difficult for citizens to use them effectively during their marketplace shopping. To overcome this problem, we propose a Collaborative Food Safety Agent System (CFSAS) based on a scalable, flexible, and intelligent Multi-Agent Information System (MAIS) architecture for proactive aids and trust-based decision support on food purchasing to citizens. We formulate our MAIS architecture for CFSAS further with agent clusters based on a case study of the Center for Food Safety (CFS) in Hong Kong. Agent clusters may comprise several types of agents to achieve the goals involved in the major processes of a food safety mechanism. We show how agents help citizens better plan, understand, and specify their preferences collaboratively with the CFSAS. We further illustrate how this can be implemented with Web service technologies to integrate disparate food information resources along the food supply chain. © 2012 Springer Science+Business Media, LLC.",Collaborative process integration; Food safety information system; Multi-agent information system; Ubiquitous computing; Web services,10,Information Systems Frontiers,2013 1336,Kim G.; Suh Y.,Semantic business process space for intelligent management of sales order business processes,"A company's competitiveness relies heavily on its business processes and accurate knowledge to execute its business processes with agility and efficiency. Business Process Management (BPM) initially promised to provide the business world with suitable tools and techniques for successful BPM without help from the IT world. However, the current practice of BPM has several fundamental problems, including difficulty with automatic discovery and the integration of business processes across organizations. Understanding that the main cause of these problems lies in the lack of semantics on business process, we first define a variety of business process ontologies in order to build a semantic business process space (SBPS) for the limited area of sales order. We then explain how the SBPS satisfies the requirements for successful implementation of semantic BPM (SBPM) and demonstrate with a scenario how SBPM can be realized in the environment of SBPS. Our novel approach will reduce the time and cost necessary for the development of a new business process in a fast-changing environment and provide practitioners with useful insights into the proper implementation of the SBPM. Although our paper defines semantic business process knowledge for only a limited domain, its insights can be readily extended to other areas of business. © 2010 Springer Science+Business Media, LLC.",Business process management; Ontology; Semantic business process management; Semantic business process space; Semantic web services,13,Information Systems Frontiers,2011 1337,Xu X.; Ma W.W.K.; See-To E.W.K.,Will mobile video become the killer application for 3G mobile internet? a model of media convergence acceptance,"We propose and empirically test a model of user acceptance of digital media convergence. Integrating information system research, particularly the paradigm of task-technology fit and the platform-application dichotomy, and theories from media psychology and human-computer interaction, we theorize the fit between the content applications and the media platform as the key determinant of user evaluation and acceptance of digital media convergence. We empirically tested our theory in the context of mobile video entertainment services. Specifically, we hypothesize that both the duration of the video content (i.e., the characteristic of the content) and the attentional constraint of the mobile media platform (i.e., the characteristic of the media platform) jointly determine users' attentional involvement (i.e., reflecting the fit) in the video content. Such involvement in turn influences users' emotional enjoyment and satisfaction with the mobile video entertainment service. The empirical results support most of our hypotheses. Two key findings are: (1) in the case of media convergence, the attentional constraint of the target media platform significantly influences user experience during content delivery that may lead to the rejection of media convergence; and (2) the duration of the content interacts with both the attentional constraint of the media platform and the type of interruptions from the environment in determining attentional involvement and emotional enjoyment. We discuss the theoretical contributions and practical implications from our empirical findings. © Springer Science + Business Media, LLC 2008.",Digital media convergence; Media psychology; Mobile internet; Task-technology fit,18,Information Systems Frontiers,2010 1338,Wüllenweber K.; Beimborn D.; Weitzel T.; König W.,The impact of process standardization on business process outsourcing success,"What is the impact of business process standardization on business process outsourcing (BPO) success? This paper argues that there is a direct impact of process standardization on BPO success, due to production cost economies, and also an indirect effect via improved contractual and relational governance resulting from better monitoring opportunities and facilitated communication and coordination. This threefold impact of standardization on BPO success is empirically confirmed using data from 335 BPO ventures in 215 German banks. © 2008 Springer Science+Business Media, LLC.",Business process outsourcing; Business process standardization; Outsourcing governance,140,Information Systems Frontiers,2008 1339,Strode D.E.,A dependency taxonomy for agile software development projects,"Agile software development is designed to achieve collaborative software development. A supporting pillar of collaboration is effective coordination, which is necessary to manage dependencies in projects. Understanding the dependencies arising in agile software development projects can help practitioners choose appropriate coordinative practices from the large number of practices provided by the various agile methods. To achieve this understanding, this article analyses dependencies in three typical cases of co-located agile software development and presents the dependencies as a taxonomy with decision rules for allocating dependencies into categories. Findings show that knowledge, process, and resource dependencies are present, with knowledge dependencies predominant. In addition, there are agile practices with a coordinative function that address multiple dependencies in these agile software development projects. These practices would be a good choice for coordinating a project and supporting collaboration in agile software projects. © 2015, Springer Science+Business Media New York.",Agile methods; Agile software development; Coordination mechanisms; Dependency; Scrum; Selecting agile practices,68,Information Systems Frontiers,2016 1340,Zhang X.; Tsang A.; Yue W.T.; Chau M.,The classification of hackers by knowledge exchange behaviors,"This paper examines messages posted in a hacker forum and constructs four user profiles based on the observed behavior patterns. It starts with the development of an automated forum post classification system to understand the knowledge transfer pattern exhibited by each user over time. Two patterns, knowledge acquisition and knowledge provision, are noted to be particularly informative. Based on these two and other user characteristics, user profiles are classified into four types: guru hackers, casual hackers, learning hackers, and novice hackers. Guru hackers are knowledgeable and respectable. They usually share ideas and advice with others. Casual hackers tend to act as observers. They can be skilled hackers who show interest mainly in deriving usable information from the forum. Learning hackers are also expert hackers who utilize the forum basically for learning. They actively seek knowledge and tend to share more of it over time. Novice hackers are new learners who typically join the forum for a short period. Overall, it is found that hacker communities very much represent learning communities where meritocracy is in place. © 2015, Springer Science+Business Media New York.",Hacker; Hacker ecosystem; Hacker profile; Knowledge transfer; Online learning,52,Information Systems Frontiers,2015 1341,Turetken O.,Is your back-up IT infrastructure in a safe location?:A multi-criteria approach to location analysis for business continuity facilities,"Building redundant capacity into an organization's information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make the main IT facilities vulnerable to disruption (i.e. man-made or natural disasters) are likely to impact the redundant (back-up) facilities as well. This complicates the process of selecting redundant facility location(s). The problem is essentially a multi-criteria decision problem, and can be addressed using the location analysis techniques that have been used in other domains in the past. Meanwhile, what make this context somewhat unique are the decision criteria and the rather subjective nature of the decision process. This paper provides a simple decision model for the problem, and illustrates the model with a case where relevant decision criteria are identified and the solution is obtained using a mix of objective and subjective decision techniques. We believe the paper is valuable because it presents an actionable methodology for practitioners involved in BCP. © 2008 Springer Science+Business Media, LLC.",Business continuity planning; Decision support; Mathematical modeling; Site location decisions,18,Information Systems Frontiers,2008 1342,Boongasame L.; Daneshgar F.,An awareness-based meta-mechanism for e-commerce buyer coalitions,"Many of the existing theories in e-Commerce and Buyer Coalition assume that all persons involved adopt self-interested strategies by seeking their own gains using environmental/market information. In reality however, such information may not be complete. Also, each person’s knowledge may differ from others. By adopting a collaborative perspective towards the buyer coalition process, this study introduces and validates an awareness-based mechanism for buyer coalitions that generates various outcomes corresponding to different levels of awareness of the collaborating roles within the process, where ‘awareness’ is defined in terms of the knowledge of the collaboration context of the coalition. The theoretical foundation of the study is an overlapping space of Game Theory (Hassan et al. Information Systems Frontiers 16(4):523–542, 2014), e-Commerce (Yang et al. Information Systems Frontiers 16(1):7–18, 2014), and Knowledge Management (Daneshgar & Wang Knowledge Based Systems 20(8):736–744, 2007). The research methodology is design science using simulation software for demonstration and proof of concept. Results indicate that higher levels of awareness of buyers do not necessarily increase total coalition discount but it enables individual buyers to make more opportunistic and calculated decisions to protect their personal interests. © 2014, Springer Science+Business Media New York.",Awareness; Buyer coalition; E-commerce mechanism; Electronic market; Game theory; Group buying; Knowledge-sharing,1,Information Systems Frontiers,2016 1343,Gerpott T.J.,Determinants of self-report and system-captured measures of mobile Internet use intensity : An empirical investigation of common method bias among German mobile communications customers,"Most research on the first adoption and subsequent use (= acceptance) of Internet access through cellular networks and portable appliances (= mobile Internet) has followed a similar pattern. It has employed survey responses of mobile network operator [MNO] customers to explain consumers' stated future use (continuance) intentions or claimed use intensities related to mobile Internet [MI] access by various beliefs about MI (e.g., perceived relative advantage, usefulness, ease of use). However, there is ample evidence suggesting that MI use intentions and self-reported use intensities are only weakly correlated with actual MI use. Therefore, the present paper develops hypotheses on how the ability of different types of variables to account for variance in MI use intensity may vary depending on whether subjectively estimated or objectively captured use serves as the criterion variable. The hypotheses are tested by analyzing actual MI use behaviors of 300 adopters in Germany, whose mobile IP traffic was extracted from an MNO's billing engine. This ""system- captured"" criterion measure is integrated with MI adopter responses collected by means of a standardized telephone survey. Results show that the predictors are more strongly correlated with self-rated than with system-captured MI use intensity. Up to 38% of the variance explained in self-rated use may be attributed to artifactual covariance between variables caused by common measurement methods. Factual MI use case features (MI tariff type and appliance class, fixed Internet home access availability) are better able to account for variance in both self-rated and actual MI use intensity than MI related beliefs. The findings imply that variable relationships observed in earlier MI and information system (IS) acceptance studies are likely to have been inflated by common method biases and thus may have provided spurious support for the conceptual frameworks tested. Implications of the results for future MI and IS acceptance research and for MNO seeking to forecast and to influence the MI use intensity of their customers are discussed. © 2010 Springer Science+Business Media, LLC.",Acceptance; Adoption; Advanced mobile data services; Common method bias; Factual use case features; IS user survey; Mobile communications; Mobile Internet; Perceptual constructs; Use intensity measurement,25,Information Systems Frontiers,2011 1344,Voisard A.; Ziekow H.,Modeling trade-offs in the design of sensor-based event processing infrastructures,"Systems for distributed event processing have recently gained increasing attention in a broad range of application domains. This raises the demand for methods to adapt the system design to applicationspecific needs. Our approach considers (1) trade-offs regarding the hardware infrastructure and (2) tradeoffs in the software design. For the underlying model we categorize events along the dimensions of temporal complexity and physical distribution. This yields a categorization of events that drives trade-offs in the infrastructure design. The presented model supports design decisions in dependence on application-specific event properties and design goals. © Springer Science+Business Media, LLC 2012.",Architecture; Design guidelines; Distributed event processing; Event-based systems,6,Information Systems Frontiers,2012 1345,Watanabe K.; Enokido T.; Takizawa M.,Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks,"Various types of applications access to objects distributed in peer-to-peer (P2P) overlay networks. Even if the locations of target objects are detected by some algorithms like flooding and distributed hash table (DHT) ones, applications cannot manipulate the target objects without access requests. It is critical to discover which peer can manipulate an object in which method, i.e. only a peer with an access right is allowed to manipulate an object. Hence, the application rather has to find target peers which can manipulate a target object than detecting the location of a target object. Due to the scalability and variety of peers, it is difficult, possibly impossible to maintain a centralized directory showing in which peer each object is distributed. An acquaintance peer of a peer p is a peer whose service the peer p knows and with which the peer p can directly communicate. We discuss types of acquaintance relations of peers with respect to what objects each peer holds, is allowed to manipulate, and can grant access rights on. Acquaintance peers of a peer may notify the peer of different information on target peers due to communication and propagation delay. Here, it is critical to discuss how much a peer trusts each acquaintance peer. We first define the satisfiability, i.e. how much a peer is satisfied by issuing an access request to another peer. For example, if a peer pj locally manipulates a target object o and sends a response, a peer p i is mostly satisfied. On the other hand, if pj has to ask another peer to manipulate the object o, p i is less satisfied. We define the trustworthiness of an acquaintance peer of a peer from the satisfiability and the ranking factor. © Springer Science+Business Media, LLC 2006.",Access control; Acquaintance; Peer-to-peer overlay network; Quality of service; Satisfiability; Trustworthiness,1,Information Systems Frontiers,2006 1346,Rau D.; Haerem T.,Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research,"Organizations often under-utilize expensive information technology (IT) enabled work processes that automate routines or processes that were previously carried out manually. One reason for this phenomenon may lie in the types of decisions made by technological gatekeepers, who are key individuals charged with deploying new technologies in organizations. From an organizational learning perspective, technological gatekeepers are more likely to perform successfully when they make appropriate decisions about exploring or exploiting the routines associated with a new technology. The factors that influence gatekeepers' decisions about exploration or exploitation, however, are still largely unexplored. In this study, we present a model based on the basic technology acceptance model (TAM) to examine this issue. We use concepts from the literatures on organizational learning, expertise, and cognitive styles to elaborate on the constructs in our model, and examine how these literatures can inform our understanding of technological gatekeepers' decisions. The goal of this paper is to accelerate micro-level research on new technology deployment in organizations by identifying some key issues and propositions for future studies. © Springer Science + Business Media, LLC 2009.",Cognitive styles; Expertise; Exploitation; Exploration; Routines,14,Information Systems Frontiers,2010 1347,Nowlan M.F.; Blake M.B.,Agent-mediated knowledge sharing for intelligent services management,"For service-oriented architectures that span multiple businesses, organizations must transfer information back-and-forth about their available services. Because of the potential large volume, it is unreasonable and impractical to expect human practitioners to handle the scale of interactions desired and/or required on a continual basis. Intelligent agents offer the adaptability and flexibility to handle the knowledge transfer that must occur in order to share service offerings. Effectively transferring service-oriented information in this domain requires autonomous systems that adapt to heterogeneous environments. This work introduces an architecture and specialized communication procedures designed for this sort of knowledge sharing environment. We show that these procedures perform reasonably when evaluated with current agent communication technologies. © 2007 Springer Science+Business Media, LLC.",Agent communication; Collaboration; Management; Recommendation; Web services,7,Information Systems Frontiers,2007 1348,Liao J.; Yang D.; Li T.; Wang J.; Qi Q.; Zhu X.,A scalable approach for content based image retrieval in cloud datacenter,"The emergence of cloud datacenters enhances the capability of online data storage. Since massive data is stored in datacenters, it is necessary to effectively locate and access interest data in such a distributed system. However, traditional search techniques only allow users to search images over exact-match keywords through a centralized index. These techniques cannot satisfy the requirements of content based image retrieval (CBIR). In this paper, we propose a scalable image retrieval framework which can efficiently support content similarity search and semantic search in the distributed environment. Its key idea is to integrate image feature vectors into distributed hash tables (DHTs) by exploiting the property of locality sensitive hashing (LSH). Thus, images with similar content are most likely gathered into the same node without the knowledge of any global information. For searching semantically close images, the relevance feedback is adopted in our system to overcome the gap between low-level features and high-level features. We show that our approach yields high recall rate with good load balance and only requires a few number of hops. © 2013 Springer Science+Business Media New York.",Cloud computing; Content based image retrieval; Locality sensitive hashing; Peer-to-peer; Relevance feedback,14,Information Systems Frontiers,2014 1349,Hsu C.-H.; Ma J.; Obaidat M.S.,Dynamic intelligence towards merging cloud and communication services,"Experts suggest that the growing next generation Cloud and Communication Services (CCS) provide dynamic intelligence and play an increasingly critical role in all aspects of the people. Cloud service is a new cross-discipline that covers the science and technology needed to bridge the gap between business services and IT/telecommunication services. This technology suite includes web services and service-oriented architecture (SOA), cloud computing, business consulting methodology and utilities, business process modeling, and transformation and integration. The goal of cloud and services computing is to develop new computing technology and thereby enable more advanced IT/telecommunication services to support business services more efficiently and effectively. It is expected such mobile cloud services will improve social networking applications, encourage the widespread adoption of crowdsourcing and crowd sensing, and facilitate ubiquitous access to multimedia entertainment contents.",,7,Information Systems Frontiers,2014 1350,Suarez-Meza L.J.; Zúñiga J.A.; Pedraza E.C.; Corrales J.C.,Fully automated resource retrieval in telecommunications and internet converged environments,"Today, most of the current retrieval approaches are targeted only to Web services, leaving out different other resource types (Telecom, IT and content). Moreover, such approaches are not aimed at ordinary users, since to find and use a service, users must specify their requests by complex expressions that represent desired services. Thus, the search and selection of relevant resources depend on the ability of the user to retrieve the most suitable ones, which is an inefficient task. In order to address these issues, in this paper we propose an innovative approach for resource retrieval over Telecommunications and Internet converged environments, which brings together traditional NLP techniques with retrieval process based on lightweight semantic approachs. The preliminary experiments show promising results in contrast to traditional approaches. © 2013 Springer Science+Business Media New York.",Converged environments; Full automated retrieval; Telecom and IT resources,1,Information Systems Frontiers,2014 1351,Patnayakuni R.; Ruppel C.P.,A socio-technical approach to improving the systems development process,"Research on improving the systems development processes has primarily focused on mechanisms such as tools, software development methodologies, knowledge sharing and process capabilities. This research has yielded considerable insights into improving the systems development process, but the large majority of information systems development projects still continue to be over budget, late, and ineffective in meeting user needs. Together with the advent of software development moving offshore, or consisting of offshore team members, a more holistic approach is appropriate. Approached from a socio-technical perspective the software development process is viewed as a process embedded in a social and a technical subsystem. Drawing upon socio-technical work design principles, this paper suggests how capabilities of the development process can be improved. Data collected from a survey of software development practices in organizations indicates that organizations at different levels of process capabilities differ in work system characteristics as well as process performance. For example, the use of multi-skilled teams was found to be significantly related to the systems development process maturity level as well as significantly related to all the performance measures studied. This paper provides empirical support for the socio-technical approach and provides a theoretical foundation for designing software process initiatives in organizations. © Springer Science + Business Media, LLC 2008.",CMMI; Socio-technical systems; Systems development; Teams; Work systems,35,Information Systems Frontiers,2010 1352,Jain P.; Tyagi V.,A survey of edge-preserving image denoising methods,"Reducing noise has always been one of the standard problems of the image analysis and processing community. Often though, at the same time as reducing the noise in a signal, it is important to preserve the edges. Edges are of critical importance to the visual appearance of images. So, it is desirable to preserve important features, such as edges, corners and other sharp structures, during the denoising process. This paper presents a review of some significant work in the area of image denoising. It provides a brief general classification of image denoising methods. The main aim of this survey is to provide evolution of research in the direction of edge-preserving image denoising. It characterizes some of the well known edge-preserving denoising methods, elaborating each of them, and discusses the advantages and drawbacks of each. Basic ideas and improvement of the denoising methods are also comprehensively summarized and analyzed in depth. Often, researchers face difficulty in selecting an appropriate denoising method that is specific to their purpose. We have classified and systemized these denoising methods. The key goal of this paper is to provide researchers with background on a progress of denoising methods so as to make it easier for researchers to choose the method best suited to their aims. © 2014, Springer Science+Business Media New York.",Bilateral filtering; Edge-preserving filtering; Stein’s unbiased risk estimate (SURE) minimization; Wavelet thresholding; Wavelet transform,139,Information Systems Frontiers,2016 1353,Beck R.; Weber S.; Gregory R.W.,Theory-generating design science research,"A frequently mentioned challenge in design science research (DSR) is the generation of novel theory above and beyond information technology artefacts. This article analyzes the DSR process and extends established frameworks for theory generation to exemplify improvements to theory generation through methods of grounded theory development. On a conceptual base, we developed a theory-generating DSR approach which integrates methods of grounded theory development with established DSR methodology. This combination enables a design theorist to generate theoretical knowledge that extends the applicable knowledge base. We do not elaborate this combination on a meta-level, but rather provide a process model for researchers in form of an extension of a well-known DSR model to combine both methods in a pluralistic research design. With this suggested research approach, scholars can draw theoretical insights from analytical abstractions and can improve the development of IT artefacts in a structured way to avoid failure or repair loops. © 2012 Springer Science+Business Media, LLC.",Behavioural science research; Design science research; Grounded theory method; Pluralistic research method,66,Information Systems Frontiers,2013 1354,Han W.; Gu Y.; Wang W.; Zhang Y.; Yin Y.; Wang J.; Zheng L.-R.,The design of an electronic pedigree system for food safety,"The problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even using phases of foods. This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply. The system implements an extension of the pedigree standard of EPCglobal, and offers a more trustworthily tracking service to monitor and supervise the production and supply of food. We discuss the key issues of the design, and implement a prototype to evaluate the feasibility of the design. Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system. © 2012, Springer Science+Business Media, LLC.",Electronic pedigree; Food safety; Internet of things; Trustworthiness,23,Information Systems Frontiers,2015 1355,Tang F.-H.; Horace Ip H.S.,Image fusion enhancement of deformable human structures using a two-stage warping-deformable strategy: A content-based image retrieval consideration,"In medical image registration and content-based image retrieval, the rigid transformation model is not adequate for anatomical structures that are elastic or deformable. For human structures such as abdomen, registration would involve global features such as abdominal wall as well as local target organs such as liver or spleen. A general non-rigid registration may not be sufficient to produce image matching of both global and local structures. In this study, a warping-deformable model is proposed to register images of such structures. This model uses a two-stage strategy for image registration of abdomen. In the first stage, the global-deformable transformation is used to register the global wall. The warping-transformation is used in second stage to register the liver. There is a good match of images using the proposed method (mean similarity index∈=∈0.73545).The image matching correlation coefficients calculated from eight pairs of CT and MR images of abdomen indicates that the warping-deformable transformation gives better matching of images than those without transformation (p∈<∈0.001, paired t-test). This study has established a model for image registration of deformable structures. This is particularly important for data mining of image content retrieval for structures which are non-rigid. The result obtained is very promising but further clinical evaluation is needed © 2009 Springer Science+Business Media, LLC.",Deformable; Fusion; Image registration; Matching; Warping,3,Information Systems Frontiers,2009 1356,Lee H.G.; Kim W.-S.; Noh K.Y.; Shin J.-H.; Yun U.; Ryu K.H.,Coronary artery disease prediction method using linear and nonlinear feature of heart rate variability in three recumbent postures,"In present study, we proposed not only a novel methodology useful in developing the various features of heart rate variability (HRV), but also a suitable prediction model to enhance the reliability of medical examinations and treatments for coronary artery disease. In order to develop the various features of HRV, we analyzed HRV for three recumbent postures. The interaction effects between the recumbent postures and groups of normal people and heart patients were observed based on linear and nonlinear features of HRV. Forty-three control subjects and 64 patients with coronary artery disease participated in this study. In order to extract various features, we tested five classification methods and evaluated performance of classifiers. As a result, SVM and CMAR (gave about 72-88% goodness of accuracy) outperformed the other classifiers. © 2009 Springer Science+Business Media, LLC.",Classification; Coronary artery disease diagnosis; Heart rate variability; Linear and nonlinear features,17,Information Systems Frontiers,2009 1357,Barkataki S.; Zeineddine H.,On achieving secure collaboration in supply chains,"Security of private information is a critical requirement for information sharing in supply chains. Security is measured on a variety of metrics: participating suppliers in a supply chain process need guarantees on confidentiality, anonymity, and privacy; the purchaser needs assurance on verifiability and non-repudiation. Given the mutually exclusive nature of security metrics such as anonymity vs. non-repudiation, and confidentiality vs. verifiability, the challenge is to design a process that satisfies all these metrics. In this paper, we propose three major processes that enable secure information sharing and secure computation of arbitrary supply chain functions. We evaluate and compare the secure processes using a ranking method and score function, which we propose for that purpose. We find that certain processes will be preferred over other processes, depending on the environmental characteristics and user preferences. Thus, our secure processes aim to solve major collaboration issues in supply chains. © 2013, Springer Science+Business Media New York.",Secure collaboration; Secure information sharing; Secure process management; Supply chain management,17,Information Systems Frontiers,2015 1358,Sun L.; Ousmanou K.; Cross M.,An ontological modelling of user requirements for personalised information provision,"The knowledge economy offers opportunity to a broad and diverse community of information systems users to efficiently gain information and know-how for improving qualifications and enhancing productivity in the work place. Such demand will continue and users will frequently require optimised and personalised information content. The advancement of information technology and the wide dissemination of information endorse individual users when constructing new knowledge from their experience in the real-world context. However, a design of personalised information provision is challenging because users' requirements and information provision specifications are complex in their representation. The existing methods are not able to effectively support this analysis process. This paper presents a mechanism which can holistically facilitate customisation of information provision based on individual users' goals, level of knowledge and cognitive styles preferences. An ontology model with embedded norms represents the domain knowledge of information provision in a specific context where users' needs can be articulated and represented in a user profile. These formal requirements can then be transformed onto information provision specifications which are used to discover suitable information content from repositories and pedagogically organise the selected content to meet the users' needs. The method is provided with adaptability which enables an appropriate response to changes in users' requirements during the process of acquiring knowledge and skills. © Springer Science + Business Media, LLC 2008.",Norms construction; Ontology modelling; Personalised information provision; User profiling; User requirements articulation,14,Information Systems Frontiers,2010 1359,Lee C.-C.; Ho P.-F.; Hwang M.-S.,A secure e-auction scheme based on group signatures,"Recently, electronic auctions have been receiving more and more attention in the world of electronic commerce. The security and efficiency of electronic auctions are becoming important. We shall propose a securely sealed-bid auction scheme that uses our group signature scheme with the function of authenticated encryption. It can achieve the following goals: secrecy of bidding price, anonymity, verifiability, non-repudiation, and better performance. © 2008 Springer Science+Business Media, LLC.",E-auction; Electronic commerce; Group signature; Sealed-bid auction; Security,26,Information Systems Frontiers,2009 1360,Sadeghi P.; Benyoucef M.; Kuziemsky C.E.,A mashup based framework for multi level healthcare interoperability,"Healthcare delivery is evolving from disease-centered to patient-centered care delivery where patients are active participants in their healthcare delivery. This calls for more communication and collaboration among all healthcare actors. There is also an increasing demand for personalized healthcare systems that provide effective information management, facilitate communication and collaboration, and support applications to meet user requirements. To address these challenges, we need to advance the integration and interoperability of healthcare applications in a controlled manner. Drawing upon a conceptual model from a collaborative care case study, we identified a set of interoperability requirements and developed a Mashup based interoperability framework. Our framework allows patients and other healthcare actors to engage in collaborative processes through online applications facilitated by mashups. We then use proof-of-concept implementations to demonstrate how our framework is able to facilitate different types of interoperability. We believe that collaborative technologies such as mashups can implement process interoperability requirements to support collaborative care delivery, particularly for asynchronous care delivery. © 2011 Springer Science+Business Media, LLC.",Collaboration; Healthcare; Interoperability; Mashups; Process interoperability; Systems design; Web 2.0,17,Information Systems Frontiers,2012 1361,Wang H.; Cao J.; Zhang Y.,Delegating revocations and authorizations in collaborative business environments,"Efficient collaboration allows organizations and individuals to improve the efficiency and quality of their business activities. Delegations, as a signif icant approach, may occur as workflow collabora tions, supply chain collaborations, or collaborative commerce. Role-based delegation models have been used as flexible and efficient access management for collaborative business environments. Delegation revocations can provide significant functionalities for the models in business environments when the delegated roles or permissions are required to get back. However, problems may arise in the revocation process when one user delegates user U a role and another user delegates U a negative authorization of the role. This paper aims to analyse various role-based delegation revocation features through examples. Revocations are categorized in four dimensions: Dependency, Resilience, Propagation and Dominance. According to these dimensions, sixteen types of revocations exist for specific requests in collaborative business environments: DependentWeakLocalDelete, Dependent WeakLocalNegative, DependentWeakGlobalDelete, DependentWeakGlobalNegative, IndependentWeak LocalDelete, IndependentWeakLocalNegative, Inde pendentWeakGlobalDelete, IndependentWeakGlobal Negative, and so on. We present revocation delegating models, and then discuss user delegation authorization and the impact of revocation operations. Finally, comparisons with other related work are discussed. © 2008 Springer Science+Business Media, LLC.",Authorization; Collaborative business environment; Revocation,4,Information Systems Frontiers,2009 1362,Huang H.; Chen X.; Wang Z.,Failure recovery in distributed model composition with intelligent assistance,"Composite models in Decision Support Systems (DSS) are combinations of model functions to solve complex decision problems. They must be executed successfully to obtain the desired results. Unfortunately, faults may happen during its execution due to the dynamic networks or the information asymmetry between developers and users. Therefore, designing effective failure recovery mechanism to ensure the reliability of the composite model execution is essential. Progress has been made in the web service composition field to obtain limited failure recovery capabilities, but not fully applicable to composite models since model services are informational services in essence which do not change the world conditions. This paper proposes a unified framework, integrated with a process ontology and multiple recovery strategies that can provide valuable failure recovery recommendations intelligently. The recovery strategies have been greatly enhanced in providing greater failure recovery capability. Feasibility and efficiency of this framework have been illustrated and tested. © 2013, Springer Science+Business Media New York.",AI planning; Distributed model composition; Failure recovery; Semantic web,7,Information Systems Frontiers,2015 1363,Crasso M.; Zunino A.; Campo M.,Combining query-by-example and query expansion for simplifying web service discovery,"The vision of a worldwide computing network of services that Service Oriented Computing paradigm and its most popular materialization, namely Web Service technologies, promote is a victim of its own success. As the number of publicly available services grows, discovering proper services is similar to finding a needle in a haystack. Different approaches aim at making discovery more accurate and even automatic. However they impose heavy modifications over current Web Service infrastructures and require developers to invest much effort into publishing and describing their services and needs. So far, the acceptance of this paradigm is mainly limited by the high costs associated with connecting service providers and consumers. This paper presents WSQBE+, an approach to make Web Service publication and discovery easier. WSQBE+ combines open standards and popular best practices for using external Web services with text-mining and machine learning techniques. We describe our approach and empirically evaluate it in terms of retrieval effectiveness and processing time, by using a data-set of 391 public services. © 2009 Springer Science+Business Media, LLC.",Query expansion; Service oriented computing; Web Service discovery,17,Information Systems Frontiers,2011 1364,Chen J.V.; Yen D.C.; Pornpriphet W.; Widjaja A.E.,E-commerce web site loyalty: A cross cultural comparison,"This study investigates the factors that affect e-loyalty in e-commerce websites. The e-loyalty model proposed in this study is based on DeLone and McLean’s IS Success Model. E-loyalty is explained using three independent factors (information quality, system quality, and service quality), and two mediating factors (trust and customer satisfaction). The proposed model was tested with Thai and Taiwanese samples using Structural Equation Modeling (SEM) data analysis. The study yielded different results when Thai and Taiwanese samples were tested using SEM multi-group moderation data analysis. This study incorporated the concepts of national identity (NATID) and Hofstede’s five cultural dimensions to better explain cultural differences between the two countries and how culture can affect the e-commerce environment. © 2014, Springer Science+Business Media New York.",B2C E-commerce; Customer satisfaction; E-loyalty model; Information quality; IS success model; Nationality and cultural difference; Service quality; Structural equation modeling; System quality; Trust,122,Information Systems Frontiers,2015 1365,Li S.-H.; Huang S.-M.; Yen D.C.; Sun J.-C.,Semantic-based transaction model for web service,"Cloud computing technology has become more and more utilized in business application in today's industrial fields. In general, many business systems developed based on web services are indeed heterogeneous software systems that process business data by complying with integrated business rules. Web services have until recently been regarded as software building blocks that can be assembled to construct the distributed business applications of the next generation and assist enterprises to promote operational efficiency and organizational flexibility. As a result, Webservices can be employed to improve the integration of value chain processes and/or activities. However, Web services are usually implicit as a black box that prohibits users and developers from comprehending an actual scenario and present status inside the web service component as said developers deal with other associated heterogeneous components. Additionally, developers are unable to increase overall efficiency while integrating Web service components if they do not possess the ability to modify/improve the implementation scenario. This research first defines the component as corresponding state transitions that should be decomposed further into sub-transactions and semantic transactions, which can make possible re-implementation of the specific Web services in an efficient way and increase the overall throughputs for the new compositeWeb services. Secondly, this study implements an MTNet Project, which can be employed to assist developers' analysis and construction of the semantic models forWeb services according to the previously described definitions. Last, the simulation experiment provided in this manuscript proved that the proposed semantic model can indeed improve the throughput and, consequently, decrease the delay time for concurrent transactions. ©©Springer Science+Business Media, LLC 2012.",BPEL; Cloud system; Semantic transaction model; Web service,12,Information Systems Frontiers,2013 1366,Gelbard R.,"""padding"" bitmaps to support similarity and mining","The current paper presents a novel approach to bitmap-indexing for data mining purposes. Currently bitmap-indexing enables efficient data storage and retrieval, but is limited in terms of similarity measurement, and hence as regards classification, clustering and data mining. Bitmap-indexes mainly fit nominal discrete attributes and thus unattractive for widespread use, which requires the ability to handle continuous data in a raw format. The current research describes a scheme for representing ordinal and continuous data by applying the concept of ""padding"" where each discrete nominal data value is transformed into a range of nominal-discrete values. This ""padding"" is done by adding adjacent bits ""around"" the original value (bin). The padding factor, i.e.; the number of adjacent bits added, is calculated from the first and second derivative degrees of each attribute's domain-distribution. The padded representation better supports similarity measures, and therefore improves the accuracy of clustering and mining. The advantages of padding bitmaps are demonstrated on Fisher's Iris dataset. © 2011 Springer Science+Business Media, LLC.",Bitmap-index; Classification; Cluster analysis; Data mining; Data representation; Similarity index,3,Information Systems Frontiers,2013 1367,Li Y.; Lu X.; Chao K.-M.; Huang Y.; Younas M.,The realization of service-oriented e-Marketplaces,"Electronic Marketplaces (or e-Marketplaces) require technologies which provide support for the adaptability, flexibility and the integration of business applications in order to meet rapid changes in business environment. Traditional web technologies are unable to meet the new business requirements which are derived from the rapid growth of e-Marketplaces. In this research, a service-oriented framework is proposed in order to address the issues associated with the development of e-Marketplaces. Specifically, it introduces a generic trading model oriented to e-Marketplaces so as to overcome the inadequacy of existing models and to facilitate the development of a computational trading process. In the proposed framework, required services are identified through the utilization of the business-centric trading model. Using a service metamodel, services are equipped with intelligence such that they work seamlessly and coherently within and across e-Marketplaces. A multi-model driven integrated development platform has been developed to support the proposed models and framework. The proposed framework and concepts have been validated through a case study of a mutual funds auction in an e-Marketplace. © Springer Science+Business Media, LLC 2006.",e-Marketplaces; Metamodel; Semantic web; Trading model; Web services,10,Information Systems Frontiers,2006 1368,Rong W.; Peng B.; Ouyang Y.; Liu K.; Xiong Z.,Collaborative personal profiling for web service ranking and recommendation,"Web service is one of the most fundamental technologies in implementing service oriented architecture (SOA) based applications. One essential challenge related to web service is to find suitable candidates with regard to web service consumer’s requests, which is normally called web service discovery. During a web service discovery protocol, it is expected that the consumer will find it hard to distinguish which ones are more suitable in the retrieval set, thereby making selection of web services a critical task. In this paper, inspired by the idea that the service composition pattern is significant hint for service selection, a personal profiling mechanism is proposed to improve ranking and recommendation performance. Since service selection is highly dependent on the composition process, personal knowledge is accumulated from previous service composition process and shared via collaborative filtering where a set of users with similar interest will be firstly identified. Afterwards a web service re-ranking mechanism is employed for personalised recommendation. Experimental studies are conduced and analysed to demonstrate the promising potential of this research. © 2014, Springer Science+Business Media New York.",Association rule; Discovery; Personalisation; Ranking; User group; Web service,29,Information Systems Frontiers,2015 1369,Wang G.; Ren Y.; Dou K.; Li J.,IDTCP: An effective approach to mitigating the TCP incast problem in data center networks,"Recently, TCP incast problem in data center networks has attracted a wide range of industrial and academic attention. Lots of attempts have been made to address this problem through experiments and simulations. This paper analyzes the TCP incast problem in data centers by focusing on the relationships between the TCP throughput and the congestion control window size of TCP. The root cause of the TCP incast problem is explored and the essence of the current methods to mitigate the TCP incast is well explained. The rationality of our analysis is verified by simulations. The analysis as well as the simulation results provides significant implications to the TCP incast problem. Based on these implications, an effective approach named IDTCP (Incast Decrease TCP) is proposed to mitigate the TCP incast problem. Analysis and simulation results verify that our approach effectively mitigates the TCP incast problem and noticeably improves the TCP throughput. © 2013 Springer Science+Business Media New York.",Congestion control; Data center networks; TCP incast,37,Information Systems Frontiers,2014 1370,Truong T.-T.; Tran M.-T.; Duong A.-D.,Enhanced dynamic authentication scheme (EDAS),"With non-stop growth in network environments, communication security is necessary. A strong protocol guarantees that users and service providers are secure against many kinds of attacks, such as impersonation and replay attack. Sood et al. proposed an authentication scheme based on dynamic identity to prevent transactions from being intercepted by malicious users. Although they claimed that their scheme has advantages over previous schemes with the same approach, we prove that their scheme is vulnerable to impersonation attack and stolen verification attack, and can be affected by clock synchronization. Therefore we propose a novel authentication scheme to enhance security and overcome limitations existing in Sood's scheme. Our security analysis shows that our proposed method can efficiently resist known types of attacks. Experimental results also show that the method can be implemented and processed in real-time thus applicable for not only regular computers but also mobile devices. © 2013 Springer Science+Business Media New York.",Cryptography; Dynamic identity; Hash function; Identity-based scheme; Mutual authentication; Network communication; Password; Security protocol; Session key agreement; Smartcard,6,Information Systems Frontiers,2014 1371,Wong R.K.,Feasibility and a case study on content optimization services on cloud,"The recent boom in mobile device usage has provided more opportunities, competition and also increased complexities for content providers to monetize their information goods. Although mobile devices are becoming increasingly powerful, their hardware, software and connectivity are relatively more limited compared to desktop and enterprise systems. As a result, various content optimization services have emerged. This paper focuses on content optimization services that modify and reorganize content to reduce the size of content and enhance the performance of processing on the content. For most content providers, this optimization process needs to be fast, scalable and yet aligned with their monetization strategies and cost requirements. Based on our experience on content optimization services, this paper presents the economics related to these services. In particular, we present some practical considerations when these services are implemented on a cloud, which is typically perceived to be a cheaper and more scalable option compared to traditional dedicated servers. © 2012 Springer Science+Business Media, LLC.",Cloud; Compression; Content optimization; Services,3,Information Systems Frontiers,2013 1372,Dwivedi Y.K.; Papazafeiropoulou A.; Brinkman W.