{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:12:08Z","timestamp":1770538328625,"version":"3.49.0"},"reference-count":138,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T00:00:00Z","timestamp":1510790400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["71571072"],"award-info":[{"award-number":["71571072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s12525-017-0272-3","type":"journal-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T08:17:12Z","timestamp":1510820232000},"page":"221-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Smart e-commerce systems: current status and research challenges"],"prefix":"10.1007","volume":"29","author":[{"given":"Zhiting","family":"Song","sequence":"first","affiliation":[]},{"given":"Yanming","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2629-4276","authenticated-orcid":false,"given":"Jiafu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Lingli","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,16]]},"reference":[{"key":"272_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Sarker, S., & Chiang, R. H. L. (2016). Big data research in information systems: Toward an inclusive research agenda. Journal of the Association for Information Systems, 17(2), 1\u201332.","DOI":"10.17705\/1jais.00423"},{"key":"272_CR2","doi-asserted-by":"crossref","unstructured":"Abowd, G. D., Dey, A. K., Brown, P. J., Davies, N., Smith, M., & Steggles, P. (1999). Towards a better understanding of context and context-awareness. In International Symposium on Handheld and Ubiquitous Computing (pp. 304-307). Springer, Berlin.","DOI":"10.1007\/3-540-48157-5_29"},{"issue":"3","key":"272_CR3","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1287\/isre.2015.0595","volume":"26","author":"R Agarwal","year":"2015","unstructured":"Agarwal, R., & Tiwana, A. (2015). Evolvable systems: Through the looking glass of IS. Information Systems Research, 26(3), 473\u2013479.","journal-title":"Information Systems Research"},{"issue":"3","key":"272_CR4","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agiwal","year":"2016","unstructured":"Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communication Surveys and Tutorials, 18(3), 1617\u20131655.","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"272_CR5","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.indmarman.2015.09.003","volume":"53","author":"R Agnihotri","year":"2016","unstructured":"Agnihotri, R., Dingus, R., Hu, M. Y., & Krush, M. T. (2016). Social media: Influencing customer satisfaction in B2B sales. Industrial Marketing Management, 53, 172\u2013180.","journal-title":"Industrial Marketing Management"},{"key":"272_CR6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.compind.2015.07.001","volume":"79","author":"C Agostinho","year":"2016","unstructured":"Agostinho, C., Ducq, Y., Zacharewicz, G., Sarraipa, J., Lampathaki, F., Poler, R., & Jardim-Goncalves, R. (2016). Towards a sustainable interoperability in networked enterprise information systems: Trends of knowledge and model-driven technology. Computers in Industry, 79, 64\u201376.","journal-title":"Computers in Industry"},{"issue":"4","key":"272_CR7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/5254.941352","volume":"16","author":"H Akkermans","year":"2001","unstructured":"Akkermans, H. (2001). Intelligent e-business: From technology to value. IEEE Intelligent Systems, 16(4), 8\u201310.","journal-title":"IEEE Intelligent Systems"},{"issue":"2","key":"272_CR8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s12525-016-0219-0","volume":"26","author":"S Akter","year":"2016","unstructured":"Akter, S., & Wamba, S. F. (2016). Big data analytics in e-commerce: A systematic review and agenda for future research. Electronic Markets, 26(2), 173\u2013194.","journal-title":"Electronic Markets"},{"issue":"4","key":"272_CR9","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1057\/palgrave.jit.2000075","volume":"21","author":"PM Allen","year":"2006","unstructured":"Allen, P. M., & Varga, L. (2006). A co-evolutionary complex systems perspective on information systems. Journal of Information Technology, 21(4), 229\u2013238.","journal-title":"Journal of Information Technology"},{"issue":"3","key":"272_CR10","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1287\/orsc.10.3.216","volume":"10","author":"P Anderson","year":"1999","unstructured":"Anderson, P. (1999). Perspective: Complexity theory and organization science. Organization Science, 10(3), 216\u2013232.","journal-title":"Organization Science"},{"issue":"16","key":"272_CR11","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (SIoT) \u2013 When social networks meet the internet of things: Concept, architecture and network characterization. Computer Networks, 56(16), 3594\u20133608.","journal-title":"Computer Networks"},{"issue":"3","key":"272_CR12","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s12525-016-0227-0","volume":"26","author":"U