Table of contents for issues of ACM Transactions on Management Information Systems (TMIS)

Last update: Tue Jan 23 09:44:14 MST 2018                Valid HTML 3.2!

Volume 1, Number 1, December, 2010
Volume 2, Number 1, March, 2011
Volume 2, Number 2, June, 2011
Volume 2, Number 3, October, 2011
Volume 2, Number 4, December, 2011
Volume 3, Number 1, April, 2012
Volume 3, Number 2, July, 2012
Volume 3, Number 3, October, 2012
Volume 3, Number 4, January, 2013
Volume 4, Number 1, April, 2013
Volume 4, Number 2, August, 2013
Volume 4, Number 3, October, 2013
Volume 4, Number 4, December, 2013
Volume 5, Number 1, April, 2014
Volume 5, Number 2, July, 2014
Volume 5, Number 3, January, 2015
Volume 5, Number 4, January, 2015
Volume 6, Number 1, February, 2015
Volume 6, Number 2, July, 2015
Volume 6, Number 3, October, 2015
Volume 6, Number 4, January, 2016
Volume 7, Number 1, March, 2016
Volume 7, Number 2, August, 2016
Volume 7, Number 3, October, 2016
Volume 7, Number 4, January, 2017
Volume 8, Number 1, May, 2017
Volume 8, Number 2--3, August, 2017
Volume 8, Number 4, September, 2017


ACM Transactions on Management Information Systems (TMIS)
Volume 1, Number 1, December, 2010

                  Hsinchun Chen   Editorial: Welcome to the first issue of
                                  ACM TMIS . . . . . . . . . . . . . . . . 1:1--1:??
            Gordon B. Davis and   
                  Paul Gray and   
             Stuart Madnick and   
           Jay F. Nunamaker and   
              Ralph Sprague and   
                Andrew Whinston   Ideas for the future of the IS field . . 2:1--2:??
               Jingguo Wang and   
                   Nan Xiao and   
                  H. Raghav Rao   Drivers of information security search
                                  behavior: an investigation of network
                                  attacks and vulnerability disclosures    3:1--3:??
                   Sulin Ba and   
                     Dan Ke and   
              Jan Stallaert and   
                  Zhongju Zhang   Why give away something for nothing?
                                  Investigating virtual goods pricing and
                                  permission strategies  . . . . . . . . . 4:1--4:??
                    Lan Cao and   
     Balasubramaniam Ramesh and   
              Tarek Abdel-Hamid   Modeling dynamics in agile software
                                  development  . . . . . . . . . . . . . . 5:1--5:??
                 Ofer Arazy and   
                  Arie Croitoru   The sustainability of corporate wikis: a
                                  time-series analysis of activity
                                  patterns . . . . . . . . . . . . . . . . 6:1--6:??
                      Yu Fu and   
               Zhiyuan Chen and   
                 Gunes Koru and   
             Aryya Gangopadhyay   A privacy protection technique for
                                  publishing data mining models and
                                  research data  . . . . . . . . . . . . . 7:1--7:??


ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 1, March, 2011

                  Hsinchun Chen   Editorial: Design science, grand
                                  challenges, and societal impacts . . . . 1:1--1:??
                   Michael Chau   Visualizing Web search results using
                                  glyphs: Design and evaluation of a
                                  flower metaphor  . . . . . . . . . . . . 2:1--2:??
              Feng-Yang Kuo and   
                    Chun-Po Yin   A linguistic analysis of group support
                                  systems interactions for uncovering
                                  social realities of organizations  . . . 3:1--3:??
                 Gerald C. Kane   A multimethod study of information
                                  quality in wiki collaboration  . . . . . 4:1--4:??
          Gregory S. Dawson and   
              Richard T. Watson   Uncovering and testing archetypes of
                                  effective public sector CIOs . . . . . . 5:1--5:??
              Debabrata Dey and   
                   Ming Fan and   
                      Gang Peng   Computer use and wage returns: The
                                  complementary roles of IT-related human
                                  capital and nonroutine tasks . . . . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 2, June, 2011