-P.; Lal B.,Examining the influence of service quality and secondary influence on the behavioural intention to change internet service provider,"Although the broadband market has considerably matured, follow-up research on the continued adoption of broadband is yet to be conducted. The aim of this research was therefore to investigate empirically the influence of service quality and secondary influence on consumers' behavioural intention to change from their existing internet service provider (ISP) to an alternative service provider. The investigation focuses upon broadband household consumers within the UK. The study was conducted using a postal survey; a self-administered questionnaire was sent to 1600 households and a total of 358 completed replies were obtained. The results suggest that both service quality and secondary influence were significantly correlated to consumers' behavioural intentions to change ISP. The implications of these findings are presented, followed by a discussion of the limitations of this research and future research directions. © Springer Science + Business Media, LLC 2008.",Adoption; Behavioural intention to change internet service provider; Broadband; ICT; Secondary influence; Service quality,24,Information Systems Frontiers,2010 1373,Reijers H.A.; Song M.; Jeong B.,Analysis of a collaborative workflow process with distributed actors,"Current workflow management technology offers rich support for process-oriented coordination of distributed teamwork. In this paper, we evaluate the performance of an industrial workflow process where similar tasks can be performed by various actors at many different locations. We analyzed a large workflow process log with state-of-the-art mining tools associated with the ProM framework. Our analysis leads to the conclusion that there is a positive effect on process performance when workflow actors are geographically close to each other. Our case study shows that the use of workflow technology in itself is not sufficient to level geographical barriers between team members and that additional measures are required for a desirable performance.",Case study; Performance evaluation; Process mining; Workflow management,26,Information Systems Frontiers,2009 1374,Xia F.; Ding F.; Li J.; Kong X.; Yang L.T.; Ma J.,Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing,"With prosperity of applications on smartphones, energy saving for smartphones has drawn increasing attention. In this paper we devise Phone2Cloud, a computation offloading-based system for energy saving on smartphones in the context of mobile cloud computing. Phone2Cloud offloads computation of an application running on smartphones to the cloud. The objective is to improve energy efficiency of smartphones and at the same time, enhance the application's performance through reducing its execution time. In this way, the user's experience can be improved. We implement the prototype of Phone2Cloud on Android and Hadoop environment. Two sets of experiments, including application experiments and scenario experiments, are conducted to evaluate the system. The experimental results show that Phone2Cloud can effectively save energy for smartphones and reduce the application's execution time. © 2013 Springer Science+Business Media New York.",Computation offloading; Energy efficiency; Execution time; Mobile cloud computing; Smartphone,113,Information Systems Frontiers,2014 1375,Whitmore A.; Agarwal A.; Da Xu L.,The Internet of Things—A survey of topics and trends,"The Internet of Things is a paradigm where everyday objects can be equipped with identifying, sensing, networking and processing capabilities that will allow them to communicate with one another and with other devices and services over the Internet to accomplish some objective. Ultimately, IoT devices will be ubiquitous, context-aware and will enable ambient intelligence. This article reports on the current state of research on the Internet of Things by examining the literature, identifying current trends, describing challenges that threaten IoT diffusion, presenting open research questions and future directions and compiling a comprehensive reference list to assist researchers. © 2014, Springer Science+Business Media New York.",Ambient; Context-aware; Internet of Things; IoT; Machine to machine; Survey; Ubiquitous,1297,Information Systems Frontiers,2015 1376,Weber-Jahnke J.H.; Obry C.,Protecting privacy during peer-to-peer exchange of medical documents,"Privacy is an important aspect of interoperable medical information systems. Governments and health care organizations have established privacy policies to prevent abuse of personal health data. These policies often require organizations to obtain patient consent prior to exchanging personal information with other interoperable systems. The consents are defined in form of so-called disclosure directives. However, policies are often not precise enough to address all possible eventualities and exceptions. Unanticipated priorities and other care contexts may cause conflicts between a patient's disclosure directives and the need to receive treatments from informed caregivers. It is commonly agreed that in these situations patient safety takes precedence over information privacy. Therefore, caregivers are typically given the ability to override the patient's disclosure directives to protect patient safety. These overrides must be logged and are subject to privacy audits to prevent abuse. Centralized ""shared health record"" (SHR) infrastructures include consent management systems that enact the above functionality. However, consent management mechanisms do not extend to information systems that exchange clinical information on a peer-to-peer basis, e.g., by secure messaging. Our article addresses this gap by presenting a consent management mechanism for peer-to-peer interoperable systems. The mechanism restricts access to sensitive, medical data based on defined consent directives, but also allows overriding the policies when needed. The overriding process is monitored and audited in order to prevent misuse. The mechanism has been implemented in an open source project called CDAShip and has been made available on SourceForge. © 2011 Springer Science+Business Media, LLC.",Access control; Auditing; CDA; Consent management; Disclosure directives; eHealth; Non-repudation; Peer-to-peer interoperability; Security and privacy,20,Information Systems Frontiers,2012 1377,Cao X.; Guo X.; Liu H.; Gu J.,The role of social media in supporting knowledge integration: A social capital analysis,"Internet of things (IoT) is a current trend that reveals the next generation Internet-based information architecture, the convergence of social networks and IoT solutions is helpful to optimize relationships among objects. In order for IoT to take off in the IT sector, providers and other stakeholders must integrate knowledge successfully. In this study, we investigate the role of social media in supporting knowledge integration from a social capital perspective. Specifically, we propose that social media have the potential to facilitate the formation of employees’ social capital indicated by social networking, trust and shared language. These mediating variables will in turn positively affect knowledge integration. This research frame is validated with survey data collected from 262 Chinese working professionals. The results provide general empirical support for our hypotheses. In analogy with social media for human beings, the future direction of socialization among objects can be inspired by this study. © 2013, Springer Science+Business Media New York.",Internet of things (IoT); Knowledge integration; Social capital; Social Internet of things (SIoT); Social media,76,Information Systems Frontiers,2015 1378,Ryoo S.Y.; Koo C.,Green practices-IS alignment and environmental performance: The mediating effects of coordination,"The problem of environmental sustainability has been growing in recent years with an interest from both researchers and practitioners. A major gap that exists is the absence of empirical studies that addressed business value of green IS (information systems). Thus, drawing on the resource-based view of the firm and IT (information technology) business value literature, this study aims to develop a comprehensive research model of green practice-IS alignment, the key cross-functional coordination of green practices with manufacturing and marketing functions, and firm performance. The study provides a better understanding of the relationship between green practice-manufacturing coordination and green practice-marketing coordination, and how both variables mediated the relationship between green practices-IS alignment and environmental performance. The data used in this study were collected from manufacturing firms. The results show that a firm's green practices-IS alignment had a positive effect on both green practices-manufacturing coordination and green practices-marketing coordination. In turn, both green practices-manufacturing coordination and green practices-marketing coordination are the significant predictors of environmental performance. Meanwhile, green practices-IS alignment had an indirect effect on environmental performance via both green practices-manufacturing coordination and green practices-marketing coordination. Moreover, the findings of this study show that environmental performance is an important predictor of economic performance. © 2013 Springer Science+Business Media New York.",Business value of green information systems; Environmental performance; Green practices-IS alignment; Green practices-manufacturing coordination; Green practices-marketing coordination,87,Information Systems Frontiers,2013 1379,Tan W.; Jiang C.; Li L.; Lv Z.,Role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies,"The key to enterprise process simulation and process enactment is to implement enterprise process cooperative schedule, i.e., how to control the execution order of the scheduled activities according to cooperative behavior rules under resource constraints. This paper proposes a dynamic PERT/CPM approach using a compound number, and discusses its applications to dynamic enterprise process scheduling for Computer Supported Cooperative Work (CSCW). By using the compound number, activity's duration, the earliest start time, and the latest start time of activities in a process model can be defined and calculated effectively to facilitate the enterprise process flexible scheduling and process forecast during process enactment. A framework to role-oriented process-driven enterprise cooperative work is proposed, some schedule strategies and the algorithm implementation are discussed, as well as the process-driven enterprise application integration. © 2008 Springer Science+Business Media, LLC.",CSCW; Dynamic PERT/CPM; Enterprise process engine; Process simulation and enactment,18,Information Systems Frontiers,2008 1380,Pang Z.; Chen Q.; Han W.; Zheng L.,"Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion","The revolution of Internet-of-Things (IoT) is reshaping the modern food supply chains with promising business prospects. To be successful in practice, the IoT solutions should create “income-centric” values beyond the conventional “traceability-centric” values. To accomplish what we promised to users, sensor portfolios and information fusion must correspond to the new requirements introduced by this income-centric value creation. In this paper, we propose a value-centric business-technology joint design framework. Based on it the income-centric added-values including shelf life prediction, sales premium, precision agriculture, and reduction of assurance cost are identified and assessed. Then corresponding sensor portfolios are developed and implemented. Three-tier information fusion architecture is proposed as well as examples about acceleration data processing, self-learning shelf life prediction and real-time supply chain re-planning. The feasibilities of the proposed design framework and solution have been confirmed by the field trials and an implemented prototype system. © 2012, Springer Science+Business Media, LLC.",Food supply chain; Industrial information integration engineering (IIIE); Information fusion; Internet-of-things (IoT); Sensor portfolio; Value-centric design,264,Information Systems Frontiers,2015 1381,Liu F.; Bi Z.; Xu E.L.; Ga Q.; Yang Q.; Yang Y.; Ma L.; Wuren T.; Ge R.,An integrated systems approach to plateau ecosystem management—a scientific application in Qinghai and Tibet plateau,"There is a global trend of the shortage of nature resources, such as water and wildlife, which have suffered dramatic losses due to over-use, pollution, habitat loss, and, increasingly, changes caused by global warming. To make the planet more sustainable, abundant data has to be collected and analyzed from ecosystems for scientific decision-making, restoring and preserving natural resources. In this paper, an integrated systems approach has been proposed for the data acquisition and analysis in information management of an ecosystem; it is a direct extension of an agriculture ecosystem enterprise information system (AEEIS) developed by Xu et al. (Genomics Proteomics Bioinformatics 3:5–17, 2008). The challenges in system development have been discussed, and the significance of the developed system has been illustrated through a thorough discussion and a case study on the genetic coding and expression of antelopes. In the case study, an IoT-based enterprise information system (EIS) has been applied to investigate the effects of the signal transducer and activator of transcription 3 (STAT3) on the adaptation mechanism to high altitude hypoxia. Two remarkable conclusions are (i) the levels of the STAT3 mRNA and protein vary from one tissue to another, and the highest level is in the lung tissue, and (ii) Tibetan antelope’s expression of STAT3 mRNA and protein are higher than that from plain sheep. Based on the fact that a Tibetan antelope has a higher adaptability to hypoxia; it has illustrated that the hypoxic STAT3-specific expression is one of the molecular bases of high altitude hypoxia adaptation in Tibetan antelope. © 2012, Springer Science+Business Media New York.",Ecosystem; Enterprise Systems; Genetic Cloning; Genetic Expression; Hypoxia Adaptation; Industrial Information Integration Engineering (IIIE); Internet of Things (IoT); Medical Informatics; Signal Transducer and Activator of Transcription 3,10,Information Systems Frontiers,2015 1382,Li S.; Xu L.D.; Zhao S.,The internet of things: a survey,"In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating ‘things’. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated. © 2014, Springer Science+Business Media New York.",Internet of Things; IoT; Literature Review; RFID; Service Oriented Architecture; Wireless Sensors Network,2040,Information Systems Frontiers,2015 1383,Stoodley I.; Bruce C.; Edwards S.,Expanding ethical vistas of IT professionals,"In this paper we argue for an experientially grounded view of IT professionals' ethical formation and support. We propose that for such formation and support to be effectual, it should challenge professionals' conceptualisations of their field and of ethics, and it should do so with the aim of changing their experience. To this end, we present a Model of Ethical IT, which is based on an examination of the nature of ethics and on empirical findings concerning IT professionals' experience of ethics. We argue that for IT professionals to be enabled to become more ethical in their practice: the purpose of IT must be primarily understood to be user-oriented; the nature of professional ethics must be primarily understood to be other-centred; and the goal of ethics education must be understood as primarily promoting a change in awareness. © 2010 Springer Science + Business Media, LLC.",Information technology; Professional ethics; Professional formation,10,Information Systems Frontiers,2010 1384,Straub D.; Weill P.; Schwaig K.S.,Strategic dependence on the IT resource and outsourcing: A test of the strategic control model,"Using resource dependency theory (RDT), this research analyzes how organizations control their information technology resources to improve organizational performance. According to RDT, organizations must manage their dependency on external organizations and limit external dependencies when resources are considered critical. The current study proposes and tests a portion of a Strategic Control Model positing that managers seek to control important, strategic resources in order to create value for the firm and to avoid dependency on external entities. Utilizing a research design that captured extensive quantitative data on the control of IT functions and services, the research team gathered 5 years of data on 54 business units (BUs) in 27 global companies located in seven countries. Study examined the linkages of these 54 BUs to firm performance. Locating the Extent of Control within the firm in cases where the firm depends on IT as a strategic resource proves to be a good explanation for effective decisions leading to higher performance. Viewing IT as a strategic resource alone does not lead to positive business unit outcomes, but the moderating influence of Extent of Control is found to establish the complex statistical relationship with business unit performance. For these reasons, it is critical that a theoretically grounded firm-wide process for decisions on locating IT control is in place to capture business value. © 2008 Springer Science+Business Media, LLC.",Core competency; Extent of control; Firm performance; IT outsourcing; IT outsourcing decisions; IT performance; Resource dependency theory; Strategic information systems; Strategic IT resources,32,Information Systems Frontiers,2008 1385,Iacob M.E.; Van Sinderen M.J.; Steenwijk M.; Verkroost P.,Towards a reference architecture for fuel-based carbon management systems in the logistics industry,"The current practice in the logistics industry is to calculate the carbon footprint of transportation activities based on the distance covered, using long-term fuel consumption averages per kilometer. However, fuel consumption may actually vary over time, because of differences in road characteristics, traffic situations, driving behavior, etc. Therefore, distance-based emission calculations are not accurate. Our approach is fuel-based and it calculates transport greenhouse gas emissions by obtaining the actual fuel consumption during trips via board computers installed in vehicles. Thus, we propose an architecture for a fuel-based Logistics Carbon Management System (LCMS) that monitors and collects real-time data about the fuel consumption during trips, and, consequently, calculates detailed and accurate carbon footprints of transportation services. Furthermore, this system is integrated with the logistics service provider's business processes and with typical software applications (e.g.; Transport Management Systems and Board Computers). We validate and implement the proposed architecture by means of a prototype. © 2013 Springer Science+Business Media New York.",Architecture; Carbon footprinting; Logistics carbon management system; Logistics industry,26,Information Systems Frontiers,2013 1386,Lung C.-H.; Ajila S.A.; Liu W.-L.,Measuring the performance of aspect oriented software: A case study of Leader/Followers and Half-Sync/Half-Async architectures,"The aim of this work is to measure the impact of aspect-oriented programming on software performance. Thus, we hypothesized as follow: adding aspects to a base program will affect its performance because of the overhead caused by the control flow switching, and that incremental effect on performance is more obvious as the number of join points increases. To test our hypotheses we carried out a case study of two concurrent architectures: Half-Sync/Half-Async and Leader/Followers. Aspects are extracted and encapsulated and the base program performance was compared to the aspect program. Our results show that the aspect-oriented approach does not have significant effect on the performance and that in some cases an aspect-oriented program even outperforms the non-aspect program. We also investigated the effect of cache fault rate on performance for both aspect and non-aspect programs. Based on our experiments, the results demonstrate that there is a close correlation between the cache fault rate and performance, which may be in favor of aspect code if some aspects are frequently accessed. Additionally, the introduction of a large number of join points does not have significant effect on performance. © Springer Science+Business Media New York 2013.",Architectural patterns; Aspect-oriented programming; Concurrency; Software performance,3,Information Systems Frontiers,2014 1387,Carrasco R.A.; Muñoz-Leiva F.; Hornos M.J.,A multidimensional data model using the fuzzy model based on the semantic translation,"With the rapid development of Web 2.0 sites such as Blogs and Wikis users are encouraged to express opinions about certain products, services or social topics over the web. There is a method for aggregating these opinions, called Opinion Aggregation, which is made up of four steps: Collect, Identify, Classify and Aggregate. In this paper, we present a new conceptual multidimensional data model based on the Fuzzy Model based on the Semantic Translation to solve the Aggregate step of an Opinion Aggregation architecture, which allows exploiting the measure values resulting from integrating heterogeneous information (including unstructured data such as free texts) by means of traditional Business Intelligence tools. We also present an entire Opinion Aggregation architecture that includes the Aggregate step and solves the rest of steps (Collect, Identify and Classify) by means an Extraction, Transformation and Loading process. This architecture has been implemented in an Oracle Relational Database Management System. We have applied it to integrate heterogeneous data extracted from certain high end hotels websites, and we show a case study using the collected data during several years in the websites of high end hotels located in Granada (Spain). With this integrated information, the Data Warehouse user can make several analyses with the benefit of an easy linguistic interpretability and a high precision by means of interactive tools such as the dashboards. © 2013 Springer Science+Business Media New York.",Fuzzy linguistic modelling; Linguistic multidimensional data model; Multidimensional data model; Opinion aggregation,7,Information Systems Frontiers,2013 1388,Casu M.; Cicala G.; Tacchella A.,Ontology-based data access: An application to intermodal logistics,"In this paper, we investigate ontology-based data access (OBDA) to build information systems whose purposes are (i) gathering data from a network of intermodal terminals, and (ii) computing performance indicators of the network. This application domain is characterized by large amounts of data and relatively simple data models, making it a natural challenge for logic-based knowledge representation and reasoning techniques. Considering relational database (RDB) technology as a yardstick, we show that careful engineering of OBDA can achieve RDB-like scalability even in demanding applications. To the best of our knowledge, this is the first study evaluating the potential of OBDA in a typical business-size application. © 2012 Springer Science+Business Media New York.",Knowledge representation and reasoning; Monitoring and diagnosis of complex systems; Ontology-based data access,12,Information Systems Frontiers,2013 1389,Li Y.-M.; Jhang-Li J.-H.; Hwang T.-K.; Chen P.-W.,Analysis of pricing strategies for community-based group buying: The impact of competition and waiting cost,"Group buying is one of the major pricing mechanisms in which retailers can offer low group rates due to a saving on transaction costs and its target consumers are those with lower sensitivity on waiting time. Under group buying, group size significantly affects the waiting cost to which consumers have different tolerances. In this paper, we develop a two-stage pricing game to evaluate the impact of the waiting cost, competition, and group-facilitating technology on the profitability and efficiency of community-based group buying. Our results point out that when a monopolistic retailer operates a mixed channel, the retailer will charge a relatively high group rates in the group-buying channel to force most consumers to choose individual buying unless the transaction cost in the individual-buying channel is sufficiently high. If two competing retailers adopt different pure channels, investment in group-facilitating technology may weaken the profit of the retailer adopting community-based group buying when the actual sellingcost saving resulted from community-based group buying is not significant. © Springer Science+Business Media, LLC 2010.",Channel competition; Group buying; IT investment; Waiting cost,16,Information Systems Frontiers,2012 1390,Zuo Y.; O'keefe T.,Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system,"In today's digital world, privacy issues have received widespread public attention. Current research on information privacy protection focuses on release control and subject identity obscurity. Little work has been done, however, to prevent a piece of private information from being misused after that information has been released to external entities. This paper focuses on information privacy protection in a post-release phase. Without entirely depending on the information collector, an information owner is provided with powerful means to control and audit how his/her released information will be used, by whom, and when. The goal is to minimize the asymmetry of information flow between an information owner and an information collector. A set of innovative owner-controlled privacy protection and violation detection techniques has been proposed: Self-destroying File, Mutation Engine System, Automatic Receipt Collection, and Honey Token-based Privacy Violation Detection. Next generation privacy-enhanced operating system, which supports the proposed mechanisms, is introduced. Such a privacy-enhanced operating system stands for a technical breakthrough, which offers new features to existing operating systems. We discuss the functionalities of such an operating system and the design guidelines. To our best knowledge, no similar technical work has been found to provide post-release information privacy protection. © 2007 Springer Science+Business Media, LLC.",Information post-release control; Information privacy protection; Privacy violation detection; Privacy-enhanced operating system,13,Information Systems Frontiers,2007 1391,Guerra-García C.; Caballero I.; Piattini M.,Capturing data quality requirements for web applications by means of DQ-WebRE,"The number of Web applications which are part of Business Intelligence (BI) applications has grown exponentially in recent years, as has their complexity. Consequently, the amount of data used by these applications has also increased. The larger the number of data used, the greater the chance to make errors is. That being the case, managing data with an acceptable level of quality is paramount to success in any organizational business process. In order to raise and maintain adequate levels of Data Quality (DQ), it is indispensable for Web applications to be able to satisfy specific DQ requirements. To do so, DQ requirements should be captured and introduced into the development process of the Web Application, together with the other software requirements needed in the applications. In the field of Web application development, however, there appears to us to exist a lack of proposals aimed at managing specific DQ software requirements. This paper considers the MDA (Model Driven Architecture) approach and, principally, the benefits provided by Model Driven Web Engineering (MDWE), putting forward a proposal for two artifacts. These consist of a metamodel and a UML profile for the management of Data Quality Software Requirements for Web Applications (DQ-WebRE). © 2012 Springer Science+Business Media New York.",Data Quality; Model Driven Web Engineering; Requirements Engineering; Requirements modeling; Web Engineering,15,Information Systems Frontiers,2013 1392,Balka E.; Whitehouse S.; Coates S.T.; Andrusiek D.,Ski hill injuries and ghost charts: Socio-technical issues in achieving e-Health interoperability across jurisdictions,"This paper looks at the challenges associated with consolidating and leveraging patient information recorded at various points in a distributed, multi-jurisdictional health care system. We draw on insights from two ethnographic case studies to illuminate varied issues related to interoperability of information management systems. Our first case study is an investigation of duplicate medical charts which exist in several ambulatory care clinics located on the same campus at an acute care hospital. The second case study is an ongoing exploratory project intended to develop an understanding of information collection, storage and handover procedures in the pre-hospital care chain, a health care domain that includes varied actors and organizations with different information needs. Whereas findings from our case studies show that achievement of interoperability will be difficult, our analysis suggests ways to begin to overcome these challenges. © 2011 Springer Science+Business Media, LLC.",Data handovers; Duplicate medical charts; Electronic health records; Ghost charts; Handovers in care; Interoperability; Shadow records; Socio-technical issues,20,Information Systems Frontiers,2012 1393,Rossel P.O.; Herskovic V.; Ormeño E.,Creating a family of collaborative applications for emergency management in the firefighting sub-domain,"Software Product Lines allow creating a set of applications that share a set of common features. This makes software product lines appropriate for implementing a family of software products when each stakeholder has different needs and requirements evolve constantly. In the case of emergency management, firefighters have begun using their own smartphones to collaborate and access information during emergencies. However, each firefighter role requires different information and the firefighters’ requirements are constantly evolving. We propose a well-defined process to help stakeholders in this domain specify the products they require, showing that it is possible to apply this software engineering process to extract collaborative requirements common to a set of applications. To confirm whether it was useful for real software implementation, we defined and implemented two applications for this domain. This paper presents the process used to systematically define the domain model and determine the domain scope, which may be used for other domains. We found the process to be appropriate for identifying features related to the domain and its collaborative aspects. The results are promising; the process allowed us to create two working applications which were positively received by two types of stakeholders. © 2015, Springer Science+Business Media New York.",Collaboration; Domain analysis; Emergency management; Mobility; Software product line,12,Information Systems Frontiers,2016 1394,Centeno R.; Hermoso R.; Fasli M.,On the inaccuracy of numerical ratings: dealing with biased opinions in social networks,"In this work, we study the potential problems emanating from using numerical ratings in social networks to rank entities regarding their reputation. In particular, we empirically demonstrate how reputation rankings as collected and managed by current systems are likely to be skewed due to subjectivity problems associated with the use of numerical ratings to encapsulate preferences. With the aim of overcoming these problems, we put forward an approach in which users are asked for their opinions about entities in a comparative fashion. In order to select the most appropriate users to be queried, we take advantage of the social structure derived from the interactions among users and entities following a principle of heterogeneity. Finally, we evaluate the proposed approach in the domain of movie ratings by using real datasets collected from different web sites. © 2014, Springer Science+Business Media New York.",Opinions; Pairwise elicitation; Ratings; Reputation; Social networks,25,Information Systems Frontiers,2015 1395,Löser A.; Nagel C.; Pieper S.; Boden C.,Beyond search: Retrieving complete tuples from a text-database,"A common task of Web users is querying structured information from Web pages. For realizing this interesting scenario we propose a novel query processor for systematically discovering instances of semantic relations in Web search results and joining these relation instances into complex result tuples with conjunctive queries. Our query processor transforms a structured user query into keyword queries that are submitted to a search engine, forwards search results to a relation extractor, and then combines relations into complex result tuples. The processor automatically learns discriminative and effective keywords for different types of semantic relations. Thereby, our query processor leverages the index of a search engine to query potentially billions of pages. Unfortunately, relation extractors may fail to return a relation for a result tuple. Moreover, user defined data sources may not return at least k complete result tuples. Therefore we propose an adaptive routing model based on information theory for retrieving missing attributes of incomplete result tuples. The model determines the most promising next incomplete tuple and attribute type for returning any-k complete result tuples at any point during the query execution process. We report a thorough experimental evaluation over multiple relation extractors. Our query processor returns complete result tuples while processing only very few Web pages. © 2013 Springer Science+Business Media New York.",Keyword query generation; Structured query execution; Text data,5,Information Systems Frontiers,2013 1396,Oni O.; Papazafeiropoulou A.,Diverse views on IT innovation diffusion among SMEs: Influencing factors of broadband adoption,"This study is examining the challenges involved in the effective diffusion of innovation technologies among Small and Medium Size Enterprises (SMEs). Having broadband Internet as the technology in focus we report that broadband adoption by SMEs was initially particularly slow while there has been little research on the reasons behind this phenomenon. This study provides an in-depth view of the broadband diffusion process to SMEs in south east UK by examining the views and activities of the various groups involved in the process. Innovation diffusion and social construction of technology theory are applied in order to construct a framework that addresses some of the issues not covered in previous literature. Our results show that even though several SMEs have adopted broadband, they are not making full use of the technology, while using broadband has not changed significantly the way they operate their businesses. The point we are raising with this study is that the SMEs' lack of understanding on the effective application of the technology is the main impediment for effective adoption. We believe that our results are useful to providers looking to diffuse broadband to SMEs as well as other IT innovations. © 2012 Springer Science+Business Media, LLC.",Broadband; Innovation diffusion; SMEs; Social construction of technology (SCOT),25,Information Systems Frontiers,2014 1397,Jung J.J.; Chang Y.-S.; Liu Y.; Wu C.-C.,Advances in intelligent grid and cloud computing,"Advances in intelligent grid and cloud computing are discussed. Grid and Cloud Computing (GCC) frameworks have been one of the most popular research topics in recent years. These technologies are very important for supporting efficient user collaboration, since various resources for a project may be geographically distributed and heterogeneous. The managerial implications of this model are related to sustainable decision support and comprehensive decision approach. Moreover, the formal model is prototypically implemented using a software tool and examined with the help of a simulation study of three realistic scenarios and a sensitivity analysis. The second part consists of three papers that focus on various applications by or for cloud services. In the first paper of this section, Chang and his colleagues focus on investigating an in-memory database, called CUDADB, to scale up the performance of database systems using GPUs with Computer Unified Device Architecture (CUDA).",,11,Information Systems Frontiers,2012 1398,Fosso Wamba S.; Takeoka Chatfield A.,The impact of RFID technology on warehouse process innovation: A pilot project in the TPL industry,"Using the value chain model which provides a process view, this longitudinal case study and simulation modeling analysis of a Canadian third-party logistics (TPL) supply chain provides some empirical support for the enabling role of RFID technology in effecting warehouse process innovation and optimization for the focal TPL firm. However, the findings of our study also reveal the RFID technology implementation costs as the key inhibitor of RFID widespread adoption and usage among suppliers. This, in turn, precluded the focal TPL firm from implementing the best optimum RFID solution to create better business value from the RFID project. © Springer Science+Business Media, LLC 2010.",Business process innovation; Modeling; Optimization; RFID technology; Warehouse,23,Information Systems Frontiers,2011 1399,Tang J.; Zhang P.; Wu P.F.,Categorizing consumer behavioral responses and artifact design features: The case of online advertising,"Many consumers encounter and interact with digital artifacts and services on a daily basis, either willingly or unwillingly. This paper conceptualizes consumer online behaviors into more refined categories in the context of online advertising. Behaviors can be differentiated by their directions and intensities. Approach and avoidance are two directions of behavioral responses when consumers encounter online advertisements. Active and passive behaviors reflect the levels of intensity of behavioral efforts consumers put when dealing with online advertisements. Active behavioral responses mean that consumers make effort to act upon online ads, either approaching or avoiding them. Passive behavioral responses indicate that consumers make little effort to change the current status, and would approach or avoid in a passive way. We posit that consumers’ behavioral responses can be generally categorized into four major types across these two dimensions: active approach, passive approach, active avoidance, and passive avoidance. In addition, we categorize the design features of online advertisements with a three-facet framework: ad content, ad form, and ad action. Ad content is concerned with the message or meaning that an ad carries; ad form is about materializing content based on presentation styles such as media, location, color, audio, etc.; and ad action is concerned with the behaviors of an ad such as movement, onset timing, frequency, etc. Due to the novelty of the categorizations, an exploratory study was conducted to provide empirical evidence on the categorizations of the four behavior types and three design feature types. Our findings indicate that all four types of consumer behaviors were present, and all behaviors identified by our study can be classified into one of the four types. The same is true for the design feature categorization. We illustrate that the categorization of the three types of ad design features can also guide the understanding of consumers’ judgments of ads, which may function as a bridge of ad design features’ influence on consumer behaviors. This study contributes to a stronger, more refined understanding of how consumers react to online advertising services, and how such responses relate to various types of design features. It also has practical implications for the design, delivery, and management of digital artifacts and services in general. © 2014, Springer Science+Business Media New York.",Active-passive behavior; Approach-avoidance behavior; Consumer online behavior; Design features of online ads; Online advertising; Stimulus-Organism-Response (S-O-R) framework,48,Information Systems Frontiers,2015 1400,Burgess S.; Sellitto C.; Cox C.; Buultjens J.,Trust perceptions of online travel information by different content creators: Some social and legal implications,"Consumers are increasingly turning to the online environment to provide information to assist them in making purchase decisions related to travel products. They often rely on travel recommendations from different sources, such as sellers, independent experts and, increasingly, other consumers. A new type of online content, usergenerated content (UGC), provides a number of legal and social challenges to providers and users of that content, especially in relation to areas such as defamation, misrepresentation and social embarrassment. This paper reports research that examined the level of trustworthiness of online travel information from these different sources. The study used a survey of Australian travel consumers (n= 12,000) and results support the notion that there are differences in the level of trust for online travel information from different sources. Respondents 'tended to agree' that they trusted information provided by travel agents, information from commercial operators and comments made by travellers on third party websites. However, the highest level of trust was afforded to information provided on State government tourism websites. These results suggest that greater trust is placed in online travel comments when they are on a specific travel website than when they are on a more generic social networking website. However, respondents were 'not sure' that they trusted comments made by travellers on weblogs and on social networking sites. Some 88% of respondents that had not visited UGC websites (or were unsure if they had) indicated that they thought that UGC would be useful in the future - suggesting that they feel that any concerns they may have in relation to legal and social problems resulting from its use will be resolved. © Springer Science + Business Media, LLC 2009.",Online consumers; Product recommendations; Survey; Travel information; Trust; User-generated content,83,Information Systems Frontiers,2011 1401,Reddy K.; Venter H.S.; Olivier M.S.,Using time-driven activity-based costing to manage digital forensic readiness in large organisations,"A digital forensic readiness (DFR) programme consists of a number of activities that should be chosen and managed with respect to cost constraints and risk. Traditional cost systems, however, can not provide the cost of individual activities. This makes it difficult or impossible for organisations to consider cost when making decisions about specific activities. In this paper we show that the relatively new cost system, time-driven activity-based costing (TDABC), can be used to determine the cost of implementing and managing activities required for DFR. We show through analysis and simulation that the cost information from a TDABC model can be used for such decisions. We also discuss some of the factors that ought to be considered when implementing or managing the use of TDABC in a large organisation. © 2011 Springer Science+Business Media, LLC.",Cost management; Digital forensic readiness; Forensics management; Time-driven activity-based costing,16,Information Systems Frontiers,2012 1402,Lee J.; Agrawal M.; Rao H.R.,Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013,"Social Network Services (SNS) such as Twitter play a significant role in reporting media, particularly during the extreme events. We examined the impact of tweet features on the diffusion of two types of messages during 2013 Boston marathon tragedy—rumor related and non-rumor related (both in the context of the Boston tragedy). Negative binomial analysis revealed that tweet features such as reaction time, number of followers, and usage of hashtag have an impact on tweet message diffusion during the tragedy. The number of followers showed a positive relationship with message diffusion. However, the relationship between tweet reaction time and message diffusion was negative. Finally, tweet messages that did not include hashtags diffused more than messages that contained hashtags. This paper contributes by adapting the innovation diffusion model to explore tweet message diffusion in Twitter space during extreme events. © 2015, Springer Science+Business Media New York.",Diffusion of messages; Extreme event; Rumor and non-rumor; Social network services,93,Information Systems Frontiers,2015 1403,Yuan R.; Li Z.; Guan X.; Xu L.,An SVM-based machine learning method for accurate Internet traffic classification,"Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven to be ineffective in terms of dynamic port allocation and packet encapsulation. The signature matching methods, on the other hand, require a known signature set and processing of packet payload, can only handle the signatures of a limited number of IP packets in real-time. A machine learning method based on SVM (supporting vector machine) is proposed in this paper for accurate Internet traffic classification. The method classifies the Internet traffic into broad application categories according to the network flow parameters obtained from the packet headers. An optimized feature set is obtained via multiple classifier selection methods. Experimental results using traffic from campus backbone show that an accuracy of 99.42% is achieved with the regular biased training and testing samples. An accuracy of 97.17% is achieved when un-biased training and testing samples are used with the same feature set. Furthermore, as all the feature parameters are computable from the packet headers, the proposed method is also applicable to encrypted network traffic. © Springer Science + Business Media, LLC 2008.",Feature selection; Internet traffic; Machine learning; Network traffic classification; SVM,204,Information Systems Frontiers,2010 1404,Rodríguez-González A.; Colomo-Palacios R.; Guldris-Iglesias F.; Gómez-Berbís J.M.; García-Crespo A.,FAST: Fundamental analysis support for financial statements. Using semantics for trading recommendations,"Trading systems are tools to aid financial analysts in the investment process in companies. This process is highly complex because a big number of variables take part in it. Furthermore, huge sets of data must be taken into account to perform a grounded investment, making the process even more complicated. In this paper we present a real trading system that has been developed using semantic technologies. These cutting-edge technologies are very useful in this context because they enable the definition of schemes that can be used for storing financial information, which, in turn, can be easily accessed and queried. Additionally, the inference capabilities of the existing reasoning engines enable the generation of a set of rules supporting this investment analysis process. © 2011 Springer Science+Business Media, LLC.",Fundamental analysis; Reasoning; Semantic technologies; Trading system,8,Information Systems Frontiers,2012 1405,Bang C.C.,Information systems frontiers: Keyword analysis and classification,"The current study focuses on the disciplines of ISF researches. The various analyses have employed to address research discipline of Management Information Systems (MIS). Since ISF is a forum for not only academic researchers but also industrial experts, it is worth to shed light on distinctive research features of ISF. I created a keyword classification scheme, incorporating new research topics into Barki’s information systems keyword classification scheme. This research describes the disciplines of 318 papers in 14 issues published on ISF until 2012 by 796 scholars, examining word frequency and keyword co-occurrence. © 2015, Springer Science+Business Media New York.",Catpac; Classification; Information Systems Frontiers (ISF); Keywords taxonomy; Research discipline; Word co-occurrence; Word frequency,10,Information Systems Frontiers,2015 1406,Prentice S.; Taylor P.J.; Rayson P.; Hoskins A.; O'Loughlin B.,Analyzing the semantic content and persuasive composition of extremist media: A case study of texts produced during the Gaza conflict,"While terrorism informatics research has examined the technical composition of extremist media, there is less work examining the content and intent behind such media. We propose that the arguments and issues presented in extremist media provide insights into authors' intent, which in turn may provide an evidence-base for detecting and assessing risk. We explore this possibility by applying two quantitative text-analysis methods to 50 online texts that incite violence as a result of the 2008/2009 Israeli military action in Gaza and the West Bank territories. The first method-a content coding system that identifies the occurrence of persuasive devices-revealed a predominance of moral proof arguments within the texts, and evidence for distinguishable 'profiles' of persuasion use across different authors and different group affiliations. The second method-a corpus-linguistic technique that identifies the core concepts and narratives that authors use-confirmed the use of moral proof to create an in-group/out-group divide, while also demonstrating a movement from general expressions of discontent to more direct audience-orientated expressions of violence as conflict heightened. We conclude that multi-method analyses are a valuable approach to building both an evidence-based understanding of terrorist media use and a valid set of applications within terrorist informatics. © 2010 Springer Science+Business Media, LLC.",Content analysis; Extremist language; Influence tactics; Key concept analysis; Semantic tagging,45,Information Systems Frontiers,2011 1407,Liu R.; Kumar A.,Leveraging information sharing to configure supply chains,"As supply chains evolve beyond the confines of individual organizations, information sharing has become the holy grail in supply chain technology. Although the value of information sharing is well recognized, there is little research on how to use it to configure supply chains. This paper proposes a parameterized model to capture information sharing in a supply chain. By changing the parameters of this model, we actually adjust the degree of information sharing and create new supply chain configurations. Configurations are the means of responding to events or changes in supply chains in a timely manner. A complete example is used to demonstrate this methodology. We also perform simulation experiments to compare configurations and to understand the effect of information sharing on supply chain performance. Thus, we show how to achieve supply chain configurability by leveraging information sharing. A supply chain architecture which allows agility, adaptability and alignment of partner interests is also proposed based on this methodology. © 2009 Springer Science+Business Media, LLC.",Configurations; Coordination; Information flows; Information sharing; Simulation; Supply chain configurability; Supply chain event management,19,Information Systems Frontiers,2011 1408,Siurdyban A.,Understanding the IT/business partnership: A business process perspective,"From a business process perspective, the business value of information technologies (IT) stems from how they improve or enable business processes. At the same time, in the field of strategic IT/business alignment, the locus of discussion has been how IT/business partnerships enhance the value of IT. Despite this apparent relationship, the business process perspective has been absent from the IT/business alignment discussion. In this paper, we use the case of an industrial company to develop a model for understanding IT/business partnerships in business process terms. Based on our findings, we define these partnerships by allocating responsibilities between central IT and the local business during two stages of a process lifecycle: formation and standardization. The significance of the findings lies in how the model’s configuration leads to different types of IT units’ process centricity. This in turn affects the ability of the company as a whole to transform its operations with IT. © 2012, Springer Science+Business Media New York.",Business process management; Case study; IT/business alignment; Strategic use of IT,8,Information Systems Frontiers,2014 1409,Gao X.; Zhong W.; Mei S.,Security investment and information sharing under an alternative security breach probability function,"Nowadays, in order to protect information assets, many firms have gradually realized the importance of security investment and information sharing. It is worth pointing out that security breach probability functions play a vital role in firms’ strategic choices. This paper investigates how to determine security investment and information sharing for two firms by employing an alternative well-accepted security breach probability function. In particular, assuming that both firms make their decisions individually, we analyze information sharing, aggregate attack, aggregate defense and the security breach probability at equilibrium. Then we compare these results with those in three (partially) centralized decision cases where a social planner regulates security investment, information sharing or both of them. Between the individual decision case and the partially centralized decision case with the social planner only controlling information sharing, and between the centralized decision case and the other partially centralized decision case, we demonstrate that, although aggregate attack, aggregate defense and the security breach probability remain unchanged, more intervention from the social planner would give rise to higher social welfare. Besides, it turns out that some well-known results of Hausken (Journal of Accounting and Public Policy, 26(6), 639–688, 2007) drastically change in our framework. © 2013, Springer Science+Business Media New York.",Information sharing; Interdependence; Security breach probability function; Security investment; Social planner,56,Information Systems Frontiers,2015 1410,Lee S.,Distributed control for the networks of adaptive software components,"As a result of technological advances, a typical type of software systems has emerged. A large number of distributed software components are networked together through a task flow structure, and each component may have alternative algorithms among which it can choose to process tasks. However, the increased complexity and vulnerability to adverse events of such systems give rise to the need for more sophisticated yet scalable control mechanisms. In this study a control mechanism is designed to meet the need. First, stress environments are implicitly modeled by quantifying the resource availability of the system through sensors. Second, a mathematical programming model is built with the resource availability incorporated and with the stability in system behavior assured. Third, amulti-tier auctionmarket is designed to solve the programming model by distributing computation and communication overheads. By periodically opening the auction market, the system can achieve desirable performance adaptively to changing stress environment while assuring stability and scalability properties. The control mechanism devised in this paper contributes to the efforts of managing the ever-increasing complexity of modern software systems. © Springer Science+Business Media, LLC 2011.",Adaptive software components; Distributed control; Scalability; Stability,1,Information Systems Frontiers,2013 1411,Brown R.B.K.; Beydoun G.; Low G.; Tibben W.; Zamani R.; Garcia-Sanchez F.; Martínez-Béjar R.,Computationally efficient ontology selection in software requirement planning,"Understanding the needs of stakeholders and prioritizing requirements are the vital steps in the development of any software application. Enabling tools to support these steps have a critical role in the success of the corresponding software application. Based on such a critical role, this paper presents a computationally efficient ontology selection in software requirement planning. The key point guiding the underlying design is that, once gathered, requirements need to be processed by decomposition towards the generation of a specified systems design. A representational framework allows for the expression of high level abstract conceptions under a single schema, which may then be made explicit in terms of axiomatic relations and expressed in a suitable ontology. The initial experimental results indicate that our framework for filtered selection of a suitable ontology operates in a computationally efficient manner. © Springer Science+Business Media New York 2014.",Ontologies; Process models; Requirements; Retrieval tool,12,Information Systems Frontiers,2016 1412,Yan L.; Ma Z.M.; Zhang F.,Algebraic operations in fuzzy object-oriented databases,"The fuzzy object-oriented databases have been proposed to meet the need of dealing with fuzzy as well as complex objects. In this paper, we present a formal fuzzy object-oriented database model. Based on the semantic measure of fuzzy data, we first identify two kinds of fuzzy object redundancies, which are inclusion redundancy and equivalence redundancy, and then define three kinds of merging operation for redundancy removal. On the basis, we define some fuzzy algebraic operations for fuzzy classes and fuzzy objects. Finally, in the paper, we discuss fuzzy querying strategies and give the form of SQL-like fuzzy querying for the fuzzy object-oriented databases. © 2012, Springer Science+Business Media, LLC.",Algebraic operations; Fuzzy information; Fuzzy object redundancies; Fuzzy object-oriented databases; Object-oriented database model; Queries,13,Information Systems Frontiers,2014 1413,Li J.; Wang G.A.; Chen H.,Identity matching using personal and social identity features,"Identity verification is essential in our mission to identify potential terrorists and criminals. It is not a trivial task because terrorists reportedly assume multiple identities using either fraudulent or legitimate means. A national identification card and biometrics technologies have been proposed as solutions to the identity problem. However, several studies show their inability to tackle the complex problem. We aim to develop data mining alternatives that can match identities referring to the same individual. Existing identity matching techniques based on data mining primarily rely on personal identity features. In this research, we propose a new identity matching technique that considers both personal identity features and social identity features. We define two groups of social identity features including social activities and social relations. The proposed technique is built upon a probabilistic relational model that utilizes a relational database structure to extract social identity features. Experiments show that the social activity features significantly improve the matching performance while the social relation features effectively reduce false positive and false negative decisions. © 2010 Springer Science+Business Media, LLC.",Identity management; Identity matching; Probabilistic relational model; Social context,32,Information Systems Frontiers,2011 1414,Osei-Bryson K.