An improved K-medoids algorithm based on step increasing and optimizing medoids Fulltext Access 37 Pages 2018
Opening the black box: Managers' perceptions of IS project success mechanisms Fulltext Access 37 Pages 2018
Fighting money laundering with technology: A case study of Bank X in the UK Fulltext Access 37 Pages 2018
Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud Fulltext Access 37 Pages 2018
Integrating KPSO and C5.0 to analyze the omnichannel solutions for optimizing telecommunication retail Fulltext Access 38 Pages 2018
NEAT F-PROMETHEE - A new fuzzy multiple criteria decision making method based on the adjustment of mapping trapezoidal fuzzy numbers Fulltext Access 38 Pages 2018
MSIM: A change detection framework for damage assessment in natural disasters Fulltext Access 38 Pages 2018
A new aspect on P2P online lending default prediction using meta-level phone usage data in China Fulltext Access 38 Pages 2018
The interplay between emotion, cognition and information recall from websites with relevant and irrelevant images: A Neuro-IS study Fulltext Access 38 Pages 2018
Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review Fulltext Access 38 Pages 2018
An improved MOEA/D algorithm for bi-objective optimization problems with complex Pareto fronts and its application to structural optimization Fulltext Access 38 Pages 2018
Mindfully going omni-channel: An economic decision model for evaluating omni-channel strategies Fulltext Access 39 Pages 2018
Can irrelevant benchmark information help when making business decisions under uncertainty? An empirical investigation of the newsvendor game Fulltext Access 39 Pages 2018
The evolutionary trajectory of an ICT ecosystem: A network analysis based on media users' data Fulltext Access 39 Pages 2018
Automatic sleep staging based on SVD, VMD, HHT and morphological features of single-lead ECG signal Fulltext Access 39 Pages 2018
My words for your pizza: An analysis of persuasive narratives in online crowdfunding Fulltext Access 40 Pages 2018
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory Fulltext Access 40 Pages 2018
Explaining resistance to system usage in the PharmaCloud: A view of the dual-factor model Fulltext Access 40 Pages 2018
MMDF-LDA: An improved Multi-Modal Latent Dirichlet Allocation model for social image annotation Fulltext Access 41 Pages 2018
A gateway to realising sustainability performance via green supply chain management practices: A PLS-ANN approach Fulltext Access 41 Pages 2018
A segmental HMM based trajectory classification using genetic algorithm Fulltext Access 42 Pages 2018
Using deep Q-learning to understand the tax evasion behavior of risk-averse firms Fulltext Access 42 Pages 2018
Omnichannel businesses in the publishing and retailing industries: Synergies and tensions between coexisting online and offline business models Fulltext Access 43 Pages 2018
A synthetic informative minority over-sampling (SIMO) algorithm leveraging support vector machine to enhance learning from imbalanced datasets Fulltext Access 43 Pages 2018
Time-aware cloud service recommendation using similarity-enhanced collaborative filtering and ARIMA model Fulltext Access 43 Pages 2018
PRAXIS: Towards automatic cognitive assessment using gesture recognition Fulltext Access 44 Pages 2018
A hybrid volatility forecasting framework integrating GARCH, artificial neural network, technical analysis and principal components analysis Fulltext Access 44 Pages 2018
Kappa-PSO-FAN based method for damage identification on composite structural health monitoring Fulltext Access 44 Pages 2018
An architecture for emergency event prediction using LSTM recurrent neural networks Fulltext Access 44 Pages 2018
Combining NeuroEvolution and Principal Component Analysis to trade in the financial markets Fulltext Access 44 Pages 2018
Effects of entrepreneurship and IT fashion on SMEs' transformation toward cloud service through mediation of trust Fulltext Access 44 Pages 2018
Spatio-contextual Gaussian mixture model for local change detection in underwater video Fulltext Access 44 Pages 2018
A new automatic sleep staging system based on statistical behavior of local extrema using single channel EEG signal Fulltext Access 45 Pages 2018
Process variant comparison: Using event logs to detect differences in behavior and business rules Fulltext Access 45 Pages 2018
Two-stage aggregation paradigm for HFLTS possibility distributions: A hierarchical clustering perspective Fulltext Access 46 Pages 2018
Technology executives in the changing accounting information environment: Impact of IFRS adoption on CIO compensation Fulltext Access 46 Pages 2018
Interactive multidimensional modeling of linked data for exploratory OLAP Fulltext Access 46 Pages 2018
Gatekeepers' innovative use of IT: An absorptive capacity model at the unit level Fulltext Access 47 Pages 2018
SACRE: Supporting contextual requirements' adaptation in modern self-adaptive systems in the presence of uncertainty at runtime Fulltext Access 47 Pages 2018
