Works matching IS 13873326 AND DT 2015 AND VI 17 AND IP 5
Results: 15
Social balance in signed networks.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1077, doi. 10.1007/s10796-014-9483-8
- By:
- Publication type:
- Article
Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1039, doi. 10.1007/s10796-014-9484-7
- By:
- Publication type:
- Article
Does better Internet access lead to more adoption? A new empirical study using household relocation.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1097, doi. 10.1007/s10796-014-9485-6
- By:
- Publication type:
- Article
Measurements of mislead threshold of company graph distortion.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1111, doi. 10.1007/s10796-014-9486-5
- By:
- Publication type:
- Article
How business process reengineering affects information technology investment and employee performance under different performance measurement.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1133, doi. 10.1007/s10796-014-9487-4
- By:
- Publication type:
- Article
Addressing the valuation problem in multi-round combinatorial auctions.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1145, doi. 10.1007/s10796-014-9491-8
- By:
- Publication type:
- Article
IPTV parental control: A collaborative model for the Social Web.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1161, doi. 10.1007/s10796-014-9494-5
- By:
- Publication type:
- Article
Understanding health information technology adoption: A synthesis of literature from an activity perspective.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1177, doi. 10.1007/s10796-014-9497-2
- By:
- Publication type:
- Article
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 997, doi. 10.1007/s10796-015-9568-z
- By:
- Publication type:
- Article
Surviving advanced persistent threats in a distributed environment - Architecture and analysis.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 987, doi. 10.1007/s10796-015-9569-y
- By:
- Publication type:
- Article
Analysis of a multistage attack embedded in a video file.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1029, doi. 10.1007/s10796-015-9570-5
- By:
- Publication type:
- Article
Game-theoretic strategies for IDS deployment in peer-to-peer networks.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1017, doi. 10.1007/s10796-015-9582-1
- By:
- Publication type:
- Article
Secure and privacy preserving data processing support for active authentication.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1007, doi. 10.1007/s10796-015-9587-9
- By:
- Publication type:
- Article
Advances in secure knowledge management in the big data era.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Radio frequency identification (RFID) adoption: A cross-sectional comparison of voluntary and mandatory contexts.
- Published in:
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1057, doi. 10.1007/s10796-013-9482-1
- By:
- Publication type:
- Article