-M.; Ngwenyama O.,Decision models for information systems management,"Information systems management decision problems such as information security, outsourcing, disaster recovery, software, hardware and vendor selection are extremely complex and can adversely impact the performance of the firm. The October 2007 issue of ISF (Information System Frontier) makes a contribution to theory and practice of IS management by presenting eight papers that present frameworks and models that have immediate application to various classes of IS decision problems. The Samoilenko paper, 'Information Systems Fitness and Risk in IS Development: Insights and Implications from Chaos and Complex Systems Theories) outlines a framework and principles for analyzing IS fitness and risk based on chaos and complexity theory. Alaranta and Henningsson's paper 'An Approach to Analyzing and Planning Post-Merger IS Integration: Insights from Two Field Studies' outlines a framework and approach for post-merger information systems integration planning.",,10,Information Systems Frontiers,2008 1415,Richardson H.J.,A 'smart house' is not a home: The domestication of ICTs,"This paper discusses the domestication of Information and Communication Technologies (ICTs), particularly their use, in UK households reporting on research undertaken between 1998 and 2004. Issues raised are linked to the dominant discourse of the 'digital divide', which in the UK means engaging with ICTs in a 'meaningful' way to ensure the economic and social well-being of UK plc (public limited company-in the UK this refers to companies whose shares can be sold to the public. The acronym is used here ironically to indicate the motivation of the government to brand and promote the UK as a whole.). Utilising a framework of understanding digital inequality and the 'deepening divide', domestication theory is applied to discuss motivational, material and physical, skills and usage access in the gendered household, critically contrasting this approach to 'smart house' research. This qualitative enquiry contributes to the neglected area of domestication studies in Information Systems research. © 2008 Springer Science+Business Media, LLC.",Smart house'; Access; Digital inequality; Domestication of ICTs; Gender,44,Information Systems Frontiers,2009 1416,Raad M.W.; Yang L.T.,A ubiquitous smart home for elderly,"One major challenge to successful aging is the capability to preserve health, or from another perspective to avoid disease. Unfortunately, a large percentage of the elderly people are living with chronic diseases or disabilities. Home care technologies and other emerging technologies have the potential to play a major role in home-based health care approach. The advent of sensor technology, in addition to telecom industry has made this possible. The main goal of the presented research in this paper is to develop a cost-effective user-friendly telehealth system to serve the elderly and disabled people in the community. The research also aims at utilizing the state-of-the-art advances in medical instrumentation technology to establish a continuous communication link between patients and caregivers and allow physicians to offer help when needed. Hence, we are presenting here an integrated user-friendly model of a smart home which provides telemedicine for elderly at home. The general problem addressed in this paper is that of offering a smart environment which monitors the elderly continuously as he moves around at home, and sends an emergency call for help in case of an occurrence of an accident or a severe health problem. The paper focuses on implementation details and practical considerations of integrating the diverse technologies into a working system. © 2008 Springer Science+Business Media, LLC.",Cardiovascular; ECG; GSM; Hypoxemia; Pervasive computing; Pulse oximetry; Telehealth system; Ubiquitous,54,Information Systems Frontiers,2009 1417,Kim H.-M.; Lee J.-J.; Shin M.-C.; Kim S.-S.,A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA,"For more efficient and economical management of substations under SCADA (Supervisory Control and Data Acquisition) systems, the concept of a smart substation has been introduced using intelligent and ubiquitous IT (Information Technology) techniques. A multi-functional platform needs to perform more intelligent and ubiquitous functions of smart substation effectively. In this paper, we propose a multi-functional platform to implement smart substations effectively. A prototype hardware, functions and communication interfaces on an embedded platform are introduced. Also, we suggest operating system architecture for smart substations. © 2008 Springer Science+Business Media, LLC.",Embedded platform; Intelligent system; SCADA system; Smart substations; Ubiquitous,5,Information Systems Frontiers,2009 1418,Hovav A.,Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript),"Anat Hovav highlighted several scenarios to better understand the frontiers of information security (IS). The two dimensions deemed fundamental for the development of scenarios, such as scenarios, social acceptance and technological development, remained the key drivers in IT. The Utopian and Dystopian scenarios were developed based on a paper published by Kling and Lamb in 1996. Utopia suggested that technology could be used to solve most social problems. Dystopia suggested that technology could interfere with social fabric via job displacement, socioeconomic gap, and privacy invasion. The first scenario assumed slow technological development and low social acceptance of new technology. This scenario was expected to result in slow and sporadic adoption of new technology.",,7,Information Systems Frontiers,2014 1419,López T.S.; Ranasinghe D.C.; Patkai B.; McFarlane D.,"Taxonomy, technology and applications of smart objects","Deployment of embedded technologies is increasingly being examined in industrial supply chains as a means for improving efficiency through greater control over purchase orders, inventory and product related information. Central to this development has been the advent of technologies such as bar codes, Radio Frequency Identification (RFID) systems, and wireless sensors which when attached to a product, form part of the product's embedded systems infrastructure. The increasing integration of these technologies dramatically contributes to the evolving notion of a ""smart product"", a product which is capable of incorporating itself into both physical and information environments. The future of this revolution in objects equipped with smart embedded technologies is one in which objects can not only identify themselves, but can also sense and store their condition, communicate with other objects and distributed infrastructures, and take decisions related to managing their life cycle. The object can essentially ""plug"" itself into a compatible systems infrastructure owned by different partners in a supply chain. However, as in any development process that will involve more than one end user, the establishment of a common foundation and understanding is essential for interoperability, efficient communication among involved parties and for developing novel applications. In this paper, we contribute to creating that common ground by providing a characterization to aid the specification and construction of ""smart objects"" and their underlying technologies. Furthermore, our work provides an extensive set of examples and potential applications of different categories of smart objects. © Springer Science + Business Media, LLC 2009.",Classification; Intelligent product; RFID; Sensors; Smart object,127,Information Systems Frontiers,2011 1420,Marchesi M.; Succi G.; Russo B.,"A model of the dynamics of the market of COTS software, in the absence of new entrants","This work proposes a simple model to simulate the dynamics of the market related to COTS software products, when there are no new entrants. The model takes in explicit account the interactions between products. The model uses a set of random variables, as the initial condition, to simulate the time evolution. The results of the simulations predict the emergence of monopolies, when the interactions between products are significant, and of open markets, when they are limited. The model is validated, by comparing the results of the simulation with the well established observations related to software markets and by comparing the resulting distribution of COTS software products with real data on the software market, which was provided by PC Data Inc. © Springer Science+Business Media, LLC 2007.",COTS; Emergence of monopolies; Software market,3,Information Systems Frontiers,2007 1421,Li L.; Valerdi R.; Warfield J.N.,Advances in enterprise information systems,"Various recent research activities reported by Information Systems Frontiers, regarding the advancements of Enterprise Information Systems (EIS), which enables longterm strategic impact on global business and world economy, are presented. The study by Møller and others examines the development of a Virtual Enterprise Architecture for an automatic high-speed transport and sorting system applied to airports. The paper on role-oriented process-driven enterprise cooperative work using the combined rule scheduling strategies, proposes a dynamic Project Evaluation and Review Technique/Critical Path Method approach and discusses its applications in dynamic enterprise process scheduling. The paper by Li and others presents a newly-developed environmental health information system, a web-based platform that integrates databases, decision-making tools, and geographic information systems for supporting public health service and policy making.",,14,Information Systems Frontiers,2008 1422,Wang W.-T.; Chang W.-H.,A study of virtual product consumption from the expectancy disconfirmation and symbolic consumption perspectives,"Researchers have not specifically considered the determinants of satisfaction and repurchase intention with regard to virtual products. Using the expectancy disconfirmation model and symbolic consumption theory, this study presents and empirically examines a model of customer satisfaction and repurchase intention in this context. Using structural equation modeling to analyze the data collected from 477 consumers of virtual products, this study validates the influence of perceived customization and perceived sociability on customer satisfaction and repurchase intention with regard to virtual products. Additionally, this study statistically confirms the important mediating roles of outcome expectations and perceived quality in the indirect effects of perceived customization and perceived sociability on customer satisfaction. This study also verifies that customer satisfaction is a critical mediator of the indirect influence of the other four constructs in the proposed model on the consumers’ repurchase intention with regard to virtual products. © 2012, Springer Science+Business Media New York.",Customer satisfaction; Customization; Expectancy disconfirmation model; Repurchase intention; Symbolic consumption; Virtual product,27,Information Systems Frontiers,2014 1423,Umapathy K.; Purao S.,A theoretical investigation of the emerging standards for web services,"Currently, standards for web services are being developed via three different initiatives (W3C, Semantic web services and ebXML). To the best of our knowledge, no theoretical perspectives underlie these standardization efforts. Without the benefit of a strong theoretical basis, the results, within and across these initiatives, have remained piecemeal. We suggest 'Language-Action Theories' as a plausible perspective that can effectively define, assess and refine web services standards. In this paper, we first investigate the existing initiatives to identify commonalities that point to theories of 'Language-Action' as an appropriate theoretical basis for web services standards. Next, we adapt work from these theories to develop a comprehensive reference framework for understanding web services standards. Finally, we use this reference framework to assess the three initiatives, and analyze the findings to provide insights for future development and refinement of web services standards. © Springer Science+Business Media, LLC 2007.",EbXML; Language-Action perspective; Layered models; Reference framework; Semantic web services; Service-oriented computing; Standards stacks; W3C web services; Web services; Web services standards,37,Information Systems Frontiers,2007 1424,Gordon L.A.; Loeb M.P.,Economic aspects of information security: An emerging field of research,"This paper chronicles the development of economics of information security as an academic area of research. It also describes the contributions of the papers in the special section of this issue devoted to the topic. © Springer Science+Business Media, LLC 2006.",Economic aspect; Information security; Security cost,35,Information Systems Frontiers,2006 1425,Carchiolo V.; D'Ambra S.; Longheu A.; Malgeri M.,Object-oriented re-engineering of manufacturing models: A case study,"Current manufacturing systems have a very structured production model, expecially when high complexity and precision is required, as in semiconductor devices manufacturing. In addition, rapid changes in both production and market requirements may occur, hence great flexibility is essential. This goals, together with the capability of adding new features as well as removing some model limitations, often impose to re-engineer periodically existing models, reducing as much as possible the time-to-market of a new product. Updating a model generally also requires to improve existing applications, both re-writing software components as well as adding new features to existing components. Here the model currently used inside STMicroelectronics facilities to define production flow (the sequence of operations to be performed in order to make products) is considered. First, the model is described highlighting its limitations, then an enhanced object-oriented model is introduced, in order to provide both a better management of all entites through aggregational and constitutional hierarchies and a significant time reduction of production flow definitions through a flexible inheritance mechanism. In addition, required improvements on existing applications are considered, introducing an enhanced environment capable of supporting the enhanced model while preserving both technical and economic investments thus avoiding radical changes in existing environment. © Springer Science + Business Media, LLC 2008.",Business process reengineering; Manufacturing systems; Object-oriented design; Workflow management,4,Information Systems Frontiers,2010 1426,Bagheri E.; Ghorbani A.A.,UML-CI: A reference model for profiling critical infrastructure systems,"The study of critical infrastructure systems organization and behavior has drawn great attention in the recent years. This is in part due to their great influence on the ordinary life of every citizen. In this paper, we study critical infrastructures' characteristics and propose a reference model based on the Unified Modeling Language (UML). This reference model attempts to provide suitable means for the task of modeling an infrastructure system through offering five major metamodels. We introduce each of these metamodels and explain how it is possible to integrate them into a unique representation to characterize various aspects of an infrastructure system. Based on the metamodels of UML-CI, infrastructure system knowledge bases can be built to aid the process of infrastructure system modeling, profiling, and management. © Springer Science + Business Media, LLC 2008.",Critical infrastructure systems; Infrastructure system knowledge bases; Modeling and profiling; UML profiles,37,Information Systems Frontiers,2010 1427,Kekolahti P.; Karikoski J.; Riikonen A.,The effect of an individual’s age on the perceived importance and usage intensity of communications services—A Bayesian Network analysis,"Multiple novel interpersonal communications services have emerged recently, but how their usage and perceived importance are related to the personal characteristics of the users is still relatively unexplored. Therefore, the aim of this study is to explore the effect of an individual’s age on the perceived importance and usage intensity of communications services based on Bayesian Networks using a survey of 3008 Finns during 2011. In the case of Short Message Service (SMS), Instant Messaging (IM), Internet forums and communities (e.g., Facebook & Twitter), and e-mail the results indicate that the perceived importance of the communications services decreases as the age increases. With phone calls and letters, however, no clear dependencies with age were identified. In the causal analysis the importance of Internet forums and communities was the only variable which can be stated to be directly caused by an individual’s age. This variable also acts as a mediator in the path from age towards perceived importance of other communication services and also towards their usage intensity. These results about the central role of Internet forums and communities can be exploited, for example, by device manufacturers when designing their products, and by service providers when designing their consumer services. The study also provides new information for mobile operators about the dependencies between mobile communications services and a documented example workflow for research community to construct a causal Bayesian Network from a combination of observational data and domain expertise. © 2014, Springer Science+Business Media New York.",Bayesian networks; Causality; Communications services; Individual’s age; Machine learning; Perceived importance; Usage intensity,8,Information Systems Frontiers,2015 1428,Deokar A.V.; Tao J.,Semantics-based event log aggregation for process mining and analytics,"In highly complex and flexible environments, event logs tend to exhibit high levels of heterogeneity, and clustering-based methods are candidate techniques for simplifying the mined process models from the process observations. To compensate for the information loss occurring during clustering, semantic information from event logs may be extracted and organized in the form of knowledge structures such as process ontologies using methods of ontology learning. In this article, we propose an overall computational framework for event log pre-processing, and then focus on a specific component of the framework, namely event log aggregation. We develop a detailed system architecture for this component, along with an implemented and evaluated research prototype SemAgg. We use phrase-based semantic similarity between normalized event names to aggregate event logs in a hierarchical form. We discuss the practical implications of this work for learning lower level process ontology classes as well as performing further process mining and analytics. © 2015, Springer Science+Business Media New York.",Agglomerative hierarchical clustering; Event logs; Natural language processing; Process analytics; Process mining; Process ontologies,19,Information Systems Frontiers,2015 1429,Aydin M.N.; Bakker M.E.,Analyzing IT maintenance outsourcing decision from a knowledge management perspective,"IT outsourcing is a complex and opaque decision problem. Managers facing a decision about IT outsourcing have difficulty in framing what needs to be thought about further in their discourses. Framing is one of the most crucial steps of human decision making and needs to be assisted to better understand a decision situation. In this research, we examine a number of decision primitives in the context of an IT outsourcing decision situation. We demonstrate how the decision primitives can be employed so that managers can probe deep to better understand a decision situation and to establish a decision basis. In the organizational setting, we exemplify the use of the decision primitives in relation to the perceived outsourcing implications for the managers looking for assistance in accommodating a knowledge management perspective on IT outsourcing. Consequently, we induce insight and a guideline on how to use knowledge management for effective outsourcing in one of the leading financial institutes in Europe.",Decision analysis; IT outsourcing; Knowledge management,21,Information Systems Frontiers,2008 1430,Gupta A.; Crk I.; Bondade R.,Leveraging temporal and spatial separations with the 24-hour knowledge factory paradigm,"The 24-H Knowledge Factory facilitates collaboration between geographically and temporally distributed teams. The teams themselves form a strategic partnership whose joint efforts contribute to the completion of a project. Project-related tasks are likewise distributed, allowing tasks to be completed on a continuous basis, regardless of the constraints of any one team's working hours. However, distributing a single task between multiple teams necessitates a handoff process, where one team's development efforts and task planning are communicated from one team ending their shift to the next that will continue the effort. Data management is, therefore, critical to the success of this business model. Efficiency in data management is achieved through a strategic leveraging of key tools, models, and concepts. © 2010 Springer Science+Business Media, LLC.",Data management; Global software development; Knowledge representation; Offshoring,11,Information Systems Frontiers,2011 1431,Chang W.-L.; Diaz A.N.; Hung P.C.K.,Estimating trust value: A social network perspective,"This research introduces the concept of social distance, which is drawn from clustering methods applied to the social network user base; and incorporates distance in the estimation of trust, as well as user-generated ratings. The trust value estimated will serve as a metric for filtering and sorting content of any kind based on the trustworthiness of the creator. The results revealed that it is possible to provide an estimated measure of trust within individuals in a social network, that clustering methods were of significant help into said evaluation, and that the integration of other variables affecting the building of trust. Results also showed that higher rating scores combined with shorter social distances provide satisfactory trust values, while the opposite happened for subjects presenting lower rating scores in combination with longer distances. This study contributes to the current literature on trust estimation and social networks role in such endeavors. © 2014, Springer Science+Business Media New York.",Online rating systems; Self-organizing maps; Social network; Trust value,28,Information Systems Frontiers,2015 1432,Johar M.; Mookerjee V.; Sethi S.,Optimal software design reuse policies: A control theoretic approach,"We study optimal policies for design reuse in a software project using a control theoretic approach. A project needs to be developed in minimum time by optimally choosing the proportion of effort allocated towards design activities. We first consider a local case, where the benefits of design activities are restricted within the project. Here the optimal policy follows a bang-bang structure: invest fully in design followed by investing fully in implementation. Next we consider two sequentially linked projects where design capital built in the first project can be reused by the downstream project. For the two project case, the design investment in the upstream project first increases and then decreases with the ability to utilize design capital accumulated in the first project for the second project. We also propose a coordination scheme that rewards the upstream project team so that design investment in this project is chosen in a globally optimal manner. © 2013, Springer Science+Business Media New York.",Optimal control; Software coordination; Software design reuse; Software development,2,Information Systems Frontiers,2015 1433,Carrera A.; Iglesias C.A.; Garijo M.,Beast methodology: An agile testing methodology for multi-agent systems based on behaviour driven development,"This paper presents a testing methodology to apply Behaviour Driven Development (BDD) techniques while developing Multi-Agent Systems (MASs), termed BEhavioural Agent Simple Testing (BEAST) Methodology. This methodology is supported by the open source framework (BEAST Tool) which automatically generates test cases skeletons from BDD scenarios specifications. The developed framework allows the testing of MASs based on JADE or JADEX platforms. In addition, this framework offers a set of configurable Mock Agents with the aim of being able to execute tests while the MAS is under development. The BEAST Methodology presents transparent traceability from user requirements to test cases. Thus, the stakeholders can be aware of the project status. The methodology and the associated tool have been validated in the development of a MAS for fault diagnosis in FTTH (Fiber To The Home) networks. The results have been measured in quantifiable way obtaining a reduction of the tests implementation time. © 2013 Springer Science+Business Media New York.",Agile; Behaviour-driven development; Methodology; Mock-agents; Multi-agent systems; Test,30,Information Systems Frontiers,2014 1434,Wang Q.-H.; Mayer-Schönberger V.; Yang X.,The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs,"This study investigates the monetary value of virtual goods in the context of 24 most popular massively multiplayer online role-playing games (MMORPGs). Building on classic economic theory, we approach this issue through a combination of experimentation and cross-sectional time series data analysis. Our findings suggest that more intensive social networking and flatter social hierarchical structures are associated with lower monetary value of virtual goods across various MMORPGs. Instead, a larger base of active users increases the potential demand and thus the monetary value of virtual goods in the short run. A steeper social hierarchical structure further strengthens the effect. The implication is that social networking and hierarchical structure can be two effective angles for game developers or policy makers to address the issue of real-money trading of virtual goods. © 2012 Springer Science+Business Media, LLC.",Massively multiplayer online role playing game (MMORPG); Real-money trading; Virtual world,17,Information Systems Frontiers,2013 1435,Schaupp L.C.; Carter L.,"The impact of trust, risk and optimism bias on e-file adoption","One of congress' goals for 2007 was for 80% of all tax and informational returns to be filed electronically. However, to date that lofty goal has fallen well short. This research proposes a model of e-filing adoption. To test the model a survey is administered to 260 participants. The instrument assesses citizen perceptions of trust, risk and optimism bias. Structural equation modeling is used to evaluate the relationships between these three concepts and intention to use. The results indicate that trust of the Internet, trust of the e-filer, perceived risk and optimism bias all have an impact on intention to use e-filing. Implications for practice and research are discussed. © Springer Science + Business Media, LLC 2008.",Adoption; E-file; E-government; Optimism bias; Risk; Trust,123,Information Systems Frontiers,2010 1436,Tung W.-F.; Lee T.-Y.,Rank-mediated collaborative tagging recommendation service using video-tag relationship prediction,"A great many tags and videos are shared and created by a mass of distributors on Web 2.0 video sharing sites. This increasing user-generated content can further benefit service innovation of collaborative tagging. In order to enhance efficient video retrieval and online video marketing (OVM) application, this research proposes a rank-mediated collaborative tagging recommendation service that allows the distributors predicting the ranks of video retrieval from the shared video archive using vote-promotion algorithm (VPA). The system experiments evaluate the number of tags and videos between simple text retrieval and VPA. The user surveys verify the relevance, helpfulness, and satisfaction of the recommended tags. From the perspectives of service innovation, this research is to develop a systematic and quantified a video-tag relationship prediction and recommendation self-service that can provide an intelligent collaborative tagging service on video sharing sites. © 2013 Springer Science+Business Media New York.",Co-occurrence; Collaborative tagging; Video sharing sites; Video-tag relationship prediction and recommendation service; Vote-promotion algorithm,4,Information Systems Frontiers,2013 1437,Popovic T.; Kezunovic M.; Krstajic B.,Smart grid data analytics for digital protective relay event recordings,"Information systems and intelligent smart grid data analytics will have a critical role in managing the massive amount of data becoming available in power system substations. Digital protective relays are multi-functional intelligent electronic devices based on microprocessors, which are being installed in substations throughout the power grid. New digital relays are replacing old-fashioned electro-mechanical or solid-state relays, and besides their protective function, they are coming equipped with monitoring capabilities. These monitoring capabilities are creating potential for better observability of power systems, redundancy in measurements, and improved decision-making process when operating the system. This article discusses the implementation requirements for a fully automated data analytics solution that provides data integration, fault analysis, and visualization based on the event data recorded by digital protective relays. © 2013, Springer Science+Business Media New York.",Data analytics; Digital protective relays; Intelligent electronic devices; Intelligent systems; Power system fault analysis; Smart grid,16,Information Systems Frontiers,2015 1438,Holsapple C.W.; Wu J.,Building effective online game websites with knowledge-based trust,"Knowledge-based trust is trust that is grounded in knowledge about another party developed through repeated interaction. Knowledge-based trust is especially important for online business environments where there are repeated transactions between fixed pairs of consumers and merchants. Building on previous studies of trust, this paper examines the proposition that players' knowledge about website characteristics (i.e., security and interface design) and about website outputs (i.e., online game quality and service quality) has an effect on the development of trust in the context of online game websites. The impact of trust on building an effective online game website is also investigated. A conceptual model of knowledge-based trust is tested with questionnaire responses of 253 online game players. Overall, the results indicate that all of these four classes of knowledge engender trust and that trust helps develop effective online game websites. © 2007 Springer Science+Business Media, LLC.",e-Commerce; Interface design; Knowledge-based trust; Online games; Quality; Security,47,Information Systems Frontiers,2008 1439,Cazier J.A.; Shao B.B.M.; Louis R.D.S.,Sharing information and building trust through value congruence,"This study explores how value congruence contributes to the formation of trust in e-businesses, and how trust and value congruence influence consumers to share personal information. It is hypothesized that the perceived values of organizations regarding moral, social, environmental and political causes can have an effect on the trusting beliefs of e-commerce consumers and their willingness to disclose private personal information. A total of 775 subjects rated their perceived value congruence with organizations, their trusting beliefs, and the types of information they would be willing to disclose. This study finds that value congruence not only plays a role in mediating the trust of consumers for the organizations, but it also has a strong effect on determining their willingness to disclose personal information. In some cases, the influence of value congruence is greater than that of trust, even though trust has been touted in the literature as one of the most important factors in e-commerce. This research expands prior work by using structural equation modeling to test the relative strength of the effect of value congruence on each dimension of trust and the overall trust level, as well as its direct effect on behavioral intentions in terms of information sharing for non-profit and for-profit organizations. © 2007 Springer Science+Business Media, LLC.",Ethics; Information sharing; Knowledge management; Privacy; Trust; Value congruence,66,Information Systems Frontiers,2007 1440,Alberola J.M.; Búrdalo L.; Julián V.; Terrasa A.; García-Fornes A.,An adaptive framework for monitoring agent organizations,"Multiagent technologies are usually considered to be suitable for constructing agent organizations that are capable of running in dynamic and distributed environments and that are able to adapt to changes as the system runs. The necessary condition for this adaptation ability is to make agents aware of significant changes in both the environment and the organization. This paper presents mechanism, which helps agents detecting adaptation requirements dynamically at run time, and an Trace&Trigger, which is an adaptation framework for agent organizations. It consists of an event-tracing-based monitoring mechanism that provides organizational agents with information related to the costs and benefits of carrying out an adaptation process at each moment of the execution. This framework intends to overcome some of the problems that are present in other approaches by allowing the dynamic specification of the information that has to be retrieved by each agent at each moment for adaptation deliberation, avoiding the transference of useless information for adaptation deliberation. This framework has been integrated in the Magentix2 multiagent platform. In order to test its performance benefits for any agent organization, an example based on a market scenario is also presented. © 2013 Springer Science+Business Media New York.",Adaptation; Events; Monitoring; Organization,3,Information Systems Frontiers,2014 1441,Grodzinsky F.S.; Gumbus A.; Lilley S.,Ethical implications of internet monitoring: A comparative study,"Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such as employee performance appraisal that are served by monitoring, poorly designed and communicated monitoring practices can have negative effects on employee morale and may be considered an invasion of privacy. Universities are another venue where Internet monitoring occurs. This paper explores whether there was a significant difference in attitude towards Internet usage and monitoring at the university as compared to the workplace. It is the result of a comparative study. © 2010 Springer Science + Business Media, LLC.",Autonomy. Fairness; Internet monitoring; University; Workplace,5,Information Systems Frontiers,2010 1442,Carchiolo V.; Longheu A.; Malgeri M.; Mangioni G.,A model for a web-based learning system,"The dissemination of knowledge is currently being improved by e-learning, which consists of a combination of teaching methodologies and computer-based tools. Recently e-learning environments have started to exploit web technology to provide a simple, flexible, distributed and open platform. In this paper we propose a model for an e-learning system, aiming at sharing both course contents and teaching materials, in order to provide students with a single and uniform set of concepts to be learned, and promoting active learning by allowing the construction of courses which are personalized in terms of both contents and teaching materials, selected according to each student's needs and capabilities. A first, open-source prototype based on the proposed model has been implemented to validate the model. © Springer Science+Business Media, LLC 2007.",E-learning; Personalized courses; Web-based learning,16,Information Systems Frontiers,2007 1443,Lin C.; Hsu M.-L.; Yen D.C.; Hsieh P.-J.; Tsai H.-L.; Kuo T.-H.,Prototype system for pursuing firm's core capability,"Core capabilities are critical abilities that enhance and sustain an organization's competitive advantage in extremely competitive environments. In today's complex and dynamic business environment, companies are often prevented from effectively and efficiently evaluating relevant factors necessary for developing their core capability strategic systems. These systems, with inherent human decision-making processes, should be fully considered when creating a method for determining a firm's suitable or required core capabilities. It is helpful to implement IT-based group decision support systems (GDSS) with soft computing algorithms to assist managers in determining the appropriate core capabilities for the firm. Therefore, this study develops a holistic group decision support system in which similarity measures, fuzzy set theory, and fuzzy mathematics programming are implemented to facilitate managers in making decisions. Through evaluations done in actual cases, we have found that this system creates a flexible and user-friendly environment that aids top management and other relevant staff members in evaluating all relevant factors related to core capabilities. © 2012 Springer Science+Business Media, LLC.",Core capability; Fuzzy mathematics programming; Similarity measure; Synergy analysis; Value chain,1,Information Systems Frontiers,2013 1444,Wu J.; Chen J.; Ren Y.,GIS enabled service site selection: Environmental analysis and beyond,"Given its importance, the problem of selecting the right site for a service entity has attracted great attention in the literature. However, due to its complexity, the quantification of the interrelationships between the service site and its nearby business types is still a challenging task. To this end, in this paper, we propose a novel joint learning scheme for service site selection. This scheme employs both the Probabilistic Latent Semantic Analysis (PLSA) on the Geographical Information System (GIS) data and the partitional clustering on the service performance data. A case study for bank branch selection is provided to demonstrate the usefulness of our method. Finally, based on the joint learning scheme, we present a conceptual framework for the complete procedure of service site selection with a particular emphasis on the GIS enabled network analysis. © 2010 Springer Science+Business Media, LLC.",Geographical Information System (GIS); Joint learning; Probabilistic Latent Semantic Analysis (PLSA); Site selection,7,Information Systems Frontiers,2011 1445,Mirchandani D.A.; Johnson Jr. J.H.; Joshi K.,Perspectives of citizens towards e-government in Thailand and Indonesia: A multigroup analysis,"Thailand and Indonesia are two developing countries still in the early stages of e-government implementation. An understanding of their citizens' perspectives can help the governments of these countries better plan their services and also provide useful information to governments of other developing countries. The current study uses a new survey instrument to assess the importance of e-government services and website success factors from the perspective of citizens. Using multigroup analysis to validate the instrument, it identifies that an important difference between the perceptions of citizens of the two countries is that in Thailand, the importance of financial transaction services is negatively related to the importance of citizen identification with the e-government site whereas in Indonesia this relationship is insignificant. Only two expected relationships were found to be equivalent across both datasets, i.e., the importance of financial transactions services is positively related to the importance of website efficiency and the importance of local information services is positively related to the importance of citizen identification with the site. The multigroup analysis showed that citizens in both countries interpreted the survey instrument similarly but had very different expectations for their e-government services. © 2008 Springer Science+Business Media, LLC.",Citizens; E-Government adoption; Households,58,Information Systems Frontiers,2008 1446,Zhang N.; Guo X.; Chen G.,Why adoption and use behavior of IT/IS cannot last?-two studies in China,"It is often observed in China that the user acceptance of a new information technology starts satisfactorily well when it is strongly promoted or even enforced to be used, but declines sharply after the initial stage. Based on an extended model derived from the Technology Acceptance Model (TAM), this paper presents two studies in academic and governmental contexts respectively to analyze such phenomena from a post-adoption perspective. Results from structured equation model (SEM) analyses demonstrate the ability of the model to interpret the IT acceptance behavior of Chinese users both during and after the initial stage. It is then inferred that the initial rise of user acceptance is usually driven by mandatory instructions due to the managerial characteristics of long power distance in Chinese organizations, while the drop in the second period is caused by changes that occur in some of the recognition factors in the model, which may reflect the lack of fit between technology and work style. In the two specific cases studied in the paper, the lack of compatibility and facilitating conditions made the user acceptance decline after the initial period when the effects of training and mandatory instructions faded away. © 2010 Springer Science+Business Media, LLC.",e-Government systems; e-Learning software; Information technology acceptance; Post-adoption; Structural equation model,50,Information Systems Frontiers,2011 1447,Yang H.-L.; Chao A.F.Y.,Sentiment analysis for Chinese reviews of movies in multi-genre based on morpheme-based features and collocations,"The application of sentiment analysis, also known as opinion mining, is more difficult in Chinese than in Indo-European languages, due to the compounding nature of Chinese words and phrases, and relatively lack of reliable resources in Chinese. This study used seed words, Chinese morphemes, which are mono-syllabic characters that function as individual words or be combined to create Chinese words and phrases, to classify movie reviews found on Yahoo! Taiwan. We utilized higher Pointwise Mutual Information (PMI) collocations, which consist of selected morpheme-level compounded features to build classifiers. The contributions of this study include the following: (Bird 2006) proposing a method of generating domain-dependent Chinese morphemes directly from large data set without any predefined sentimental resources; (Bradley and Lang 1999) building morpheme-based classifiers applicable in various movie genres, and shown to produce better results than other classifiers based on keywords (NTUSD and HowNet) or feature selection (TFIDF); (Church and Hanks in Computational linguistics, 16(1), 22-29 1990) identifying compounds that have different semantic polarities depending on contexts. © 2014, Springer Science+Business Media New York.",Chinese movie; Collocation; Feature; Morpheme; Opinion mining; Sentiment analysis,24,Information Systems Frontiers,2015 1448,Lee G.; Peng S.-L.; Lin Y.-T.,Proportional fault-tolerant data mining with applications to bioinformatics,"The mining of frequent patterns in databases has been studied for several years, but few reports have discussed for fault-tolerant (FT) pattern mining. FT data mining is more suitable for extracting interesting information from real-world data that may be polluted by noise. In particular, the increasing amount of today's biological databases requires such a data mining technique to mine important data, e.g., motifs. In this paper, we propose the concept of proportional FT mining of frequent patterns. The number of tolerable faults in a proportional FT pattern is proportional to the length of the pattern. Two algorithms are designed for solving this problem. The first algorithm, named FT-BottomUp, applies an FT-Apriori heuristic and finds all FT patterns with any number of faults. The second algorithm, FT-LevelWise, divides all FT patterns into several groups according to the number of tolerable faults, and mines the content patterns of each group in turn. By applying our algorithm on real data, two reported epitopes of spike proteins of SARS-CoV can be found in our resulting itemset and the proportional FT data mining is better than the fixed FT data mining for this application. © 2009 Springer Science+Business Media, LLC.",Bioinformatics; Data mining; Fault-tolerant frequent pattern; FT support,5,Information Systems Frontiers,2009 1449,Du N.; Ye X.; Wang J.,A schema aware ETL workflow generator,"Extract, Transform and Load (ETL) processes organized as workflows play an important role in data warehousing. As ETL workflows are usually complex, various ETL facilities have been developed to address their control-flow process modeling and execution control. To evaluate the quality of ETL facilities, Synthetic ETL workflow test cases, consisting of control-flow and data-flow aspects are needed to check ETL facility functionalities at construction time and to validate the correctness and performance of ETL facilities at run time. Although there are some synthetic workflow and data set test case generation approaches existed in literatures, little work is done to consider both aspects at the same time specifically for ETL workflow generators. To address this issue, this paper proposes a schema aware ETL workflow generator with which users can characterize their ETL workflows by various parameters and get ETL workflow test cases with control-flow of ETL activities, complied schemas and associated recordsets. Our generator consists of three steps. First, with type and ratio of individual activities and their connection characteristic parameter specification, the generator will produce ETL activities and form ETL skeleton which determine how generated activities are cooperated with each other. Second, with schema transformation characteristic parameter specification, e.g. ranges of numbers of attributes, the generator will resolve attribute dependencies and refine input/output schemas with complied attributes and their data types. In the last step, recordsets are generated following cardinality specifications. ETL workflows in specific patterns are produced in the experiment in order to show the ability of our generator. Also experiments to generate thousands of ETL workflow test cases in seconds have been done to verify the usability of the generator. © 2012 Springer Science+Business Media, LLC.",Control-flow; Data-flow; ETL workflow; Symbolic test; Test case generator,3,Information Systems Frontiers,2014 1450,Alaeddini M.; Salekfard S.,Investigating the role of an enterprise architecture project in the business-IT alignment in Iran,"Ensuring that IT and business have a more mature alignment relationship is recognized as being critical to an organization's success. To achieve alignment leveraging, enterprise architecture (EA) is considered fundamental as a comprehensive approach to planning and managing IT actions within the organization, based on its business requirements. This paper reports on a study to assess the effect of successful EA projects on the business-IT alignment in Iranian organizations, using the Luftman's maturity model as the assessment tool. The implications of our findings in this study as well as its limitations are discussed to assist in detecting the flaws in the existing EA frameworks and to propose improvements. © 2011 Springer Science+Business Media, LLC.",Business-IT alignment (BITA); Enterprise architecture (EA); Iran; Luftman's maturity model,49,Information Systems Frontiers,2013 1451,Bygstad B.; Aanby H.-P.,ICT infrastructure for innovation: A case study of the enterprise service bus approach,"In this paper we investigate the relationship between ICT infrastructure and innovation. In recent years the concept of the enterprise service bus has been introduced as an ICT architecture that supports strong integration of distributed components and services, but at the same time allows for adding or subtracting business partners at short notice. What are the organizational issues and challenges of this approach? Building on a case study from Norway we investigated this topic in the context of innovation of ICT based services. Our findings were analyzed at three levels; the bus as technical infrastructure, the bus as innovation infrastructure and the bus as organizational structure. We find that the bus as technical infrastructure supports innovation within a business unit, while the bus as innovation infrastructure facilitates the innovation of new business services. Further, we propose that a shared topology of these three levels is important to support the overall innovation process. As illustrated in our case, this also raises new challenges for the innovative corporation. © Springer Science + Business Media, LLC 2009.",Case study; Enterprise service bus; ICT infrastructure; Innovation,31,Information Systems Frontiers,2010 1452,Baruwal Chhetri M.; Chichin S.; Vo Q.B.; Kowalczyk R.,Smart CloudBench—A framework for evaluating cloud infrastructure performance,"Cloud migration allows organizations to benefit from reduced operational costs, improved flexibility, and greater scalability, and enables them to focus on core business goals. However, it also has the flip side of reduced visibility. Enterprises considering migration of their IT systems to the cloud only have a black box view of the offered infrastructure. While information about server pricing and specification is publicly available, there is limited information about cloud infrastructure performance. Comparison of alternative cloud infrastructure offerings based only on price and server specification is difficult because cloud vendors use heterogeneous hardware resources, offer different server configurations, apply different pricing models and use different virtualization techniques to provision them. Benchmarking the performance of software systems deployed on the top of the black box cloud infrastructure offers one way to evaluate the performance of available cloud server alternatives. However, this process can be complex, time-consuming and expensive, and cloud consumers can greatly benefit from tools that can automate it. Smart CloudBench is a generic framework and system that offers automated, on-demand, real-time and customized benchmarking of software systems deployed on cloud infrastructure. It provides greater visibility and insight into the run-time behavior of cloud infrastructure, helping consumers to compare and contrast available offerings during the initial cloud selection phase, and monitor performance for service quality assurance during the subsequent cloud consumption phase. In this paper, we first discuss the rationale behind our approach for benchmarking the black box cloud infrastructure. Then, we propose a generic architecture for benchmarking representative applications on the heterogeneous cloud infrastructure and describe the Smart CloudBench benchmarking workflow. We also present simple use case scenarios that highlight the need for tools such as Smart CloudBench. © 2015, Springer Science+Business Media New York.",Automated benchmarking; Cloud bench; Cloud performance benchmarking; Infrastructure-as-a-Service,17,Information Systems Frontiers,2016 1453,Venkatsubramanyan S.; Hill T.R.,An empirical investigation into the effects of web search characteristics on decisions associated with impression formation,"It is now common knowledge that information on the World Wide Web is used by people to acquire facts before making decisions-a key activity being forming impressions about other people. Given this, an interesting question arises as to whether and how such impressions may be biased by the characteristics of the information source itself. For instance, in the case of search results about a person, do the quantity and order of results affect the impression formed about the person in question? The question takes on significance considering that these factors may affect decisions of considerable importance and tangible consequence such as those regarding employment, for example, and at the same time, such factors are largely outside the control of the individuals affected. In this paper we refer to searchable digital information about a person on the Web as ePersona, and the impression formed about the person based on the perception as ePerception. Using Web search results, we studied the impacts of order and quantity of results on ePerception using an experiment. Our findings suggest that the order or ranking of results about a search target impacts the impression formed about that target. We also found that the quantity of search results alone does not seem to impact the impression formed. © 2009 Springer Science+Business Media, LLC.",ePerception; ePersona; Order of search results; People searches; Quantity of search results; Search results; Web-based impression formation,7,Information Systems Frontiers,2010 1454,Chiu D.K.W.; Lin D.T.T.; Kafeza E.; Wang M.; Hu H.; Hu H.; Zhuang Y.,Alert based disaster notification and resource allocation,"When a disaster occurs, timely actions in response to urgent requests conveyed by critical messages (known as alerts) constitute a vital key to effectiveness. These actions include notifying potentially affected parties so that they can take precautionary measures, gathering additional information, and requesting remedial actions and resource allocation. However, there are different types of disasters such as epidemic outbreaks, natural disasters, major accidents, and terrorist attacks. At the same time, there are also many different parties involved such as governments, healthcare institutions, businesses, and individuals. To address these problems, we introduce a Disaster Notification and Resource Allocation System (DNRAS) based on an Alert Management System (AMS) implemented through Web services. This unified platform supports timely interactions among various parties, focusing on notification and monitoring, resource enquiry and allocation, as well as the mobility of information. We detail the mechanisms of these functions in our system, illustrating the Web services interface parameters for communications and interoperability. We illustrate the applicability of our approach with an example of an epidemic outbreak and discuss the advantage of our approach with respect to various stakeholders of our system. © 2009 Springer Science+Business Media, LLC.",Alert management; Disaster management; Epidemic outbreak; Notification; Resource allocation,39,Information Systems Frontiers,2010 1455,Song J.