Classification of vocal and non-vocal segments in audio clips using genetic algorithm based feature selection (GAFS) Fulltext Access 48 Pages 2018
IT managers' vs. IT auditors' perceptions of risks: An actor-observer asymmetry perspective Fulltext Access 48 Pages 2018
Identifying typical approaches and errors in Prolog programming with argument-based machine learning Fulltext Access 49 Pages 2018
Bacterial Memetic Algorithms for Order Picking Routing Problem with Loading Constraints Fulltext Access 49 Pages 2018
Classification of focal and non-focal EEG signals using neighborhood component analysis and machine learning algorithms Fulltext Access 49 Pages 2018
ModAugNet: A new forecasting framework for stock market index value with an overfitting prevention LSTM module and a prediction LSTM module Fulltext Access 51 Pages 2018
Understanding employee competence, operational IS alignment, and organizational agility - An ambidexterity perspective Fulltext Access 52 Pages 2018
Perceived information transparency in B2C e-commerce: An empirical investigation Fulltext Access 52 Pages 2018
VazaDengue: An information system for preventing and combating mosquito-borne diseases with social networks Fulltext Access 53 Pages 2018
A novel heterogeneous ensemble credit scoring model based on bstacking approach Fulltext Access 54 Pages 2018
Channel integration quality, perceived fluency and omnichannel service usage: The moderating roles of internal and external usage experience Fulltext Access 55 Pages 2018
A two-phase MILP approach to integrate order, customer and manufacturer characteristics into Dynamic Manufacturing Network formation and operational planning Fulltext Access 60 Pages 2018
Selection of the most relevant terms based on a max-min ratio metric for text classification Fulltext Access 61 Pages 2018
A new approach for the design of digital frequency selective FIR filters using an FPA-based algorithm Fulltext Access 62 Pages 2018
Development of a combinational framework to concurrently perform tissue segmentation and tumor identification in T1 - W, T2 - W, FLAIR and MPR type magnetic resonance brain images Fulltext Access 74 Pages 2018
Special issue on DOLAP 2015: Evolving data warehousing and OLAP cubes to big data analytics Fulltext Access 4 Pages 2017
Nurturing a FinTech ecosystem: The case of a youth microloan startup in China Fulltext Access 6 Pages 2017
Creating value through IT-enabled integration in public organizations: A case study of a prefectural Chinese Center for Disease Control and Prevention Fulltext Access 6 Pages 2017
Utilizing an interpersonal communication framework to understand information behaviors involved in HIV disclosure Fulltext Access 7 Pages 2017
On the implementation of open government information in Xuhui District, Shanghai Fulltext Access 7 Pages 2017
A literature analysis of the use of Absorptive Capacity construct in IS research Fulltext Access 7 Pages 2017
Obtaining forensic value from the cbWndExtra structures as used by Windows Common Controls, specifically for the Editbox control Fulltext Access 7 Pages 2017
FRAIPA: A fast recommendation approach with improved prediction accuracy Fulltext Access 8 Pages 2017
Antecedents of student MOOC revisit intention: Moderation effect of course difficulty Fulltext Access 8 Pages 2017
Towards computer based lung disease diagnosis using accurate lung air segmentation of CT images in exhalation and inhalation phases Fulltext Access 8 Pages 2017
On sensor-based solutions for simultaneous presence of multiple RFIDÂ tags Fulltext Access 8 Pages 2017
DFRWS 2017 Europe - Proceedings of the Fourth Annual DFRWS EuropeForce Open: Lightweight black box file repair Fulltext Access 8 Pages 2017
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution Fulltext Access 8 Pages 2017
What factors drive open innovation in China's public sector? A case study of official document exchange via microblogging (ODEM) in Haining Fulltext Access 8 Pages 2017
Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks Fulltext Access 8 Pages 2017
A content service deployment plan for metaverse museum exhibitions-Centering on the combination of beacons and HMDs Fulltext Access 9 Pages 2017
Datification, Organizational Strategy, and IS Research: What's the Score? Fulltext Access 9 Pages 2017
LOMA: A local outlier mining algorithm based on attribute relevance analysis Fulltext Access 9 Pages 2017
A centroidal Voronoi tessellation based intelligent control algorithm for the self-assembly path planning of swarm robots Fulltext Access 9 Pages 2017
An empirical investigation on the impact of XBRL adoption on information asymmetry: Evidence from Europe Fulltext Access 9 Pages 2017
Registration Data Access Protocol (RDAP) for digital forensic investigators Fulltext Access 9 Pages 2017
SCARF: A container-based approach to cloud-scale digital forensic processing Fulltext Access 9 Pages 2017