default search action
ACM Transactions on Management Information Systems, Volume 6
Volume 6, Number 1, March 2015
- Donald J. Berndt, James A. McCart, Dezon K. Finch, Stephen L. Luther:
A Case Study of Data Quality in Text Mining Clinical Progress Notes. 1:1-1:21 - David Zimbra, Hsinchun Chen, Robert F. Lusch:
Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction. 2:1-2:38 - Shing-Han Li, Yu-Cheng Kao, Zong-Cyuan Zhang, Ying-Ping Chuang, David C. Yen:
A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means. 3:1-3:30 - Yen-Hsien Lee, Paul Jen-Hwa Hu, Ching-Yi Tu:
Ontology-Based Mapping for Automated Document Management: A Concept-Based Technique for Word Mismatch and Ambiguity Problems in Document Clustering. 4:1-4:22
Volume 6, Number 2, July 2015
- Juliana Sutanto, Atreyi Kankanhalli, Bernard Cheng Yian Tan:
Investigating Task Coordination in Globally Dispersed Teams: A Structural Contingency Perspective. 5:1-5:31 - Rahul C. Basole, Martha G. Russell, Jukka Huhtamäki, Neil Rubens, Kaisa Still, Hyunwoo Park:
Understanding Business Ecosystem Dynamics: A Data-Driven Approach. 6:1-6:32 - Xiaohui Zhao, Chengfei Liu, Sira Yongchareon, Marek Kowalkiewicz, Wasim Sadiq:
Role-Based Process View Derivation and Composition. 7:1-7:24 - Dengpan Liu, Sumit Sarkar, Chelliah Sriskandarajah:
Who's Next? Scheduling Personalization Services with Variable Service Times. 8:1-8:22
Volume 6, Number 3, October 2015
- Xue Bai, James R. Marsden, William T. Ross Jr., Gang Wang:
Relationships Among Minimum Requirements, Facebook Likes, and Groupon Deal Outcomes. 9:1-9:28 - Tanmay Bhowmik, Nan Niu, Prachi Singhania, Wentao Wang:
On the Role of Structural Holes in Requirements Identification: An Exploratory Study on Open-Source Software Development. 10:1-10:30 - Devipsita Bhattacharya, Sudha Ram:
RT @News: An Analysis of News Agency Ego Networks in a Microblogging Environment. 11:1-11:25 - Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Minimizing Organizational User Requirement while Meeting Security Constraints. 12:1-12:25
Volume 6, Number 4, January 2016
- Carlos Alberto Gomez-Uribe, Neil Hunt:
The Netflix Recommender System: Algorithms, Business Value, and Innovation. 13:1-13:19 - Rajiv Krishnamurthy, Varghese S. Jacob, Suresh Radhakrishnan, Kutsal Dogan:
Peripheral Developer Participation in Open Source Projects: An Empirical Analysis. 14:1-14:31 - Christos Liaskos, Ageliki Tsioliaridou:
Service Ratio-Optimal, Content Coherence-Aware Data Push Systems. 15:1-15:23
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.