-G.; Kim S.,A study on applying context-aware technology on hypothetical shopping advertisement,"In this study, a method of implementation of cyber shopping services within a smart home environment with the use of sensor technology is proposed. This proposed model uses Radio Frequency Identification tag, Ubiquitous Sensor Network and TinyOS in order to transmit information to mobile interfaces. The residents and product information is collected and classified according to proposed categorization module and will generate the residents' needed product advertisement. This proposed method of implementation provides an effective and convenient cyber shopping service environment to residents within their smart home environment and defines the service providers who support the cyber shopping. © 2008 Springer Science+Business Media, LLC.",Context aware; Cyber shopping; Smart home,2,Information Systems Frontiers,2009 1456,Dijkman R.M.; Dirgahayu T.; Quartel D.A.C.,The adequacy of languages for representing interaction mechanisms,"This paper presents criteria for the adequacy of languages to represent interaction mechanisms. It then uses these criteria to analyse the adequacy of UML. We focus on the interaction mechanisms provided by Web Services technology and by CORBA for request/response, callback, polling and (multicast) message passing. We argue that the criteria for adequacy of a design language are that the language should: (1) be expressive enough to represent the mechanisms; (2) be easy to use when expressing them; (3) be platform independent in the sense that it does not force implementation decisions for a mechanism; and (4) behave corresponding to the mechanisms that it represents. We show that these criteria follow logically from the use of a design language in the design process. For UML we evaluate the first three criteria in a qualitative manner. To evaluate the fourth criteria, we present Coloured Petri Nets that capture the behaviour of both the mechanisms precisely and the UML constructs that represent them. Subsequently, we check the correspondence of their behaviour. © 2007 Springer Science+Business Media, LLC.",Communication patterns; Design concept; Design language; Middleware,2,Information Systems Frontiers,2007 1457,Shih H.-P.; Lai K.-H.; Cheng T.C.E.,"Examining structural, perceptual, and attitudinal influences on the quality of information sharing in collaborative technology use","Using collaborative technologies to improve collaborative work is a long-term concern because of over-expected barriers in the implementation. The “quality of information sharing” is a group-level construct for assessing the outcome of collaborative technology use in collaborative work. However, few studies have addressed this informational influence. We propose a research model, grounded in interactivity and fit-appropriation theories, to examine structural, perceptual, and attitudinal influences on the quality of information sharing. Particularly, we incorporate task complexity into this model to examine the direct and interaction effects on collaborative technology use. We empirically test the model by examining the use of Lotus Notes at offices. The empirical results show that structural and perceptual factors have distinct effects on fit and appropriation attitudes, which indirectly or directly determine the quality of information sharing. We also discuss the academic and managerial implications of the research findings. © 2013, Springer Science+Business Media New York.",Attitudinal influence; Collaborative technologies; Fit-appropriation theory; Informational influence; Interactivity theory; Perceptual influence; Structural influence,22,Information Systems Frontiers,2015 1458,Malý J.; Nečaský M.,Model-driven approach to modeling and validating integrity constraints for XML with OCL and Schematron,"The idea behind Model Driven Development (MDD) (Miller and Mukerji 2003) is to model the software system on several layers of abstraction. A designer starts from the very abstract specification (independent of the platform and language used) and progresses to more concrete models (using platform-specific constructs) and finally to code. Ideally, each step of the transformation of the model from the more abstract to the less abstract is achieved by a declarative transformation obtained (semi-)automatically. In our previous work, we have developed an approach for designing XML schemas based on MDD. We showed that a set of XML schemas representing different views of the same problem domain can be first modeled in a platform-independent level with a uniform conceptual schema expressed as a UML class diagram. Then each XML schema can be modeled as a view on this uniform UML class diagram. In this paper, we further extend our approach to modeling XML schemas using UML class diagrams with modeling integrity constraints using Object Constraint Language (OCL). We show that an integrity constraint expressed at the platform-independent level as an OCL expression can be translated to an expression at the XML schema level which can be used to validate XML documents. In particular, we propose a method which translates an OCL expression at the platform-independent level to a Schematron expression. Schematron is a language which enables to express integrity constraints at the XML schema level. We show that our approach saves time and prevents from errors made by designers when expressing Schematron constraints manually. © 2013, Springer Science+Business Media New York.",Conceptual modeling; Integrity constraints; OCL; Schematron; UML; XML,3,Information Systems Frontiers,2015 1459,Fescioglu-Unver N.; Choi S.H.; Sheen D.; Kumara S.,"RFID in production and service systems: Technology, applications and issues","Radio Frequency Identification (RFID) is a technology used for identification of objects and information transfer from a distance though radio waves. Different types of RFID tags are used for different applications. Application areas include material handling, supply chain management, manufacturing, product lifecycle management, and a wide range of different systems from healthcare to sports. Object identification standards enable tracking an object in the global range. Although the number of firms adopting RFID technology is continuously increasing, there are still some unresolved issues with RFID systems such as concerns of data reliability, security, privacy, and justification of return on investment. This paper reviews the recent literature on RFID technology, production area applications and issues, and clarifies the future research directions. © 2014, Springer Science+Business Media New York.",RFID applications; RFID issues; RFID technology,58,Information Systems Frontiers,2015 1460,Colomo-Palacios R.; González-Carrasco I.; López-Cuadrado J.L.; Trigo A.; Varajao J.E.,I-Competere: Using applied intelligence in search of competency gaps in software project managers,"People in software development teams are crucial in order to gain and retain strategic advantage inside a highly competitive market. As a result, human factors have gained attention in the software industry. Software Project Managers are decisive to achieve project success. A competent project manager is capable of solving any problem that an organization may encounter, regardless of its complexity. This paper presents I-Competere which is a tool developed to forecast competence gaps in key management personnel by predicting planning and scheduling competence levels. Based on applied intelligence techniques, I-Competere allows the forecast and anticipation of competence needs thus articulating personnel development tools and techniques. The results of the test, using several artificial neural networks, are more than promising and show prediction accuracy. © 2012 Springer Science+Business Media, LLC.",Competency gaps; Genetic algorithm; Machine learning; Neural networks; Project manager; Software engineering,44,Information Systems Frontiers,2014 1461,Hsieh Y.-H.; Yuan S.-T.; Liu H.-C.,Service interaction design: A Hawk-Dove game based approach to managing customer expectations for oligopoly service providers,"In the “experience economy”, effectively delivering memorable and exciting customer experiences has become a key issue for service providers. Service experience delivery involves service encounters through which interactions between service providers and customers can be shaped into interactive artifacts managing customer expectations and dynamically delivering suitable services. Service interaction design aims to optimize customer interactions with services to match customer expectations and yield satisfactory service experiences. On the other hand, service providers typically make profits and cost the priority, despite knowing that high service quality can maximize satisfaction, particularly in markets served by an oligopoly, resulting in customers only accepting existing limited-value services. Hence, the oligopoly market can be regarded as a value-bounded context. Additionally, understanding customer expectations regarding a wide range of interactions is crucial to service providers selecting and designing services that match customer expectations. Therefore, this paper presents a service interaction design mechanism to help oligopoly service providers systematically and effectively manage customer expectations in dynamic interactions, even in value-bounded contexts. The proposed mechanism models this service interaction design problem as a series of Hawk-Dove games that approach an evolutionary stable state. The evaluation results suggest that oligopoly service providers should change their mindsets and design service interactions to manage customer expectations associated with service delivery, not only to ensure high satisfaction and profit but also to engage customers in co-creating value. © 2012, The Author(s).",Customer expectation management; Hawk-Dove game; Oligopoly service provider; Service experience delivery; Service interaction design,4,Information Systems Frontiers,2014 1462,Chang K.-C.; Wang C.-P.,Information systems resources and information security,"Recent studies suggest that the number of information security incidents has increased dramatically and has caused significant economic loss worldwide. Awareness of the significance of information security is evidenced by a rapid increase in information security investments. Despite the fact that information security has taken on a new level of importance, academic research on this subject is still in its infancy. A review of literature indicated that past studies largely took a resource based view, suggesting that organizations invest and develop a variety of IS resources so as to ease potential threats caused by information security breaches. However, the resource-based perspective as used in previous studies was somewhat limited. Based on and extending from previous work, this study employed the resource-based view as a theoretical lens to examine the role that IS resources play in determining the level of information security. A field study was conducted to test the hypotheses. The results of the model testing show that IT human, relational, and infrastructure resources have significant impacts on information security. © 2010 Springer Science+Business Media, LLC.",Information availability; Information confidentiality; Information integrity; Information security; IS resources,27,Information Systems Frontiers,2011 1463,Kamis A.; Stern T.; Ladik D.M.,A Flow-based model of web site intentions when users customize products in business-to-consumer electronic commerce,"User-customization is increasingly common in electronic commerce, because both the buyer and seller potentially benefit. The user interface to implement and the influence of the interface on various process and outcome measures, however, are not well understood. We developed a Flow-based model consisting of seven hypotheses regarding the user interface and its consequents. We conducted a field experiment to test an attribute-based interface vs. a question-based interface on three variables (perceived control, shopping enjoyment and choice satisfaction) as well as two web site intentions: intention to return and intention to purchase. Six of the seven hypotheses were supported in a parsimonious model. Variance explained was 16.3% for perceived control, 45.6% for shopping enjoyment, 59.3% for choice satisfaction and 63.1% for web site intentions. The main finding is that an attribute-based interface for retail e-shopping increases the shopper's sense of control and feeling of enjoyment in the process more than a question-based interface, and thereby increases satisfaction with the outcome. This combination of influences increases the intention of the shopper to return to the web site and to purchase the item. We discuss the results and suggest areas for future research in user-customization, which may apply to many different industries that engage in online commerce. © Springer Science + Business Media, LLC 2008.",Business-to-consumer electronic commerce; Flow-based model; Users,60,Information Systems Frontiers,2010 1464,Massari L.,Analysis of MySpace user profiles,"Online social networks have attracted millions of users, who have integrated social network web sites into their daily life. Users participate to the changes and to the evolution of these sites because they are producers and reviewers of contents that help them to maintain the existing social relationships, make new friends, collaborate and enrich experiences. This paper presents a study of the characteristics of the users of MySpace web site, with the objective of studying relationships and interactions among users and deriving hints about their behavior. The analysis relies on data collected by monitoring the web site for 12 weeks. Typical user behaviors have been derived and classes of users characterized by different levels of participation to the social network have been identified. In particular, the analysis reveals that most of the users actively participate to the social network and specify many personal details. Social networks web sites allow access to such details; the sharing of information about users and their relationships can lead to non-ethic online activities, which threat the privacy and the security of users themselves. © 2010 Springer Science + Business Media, LLC.",Online social networks; User profiles; Workload characterization,43,Information Systems Frontiers,2010 1465,Osei-Bryson K.-M.,A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research,"Much of Information Systems research is of the behavioral science category that involves the analysis of quantitative data. Typically a confirmatory approach is taken where only unconditional hypotheses are specified based on existing theory and evaluated using techniques such as regression analysis. In this paper we present a knowledge discovery via data mining (KDDM) process model based multi-criteria framework for selecting the most appropriate causal explanatory model based on the researchers subjective preferences including accuracy, simplicity, the relative importance of variables in his/her tentative research model, relative preferences for inclusion of some causal relationships. © 2013, Springer Science+Business Media New York.",Causal model; Decision support system; Explanatory model; Exploratory data analysis; KDDM process model; MCDM; Multi-criteria decision analysis; Regression splines,3,Information Systems Frontiers,2015 1466,Alfonso B.; Botti V.; Garrido A.; Giret A.,A MAS-based infrastructure for negotiation and its application to a water-right market,"This paper presents a MAS-based infrastructure for the specification of a negotiation framework that handles multiple negotiation protocols in a coherent and flexible way. Although it may be used to implement one single type of agreement mechanism, it has been designed in such a way that multiple mechanisms may be available at any given time, to be activated and tailored on demand (on-line) by participating agents. The framework is also generic enough so that new protocols may be easily added. This infrastructure has been successfully used in a case study to implement a simulation tool as a component of a larger framework based on an electronic market of water rights. © 2013 Springer Science+Business Media New York.",Agents; Interactions; MAS infrastructure; Negotiation model,5,Information Systems Frontiers,2014 1467,Seo J.-Y.; Chai S.,The role of algorithmic trading systems on stock market efficiency,"The rapid development of information technology has changed the dynamics of financial markets. The main purpose of this study is laid on examining the role of IT based stock trading on financial market efficiency. This research specifically focused on algorithmic trading. Algorithmic trading enables investors to trade stocks through a computer program without the need for human interventions. Based on an empirical analysis of the Korean stock market, this study discovered the positive impact of algorithmic trading on stock market efficiency at three-fold. First, the study results indicate that algorithmic trading contributes to the reduction in asymmetric volatility, which causes inefficiency of information in a stock market. Second, an algorithmic trading also increases the operation efficiency of a stock market. Arbitrage trading contributes on the equilibrium between the spot market and futures market as well as on the price discovery. Third, algorithmic trading provides liquidity for market participants contributing to friction free transactions. The research results indicate that stock exchanges based on electronic communications networks (ECNs) without human intervention could augment a financial market quality by increasing trading share volumes and market efficiency so that it can eventually contribute to the welfare of market investors. © 2013 Springer Science+Business Media New York.",Asymmetric volatility; Efficiency of information; Efficiency of operation; Equilibrium; Liquidity,9,Information Systems Frontiers,2013 1468,Goiri Í.; Guitart J.; Torres J.,Economic model of a Cloud provider operating in a federated Cloud,"Resource provisioning in Cloud providers is a challenge because of the high variability of load over time. On the one hand, the providers can serve most of the requests owning only a restricted amount of resources, but this forces to reject customers during peak hours. On the other hand, valley hours incur in under-utilization of the resources, which forces the providers to increase their prices to be profitable. Federation overcomes these limitations and allows providers to dynamically outsource resources to others in response to demand variations. Furthermore, it allows providers with underused resources to rent them to other providers. Both techniques make the provider getting more profit when used adequately. Federation of Cloud providers requires having a clear understanding of the consequences of each decision. In this paper, we present a characterization of providers operating in a federated Cloud which helps to choose the most convenient decision depending on the environment conditions. These include when to outsource to other providers, rent free resources to other providers (i.e.; insourcing), or turn off unused nodes to save power. We characterize these decisions as a function of several parameters and implement a federated provider that uses this characterization to exploit federation. Finally, we evaluate the profitability of using these techniques using the data from a real provider. © 2011 Springer Science+Business Media, LLC.",Cloud provider; Federation; Outsourcing; Profit,78,Information Systems Frontiers,2012 1469,Zang C.; Fan Y.; Liu R.,"Architecture, implementation and application of complex event processing in enterprise information systems based on RFID","Enterprises have to be increasingly agile and responsive to address the challenges posed by the fast moving market. With the software architecture evolving into service-oriented architecture, and the adoption of Radio Frequency Identification (RFID), event processing can fit well in enterprise information systems in terms of facilitation of event aggregation into high level actionable information, and event response to improve the responsiveness. To make it more applicable, the architecture of event processing in enterprise information systems is proposed; event meta model is put forth, and the rules are defined. To improve the detect efficiency, classification and partition of event instance is utilized. We have implemented the event processing mechanism in enterprise information systems based on RFID, including the data structures, optimization strategies and algorithm that is considered as one of the contributions. The performance evaluations show that the method is effective in terms of scalability and the capability of event processing. Complex event processing can improve operation efficiency and discover more actionable information, which is justified by the application. © 2008 Springer Science+Business Media, LLC.",Complex event processing; Event driven architecture; Event meta model; RFID; Workflow,45,Information Systems Frontiers,2008 1470,Cerutti F.; Kaplan L.M.; Norman T.J.; Oren N.; Toniolo A.,Subjective logic operators in trust assessment: an empirical study,"Computational trust mechanisms aim to produce trust ratings from both direct and indirect information about agents’ behaviour. Subjective Logic (SL) has been widely adopted as the core of such systems via its fusion and discount operators. In recent research we revisited the semantics of these operators to explore an alternative, geometric interpretation. In this paper we present principled desiderata for discounting and fusion operators in SL. Building upon this we present operators that satisfy these desirable properties, including a family of discount operators. We then show, through a rigorous empirical study, that specific, geometrically interpreted, operators significantly outperform standard SL operators in estimating ground truth. These novel operators offer real advantages for computational models of trust and reputation, in which they may be employed without modifying other aspects of an existing system. © 2014, Springer Science+Business Media New York.",Information fusion; Trust and reputation; Uncertain reasoning,14,Information Systems Frontiers,2015 1471,Strecker S.; Heise D.; Frank U.,RiskM: A multi-perspective modeling method for IT risk assessment,"Stakeholder involvement and participation are widely recognized as being key success factors for IT risk assessment. A particular challenge facing current IT risk assessment methods is to provide accessible abstractions on matters of IT risk that attend to both managerial and technical perspectives of the stakeholders involved. In this paper, we investigate whether a conceptual modeling method can address essential requirements in the IT risk assessment domain, and which structural and procedural features such a method entails. The research follows a design research process in which we describe a research artifact, and evaluate it to assess whether it meets the intended goals. In the paper, we specify requirements and assumptions underlying the method construction, discuss the structural specification of the method and its design rationale, present a prototypical application scenario, and provide an initial method evaluation. The results indicate that multi-perspective modeling methods satisfy requirements specific to the IT risk assessment domain, and that such methods, in fact, provide abstractions on matters of IT risk accessible to both a technical and a managerial audience. © 2010 Springer Science+Business Media, LLC.",Design science research; Enterprise modeling; IT risk assessment; Meta modeling,61,Information Systems Frontiers,2011 1472,Yang H.; Fong S.,Optimizing dynamic supply chain formation in supply mesh using CSET model,"A new e-Service model called dynamic supply chain is characterized by their dynamic nature in easily being formed and disbanded with the seamless connectivity provided by e-Marketplace. The new term ""supply mesh"" was coined to represent this virtual community of companies in which dynamic supply chains, as per project (also known as make-to-order), are formed across different tiers of suppliers. In a supply mesh, a dynamic supply chain can be formed vertically, from the top to the bottom layers, mediating different companies for a project. Companies that are on the same level laterally are usually competitors, and the companies that are linked vertically as supply chains are trading partners. From a global view, the companies that are connected in the supply mesh can be viewed as individual entities that have self-interest. They may compete for survival as well as collaborate with each other for jobs. Given such complex relations the challenge is to find an optimal group of members for a dynamic supply chain in the supply mesh. A multi-agent model called the collaborative single machine earliness/tardiness (CSET) model was recently proposed for the optimal formation of make-to-order supply chains. This paper investigates the possibilities of applying CSET in a supply mesh, and the corresponding allocation schemes are experimentally studied in simulations. One scheme called Cost-driven principle leads to destructive competition while the other one namely Pareto-optimal evolves into a cooperative competition that tries to mutually benefit every participant. The results, based on samples from the U.S. textile industry, show that a cooperative competition scheme is superior in terms of optimal allocation, which obtains maximum satisfaction for all participants. © 2012 Springer Science+Business Media, LLC.",e-Marketplace; Pareto-optimization; Simulation; Supply chain formation,2,Information Systems Frontiers,2013 1473,Griffiths M.; Light B.,Social networking and digital gaming media convergence: Classification and its consequences for appropriation,"Within the field of Information Systems, a good proportion of research is concerned with the work organisation and this has, to some extent, restricted the kind of application areas given consideration. Yet, it is clear that information and communication technology deployments beyond the work organisation are acquiring increased importance in our lives. With this in mind, we offer a field study of the appropriation of an online play space known as Habbo Hotel. Habbo Hotel, as a site of media convergence, incorporates social networking and digital gaming functionality. Our research highlights the ethical problems such a dual classification of technology may bring. We focus upon a particular set of activities undertaken within and facilitated by the space-scamming. Scammers dupe members with respect to their 'Furni', virtual objects that have online and offline economic value. Through our analysis we show that sometimes, online activities are bracketed off from those defined as offline and that this can be related to how the technology is classified by members-as a social networking site and/or a digital game. In turn, this may affect members' beliefs about rights and wrongs. We conclude that given increasing media convergence, the way forward is to continue the project of educating people regarding the difficulties of determining rights and wrongs, and how rights and wrongs may be acted out with respect to new technologies of play online and offline. © 2008 Springer Science+Business Media, LLC.",Classification; Digital gaming; Ethics; Household adoption; MUDs; New media; Online community; Play; Social media; Social networking,40,Information Systems Frontiers,2008 1474,Tian J.; Wang K.; Chen Y.; Johansson B.,From IT deployment capabilities to competitive advantage: An exploratory study in China,"As more and more companies are deploying, or plan to deploy, information systems, the organizational capabilities to effectively deploy information technologies to support and shape businesses become increasingly important. While many studies have focused on how to acquire state-of-the-art information technologies and on how to effectively utilize implemented information technologies, more studies are still needed to investigate how a company can successfully deploy acquired information technologies to support and shape businesses strategies and value chain activities. IT deployment capabilities are defined as the organizational capabilities to configure and reconfigure a company's information system by adding new IT components or by adapting the existing information systems in order to make the whole information system available to support and shape businesses. This study identifies and investigates the three building blocks of IT deployment capabilities: strategic IT flexibility, business-IT partnership, and business-IT alignment. Using the resourcebased view, we propose a framework to explain the relationship between IT deployment capabilities and competitive advantage. The research model is tested on data collected in China. Results show that strategic IT flexibility and business-IT partnership have direct impacts on competitive advantage, while business-IT alignment has an indirect impact on competitive advantage. The effect of business-IT alignment on competitive advantage is fully mediated by strategic IT flexibility and business-IT partnership. The results provide support for the relationship between IT deployment capabilities and competitive advantage. The study presents implications for how to develop IT deployment capabilities and how to generate business value from IT investment. © Springer Science + Business Media, LLC 2009.",Business-IT partnership; Business-italignment; Competitive advantage; Information systems; IT deployment capabilities; Resource-based view; Strategic IT flexibility,64,Information Systems Frontiers,2010 1475,Didandeh A.; Mirbakhsh N.; Afsharchi M.,Concept learning games: An ontological study in multi-agent systems,"In this paper, we intend to have a game theoretic study on the concept learning problem in a multi-agent system. Concept learning is a very essential and well-studied domain of machine learning when it is studied under the characteristics of a multi-agent system. The most important reasons are the partiality of the environment perception for any agent and also the communication holdbacks, resulting into a deep need for a collaborative protocol in favor of multi-agent transactions. Here we wish to investigate multi-agent concept learning with the help of its components, thoroughly with a game theoretic taste, esp. on the pre-learning processes. Based on two standard notations, we address the non-unanimity of concepts, classification of objects, voting and communicating protocol, and also the learning itself. In such a game of concept learning, we consider a group of agents, communicating and consulting to upgrade their ontologies based on their conceptualizations of the environment. For this purpose, we investigate the problem in two separate and standard distinctions of game theory study, cooperation and competition. Several solution concepts and innovative ideas from the multi-agent realm are used to produce an approach that contains the reasoning process of the agents in this system. Some experimentations come at the end to show the functionality of our approach. These experimentations come distinctly for both cooperative and competitive views. © 2012 Springer Science+Business Media, LLC.",Agent; Concept; Feature; Game theory; Group; Learning; Multi-agent systems; Negotiation; Non-unanimous concept; Ontology; Query; Response; Voting,2,Information Systems Frontiers,2013 1476,Lee J.-N.; Huynh M.Q.; Hirschheim R.,An integrative model of trust on IT outsourcing: Examining a bilateral perspective,"Trust has been considered a central aspect of successful IT outsourcing. Although a great deal of interest in trust has been described, there are very few theoretical models in the IT outsourcing literature to explain mutual trust, its role, and its impact in IT outsourcing. This study proposes a trust-based relationship research model to assess the perceived IT outsourcing success in terms of (1) mutual trust with its temporal dimension of initial trust and initial distrust, and (2) knowledge sharing with the moderating effect of mutual dependency. This model was then validated and applied in a study involving organizations in Korea. The data was collected and analyzed to understand initial trust, initial distrust, knowledge sharing, and mutual dependency as contributing factors to success in IT outsourcing. The results show that mutual trust between the service receiver and provider is very important for knowledge sharing and outsourcing success, and is affected by the initial perception to each other's partner at the beginning of the outsourcing process. Interestingly, this study also shows that initial trust is considered a significant factor in the perception of mutual trust from the service receiver's perspective, but not from the service provider's viewpoint. The results help extend our understanding of critical success factors in outsourcing success and of different standpoints between the service receiver and provider. © 2008 Springer Science+Business Media, LLC.",Bilateral perspective; Initial trust and initial distrust; IT outsourcing; Knowledge sharing; Mutual dependency; Mutual trust; Outsourcing success; PLS,114,Information Systems Frontiers,2008 1477,Yang H.; Li W.; Liu K.; Zhang J.,Knowledge-based clinical pathway for medical quality improvement,"Clinical pathways have been adopted for various diseases in clinical departments for quality improvement as a result of standardization of medical activities in treatment process. Using knowledge-based decision support on the basis of clinical pathways is a promising strategy to improve medical quality effectively. However, the clinical pathway knowledge has not been fully integrated into treatment process and thus cannot provide comprehensive support to the actual work practice. Therefore this paper proposes a knowledge-based clinical pathway management method which contributes to make use of clinical knowledge to support and optimize medical practice. We have developed a knowledge-based clinical pathway management system to demonstrate how the clinical pathway knowledge comprehensively supports the treatment process. The experiences from the use of this system show that the treatment quality can be effectively improved by the extracted and classified clinical pathway knowledge, seamless integration of patient-specific clinical pathway recommendations with medical tasks and the evaluating pathway deviations for optimization. © 2011 Springer Science+Business Media, LLC.",Clinical pathway; Decision support for pathway management; Knowledge-based system; Medical service quality; Quality improvement,28,Information Systems Frontiers,2012 1478,Gray P.; Hovav A.,Using scenarios to understand the frontiers of IS,"As we arrive at the millenium, the literature is filled with predictions and forecasts of the state of affairs in the 21st century. Most of these forecasts are single point prognoses. This paper uses scenario-building ideas to describe a richer set of possible states of Information Systems in the year 2010. The scenarios are integrative and consider a set of possible events and their impacts. Two major driving forces: (1) telecommunications development and (2) social acceptance of information systems (IS) are assumed to define the scenario space. Based on these driving forces, four scenarios are created: Utopian, Dystopian, Status Quo, and Technology. The Utopian (ubiquitous telecommunications, high social acceptance of IS) and Dystopian (limited gains in telecommunications, low social acceptance of IS) scenarios are described in detail. The scenarios provide a basis for assessing the frontiers of information systems. © 2014 Springer Science+Business Media New York.",Alternative IS futures; Scenario space,2,Information Systems Frontiers,2014 1479,Krishnaraju V.; Mathew S.K.; Sugumaran V.,Web personalization for user acceptance of technology: An empirical investigation of E-government services,"E-Commerce firms have adopted Web Personalization techniques extensively in the form of recommender systems for influencing user behavior for customer retention. Although there are numerous studies in this area, academic research addressing the role of Web Personalization in user acceptance of technology is very scant. Further, owing to the potential of recommender systems to attract and retain customers, most studies in web personalization have been done in E-Commerce setting. In this research, the ‘Consumer Acceptance and Use of Information Technology’ theory proposed in previous research has been extended to include web personalization as a moderator and has been tested in an E-Government context. Data collection involved conducting a laboratory experiment with the treatment group receiving personalized web forms for requesting an E-Government service. Our analyses show that personalizing the Web by self-reference and content relevance has a significant moderator role in influencing the relationship between determinants of intention to use and behavioral intention in certain cases. © 2015, Springer Science+Business Media New York.",Consumer technology acceptance; E-Commerce; E-Government; Web personalization,82,Information Systems Frontiers,2016 1480,Maldonado E.A.; Maitland C.F.; Tapia A.H.,Collaborative systems development in disaster relief: The impact of multi-level governance,"Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with local and international non-governmental organizations (NGOs). While the multi-organizational nature of disaster response is known to create challenges for information systems development, to date, less attention has been paid to their multi-level nature. This research sheds light on the implications of multi-level governance for disaster information systems development by integrating political science and information systems theories of multi-level governance. The integrated theoretical framework is then used to analyze a case study of a system development effort undertaken by a multi-organizational coordination body consisting of the headquarters of six large, international humanitarian relief agencies, together with their country offices in a Central American country. This research finds that multi-level governance can both negatively and positively influence information systems development. In a multi-level governance arrangement, authority for a systems development project may be diffuse and may change. The transfer of resources from higher to lower levels is key factor, as these resources help local organizations overcome resource constraints to collaboration. The initial outcome of coercion by higher levels of authority may be resistance, however over time the outcome can change to compliance. © 2009 Springer Science+Business Media, LLC.",Disaster response; Humanitarian relief; Multi-level Governance,38,Information Systems Frontiers,2010 1481,Templeton G.F.; Dowdy Jr. J.F.,CASE-mediated organizational and deutero learning at NASA,"Deutero learning (DL) involves the use of an organizational learning (OL) strategy for the adoption of learning behavior, or simply 'learning to learn.' This article describes the application of an evolutionary prototyping form of action research in a federal government department to address problems stemming from systemic bureaucracy. We developed two approaches, each mediated by computeraided software engineering (CASE), that are relevant to initiating OL and DL. The first approach, CASE-Mediated Organizational Learning (CMOL), was found to be useful in the initiation, development, and guidance of OL behavior in the research setting. The second approach, named CASEMediated Deutero Learning (CMDL), is a guide for generalizing the CMOL approach to other settings. We validate both approaches using criteria drawn from the action research literature. These findings should be useful to managers interested in adopting OL and contributes to several streams of MIS literature. © Springer Science+Business Media, LLC 2011.",CASE; Computer-mediated learning; Deutero learning; Innovation diffusion; Organizational change; Organizational learning; Organizational memory,3,Information Systems Frontiers,2012 1482,Criado N.; Such J.M.; Botti V.,Norm reasoning services,"Norms are used in open Multi-Agent Systems as a formal specification of deontic statements aimed at regulating the actions of agents and the interactions among them. In this paper, we propose a set of services facilitating the development of both non-normative and normative agents for norm-governed MAS. Specifically, we propose to provide agents with norm reasoning services. These services will help agent designers/developers to programme agents that consider norm reasoning without having to implement the needed mechanisms to reason about norms by themselves. This article shows how these services perform as well as the results of the experiments that we conducted to evaluate their performance. © 2013 Springer Science+Business Media New York.",Agents; Norms; Services,1,Information Systems Frontiers,2014 1483,Seo H.-J.; Lee Y.S.; Hur J.-J.; Kim J.K.,The impact of information and communication technology on skilled labor and organization types,"Information and Communication Technology (ICT) affects the global economy and the business world enormously. In particular, the impact of ICT on work organization has been in the spotlight since the widespread introduction of computerized systems two decades ago. However, the relationship between ICT and organizational factors has not been indentified clearly. This study aims to investigate possible complementary relationships between ICT diffusion and organizational factors such as: labor, firm organization, product differentiation and the demand for skilled labor. Utilizing detailed firm-level data in Korea, this research scrutinizes whether the relationship among the organizational factors in Korean firms is different from that of other technologically advanced countries. The results show that ICT demand is complementary to investment in human capital and product differentiation, but not to autonomous organizations. ICT is also found to contribute to productivity and profitability in addition to its effects on these relationships. The results do not show any synergic effect with other factors, however. Investment in ICT should be considered with other organizational factors with attention paid to synergistic effects. The implications could help practitioners as well as academicians in investing in ICT and in studying ICT investment respectively. © Springer Science+Business Media, LLC 2012.",Complementarity; Human capital; ICT; Skilled labor; Work organization,13,Information Systems Frontiers,2012 1484,Jung J.J.,ContextGrid: A contextual mashup-based collaborative browsing system,"Due to a large amount of resources (i.e.; information and knowledge) available on world wide web, it has been more difficult for users to effectively find relevant web resources. Most of the current web browsing methods and systems have been investigated to apply adaptive approaches which can extract personal contexts (e.g.; interests and preferences) of the users. In this paper, we propose a contextual mashup-based collaborative browsing (co-browsing) platform, called ContextGrid, for providing online users with various knowledge sharing services. Particularly, the proposed mashup scheme can integrate heterogeneous pieces of information collected by various Open APIs, and assist the users to decide which partners should be selected for mutual collaborations. In order to evaluate the proposed mashup-based method, we have implemented a co-browsing platform which can exchange bookmarks, and measured whether the contextual mashup scheme makes a meaningful influence on improving the performance of the co-browsing process with multiple users. © 2011 Springer Science+Business Media, LLC.",Collaborative browsing; ContextGrid; Contextual mashup; Information searching; Knowledge sharing; Open API,24,Information Systems Frontiers,2012 1485,Boongasame L.; Daneshgar F.,A collaborative platform for buyer coalition: Introducing the Awareness-based Buyer Coalition (ABC) system,"A variety of buyer coalition schemes already exist in the current e-Commerce literature by which buyers form some sort of coalition in order to enjoy added discounts as a result of purchasing in larger bundles. One major problem in all existing schemes is that none of those schemes explicitly treat the coalition process as a collaborative business process; and as a result, the awareness and knowledge-sharing requirements are not explicitly recognized in the design process of the existing systems. This study proposes a conceptual framework for a buyer coalition system called the Awareness-based Buyer Coalition (ABC) system that allows a buyer to bid on the basis of various levels of awareness that s/he may have about other roles' actions/intentions. The study is an early attempt for explicitly considering awareness and knowledge-sharing requirements of various roles within the buyer coalition process. The theoretical foundations of the study are rooted in the fields of Game Theory, e-Commerce, and Knowledge Management. The research methodology adopted for the study is design science. Various existing buyer coalition algorithms were reviewed and their strengths and weaknesses identified in terms of addressing the information-sharing needs of collaborating buyers. Furthermore, the existing literature on Knowledge Management was reviewed in order to identify an appropriate process model for the proposed buyer coalition framework with specific emphasis on awareness and knowledge-sharing requirements of its collaborating actors. For validation of the proposed conceptual model simulation software was developed to demonstrate results of a variety of simulations for the proof of the concept. © 2011 Springer Science+Business Media, LLC.",Awareness; Buyer coalition; Coalition formation; Electronic commerce; Knowledge-sharing,4,Information Systems Frontiers,2013 1486,Ashja M.; Hadizadeh Moghadam A.; Bidram H.,Comparative study of large information systems’ CSFs during their life cycle,"Large Information Systems (LISs) are integrated software packages organizations employed to manage one or whole aspects of their information flows inside and outside of their organization. Here, large integrated systems, which cover at least two aspects of organizational information flows, considered and tried to identify and rank Critical Success Factors (CSFs) of these systems during three major phases of LIS project. ERP literature used to shape the model of possible CSFs for LISs, and then the model surveyed by means of a questionnaire. Questionnaires data analysed to identify the importance and rank of each factor during the LIS life cycle. The results showed the top management support is the most critical CSF, and software package selection in pre-implementation stage is the most fundamental element during the LIS life cycle. © 2013, Springer Science+Business Media New York.",Comparison; Critical success factors (CSFs); ERP; Fundamental elements of LIS; Large information system (LISs); Life cycle,11,Information Systems Frontiers,2015 1487,Zhang J.; Akula K.; Karim M.; Ariga R.K.R.,A university-oriented Web 2.0 services portal,"This paper reports several key challenges and solutions when we apply Web 2.0 mashup technology to build a university-oriented services portal. A two-layer mashup service model is proposed as the underlying basis to support multiple granularities of services mashup. We explore a caching technique to facilitate personalizable services requests. We also report our study of mashing up Facebook as a social relationship data source. © Springer Science + Business Media, LLC 2009.",Facebook; Mashup portal; Social network; Web 2.0,4,Information Systems Frontiers,2011 1488,Rao L.; Osei-Bryson K.-M.,An approach for incorporating quality-based cost-benefit analysis in data warehouse design,"Data are considered to be important organizational assets because of their assumed value, including their potential to improve the organizational decision-making processes. Such potential value, however, comes with various costs, including those of acquiring, storing, securing and maintaining the given assets at appropriate quality levels. Clearly, if these costs outweigh the value that results from using the data, it would be counterproductive to acquire, store, secure and maintain the data. Thus cost-benefit assessment is particularly important in data warehouse (DW) development; yet very few techniques are available for determining the value that the organization will derive from storing a particular data table and hence determining which data set should be loaded in the DW. This research seeks to address the issue of identifying the set of data with the potential for producing the greatest net value for the organization by offering a model that can be used to perform a cost-benefit analysis on the decision support views that the warehouse can support and by providing techniques for estimating the parameters necessary for this model. © 2008 Springer Science+Business Media, LLC.",Cost-benefit analysis; Data quality; Data warehouse; Decision support; Requirements engineering,7,Information Systems Frontiers,2008 1489,Ahmed M.A.; Den Hoven J.V.,Agents of responsibility-freelance web developers in web applications development,"Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibilities associated with computing practitioners apply to freelance web developers. The relevant moral question is not ""can freelancers be considered as professionals?"", but ""are they agents of responsibility and can they cause harm""? It is obvious that they can. To justify this claim we will take the case of using free malicious code by freelance web developers and show how their actions or omissions may cause harm to the users, clients and others. We will then identify different types of responsibilities and relationships, which can be associated with freelance web developers. In the end, we will stress that, freelance web developers have higher form of responsibility and should actively seek to bring about environments in which they can function as responsible agents aiming at developing safe, secure, and workable web applications and systems. © 2010 Springer Science + Business Media, LLC.",Agents of responsibility; Freelance web developers; Hacking; Responsibility; Systems; Web applications,10,Information Systems Frontiers,2010 1490,Almeida J.P.A.; Iacob M.