            Paul Jen-Hwa Hu and   
                  Hsinchun Chen   Analyzing information systems
                                  researchers' productivity and impacts: a
                                  perspective on the $H$ index . . . . . . 7:1--7:??
        Sudip Bhattacharjee and   
               Ram D. Gopal and   
           James R. Marsden and   
        Ramesh Sankaranarayanan   Digital goods and markets: Emerging
                                  issues and challenges  . . . . . . . . . 8:1--8:??
                Matthias W. Uhl   Explaining U.S. consumer behavior with
                                  news sentiment . . . . . . . . . . . . . 9:1--9:??
                 Anna Ye Du and   
               Sanjukta Das and   
               Ram D. Gopal and   
                      R. Ramesh   Risk hedging in storage grid markets: Do
                                  options add value to forwards? . . . . . 10:1--10:??
                    Jun Liu and   
                      Sudha Ram   Who does what: Collaboration patterns in
                                  the Wikipedia and their impact on
                                  article quality  . . . . . . . . . . . . 11:1--11:??
       D. Harrison Mcknight and   
            Michelle Carter and   
     Jason Bennett Thatcher and   
                   Paul F. Clay   Trust in a specific technology: an
                                  investigation of its components and
                                  measures . . . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 3, October, 2011

             Alexander Tuzhilin   Knowledge management revisited: Old
                                  Dogs, New tricks . . . . . . . . . . . . 13:1--13:??
            Juliana Sutanto and   
         Atreyi Kankanhalli and   
         Bernard Cheng Yian Tan   Eliciting a sense of virtual community
                                  among knowledge contributors . . . . . . 14:1--14:??
                  Jing Peng and   
             Daniel D. Zeng and   
                      Zan Huang   Latent subject-centered modeling of
                                  collaborative tagging: an application in
                                  social search  . . . . . . . . . . . . . 15:1--15:??
          Mohammad M. Masud and   
      Tahseen M. Al-Khateeb and   
            Kevin W. Hamlen and   
                   Jing Gao and   
               Latifur Khan and   
                 Jiawei Han and   
          Bhavani Thuraisingham   Cloud-based malware detection for
                                  evolving data streams  . . . . . . . . . 16:1--16:??
      Susanne Schmidt-Rauch and   
                Gerhard Schwabe   From telesales to tele-advisory in
                                  travel agencies: Business problems,
                                  generic design goals and requirements    17:1--17:??
               Ke-Wei Huang and   
                     Zhuolun Li   A multilabel text classification
                                  algorithm for labeling risk factors in
                                  SEC form 10-K  . . . . . . . . . . . . . 18:1--18:??
              Ming-Chih Lin and   
          Anthony J. T. Lee and   
               Rung-Tai Kao and   
                   Kuo-Tay Chen   Stock price movement prediction using
                                  representative prototypes of financial
                                  reports  . . . . . . . . . . . . . . . . 19:1--19:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 4, December, 2011

       Jr. Jay F. Nunamaker and   
               Robert O. Briggs   Toward a broader vision for Information
                                  Systems  . . . . . . . . . . . . . . . . 20:1--20:??
         Balaji Padmanabhan and   
                Alan Hevner and   
             Michael Cuenco and   
                    Crystal Shi   From information to operations: Service
                                  quality and customer retention . . . . . 21:1--21:??
                 Huaxia Rui and   
                Andrew Whinston   Designing a social-broadcasting-based
                                  business intelligence system . . . . . . 22:1--22:??
                 Hina Arora and   
                T. S. Raghu and   
                     Ajay Vinze   Decision support for containing pandemic
                                  propagation  . . . . . . . . . . . . . . 23:1--23:??
                 Paulo Goes and   
                  Noyan Ilk and   
                 Wei T. Yue and   
                   J. Leon Zhao   Live-chat agent assignments to
                                  heterogeneous e-customers under
                                  imperfect classification . . . . . . . . 24:1--24:??
          Raymond Y. K. Lau and   
                 S. Y. Liao and   
           Ron Chi-Wai Kwok and   
                 Kaiquan Xu and   
                Yunqing Xia and   
                     Yuefeng Li   Text mining and probabilistic language
                                  modeling for online review spam
                                  detection  . . . . . . . . . . . . . . . 25:1--25:??
              Frederik Marx and   
         Jörg H. Mayer and   
                  Robert Winter   Six principles for redesigning executive
                                  information systems-findings of a survey
                                  and evaluation of a prototype  . . . . . 26:1--26:??


ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 1, April, 2012

             Fred Niederman and   
             Salvatore T. March   Design science and the accumulation of
                                  knowledge in the information systems
                                  discipline . . . . . . . . . . . . . . . 1:1--1:??
            K. Asli Basoglu and   
             Mark A. Fuller and   
             Joseph S. Valacich   Enhancement of recall within
                                  technology-mediated teams through the
                                  use of online visual artifacts . . . . . 2:1--2:??
      Gediminas Adomavicius and   
                 Jingjing Zhang   Impact of data characteristics on
                                  recommender systems performance  . . . . 3:1--3:??
        William N. Robinson and   
             Arash Akhlaghi and   
               Tianjie Deng and   
                  Ali Raza Syed   Discovery and diagnosis of behavioral
                                  transitions in patient event streams . . 4:1--4:??
                  Zhu Zhang and   
                     Xin Li and   
                      Yubo Chen   Deciphering word-of-mouth in social
                                  media: Text-based metrics of consumer
                                  reviews  . . . . . . . . . . . . . . . . 5:1--5:??
            Arvind Malhotra and   
                  Ann Majchrzak   How virtual teams use their virtual
                                  workspace to coordinate knowledge  . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 2, July, 2012

              Wil van der Aalst   Process Mining: Overview and
                                  Opportunities  . . . . . . . . . . . . . 7:1--7:??
                   Zhe Shan and   
                    Akhil Kumar   Optimal Adapter Creation for Process
                                  Composition in Synchronous vs.
                                  Asynchronous Communication . . . . . . . 8:1--8:??
                  Zan Huang and   
                Huimin Zhao and   
                        Dan Zhu   Two New Prediction-Driven Approaches to
                                  Discrete Choice Prediction . . . . . . . 9:1--9:??
           Thomas L. Ngo-Ye and   
                 Atish P. Sinha   Analyzing Online Review Helpfulness
                                  Using a Regressional ReliefF-Enhanced
                                  Text Mining Method . . . . . . . . . . . 10:1--10:??
         Philipp Nussbaumer and   
                 Inu Matter and   
                Gerhard Schwabe   ``Enforced'' vs. ``Casual'' Transparency
                                  --- Findings from IT-Supported Financial
                                  Advisory Encounters  . . . . . . . . . . 11:1--11:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 3, October, 2012

         Roger H. L. Chiang and   
                 Paulo Goes and   
                Edward A. Stohr   Business Intelligence and Analytics
                                  Education, and Program Development: a
                                  Unique Opportunity for the Information
                                  Systems Discipline . . . . . . . . . . . 12:1--12:??
      Palakorn Achananuparp and   
                Ee-Peng Lim and   
                 Jing Jiang and   
                 Tuan-Anh Hoang   Who is Retweeting the Tweeters?
                                  Modeling, Originating, and Promoting
                                  Behaviors in the Twitter Network . . . . 13:1--13:??
                Hsin-Min Lu and   
              Feng-Tse Tsai and   
              Hsinchun Chen and   
               Mao-Wei Hung and   
                   Shu-Hsing Li   Credit Rating Change Modeling Using News
                                  and Financial Ratios . . . . . . . . . . 14:1--14:??
                    Wei Wei and   
                      Sudha Ram   Using a Network Analysis Approach for
                                  Organizing Social Bookmarking Tags and
                                  Enabling Web Content Discovery . . . . . 15:1--15:??
                     Nan Hu and   
            Hasan Cavusoglu and   
                   Ling Liu and   
                     Chenkai Ni   Do Vendors' Pricing Decisions Fully
                                  Reflect Information in Online Reviews?   16:1--16:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 4, January, 2013

                Ee-Peng Lim and   
              Hsinchun Chen and   
                   Guoqing Chen   Business Intelligence and Analytics:
                                  Research Directions  . . . . . . . . . . 17:1--17:??
                  Bin Zhang and   
           Andrew C. Thomas and   
            Patrick Doreian and   
           David Krackhardt and   
               Ramayya Krishnan   Contrasting Multiple Social Network
                                  Autocorrelations for Binary Outcomes,
                                  With Applications To Technology Adoption 18:1--18:??
              Nargis Pervin and   
                  Fang Fang and   
              Anindya Datta and   
              Kaushik Dutta and   
               Debra Vandermeer   Fast, Scalable, and Context-Sensitive
                                  Detection of Trending Topics in
                                  Microblog Post Streams . . . . . . . . . 19:1--19:??
                  Zhu Zhang and   
                Chenhui Guo and   
                     Paulo Goes   Product Comparison Networks for
                                  Competitive Analysis of Online
                                  Word-of-Mouth  . . . . . . . . . . . . . 20:1--20:??


ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 1, April, 2013

               Niam Yaraghi and   
                 Anna Ye Du and   
                Raj Sharman and   
               Ram D. Gopal and   
                      R. Ramesh   Network Effects in Health Information
                                  Exchange Growth  . . . . . . . . . . . . 1:1--1:??
              Rohit Valecha and   
                Raj Sharman and   
              H. Raghav Rao and   
              Shambhu Upadhyaya   A Dispatch-Mediated Communication Model
                                  for Emergency Response Systems . . . . . 2:1--2:??
                   Jae Choi and   
          Derek L. Nazareth and   
                 Hemant K. Jain   The Impact of SOA Implementation on
                                  IT-Business Alignment: a System Dynamics
                                  Approach . . . . . . . . . . . . . . . . 3:1--3:??
                Azmat Ullah and   
                    Richard Lai   A Systematic Review of Business and
                                  Information Technology Alignment . . . . 4:1--4:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 2, August, 2013

            T. Grandon Gill and   
                 Alan R. Hevner   A Fitness-Utility Model for Design
                                  Science Research . . . . . . . . . . . . 5:1--5:??
                  Jiming Wu and   
             Clyde W. Holsapple   Does Knowledge Management Matter? The
                                  Empirical Evidence from Market-Based
                                  Valuation  . . . . . . . . . . . . . . . 6:1--6:??
                Levent V. Orman   Bayesian Inference in Trust Networks . . 7:1--7:??
                  Zhu Zhang and   
             Daniel D. Zeng and   
               Ahmed Abbasi and   
                  Jing Peng and   
                 Xiaolong Zheng   A Random Walk Model for Item
                                  Recommendation in Social Tagging Systems 8:1--8:??
         Douglas C. Derrick and   
          Thomas O. Meservy and   
         Jeffrey L. Jenkins and   
           Judee K. Burgoon and   
          Jay F. Nunamaker, Jr.   Detecting Deceptive Chat-Based
                                  Communication Using Typing Behavior and
                                  Message Cues . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 3, October, 2013

           Suprateek Sarker and   
       Suranjan Chakraborty and   
  Patriya Silpakit Tansuhaj and   
                Mark Mulder and   
     Kivilcim Dogerlioglu-Demir   The ``Mail-Order-Bride'' (MOB)
                                  Phenomenon in the Cyberworld: an
                                  Interpretive Investigation . . . . . . . 10:1--10:??
              Narges Kasiri and   
                  Ramesh Sharda   Real Options and System Dynamics for
                                  Information Technology Investment
                                  Decisions: Application to RFID Adoption
                                  in Retail  . . . . . . . . . . . . . . . 11:1--11:??
              George Mathew and   
                Zoran Obradovic   Distributed Privacy-Preserving Decision
                                  Support System for Highly Imbalanced
                                  Clinical Data  . . . . . . . . . . . . . 12:1--12:??
              Masato Sakata and   
          Zeynep Yücel and   
         Kazuhiko Shinozawa and   
            Norihiro Hagita and   
               Michita Imai and   
           Michiko Furutani and   
                Rumiko Matsuoka   An Inference Engine for Estimating
                                  Outside States of Clinical Test Items    13:1--13:??
               Alex Edgcomb and   
                    Frank Vahid   Accurate and Efficient Algorithms that
                                  Adapt to Privacy-Enhanced Video for
                                  Improved Assistive Monitoring  . . . . . 14:1--14:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 4, December, 2013

