


default search action
Information Systems Frontiers, Volume 25
Volume 25, Number 1, February 2023
- Denis Dennehy, Anastasia Griva
, Nancy Pouloudi, Yogesh K. Dwivedi
, Matti Mäntymäki
, Ilias O. Pappas
:
Artificial Intelligence (AI) and Information Systems: Perspectives to Responsible AI. 1-7 - Fred Niederman
, Elizabeth White Baker
:
Ethics and AI Issues: Old Container with New Wine? 9-28 - Sai Dattathrani
, Rahul De':
The Concept of Agency in the Era of Artificial Intelligence: Dimensions and Degrees. 29-54 - Antoine Harfouche
, Bernard Quinio, Mario Saba, Peter Bou Saba
:
The Recursive Theory of Knowledge Augmentation: Integrating human intuition and knowledge in Artificial Intelligence to augment organizational knowledge. 55-70 - Vasiliki Koniakou
:
From the "rush to ethics" to the "race for governance" in Artificial Intelligence. 71-102 - Matti Minkkinen, Markus Philipp Zimmer, Matti Mäntymäki
:
Co-Shaping an Ecosystem for Responsible AI: Five Types of Expectation Work in Response to a Technological Frame. 103-121 - Emmanouil Papagiannidis, Ida Merete Enholm, Christian Dremel, Patrick Mikalef, John Krogstie
:
Toward AI Governance: Identifying Best Practices and Potential Barriers and Outcomes. 123-141 - Ariana Polyviou
, Efpraxia D. Zamani
:
Are we Nearly There Yet? A Desires & Realities Framework for Europe's AI Strategy. 143-159 - Yu Chen
, Scott Jensen, Leslie J. Albert, Sambhav Gupta, Terri Lee:
Artificial Intelligence (AI) Student Assistants in the Classroom: Designing Chatbots to Support Student Success. 161-182 - Ransome Epie Bawack
, Emilie Bonhoure
:
Influencer is the New Recommender: insights for Theorising Social Recommender Systems. 183-197 - Prabhsimran Singh, Surleen Kaur, Abdullah M. Baabdullah, Yogesh K. Dwivedi
, Sandeep Sharma, Ravinder Singh Sawhney, Ronnie Das:
Is #SDG13 Trending Online? Insights from Climate Change Discussions on Twitter. 199-219 - Damminda Alahakoon, Rashmika Nawaratne, Yan Xu
, Daswin De Silva, Uthayasankar Sivarajah
, Bhumika Gupta:
Self-Building Artificial Intelligence and Machine Learning to Empower Big Data Analytics in Smart Cities. 221-240 - Denis Dennehy, Kieran Conboy, Jennifer Ferreira, Jaganath Babu:
Sustaining Open Source Communities by Understanding the Influence of Discursive Manifestations on Sentiment. 241-257 - Dakshitha N. Jinasena, Konstantina Spanaki
, Thanos Papadopoulos, Maria Elisavet Balta:
Success and Failure Retrospectives of FinTech Projects: A Case Study Approach. 259-274 - Flávio E. A. Horita, João Baptista
, João Porto de Albuquerque
:
Exploring the use of IoT Data for Heightened Situational Awareness in Centralised Monitoring Control Rooms. 275-290 - Tenanoia Simona, Tauisi Taupo
, Pedro Antunes
:
A Scoping Review on Agency Collaboration in Emergency Management Based on the 3C Model. 291-302 - Jennifer Fromm, Kaan Eyilmez, Melina Baßfeld, Tim A. Majchrzak, Stefan Stieglitz:
Social Media Data in an Augmented Reality System for Situation Awareness Support in Emergency Control Rooms. 303-326 - Anke Joubert, Matthias Murawski
, Markus Bick:
Measuring the Big Data Readiness of Developing Countries - Index Development and its Application to Africa. 327-350 - Shono Fujita
, Michinori Hatayama:
Estimation Method for Roof-damaged Buildings from Aero-Photo Images During Earthquakes Using Deep Learning. 351-363 - Jun Zhang
, Shuyang Li
, Yichuan Wang
:
Shaping a Smart Transportation System for Sustainable Value Co-Creation. 365-380 - Armel Lefebvre
, Marco Spruit
:
Laboratory Forensics for Open Science Readiness: an Investigative Approach to Research Data Management. 381-399 - Nisreen Ameen
, Nnamdi O. Madichie, Amitabh Anand
:
Between Handholding and Hand-held Devices: Marketing Through Smartphone Innovation and Women's Entrepreneurship in Post Conflict Economies in Times of Crisis. 401-423
Volume 25, Number 2, April 2023
- Sagar Samtani
, Ziming Zhao, Ram Krishnan:
Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence. 425-429 - Clinton Daniel
, Matthew T. Mullarkey, Manish Agrawal:
RQ Labs: A Cybersecurity Workforce Skills Development Framework. 431-450 - Romanus Izuchukwu Okeke
, Max Hashem Eiza:
The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies. 451-472 - Wingyan Chung
, Yinqiang Zhang
, Jia Pan:
A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media. 473-492 - Lina Zhou
, Jie Tao, Dongsong Zhang:
Does Fake News in Different Languages Tell the Same Story? An Analysis of Multi-level Thematic and Emotional Characteristics of News about COVID-19. 493-512 - Seema Rani, Mukesh Kumar
:
Heterogeneous Information Fusion based Topic Detection from Social Media Data. 513-528 - Carlos E. Rubio-Medrano
, Pradeep Kumar Duraisamy Soundrapandian, Matthew Hill, Luis Claramunt, Jaejong Baek
, Geetha S, Gail-Joon Ahn
:
DyPolDroid: Protecting Against Permission-Abuse Attacks in Android. 529-548 - Alex Nosenko, Yuan Cheng
, Haiquan Chen:
Password and Passphrase Guessing with Recurrent Neural Networks. 549-565 - Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:
Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses. 567-587 - Mohit Sewak
, Sanjay K. Sahay, Hemant Rathore:
Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. 589-611 - Randy Klepetko
, Ram Krishnan:
Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural Data Order. 613-638 - Sun-Pyo Lee, Kyungji Kim, Sungbum Park
:
Investigating the Market Success of Software-as-a-Service Providers: the Multivariate Latent Growth Curve Model Approach. 639-658 - Nannan Xi
, Juan Chen
, Filipe Gama
, Marc Riar
, Juho Hamari:
The challenges of entering the metaverse: An experiment on the effect of extended reality on workload. 659-680 - Tejaswini C. Herath
, Hemantha S. B. Herath, David Cullum:
An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks. 681-721 - Ashish Kumar Jha
, Nishant Kumar Verma
:
Social Media Sustainability Communication: An Analysis of Firm Behaviour and Stakeholder Responses. 723-742 - Christian Meske, Enrico Bunde:
Design Principles for User Interfaces in AI-Based Decision Support Systems: The Case of Explainable Hate Speech Detection. 743-773 - Frank Bivar Franque, Tiago Oliveira
, Carlos Tam
:
Continuance Intention of Mobile Payment: TTF Model with Trust in an African Context. 775-793 - Abdulla H. Fetais, Raed Salah Algharabat
, Abdullah Aljafari, Nripendra P. Rana
:
Do Social Media Marketing Activities Improve Brand Loyalty? An Empirical Study on Luxury Fashion Brands. 795-817 - Ajaya K. Swain
, Valeria R. Garza:
Key Factors in Achieving Service Level Agreements (SLA) for Information Technology (IT) Incident Resolution. 819-834 - Mazen El-Masri, Karim Al-Yafi, Muhammad Mustafa Kamal
:
A Task-Technology-Identity Fit Model of Smartwatch Utilisation and User Satisfaction: A Hybrid SEM-Neural Network Approach. 835-852 - Srikanth Parameswaran
, Pubali Mukherjee, Rohit Valecha:
I Like My Anonymity: An Empirical Investigation of the Effect of Multidimensional Review Text and Role Anonymity on Helpfulness of Employer Reviews. 853-870 - Satish Kumar
, Weng Marc Lim
, Uthayasankar Sivarajah, Jaspreet Kaur:
Artificial Intelligence and Blockchain Integration in Business: Trends from a Bibliometric-Content Analysis. 871-896 - Obi Ogbanufe, Corey Baham:
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret. 897-916 - Muhammad Ovais Ahmad
, Iftikhar Ahmad
, Nripendra P. Rana
, Iqra Sadaf Khan
:
An Empirical Investigation on Business Analytics in Software and Systems Development Projects. 917-927 - Samuli Laato
, Matti Mäntymäki
, A. K. M. Najmul Islam, Sami Hyrynsalmi
, Teemu Birkstedt:
Trends and Trajectories in the Software Industry: implications for the future of work. 929-944
Volume 25, Number 3, June 2023
- Ilias O. Pappas, Patrick Mikalef
, Yogesh K. Dwivedi
, Letizia Jaccheri, John Krogstie
:
Responsible Digital Transformation for a Sustainable Society. 945-953 - Polyxeni Vassilakopoulou
, Eli Hustad
:
Bridging Digital Divides: a Literature Review and Research Agenda for Information Systems Research. 955-969 - Yogesh K. Dwivedi
, Elvira Ismagilova
, Nripendra P. Rana, Ramakrishnan Raman
:
Social Media Adoption, Usage And Impact In Business-To-Business (B2B) Context: A State-Of-The-Art Literature Review. 971-993 - Emanuele Gabriel Margherita
, Alessio Maria Braccini:
Industry 4.0 Technologies in Flexible Manufacturing for Sustainable Organizational Value: Reflections from a Multiple Case Study of Italian Manufacturers. 995-1016 - David Soto Setzke
, Tobias Riasanow, Markus Böhm
, Helmut Krcmar
:
Pathways to Digital Service Innovation: The Role of Digital Transformation Strategies in Established Organizations. 1017-1037 - Emily Bacon
, Michael D. Williams, Gareth H. Davies:
On the Combinatory Nature of Knowledge Transfer Conditions: A Mixed Method Assessment. 1039-1061 - Mina Nasiri
, Minna Saunila, Juhani Ukko, Tero Rantala
, Hannu Rantanen:
Shaping Digital Innovation Via Digital-related Capabilities. 1063-1080 - Carlos Ferreira
, Alessandro Merendino, Maureen Meadows
:
Disruption and Legitimacy: Big Data in Society. 1081-1100 - Davit Marikyan
, Savvas Papagiannidis, Eleftherios Alamanos:
Cognitive Dissonance in Technology Adoption: A Study of Smart Home Users. 1101-1123 - Thomas Schulz
, Heiko Gewald, Markus Böhm, Helmut Krcmar:
Smart Mobility: Contradictions in Value Co-Creation. 1125-1145 - Mohammad I. Merhi
:
An Assessment of the Barriers Impacting Responsible Artificial Intelligence. 1147-1160 - Frederik Ahlemann, Sven Dittes, Tim Fillbrunn, Kevin Rehring, Stefan Reining
, Nils Urbach:
Managing In-Company IT Standardization: A Design Theory. 1161-1178 - Shivam Gupta
, Sachin Modgil, Choong-Ki Lee, Uthayasankar Sivarajah:
The future is yesterday: Use of AI-driven facial recognition to enhance value in the travel and tourism industry. 1179-1195 - Suparna Dhar
, Indranil Bose
:
Corporate Users' Attachment to Social Networking Sites: Examining the Role of Social Capital and Perceived Benefits. 1197-1217 - Kichan Nam, Christopher S. Dutt
, Jeff Baker
:
Authenticity in Objects and Activities: Determinants of Satisfaction with Virtual Reality Experiences of Heritage and Non-Heritage Tourism Sites. 1219-1237 - Kichan Nam, Christopher S. Dutt
, Jeff Baker:
Correction to: Authenticity in Objects and Activities: Determinants of Satisfaction with Virtual Reality Experiences of Heritage and Non‑Heritage Tourism Sites. 1239 - Amit Kumar Kushwaha, Ruchika Pharswan, Prashant Kumar
, Arpan Kumar Kar
:
How Do Users Feel When They Use Artificial Intelligence for Decision Making? A Framework for Assessing Users' Perception. 1241-1260 - Salih Tutun, Marina E. Johnson, Abdulaziz Ahmed, Abdullah Albizri, Sedat Irgil, Ilker Yesilkaya, Esma Nur Ucar, Tanalp Sengun, Antoine Harfouche
:
An AI-based Decision Support System for Predicting Mental Health Disorders. 1261-1276 - Roozmehr Safi
, Glenn J. Browne:
Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects. 1277-1292
Volume 25, Number 4, August 2023
- Sujeet Kumar Sharma, Marijn Janssen, Deborah Bunker, Carine Dominguez-Péry, Jang Bahadur Singh, Yogesh K. Dwivedi