-E.; Van Eck P.,Requirements traceability in model-driven development: Applying model and transformation conformance,"The variety of design artifacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper proposes a methodological framework that simplifies management of this relationship, which helps in assessing the quality of models, realizations and transformation specifications. Our framework is a basis for understanding requirements traceability in model-driven development, as well as for the design of tools that support requirements traceability in model-driven development processes. We propose a notion of conformance between application models which reduces the effort needed for assessment activities. We discuss how this notion of conformance can be integrated with model transformations. © 2007 Springer Science+Business Media, LLC.",Assessment; Conformance; Model transformation; Model-driven design; Requirements traceability,17,Information Systems Frontiers,2007 1491,Winkler J.K.; Dibbern J.; Heinzl A.,The impact of cultural differences in offshore outsourcing-Case study results from German-Indian application development projects,"Offshore outsourcing to vendors in foreign countries causes unique challenges which need to be understood and managed effectively. This paper explores cultural differences in IS offshoring arrangements involving German client organizations that outsource application development activities to Indian vendors. For this purpose, a research framework is developed based on both theoretical considerations and specific empirical observations from multiple case studies. The goal is to (1) explore the nature of cultural differences in offshore outsourcing arrangements in depth and to (2) analyze the relationship between those cultural differences and offshore outsourcing success. Based on the case findings, implications and practices for the management of offshore development projects are outlined. The results indicate that cultural differences in terms of power distance, IS designer values, and an active versus passive working attitude critically affect several dimensions of relationship quality, thereby influencing offshore outsourcing success. A clear definition of roles and mechanisms, strong leadership, and an active management of culture by adapting to either the client's or the vendor's national culture appeared to be effective ways to manage cultural differences. © 2008 Springer Science+Business Media, LLC.",Application development; Case study; Cultural differences; Offshoring; Outsourcing,149,Information Systems Frontiers,2008 1492,Bog A.; Plattner H.; Zeier A.,A mixed transaction processing and operational reporting benchmark,"The importance of reporting is ever increasing in today's fast-paced market environments and the availability of up-to-date information for reporting has become indispensable. Current reporting systems are separated from the online transaction processing systems (OLTP) with periodic updates pushed in. A pre-defined and aggregated subset of the OLTP data, however, does not provide the flexibility, detail, and timeliness needed for today's operational reporting. As technology advances, this separation has to be re-evaluated and means to study and evaluate new trends in data storage management have to be provided. This article proposes a benchmark for combined OLTP and operational reporting, providing means to evaluate the performance of enterprise data management systems for mixed workloads of OLTP and operational reporting queries. Such systems offer up-to-date information and the flexibility of the entire data set for reporting. We describe how the benchmark provokes the conflicts that are the reason for separating the two workloads on different systems. In this article, we introduce the concepts, logical data schema, transactions and queries of the benchmark, which are entirely based on the original data sets and real workloads of existing, globally operating enterprises. © 2010 Springer Science+Business Media, LLC.",Benchmarking; Mixed workload; OLTP; Operational reporting,13,Information Systems Frontiers,2011 1493,Bai C.; Sarkis J.,Green information technology strategic justification and evaluation,"Green and sustainable information technology (GSIT) can be an important and strategic decision for many organizations. Strategic GSIT decisions can influence a variety of internal and external organizational stakeholders. GSIT justification and evaluation is critical to organizations, especially those seeking the ecological modernization 'win-win' of introducing green technologies into organizations. The literature has seen very few tools and approaches to aid in the explicit justification of strategic GSIT. Although numerous models exist for regular IT, there are certain characteristics including a greater number of factors, especially intangible and socially focused factors, requiring greater investigation of tools for the evaluation and justification process. The identification of appropriate metrics and categorizations to use in advanced strategic appraisal techniques for GSIT is in itself a non-trivial exercise. Thus, in this paper issues facing the strategic justification of GSIT set the stage for introduction of a novel, flexible and comprehensive evaluation approach utilizing a grey systems, fuzzy, and TOPSIS multiple criteria foundation. An illustrative application for evaluating and selecting alternative green data center designs sets the stage for an illustrative example and sensitivity analysis. The results are evaluated including discussion of practical and research implications. Directions for future research are also identified. © 2013 Springer Science+Business Media New York.",Ecological modernization; Information technology; Multiple criteria decision making; Strategic justification; Sustainability; TOPSIS,72,Information Systems Frontiers,2013 1494,Pal J.,"If the State provided free computer literacy, would it find takers? Evidence and propositions from the Akshaya project in India","The Akshaya project from Kerala has been a much discussed case for the community of practitioners and scholars working on technology and development. A unique feature of the project is its state-wide e-literacy goal in which one member of every household was trained in the telecenters set up under Akshaya at public expense. Using a survey of 1,750 households in the experimental area of Malappuram and a comparison group of neighbouring Kozhikode, this work investigates the extent of e-literacy and discusses the performance of service delivery using telecenters. While the question of whether public funds should be spent on projects such as telecenters or e-literacy continues to be an ongoing debate, the evidence here is that even though structural factors such as service delivery mechanisms and publicity make an impact on technology adoption, the overall participation in free e-literacy services among poor households remains low.",Developing nations; Human factors; Rural areas; Technology social factors,8,Information Systems Frontiers,2009 1495,Li C.; Li L.,An efficient resource allocation for maximizing benefit of users and resource providers in ad hoc grid environment,"Ad hoc grids allow a group of individuals to accomplish a mission that involves computation and communication among the grid components, often without fixed structure. In an ad hoc grid, every node in the network can spontaneously arise as a resource consumer or a resource producer at any time when it needs a resource or it possesses an idle resource. At the same time, the node in ad hoc grid is often energy constrained. The paper proposes an efficient resource allocation scheme for grid computing marketplace where ad hoc grid users can buy usage of memory and CPU from grid resource providers. The ad hoc grid user agents purpose to obtain the optimized quality of service to accomplish their tasks on time with a given budget, and the goal of grid resource providers as profit-maximization. Combining perspectives of both ad hoc grid users and resource providers, the paper present ad hoc grid resource allocation algorithm to maximize the global utility of the ad hoc grid system which are beneficial for both grid users and grid resource providers. Simulations are conducted to compare the performance of the algorithms with related work. © 2011 Springer Science+Business Media, LLC.",Ad hoc grid; Maximizing benefit; Resource allocation,5,Information Systems Frontiers,2012 1496,Diamantini C.; Potena D.; Storti E.,A virtual mart for knowledge discovery in databases,"The Web has profoundly reshaped our vision of information management and processing, enlightening the power of a collaborative model of information production and consumption. This new vision influences the Knowledge Discovery in Databases domain as well. In this paper we propose a service-oriented, semantic-supported approach to the development of a platform for sharing and reuse of resources (data processing and mining techniques), enabling the management of different implementations of the same technique and characterized by a community-centered attitude, with functionalities for both resource production and consumption, facilitating end-users with different skills as well as resource providers with different technical and domain specific capabilities. We first describe the semantic framework underlying the approach, then we demonstrate how this framework is exploited to give different functionalities to users through the presentation of the platform functionalities. © 2013 Springer Science+Business Media New York.",,15,Information Systems Frontiers,2013 1497,Chang S.I.; Yen D.C.; Chang I.-C.; Chou J.-C.,Study of the digital divide evaluation model for government agencies-A Taiwanese local government's perspective,"Many countries have devoted increasing attention to information infrastructures. However, a gap in digitalization exists among different government agencies, causing unequal opportunities for accessing infrastructures, information, and communication technologies. This paper, based on Gowin's Vee structure, is an empirical study of the digital divide in the context of local governments in Taiwan. A model for identifying and measuring aforementioned digital divide is constructed in this paper.We first refer to the grounded theory to draft a framework for measuring the digital divide in local governments. Then, through the use of a questionnaire distributed to experts implemented alongside the analytic hierarchy process (AHP), we generate five dimensions (including ICT infrastructure, human resources, external environment, internals of organization, and information) and 42 measures. Finally, we measure the actual levels of the digital divide in local governments with the resulting digital divide evaluation model. This paper aims to generate results that can serve as a reference for government agencies (at all levels) in the formulation of their digitalization strategies. © Springer Science+Business Media, LLC 2011.",Analytic hierarchy process; Digital divide; Digital governments; Evaluation model; Expert questionnaire; Grounded theory,17,Information Systems Frontiers,2012 1498,Malý J.; Nečaský M.; Mlýnková I.,Efficient adaptation of XML data using a conceptual model,"One of the prominent characteristics of XML applications is their dynamic nature. Changes in user requirements cause changes in schemas used in the systems and changes in the schemas subsequently make existing documents invalid. In this work, we study two tightly coupled problems—schema evolution and document adaptation. The presented approach extends an existing conceptual model for evolution of XML applications towards document adaptation, by introducing a formal framework for detecting changes between two versions of a schema. From the detected changes it is possible to create a script that transforms documents valid against the old version of the schema to documents valid against its new version. © 2012, Springer Science+Business Media, LLC.",Change management; Conceptual model; Document adaptation; XML schema evolution,3,Information Systems Frontiers,2014 1499,Vaidya K.; Campbell J.,Multidisciplinary approach to defining public e-procurement and evaluating its impact on procurement efficiency,"Utilising the methodology of content analysis, this study uses a multidisciplinary approach to define public eprocurement. Various aspects of e-procurement have been discussed from information systems, supply chain management, electronic commerce/electronic government, and public procurement to come up with an integrated definition of public e-procurement. Following this, e-procurement assimilation has been defined and its impact on procurement efficiency has been evaluated. Following the confirmatory factor analysis in structural equation modelling, dimensional level analysis in ANOVA has been undertaken for the three forms of e-procurement technologies namely e-tendering, ecatalogue management systems, and e-marketplace. The results show the positive and significant impact of the assimilation process on procurement efficiency. © Springer Science+Business Media New York 2014.",Content analysis; E-procurement; Supply chain management,49,Information Systems Frontiers,2016 1500,Meng T.; Shyu M.-L.,Concept-concept association information integration and multi-model collaboration for multimedia semantic concept detection,"The recent development of the digital camera technology and the popularity of social network websites such as Facebook and Youtube have created huge amounts of multimedia data. Multimedia information is ubiquitous and essential in many applications. In order to fill the gap between data and application requirements (or the so-called semantic gap), advanced methods and tools are needed to automatically mine and annotate high-level concepts to assist in associating the low-level features to the high-level concepts directly. It has been shown that concept-concept association can be effective in bridging the semantic gap in multimedia data. In this paper, a concept-concept association information integration and multi-model collaboration framework is proposed to enhance high-level semantic concept detection from multimedia data. Several experiments are conducted and the comparison results demonstrate that the proposed framework outperforms those approaches in the comparison in terms of the Mean Average Precision (MAP) values. © Springer Science+Business Media New York 2013.",Association information integration; Concept detection; Multi-model collaboration; Semantic gap,3,Information Systems Frontiers,2014 1501,Klein H.K.; Hirschheim R.,Choosing between Competing Design Ideals in Information Systems Development,"Whenever information systems are developed, they serve some interests at the expense of others. Just what those interests are and who possesses them need to be understood and debated as they involve value judgments. This paper contends that advice concerning the design of information systems must not be limited to technical design, but should also address what is good or bad, or right or wrong in any particular situation -a notion termed a design ideal. The paper offers an approach on how such value judgments involving competing design ideals may be approached in a rational way. This necessitates the adoption of a wider concept of rationality, one, which allows the insights of critical philosophical analysis to be brought to bear on the question of how information systems can best serve all project stakeholders. In order to address likely objections to our proposal, the conclusions discuss several research issues.",Barriers to rationality; Design ideals; Information systems development; Value choices; Value conflicts,48,Information Systems Frontiers,2001 1502,Hou D.; Hoover H.J.,Towards Specifying Constraints for Object-Oriented Frameworks,"Object-oriented frameworks are often hard to learn and use (J. Bosch et al., In: ACM Computing Survey's Symposia on Object Oriented Application Frameworks, 1998; M. Fayad and D.C. Schmidt, Communication of the ACM, Special Issue on Object-Oriented Application Frameworks 1997;40(10)). As a result, software cost rises and quality suffers. Thus the capability to automatically detect errors occurring at the boundary between frameworks and applications is considered crucial to mitigate the problem. This paper introduces the notion of framework constraints and a specification language, FCL (Framework Constraints Language), to formally specify them. Framework constraints are rules that frameworks impose on the code of framework-based applications. The semantics of FCL is primarily based on first order predicate logic and set theory though the evolving syntax is designed to resemble that of programming languages as much as possible. We take examples from the MFC (Microsoft Foundation Classes) framework (G. Shepherd and S. Wingo, MFC Internals: Inside the Microsoft Foundation Classes Architecture. Reading, MA: Addison Wesley, 1996) demonstrating both the nature of framework constraints and the semantics of FCL. Essentially, framework constraints can be regarded as framework-specific typing rules conveyed by the specification language FCL, and thus can be enforced by techniques analogous to those of conventional type checking.",FCL; FCL checker; Framework constraints; Object-oriented frameworks,2,Information Systems Frontiers,2002 1503,Osei-Bryson K.-M.; Giles K.,Splitting methods for decision tree induction: An exploration of the relative performance of two entropy-based families,"Decision tree (DT) induction is among the more popular of the data mining techniques. An important component of DT induction algorithms is the splitting method, with the most commonly used method being based on the Conditional Entropy (CE) family. However, it is well known that there is no single splitting method that will give the best performance for all problem instances. In this paper we explore the relative performance of the Conditional Entropy family and another family that is based on the Class-Attribute Mutual Information (CAMI) measure. Our results suggest that while some datasets are insensitive to the choice of splitting methods, other datasets are very sensitive to the choice of splitting methods. For example, some of the CAMI family methods may be more appropriate than the popular Gain Ratio (GR) method for datasets which have nominal predictor attributes, and are competitive with the GR method for those datasets where all predictor attributes are numeric. Given that it is never known beforehand which splitting method will lead to the best DT for a given dataset, and given the relatively good performance of the CAMI methods, it seems appropriate to suggest that splitting methods from the CAMI family should be included in data mining toolsets. © Springer Science + Business Media, LLC 2006.",Classification; Decision trees; Entropy; Machine learning; Splitting methods,16,Information Systems Frontiers,2006 1504,Haynes J.D.,Churchman's Hegelian Inquiring System and Perspectival Thinking,"This paper focuses upon a critical aspect implicit in C West Churchman's Hegelian Inquiring System, namely its ability to provide all the necessary ingredients for the emergence of a learning culture. This focus is achieved by articulating certain phenomenological aspects of the Hegelian model. In particular the relationship between subject and object is explored. After its emergence the learning culture then requires a special kind of thinking, which results in certain capacities, to continue its evolvement. This kind of thinking has been defined as Perspectival Thinking and is elaborated in the context of an Information System as a social system bound to technology. In the absence of a learning culture no organization can sustain its learning capacities, yet how often are learning cultures taken for granted? This paper explores a number of ideas that provide the ground for developing and sustaining learning cultures.",Hegelian inquiring system; Learning culture; Perspectival thinking,12,Information Systems Frontiers,2001 1505,Van Der Aalst W.M.P.,Exterminating the Dynamic Change Bug: A Concrete Approach to Support Workflow Change,"Adaptability has become one of the major research topics in the area of workflow management. Today's workflow management systems have problems dealing with both ad-hoc changes and evolutionary changes. As a result, the workflow management system is not used to support dynamically changing workflow processes or the workflow process is supported in a rigid manner, i.e., changes are not allowed or handled outside of the workflow management system. In this paper, we focus on a notorious problem caused by workflow change: the ""dynamic change bug"" (Ellis et al., Proceedings of the Conference on Organizational Computing Systems, Milpitas, California, ACM SIGOIS, ACM Press, New York, 1995, pp. 10-21). The dynamic change bug refers to errors introduced by migrating a case (i.e., a process instance) from the old process definition to the new one. A transfer from the old process to the new process can lead to duplication of work, skipping of tasks, deadlocks, and livelocks. This paper describes an approach for calculating a safe change region. If a case is in such a change region, the transfer is postponed.",Dynamic change; Petri nets; Workflow change; Workflow management,125,Information Systems Frontiers,2001 1506,Panagiotidis P.; Edwards J.S.,Developing Intrinsically Motivated Information Systems - A Critical Systems Approach,"This paper deals with the problematic of development methodologies for organisational information systems and especially with their application to business systems. Historically, information systems development methodologies tend to fail, because either they take the organisational purposefulness for granted, or they do not analyse it thoroughly. This paper's position is that the analysis, and the definition or redefinition of the systemic purpose are regarded as the utmost expression of the system 's purposefulness. This is to be achieved by ensuring the participation of all the stakeholders who affect, or are affected by, a particular business system's operations. The nature of participation, defined as a process of the stakeholders' perceptual exchanges, is deemed to be problematic in itself, due to the influence exerted upon it by organisational power, coercion and false consciousness. The paper highlights the philosophical reasons for the failures of information systems development methodologies, and provides a conceptual solution to this problematic as well as a strategy for the development of intrinsically motivated organisational information systems. The intrinsically motivated information systems methodology outlined here (BSPA) is intended to yield organisational information systems that demonstrably improve co-ordination of organisational activities, by enabling the development and maintenance of a single/multifaceted view of purpose throughout organisations.",Business systems; Coercion; Complementarism; False consciousness; Methodology; Power,1,Information Systems Frontiers,2001 1507,Casati F.; Castano S.; Fugini M.,Managing Workflow Authorization Constraints through Active Database Technology,"The execution of workflow processes requires authorizations for enforcing the assignment of tasks to agents, either human or automated, according to the security policy of the organization. This paper presents a workflow authorization framework based on roles and organizational levels, and on authorization constraints. To facilitate the assignment of tasks to agents, roles and organizational levels are organized into hierarchies. Authorization constraints are introduced to specify instance-dependent, time-dependent, and history-dependent authorizations. Authorization constraints are specified in terms of active rules, used also for authorization management. The Workflow Management System determines authorized agents on the basis of the contents of an authorization base maintained through the active rules defined in the system.",Active databases; Authorization constraints; Authorizations; Roles; Triggers; Workflows,71,Information Systems Frontiers,2001 1508,Hu Q.; Huang C.D.,The rise and fall of the competitive local exchange carriers in the U.S.: An institutional perspective,"The debacle of the telecommunications industry at the turn of the millennium resulted in significant consequences for investors, workers, financial institutions, telecom companies, and the economy in general worldwide. In the midst of the telecom bubble, the CLECs (competitive local exchange carriers) adopted similar or identical business plans and saturated the market, which resulted in destructive competition. In this study, we investigate the isomorphic business models of the CLECs from the perspectives of the new institutional theory. We argue that the combined coercive, mimetic, and normative institutional forces exerted on the companies by the actors who controlled the funding, managed the business, and provided the information fashioned the isomorphic CLEC business models, which in turn contributed to the demise of these companies and thus the burst of the telecom bubble. Evidence of the institutional influences on CLECs and the actors exerted the influences are presented and their consequences are discussed. © Springer Science + Business Media, LLC 2006.",Business models; Competitive local exchange carriers; Institutional isomorphism; Institutional theory; Telecom industry,10,Information Systems Frontiers,2006 1509,Bichler M.,Trading Financial Derivatives on the Web - An Approach Towards Automating Negotiations on OTC Markets,"Derivative instruments have become increasingly important to financial institutions, institutional investors, traders and private individuals throughout the world, both as risk-management tools and as a source of revenue. The volume of over-the-counter (OTC) traded derivatives has increased enormously over the past decade, because institutional investors have often had a need for special derivative products which are not traded on organized exchanges. An important feature of OTC trading is the bargaining on multiple attributes of a contract such as price, strike price and contract maturity. Negotiation on multiple attributes of a deal is currently not supported by electronic trading floors. In this paper we describe an approach of how to automate the multi-attribute multilateral negotiations using a Web-based trading system. First, we will give an overview of various approaches to supporting or automating negotiations on multiple attributes. Then we will introduce multi-attribute auctions, an extension of single-sided auction theory and analyze preliminary game-theoretic results. Finally, we will show a Web-based electronic trading system for OTC derivatives, based on multi-attribute auctions.",Electronic exchanges; Financial derivatives; Microeconomic engineering; Multi-attribute auctions; OTC trading,13,Information Systems Frontiers,2000 1510,Jonkers H.; Lankhorst M.M.; Ter Doest H.W.L.; Arbab F.; Bosma H.; Wieringa R.J.,Enterprise architecture: Management tool and blueprint for the organisation,"The importance of enterprise architecture (EA), and its importance as a management tool and organizational blue print, is discussed. Architecture at the level of an entire organization is referred to as enterprise architecture (EA). It is a coherent whole of principles, methods and models that are used in the design and realization of the enterprise's organizational structure, business processes, information systems, and infrastructure. EA is an aid in guarding the essentials of the business, while still allowing for maximal flexibility and adaptability. EA provides the blueprint for systematically defining an organization's current or future environment, coupled with a process for development and maintenance, and as a key planning discipline it helps guide and optimize an organization's IT investments and translate business strategies into implementable technology solutions.",,174,Information Systems Frontiers,2006 1511,Greenstein S.,The Commercialization of Information Infrastructure as Technological Mediation: The Internet Access Market,"The study interprets the geographic diffusion of Internet Service Providers (ISPs) and the expansion of ISPs' product lines in terms of the market for technological mediation. A firm involved in technology mediation takes advantage of gaps between general technological opportunities and particular user needs in specific places at particular times. If the economic opportunities are fleeting, then so too is the business. If the economic opportunities are renewed frequently, then the business can grow and adapt to take advantage of them. The concept of technological mediation helps us understand business behavior accompanying the commercialization of internet access technology. © 2000 Kluwer Academic Publishers.",Access; Electronic commerce; Infrastructure; Internet; ISP,8,Information Systems Frontiers,2000 1512,Ye N.; Farley T.; Lakshminarasimhan D.,An attack-norm separation approach for detecting cyber attacks,"The two existing approaches to detecting cyber attacks on computers and networks, signature recognition and anomaly detection, have shortcomings related to the accuracy and efficiency of detection. This paper describes a new approach to cyber attack (intrusion) detection that aims to overcome these shortcomings through several innovations. We call our approach attack-norm separation. The attack-norm separation approach engages in the scientific discovery of data, features and characteristics for cyber signal (attack data) and noise (normal data). We use attack profiling and analytical discovery techniques to generalize the data, features and characteristics that exist in cyber attack and norm data. We also leverage well-established signal detection models in the physical space (e.g., radar signal detection), and verify them in the cyberspace. With this foundation of information, we build attack-norm separation models that incorporate both attack and norm characteristics. This enables us to take the least amount of relevant data necessary to achieve detection accuracy and efficiency. The attack-norm separation approach considers not only activity data, but also state and performance data along the cause-effect chains of cyber attacks on computers and networks. This enables us to achieve some detection adequacy lacking in existing intrusion detection systems. © Springer Science + Business Media, LLC 2006.",Computer and network security; Cyber attacks; Intrusion detection; Signal detection; Signal processing,9,Information Systems Frontiers,2006 1513,Masterton S.; Watt S.,"Oracles, Bards, and Village Gossips, or Social Roles and Meta Knowledge Management","Knowledge management systems are used widely in many different organizations, yet there are few models and theories which can be used to help introduce and apply them successfully. In this paper, we analyze some of the more common problems for knowledge management systems. Using this background, we adapt models and theories from social and organizational psychology and computer supported collaborative work, and discuss a variety of different knowledge management systems in these contexts. We argue that knowledge management systems routinely adopt different social roles within an organization, and that these social roles can have a major influence on a system's acceptability. With these principles in mind, we draw out some general practical lessons, and a ""character space"" framework, which can help to inform the design of future knowledge management systems, so as to minimize the problems of acceptability within a given organization.",Groupware; Intelligent agents; Knowledge management tools; Social roles,11,Information Systems Frontiers,2000 1514,Kwiat K.,Using Markets to Engineer Resource Management for the Information Grid,"Information systems are continually expanding as evidenced by the doubling of Internet connections every year. Similar growth is exhibited by information systems in defense. The Air Force's goals to achieve global awareness, dynamic planning/execution, and global information exchange involve the technologies to provide information to the warrior anywhere, anytime, and for any mission. This far-reaching enterprise will necessarily span multiple networks and computing domains of both the commercial and military varieties. As a result, many users with different goals and priorities vie for the communication and computing resources of the information grid. Managing this vast system to assure dependable operation that maintains users' quality of service levels has led researchers to propose economic models to solve the resource management problem. Information technology has begun to fundamentally alter the way business is conducted, and there is synergy between e-commerce and the management of the underlying information resources on which it runs. This paper examines the envisioned market-based, large-scale information systems for defense. Due to their criticality, these systems must also manage resources to provide survivability in the presence of information attacks. This potential for technology transfer from the defense sector to the commercial sector are described. Conversely, the leveraging of research performed in the non-military realm of e-commerce to reach the Air Force's goals will also be explored.",Distributed information systems; Market-based control; Resource management; Survivability,3,Information Systems Frontiers,2002 1515,Wu K.-L.; Chen S.-K.; Yu P.S.,Efficient processing of continual range queries for location-aware mobile services,"Efficient processing of continual range queries is important in providing location-aware mobile services. In this paper, we study a new main memory-based approach to indexing continual range queries to support location-aware mobile services. The query index is used to quickly answer the following question continually: ""Which moving objects are currently located inside the boundaries of individual queries?"" We present a covering tile-based (COVET) query index. A set of virtual tiles are predefined, each with a unique ID. One or more of the virtual tiles are used to strictly cover the region defined by an individual range query. The query ID is inserted into the ID lists associated with the covering tiles. These covering tiles touch each other only at the edges. A COVET index maintains a mapping between a covering tile and all the queries that contain that tile. For any object position, search is conducted indirectly via the covering tiles. More importantly, a COVET-based query index allows query evaluation to take advantage of incremental changes in object locations. Computation can be saved for those objects that have not moved outside the boundaries of covering tiles. Simulations are conducted to evaluate the effectiveness of the COVET index and compare virtual tiles of different shapes and sizes. © 2005 Springer Science+Business Media, Inc.",Continual range queries; Location-aware service; Location-based service; Mobile computing; Mobile E-service; Query indexing,20,Information Systems Frontiers,2005 1516,De Moor A.,Language/Action Meets Organisational Semiotics: Situating Conversations with Norms,"Virtual professional communities require a strong co-evolution of their social and information systems. To ensure that the evolutionary process of their socio-technical systems is viable, a legitimate user-driven specification process is required. Such a process helps to ensure the meaningfulness and acceptability of specification changes. A specification method supporting this process should be grounded in the neo-humanist paradigm so that subjectivist and conflict aspects receive proper attention. Two related subfields of information science that have roots in this paradigm are the Language/Action Perspective (LAP) and organisational semiotics (OS). The RENISYS method for specification of the socio-technical systems of virtual professional communities is presented. It combines aspects from both LAP and OS, by building on work done in the DEMO (LAP) and MEASUR (OS) methodologies. It thus provides an operationalization of neo-humanist ideals that can help to extend theoretical and empirical research.",DEMO; Language/action perspective; Legitimacy; MEASUR; Neo-humanism; Norms; Organisational semiotics; RENISYS; Socio-technical systems; Virtual communities,20,Information Systems Frontiers,2002 1517,Scott J.E.; Vessey I.,Implementing Enterprise Resource Planning Systems: The Role of Learning from Failure,"ERP implementations remain problematic despite the fact that many of the issues are by now quite well known. In this paper, we take a different perspective from the critical success factors and risks approaches that are common in the information systems discipline to explain why ERP implementations fail. Specifically, we adapt Sitkin's theory of intelligent failure to ERP implementations resulting in a theory that we call ""learning from failure."" We then examine from the viewpoint of this theory the details of two SAP R/3 implementations, one of which failed while the other succeeded. Although it is impossible to state, unequivocally, that the implementation that failed did so because it did not use the approach that was derived from the theory, the analysis reveals that the company that followed many of the tenets of the theory succeeded while the other did not.",Enterprise resource planning systems; Enterprise systems; ERP implementation; Intelligent failure; Learning from failure; Organizational learning,171,Information Systems Frontiers,2000 1518,Lauer T.W.,Questions and Information: Contrasting Metaphors,"This article examines metaphors for question asking, information and knowledge in the context of knowledge management. Metaphors discussed include: information is a resource, knowledge is a product, a good question is an irritant, and questions are the enemies of authority. The analysis draws on current theories of metaphor from the cognitive sciences as a basis for understanding the conceptual entailments of these terms for the MIS field. Churchman's inquiring systems are discussed as an example of a question-centric approach to knowledge management. The article concludes that a greater emphasis on inquiry would offer a beneficial perspective for practices concerned with information quality and knowledge management.",Information; Information quality; Knowledge; Knowledge management; Metaphors; Questions,10,Information Systems Frontiers,2001 1519,Houssos N.; Gazis V.; Alonistioti A.,Enabling delivery of mobile services over heterogeneous converged infrastructures,"Traditionally, end customers have been offered different categories of communication, data and media services (e.g., fixed/mobile voice, fixed/mobile data, broadcasting) through vertically separated, rigidly integrated infrastructures. Major advances in a variety of technological fields, mainly in the area of mobile computing and networking, have created prospects for a fully converged environment, where ubiquitous access to an abundance of value-added services will be offered over a single, as perceived by the users, highly reconfigurable system. This vision can be enabled by the seamless ""plugging"" of diverse access networks to a high-speed IP backbone; however the path to its realization poses a variety of additional challenges. The required support of complicated business models and service delivery over highly diverse contexts introduces significant complexity to service management and provision. The present contribution presents object-oriented mediating service management platforms as a catalyst for making these demanding tasks feasible, identifies their desired functionality and provides an overview of such a distributed framework that we have designed and prototyped. Furthermore, we demonstrate that the latter is able to be a critical enabler of flexible, adaptable service provision over future heterogeneous networks, while supporting advanced business paradigms.",3G; 4G; Adaptability; Business models; Converged networks; Mobile service provision; Reconfigurability,8,Information Systems Frontiers,2004 1520,Ray P.; Shahrestani S.A.; Daneshgar F.,The role of fuzzy awareness modelling in cooperative management,"Cooperative management is concerned with the management of networks and services involving the cooperation of a number of human/organizational entities. One of the prerequisites for efficient management of these complex systems is related to understanding of the roles of humans and the ways hey interact with each other. Cooperative management Methodology for Enterprise Networks (CoMEN) achieves these objectives by defining an abstract measure of cooperation called Awareness level that is based on Computer Supported Cooperative Work (CSCW) concepts and techniques. In view of the abstract nature of the awareness level definitions, it is not clear how abstract awareness levels can be accurately translated into equivalent cooperative management design parameters. This paper explores the notion of fuzzy sets that enables the use of linguistic values for awareness levels. This is aimed at unveiling of the deficiencies in the existing collaborative support tools with a view to developing more effective cooperative applications. We also model the CSCW tools in terms of repositories and communication mechanisms using fuzzy notions with a view to arrive at a formal design methodology for cooperative management systems. The idea has been illustrated with a case study in a large telecom organization. © 2005 Springer Science + Business Media, Inc.",Awareness modelling; Cooperative management; CSCW; Fuzzy logic; Telecommunications,26,Information Systems Frontiers,2005 1521,Yoon S.; Suh H.,Ensuring IT consulting SERVQUAL and user satisfaction: A modified measurement tool,"This paper provides the newly developed IT consulting SERVQUAL measurement tool. In an attempt to measure the IS customers' perceived quality of the consulting services they received, the researchers developed a diagnostic tool of SERVQUAL based on the solid theoretical background, which can specifically be applied to the IT consulting service sector. It is composed of 6 dimensions of reliability, responsiveness, assurance, empathy, process and education, and the former four are derived from IT SERVQUAL and the latter two are added to consider the characteristics of IT consulting service. To develop IT consulting SERVQUAL, 7 consultants having over the 10 years careers, 3 customers having much experienced of consulting service, and 2 professors majoring in MIS have examined the constructs and the items of questionnaires. And this research had been applied to 86 respondents of 42 different organizations that had received IT consulting services over 2 past years to ensure the validation of this tool. The correlation and the factor analyses were conducted for validation of the measurement tool. The results indicated that six different areas in the measurement tool are significantly related with level of the customer satisfaction in spite of their few problems in its validation and its application in the field will be helpful to identify their problems and make plans for advancement.",IT consulting service; Measurement tool; Service quality; SERVQUAL,65,Information Systems Frontiers,2004 1522,Schoop M.,Electronic Markets for Architects - The Architecture of Electronic Markets,"In recent years there has been a move towards more cooperation in the construction industry. While the traditional practice is that the architect chooses the trades, provides the construction plan, and tells the trades what to do, a new initiative has been formed to create cooperative construction teams. Here the architect will discuss details of the construction plan with the trades concerned and all parties work cooperatively on the construction project. This means that there will be many coordination tasks and that communication plays a pivotal role. The paper presents a framework for and an implementation of an electronic marketplace to support such cooperative construction teams. It will be argued that there must be a co-design of the business system (i.e. cooperative construction teams) and the IT system (i.e. the marketplace including the search, negotiation, and fulfilment phases) for efficiently supporting small and medium-sized companies participating in cooperative teams and interacting on electronic marketplaces.",Architecture; Communication modelling; Communication system; Cooperation; Electronic marketplace; Language-action perspective; Negotiation support,18,Information Systems Frontiers,2002 1523,Lehner F.; Maier R.K.,How Can Organizational Memory Theories Contribute to Organizational Memory Systems?,"Organizational memory systems (OMS) support organizations to ensure organizational learning, flexibility and efficiency and the management of change. The paper describes the term organizational memory and reviews a set of theories contributing to this field. As organizational memory is considered interdisciplinary, theories are drawn from research fields as different as organization science, psychology, sociology and artificial intelligence. The consequence is that the design of information systems supporting organizational memory has to be seen in this very specific context which leads to different perspectives contrasting traditional software development. These different perspectives are integrated into our view on organizational memory systems. The paper is concluded by an outlook on the main research questions which we intend to address in our research.",Knowledge management; Knowledge management system; Organizational intelligence; Organizational learning; Organizational memory; Organizational memory system,52,Information Systems Frontiers,2000 1524,Hansen J.V.; McDonald J.B.,A Generalized Model for Predictive Data Mining,"This paper describes a flexible model for predictive data mining, EGB2, which optimizes over a parameter space to fit data to a family of models based on maximum-likelihood criteria. It is also shown how EGB2 can integrate asymmetric costs of Type I and Type II errors, thereby minimizing expected misclassification costs. Importantly, it has been shown that standard methods of computing maximum-likelihood estimators are generally inconsistent when applied to sample data having different proportions of labels than are found in the universe from which the sample is drawn. We show how a choice estimator based on weighting each observation's contribution to the log-likelihood function, can contribute to estimator consistency and how this feature can be implemented in EGB2.",Choice estimator; Data mining; Misclassification costs; Prediction,10,Information Systems Frontiers,2002 1525,Richardson S.M.; Courtney J.F.; Paradice D.B.,An Assessment of the Singerian Inquiring Organizational Model: Cases from Academia and the Utility Industry,"The Singerian model of inquiring organizations is reviewed (Proceedings of the Americas Conference on Information Systems, Phoenix, Arizona Aug. 16-18,1996:443-445; Australian Journal of Information Systems, 1998;6(1):3-15, reprinted in Foundations of Information Systems: Towards a Philosophy of Informative Technology, http://www.cba.uh.edu/∼ parks/fis/fisart.htm.) and two cases of organizations representing the Singerian approach are analyzed. The Singerian organization, based on Churchman's (The Design of Inquiring Systems: Basic Concepts of Systems and Organizations, New York, NY: Basic Books Inc., 1971.) Singerian inquiring system, has ethical purposes, treats employees, customers and other stakeholders with trust and respect, and pursues socially responsible goals, including a respect for the environment. Decision making in Singerian organizations is holistic and systemic, and includes diverse stakeholders, thus requiring an open, cooperative culture, wherein debate is encouraged. Authority is diffuse. Measurement is fundamental. A system of measures is continuously monitored, refined, compared and revised to assess progress. Cooperation and communication are supported with various types of groupware, including e-mail, electronic meeting systems, group support systems, negotiation support systems, discussion forums, knowledge bases, knowledge management systems and the like. The Internet and World Wide Web may serve as resource and dissemination agents for ""exoteric"" knowledge created by the organization. Two organizations, an Energy Service Company and an academic Center for the Management of Information Systems, are analyzed for their conformance to and success with the Singerian approach. The organizations tended to prosper when the model was followed, but ran into difficulties when it was not.",Inquiring organizations; Inquiring systems; Learning organizations; Organizational learning; Systems theory,24,Information Systems Frontiers,2001 1526,Lehmann H.P.; Shortliffe E.H.,Information technology support of clinical research: An introduction,The role of information technology (IT) supports in the field of biomedical research was discussed. It was observed that Information Technology has the potential to make fundamental changes in biomedical research and clinical practise. IT support of basic science and clinical research were in the process of shifting from a craft-oriented venture focused on individual functions and systems to a whole-systems-oriented enterprise that dealt with the entire research process. The informatics support of clinical research were found to be helpful and could even alter the very nature of research and scientific interactions.,,3,Information Systems Frontiers,2003 1527,Orman L.V.,Optimum design of electronic communities as economic entities,"Electronic communities can be designed to organize consumers, to pool their purchasing power, and to guide their purchasing decisions. Such commercial electronic communities have the potential to facilitate the creation of novel marketplaces, and even radically change the buyer-seller interaction, as physical communities did throughout the history. Commercial electronic communities are groups of consumers that participate in the marketplace as a single unit. In addition to bargaining power gained from such bundling, such communities can expand markets by reducing market uncertainty, and they have the potential to drastically reduce consumers' transaction costs, by facilitating group transactions and bulk purchasing. Communities are characterized by their size, their pricing strategy, and their membership characteristics. Analytical models and numeric analysis is utilized to compute the optimum size of a community for given market characteristics. Two major community pricing strategies are analyzed to improve the community design, and the conditions are derived where one dominates the other. Finally, market segmentation techniques are introduced to control the membership characteristics of the community to further improve the design. © Springer Science + Business Media, LLC 2006.",Consumer surplus; Economics of markets; Electronic business models; Electronic communities; Electronic markets; Market design,6,Information Systems Frontiers,2006 1528,Greefhorst D.; Koning H.; Van Vliet H.,The many faces of architectural descriptions,"In recent years architecture has acquired recognition as playing a pivotal role in change processes. Despite this recognition, describing architecture has proven to be difficult. Architecture frameworks have been defined to address this problem. However, there are many of them, and together they leave us with seemingly contradicting terminology. What are the underlying forces that caused people to create so many different frameworks? What do these frameworks teach us about the essence of architecting? Where do I start to select or create a framework for my current project? With these questions in mind we set out to perform a comparison of existing architecture frameworks. We ended up with a deeper understanding of the function of a framework, and ""discovered"" nine fundamental dimensions that seem to underlie architectural thinking. These ""base dimensions"" can be used to clarify the meaning of individual architecture documents independent of the framework they originate from, and they can be helpful in defining new architecture frameworks or situational architecture descriptions. In this paper we also relate our findings to IEEE 1471, which is another important generalisation of existing frameworks. © Springer Science+Business Media, LLC 2006.",Architectural dimensions; Architecture frameworks; IEEE 1471,48,Information Systems Frontiers,2006 1529,Umar A.,IT infrastructure to enable next generation enterprises,"Next Generation Enterprises (NGEs) rely on automation, mobility, real-time business activity monitoring, agility, and self-service over widely distributed operations to conduct business. It is important to study and analyze such enterprises because they will drive the future industry and job markets. This paper gives a quick overview of NGEs and proposes a conceptual framework for analyzing the IT infrastructure needed to support the NGEs. A systematic discussion and analysis of key building blocks, their interrelationships, and main trends is presented with an emphasis on monitoring and split-second reaction times needed across widely distributed business units of such enterprises. © 2005 Springer Science + Business Media, Inc.",Enterprise application integration; IT infrastructure; Mobile services; Next Generation Internet; NGE; Real-time enterprises; Self services,42,Information Systems Frontiers,2005 1530,Davis J.G.; Subrahmanian E.; Konda S.; Granger H.; Collins M.; Westerberg A.W.,Creating Shared Information Spaces to Support Collaborative Design Work,"The provision of computer support for collaborative work is a central concern for Information Systems (IS) research and practice. In this paper we present the details of an information flow study undertaken in the household division of a large European design and manufacturing company (Delta). The goal of the study was to elicit user requirements for a computer system to facilitate the collaborative work of new product design teams. These requirements form the basis for the design and development of a Web-based LIRÉ (Living Repository) prototype system, the functionalities, features, and rationale of which are discussed. We also present the results of the evaluation of LIRÉ by the users at Delta and our observations on enhancing the sophistication and usefulness of this class of system. A production version based on the prototype but using commercially available software is currently in use by the New Product Development group at Delta.",Collaborative work; Information flow studies; Repositories; Workflow systems,41,Information Systems Frontiers,2001 1531,Ko I.S.; Leem C.S.,An improvement of response speed for electronic commerce systems,"Now that the number of electronic commerce (hereunder called e-commerce) users has been explosively increasing, the consequent heavy network traffic leads to the delayed service of the e-commerce systems. This paper focuses on operational efficiency and response speed of the e-commerce systems. An e-commerce system, with a hierarchical structure based on the local server, is designed. And we proposed a web object replacement algorithm with heterogeneity of a web object. The algorithm is designed with a divided scope that considered size reference characteristic and reduced size heterogeneity on web object. The performances of the system and algorithm are analyzed with an experiment. With the experiment results, the algorithm is compared with previous replacement algorithms, and we confirm with 10-20% performance improvement of object-hit ratio gain. And we get with 15-30% performance improvement of response speed with proposed system.",E-commerce; Local server; Network traffic; Object-hit ratio; Response speed; System load; Web server; Web-cache,8,Information Systems Frontiers,2004 1532,Chung J.-M.; Han S.