Baum\u00f6l","year":"2016","unstructured":"Baum\u00f6l, U., Hollebeek, L., & Jung, R. (2016). Dynamics of customer interaction on social media platforms. Electronic Markets, 26(3), 199\u2013202.","journal-title":"Electronic Markets"},{"issue":"4","key":"272_CR13","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1057\/palgrave.jit.2000080","volume":"21","author":"H Benbya","year":"2006","unstructured":"Benbya, H., & McKelvey, B. (2006). Using coevolutionary and complexity theories to improve IS alignment: A multi-level approach. Journal of Information Technology, 21(4), 284\u2013298.","journal-title":"Journal of Information Technology"},{"key":"272_CR14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.compind.2015.07.010","volume":"79","author":"P Bernus","year":"2016","unstructured":"Bernus, P., Goranson, T., G\u00f8tze, J., Jensen-Waud, A., Kandjani, H., Molina, A., Noran, O., Rabelo, R. J., Romero, D., & Saha, P. (2016). Enterprise engineering and management at the crossroads. Computers in Industry, 79, 87\u2013102.","journal-title":"Computers in Industry"},{"key":"272_CR15","doi-asserted-by":"crossref","unstructured":"Berti-\u00c9quille, L. (2007). Measuring and modelling data quality for quality-awareness in data mining. In Quality measures in data mining (pp. 101\u2013126). Springer, Berlin.","DOI":"10.1007\/978-3-540-44918-8_5"},{"key":"272_CR16","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., de Donato, W., Persico, V., & Pescap\u00e9, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684\u2013700.","journal-title":"Future Generation Computer Systems"},{"key":"272_CR17","doi-asserted-by":"publisher","unstructured":"Brink, T. (2017). B2B SME management of antecedents to the application of social media. Industrial Marketing Management. https:\/\/doi.org\/10.1016\/j.indmarman.2017.02.007 .","DOI":"10.1016\/j.indmarman.2017.02.007"},{"issue":"6","key":"272_CR18","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.ijinfomgt.2016.06.005","volume":"36","author":"AH Busalim","year":"2016","unstructured":"Busalim, A. H., & Hussin, A. R. C. (2016). Understanding social commerce: A systematic literature review and directions for further research. International Journal of Information Management, 36(6), 1075\u20131088.","journal-title":"International Journal of Information Management"},{"issue":"7591","key":"272_CR19","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1038\/530398a","volume":"530","author":"D Butler","year":"2016","unstructured":"Butler, D. (2016). A world where everyone has a robot: Why 2040 could blow your mind. Nature, 530(7591), 398\u2013401.","journal-title":"Nature"},{"key":"272_CR20","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.datak.2015.08.001","volume":"105","author":"I Cabral","year":"2016","unstructured":"Cabral, I., Grilo, A., Gon\u00e7alves-Coelho, A., & Mour\u00e3o, A. (2016). An agent-based model for analyzing the impact of business interoperability on the performance of cooperative industrial networks. Data & Knowledge Engineering, 105, 107\u2013129.","journal-title":"Data & Knowledge Engineering"},{"key":"272_CR21","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comcom.2016.03.012","volume":"89-90","author":"E Cavalcante","year":"2016","unstructured":"Cavalcante, E., Pereira, J., Alves, M. P., Maia, P., Moura, R., Batista, T., Delicato, F. C., & Pires, P. F. (2016). On the interplay of internet of things and cloud computing: A systematic mapping study. Computer Communications, 89-90, 17\u201333.","journal-title":"Computer Communications"},{"key":"272_CR22","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/j.comnet.2016.08.017","volume":"108","author":"R Cha\u00e2ri","year":"2016","unstructured":"Cha\u00e2ri, R., Ellouze, F., Koub\u00e2a, A., Qureshi, B., Pereira, N., Youssef, H., & Tovar, E. (2016). Cyber-physical systems clouds: A survey. Computer Networks, 108, 260\u2013278.","journal-title":"Computer Networks"},{"issue":"7","key":"272_CR23","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.compind.2007.12.016","volume":"59","author":"D Chen","year":"2008","unstructured":"Chen, D., Doumeingts, G., & Vernadat, F. (2008). Architectures for enterprise integration and interoperability: Past, present and future. Computers in Industry, 59(7), 647\u2013659.","journal-title":"Computers in Industry"},{"issue":"2","key":"272_CR24","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171\u2013209.","journal-title":"Mobile Networks and Applications"},{"key":"272_CR25","doi-asserted-by":"crossref","unstructured":"Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos A. V., & Rong, X. (2015a). Data mining for the internet of things: Literature review and challenges. International Journal of Distributed Sensor Networks, 2015, 1\u201314.","DOI":"10.1155\/2015\/431047"},{"issue":"6","key":"272_CR26","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2015.7120041","volume":"53","author":"M