, Santosh K. Misra:
Unlocking the Potential of Smart Technologies: Addressing Adoption Challenges. 1293-1298 - Sheshadri Chatterjee
, Nripendra P. Rana
, Sangeeta Khorana
, Patrick Mikalef
, Anuj Sharma
:
Assessing Organizational Users' Intentions and Behavior to AI Integrated CRM Systems: a Meta-UTAUT Approach. 1299-1313 - Denis Dennehy
, Kieran Conboy, Jaganath Babu:
Adopting Learning Analytics to Inform Postgraduate Curriculum Design: Recommendations and Research Agenda. 1315-1331 - Banita Lal
, Yogesh K. Dwivedi
, Markus Haag:
Working from Home During Covid-19: Doing and Managing Technology-enabled Social Interaction With Colleagues at a Distance. 1333-1350 - Arpan Kumar Kar
, Amit Kumar Kushwaha:
Facilitators and Barriers of Artificial Intelligence Adoption in Business - Insights from Opinions Using Big Data Analytics. 1351-1374 - Vinay Reddy Venumuddala
, Rajalaxmi Kamath:
Work Systems in the Indian Information Technology (IT) Industry Delivering Artificial Intelligence (AI) Solutions and the Challenges of Work from Home. 1375-1399 - Yiwei Gong
, Marijn Janssen:
Why Organizations Fail in Implementing Enterprise Architecture Initiatives? 1401-1419 - Yogesh K. Dwivedi
, Elvira Ismagilova
, Prianka Sarker, Anand Jeyaraj, Yassine Jadil
, Laurie Hughes:
A Meta-Analytic Structural Equation Model for Understanding Social Commerce Adoption. 1421-1437 - Victoria Kisekka, Sanjay Goel
:
An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. 1439-1458 - Jin Li
, Yulan Zhang, Jianping Li, Jiangze Du:
The Role of Sentiment Tendency in Affecting Review Helpfulness for Durable Products: Nonlinearity and Complementarity. 1459-1477 - Jiexun Li
, Xiaohui Chang:
Combating Misinformation by Sharing the Truth: a Study on the Spread of Fact-Checks on Social Media. 1479-1493 - Shuai Yuan
, Sanjukta Das, Ram Ramesh, Chunming Qiao:
Availability-Aware Virtual Resource Provisioning for Infrastructure Service Agreements in the Cloud. 1495-1512 - Navid Aghakhani, Onook Oh
, Dawn G. Gregg
, Hemant Jain:
How Review Quality and Source Credibility Interacts to Affect Review Usefulness: An Expansion of the Elaboration Likelihood Model. 1513-1531 - Yen-Chun Chou, Benjamin B. M. Shao:
An Empirical Study of Information Technology Capabilities to Enable Value Chain Activities and Interfaces. 1533-1547 - Michael Weber
, Martin Engert, Norman Schaffer, Jörg Weking, Helmut Krcmar:
Organizational Capabilities for AI Implementation - Coping with Inscrutability and Data Dependency in AI. 1549-1569 - Olivera Marjanovic
, Greg Patmore, Nikola Balnave
:
Visual Analytics: Transferring, Translating and Transforming Knowledge from Analytics Experts to Non-technical Domain Experts in Multidisciplinary Teams. 1571-1588 - Abhinav Kumar
, Jyoti Prakash Singh, Nripendra P. Rana, Yogesh K. Dwivedi
:
Multi-Channel Convolutional Neural Network for the Identification of Eyewitness Tweets of Disaster. 1589-1604 - Meihua Zuo, Spyros Angelopoulos
, Zhouyang Liang
, Carol X. J. Ou
:
Blazing the Trail: Considering Browsing Path Dependence in Online Service Response Strategy. 1605-1619 - Vinay Singh
, Brijesh Nanavati, Arpan Kumar Kar
, Agam Gupta:
How to Maximize Clicks for Display Advertisement in Digital Marketing? A Reinforcement Learning Approach. 1621-1638 - Xiaohui Liu, Na Jiang
, Mengyao Fu
, Zhao Cai, Eric T. K. Lim
, Chee-Wee Tan:
What Piques Users' Curiosity on Open Innovation Platforms? An Analysis Based on Mobile App Stores. 1639-1660
Volume 25, Number 5, October 2023
- Dan J. Kim, Indranil Bose, Arunabha Mukhopadhyay:
Special Issue on Bright Information and Communication Technologies in the 21st Century. 1661-1665 - Paras Bhatt
, Naga Vemprala, Rohit Valecha, Govind Hariharan, H. Raghav Rao:
User Privacy, Surveillance and Public Health during COVID-19 - An Examination of Twitterverse. 1667-1682 - Jae Yeon Kim, Jaeung Sim, Daegon Cho
:
Identity and Status: When Counterspeech Increases Hate Speech Reporting and Why. 1683-1694 - Supunmali Ahangama
:
Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis. 1695-1711 - Ben Krishna
, Satish Krishnan, M. P. Sebastian:
Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective. 1713-1741 - Pierrick Pelé, Julia Schulze, Selwyn Piramuthu, Wei Zhou:
IoT and Blockchain Based Framework for Logistics in Food Supply Chains. 1743-1756 - Kalpit Sharma
, Arunabha Mukhopadhyay:
Cyber-risk Management Framework for Online Gaming Firms: an Artificial Neural Network Approach. 1757-1778 - Sheshadri Chatterjee
, Ranjan Chaudhuri, Sachin S. Kamble
, Shivam Gupta
, Uthayasankar Sivarajah
:
Adoption of Artificial Intelligence and Cutting-Edge Technologies for Production System Sustainability: A Moderator-Mediation Analysis. 1779-1794 - Abderrazek Azri
, Cécile Favre, Nouria Harbi, Jérôme Darmont, Camille Noûs:
Rumor Classification through a Multimodal Fusion Framework and Ensemble Learning. 1795-1810 - Ashutosh Jha
, Manisha Chakrabarty, Debashis Saha
:
Network Investment as Drivers of Mobile Subscription - A Firm-level Analysis. 1811-1828 - Eunji Lee, Jin-young Kim, Junchul Kim
, Chulmo Koo:
Information Privacy Behaviors during the COVID-19 Pandemic: Focusing on the Restaurant Context. 1829-1845 - Lai-Ying Leong, Teck-Soon Hew, Keng-Boon Ooi
, Bhimaraya A. Metri, Yogesh K. Dwivedi
:
Extending the Theory of Planned Behavior in the Social Commerce Context: A Meta-Analytic SEM (MASEM) Approach. 1847-1879 - Jithesh Arayankalam, Satish Krishnan:
ICT-Based Country-Level Determinants of Social Media Diffusion. 1881-1902 - Anders Haug
, Aleksandra Staskiewicz, Lars Hvam:
Strategies for Master Data Management: A Case Study of an International Hearing Healthcare Company. 1903-1923 - Chiara Forresi
, Matteo Francia
, Enrico Gallinucci
, Matteo Golfarelli:
Cost-based Optimization of Multistore Query Plans. 1925-1951 - Kanika Goel
, Wasana Bandara, Guy Gable:
Banking the Unbanked: Conceptualizing Success of the Business Correspondent Model. 1953-1984 - Petr Hájek
, Mohammad Zoynul Abedin
, Uthayasankar Sivarajah:
Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework. 1985-2003 - Witold Andrzejewski
, Pawel Boinski
:
Maximal Mixed-Drove Co-occurrence Patterns. 2005-2028 - John Oredo, Denis Dennehy
:
Exploring the Role of Organizational Mindfulness on Cloud Computing and Firm Performance: The Case of Kenyan Organizations. 2029-2050 - Qingfeng Zeng, Qian Guo
, Wei Zhuang
, Yu Zhang, Weiguo Fan:
Do Real-Time Reviews Matter? Examining how Bullet Screen Influences Consumers' Purchase Intention in Live Streaming Commerce. 2051-2067 - Qingfeng Zeng, Qian Guo
, Wei Zhuang, Yu Zhang, Weiguo Fan:
Correction to: Do Real-Time Reviews Matter? Examining how Bullet Screen Influences Consumers' Purchase Intention in Live Streaming Commerce. 2069 - Yogesh K. Dwivedi
, Nir Kshetri, Laurie Hughes, Nripendra P. Rana, Abdullah M. Baabdullah, Arpan Kumar Kar
, Alex Koohang, Samuel Ribeiro-Navarrete
, Nina Belei, Janarthanan Balakrishnan, Sriparna Basu, Abhishek Behl
, Gareth H. Davies, Vincent Dutot
, Rohita Dwivedi
, Leighton Evans, Reto Felix, Richard Foster-Fletcher, Mihalis Giannakis
, Ashish Gupta, Chris Hinsch, Animesh Jain, Nina Jane Patel, Timothy Jung
, Satinder Juneja, Qeis Kamran
, Sanjar Mohamed AB, Neeraj Pandey
, Savvas Papagiannidis, Ramakrishnan Raman
, Philipp A. Rauschnabel, Preeti Tak, Alexandra Taylor
, M. Claudia tom Dieck, Giampaolo Viglia
, Yichuan Wang, Meiyi Yan:
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse. 2071-2114 - Shih-Yeh Chen, Qi-Fong He, Chin-Feng Lai
:
Correction to: Deep Reinforcement Learning-Based Robot Exploration for Constructing Map of Unknown Environment. 2115
Volume 25, Number 6, December 2023
- Uthayasankar Sivarajah, Yichuan Wang, Hossein Olya, Sherin Mathew:
Responsible Artificial Intelligence (AI) for Digital Health and Medical Analytics. 2117-2122 - Samuel Fosso Wamba
, Maciel Manoel Queiroz
:
Responsible Artificial Intelligence as a Secret Ingredient for Digital Health: Bibliometric Analysis, Insights, and Research Directions. 2123-2138 - Cristina Trocin
, Patrick Mikalef
, Zacharoula K. Papamitsiou
, Kieran Conboy:
Responsible AI for Digital Health: a Synthesis and a Research Agenda. 2139-2157 - Fatema Al-Dhaen, Jiachen Hou
, Nripendra P. Rana
, Vishanth Weerakkody:
Advancing the Understanding of the Role of Responsible AI in the Continued Use of IoMT in Healthcare. 2159-2178 - Marina Johnson, Abdullah Albizri, Antoine Harfouche
:
Responsible Artificial Intelligence in Healthcare: Predicting and Preventing Insurance Claim Denials for Economic and Social Wellbeing. 2179-2195 - Pradeep Kumar
, Yogesh K. Dwivedi
, Ambuj Anand:
Responsible Artificial Intelligence (AI) for Value Formation and Market Performance in Healthcare: the Mediating Role of Patient's Cognitive Engagement. 2197-2220 - Ramzi El-Haddadeh
, Adam Fadlalla, Nitham Mohammed Hindi:
Is There a Place for Responsible Artificial Intelligence in Pandemics? A Tale of Two Countries. 2221-2237 - Wei Wang, Long Chen, Mengran Xiong
, Yichuan Wang:
Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care. 2239-2256 - Shivam Gupta
, Shampy Kamboj, Surajit Bag:
Role of Risks in the Development of Responsible Artificial Intelligence in the Digital Healthcare Domain. 2257-2274 - Rui Liu
, Suraksha Gupta, Parth Patel
:
The Application of the Principles of Responsible AI on Social Media Marketing for Digital Health. 2275-2299 - Salih Tutun, Antoine Harfouche
, Abdullah Albizri, Marina E. Johnson, Haiyue He:
A Responsible AI Framework for Mitigating the Ramifications of the Organ Donation Crisis. 2301-2316 - Zehra Ece Serman
, Julian Sims:
Source Credibility Theory: SME Hospitality Sector Blog Posting During the Covid-19 Pandemic. 2317-2334 - Sujeet Kumar Sharma
, Anubhav Mishra
:
Enablers and Inhibitors of Mobile Payments in Rural India: a Dual-Factor Theory Perspective. 2335-2351 - Nilesh Saraf
, Pratyush Bharati, Thiagarajan Ravichandran
:
Does Social Capital Arise from Enterprise or Public Social Media Use? A Model of Social Media Antecedents and Consequences. 2353-2375 - Soomin Park, Junghoon Moon, Cheul Rhee, Young Chan Choe:
Understanding Online Music Piracy Behavior via Private Communication Channels. 2377-2392 - Qiuju Yin, Chenxi Guo, Cen He, Zhijun Yan
:
Effect of New Bundled Services on Doctors' Online Social and Economic Returns: Evidence from an Online Health Community. 2393-2416 - Ariana Polyviou, Ilias O. Pappas
:
Chasing Metaverses: Reflecting on Existing Literature to Understand the Business Value of Metaverses. 2417-2438 - Silvia Lips, Valentyna Tsap, Nitesh Bharosa, Robert Krimmer, Tanel Tammet, Dirk Draheim
:
Management of National eID Infrastructure as a State-Critical Asset and Public-private Partnership: Learning from the Case of Estonia. 2439-2456 - Spyros Angelopoulos
, Kubra S. Canhilal, Matthew A. Hawkins:
From Groups to Communities: A Resource Mobilization Theory Perspective on the Emergence of Communities. 2457-2474 - Chul Woo Yoo
, Inkyoung Hur
, Jahyun Goo:
Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination. 2475-2491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.