-W.; George M.L.; Zhang Y.; Natarajan T.S.,A wireless instructor system for Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP),"The Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP) concept has been established with the objective of extending and enhancing thee-learning experience of distance education, especially for classes that involve laboratory (lab) experiments. The CSCLIP concept defines ""immersive presence"" as an inherent requirement that enables cognitive, affective, and most importantly psychomotor learning objectives to integrate into designs and concepts for next generation e-learning systems (Sharda et~al., 2003). Within the CSCLIP architectural framework, the Wireless Instructor (WI) system has been conceptualized and developed as an essential device to effectively support ""teaching while roaming"" instructional features for both local and distance students. The WI system provides cost effective means to establish a real-time immersive presence for the distance learning (DL) student and his/her lab group peers. The technical design and system architecture to create a WI system are introduced in this paper. The objective of the WI system is to make the learning experience more vivid and interactive by enabling the DL students, as well as the local students that are not in the same room with the instructor(s) at the same time, to be able to flexibly interact with the instructor(s) in real-time. With this system the students can experience real-time or non-real-time virtual tours with the instructor(s), enabling the students to visit places that may not be easily accessible due to distance, limited space and/or time, cost, or possible danger. The WI system consists of two major sub-components. First is a wireless audio and video (AV) system, which transfers real-time AV signals to and from the instructor(s) to all students. Second is the wireless instructor locator & data assistant system. These two systems can be combined into one WI unit, but as the applied development technologies are somewhat distinct, their features and architectural designs will be described separately throughout this paper. Integration of the two systems will enable further capabilities. © 2005 Springer Science+Business Media, Inc.",Bluetooth; Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP); Distance Learning (DL); Immersive Virtual Environments (IVE); Personal DigitalAssistant (PDA); Virtual Laboratory (VLab); Wireless Instructor (WI),1,Information Systems Frontiers,2005 1533,Leem C.S.; Yoon C.Y.; Park S.K.,A process-centered IT ROI analysis with a case study,"In order to achieve a meaningful IT ROI (Returns of Investment) analysis while taking into account the unique business processes of each industry, we should conduct research into a system to evaluate the effect of investment. In this paper, through careful consideration of the characteristics of the banking industry, a study on IT ROI is conducted from the perspective of business process. The process-centered IT ROI model for analysis discussed here consists of seven phases. The suggested model is explained and verified with a case study of a finance company that we shall call ""A"".",Analysis systems; Business process; Case study; It investment; ROI,10,Information Systems Frontiers,2004 1534,Wang Y.; Lo H.-P.; Yang Y.,"An integrated framework for service quality, customer value, satisfaction: Evidence from China's telecommunication industry","Service quality, customer satisfaction and customer value have become the priority of both manufacturers and service provider in the increasingly intensified competition for customers in today's customer-centered era. However, findings regarding service quality, customer satisfaction and customer value are rather divergent and related studies are fragmented, especially for the complicated interrelationships among them. Thus, less is known about the relative impacts of quality-related factors on customer value and customer satisfaction up to now and the moderating role of customer value in the relationship between service quality and customer satisfaction has been neglected. Further, it is very difficult to find related studies, supported by evidence, that focus on service quality, customer satisfaction and customer value, and their influences on customer behavior intentions in the telecommunication industry. In this paper, much attention is paid to the measurement model of service quality in China's mobile communication market based on the well-known SERVQUAL model, but with reasonable modification on the basis of focus group discussions and expert opinions to reflect the specific industry attributes and the special culture of China. By taking a disaggregated approach, the key drivers of service quality, customer value and customer satisfaction are first identified and the impact of customer perceived sacrifice on customer value is emphasized. Then attention is given to the systematic study of the dynamic relationships among them, especially the moderating effect of customer value on the relationship between service quality and customer satisfaction, which is followed by the examination of their influences on behavior intentions of customers. Results are based on the development of structural equation models using Partial Least Square technique.",Behavioral intentions; China; Customer satisfaction; Customer value; Moderating effect; Service quality; Telecommunication industry,315,Information Systems Frontiers,2004 1535,Lee C.-F.; Changchien S.W.; Wang W.-T.; Shen J.-J.,A data mining approach to database compression,"Data mining can dig out valuable information from databases to assist a business in approaching knowledge discovery and improving business intelligence. Database stores large structured data. The amount of data increases due to the advanced database technology and extensive use of information systems. Despite the price drop of storage devices, it is still important to develop efficient techniques for database compression. This paper develops a database compression method by eliminating redundant data, which often exist in transaction database. The proposed approach uses a data mining structure to extract association rules from a database. Redundant data will then be replaced by means of compression rules. A heuristic method is designed to resolve the conflicts of the compression rules. To prove its efficiency and effectiveness, the proposed approach is compared with two other database compression methods. © Springer Science + Business Media, LLC 2006.",Association rules; Data mining; Database compression,10,Information Systems Frontiers,2006 1536,Osei-Bryson K.-M.; Ngwenyama O.K.,Supporting semantic diversity in the relational data model: The case of multi-face attributes,"In recent years various proposals have been offered for increasing the richness of the relational data model by addressing specific user requirements, particularly with regard to structural and behavioral expressiveness. Although there have been some criticisms of the semantic limitations of the model, few proposals have emerged to address them. In this paper we propose an extension of the model to address some of the semantic limitations around the use of multi-face attributes in everyday activity. We present a formal discussion of multi-face attributes and suggest how they can be accommodated in the relational model and relational database software systems. The resulting model offers a higher-level expressiveness and will provide the user with increased flexibility in the input, output and storage of data, and the specification of queries. Finally we outline some of the implications for database design methods that emerge for the extension.",Data modeling; Data semantics; Relational data model,1,Information Systems Frontiers,2004 1537,Eatock J.; Paul R.J.; Serrano A.,Developing a Theory to Explain the Insights Gained Concerning Information Systems and Business Process Behaviour: The ASSESS-IT Project,"Business Process (BP) literature promotes the value of business processes as essential gearwheels that help organisations to reach their goals. Similarly, many process design approaches claim that information technology is a major enabler of business process, a view also shared by the Information Systems (IS) community. Despite this, BP and IS approaches do not provide clear guidance on how to coordinate the design of BP and IS. Nor is any indication of which modelling techniques could be used to detect and design IT opportunities within a business process context given. The ASSESS-IT project examined this domain and proposed the use of simulation techniques to achieve BP and IT integration. The outcome of this project gave indication that depicting the dynamic behaviour of IS could be very helpful for BP modellers to predict the impact that the insertion of IS may have on organisational processes. This paper proposes a simulation framework to depict IS behaviour within a BP simulation model, namely BPS/ISS, and tests it using the case study that was part of the ASSESS-IT project.",Business process; Discrete-event simulation; Information systems; Modelling,12,Information Systems Frontiers,2002 1538,Klaus H.; Rosemann M.; Gable G.G.,What is ERP?,"Though enterprise resource planning (ERP) has gained some prominence in the information systems (IS) literature over the past few years and is a significant phenomenon in practice, through (a) historical analysis, (b) meta-analysis of representative IS literature, and (c) a survey of academic experts, we reveal dissenting views on the phenomenon. Given this diversity of perspectives, it is unlikely that at this stage a broadly agreed definition of ERP can be achieved. We thus seek to increase awareness of the issues and stimulate further discussion, with the ultimate aim being to: (1) aid communication amongst researchers and between researchers and practitioners; (2) inform development of teaching materials on ERP and related concepts in university curricula and in commercial education and training; and (3) aid communication amongst clients, consultants and vendors. Increased transparency of the ERP-concept within IS may also benefit other aligned fields of knowledge.",Enterprise resource planning; Information system evolution; Literature review; Management information systems; Management support systems; Production planning information systems; Transaction processing systems,510,Information Systems Frontiers,2000 1539,Versteeg G.; Bouwman H.,Business architecture: A new paradigm to relate business strategy to ICT,"In this paper we address the concept of business architecture. We explain the concept and, based on a case study, discuss its relevance, operation, relationship with strategy and business models, and value for an organization. We also shortly discuss the approach that was taken to create the business architecture; how it was based on and derived from the business strategy. Business architectures contribute to clarify the complexity within an organization and form a useful starting point from which to develop subsequent functional, information, process and application architectures. We clarify these relationships through an architecture linkage model. Having an explicit business architecture also helps to structure the responsibilities within an organization, and to shape outsourcing activities, within the primary process as well as with regard to ICT-support. Business architectures contribute to an adequate ICT-governance in order to orchestrate the resources for critical business activities and how to manage the development and support for e-business efficiently. © Springer Science+Business Media, LLC 2006.",Architecture framework; Architecture linkage model; Business architecture; Business strategy; Demand organization; e-business; Information systems; Outsourcing; Shared service centers,124,Information Systems Frontiers,2006 1540,Porra J.,A Dialogue with C. West Churchman,"In 1996, the author attended a seminar on ethics given by C. West Churchman at the University of California, Berkeley. During that year, the author also interviewed Churchman several times regarding the future direction of information sciences in general and the information systems research field in particular. This article is a compilation of the seminar and the interviews. It is set in the context of both Churchman's earlier and his current views of a global ""god,"" ""good,"" ""kindness,"" and ""caring."" C. West Churchman holds that global ethics should lead to the study and design of information systems to solve large and difficult problems of the humankind such as poverty, crime and disease. His Global Ethical Management (GEM) of information sciences translates into abandoning the current goals and boundaries of the information sciences fields and changing what constitutes valid research to globally ethical endeavors.",Care; Ethics; Global ethical management; Good; Information sciences; Kind,17,Information Systems Frontiers,2001 1541,Kanfer A.G.; Haythornthwaite C.; Bruce B.C.; Bowker G.C.; Burbules N.C.; Porac J.F.; Wade J.,Modeling Distributed Knowledge Processes in Next Generation Multidisciplinary Alliances,"Current research on distributed knowledge processes suggests a critical conflict between knowledge processes in groups and the technologies built to support them. The conflict centers on observations that authentic and efficient knowledge creation and sharing is deeply embedded in an interpersonal face to face context, but that technologies to support distributed knowledge processes rely on the assumption that knowledge can be made mobile outside these specific contexts. This conflict is of growing national importance as work patterns change from same site to separate site collaboration, and millions of government and industrial dollars are invested in establishing academic-industry alliances and building infrastructures to support distributed collaboration and knowledge. In this paper we describe our multi-method approach for studying the tension between embedded and mobile knowledge in a project funded by the National Science Foundation's program on Knowledge and Distributed Intelligence. This project examines knowledge processes and technology in distributed, multidisciplinary scientific teams in the National Computational Science Alliance (Alliance), a prototypical next generation enterprise. First we review evidence for the tension between embedded and mobile knowledge in several research literatures. Then we present our three-factor conceptualization that considers how the interrelationships among characteristics of the knowledge shared, group context, and communications technology contribute to the tension between embedded and mobile knowledge. Based on this conceptualization we suggest that this dichotomy does not fully explain distributed multi-disciplinary knowledge processes. Therefore we propose some alternate models of how knowledge is shared. We briefly introduce the setting in which we are studying distributed knowledge processes and finally, we describe the data collection methods and the current status of the project.",,21,Information Systems Frontiers,2000 1542,Baker C.J.O.; Witte R.,Mutation mining - A prospector's tale,"Protein structure visualization tools render images that allow the user to explore structural features of a protein. Context specific information relating to a particular protein or protein family is, however, not easily integrated and must be uploaded from databases or provided through manual curation of input files. Protein Engineers spend considerable time iteratively reviewing both literature and protein structure visualizations manually annotated with mutated residues. Meanwhile, text mining tools are increasingly used to extract specific units of raw text from scientific literature and have demonstrated the potential to support the activities of Protein Engineers. The transfer of mutation specific raw-text annotations to protein structures requires integrated data processing pipelines that can co-ordinate information retrieval, information extraction, protein sequence retrieval, sequence alignment and mutant residue mapping. We describe the Mutation Miner pipeline designed for this purpose and present case study evaluations of the key steps in the process. Starting with literature about mutations made to protein families; haloalkane dehalogenase, bi-phenyl dioxygenase, and xylanase we enumerate relevant documents available for text mining analysis, the available electronic formats, and the number of mutations made to a given protein family. We review the efficiency of NLP driven protein sequence retrieval from databases and report on the effectiveness of Mutation Miner in mapping annotations to protein structure visualizations. We highlight the feasibility and practicability of the approach. © Springer Science+Business Media, Inc. 2006.",Biphenyl dioxygenase; Data mining; Haloalkane dehalogenase; Protein mutation; Protein structure annotation; Text mining; Xylanase,41,Information Systems Frontiers,2006 1543,Goethals F.G.; Snoeck M.; Lemahieu W.; Vandenbulcke J.,Management and enterprise architecture click: The FAD(E)E framework,"Enterprises are living things. They constantly need to be (re-)architected in order to achieve the necessary agility, alignment and integration. This paper gives a high-level overview of how companies can go about doing 'enterprise architecture' in the context of both the classic (isolated) enterprise and the Extended Enterprise. By discussing the goals that are pursued in an enterprise architecture effort we reveal some basic requirements that can be put on the process of architecting the enterprise. The relationship between managing and architecting the enterprise is discussed and clarified in the FAD(E)E, the Framework for the Architectural Development of the (Extended) Enterprise. © Springer Science+Business Media, LLC 2006.",Architecture descriptions; Enterprise architecture framework; FADE; FADEE; Framework for the Architectural Development of the Extended Enterprise; Management levels; Zachman,46,Information Systems Frontiers,2006 1544,Eden A.H.,A Theory of Object-Oriented Design,"Progress was made in the understanding of object-oriented (O-O) design through the introduction of patterns of design and architecture. Few works, however, offer methods of precise specification for O-O design. This article provides a well-defined ontology and an underlying framework for the formal specification of O-O design: (1) We observe key design motifs in O-O design and architectures. (2) We provide a computational model in mathematical logic suitable for the discussion in O-O design. (3) We use our conceptual toolkit to analyze and compare proposed formalisms.",Design patterns; Formal foundations; Object oriented programming; Software architecture; Software design theory,29,Information Systems Frontiers,2002 1545,Chechik M.; Ding W.,Lightweight Reasoning about Program Correctness,"Automated verification tools vary widely in the types of properties they are able to analyze, the complexity of their algorithms, and the amount of necessary user involvement. In this paper we propose a framework for step-wise automatic verification and describe a lightweight scalable program analysis tool that combines abstraction and model checking. The tool guarantees that its True and False answers are sound with respect to the original system. We also check the effectiveness of the tool on an implementation of the Safety-Injection System.",Abstract interpretation; CTL; Model checking; Program analysis,3,Information Systems Frontiers,2002 1546,Wirtz G.; Weske M.; Giese H.,The OCoN Approach to Workflow Modeling in Object-Oriented Systems,"Workflow management aims at modeling and executing application processes in complex technical and organizational environments. Modern information systems are often based on object-oriented design techniques, for instance, the Unified Modeling Language (UML). These systems consist of application objects which collaborate to achieve a common goal. Although application objects collaborate in the context of business processes that can be supported by workflow technology, workflow modeling is typically done with proprietary workflow languages. Hence, two separate formalisms are present for modeling application objects and workflows. In this paper we try to remedy this situation by proposing the use of Object Coordination Nets (OCoN) for workflow modeling. OCoN nets provide a seamless integration with UML structure diagrams. The OCoN formalism also helps to deal with all relevant aspects of modeling complex workflow systems in a scalable and consistent manner.",Object-orientation; Petri nets; Workflow design strategies; Workflow modeling,19,Information Systems Frontiers,2001 1547,Balabko P.; Wegmann A.,Systemic classification of concern-based design methods in the context of enterprise architecture,"Enterprise Architecture (EA) is a relatively new domain that is rapidly developing. ""The primary reason for developing EA is to support business by providing the fundamental technology and process structure for an IT strategy"" [TOGAF]. EA models have to model enterprises facets that span from marketing to IT. As a result, EA models tend to become large. Large EA models create a problem for model management. Concern-based design methods (CBDMs) aim to solve this problem by considering EA models as a composition of smaller, manageable parts-concerns. There are dozens of different CBDMs that can be used in the context of EA: from very generic methods to specific methods for business modeling or IT implementations. This variety of methods can cause two problems for those who develop and use innovative CBDMs in the field of Enterprise Architecture (EA). The first problem is to choose specific CBDMs that can be used in a given EA methodology: this is a problem for researchers who develop their own EA methodology. The second problem is to find similar methods (with the same problem domain or with similar frameworks) in order to make a comparative analysis with these methods: this is a problem of researchers who develop their own CBDMs related to a specific problem domain in EA (such as business process modeling or aspect oriented programming). We aim to address both of these problems by means of a definition of generic Requirements for CBDMs based on the system inquiry. We use these requirements to classify twenty CBDMs in the context of EA. We conclude with a short discussion about trends that we have observed in the field of concern-based design and modeling. © Springer Science+Business Media, LLC 2006.",Classification; Concern; Design; Enterprise architecture; Organization level; Systemic inquiry,30,Information Systems Frontiers,2006 1548,Stukas M.; Sicker D.C.,An evaluation of VoIP traversal of firewalls and NATs within an enterprise environment,"Recent advances in PBX architecture and multimedia communication protocols are pushing the current boundaries of IP telephony in enterprise networks. Two key barriers to this evolution are firewalls and NATs. While these devices play a pivotal role in protecting and managing network resources they also inhibit the sending and receiving of voice and video over the data network. Many different solutions for firewall and NAT traversal either currently exist or are being proposed by standard bodies, vendors and research institutions. Each initiative addresses different issues relating to security and interoperability within existing network infrastructures. This paper will examine all proposed solutions and determine which solution will enable IP telephony traversal of firewalls and NATs most advantageously in an enterprise network.",Enterprise; Firewall; NAT; SIP; VoIP,9,Information Systems Frontiers,2004 1549,Adam A.; Richardson H.,Feminist Philosophy and Information Systems,"This paper offers a new approach to the philosophical foundations of information systems (IS) through feminist philosophy and, in particular, feminist epistemology. This can be used to expose the universalizing tendency of many information systems and to show the importance of using real-life complex examples rather than the simplified examples often favored by philosophers. Within traditional epistemology and its relation to IS, subjectivity, the propositional/skills distinction and epistemic hierarchies are subject to arguments from feminist epistemology. With respect to the emerging critical school of IS, feminist epistemology, and within that, feminist standpoint theory, are used to examine the complexities of the positivist/anti-positivist position and the related concept of emancipation. In addition, it is argued that the liberal version of emancipation encapsulated in such systems may have an effect opposite to that of emancipation These issues are illustrated in an existing expert systems project.",Feminist epistemology; Feminist philosophy; Philosophical foundations of is,25,Information Systems Frontiers,2001 1550,Kotlyar M.; Jurisica I.,Predicting protein-protein interactions by association mining,"Identifying protein-protein interactions is a key problem in molecular biology. Currently, interactions cannot be reliably predicted on a proteome-wide scale but direct and indirect evidence for interactions is increasingly available from high-throughput interaction detection methods, gene expression microarrays, and protein annotation projects. In this paper we propose an association mining approach to integrating these diverse types of evidence. We apply this approach to a number of datasets consisting of interacting and non-interacting protein pairs annotated with different types of evidence. We identify patterns that distinguish interacting and non-interacting protein pairs, and use these patterns to assign a confidence level to proposed interactions. © Springer Science+Business Media, Inc. 2006.",Association mining; Protein-protein interactions,12,Information Systems Frontiers,2006 1551,Chalasani S.; Boppana R.V.,Adaptive multimodule routers for multiprocessor architectures,"Recent multiprocessors such as Cray T3D support interprocessor communication using partitioned dimension-order routers (PDRs). In a PDR implementation, the routing logic and switching hardware is partitioned into multiple modules, with each module suitable for implementation as a chip. This paper proposes a method to incorporate adaptivity into such routers with simple changes to the router structure and logic. We show that with as few as two virtual channels per physical channel, adaptivity can be provided to handle nonuniform traffic in multidimensional meshes. © 2005 Springer Science + Business Media, Inc.",Adaptive routing; Mesh networks; Multicomputers; Multimodule routers; Wormhole routing,1,Information Systems Frontiers,2005 1552,Georgakopoulos D.; Schuster H.; Cichocki A.; Baker D.,Process-Based E-Service Composition for Modeling and Automating Zero Latency Supply Chains,"E-services are teams of applications and humans (participating electronically) that work together to provide a service or a product. Virtual Enterprises (VEs) are business or organizations that provide products or services that are created and managed by combining and wrapping e-services provided by multiple independent enterprises. To operate efficiently VEs must form supply chains that utilize and manage e-services. In this paper, we propose a Service Oriented Process model (SOP) and describe the architecture and the basic design principles of the Collaboration Management Infrastructure (CMI), a system that supports SOP. SOP permits modeling of e-services and provides for e-service integration to construct efficient multi-enterprise supply chains. This is accomplished by modeling composite e-services as Multi-Enterprise Processes (MEPs). In particular, SOP supports service activities for modeling the services themselves, primitives for composing supply chains from services, and primitives for automating service coordination as required by a supply chain. The CMI system implements SOP and uses a semantic broker that has knowledge about the service capabilities an quality. Therefore, a MEP (and hence its supply chain) is capable of on-the-fly choice of the service providers that are best suited to its objectives (e.g., cheapest or fastest).",Component integration; Process modeling; Supply chain management; Web-service composition,7,Information Systems Frontiers,2002 1553,Waldo J.,"Virtual Organizations, Pervasive Computing, and an Infrastructure for Networking at the Edge","That the Internet is undergoing explosive growth is not news. However, how that growth is happening might come as a surprise to many. We are quickly reaching the point (if we have not already) when the majority of nodes on the Internet are not computers running browsers or web servers that are directly used by humans. Instead, the Internet is becoming the communication fabric for devices to talk to services, which in turn talk to other services. Humans are quickly becoming a minority on the Internet, and the majority stakeholders are computational entities that are interacting with other computational entities without human intervention. Such change brings significant challenges and opportunities to those who wish to use or aid in the use of this connecting fabric. In a world of humans browsing the net, we could design our network-available services assuming that the use and applicability of those services could be recognized by something with human intelligence. When services must be recognized and used by other computational entities, no such assumption can be made. The intrinsically human abilities of understanding the meanings of descriptions and being able to figure out how to interact with a service are not currently within the scope of computational entities, and may never be. With a human in the loop, we have been able to go far by using the well-understood client-server model of distributed computing. But as the human moves out of the loop, we enter into the realm of peer-to-peer distribution, an area in which our understanding is far more limited. At the same time that we are switching to this new model of services, we are also expanding the set of client devices that are used to access services over the network. We can no longer assume a pc-class device running a full browser on a megapixel bitmap screen. Instead, the services on the network will be accessed by cell phones, palm devices, home appliances, and embedded systems in our automobiles. Some of these devices will be stationary, but many of them will be mobile. The set of devices will be constantly changing, and the protocols needed to talk to these devices will be constantly evolving. Our current models for system administration are insufficient for this environment, and new models will need to be adopted that allow dynamic evolution and rapid change. This paper will center on the new problems that will be encountered as we go through this change in the Internet, and discuss some of the more promising approaches to the problems. In particular, we will see how a combination of traditional techniques in distributed systems and some of the technologies traditionally associated with agents can lead to a network that is self-administering and allows the kinds of rapid change and evolution that will be required if the Internet is to continue to grow and thrive.",Distributed computing; Java; Jini; Mobile code; Self healing networks,12,Information Systems Frontiers,2002 1554,Chen L.; L'Abbate M.; Thiel U.; Neuhold E.J.,The layer-seeds term clustering method: Enabling proactive situation-aware product recommendations in e-commerce dialogues,"In e-commerce it is often crucial to provide customers a large choice of relevant offers. Users, however, seldom provides complete and comprehensive descriptions of their desires, therefore user interfaces are needed that can generate automatically expanded queries to the product database and proactively enrich the ongoing dialogue with recommendations of suitable products. Automatic query expansion is mostly based on thesaurus and/or user profiles. In e-commerce applications, specific thesauri reflecting the webstore's product categories are desirable. This work describes a method for the automatic construction of a thesaurus based on existing categories of documents. A clustering algorithm, the ""Layer-Seeds method'', is introduced, which facilitates the automatic generation of thesaurus reflecting the specific vocabulary occurring in a given collection of documents. The clustering works on terms extracted from the documents in a certain category and organizes them in a tree-like hierarchical structure-a thesaurus. The thesaurus is then employed for automatic query expansion in an e-commerce application in order to obtain better results for product searching. Experiments yield evidence that a significant increase of user satisfaction is achieved. © 2005 Springer Science+Business Media, Inc.",Automatic construction; Conversational agents; e-commerce; Layer-seeds method; Proactivity; Query expansion; Thesaurus; User profiling and modelling,2,Information Systems Frontiers,2005 1555,Marcos E.; Marcos A.,"A Philosophical Approach to the Concept of Data Model: Is a Data Model, in Fact, a Model?","The design of the database is crucial to the process of designing almost any Information System (IS) and involves two clearly identifiable key concepts: schema and data model, the latter allowing us to define the former. Nevertheless, the term ""model"" is commonly applied indistinctly to both, the confusion arising from the fact that in Software Engineering (SE), unlike in formal or empirical sciences, the notion of ""model"" has a double meaning of which we are not always aware. If we take our idea of ""model"" directly from empirical sciences, then the schema of a database would actually be a model, whereas the data model would be a set of tools allowing us to define such a schema. The present paper discusses the meaning of ""model"" in the area ofSofnvare Engineering from a philosophical point of view, an important topic for the confusion arising directly affects other debates where ""model"" is a key concept. We would also suggest that the need for a philosophical discussion on the concept of data model is a further argument in favour of institutionalizing a new area of knowledge, which could be called: ""Philosophy of Engineering"".",Data model; Data schema; Model; Philosophy of Engineering; Philosophy of Science; Philosophy of Software Engineering,13,Information Systems Frontiers,2001 1556,Benson S.; Standing C.,"Effective Knowledge Management: Knowledge, Thinking and the Personal-Corporate Knowledge Nexus Problem","We argue that the intimate relationship between computer architecture and software has produced a professional mindset that is unsuited to the newer, knowledge-based business paradigms. Major software projects are ending in failure or do not yield their maximum potential and we suggest reasons why this is the case. In conclusion, we propose that Management Information Systems Curricula need to be revised to provide students with exposure to and practice in a variety of thinking styles. Organisations must change their structures and management styles if they are serious about managing knowledge. In making our case we briefly review the development of information systems as a discipline and the role of methodologies in the articulation of its paradigm. We end our paper with suggestions for future research.",Information systems; IS failures; Knowledge management; Thinking styles,16,Information Systems Frontiers,2001 1557,Shaw M.J.,Electronic Commerce: Integration of Web Technologies with Business Models,[No abstract available],,2,Information Systems Frontiers,2000 1558,Zbib R.; Anjum F.; Ghosh A.; Umar A.,Intrusion tolerance in distributed middleware,"Many existing and new applications rely on several layers of middleware services that must be able to withstand intrusions and attacks from a very wide range of players. In this paper we discuss the concept of Intrusion Tolerance in distributed middleware. We start by presenting a threat analysis of the current commercial middleware technologies. We then discuss basic intrusion tolerance techniques such as Fragmentation-Redundancy-Scattering (FRS) and Threshold Cryptography. Then follows a description of a generic architecture that builds upon these techniques to compensate for intrusion vulnerabilities in commercial middleware, and finally we briefly describe how this architecture can be generalized.",Intrusion tolerance; Middleware; Secure middleware,2,Information Systems Frontiers,2004 1559,Kræmmergaard P.; Rose J.,Managerial Competences for ERP Journeys,"This paper investigates the managerial competences required for the complex interactions required to successfully integrate an Enterprise Resource Planning system into an organization - the ERP journey. A feature of the study (a five year longitudinal study of a Danish production company implementing SAP R/3) was the rise and fall of the ERP project managers. The study showed that different stages of the ERP journey required different competences from the managers. A manager with a certain competence mix might successfully oversee part of the ERP journey, but a different blend of competences was required to manage other parts. The paper concludes that a wide range of competences are required: personal, business and technical. The competence mix should be expected to vary through the journey, and is often too much to expect of one person.",Change management; ERP systems; Managerial competences,71,Information Systems Frontiers,2002 1560,Ardagna D.; Francalanci C.; Piuri V.,Designing and rightsizing the information system architecture,"Information system design and sizing constitute a complex, top-down process that tailors the technology architecture to application requirements. Practitioners usually tackle this top-down process by focusing on individual design aspects, such as data or specific applications, and by relying on their previous experiences to compare alternative architectural solutions. Acquisition costs are usually accounted for, but related operating and maintenance costs are often neglected or underestimated. The complexity of optimizing individual design problems leads researchers to avoid a global optimization perspective and, thus, the IS architecture is usually a result of the juxtaposition of multiple local optima. This paper takes an overall perspective on the cost minimization problem of information system design to achieve a better trade-off between cost and performance over the whole expected life of the technology architecture. A comprehensive design methodology is discussed as an integrating framework that accounts for all categories of costs, including design, implementation, maintenance, and operation, to achieve a globally cost-minimizing solution.",Distributed systems; IS architecture; IT costs; Optimization; Resource allocation; Sizing,2,Information Systems Frontiers,2004 1561,Orman L.V.,"Electronic Markets, Hierarchies, Hubs, and Intermediaries","The impact of information technologies on organizations is difficult to predict, although critical for developing comprehensive organizational strategies. Much of the difficulty is traceable to the treatment of all information technologies as a single factor, when in fact different technologies may have drastically different impacts on the organization. Specifically, the distinction between two general classes of technologies, communication and information processing technologies, is studied. An analytical model is developed to show that these two classes of technologies have exactly the opposite impacts on the organization. Moreover, the impact also depends on the organization, and its existing structure. Communication intensive and processing intensive organizational structures are distinguished and they are shown to be impacted differently by information technologies. An analytical framework is developed to show a continuum of organizational structures, depending on their relative communication and processing intensity, and the effect of various technologies is shown to be to move the organization along that continuum. Communication and information processing technologies are shown to move the organization in opposing directions. Finally, the analytical framework is shown to be robust and valid under a wide variety of conditions, covering most real life organizations.",Information technologies; Organizational impact; Organizational structure; Taxonomy of technologies,12,Information Systems Frontiers,2002 1562,Hayman L.,ERP in the internet economy,"This paper discusses the future of Enterprise Resource Planning and (ERP) in the Internet Economy. In the Internet Economy, ERP as a distinct entity is giving way to a much broader value proposition that effectively fuses different forms of business applications and services. Back-office and front-office applications within an enterprise will come together, along with applications and services for value-chain collaboration between business partners. © 2000 Kluwer Academic Publishers.",,16,Information Systems Frontiers,2000 1563,Ziegler C.-N.; Lausen G.,Propagation models for trust and distrust in social networks,"Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contribution to Semantic Web trust management through this work is twofold. First, we introduce a classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for Semantic Web scenarios. Hereby, we devise an advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion. Moreover, we provide extensions for the Appleseed nucleus that make our trust metric handle distrust statements. © 2005 Springer Science+Business Media, Inc.",Balance theory; Semantic web; Spreading activation models; Trust; Trust propagation; Web of trust,265,Information Systems Frontiers,2005 1564,Champion D.; Stowell F.,Navigating the Gap between Action and a Serving Information System,"Creating, or adapting, information systems to support people undertaking purposeful action in organizational settings involves moving from: exploring the problem situation and thinking about what action to take, to thinking about how to support that action. In business settings this support will inevitably entail technology-based information systems. Most information system design approaches neglect the importance of the initial exploration and sense making phase and move directly to specifying the business process to be operationalised through the application of some software. The ideas described here have been developed with the intention of supporting a group of people navigating an inquiry through the shift in focus from: thinking about action, to thinking about support in a manner that promotes Client-led information system design. The ideas have been applied in practice through an Action Research field study in a UK banking organization and here we describe our navigational approach to IS design.",Client-led; Conversation modelling; Information systems design; Interpretive,10,Information Systems Frontiers,2002 1565,Glasgow J.; Kuo T.; Davies J.,Protein structure from contact maps: A case-based reasoning Approach,"Determining the three-dimensional structure of a protein is an important step in understanding biological function. Despite advances in experimental methods (crystallography and NMR) and protein structure prediction techniques, the gap between the number of known protein sequences and determined structures continues to grow. Approaches to protein structure prediction vary from those that apply physical principles to those that consider known amino acid sequences and previously determined protein structures. In this paper we consider a two-step approach to structure prediction: (1) predict contacts between amino acids using sequence data; (2) predict protein structure using the predicted contact maps. Our focus is on the second step of this approach. In particular, we apply a case-based reasoning framework to determine the alignment of secondary structures based on previous experiences stored in a case base, along with detailed knowledge of the chemical and physical properties of proteins. Case-based reasoning is founded on the premise that similar problems have similar solutions. Our hypothesis is that we can use previously determined structures and their contact maps to predict the structure for novel proteins from their contact maps. The paper presents an overview of contact maps along with the general principles behind our methodology of case-based reasoning. We discuss details of the implementation of our system and present empirical results using contact maps retrieved from the Protein Data Bank. © Springer Science+Business Media, Inc. 2006.",Analogy; Case-based reasoning; Contact maps; Protein structure; Secondary structure,19,Information Systems Frontiers,2006 1566,Liu S.; Turban E.; Lee M.K.O.,Software Agents for Environmental Scanning in Electronic Commerce,"To properly implement and use electronic commerce systems companies need to evaluate considerable amount of information from their business environment in activities such as environmental scanning. This information is needed both for strategic management and for operational decisions. However, the relevant information may be difficult to find and interpret due to information overload and the fact that the information may be in many locations. Fortunately, most of the information is on the Web “Internet, extranets”. To overcome the search problem, especially in large organizations, one should consider the use of software agents. This paper presents an overview for the utilization of such agents today and in the future by describing a prototype system designed for information monitoring and collection from Web sources for the pulp and paper industry. The paper also describes the use of other agents that can supplement the system in specific electronic commerce application areas. Finally, some implementation issues are discussed.",Electronic commerce; Environmental scanning; Information overload; Intelligent agents; Software agents; Technology adoption,10,Information Systems Frontiers,2000 1567,Etzion O.; Fisher A.; Wasserkrug S.,"E-CLV: A modeling approach for customer lifetime evaluation in e-commerce domains, with an application and case study for online auction","e-Commerce companies acknowledge that customers are their most important asset and that it is imperative to estimate the potential value of this asset. In conventional marketing, one of the widely accepted methods for evaluating customer value uses models known as Customer Lifetime Value (CLV). However, these existing models suffer from two major shortcomings: They either do not take into account significant attributes of customer behavior unique to e-Commerce, or they do not provide a method for generating specific models from the large body of relevant historical data that can be easily collected in e-Commerce sites. This paper describes a general modeling approach, based on Markov Chain Models, for calculating customer value in the e-Commerce domain. This approach extends existing CLV models, by taking into account a new set of variables required for evaluating customers value in an e-Commerce environment. In addition, we describe how data-mining algorithms can aid in deriving such a model, thereby taking advantage of the historical customer data available in such environments. We then present an application of this modeling approach-the creation of a model for online auctions-one of the fastest-growing and most lucrative types of e-Commerce. The article also describes a case study, which demonstrates how our model provides more accurate predictions than existing conventional CLV models regarding the future income generated by customers. © 2005 Springer Science+Business Media, Inc.",Customer lifetime value; e-commerce recency frequency monetary; Markov chain,29,Information Systems Frontiers,2005 1568,Mørch A.I.; Jondahl S.; Dolonen J.A.,Supporting conceptual awareness with pedagogical agents,"This paper describes a series of efforts in building and conceptualizing software agents for distributed collaborative learning. The agents are referred to as pedagogical agents. We have integrated pedagogical agents within two collaborative environments, TeamWave Workplace and Future Learning Environment. The role of agents in these environments differs from past work on software agents in their function as extended awareness mechanisms, focusing on task and concept awareness (conceptual awareness). Our approach is stimulated by Mead's theory of the 'Generalized Other'. The agents collect statistical information on user activity and analyze the information based on principles of collaboration and knowledge building (participation, group interaction, and scientific discourse). Furthermore, the agents define a trajectory in a pedagogical agent design space, which we define in terms of four dimensions: presentation, intervention, task, and pedagogy. We end the paper by comparing our approach with related work. © 2005 Springer Science+Business Media, Inc.",Awareness; Generalized other; Group interaction; Pedagogical agents; Virtual learning environments,15,Information Systems Frontiers,2005 1569,Lee M.K.O.; Cheung C.M.K.,Internet retailing adoption by small-to-medium sized Enterprises (SMEs): A multiple-case study,"Despite the proliferation of Internet retailing and the relative novelty and complexity of this phenomenon, very little theory-guided qualitative research has been conducted to improve our understanding of the adoption of Internet retailing project by SMEs. This study presents a theoretical framework for analyzing the adoption of Internet retailing for SMEs. Organizational readiness (IT sophistication, financial resources, and customer readiness), perceived benefits of Internet retailing, and environmental factors are proposed to be the key drivers of adoption of Internet retailing. This research was designed using a qualitative approach through in-depth case studies selected from firms in Hong Kong where there is a proliferation of SMEs. The contextual meaning and practical manifestation of the key adoption factors were captured through the case studies. Our findings provide preliminary support for the proposed research framework, and contribute towards a better conceptual and practical understanding of the main factors driving SMEs to adopt Internet retailing. Contrary to popular belief, customer readiness for Internet shopping was not found to be a significant factor influencing SMEs' decision to adopt Internet retailing.",Case studies; Electronic commerce; Innovation adoption; Internet retailing; Qualitative research; Small-to-medium sized enterprises,58,Information Systems Frontiers,2004 1570,Cobb B.R.; Shenoy P.P.,A comparison of Bayesian and belief function reasoning,"The goal of this paper is to compare the similarities and differences between Bayesian and belief function reasoning. Our main conclusion is that although there are obvious differences in semantics, representations, and the rules for combining and marginalizing representations, there are many similarities. We claim that the two calculi have roughly the same expressive power. Each calculus has its own semantics that allow us to construct models suited for these semantics. Once we have a model in either calculus, one can transform it to the other by means of a suitable transformation.",Bayesian networks; Dempster-Shafer belief functions; Valuation-based systems,68,Information Systems Frontiers,2003 1571,Shaw M.J.,Building an E-Business from Enterprise Systems,"Building their companies into successful e-businesses has become an important objective for today's enterprises. Conceptually, it embodies the enabling of the business with such capabilities as global networking, streamlining business processes, sharing information, agility in responding to the market, and intelligent decision making. But how can these concepts be implemented in actual enterprises? Why do these desirable attributes of business systems suddenly become the definition of competency of companies large and small? This paper describes the framework for building an e-business from the enterprise information systems' perspective. Increasingly enterprise systems have extended beyond the traditional business functions and include such new features as supply-chain management, customer relationship management and electronic commerce. The shifting focus is driven by the adoption of the Web as a new channel for product distribution, marketing, and interacting with customers. The integration of the traditional as well as the Web-oriented functions is the cornerstone for a successful e-business. This paper presents a framework for e-businesses that on one hand build on the enterprise systems but on the other hand encompasses the new e-business dimensions.",E-business management; Enterprise systems,25,Information Systems Frontiers,2000 1572,Fatolahi A.; Shams F.,An investigation into applying UML to the Zachman framework,"The Zachman framework is considered to be the most referenced framework for the purpose of enterprise architecture. It is commonplace to compare other frameworks with this basic one in order to show correctness and usability of those frameworks. However, this is more than a fashion, the Zachman framework is actually the best one. Despite of its popularity, the Zachman framework could be a challengeable one in practical situations because there are not enough well-known methods and tools covering all of its aspects. Three major challenges in using this framework, are discussed in this article. These challenges are lack of a methodology, a well-defined repository and a popular modeling notation. Focus of this article is on solving the last problem with the help of notations in UML (Unified Modeling Language) and UML Business Profile. At the first glance the topic seems to be already researched by others, but there are some major distinctions between this work and the others', which make it a unique one. Most of the other work tried to cover the framework using multiple class diagrams stereotyped in different ways. This work tries to cover the Zachman framework using all of the UML features, especially those, which are convenient in common modeling tools as well as ignoring unfamiliar symobls as it is used by some authors. A case study is used upon which we show how to apply the selected notation on a sample enterprise to develop cells in second and third rows of the framework. Models are tested to consider if they are supporting Zachman rules governing the framework. Furthermore, in order to see if they could be convincing enough, a statistical study is employed. Although results of these tests are relatively acceptable, the problem of inventing new modeling notations is mentioned as an open problem. © Springer Science+Business Media, LLC 2006.",The Zachman framework; UML; UML business profile,35,Information Systems Frontiers,2006 1573,Snoeck M.; Michiels C.,Domain modelling and the co-design of business rules in the telecommunication business area,"This paper discusses the development of an enterprise domain model in an environment where part of the domain knowledge is vague and not yet formalised in company-wide business rules. The domain model was developed for a young company starting in the telecommunications sector. The company relied on a number of stand-alone business support systems and sought