Works matching IS 13873326 AND DT 2019 AND VI 21 AND IP 2
Results: 14
Twenty Years of Information Systems Frontiers.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 485, doi. 10.1007/s10796-019-09925-x
- By:
- Publication type:
- Article
Enhancing mobile data services performance via online reviews.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 441, doi. 10.1007/s10796-017-9763-1
- By:
- Publication type:
- Article
Using sentiment analysis to improve supply chain intelligence.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 469, doi. 10.1007/s10796-017-9762-2
- By:
- Publication type:
- Article
Leveraging collective intelligence for behavioral prediction in signed social networks through evolutionary approach.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 417, doi. 10.1007/s10796-017-9760-4
- By:
- Publication type:
- Article
Effectiveness of standards consortia: Social network perspectives.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 405, doi. 10.1007/s10796-017-9759-x
- By:
- Publication type:
- Article
Multi-dimensional intelligence in smart physical objects.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 383, doi. 10.1007/s10796-017-9758-y
- By:
- Publication type:
- Article
Way too sentimental? a credible model for online reviews.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 453, doi. 10.1007/s10796-017-9757-z
- By:
- Publication type:
- Article
Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 359, doi. 10.1007/s10796-017-9756-0
- By:
- Publication type:
- Article
The quest for complete security: An empirical analysis of users' multi-layered protection from security threats.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 343, doi. 10.1007/s10796-017-9755-1
- By:
- Publication type:
- Article
Enterprise security investment through time when facing different types of vulnerabilities.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 261, doi. 10.1007/s10796-017-9745-3
- By:
- Publication type:
- Article
Task scheduling algorithms for multi-cloud systems: allocation-aware approach.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 241, doi. 10.1007/s10796-017-9742-6
- By:
- Publication type:
- Article
Dynamic network analysis of online interactive platform.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 229, doi. 10.1007/s10796-017-9740-8
- By:
- Publication type:
- Article
A model to analyze the challenge of using cyber insurance.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 301, doi. 10.1007/s10796-017-9737-3
- By:
- Publication type:
- Article
Predictive maintenance: strategic use of IT in manufacturing organizations.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 2, p. 327, doi. 10.1007/s10796-017-9749-z
- By:
- Publication type:
- Article