Open Save New
FeedNavigator / National Library of Health Sciences
Computer Science
AddActa Automatica Sinica
AddAd hoc networks
AddAdvanced engineering informatics
AddAdvanced robotics
AddAll Things Digital - News
AddAmazon Web Services Blog
AddAnalog integrated circuits and signal processing
AddAnnals of telecommunications - Annales des télécommunications
AddAnnual reviews in control
AddApplied soft computing
AddAutomation and remote control
AddAutomation in construction
AddAutonomous robots
AddBioData Mining
AddBioinformatics (journal)
AddBiomedical Digital Libraries
AddBlown to Bits
AddBMC Bioinformatics
AddBMC Medical Informatics and Decision Making
AddBriefings in Bioinformatics
AddCCC Computing Research Highlights
AddCentral European journal of operations research
AddCIN: Computers, Informatics, Nursing
AddClass M
AddCluster computing
AddCognitive systems research
AddComputational Intelligence
AddComputer animation and virtual worlds
AddComputer communications
AddComputer fraud and security
AddComputer languages, systems and structures
AddComputer Methods and Programs in Biomedicine
AddComputer networks
AddComputer Scientist in a Business School
AddComputer speech and language
AddComputer vision and image understanding
AddComputerized Medical Imaging and Graphics
AddComputers in Biology and Medicine
AddComputing and visualization in science
AddCybernetics and systems analysis
AddCyberpsychology & behavior
AddDaniel Lemire's blog
AddDesign automation for embedded systems
AddDigital Creativity
AddDigital Science Blog
AddDiscrete event dynamic systems
AddDynamical systems
AddElectronic Commerce Research
AddEngineering applications of artificial intelligence
AddEURASIP Journal on Advances in Signal Processing
AddEURASIP Journal on Bioinformatics and Systems Biology
AddEURASIP Journal on Embedded Systems
AddEURASIP Journal on Image and Video Processing
AddEURASIP Journal on wireless communications and networking
AddEuropean journal of control
AddExpert systems with applications
AddGeekWire Informatics Iron
AddHuman-computer interaction
AddIEEE/ACM Transactions on Computational Biology and Bioinformatics
AddImage and vision computing
AddInformatics for Health and Social Care
AddInformatics In Primary Care
AddInformation & management
AddInformation and Communications Technology Law
AddInformation and computation
AddInformation and software technology
AddInformation systems and e-business management
AddInformation Systems Frontiers
AddInformation Systems Research
AddInkling Engineering Blog
AddIntelligent service robotics
AddInternational Journal of Automation and computing
AddInternational journal of computer vision
AddInternational Journal of Control, Automation and Systems
AddInternational Journal of Critical Infrastructure Protection
AddInternational journal of general systems
AddInternational journal of human-computer studies
AddInternational journal of network management
AddInternational journal of wireless information networks
AddInternational journal on document analysis and recognition (IJDAR)
AddJoel on Software
AddJournal of Biomedical Informatics
AddJournal of Chemical Information and Modeling
AddJournal of computational electronics
AddJournal of Computational Science
AddJournal of Computer Virology and Hacking Techniques
AddJournal of Computer-Aided Molecular Design
AddJournal of computer-mediated communication
AddJournal of Decision Systems
AddJournal of Field Robotics
AddJournal of Graphics Tools
AddJournal of Grid Computing
AddJournal of Information Technology Case and Application Research
AddJournal of intelligent & robotic systems
AddJournal of Intelligent Manufacturing
AddJournal of Internet commerce
AddJournal of Logic and Computation
AddJournal of management information systems
AddJournal of Medical Internet Research
AddJournal of network and computer applications
AddJournal of network and systems management
AddJournal of process control
AddJournal of Signal Processing Systems
AddJournal of systems architecture
AddJournal of Systems Science and Systems Engineering
AddJournal of the American Medical Informatics Association
AddJournal of Zhejiang University Science C
AddLecture Notes in Computer Science
AddLiterary and Linguistic Computing
AddMachine vision and applications
AddMany Niches (Brendan Watson)
AddMedical & Biological Engineering & Computing
AddMicrosystem technologies
AddMIT : Computer science and technology
AddMobile Networks and Applications
AddMultidimensional systems and signal processing
AddNano communication networks
AddNatural computing
AddNetwork security
AddNetworks and spatial economics
AddNeural computing & applications
AddNew generation computing
AddNew review of information networking
AddO'Reilly Radar
AddOptical switching and networking
AddPattern Analysis and Applications, PAA
AddPattern recognition
AddPattern recognition letters
AddPersonal and Ubiquitous Computing
AddPervasive and mobile computing Computer Sciences
AddPLoS Computational Biology
AddPLoS Computational Biology Related SciVees
AddPLOS Tech
AddQuantum information processing
AddRobotics and autonomous systems
AddSciTopics Computer Science
AddSignal processing
AddSignal processing. Image communication
AddSimulation Modelling Practice and Theory
AddSource Code for Biology and Medicine
AddStudies in Health Technology and Informatics
AddSustainable Computing: Informatics and Systems
AddSystems & control letters
AddSystems Research and Behavioral Science
AddTechCrunch » google
AddTelecommunications policy
AddTelematics and informatics
AddThe Journal of Strategic Information Systems
AddUser Modeling and User-Adapted Interaction
AddWeb Semantics: Science, Services and Agents on the World Wide Web
AddWireless communications and mobile computing
AddWireless networks
AddWorld wide web

»My Articles

»Latest Feeds

»Popular Feeds
Search Feed Catalog by Name:

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet ApproachInformation Systems Frontiers4 dayssaveRefWorksSFX Info
Correction to: An Architecture Framework Approach for Complex Transport ProjectsInformation Systems Frontiers11 dayssaveRefWorksSFX Info
The Role of Mobile Payment Technology in Sustainable and Human-Centric Development: Evidence from the Post-Demonetization Period in IndiaInformation Systems Frontiers14 dayssaveRefWorksSFX Info
Leveraging Image-Processing Techniques for Empirical Research: Feasibility and Reliability in Online Shopping ContextInformation Systems Frontiers16 dayssaveRefWorksSFX Info
Assessing the Benefits of Integrating Health Information Exchange Services into the Medical Practices’ WorkflowInformation Systems Frontiers18 dayssaveRefWorksSFX Info
An Architecture Framework Approach for Complex Transport ProjectsInformation Systems Frontiers23 dayssaveRefWorksSFX Info
Interactions between Analysts in Developing Collaborative Conceptual ModelsInformation Systems Frontiers40 dayssaveRefWorksSFX Info
An Examination of Gain- and Loss-Framed Messaging on Smart Home Security Training ProgramsInformation Systems Frontiers40 dayssaveRefWorksSFX Info
Investigating the Success of OGB in China: The Influence of Personality TraitsInformation Systems Frontiers41 dayssaveRefWorksSFX Info
Hey Alexa! A Magic Spell of Social Glue?: Sharing a Smart Voice Assistant Speaker and Its Impact on Users’ Perception of Group HarmonyInformation Systems Frontiers43 dayssaveRefWorksSFX Info
Cross-visiting Behaviour of Online Consumers Across Retailers’ and Comparison Sites, a Macro-StudyInformation Systems Frontiers44 dayssaveRefWorksSFX Info
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidenceInformation Systems Frontiers46 dayssaveRefWorksSFX Info
A Quantum Router For The Entangled WebInformation Systems Frontiers46 dayssaveRefWorksSFX Info
Emerging Frontiers in Smart Environment and Healthcare– A VisionInformation Systems Frontiers46 dayssaveRefWorksSFX Info
“Can Computer Based Human-Likeness Endanger Humanness?” – A Philosophical and Ethical Perspective on Digital Assistants Expressing Feelings They Can’t Have”Information Systems Frontiers48 dayssaveRefWorksSFX Info
An Efficient Classification of Fuzzy XML Documents Based on Kernel ELMInformation Systems Frontiers52 dayssaveRefWorksSFX Info
Accommodating Practices During Episodes of Disillusionment with Mobile ITInformation Systems Frontiers55 dayssaveRefWorksSFX Info
Analyzing CryptocurrenciesInformation Systems Frontiers59 dayssaveRefWorksSFX Info
Towards Increased Understanding of Open Data Use for Software DevelopmentInformation Systems Frontiers64 dayssaveRefWorksSFX Info
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial MarketsInformation Systems Frontiers66 dayssaveRefWorksSFX Info
Editorial: Special issue on cyber security, privacy and ethics of information systemsInformation Systems Frontiers67 dayssaveRefWorksSFX Info
Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff SmithInformation Systems Frontiers69 dayssaveRefWorksSFX Info
Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online RetailersInformation Systems Frontiers71 dayssaveRefWorksSFX Info
Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security InvestmentsInformation Systems Frontiers78 dayssaveRefWorksSFX Info
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical InvestigationInformation Systems Frontiers78 dayssaveRefWorksSFX Info
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?Information Systems Frontiers80 dayssaveRefWorksSFX Info
Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale DevelopmentInformation Systems Frontiers86 dayssaveRefWorksSFX Info
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance ResearchInformation Systems Frontiers93 dayssaveRefWorksSFX Info
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production SystemsInformation Systems Frontiers94 dayssaveRefWorksSFX Info
Don’t Disturb Me! Understanding the Impact of Interruptions on Knowledge Work: an Exploratory Neuroimaging StudyInformation Systems Frontiers137 dayssaveRefWorksSFX Info
DPRel: A Meta-Path Based Relevance Measure for Mining Heterogeneous NetworksInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber InsuranceInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Examining Consumers’ Behavioral Intention in O2O Commerce from a Relational Perspective: an Exploratory StudyInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Real World User Model: Evolution of User Modeling Triggered by Advances in Wearable and Ubiquitous ComputingInformation Systems Frontiers137 dayssaveRefWorksSFX Info
A Novel Group Ownership Delegate Protocol for RFID SystemsInformation Systems Frontiers137 dayssaveRefWorksSFX Info
A Markov-Based Model for Information Security Risk Assessment in Healthcare MANETsInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Formal Model of Business Processes Integrated with Business RulesInformation Systems Frontiers137 dayssaveRefWorksSFX Info
An Empirical Review of the Connection Between Model Viewer Characteristics and the Comprehension of Conceptual Process ModelsInformation Systems Frontiers137 dayssaveRefWorksSFX Info
The Impact of Emotion: A Blended Model to Estimate Influence on Social MediaInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment EffectInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Exploring Gender Differences in Online Consumer Purchase Decision Making: An Online Product Presentation PerspectiveInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Privacy and Personalization in Continued Usage Intention of Mobile Banking: An Integrative PerspectiveInformation Systems Frontiers137 dayssaveRefWorksSFX Info
Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral ComplexityInformation Systems Frontiers141 dayssaveRefWorksSFX Info
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual CrimesInformation Systems Frontiers143 dayssaveRefWorksSFX Info
Mining Reusable Software Components from Object-Oriented Source Code using Discrete PSO and Modeling Them as Java BeansInformation Systems Frontiers150 dayssaveRefWorksSFX Info
Erratum to: Online knowledge sharing mechanisms: A systematic review of the state of the art literature and recommendations for future researchInformation Systems Frontiers200 dayssaveRefWorksSFX Info
 XML / RSS feed