for a manner to integrate them. There was opted for the development of an enterprise-wide domain model that had to serve as an integration layer to coordinate the stand-alone applications. A specific feature of the company was that it could build up its information infrastructure form scratch, so that many aspects of its business were still in the process of being defined. The paper will highlight parts of the Enterprise Model where there was a need for co-designing business rules together with the domain model. A result of this whole effort was that the company got more insight into important domain knowledge and developed a common understanding across functional areas of the way of doing business.",Business process modelling; Business rules; Domain modelling; Object-oriented analysis,6,Information Systems Frontiers,2002 1574,Liu K.; Sun L.; Bennett K.,Co-Design of Business and IT Systems-Introduction by Guest Editors,[No abstract available],,44,Information Systems Frontiers,2002 1575,Mowbray M.,Philosophically Based Limitations to Freedom of Speech in Virtual Communities,"This paper applies political philosophy to the question of freedom of speech in virtual communities. It takes as its starting point the philosophical justifications given for freedom of speech in (Greenawalt, in Computers, Ethics and Social Values, Prentice-Hall, 1995). For each of these justifications I discuss the types of speech to which they apply, and implications for virtual communities. The justifications imply several limitations to freedom of speech within a well-run virtual community. I give some examples in which the existence of virtual communities can be used to reflect on extant philosophical arguments and practices. By applying the list of steps for thinking about systems given in (Churchman, inThe Systems Approach, New York: Dell Publishing Co., Inc., 1968), I obtain a classification framework for thinking about the merits and demerits of a particular speech act, and describe a justification for freedom of speech, missing from Greenawalt 's list, that this classification helped me to identify. I give a summary of practical suggestions for administrators of virtual communities. Finally, I discuss why I consider the question of how to regulate speech in virtual communities matters, from a global perspective.",Freedom of speech; Virtual communities,6,Information Systems Frontiers,2001 1576,Abecker A.; Bernardi A.; Hinkelmann K.; Kühn O.; Sintek M.,"Context-Aware, Proactive Delivery of Task-Specific Information: The KnowMore Project","From an IT point of view, a key objective of successful knowledge management is to provide relevant and necessary information at the right time to support humans in accomplishing their tasks. This paper presents a prototypical system which meets this objective in an enterprise environment. Based on context information associated with the enterprise's business processes, an integration of workflow engine and information assistant enables active presentation of relevant information to the user. We describe the functionality of the system and elaborate (i) on necessary extensions to the business process models, (ii) the ontologies used for information modeling, and (iii) the integration of workflow engine and active information assistant. The prototype system has been developed in the KnowMore project of the DFKI Knowledge Management Group. © 2000 Kluwer Academic Publishers.",Business-process oriented knowledge management; Cooperative information system; Organizational memory,91,Information Systems Frontiers,2000 1577,Gruźdź A.; Ihnatowicz A.; Ślȩzak D.,Interactive gene clustering - A case study of breast cancer microarray data,"We present a new approach to clustering and visualization of the DNA microarray gene expression data. We utilize the self-organizing map (SOM) framework for handling (dis)similarities between genes in terms of their expression characteristics. We rely on appropriately defined distances between ranked genes-attributes, also capable of handling missing values. As a case study, we consider breast cancer data and the gene ESR1, whose expression alterations, appearing for many of the tumor subtypes, have been already observed to be correlated with some other significant genes. Preliminary results positively verify applicability of our approach, although further development is definitely needed. They suggest that it may be very effective when used by the domain experts. The algorithmic toolkit is enriched with GUI enabling the users to interactively support the SOM optimization process. Its effectiveness is achieved by drag&drop techniques allowing for the cluster modification according to the expert knowledge or intuition. © Springer Science+Business Media, Inc. 2006.",Breast cancer; DNA microarrays; Entropy; Missing values; Self-organizing maps,29,Information Systems Frontiers,2006 1578,Turetken O.; Sharda R.,Clustering-based visual interfaces for presentation of web search results: An empirical investigation,"The result of a typical web search is often overwhelming. It is very difficult to explore the textual listing of the resulting documents, which may be in the thousands. In order to improve the utility of the search experience, we explore presenting search results through clustering and a zoomable two-dimensional map (zoomable treemap). Furthermore, we apply the fisheye view technique to this map of web search clusters to provide details in context. In this study, we report on our evaluation of these presentation features. The particular interfaces evaluated were: (1) a textual list, (2) a zoomable two-dimensional map of the clustered results, and (3) a fisheye version of the zoomable two-dimensional map where the results were clustered. We found that subjects completed search tasks faster with the visual interfaces than with the textual interface, and faster with the fisheye interface than just the zoomable interface. Based on the findings, we conclude that there is promise in the use of clustering and visualization with a fisheye zooming capability in the exploration of web search results. © 2005 Springer Science + Business Media, Inc.",Human-computer interaction; Information overload; Information visualization; User study; Web search,32,Information Systems Frontiers,2005 1579,Goul M.; Corral K.; Demirkan H.,Database schema design for a web services supply chain manager: Requirements and proposed infrastructure,"Web services enable the commoditization of computer code components for distributed system execution in cross-organizational platforms via the Internet. At any point in time, the state of a set of composite applications and the web services they are consuming constitutes an instance of a new type of dynamic software supply chain. Proper management of what we refer to as this ""web services supply chain"" requires seamlessly integrated and automated B2B relationships with responsibilities for procurement, performance monitoring, benchmarking, cost allocation and ongoing relationship maintenance requiring new hybrid organizational infrastructure constructs. To cope with the increased complexity of managing this dynamic supply chain, we elaborate requirements and propose an exemplar database schema design with web-scripts as a means for pre-specifying and monitoring organizationally approved patterns of web service invocations. The database research challenges associated with long-running transactions are discussed in our schema design, including reflections of the realities associated with web-script failure, variable quality-of-service (QoS) levels, the share-ability of web-scripts between organizational business processes, the need for continuous updating of web-scripts by agents (human or automated), and the scalability of designs to accommodate evolutionary change. © 2005 Springer Science + Business Media, Inc.",Databases; Service composition patterns and stored procedure extensions; Web services management; WWW service engineering,7,Information Systems Frontiers,2005 1580,Ghosh S.,The Role of Modeling and Asynchronous Distributed Simulation in Analyzing Complex Systems of the Future,"The word simulate implies to imitate or to mimic while the word modeling refers to a small object, usually built to scale, that represents some existing object. Although the art of mimicking and modeling may be traced back to the beginning of civilization, with the emergence of computers, a few decades ago, the art of modeling and simulation experienced a remarkable transformation. The computational intelligence of the computer imparted the ability to encapsulate and simulate specific characteristics of not only living and inanimate objects but abstract concepts. While the human brain is equally capable of simulating abstract concepts, the precision and speed of the computers are unparalleled and they impart computer modeling and simulation a qualitative jump in its capability and fidelity. Also, while intimately connected to each other, modeling refers to the notion of representing the desired behavior of the target object or idea in the host computer and simulation refers to the execution of the model on a host computer. Today, towards the end of the twentieth century, the nature of modeling and simulation is undergoing another radical transformation. The emergence of economical and powerful computers coupled with the ability to network a large number of computers, promises the ability to model and simulate complex, real-world systems, that are rapidly becoming commonplace in the society, successfully and with a high degree of fidelity. Already, today 's real-world systems including complex banking, credit-card transaction, transportation, ground-based communication, and space-based tele-communication systems defy the analytical modeling that had characterized the efforts over the past three decades. Virtually all analytical studies are severely restricted in the number of variables and the number of interacting units that may be modeled. Tomorrow's systems are expected to be far more complex, implying that modeling and large-scale simulation may be the most logical and, often, the only vehicle to study them objectively. This paper presents a fundamental analysis of the nature of complex physical and natural processes that will increasingly constitute the challenging problems of the future. It then develops a set of principles for modeling complex systems. Finally, it examines the role of asynchronous, distributed simulation in the study of a number of real-world systems. In general, modeling and simulation enables one to detect design errors, prior to developing a prototype, in a cost effective manner, identify potential problems during system operation, detect rare and elusive errors, and investigate hypothetical concepts that do not exist in nature. Upon execution, the simulation provides greater quantitative and qualitative insight into the behavior of the actual system. In addition, an asynchronous, distributed simulation, executing on a loosely-coupled parallel processor, closely resembles the actual, operational system, yielding results that potentially reflect reality, as close as possible. Furthermore, elements of the simulation code that emulate the system behavior may be transferred directly onto the operational system with minimal modifications. The knowledge encapsulated in this paper, has been derived from a number of actual case studies involving the modeling and simulation of a number of real-world problems.",Complex processes; Distributed processing; Modeling; Physical and natural systems; Real-world problems; Simulation,5,Information Systems Frontiers,2002 1581,Kalakota R.; Konsynski B.,The Rise of Neo-Intermediation: The Transformation of the Brokerage Industry,"Developments in information technology and increased competition both within and outside the industry have led to the unbundling and desegregation of brokerage functions. Nimble on-line institutions like E*Trade and Microsoft Investor are usurping the roles traditionally played by full-service and discount brokerages, forcing some powerful firms to narrow their focus and others to broaden their product offerings. These changes raise the question: will full-service and discount brokerages continue to exist as we know them in the twenty-first century? To answer this question, the authors provide a new market transformation framework called Neo-Intermediation that helps explain how leading on-line firms are desegregating and reagregating functionality in order to create value in innovative ways. The pattern of change for brokerages is: • Unbundling of traditional services - market players examine the elements of the buyer and seller relationship; • Reallocation of authorities as the ""customer"" determines what they will do and what they will pay for in the market; • Creation of strategic alliances with complementors - sites/products whose products complement yours. This means that if a customer has their product, they would also want yours; and • Repackaging and emergence of both commodity and differentiated service providers that serve the needs of the ""new"" customer. The authors believe that these patterns are evident in all forms of financial services and form the basis of market interventions in most service industries. This paper addresses the transformation of the brokerage services marketplace. With new patterns of intermediation emerging, the winners of the future will be those who most successfully create new context bundles that meet customers' needs.",Brokerage; Digital commerce; Electronic markets; Intermediation,8,Information Systems Frontiers,2000 1582,Jain R.; Puglia S.; Wullert J.; Parmeswaran K.; Bakker J.-L.,The Mobile Application Server (MAS): An infrastructure platform for mobile wireless services,"There has been a surge of interest in developing advanced mobile voice and data services. One of the biggest challenges faced by service providers is to create new services efficiently and rapidly. We describe the motivation, architecture and design of the Mobile Application Server (MAS), a Java middle-ware prototype platform for mobile services which provides basic common building blocks required by mobile wireless applications, such as user profile management, location handling, device detection, content adaptation and e-wallet functions. The MAS is modular, flexible, and provides an open API for 3rd party service creation. Users can thus utilize a variety of access technologies (CDPD, cellular, 802.11, SMS, etc.) and delivery mechanisms (HTML, WML, VoiceXML, etc.) while application developers are spared the details of this heterogeneity. The MAS also interfaces in traditional telecommunications system (A/IN) elements such as SCPs as well as Next Generation Network (NGN) or converged-network elements such as Call Agents. We present application examples of the use of MAS, initial performance measurements and discuss some lessons learned from this experimental system. We conclude with directions for further work.",Mobile middleware; Pervasive computing; Wireless services,5,Information Systems Frontiers,2004 1583,Arora A.; Cooper G.; Krishnan R.; Padman R.,IBIZA: E-market Infrastructure for Custom-built Information Products,"The merger of electronic commerce, intelligent agent and distributed computing technologies over TCP/IP-based platforms enables the creation of electronic markets in new types of products featuring both human and software agents as actors. One such example is a market in custom-built information products. These are information products that have been constructed to meet specific requirements provided by the consumer. Examples include custom research reports, analysis, and computational objects. How should these markets be designed? What are the market mechanisms that should be used to coordinate the interactions between the actors? What should be the decision strategies employed by the software agents that participate in the market? IBIZA is a computational workbench that enables designers to create and simulate electronic markets in information products. It provides a repository of software agents, bidding strategies, brokering strategies and market mechanisms. Using the repository, designers can instantiate particular designs of electronic markets and conduct experiments to study the impact of design decisions on desired objectives. In this paper, we focus on the key technical and economic issues encountered in the design of IBIZA. We illustrate using examples from our work on designing a software agent-based electronic market for automated model development.",Agents; Analysis and design; E-commerce; Simulation environments,2,Information Systems Frontiers,2000 1584,Chen J.-H.; Chao K.-M.; Godwin N.; Soo V.-W.,Combining cooperative and non-cooperative automated negotiations,"Automated negotiation is a key issue to facilitate e-Business. It is an on-going research area and attracts attention from both research communities and industry. In this paper, we propose a multiple-stage co-operative automated negotiation architecture, including a sophisticated negotiation strategy and protocol, to resolve the agents' conflicts. This proposed architecture attempts to address the search for joint efficiency for negotiating agents in large and complex problem spaces using a co-evolutionary method. A game theoretic method is adapted to distribute the payoffs generated from the co-evolutionary method. The architecture supports interactions between the two methods to demonstrate that high-quality solutions can be found through their complimentary functions. Using the structure it is possible to refine and explore potential agreements through an iterated process. This article also reports some experimental results and discussions. © 2005 Springer Science+Business Media, Inc.",Automated negotiation; Co-evolutionary; Game theory,13,Information Systems Frontiers,2005 1585,Olson D.L.,Rationality in Information Systems Support to Decision Making,"Management information systems serve business organizations by providing Information for decision making. Various types of systems serve different types of decision contexts. The philosophic basis of information system support is discussed. The rational (or normative) philosophy is widely used, and appears in business theory in the form of agency theory and transaction cost analysis. While this approach has been valuable in some contexts, there are other contexts where the rational approach has limited in utility for real business decision making. Decision makers need to consider subjective factors to enable them to cope with the high levels of uncertainty, incomplete understanding, and imperfect data typical of dynamic open systems. There are alternative philosophies upon which to base decision-making that are appropriate for specific decision contexts. Churchman identified empirical, multi-perspective frameworks, dialectic, and cause-and-effect inquiring systems as alternatives to the rational (normative) system. A number of information system tools, such as decision support systems, expert systems, and group support systems can be supported by models based on philosophies other than rational models. A more empirically based philosophy, with decision-makers balancing hypothesis generation and observations of performance, is often more appropriate. The relationship between Churchman's inquiring systems and information system types are discussed.",Decision support systems; Expert systems; Group support systems; Rational decision making,17,Information Systems Frontiers,2001 1586,Stohr E.A.; Zhao J.L.,Workflow Automation: Overview and Research Issues,"Workflow management systems, a relatively recent technology, are designed to make work more efficient, integrate heterogeneous application systems, and support interorganizational processes in electronic commerce applications. In this paper, we introduce the field of workflow automation, the subject of this special issue of Information Systems Frontiers. In the first part of the paper, we provide basic definitions and frameworks to aid understanding of workflow management technologies. In the remainder of the paper, we discuss technical and management research opportunities in this field and discuss the other contributions to the special issue.",Research issues; Workflow management systems; Workflow overview,197,Information Systems Frontiers,2001 1587,Brugha C.M.,Implications from Decision Science for the Systems Development Life Cycle in Information Systems,"Nomology, a decision science approach to structuring qualitative decisions, is used to show that the Systems Development Life Cycle (SDLC) corresponds to a generic structure based on a Convincing process embedded within a Committing process, both of which were formalised originally by Kant as dialectical processes. The key decision issue in the SDLC is shown to be that of ownership of the process by the decision-maker. Consequently the decision when to move from one stage of development to the next should be determined 'subjectively' by the decision-maker or organisation. Comparing the SDLC with other similarly structured systems suggests that each stage of the SDLC is best implemented 'objectively' as an Adjusting process in which balance should be retained with regard to three issues, what should be done, where should it be done, and which way should it be done. Also, the generic nature of the structure suggests that practitioners could borrow from similar decision processes in other fields, including hierarchies of activities, types of thinking and Oriental philosophy.",Adjustment; Decision science; Development; Epistemology; Nomology; Systems,15,Information Systems Frontiers,2001 1588,Enzmann M.; Schneider M.,Improving customer retention in e-commerce through a secure and privacy-enhanced loyalty system,"Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Many vendors apply loyalty systems to collect customer-specific data that may be exploited for many reasons, e.g., price discrimination and direct marketing. As a consequence, beside some potential benefits of a loyalty system, customers may also fear an invasion of privacy, and thus often refuse to participate in such programs. Thus, a vendor may have problems to turn privacy sensitive people into loyal customers using a typical loyalty system. In this paper, we present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points which were issued to distinct customers. © 2005 Springer Science+Business Media, Inc.",Customer retention; e-commerce; Loyalty systems; Privacy,18,Information Systems Frontiers,2005 1589,Shapiro J.F.,Modeling and IT Perspectives on Supply Chain Integration,"The essence of supply chain management is integrated planning of activities across the firm's supply chain, including those of its suppliers and customers. Integrated planning refers to functional, geographical and inter-temporal coordination of managerial decisions. It requires and invokes modeling systems and processes that support data-driven or fact-based planning. A major challenge is to understand how to seamlessly imbed modeling systems in the firm's information technology. This paper examines five perspectives on these connections.",Modeling systems; Organizational learning; Planning; Supply chain management,22,Information Systems Frontiers,2001 1590,Patil V.; Shyamasundar R.K.,"E-coupons: An efficient, secure and delegable micro-payment system","In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to other users or their own devices like Laptop, PDA, Mobile Phone, and such service access points. The scheme has the promise of becoming an enabler for various Internet-based services involving unit-wise payment. It gives flexibility to the users to manage their spending capability across various access points for a particular service without obtaining an authorization for each and every access point from a facilitating bank. This flexibility which is not present in the existing micro-payment schemes is essential for accessing ubiquitous e-services and other Internet-based applications. The facility of delegation introduces a slight overhead in respect of the proof or verification of the delegated authorization and security provided to the payments. The payoff from the facility of delegation takes away the burden of the overhead. The paper discusses the design of the protocol and provides a basic analysis of the performance of the system. e-coupons is based on PayWord, a single-seed one-way hash chain for unit-wise payment, TESLA for payment security and SPKI/SDSI as underlying PKI framework for its unique delegation feature. The results obtained from the implementation of e-coupons are quite acceptable and show near real-time response. Our scheme uses multi-seed one-way hash chains for unit-wise payment. Furthermore, it allows an ordered transfer of the portions of payment chains to others. Because of this user's spending capability can be used from different service access points to access the subscribed service, concurrently. © 2005 Springer Science+Business Media, Inc.",Delegation; Micro-payment; One-way hash function; PayWord; Security; SPKI/SDSI; TESLA,15,Information Systems Frontiers,2005 1591,Newman J.,"Some Observations on the Semantics of ""Information""","The term 'Information' is widely used in the rhetoric of the Information Society, a rhetoric which some critics have judged to be empty, at least in part because of the overextension and inconsistent use of this word. We review the emergence of the concept of Information, identify a number of dimensions of similarity and difference in the way that the concept of Information is used and defined, and point up some specific areas where further critical attention is needed, of especial concern to the field of Information Systems. In particular we highlight some problems in identifying and understanding 'Information Work', and some research themes relevant to Virtual Organisations and Computer Supported Collaborative Work.",Information society; Knowledge; Measurement; Methodology; Semiotics,20,Information Systems Frontiers,2001 1592,Yuan S.-T.; Liu J.,Foreword guest editors: Special issue in advances in e-technology and e-services,[No abstract available],,1,Information Systems Frontiers,2005 1593,Wang H.; Zhang Y.; Cao J.; Kambayahsi Y.,A global ticket-based access scheme for mobile users,"This article presents a ticket-based access model for mobile services. The model supports efficient authentication of users, services and service providers over different domains. Tickets are used to verify correctness of the requested service as well as to direct billing information to the appropriate user. The service providers can avoid roaming to multiple service domains, only contacting a Credential Centre to certify the user's ticket since tickets carry all authorization information needed for the requested services. The user can preserve anonymity and read a clear record of charges in the Credential Centre at anytime. Furthermore, the identity of misbehaving users can be revealed by a Trusted Centre.",E-commerce; Mobile service; Signature; Ticket,17,Information Systems Frontiers,2004 1594,Song M.; Song I.-Y.; Chen P.P.,Design and development of a cross search engine for multiple heterogeneous databases using UML and design patterns,"As the popularity and complexity of Internet search engines increase, the design, development and maintenance of large, complex web-based Information Retrieval (WIR) systems become a challenge. The difficulty of designing a WIR system is compounded by information overload triggered from various different information sources. From a standpoint of the search engine users, it is more usable for the WIR to provide a single search point to multiple databases. To tackle this issue, we present the design and implementation of a cross-search component for the CS-Engine (Cross-Search Engine). The CS-Engine allows the user to search heterogeneous, multiple databases with one command. The CS-Engine is also distinguished from meta-search engines in that the CS-Engine does not need to trigger other search engines and translate a query for other search engines. Our performance benchmark tests show that the CS-Engine is scalable and usable. We also compare CS-engine with other search engines such as Google and AltaVista. The CS-Engine was developed with UML and design patterns including: (1) use case diagram, (2) class diagram, (3) package diagram, (4) interaction diagram, (5) Factory pattern, and (6) Strategy patterns. We conclude our paper with technical lessons learned as well as organizational issues encountered during the development phase.",Design patterns; Information retrieval; Object-oriented system design & analysis; Search engine; Web-based system,4,Information Systems Frontiers,2004 1595,Hovav A.; Gray P.,Future Penetration of Academic Electronic Journals: Four Scenarios,"The introduction of the World Wide Web presented changes in the world of academic publishing. Publishers are looking for alternatives to the traditional text-based, paper-based manuscript. Since the mid 1990's, the number of academic electronic journals increased from less than a 100 to several thousands. However, the extent of the penetration of academic electronic journals and the final form they will assume is unclear. This article introduces four scenarios. The scenarios describe four possible forms of academic journals and are based on the economic viability of electronic journals and their acceptance. The scenarios include status quo, replacement, co-existence, and ubiquitous outcomes for academic journals. It is shown that if the ubiquitous scenario occurs, a number of issues must be resolved which are independent of individual journals. These universal issues include the reliability of the infrastructure, long-term sustainability, and backwards integration. Unintended consequences are also examined.",8-H model; Electronic publishing; Management of electronic journals; Scenarios; Social implications,11,Information Systems Frontiers,2002 1596,Tan G.W.; Shaw M.J.; Fulkerson B.,Web-based Supply Chain Management,A key constituent of supply chain management strategies is information sharing. Software component technology facilitates information sharing by providing a means for integrating heterogeneous information systems into virtual information systems. Extranet technology facilitates information sharing between an enterprise and its business partners as well as its customers through the Internet. These two technologies enable new strategies that integrate information systems and improve supply chain networks. We discuss the application of these strategies to supply chain processes.,Component technology; Extranet; Global supply chain management; Information sharing; Information systems integration,41,Information Systems Frontiers,2000 1597,Anjum F.M.,TCP algorithms and multiple paths: Considerations for the future of the internet,"A TCP flow is expected to traverse over a single path. This is in order to avoid performance problems especially on account of reordering of packets and acknowledgements. Reordering can occur on account of the use of different paths with diverse bandwidth and delay characteristics. We argue that the present approach prevents us from getting the advantages associated with multiple paths. Specifically, use of multiple paths for a flow can be advantageous in improving the performance as well as the dependability of a flow. We model the effects of reordering and derive conditions under which the performance of a TCP flow improves with the use of multiple paths. We also provide recommendations for choosing amongst multiple paths. We then verify the conditions using simulations. We also illustrate the applicability of the derived conditions to multiple flows.",Multipath; Performance; TCP,6,Information Systems Frontiers,2004 1598,Narendra N.C.,Flexible support and management of adaptive workflow processes,"Workflow management and support has always been a constant challenge for workflow administrators in industry. This is characterized by the need to balance two conflicting goals - the need for control, and the need to provide sufficient flexibility for workflows to adapt to constantly changing business conditions. The traditional centralized and rigid model of workflow no longer suffices provide this balance. What is needed is an approach that provides sufficient flexibility while simultaneously providing an assurance of control for workflow administrators. In this paper, we present such an approach. Our approach is based on two bodies of research work. The first one is the OpenWater approach, wherein workflows meant to be ""discovered"" on the fly as workflow participants themselves define and execute the workflows. The second one is our earlier work on adaptive workflow, where we have developed a 3-tier architecture that supports adaptive workflow. In our paper, we enhance our 3-tier architecture with some of the OpenWater ideas, in order to develop what we have called a ""flexible workflow support and management"" architecture. We also demonstrate it on a real-life example in insurance claims processing.",Adaptive workflow; Flexible workflow; Information systems; Workflow,35,Information Systems Frontiers,2004 1599,Liu H.; Lethbridge T.C.,Intelligent Search Methods for Software Maintenance,"This paper describes a study of what we call intelligent search techniques as implemented in a software maintenance environment. The techniques studied include abbreviation concatenation and abbreviation expansion. We also describe rating algorithms used to prioritize the query results. To evaluate our approach, we present a series of experiments in which we compare our algorithms' ratings of results to ratings provided by software engineers.",Abbreviation expansion; Information retrieval; Intelligent search; Software engineering tools; Software maintenance,2,Information Systems Frontiers,2002 1600,Cole M.; O'Keefe R.M.; Siala H.,From the User Interface to the Consumer Interface,"Business success requires that advances in technology be designed and applied within a human context. Too often technological advance has occurred without reference to human behavior. While research appreciates that electronic consumers are computer users, and vice-versa, few understand exactly how this is transforming consumer behavior. In other words, technological imagination has surpassed our knowledge of media-based consumer behavior. This paper seeks to re-dress the balance of understanding. By (i) integrating themes in human-computer interaction (HCI) with consumer behavior models and (ii) placing the results within a framework of relevant research issues, we present the conceptual foundations for a consumer interface.",Consumer behavior; Culturability; Human computer interaction,22,Information Systems Frontiers,2000 1601,Hu P.; Greenwood C.M.T.; Beyene J.,Statistical methods for meta-analysis of microarray data: A comparative study,"Systematic integration of microarrays from different sources increases statistical power of detecting differentially expressed genes and allows assessment of heterogeneity. The challenge, however, is in designing and implementing efficient analytic methodologies for combining data generated by different research groups and platforms. The widely used strategy mainly focuses on integrating preprocessed data without having access to the original raw data that yielded the initial results. A main disadvantage of this strategy is that the quality of different data sets may be highly variable, but this information is neglected during the integration. We have recently proposed a quality-weighting strategy to integrate Affymetrix microarrays. The quality measure is a function of the detection p-values, which indicate whether a transcript is reliably detected or not on Affymetrix gene chip. In this study, we compare the proposed quality-weighted strategy with the traditional quality-unweighted strategy, and examine how the quality weights influence two commonly used meta-analysis methods: combining p-values and combining effect size estimates. The methods are compared on a real data set for identifying biomarkers for lung cancer. Our results show that the proposed quality-weighted strategy can lead to larger statistical power for identifying differentially expressed genes when integrating data from Affymetrix microarrays. © Springer Science+Business Media, Inc. 2006.",Meta-analysis; Microarray; Quality weight,20,Information Systems Frontiers,2006 1602,Romano Jr. N.C.; Sharda R.; Lucca J.,Computer-Supported Collaborative Learning Requiring Immersive Presence (CSCLIP): An introduction,"The dramatic increase in distance learning (DL) enrollments in higher education is likely to continue. However, research on DL that includes psychomotor, cognitive, and affective skills is virtually non-existent. Indeed, DL for psychomotor skills has been viewed as impossible. Laboratory coursework, which we define as including the acquisition of psychomotor, cognitive, and affective skills, has become a limiting factor in the growth of DL. What is needed is a synergistic integration of technologies and Human-Computer Interface (HCI) principles from Computer Supported Collaborative Learning (CSCL), collaborative learning systems, and immersive presence technologies to enable achievement of psychomotor learning objectives. This paper defines the Computer Supported Collaborative Learning requiring Immersive Presence (CSCLIP) research area, and introduces this special issue of Information Systems Frontiers on CSCLIP and the six papers contained herein. © 2005 Springer Science+Business Media, Inc.",Affective; Cognitive; Computer-Supported Collaborative Learning requiring Immersive Presence (CSCLIP); Distance learning (DL); Immersive Presence (IP); Psychomotor Learning Objectives,6,Information Systems Frontiers,2005 1603,Bennett C.; Timbrell G.T.,Application Service Providers: Will They Succeed?,"This article examines the likelihood of success for application service providers (ASP) drawing from the outsourcing literature, interiews with ASPs in the USA, and the experience of Bennett who has held leadership roles in ASP and ERP in South East Asia. This article proposes that application service providers (ASP) rent packaged software, predominantly over the Internet. It shows why organizations might employ the ASP model to manage their enterprise resource planning systems. Using a framework adapted from Lacity and Hirschheim, it demonstrates that the financial, business, technical and political reasons why organizations evaluate outsourcing can be applied to ASP model. While ASPs generally target the mid-market, large enterprises are also using ASPs to introduce new ERP modules. Potential users of ASP should regard the risks of outsourcing prior to entering into business arrangements. This examination concludes that there are strong financial and technical reasons for adopting the ASP model and therefore it has potential to succeed.",Application service provider; Enterprise resource planning; Outsourcing,67,Information Systems Frontiers,2000 1604,O'Leary D.E.,"Reengineering Assembly, Warehouse and Billing Processes, for Electronic Commerce Using ""Merge-in-Transit""","This paper investigates merge-in-transit as an approach to reengineering assembly, warehouse and billing processes for electronic commerce. Merge-in-transit is defined and some examples are given to illustrate its use. Processes necessary to accomplish merge-in-transit are developed, while advantages and disadvantages of merge-in-transit are studied. Additional issues arising from merge-in-transit also are studied: Merge-in-transit software is discussed; new measures necessary for merge-in-transit are examined; the effects of merge-in-transit on others in the current supply chain are also examined.",Electronic commerce; Merge-in-transit; Reengineering,8,Information Systems Frontiers,2000 1605,Subramaniam C.; Shaw M.J.; Gardner D.M.,Product Marketing and Channel Management in Electronic Commerce,"Marketing managers developing strategies to market products on the Internet are faced with important issues. We suggest that the use of Web advertising, virtual store-fronts and virtual communities provides innovative opportunities for marketers to communicate with consumers, understand their preferences and personalize the marketing offers at far lesser costs and far more effectively than through traditional means. The Web can also extend to fulfill the transaction and distribution needs of the consumers through new consumer processes, and thus becomes a new marketing channel. Considering the unique characteristics of the Web and traditional channels, we suggest the use of product and market characteristics in identifying the right channel for the right product. Further, we present a new framework of channel management strategies to help organizations effectively integrate the Web channel into their marketing strategy.",Electronic commerce strategy; Web channel management,33,Information Systems Frontiers,2000 1606,Sawyer P.; Rayson P.; Garside R.,REVERE: Support for Requirements Synthesis from Documents,"Documents are important sources of system requirements. This is particularly true of domains that are document-centric in terms of their operational and development processes. For system evolution in organisations that have been subject to organisational change and loss of organisational memory, documents may be the major source of key requirements. Hence, systems engineers often face a daunting task of synthesizing crucial requirements from a range of documents that include standards, interview transcripts and legacy specifications.The goal of REVERE was to investigate support for this task which has been described as document archaeology (Robertson S. and Robertson J. Mastering the Requirements Process. Reading, MA, Addison-Wesley, 1999). This paper describes the resulting REVERE toolset, its utility for document archaeology and for other tasks that have emerged in the course of our experiments with the toolset.",Document archaeology; Natural language processing; Requirements engineering; Systems engineering,43,Information Systems Frontiers,2002 1607,Kifle M.; Mbarika V.W.A.; Datta P.,Interplay of cost and adoption of tele-medicine in Sub-Saharan Africa: The case of tele-cardiology in Ethiopia,"...the barriers to diffusion of Tele-Medicine are not entirely technical. Cost has to simultaneously satisfy a number of stakeholders... (Anderson, Aydin and Jay, et al., 1994). Rising costs of the provision of healthcare have been a major issue for debate in both developing and developed countries. This is especially true of very capitalistic societies such as the United States where privatization of the healthcare sector has left many with little or no affordable healthcare. The situation is even worse in developing economies. Developing countries deal with various problems in the provision of health services and healthcare Tan et al. (E-medicine diffusion: E-medicine in Developed and Developing countries. Chapter 8 in E-health paradigm shift: Perspectives, domains and challenges. In Tan J. (Ed.), Imprint of Wiley, New York, Jossey-Bass, 2005). Some of these problems include acute shortages of healthcare professionals and medical facilities Mbarika et al. (Journal of the Association for Information Systems (JAIS) 2005;6(5):130-170). Such shortages have resulted in growing numbers of middle to upper-class citizens of developing countries traveling abroad to seek necessary health services. Using a multi-method case study research, this paper examines the role of Tele-Medicine in the healthcare system and analyzes the costs and benefits of introducing Tele-Cardiology services in Ethiopia (a Sub-Saharan African country). This is a cost comparison study for the treatment of cardiac patients traveling abroad versus patients treated via Tele-Cardiology. Our findings show that Tele-Cardiology is clinically more feasible and more cost effective compared to patients traveling abroad for treatment. © Springer Science + Business Media, LLC 2006.",Cardiology; Cost comparison; Cost effectiveness; Developing countries; Patient travel; Tele-Medicine; Telecommunication,22,Information Systems Frontiers,2006 1608,Garrity E.J.,Synthesizing User Centered and Designer Centered IS Development Approaches Using General Systems Theory,"This paper uses general systems theory to provide an expanded view of information systems in organizations. Three general viewpoints and corresponding approaches to information systems development are identified. The designer centered or American approach to information systems development is based on a ""functionalist"" perspective of information systems and a problem solving orientation. The user centered or European approach to information systems development takes an expanded view of information systems that specifically considers humans and recognizes their aspirations and goals and uses a democratic, participative approach to develop systems in an effort to produce an improved workplace and a better quality of worklife for users. A third viewpoint on information systems development, business process centering, is identified that further expands the components of the system to include the set of integrated tasks that provide value to the customer. We define a new development approach that combines the strengths of these approaches based on general systems theory, business process centering, and a measurement and control system.",Business process design; General systems theory; IS success measurement; Systems development,17,Information Systems Frontiers,2001 1609,Kishore R.; McLean E.R.,"The Next Generation Enterprise: A CIO Perspective on the Vision, its Impacts, and Implementation Challenges","This article presents a senior-executive perspective on the ""grand vision"" of a Next Generation Enterprise (NGE), its organizational and individual impacts, and the organizational and technological challenges associated with implementing this vision. It is based upon discussions that took place at a CIO Panel, consisting of nine senior executives from a wide cross section of organizations and organized during the ""Academia/Industry Working Conference on Research Challenges 2000"" (AIWoRC '00 Conference) to address the central theme of the conference: ""The Next Generation Enterprise: Virtual Organizations and Mobile and Pervasive Technologies."" The paper first presents theoretical notions about virtuality, virtual organizations, pervasive and mobile information technologies (PMITs), and authors' conceptualization of a prototypical NGE. This is followed by a synthesis and summary of the panel discussion under five major thematic areas: (1) the shaping of the emerging NGE vision as enabled by modern-day PMITs, (2) the significant organizational impacts and changes occasioned by the NGE vision, (3) the crucial impacts that the NGE model may have on individual work and personal lives, (4) the critical organizational issues and challenges in implementing the NGE vision, and (5) the major technological issues that, if left unattended, may hamper translation of the NGE vision into a reality. The paper concludes with remarks about the crucial requirements for making the NGE vision a reality.",Implementation of techno-organizational innovations; Next generation enterprise; Organizational impacts of information technology; Pervasive and mobile information technology; Social impacts of information technology; Virtual organization,27,Information Systems Frontiers,2002 1610,Ivanov K.,"The Systems Approach to Design, and Inquiring Information Systems: Scandinavian Experiences and Proposed Research Program","This paper starts with a short history of the application of dialectical social systems approach in Sweden in the sixties, and emphasizes its later application to the field of information or inquiring systems. This is followed by a reflection on the meeting between the systems approach and some other approaches mainly in Scandinavia and Europe, notably the postmodern aestheticist trends of the eighties which grew further in the nineties and now apparently dominate the stage of many computer applications in multimedia and virtual reality. The paper concludes with some reflections on the possible causes and import of these trends and possible shortcomings of the systems approach itself which make it difficult to offer the necessary resistance, requiring the future energetic work of systems researchers and educators in a proposed research program.",Aesthetics; Critical; Ethics; Interpretive; Postmodernism; Theology,1,Information Systems Frontiers,2001 1611,Kalanidhi S.,Value Creation in a Network: The Role of Pricing and Revenue Optimization and Enterprise Profit Optimization™,"The Internet has created a virtual upheaval in the structural features of the supply and demand chains for most businesses. New agents and marketplaces have surfaced. The potential to create value and enhance profitable opportunities has attracted both buyers and sellers to the Internet. Yet, the Internet has proven to be more complex than originally thought. With information comes complexity: the more the information in real time, the greater the difficulty in interpretation and absorption. How can the value-creating potential of the Internet still be realized, its complexity notwithstanding? This paper argues that with the emergence of innovative tools, the expectations of the Internet as a medium for enhanced profit opportunities can still be realized. Creating value on a continuing basis is central to sustaining profitable opportunities. This paper provides an overview of the value creation process in electronic networks, the emergence of the Internet as a viable business communication and collaboration medium, the proclamation by many that the future of the Internet resides in ""embedded intelligence"", and the perspectives of pragmatists who point out the other facet of the Internet - its complexity. The paper then reviews some recent new tools that have emerged to address this complexity. In particular, the promise of Pricing and Revenue Optimization (PRO) and Enterprise Profit Optimization™ (EPO) tools is discussed. The paper suggests that as buyers and sellers adopt EPO, the market will see the emergence of a truly intelligent network - a virtual network - of private and semi-public profitable communities.",Pricing optimization; Revenue optimization and enterprise profit optimization,1,Information Systems Frontiers,2001 1612,Porra J.,Electronic Commerce Internet Strategies and Business Models-A Survey,"Today, any doubts about possibilities of significant profits over the Internet are a distant memory. Such has been the proliferation of Internet-based business on the public network. But electronic commerce has turned out to be more difficult to master than previously assumed. For many, ventures have been less lucrative than expected. The problem is that integrating business models with technology is a multifaceted and largely open question (Shaw, et al. 1997). How do businesses of various sizes and industries actually start their Internet activity and how do their business models change over time? More specifically, how do their different Internet strategies play out? This article is the result of a survey of the Internet strategies and business models of 280 companies that sell products and services on the public network. The results show that electronic commerce has penetrated companies of all sizes. Based on this survey it is apparent that while many companies have participated in electronic commerce for years, their business models are still in their infancy stages.",Electronic commerce; Internet business model; Internet strategy; Survey,12,Information Systems Frontiers,2000 1613,Hars A.,Designing Scientific Knowledge Infrastructures: The Contribution of Epistemology,"Scientific knowledge is increasingly being stored in online infrastructures such as electronic journals, digital libraries and online encyclopedias. Their designers need to find an adequate approach for representing this knowledge. Unfortunately, most online infrastructures adopt the traditional article-issue-journal model which is based on print technology. This article develops an alternative model for the representation of scientific knowledge which is based on epistemology - the theory of knowledge. The characteristics of scientific knowledge identified by four philosophers of science - Popper, Nagel, Dubin and Bunge - are synthesized into a conceptual model which can be used as the foundation of scientific knowledge infrastructures in an online environment. The article shows that much more fine-grained structures are needed for representing scientific knowledge. Knowledge should not be accumulated as a collection of articles but as a network of epistemologically relevant elements such as theories, concepts, statements, facts etc.",Epistemology; Knowledge infrastructure; Knowledge management; Object orientation; Philosophy of science,27,Information Systems Frontiers,2001 1614,Gregg D.G.; Kulkarni U.R.; Vinzé A.S.,Understanding the Philosophical Underpinnings of Software Engineering Research in Information Systems,"The Information Systems (IS) discipline, and related research, focuses on the development, understanding, and use of technology to meet business needs. Technology, in particular ""software,"" is the basis for IS research, making sofware engineering a critical component of research in the IS domain. While the importance of software development is well accepted, what constitutes high quality software engineering research is not well defined. Perhaps this is because some software development clearly is not research and it is hard to distinguish between pure application development, and systems development that pushes the boundaries ofknowledge. Sir Karl Popper argued that the scientific quality of research is not based on its empirical method, but on the nature of the questions asked. Our research suggests that software engineering can meet Popper's criteria for scientific research. Drawing on well-established research philosophies, we propose a software engineering research methodology (SERM) and discuss the utility of this methodology for contributing to and expanding the IS body of knowledge. We also describe the considerations that need to be addressed by SERM to enhance acceptability of software engineering research in IS. Our suggestions are corroborated with a review of current IS software engineering research reported in leading IS journals.",Information systems research methodology; Research philosophy; Software engineering,84,Information Systems Frontiers,2001 1615,Conway D.G.,Supplier Affiliated Extended Supply Chain Backbones,"E-commerce has progressed from the preliminary stages of brochure-ware to on-line transaction management, and is entering a phase where great opportunities exist in extended supply-chain