Chen","year":"2015","unstructured":"Chen, M., Hao, Y., Li, Y., Lai, C. F., & Wu, D. (2015b). On the computation offloading at ad hoc cloudlet: Architecture and service modes. IEEE Communications Magazine, 53(6), 18\u201324.","journal-title":"IEEE Communications Magazine"},{"key":"272_CR27","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.jss.2016.03.010","volume":"124","author":"L Chen","year":"2017","unstructured":"Chen, L., Huang, L., Li, C., & Wu, X. (2017). Self-adaptive architecture evolution with model checking: A software cybernetics approach. Journal of Systems and Software, 124, 228\u2013246.","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"272_CR28","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/S0957-4174(02)00151-3","volume":"24","author":"KL Choy","year":"2003","unstructured":"Choy, K. L., Lee, W. B., & Lo, V. (2003). Design of an intelligent supplier relationship management system: A hybrid case based neural network approach. Expert Systems with Applications, 24(2), 225\u2013237.","journal-title":"Expert Systems with Applications"},{"issue":"9\u201310","key":"272_CR29","doi-asserted-by":"crossref","first-page":"986","DOI":"10.1016\/j.jbusres.2009.01.022","volume":"63","author":"AG Close","year":"2010","unstructured":"Close, A. G., & Kukar-Kinney, M. (2010). Beyond buying: Motivations behind consumers' online shopping cart use. Journal of Business Research, 63(9\u201310), 986\u2013992.","journal-title":"Journal of Business Research"},{"key":"272_CR30","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.websem.2012.05.003","volume":"17","author":"M Compton","year":"2012","unstructured":"Compton, M., Barnaghi, P., Bermudez, L., Garc\u00edA-Castro, R., Corcho, O., Cox, S., Graybeal, J., Hauswirth, M., Henson, C., Herzog, A., Huang, V., & Janowicz, K. (2012). The SSN ontology of the W3C semantic sensor network incubator group. Web Semantics: Science, Services and Agents on the World Wide Web, 17, 25\u201332.","journal-title":"Web Semantics: Science, Services and Agents on the World Wide Web"},{"key":"272_CR31","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.jbusres.2016.08.011","volume":"70","author":"N C\u00f4rte-Real","year":"2017","unstructured":"C\u00f4rte-Real, N., Oliveira, T., & Ruivo, P. (2017). Assessing business value of big data analytics in European firms. Journal of Business Research, 70, 379\u2013390.","journal-title":"Journal of Business Research"},{"issue":"2","key":"272_CR32","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1509\/jmr.09.0481","volume":"49","author":"BGC Dellaert","year":"2012","unstructured":"Dellaert, B. G. C., & H\u00e4ubl, G. (2012). Searching in choice mode: Consumer decision processes in product search with recommendations. Journal of Marketing Research, 49(2), 277\u2013288.","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"272_CR33","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.dss.2012.05.048","volume":"55","author":"H Demirkan","year":"2013","unstructured":"Demirkan, H., & Delen, D. (2013). Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decision Support Systems, 55(1), 412\u2013421.","journal-title":"Decision Support Systems"},{"key":"272_CR34","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compind.2014.12.012","volume":"68","author":"JM Denolf","year":"2015","unstructured":"Denolf, J. M., Trienekens, J. H., Wognum, P. M., van der Vorst, J. G. A. J., & Omta, S. W. F. (2015). Towards a framework of critical success factors for implementing supply chain information systems. Computers in Industry, 68, 16\u201326.","journal-title":"Computers in Industry"},{"key":"272_CR35","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.compind.2015.06.008","volume":"79","author":"S Kadiri El","year":"2016","unstructured":"El Kadiri, S., Grabot, B., Thoben, K. D., Hribernik, K., Emmanouilidis, C., von Cieminski, G., & Kiritsis, D. (2016). Current trends on ICT technologies for enterprise information systems. Computers in Industry, 79, 14\u201333.","journal-title":"Computers in Industry"},{"issue":"4","key":"272_CR36","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1080\/07421222.1989.11517838","volume":"5","author":"OA Sawy El","year":"1989","unstructured":"El Sawy, O. A., & Nanus, B. (1989). Toward the design of robust information systems. Journal of Management Information Systems, 5(4), 33\u201354.","journal-title":"Journal of Management Information Systems"},{"key":"272_CR37","unstructured":"Estefan, J. A. (2008). Survey of model-based systems engineering (MBSE) methodologies. Incose MBSE initiative. http:\/\/www.omgsysml.org\/MBSE_Methodology_Survey_RevB.pdf ."