        Christopher C. Yang and   
                Gondy Leroy and   
               Sophia Ananiadou   Smart Health and Wellbeing . . . . . . . 15:1--15:??
                Zidong Wang and   
               Julie Eatock and   
              Sally McClean and   
                Dongmei Liu and   
                Xiaohui Liu and   
                    Terry Young   Modeling Throughput of Emergency
                                  Departments via Time Series: an
                                  Expectation Maximization Algorithm . . . 16:1--16:??
                   He Zhang and   
             Sanjay Mehotra and   
            David Liebovitz and   
             Carl A. Gunter and   
                  Bradley Malin   Mining Deviations from Patient Care
                                  Pathways via Electronic Medical Record
                                  System Audits  . . . . . . . . . . . . . 17:1--17:??
               Rajiv Khosla and   
                    Mei-Tai Chu   Embodying Care in Matilda: an Affective
                                  Communication Robot for Emotional
                                  Wellbeing of Older People in Australian
                                  Residential Care Facilities  . . . . . . 18:1--18:??
          Christine Lisetti and   
                 Reza Amini and   
               Ugan Yasavur and   
                 Naphtali Rishe   I Can Help You Change! An Empathic
                                  Virtual Agent Delivers Behavior Change
                                  Health Interventions . . . . . . . . . . 19:1--19:??
              Rajesh Mirani and   
                 Anju Harpalani   Business Benefits or Incentive
                                  Maximization? Impacts of the Medicare
                                  EHR Incentive Program at Acute Care
                                  Hospitals  . . . . . . . . . . . . . . . 20:1--20:??


ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 1, April, 2014

                Joyce C. Ho and   
               Cheng H. Lee and   
                  Joydeep Ghosh   Septic Shock Prediction for Patients
                                  with Missing Data  . . . . . . . . . . . 1:1--1:??
        Christopher C. Yang and   
               Haodong Yang and   
                     Ling Jiang   Postmarketing Drug Safety Surveillance
                                  Using Publicly Available
                                  Health-Consumer-Contributed Content in
                                  Social Media . . . . . . . . . . . . . . 2:1--2:??
              Salah Bouktif and   
            Houari Sahraoui and   
                   Faheem Ahmed   Predicting Stability of Open-Source
                                  Software Systems Using Combination of
                                  Bayesian Classifiers . . . . . . . . . . 3:1--3:??
                Lihua Huang and   
                   Sulin Ba and   
                    Xianghua Lu   Building Online Trust in a Culture of
                                  Confucianism: The Impact of Process
                                  Flexibility and Perceived Control  . . . 4:1--4:??
                M. Lisa Yeo and   
               Erik Rolland and   
          Jackie Rees Ulmer and   
           Raymond A. Patterson   Risk Mitigation Decisions for IT
                                  Security . . . . . . . . . . . . . . . . 5:1--5:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 2, July, 2014

                  S. E. Goodman   Building the Nation's Cyber Security
                                  Workforce: Contributions from the CAE
                                  Colleges and Universities  . . . . . . . 6:1--6:??
            Suruchi Deodhar and   
            Keith R. Bisset and   
             Jiangzhuo Chen and   
                   Yifei Ma and   
              Madhav V. Marathe   An Interactive, Web-Based High
                                  Performance Modeling Environment for
                                  Computational Epidemiology . . . . . . . 7:1--7:??
             Patty Kostkova and   
            Martin Szomszor and   
                Connie St. Luis   #swineflu: The Use of Twitter as an
                                  Early Warning and Risk Communication
                                  Tool in the 2009 Swine Flu Pandemic  . . 8:1--8:??
             Chih-Fong Tsai and   
                    Zen-Yu Quan   Stock Prediction by Searching for
                                  Similarities in Candlestick Charts . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 3, January, 2015

             Matthias Jarke and   
                 Kalle Lyytinen   Editorial: ``Complexity of Systems
                                  Evolution: Requirements Engineering
                                  Perspective''  . . . . . . . . . . . . . 11:1--11:??
            Gilbert Fridgen and   
                Julia Klier and   
               Martina Beer and   
                    Thomas Wolf   Improving Business Value Assurance in
                                  Large-Scale IT Projects --- a
                                  Quantitative Method Based on Founded
                                  Requirements Assessment  . . . . . . . . 12:1--12:??
           John Leslie King and   
                  Carl P. Simon   Complications with Complexity in
                                  Requirements . . . . . . . . . . . . . . 13:1--13:??
       Suranjan Chakraborty and   
       Christoph Rosenkranz and   
                 Josh Dehlinger   Getting to the Shalls: Facilitating
                                  Sensemaking in Requirements Engineering  14:1--14:??
         Md Rashed I. Nekvi and   
              Nazim H. Madhavji   Impediments to Regulatory Compliance of
                                  Requirements in Contractual Systems
                                  Engineering Projects: a Case Study . . . 15:1--15:??
               Radhika Jain and   
                    Lan Cao and   
               Kannan Mohan and   
         Balasubramaniam Ramesh   Situated Boundary Spanning: an Empirical
                                  Investigation of Requirements
                                  Engineering Practices in Product Family
                                  Development  . . . . . . . . . . . . . . 16:1--16:??
             Ivan J. Jureta and   
          Alexander Borgida and   
              Neil A. Ernst and   
                John Mylopoulos   The Requirements Problem for Adaptive
                                  Systems  . . . . . . . . . . . . . . . . 17:1--17:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 4, January, 2015