over the Internet. Currently, much of the focus is on business-to-business e-commerce, where middleman hubs perform broker functions of search and comparison. Their value is derived from providing time and cost savings to participants. As XML semantics and other information sharing technologies become more standardized, and as behavioral aspects of Internet commerce become better established, we would expect the searching and comparison mechanics to become priced at their marginal costs. Business-to-business hubs, or interorganizational systems that do not add value in another way to the chain will find very little margins. In this paper, we examine issues related to Internet extended supply-chain backbones from the supplier's viewpoint and discuss the information architecture of a third party software backbone and how it can provide value-added services to suppliers and OEMs via internetworking standards.",Application service provider; Business-to-business hubs; E-commerce; Extended supply chain; Interorganizational systems,9,Information Systems Frontiers,2000 1616,Song J.; Kim Y.J.,Social influence process in the acceptance of a virtual community service,"This study investigates the effect of subjective norms, tendency to social comparison, and social identity on behavioral intention to use an Avatar service. Use of a virtual community service can be regarded as social behavior or a behavior affected by social factors. This study relies on the link between subjective norms and behavioral intention in the theory of reasoned action, social identity theory, and social comparison literature. The proposed model was tested using survey data with the results lending support for the proposed model. The implications from this study are expected to contribute to the literature by shedding light on the social influence process in two ways. First, this study unveils how social factors including subjective norms, social identity, and tendency to social comparison affect behavioral intention to use a specific service from virtual communities. Second, this study will aid managers and academics to further understand the social nature of customer behavior with regard to using virtual community services and thus provide insight for the development of technology driven e-commerce. © Springer Science + Business Media, LLC 2006.",Avatar; Social comparison; Social identity; Subjective norms,97,Information Systems Frontiers,2006 1617,Rush W.A.; O'Connor P.J.; Johnson P.E.,Data systems in support of research in managed care,"The data systems supporting managed care are not structured to facilitate scientific research. We discuss the different types of research typically done within a managed care setting and the strategies successfully used by an affiliated research foundation to develop a data infrastructure to support a multi-investigator research mission. We describe our path from (1) diverse data systems supporting membership, claims, laboratory and pharmacy functions (2) the development of a corporate data warehouse for reporting and (3) the progression to a research data mart designed specifically to support research. We review the technical and resource issues encountered and how the evolution of the data systems for research paralleled and interacted with the research directions of the foundation.",Data systems; Epidemiology; Health research; Managed care,1,Information Systems Frontiers,2003 1618,Ye N.,QoS-Centric Stateful Resource Management in Information Systems,"There is little resource management and Quality of Service (QoS) guarantee in the ""best-effort"" model underlying existing information systems, leaving information systems vulnerable to exploits and denial-of-service attacks. To overcome these problems, an engineering approach to QoS-centric stateful resource management in information systems is presented in this paper. System engineering principles are first used to identify various scales and levels of resources in information systems. QoS attributes of resources are then discussed. We also introduce the topological and algebraic structures of propagating QoS attributes across levels and scales of various resources for service contracting and admission control. We use a control-theoretic structure to specify QoS-guarantee functions for managing individual resources, including functions of admission control, scheduling & control, QoS confonnance monitoring, and state probing and testing, along with scheduling techniques and statistical process control (SPC) techniques to support these functions.",Cyber attacks; Information systems; Internet; Quality of service; Resource management,15,Information Systems Frontiers,2002 1619,Ackerman M.S.; McDonald D.W.,Collaborative Support for Informal Information in Collective Memory Systems,"Informal information, such as the expertise of an organization or the workarounds practiced by a community, is a critical part of organizational or collective memory systems. From a user-centered perspective, a user merely wishes to get his work done, and to do this, he must solve his immediate problems. We have examined how to incorporate this problem solving into a collective memory, as well as how to incorporate the learning that accrues to it or from it. We report here on two systems, the Cafe ConstructionKit and the Collaborative Refinery, as well as an application, Answer Garden 2, built using these two systems. The Cafe ConstructionKit provides toolkit mechanisms for incorporating communication flows among people (as well as agents) into an organizational memory framework, and the Collaborative Refinery system provides mechanisms for distilling and refining the informal information obtained through these communication flows. The Answer Garden 2 application demonstrates the utility of these two underlying systems.",CMC; Community memory; Computer-supported cooperative work; Corporate memory; Group memory; Incremental formalization; Informal information; Information access; Information refining; Information retrieval; Information systems; Organizational memory,22,Information Systems Frontiers,2000 1620,Ragothaman S.; Naik B.; Ramakrishnan K.,Predicting corporate acquisitions: An application of uncertain reasoning using rule induction,"Artificial Intelligence (AI)-based rule induction techniques such as IXL and ID3 are powerful tools that can be used to classify firms as acquisition candidates or not, based on financial and other data. The purpose of this paper is to develop an expert system that employs uncertainty representation and predicts acquisition targets. We outline in this paper, the features of IXL, a machine learning technique that we use to induce rules. We also discuss how uncertainty is handled by IXL and describe the use of confidence factors. Rules generated by IXL are incorporated into a prototype expert system, ACQTARGET, which evaluates corporate acquisitions. The use of confidence factors in ACQTARGET allows investors to specifically incorporate uncertainties into the decision making process. A set of training examples comprising 65 acquired and 65 non-acquired real world firms is used to generate the rules and a separate holdout sample containing 32 acquired and 32 non-acquired real world firms is used to validate the expert system results. The performance of the expert system is also compared with a conventional discriminant analysis model and a logit model using the same data. The results show that the expert system, ACQTARGET, performs as well as the statistical models and is a useful evaluation tool to classify firms into acquisition and non-acquisition target categories. This rule induction technique can be a valuable decision aid to help financial analysts and investors In their buy/sell decisions.",Expert systems; Machine learning; Mergers and acquisitions; Rule induction; Uncertain reasoning,31,Information Systems Frontiers,2003 1621,Dickey M.H.; Ives B.,The Impact of Intranet Technology on Power in Franchisee/Franchisor Relationships,"In this exploratory study we investigate the impact of an organization-wide intranet on the power relationships between franchisee and franchisor. This article reports on a study of an intranet implementation at PJ's, a franchise organization consisting of 25 coffee and tea cafes. Through use of interviews as well as a detailed case study of one franchisee, we examine how the relationship between franchisor and franchisee changes with the implementation of an intranet. Among the findings was that the intranet appeared to increase power of both franchisee and franchisor, though the franchisor continued to have relatively more power than the franchisee. The franchisor did not include franchisee to franchisee communications as an intranet feature and, interestingly, the franchisees did not seek to develop such a virtual community outside of the system. We speculate that the current satisfaction with the franchisor among franchisees might explain disinterest in such a community. We also found evidence that some franchisees who entered the franchise organization early in its evolution might react much differently to the implementation of the intranet than those who invested in the more established organization several years later.",Extranets; Franchise organizations; Intranets; Organizational impact; Power,17,Information Systems Frontiers,2000 1622,De Laat M.; Lally V.,Investigating group structure in CSCL: Some new approaches,"This paper reports some recent findings of a continuing international study that is investigating computer supported collaborative learning (CSCL) processes among a community engaged in a master's program in e-learning. This study presents results of an analysis of learning and tutoring interactions in three different groups. Each group was presented with a different model to facilitate collaborative interaction, using specially designed groupware. The empirical analysis used two compatible methods: content analysis (CA) and critical event recall (CER). The study reveals the differentiated nature of participants' interactions: the results show that the groups who used the management roles and progressive enquiry models were more actively engaged in learning and tutoring interactions than the group without an additional structure (NAS). © 2005 Springer Science+Business Media, Inc.",Computer supported collaborative learning;groupware; Learning; Tutoring,21,Information Systems Frontiers,2005 1623,Klein S.; Teubner R.A.,Web-based Procurement New Roles for Intermediaries,"The electronic markets vs. electronic hierarchies debate initiated by (Malone et al. 1987) has been superseded by the discussion about dis- or reintermediation in the electronic marketplace. Many of the arguments given for either side are equally correct - because the arguments have been applied to different domains in different situations from specific perspectives - and yet the debate falls short of covering the complexity and dynamics of the ongoing market structure change. The goal of this paper is therefore to develop a more differentiated framework that facilitates the understanding of chances and threats resulting from inter- and cybermediation. The framework suggests to distinguish roles, opportunities and threats for cybermediaries in different situations. While the framework is meant to structure the debate in general, we will focus on public sector procurement to show its application.",Cybermediary; Cybermediation; Dis-; Electronic procurement; Hierarchy; Intermediary; Market; Network; Public procurement; Re-,15,Information Systems Frontiers,2000 1624,Tak S.W.; Park E.K.,A software framework for non-repudiation service based on adaptive secure methodology in electronic commerce,"In this paper, we propose a secure and efficient software framework for non-repudiation service based on an adaptive secure methodology in e-commerce (electronic commerce). First, we introduce en explicit security framework of the e-commerce transaction called notary service. The proposed framework supports non-repudiation of service for a successful e-commerce transaction in terms of generation, delivery, retrieval, and verification of the evidence for resolving disputes. Second, we propose an adaptive secure methodology to support secure and efficient non-repudiation of service in the proposed framework. Our adaptive secure methodology dynamically adapts security classes based on the nature and sensitivity of interactions among participants. The security classes incorporate security levels of cryptographic techniques with a degree of information sensitivity. As Internet e-businesses exponentially grow, a need for high security level categories to identify a group of connections or individual transactions is manifest. Therefore, development of an efficient and secure methodology is in high demand. We have done extensive experiments on the performance of the proposed adaptive secure methodology. Experimental results show that the adaptive secure methodology provides e-commerce transactions with high quality of security services. Our software framework incorporating the adaptive secure methodology is compared with existing well-known e-commerce frameworks such as SSL (Secure Socket Layer) and SET (Secure Electronic Transaction).",Adaptive secure methodology; Electronic commerce (e-commerce); Non-repudiation; Security software framework,3,Information Systems Frontiers,2004 1625,Sherer S.A.; Kohli R.; Baron A.,Complementary investment in change management and IT investment payoff,"Measuring information technology payoff continues to be a challenge for organizations. Considering the impact of complementary investments on IT payoff has been proposed by recent studies. This paper examines the impact of one type of complementary investment on IT payoff: organizational change management initiatives to support IT implementation. The paper repons a case study of Cisco Systems' IT investment in an operating systems upgrade of over 34,000 computer systems in 117 countries. The findings of the exploratory case study indicate that planned communications and change management strategies developed by their Organizational Change Management group led to the smooth implementation of the upgrade process and contributed to the payoff from the IT investment, measured in terms of client satisfaction with the process and system and reduced cost and time to upgrade all systems. The findings were supported by pre- and post-implementation surveys of clients, analysis of the change management initiatives and their impact on the process, and comparison of actual and budgeted costs for the project.",Change management; Complementary investment; IT payoff; Organizational change management,39,Information Systems Frontiers,2003 1626,Erlich Z.; Gelbard R.; Spiegler I.,Data Mining by Means of Binary Representation: A Model for Similarity and Clustering,In this paper we outline a new method for clustering that is based on a binary representation of data records. The binary database relates each entity to all possible attribute values (domain) that entity may assume. The resulting binary matrix allows for similarity and clustering calculation by using the positive ('I' bits) of the entity vector. We formulate two indexes: Pair Similarity Index (PSI) to measure similarity between two entities and Group Similarity Index (GSI) to measure similarity within a group of entities. A threshold factor for each attribute domain is defined that is dependent on the domain but independent of the number of entities in the group. The similarity measure provides simplicity of storage and efficiency of calculation. A comparison of our similarity index to other indexes is made. Experiments with sample data indicate a 48% improvement of group similarity over standard methods pointing to the potential and merit of the binary approach to clustering and data mining.,Binary representation; Clustering; Data mining; Similarity,27,Information Systems Frontiers,2002 1627,Jones A.; Ivezic N.; Gruninger M.,Toward Self-Integrating Software Applications for Supply Chain Management,"Each paper in this special issue deals with a particular aspect of supply chain management. Nevertheless, they all point to a common need for meaningful and timely information exchange across the supply chain. The Internet and the existing Web technologies have made the exchange of information essentially free and instantaneous. On the other hand, determining the meaning of that information, which we call integration, is still very costly. Millions of dollars and hundreds of man-years have been spent developing and coding interface specifications and software applications to achieve this integration. While this approach has been successful in the past, it is not a viable approach for the future in which the Semantic Web is becoming an important business strategy. In this paper, we discuss a new approach, called self-integration in which software applications are imbedded in an environment that allows them to integrate automatically. We first provide some background information on integration and then focus on our research on semantic querying, semantic mapping, and semantic inferencing.",Equivalence metric; Inference; Mappings; Ontology; Self-integration; Semantics; Supply chain management; Translators,13,Information Systems Frontiers,2001 1628,Ballou R.H.,Unresolved Issues in Supply Chain Network Design,"Designing a supply chain network provides the basic structure for supply chain operations, where the network is a major element in a firm's competitiveness and a significant area of capital investment. With the boundary-spanning scope encouraged by supply chain management, the question is whether existing analyses used for network design are adequate. The general answer is yes, because the number of echelons that the analysis must span is self-limiting to a relative few. However, there remain unresolved issues in network design analysis and in the models used to support the analysis that can enhance its accuracy, appropriateness, and acceptability to practitioners. Issues discussed relate to the development of better models, the treatment of the data needed by them, and the need for comparing the various models for network design.",Facility location; Logistics network configuration; Network design; Supply chain management,75,Information Systems Frontiers,2001 1629,Casati F.; Shan M.-C.,Event-Based Interaction Management for Composite E-Services in eFlow,"The Web is rapidly becoming the platform through which many companies deliver e-services to businesses and individual customers. E-Services are typically delivered in their primitive forms, called basic services. However, today's business environment creates the opportunity for providing value-added, integrated services, delivered by composing existing e-services, possibly offered by different providers. In order to enable organizations to pursue this business opportunity we have developed eFlow, a model and architecture that support the specification, enactment, and management of composite e-services, modeled as processes that are enacted by a process engine. In this paper we focus on one of the most important and innovative aspects of eFlow: that of the integration between service composition and event management. In particular, we extend classic service composition model by allowing composite services to publish and receive events. This capability enables composite services to dynamically exchange data with other applications (in the form of event parameters), to synchronize service invocations with the occurrence of (external or internal) events, and to handle exceptions occurring during service execution. One of our main objectives has been that of defining a model that is easy to understand and easy to use. Indeed, all types of events are handled in the same fashion from the user perspective, and high-level constructs are provided to handle critical events such as those related to time management. Finally, we show how the proposed approach can be implemented by integrating existing technologies.",E-services; Events; Workflows,38,Information Systems Frontiers,2002 1630,Freeman L.A.,"Information Systems Knowledge: Foundations, Definitions, and Applications","A key component of research within information systems is the use of valid instruments to measure numerous aspects of technology, organizations, and people. Validated instruments exist for many different variables and more are available all the time. Knowledge of a particular domain is an integral part of working competently, effectively, and successfully within that domain (N.M. Degele, World Futures, 50, 743-755, 1997). Therefore, this paper will describe the rationale for the development of an instrument to measure the information systems knowledge of individuals. This rationale is rooted in several streams of research, such as absorptive capacity and certainty of knowledge, and focuses on three main questions: why measure knowledge of information systems, how to measure this knowledge, and what to actually measure. The definitions of knowledge and information systems knowledge are developed and refined through an analysis of the literature covering the philosophical, psychological, and educational aspects of knowledge. The resulting models of knowledge and specifically information systems knowledge are then applied to research streams within the information systems discipline as well as practitioner-oriented needs.",Information systems knowledge; Instrument development; Knowledge; Models of knowledge,19,Information Systems Frontiers,2001 1631,Markus M.L.; Petrie D.; Axline S.,Bucking the Trends: What the Future May Hold for ERP Packages,[No abstract available],,67,Information Systems Frontiers,2000 1632,Davenport T.H.,The future of enterprise system-enabled organizations,"Companies are beginning to expect to gain strategic value from the implementation and operation of enterprise systems (ES). Currently dominating trends in business are sense-and-respond business models, globalization, corporate realignment, virtual organizations and accelerated product life-cycles. Available and evolving features of enterprise systems are summarized in a framework, concluding that present capabilities of enterprise systems correspond only to some extend to the new practices required to respond to these corporate challenges, and that ERP vendors strive to fill the gap. By integrating higher management functions enterprise systems will also impact on the practice of executives. The future work of an executive is illustrated by a fictitious example. © 2000 Kluwer Academic Publishers.",Business trends; Enterprise resource planning; Information systems evolution; Management; Management information systems; Management support systems; Transaction processing systems,142,Information Systems Frontiers,2000 1633,Blum J.M.; Aboulafia A.,"System design and implementation of a national image registry for orthopaedic oncology image management, research and teaching","Orthopaedic oncology is highly dependent on imaging studies to diagnose and treat patients. However, many types of bone tumors are rare creating a lack of teaching and research cases. We have developed a system to locally document and nationally register electronic images for teaching and research on bone tumors. The system minimizes storage requirements and maintains confidentiality using a unique approach. This paper demonstrates the system design and current implementation.",Clinical research; Image database; Image management; Image registry; Orthopaedic oncology,3,Information Systems Frontiers,2003 1634,Bunker D.,"A Philosophy of Information Technology and Systems (IT & S) as Tools: Tool Development Context, Associated Skills and the Global Technology Transfer (GTT) Process","It is the intent of this paper to discuss a philosophy of Information Technology and Systems (IT & S) as tools and the impact of this philosophy on the Global Technical Transfer (GTT) process of IT & S. It is argued that IT & S by definition, are artefacts, tools that have been made, used, inherited and studied within a cultural context which encompasses economic, historical, technical and social values and assumptions which are focussed in particular skill sets. It is assumed that these skill sets are mostly in evidence in any culture that receives the IT & S tool for use in a technical transfer process. It is argued, therefore, if we understand the cultural context in which a tool is made then we will understand the skills to transfer and use such tools in an effective manner. The issue we must face as makers, users, inheritors and scholars of IT & S tools, however, is that the tool contest and inherent in-built values and skill sets, may not be in evidence across all cultures. This would make the effective use of IT & S, in a global sense, a difficult and complex (if not impossible) undertaking. From this position it is argued that IT & S tools reflect the IT & S discipline, as it is these tools which embody the assumptions of the discipline and hence, its paradigm. The Bunker and Dean (Bunker DJ, Dean RG. Philosophical Traditions in Information Systems: Challenger of an Interdisciplinary View, Faculty of Commerce Workshop, University of Wollongong, July 10-11, 1997) disciplinary model is highlighted as a means of understanding how tools are made within a cultural context and how they reflect the discipline in which they are created. This paper then goes on to explain the ramifications of IT & S as a discipline on the GTT process and proposes a skill-focussed approach, within a culture, to determining what IT & S may be appropriate for that particular cultural context.",Artefacts; Culture; Globalisation; Information technology and systems; Philosophy; Technology transfer; Tools,14,Information Systems Frontiers,2001 1635,Hinkkanen A.; Lang K.R.; Whinston A.B.,A set-theoretical foundation of qualitative reasoning and its application to the modeling of economics and business management problems,"The qualitative reasoning (QR) field has developed various representation and reasoning methods for the modeling with incomplete information or incomplete knowledge. While most uncertain reasoning approaches describe uncertain or imprecisely known information as probability distribution functions, qualitative reasoning bases its model specification on qualitative descriptions that are derived from known qualitative system properties. Problems are formulated as sets of qualitative constraints and their analysis is performed by applying a qualitative calculus. This paper presents a general, unifying theory of the various existing qualitative reasoning systems that includes, as special cases, reasoning methods that use representations of qualitative differential equations and qualitative difference equations. Based on set theory, our QR framework describes fundamental concepts such as qualitative models and solutions, and relates them to the quantitative analogues of its underlying quantitative reference system. Our motivation arises from the types of models found in the management sciences. Thus we emphasize the significance of discrete, dynamic models and optimization models in the business management and economics fields, both of which have received less attention in current QR research. Finally, we extend our theoretical framework to include an approach to qualitative optimization.",Epistemology; Incomplete information; Qualitative modeling; Qualitative reasoning; Simulation,13,Information Systems Frontiers,2003 1636,Chen C.-Y.; Zhao Z.-Y.; Ball M.O.,Quantity and Due Date Quoting Available to Promise,"The available to promise (ATP) function has increasingly attracted the attention of the supply chain management research community as a tool for enhancing the responsiveness of order promising and the reliability of order fulfillment. It directly links available resources, including both material and capacity, with customer orders and, thus, affects the overall performance of a supply chain. In this paper, a mixed integer programming (MIP) model for a quantity and due date quoting ATP mechanism is presented. This model can provide individual order delivery dates for a batch of customer orders that arrive within a predefined batching interval. In addition, the model allows customized configurations and takes into account a variety of realistic supply chain constraints, such as material compatibility, substitution preferences, capacity utilization, and material reserve. We conclude this paper with sensitivity analysis of performance impacts with respect to batching interval size and material reserve policy.",Available to promise (ATP); Due date quoting; Mixed integer programming; Order promising and fulfillment,83,Information Systems Frontiers,2001 1637,Kamssu A.J.; Reithel B.J.; Ziegelmayer J.L.,Information technology and financial performance: The impact of being an Internet-dependent firm on stock returns,"The choice of a particular technology to implement a firm's business strategy may impact the firm's market performance. This study assesses the impact of being an Internet-dependent firm on a firm's stock valuation. The empirical results indicate that in a booming economy, Internet-dependent firms have lower excess returns than non-Internet firms. These high returns can be explained by the fact that in such an economy, Internet stocks trade at relatively higher prices than non-Internet stocks. Therefore, choosing a particular technology to implement business strategy may have a significant impact a firm's stock performance.",Financial performance; Information technology; Internet-dependent firms; Stock return,15,Information Systems Frontiers,2003 1638,Ross J.W.; Vitale M.R.,The ERP Revolution: Surviving vs. Thriving,"This paper presents preliminary findings from a research project that examined how firms are generating business value from their investments in enterprise resource planning (ERP) systems. The research, which was done jointly with Benchmarking Partners, describes the stages of ERP implementation, the obstacles that firms encountered in generating benefits from the systems, and some critical success factors for getting business value from the implementation of an ERP system in business.",Business value; Critical success factors; ERP systems; Implementation,368,Information Systems Frontiers,2000 1639,Dos Santo B.L.,"Information technology investments: Characteristics, choices, market risk and value","The decisions confronting Information technology (IT) managers have changed a great deal since the early 1970s. The key decisions three decades ago were related to the management of application development projects and operations centers. Today, the key decisions are quite different. What level of service should the firm provide end-users? Should IT services, development projects and the ownership and management of operations centers be outsourced? IT investments attempt to satisfy specific needs. Because of environmental differences and differences in the cost structure and benefits of alternative ways in which these needs can be met, the answers to these questions may differ across firms. Modern financial analysis can provide insights to help managers deal with many of the problems they currently face. We use modern financial theory to show how the value of IT investments can he affected by some of the choices made by managers. We show how the market risk of demand and the market risk of costs affect the market risk and value of IT investments. We consider three types of investment decisions: outsourcing versus in-house services; investments in interorganizational systems; and determining the optimal level of IT services that should be provided. Our analysis indicates that: (1) as the market risk of demand for operations decreases, firms are less likely to outsource operations; (2) the value of an investment in an interorganizational system increases as the market risk of costs increases; and (3) the optimal level of user service is inversely related to service demand risk and is directly related to the market risk of service costs.",,24,Information Systems Frontiers,2003 1640,Lindström Å.; Johnson P.; Johansson E.; Ekstedt M.; Simonsson M.,A survey on CIO concerns-do enterprise architecture frameworks support them?,"The challenge of IT management is today considerable. In industry, the organizational role of the Chief Information Officer (CIO) has been promoted as the owner of these challenges. In spite of a general acceptance of the problems associated with the responsibilities of the CIO, very little academic research has been conducted on the issues and constraints of this role. In order to address these shortcomings, this article presents the results of a survey in which Swedish CIOs have prioritized their most important concerns. In academia, a response to the IT system management challenges has presented itself in the discipline of Enterprise Architecture. The article argues that the CIO role is the primary stakeholder of Enterprise Architecture, so his/her need for decision support should guide Enterprise Architecture research and framework development. Therefore, the article presents a brief review over how well two existing Enterprise Architecture frameworks address the surveyed concerns of the CIO. Results from the survey indicate that the three highest prioritized concerns of CIOs are to decrease the cost related to the business organization, to improve the quality of the interplay between the IT organization and the business organization and to provide new computer-aided support to the business organization. The comparison between the CIOs' prioritization and the foci of the frameworks shows some discrepancies. The largest disharmony lies in the lack of decision support for issues related to the IT organization. Furthermore, support for explicitly estimating and managing costs is lacking within the frameworks. © Springer Science+Business Media, LLC 2006.",Chief information officer (CIO); Enterprise architecture; Enterprise architecture frameworks; IT management; Strategic information system management,88,Information Systems Frontiers,2006 1641,Kim K.-H.; Ellis C.A.,Performance Analytic Models and Analyses for Workflow Architectures,"The design and implementation of a workflow management system is typically a large and complex task. Decisions need to be made about the hardware and software platforms, the data structures, the algorithms, and network interconnection of various modules utilized by various users and administrators. These decisions are further complicated by requirements such as flexibility, robustness, modifiability, availability, performance, and usability. As the size of workflow systems increases, organizations are finding that the standard server/client architectures, and off-the-shelf solutions are not adequate. We can further see that in the future, very large-scale workflow systems (VLSW) will become more complex, and more prevalent. Thus, one further requirement is an emphasis of this document: scalability. For the purposes of our scalable workflow investigations, we describe a framework, a taxonomy, a model, and a methodology to investigate the performance of various workflow architectures as the size of the system (number of workcases) grows very large. First, this paper presents a novel workflow architectural framework and taxonomy. We survey some example current workflow products and research prototype systems, illustrating some of the taxonomical categories. In fact, most current workflow architectures fall into only one of the many categories of this taxonomy: the centralized server/client category. The paper next explains a performance analysis methodology useful for exploring this taxonomy. The methodology deploys a layered queuing model, and performs mathematical analysis on this model using a modified MOL (method of layers) combined with a linearization algorithm. Finally, the paper utilizes this methodology to compare and contrast the various architectural categories, providing interesting results about performance as the number of workcases increases. Our analytic results suggest that (a) for VLSW performance determination, software architecture is as important as hardware architecture, and (b) alternatives to the client server architecture provide significantly better scalability.",Distributed workflow; Performance; Performance analytic models; Scalability; Taxonomy of workflow architectures; Workflow performance analysis,40,Information Systems Frontiers,2001 1642,Beer M.; Slack F.; Armitt G.,Collaboration and teamwork: Immersion and presence in an online learning environment,"In the world of OTIS, an online Internet School for occupational therapists, students from four European countries were encouraged to work collaboratively through problem-based learning by interacting with each other in a virtual semi-immersive environment. This paper describes, often in their own words, the experience of European occupational therapy students working together across national and cultural boundaries. Collaboration and teamwork were facilitated exclusively through an online environment, since the students never met each other physically during the OTIS pilot course. The aim of the paper is to explore the observations that (1) there was little interaction between students from different tutorial groups and (2) virtual teamwork developed in each of the cross-cultural tutorial groups. Synchronous data from the students was captured during tutorial sessions and peer-booked meetings and analyzed using the qualitative constructs of 'immersion', 'presence' and 'reflection in learning'. The findings indicate that 'immersion' was experienced only to a certain extent. However, students found both 'presence' and shared presence, within their tutorial groups, to help collaboration and teamwork. Other evidence suggests that communities of interest were established. Further study is proposed to support group work in an online learning environment. It is possible to conclude that collaborative systems can be designed, which encourage students to build trust and teamwork in a cross cultural online learning environment. © 2005 Springer Science+Business Media, Inc.",Collaborative learning; Occupational therapy; Presence; Problem-based learning; Semi-immersive environment; Synchronous communication,26,Information Systems Frontiers,2005 1643,Ba S.; Whinston A.B.; Zhang H.,The Dynamics of the Electronic Market: An Evolutionary Game Approach,"The capabilities afforded by network technologies have facilitated the growth of electronic commerce. However, online frauds pose serious challenges to the further adoption of the electronic market. In order to promote trust and reduce transaction risks, various trusted third parties have emerged and new models have been proposed. Will people use the trusted third parties while conducting online transactions? How will the electronic market evolve? This research attempts to identify the different equilibria of the electronic market using an evolutionary game theoretic approach and to explore the best strategy to do transactions in the electronic market. Also, the work provides a theoretical justification to the emergence and necessity of trusted third parties for electronic transactions.",Electronic market; Evolutionarily stable strategy; Evolutionary game theory; Market evolution; Trusted third party,35,Information Systems Frontiers,2000 1644,Beeson I.; Green S.; Sa J.; Sully A.,Linking Business Processes and Information Systems Provision in a Dynamic Environment,"This paper discusses decision and communication processes which link strategic activity in a business with information systems development activity. We develop a model which illustrates these processes as abserved in one company (AXA Sun Life, Bristol HQ), but we suggest there may be generalizable features. We use Role Activity Diagrams as our diagramming method. In most organizations it is impractical to achieve a fully articulated business model and IS architecture. Organizations do try to make development (or acquisition) of information systems which will serve business needs as orderly as they can, in circumstances which are inherently complex and unstable. We suggest that the degree of regularity which is achieved in IS development within the business context comes not so much fmm following one overarching plan, as from a continuous process of adjustment, in which local short-term plans are weighed against current understanding of the business's key interests. What is needed to aid this process is a general framework of communication and decision making within which plans can be reviewed and modified in the light of changing circumstances. This paper presents an attempt to reveal and represent such a framework.",Business process; Information system development; Information systems architecture; Process modelling; Role activity diagrams,21,Information Systems Frontiers,2002 1645,Althoff K.-D.; Bomarius F.; Tautz C.,Knowledge Management for Building Learning Software Organizations,"Due to the steadily increasing demands of the market, strategic management of knowledge assets, or learning organizations, are becoming a must in industrial software development. This paper presents work done at Fraunhofer IESE, where learning organizations for software development organizations are being developed and transferred into industrial practice. It describes how learning organizations for the software domain can be built upon both mature approaches from Software Engineering like the experience factory model and industrial strength technology from knowledge management. A system to support the learning software organization is sketched and experiences regarding the implementation of this system and learning software organizations in general are presented.",Intelligent retrieval and storage system; Knowledge management; Knowledge representation; Learning software organization; Software domain; Software engineering experience environment,17,Information Systems Frontiers,2000 1646,Szirbik N.,A Negotiation Enabling Agent Based Infrastructure: Composition and Behavior,"Software agent-based negotiation is a major method to automate the interactions in electronic marketplaces and Internet enabled communities. The traditional approach is to let the agents to interact directly. In this paper it has been investigated how a mediator agent can improve the chances to reach the agreement via bargaining. Although the ideal mathematical model was proposed in the seventies, this was never implemented as a working mechanism, due to the fact that the mediator needed information that was difficult to gather and the usual environment was not repetitive enough to consolidate this information for a fair mediation. The agent-based infrastructure proposed collects continuously data about the negotiating parties and the mediator agents use this data to reduce the exaggeration of the parties. The paper includes a mediation example and the major conclusion is that negotiation is improved by a mediator which has historical data about the negotiating parties.",Agent provider; Mediated negotiation; Multi-agent systems; Virtual enterprise,13,Information Systems Frontiers,2002 1647,Stephens S.,Supply Chain Operations Reference Model Version 5.0: A New Tool to Improve Supply Chain Efficiency and Achieve Best Practice,"This paper discusses the Supply Chain Operations Reference (SCOR) Model, its development, and its use. The Model is the product of the Supply-Chain Council (SCC), an independent, not-for-profit, global corporation with membership open to all companies and organizations interested in applying and advancing the state-of-the-art in supply-chain management systems and practices. The SCOR Model is a business process reference model which provides a comprehensive toolset linking business processes to metrics, best practice and technology. The Model, primarily a tool for implementation, is being used successfully (as measured in Return on Investment) in North America, Europe, Latin America, Asia, and Australia/New Zealand. It is also being uses as a framework for undergraduate and graduate curriculum around the world. The SCC was organized in 1996 by Pittiglio Rabin Todd & McGrath (PRTM) and AMR Research, and initially included 69 voluntary member companies. Currently, the Council has over 750 members worldwide and has established international chapters in Europe, Japan, Korea, Latin America, Australia/New Zealand and Southeast Asia with Additional requests for regional chapters pending. The majority of the SCC's members are practitioners and represents a broad cross-section of industries, including manufacturers, distributors, and retailers. Equally important to the Council and the advancement of the SCOR-model are the technology suppliers and implementers, the academicians, and the government organizations that participate in Council activities and the development and maintenance of the Model.",Best practice; Metrics; SCOR; Supply chain council; Supply chain management,132,Information Systems Frontiers,2001 1648,Kalyan V.,Dynamic Customer Value Management: Asset Values under Demand Uncertainty using Airline Yield Management and Related Techniques,"The focus of this paper is to demonstrate the close links between the airline and the manufacturing industry in so far as some of their decision support problems are concerned. We show that the yield management (YM) problem for the airline characterized by perishable and limited resources has counterparts in manufacturing and retail although with some variations. In the process of establishing similarities we highlight the importance of the concept of value of assets/resources, known as bid price in the airline terminology, that ties the two together. Several examples of its calculations and uses are provided. We believe that this new paradigm will open up new avenues for profits for manufacturers in the new era of e-commerce where the businesses shall have to be increasingly customer centric including pricing functions.",Asset values; MAV; Resources; Uncertainty; Value management; Yield management,6,Information Systems Frontiers,2002 1649,Caruso F.; Umar A.,Architectures to survive technological and business turbulences,"Survivable architectures are needed so that the current and future systems can tolerate the usual turbulences of technology and business climate. This paper, based on insights gained through practical experience with several architectural projects in the telecom industry and active participation in the standards bodies, highlights the work being done on survivable architectures. Instead of presenting theoretical models, this paper relies on best practices and explains the concepts through a detailed case study. In particular, the concepts of separating the technology independent models from the technology specific models and externalizing the business process flows from the system components are shown to be of practical value.",Distributed systems; Enterprise systems; Middleware; Model Driven Architecture (MDA),6,Information Systems Frontiers,2004 1650,Bui T.; Cho S.; Sankaran S.; Sovereign M.,A Framework for Designing a Global Information Network for Multinational Humanitarian Assistance/Disaster Relief,"Large-scale Humanitarian Assistance/Disaster Relief (HA/DR) operations, particularly in developing countries, require the intervention and aid of various agencies from all over the world in a concerted and timely manner. As a result, HA/DR operations involve dynamic information exchange, planning, coordination and above all negotiation. Although a number of studies have reported the benefits of using information and communication technologies to support negotiation activities, it remains unclear how such technologies could be adapted to large-scale HA/DR operations. This paper examines negotiational issues involved in a multinational HA/ DR environment and presents a framework that would help in developing a Global Information Network (GIN). The proposed framework can be used to assess and characterize individual disaster situations so that the GIN functional and design requirements can be accurately identified early. Future implications to GIN architecture are also discussed.",Crisis management; Decision and negotiation support; Information management,100,Information Systems Frontiers,2000 1651,Sarkis J.; Sundarraj R.P.,Evaluating componentized enterprise information technologies: A multiattribute modeling approach,"Corporations are increasingly implementing enterprise information technologies (EITs), because of the costs of maintaining legacy systems and the lack of fit of such systems for organization-wide information sharing, A new type of EIT that is being introduced in major corporations (such as Dell Computers), is based on the idea of component systems, which are stand-alone software programs that can integrate with other such components with relative ease. Given the financial outlay for EITs, the evaluation and adoption of these systems is not something that can be completed haphazardly. This requirement is complicated by the relative infancy of models for the evaluation of componentized EITs, To this end, in this paper, we introduce a managerial multistage multiattribute decision model, consisting of the Analytical Hierarchy Process (AHP) model and the Supermatrix approach (also defined as the Analytical Network Processes (ANP) approach). This combination of models builds on earlier work that validates the Supermatrix approach for evaluating traditional EITs at a Fortune 100 organization. The aggregation of these benefits is then measured against the costs of systems, thereby arriving at a ranking of alternatives for each functional area. We illustrate the model with an example and draw managerial implications.",Analytical hierarchy process; Analytical network process; Componentized systems; Enterprise information technologies; Supermatrix,29,Information Systems Frontiers,2003 1652,Kannan P.K.; Chang A.-M.; Whinston A.B.,Electronic Communities in E-Business: Their Role and Issues,"Electronic communities are social aggregations of critical masses of people on the Internet who engage in public discussions, interactions, and information exchanges with sufficient human feeling on matters of common interest to form webs of personal relationships. Many such e-communities are rapidly evolving on the Internet, some initiated, organized, and controlled by community members themselves, some organized and controlled by marketers, and some by third parties acting as intermediaries between members and other interest groups such as marketers and advertisers. In this paper, we explore the role of e-communities as intermediaries in exchange relationships among community members and between community members and other interest groups such as marketers and advertisers from an economic perspective. In particular, we focus on the types of interactions that take place among community members and between community members and other interest groups and examine the economic and social issues involved in maintaining a healthy community. Deriving parallels from extant research in financial intermediation and social exchange theory, we explore conditions and incentive mechanisms under which such communities could develop and add value on the Internet. We also draw upon limited empirical examples from the World Wide Web to provide support to our propositions.",Consumer privacy; E-communities; Information exchange; Intermediaries,47,Information Systems Frontiers,2000 1653,Dobson P.J.,The Philosophy of Critical Realism - An Opportunity for Information Systems Research,"It is argued that recent research in the information systems field has tended to either emphasise the structural/collective dimension or the agency/individual dimension, not both. Structuration theory is a more recent attempt to address both agency and structure, however there are a number of issues with the use of structuration theory in information systems research, not the least of which is its lack of recognition of the temporal and longitudinal nature of information systems development. A relatively new philosophy, critical realism, provides the potential fora new approach to social investigations in its provision of an ontology for the analytical separation of structure and agency. The philosophy is introduced and its implications for sociological investigation are discussed.",Agency; Critical realism; Morphogenetic theory; Structuration theory; Structure,105,Information Systems Frontiers,2001 1654,Yuan S.-T.; Peng K.-H.,Location based and customized voice information service for mobile community,"Mobile commerce has been increasingly recognized as one of the most important prosperous areas for deploying information technology. This paper aims to advance the value of the information by providing a novel voice-information sharing mechanism that is a combination of a location-based information service (known as a Killer App) and a virtual community that consequently becomes a WCP (Wireless Content Provider). This community embodies context aware intelligence by analyzing the context-sensitive behavior of the community members and enabling proactive and precise context sensitive voice-information sharing; furthermore. This voice-information sharing mechanism is comprised of an IVR system, a location service, EPN (Euclidean distance with Positive and Negative Strength) Clustering, Naïve Bayesian Prediction, and a set of metrics for monitoring the progression of the community. The primitive results show that our mechanism satisfactorily reaches the goal of proactive precise sharing of voice information between community members.",Collaborative filtering; Context-Aware; Mobile commerce; Mobile Community; Naïve Bayesian,4,Information Systems Frontiers,2004 1655,Templeton G.F.; Morris S.A.; Snyder C.A.; Lewis B.R.,Methodological and thematic prescriptions for defining and measuring the organizational learning concept,"Despite the long tradition of research on organizational learning (OL), theoretically acceptable definitions and empirically derived measures of the concept have not been developed. This paper introduces theoretical proclamations and a methodological plan that can guide researchers towards the goal of operationalizing OL into a valid and reliable instrument. It includes (1) practical and scientific motivations for advancing and measuring the OL construct, (2) a suggested methodology for operationalization of definitions of OL, (3) theoretical and operational themes found in the literature, and (4) scale and sub-scale expectations. Organizational researchers are encouraged to use the directions embodied in this research to guide attempts at developing measures of organizational learning, in hopes of advancing the field beyond normal science.",Construct; Domain definition; Instrumentation; Measurement; Methodology; Organizational learning,16,Information Systems Frontiers,2004