               G. Alan Wang and   
         Harry Jiannan Wang and   
                  Jiexun Li and   
           Alan S. Abrahams and   
                     Weiguo Fan   An Analytical Framework for
                                  Understanding Knowledge-Sharing
                                  Processes in Online Q&A Communities . . . 18:1--18:??
          Andrew Partington and   
                   Moe Wynn and   
            Suriadi Suriadi and   
                Chun Ouyang and   
                Jonathan Karnon   Process Mining for Clinical Processes: a
                                  Comparative Analysis of Four Australian
                                  Hospitals  . . . . . . . . . . . . . . . 19:1--19:??
                  Jiaqi Yan and   
                  Daning Hu and   
            Stephen S. Liao and   
                  Huaiqing Wang   Mining Agents' Goals in Agent-Oriented
                                  Business Processes . . . . . . . . . . . 20:1--20:??
             Thushari Silva and   
                    Ma Jian and   
                      Yang Chen   Process Analytics Approach for R&D
                                  Project Selection  . . . . . . . . . . . 21:1--21:??
                 Xitong Guo and   
              Sherry X. Sun and   
                     Doug Vogel   A Dataflow Perspective for Business
                                  Process Integration  . . . . . . . . . . 22:1--22:??
                  Jie Jiang and   
            Huib Aldewereld and   
            Virginia Dignum and   
                    Yao-Hua Tan   Compliance Checking of Organizational
                                  Interactions . . . . . . . . . . . . . . 23:1--23:??
          Claudio Di Ciccio and   
                Massimo Mecella   On the Discovery of Declarative Control
                                  Flows for Artful Processes . . . . . . . 24:1--24:??
             Thorben Keller and   
Frédéric Thiesse and   
                  Elgar Fleisch   Classification Models for RFID-Based
                                  Real-Time Detection of Process Events in
                                  the Supply Chain: an Empirical Study . . 25:1--25:??


ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 1, February, 2015

           Donald J. Berndt and   
            James A. McCart and   
             Dezon K. Finch and   
              Stephen L. Luther   A Case Study of Data Quality in Text
                                  Mining Clinical Progress Notes . . . . . 1:1--1:??
               David Zimbra and   
              Hsinchun Chen and   
                Robert F. Lusch   Stakeholder Analyses of Firm-Related Web
                                  Forums: Applications in Stock Return
                                  Prediction . . . . . . . . . . . . . . . 2:1--2:??
               Shing-Han Li and   
               Yu-Cheng Kao and   
           Zong-Cyuan Zhang and   
           Ying-Ping Chuang and   
                   David C. Yen   A Network Behavior-Based Botnet
                                  Detection Mechanism Using PSO and
                                  $K$-means  . . . . . . . . . . . . . . . 3:1--3:??
              Yen-Hsien Lee and   
            Paul Jen-Hwa Hu and   
                    Ching-Yi Tu   Ontology-Based Mapping for Automated
                                  Document Management: a Concept-Based
                                  Technique for Word Mismatch and
                                  Ambiguity Problems in Document
                                  Clustering . . . . . . . . . . . . . . . 4:1--4:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 2, July, 2015

            Juliana Sutanto and   
         Atreyi Kankanhalli and   
         Bernard Cheng Yian Tan   Investigating Task Coordination in
                                  Globally Dispersed Teams: a Structural
                                  Contingency Perspective  . . . . . . . . 5:1--5:??
            Rahul C. Basole and   
          Martha G. Russell and   
       Jukka Huhtamäki and   
                Neil Rubens and   
                Kaisa Still and   
                   Hyunwoo Park   Understanding Business Ecosystem
                                  Dynamics: a Data-Driven Approach . . . . 6:1--6:??
               Xiaohui Zhao and   
               Chengfei Liu and   
           Sira Yongchareon and   
         Marek Kowalkiewicz and   
                    Wasim Sadiq   Role-Based Process View Derivation and
                                  Composition  . . . . . . . . . . . . . . 7:1--7:??
                Dengpan Liu and   
               Sumit Sarkar and   
        Chelliah Sriskandarajah   Who's Next? Scheduling Personalization
                                  Services with Variable Service Times . . 8:1--8:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 3, October, 2015

                    Xue Bai and   
           James R. Marsden and   
       William T. Ross, Jr. and   
                      Gang Wang   Relationships Among Minimum
                                  Requirements, Facebook Likes, and
                                  Groupon Deal Outcomes  . . . . . . . . . 9:1--9:??
             Tanmay Bhowmik and   
                    Nan Niu and   
           Prachi Singhania and   
                    Wentao Wang   On the Role of Structural Holes in
                                  Requirements Identification: an
                                  Exploratory Study on Open-Source
                                  Software Development . . . . . . . . . . 10:1--10:??
     Devipsita Bhattacharya and   
                      Sudha Ram   RT @News: an Analysis of News Agency Ego
                                  Networks in a Microblogging Environment  11:1--11:??
                Arindam Roy and   
               Shamik Sural and   
        Arun Kumar Majumdar and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   Minimizing Organizational User
                                  Requirement while Meeting Security
                                  Constraints  . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 4, January, 2016

      Carlos A. Gomez-Uribe and   
                      Neil Hunt   The Netflix Recommender System:
                                  Algorithms, Business Value, and
                                  Innovation . . . . . . . . . . . . . . . 13:1--13:??
        Rajiv Krishnamurthy and   
             Varghese Jacob and   
       Suresh Radhakrishnan and   
                   Kutsal Dogan   Peripheral Developer Participation in
                                  Open Source Projects: an Empirical
                                  Analysis . . . . . . . . . . . . . . . . 14:1--14:??
           Christos Liaskos and   
           Ageliki Tsioliaridou   Service Ratio-Optimal, Content
                                  Coherence-Aware Data Push Systems  . . . 15:1--15:??


ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 1, March, 2016

                Xianghua Lu and   
                   Xia Zhao and   
                       Ling Xue   Is Combining Contextual and Behavioral
                                  Targeting Strategies Effective in Online
                                  Advertising? . . . . . . . . . . . . . . 1:1--1:??
                Tsz-Wai Lui and   
               Gabriele Piccoli   The Effect of a Multichannel Customer
                                  Service System on Customer Service and
                                  Financial Performance  . . . . . . . . . 2:1--2:??
                 Yutian Sun and   
                 Jianwen Su and   
                      Jian Yang   Universal Artifacts: a New Approach to
                                  Business Process Management (BPM)
                                  Systems  . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 2, August, 2016

               Shing-Han Li and   
               David C. Yen and   
               Ying-Ping Chuang   A Real-Time Audit Mechanism Based on the
                                  Compression Technique  . . . . . . . . . 4:1--4:??
             Khayyam Hashmi and   
                 Zaki Malik and   
                Erfan Najmi and   
              Amal Alhosban and   
                Brahim Medjahed   A Web Service Negotiation Management and
                                  QoS Dependency Modeling Framework  . . . 5:1--5:??
                 Agam Gupta and   
             Biswatosh Saha and   
                Uttam K. Sarkar   Systemic Concentration in Sponsored
                                  Search Markets: The Role of Time Window
                                  in Click-Through-Rate Computation  . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 3, October, 2016

             Ming-Feng Tsai and   
              Chuan-Ju Wang and   
                 Po-Chuan Chien   Discovering Finance Keywords via
                                  Continuous-Space Language Models . . . . 7:1--7:??
                Corentin Burnay   Are Stakeholders the Only Source of
                                  Information for Requirements Engineers?
                                  Toward a Taxonomy of Elicitation
                                  Information Sources  . . . . . . . . . . 8:1--8:??
                  Jiajie Xu and   
               Chengfei Liu and   
               Xiaohui Zhao and   
           Sira Yongchareon and   
                   Zhiming Ding   Resource Management for Business Process
                                  Scheduling in the Presence of
                                  Availability Constraints . . . . . . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 4, January, 2017

                Arindam Roy and   
               Shamik Sural and   
        Arun Kumar Majumdar and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   On Optimal Employee Assignment in
                                  Constrained Role-Based Access Control
                                  Systems  . . . . . . . . . . . . . . . . 10:1--10:??
                   Hao Chen and   
                  Keli Xiao and   
                 Jinwen Sun and   
                        Song Wu   A Double-Layer Neural Network Framework
                                  for High-Frequency Forecasting . . . . . 11:1--11:??
                     Yan Lu and   
               Michael Chau and   
             Patrick Y. K. Chau   Are Sponsored Links Effective?
                                  Investigating the Impact of Trust in
                                  Search Engine Advertising  . . . . . . . 12:1--12:??


ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 1, May, 2017

            Anastasiia Pika and   
              Michael Leyer and   
                Moe T. Wynn and   
             Colin J. Fidge and   
  Arthur H. M. Ter Hofstede and   
        Wil M. P. Van Der Aalst   Mining Resource Profiles from Event Logs 1:1--1:??
           Saeede Eftekhari and   
               Niam Yaraghi and   
               Ranjit Singh and   
               Ram D. Gopal and   
                      R. Ramesh   Do Health Information Exchanges Deter
                                  Repetition of Medical Services?  . . . . 2:1--2:??
             Adarsh Kumar Kakar   Investigating the Relationships Between
                                  the Use Contexts, User Perceived Values,
                                  and Loyalty to a Software Product  . . . 3:1--3:??

ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 2--3, August, 2017

        Sudip Bhattacharjee and   
             Varghese Jacob and   
   Zhengrui (Jeffrey) Jiang and   
                  Subodha Kumar   Introduction to WITS 2015 Special Issue
                                  in TMIS  . . . . . . . . . . . . . . . . 4:1--4:??
               Shuyuan Deng and   
             Atish P. Sinha and   
                    Huimin Zhao   Resolving Ambiguity in Sentiment
                                  Classification: The Role of Dependency
                                  Features . . . . . . . . . . . . . . . . 4:1--4:??
      Mohammad A. Al-Ramahi and   
                    Jun Liu and   
               Omar F. El-Gayar   Discovering Design Principles for Health
                                  Behavioral Change Support Systems: a
                                  Text Mining Approach . . . . . . . . . . 5:1--5:??
                    Can Sun and   
                 Yonghua Ji and   
                Bora Kolfal and   
                  Ray Patterson   Business-to-Consumer Platform Strategy:
                                  How Vendor Certification Changes
                                  Platform and Seller Incentives . . . . . 6:1--6:??
          Konstantin Bauman and   
         Alexander Tuzhilin and   
                 Ryan Zaczynski   Using Social Sensors for Detecting
                                  Emergency Events: a Case of Power
                                  Outages in the Electrical Utility
                                  Industry . . . . . . . . . . . . . . . . 7:1--7:??
            Michael Mannino and   
           Joel Fredrickson and   
    Farnoush Banaei-Kashani and   
                 Iris Linck and   
        Raghda Alqurashi Raghda   Development and Evaluation of a
                                  Similarity Measure for Medical Event
                                  Sequences  . . . . . . . . . . . . . . . 8:1--8:??
             Atefeh Taghavi and   
                     Carson Woo   The Role Clarity Framework to Improve
                                  Requirements Gathering . . . . . . . . . 9:1--9:??
             Anik Mukherjee and   
            R. P. Sundarraj and   
                  Kaushik Dutta   Apriori Rule-Based In-App Ad Selection
                                  Online Algorithm for Improving
                                  Supply-Side Platform Revenues  . . . . . 10:1--10:??

ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 4, September, 2017

               Tuan Minh Ha and   
            Masaki Samejima and   
                Norihisa Komoda   Power and Performance Estimation for
                                  Fine-Grained Server Power Capping via
                                  Controlling Heterogeneous Applications   11:1--11:??
            Rahul C. Basole and   
              Timothy Major and   
               Arjun Srinivasan   Understanding Alliance Portfolios Using
                                  Visual Analytics . . . . . . . . . . . . 12:1--12:??
              Joseph Cazier and   
              Benjamin Shao and   
                Robert St.Louis   Value Congruence, Trust, and Their
                                  Effects on Purchase Intention and
                                  Reservation Price  . . . . . . . . . . . 13:1--13:??
           Roman Lukyanenko and   
                Binny M. Samuel   Are All Classes Created Equal?
                                  Increasing Precision of Conceptual
                                  Modeling Grammars  . . . . . . . . . . . 14:1--14:??