},{"key":"272_CR38","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.datak.2015.09.001","volume":"105","author":"TM Farias de","year":"2016","unstructured":"de Farias, T. M., Roxin, A., & Nicolle, C. (2016). SWRL rule-selection methodology for ontology interoperability. Data & Knowledge Engineering, 105, 53\u201372.","journal-title":"Data & Knowledge Engineering"},{"key":"272_CR39","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.jnca.2016.08.007","volume":"81","author":"M Ganzha","year":"2017","unstructured":"Ganzha, M., Paprzycki, M., Paw\u0142owski, W., Szmeja, P., & Wasielewska, K. (2017). Semantic interoperability in the internet of things: An overview from the INTER-IoT perspective. Journal of Network and Computer Applications, 81, 111\u2013124.","journal-title":"Journal of Network and Computer Applications"},{"key":"272_CR40","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2016.02.002","volume":"47","author":"\u00c1L Garc\u00eda","year":"2016","unstructured":"Garc\u00eda, \u00c1. L., del Castillo, E. F., & Fern\u00e1ndez, P. O. (2016). Standards for enabling heterogeneous IaaS cloud federations. Computer Standards & Interfaces, 47, 19\u201323.","journal-title":"Computer Standards & Interfaces"},{"key":"272_CR41","doi-asserted-by":"crossref","first-page":"1186","DOI":"10.1016\/j.procs.2015.05.156","volume":"52","author":"S Gill","year":"2015","unstructured":"Gill, S., & Lee, B. (2015). A framework for distributed cleaning of data streams. Procedia Computer Science, 52, 1186\u20131191.","journal-title":"Procedia Computer Science"},{"key":"272_CR42","doi-asserted-by":"publisher","unstructured":"Gregory, G. D., Ngo, L. V., & Karavdic, M. (2017). Developing e-commerce marketing capabilities and efficiencies for enhanced performance in business-to-business export ventures. Industrial Marketing Management. https:\/\/doi.org\/10.1016\/j.indmarman.2017.03.002 .","DOI":"10.1016\/j.indmarman.2017.03.002"},{"key":"272_CR43","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.dss.2016.10.002","volume":"94","author":"J Gu","year":"2017","unstructured":"Gu, J., Xu, Y., Xu, H., Zhang, C., & Ling, H. (2017). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems, 94, 19\u201328.","journal-title":"Decision Support Systems"},{"issue":"2","key":"272_CR44","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1108\/IMDS-03-2016-0094","volume":"117","author":"Y Guo","year":"2017","unstructured":"Guo, Y., Wang, M., & Li, X. (2017). Application of an improved apriori algorithm in a mobile e-commerce recommendation system. Industrial Management & Data Systems, 117(2), 287\u2013303.","journal-title":"Industrial Management & Data Systems"},{"issue":"8","key":"272_CR45","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1016\/j.im.2016.07.004","volume":"53","author":"M Gupta","year":"2016","unstructured":"Gupta, M., & George, J. F. (2016). Toward the development of a big data analytics capability. Information Management, 53(8), 1049\u20131064.","journal-title":"Information Management"},{"key":"272_CR46","doi-asserted-by":"publisher","unstructured":"Haken, H. (1977). Synergetics. Physics Bulletin, 28(9). https:\/\/doi.org\/10.1088\/0031-9112\/28\/9\/027\/meta .","DOI":"10.1088\/0031-9112\/28\/9\/027\/meta"},{"key":"272_CR47","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.ins.2016.01.045","volume":"345","author":"J Han","year":"2016","unstructured":"Han, J., Yang, Y., Huang, X., Yuen, T. H., Li, J., & Cao, J. (2016). Accountable mobile e-commerce scheme via identity-based plaintext-checkable encryption. Information Sciences, 345, 143\u2013155.","journal-title":"Information Sciences"},{"issue":"4","key":"272_CR48","doi-asserted-by":"crossref","first-page":"841","DOI":"10.3390\/s17040841","volume":"17","author":"Y Hao","year":"2017","unstructured":"Hao, Y., Chen, M., Hu, L., Song, J., Volk, M., & Humar, I. (2017). Wireless fractal ultra-dense cellular networks. Sensors, 17(4), 841\u2013848.","journal-title":"Sensors"},{"key":"272_CR49","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.chb.2017.03.059","volume":"73","author":"J Heinze","year":"2017","unstructured":"Heinze, J., Thomann, M., & Fischer, P. (2017). Ladders to m-commerce resistance: A qualitative means-end approach. Computers in Human Behavior, 73, 362\u2013374.","journal-title":"Computers in Human Behavior"},{"key":"272_CR50","doi-asserted-by":"publisher","unstructured":"Henning, F. (2016). A theoretical framework on the determinants of organisational adoption of interoperability standards in government information networks. Government Information Quarterly. https:\/\/doi.org\/10.1016\/j.giq.2015.11.008 .","DOI":"10.1016\/j.giq.2015.11.008"},{"key":"272_CR51","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.chb.2016.01.027","volume":"59","author":"JJ Hew","year":"2016","unstructured":"Hew, J. J., Lee, V. H., Ooi, K. B., & Lin, B. (2016). Mobile social commerce: The booster for brand loyalty? Computers in Human Behavior, 59, 142\u2013154.","journal-title":"Computers in Human Behavior"},{"key":"272_CR52","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.chb.2016.12.061","volume":"70","author":"S Hillman","year":"2017","unstructured":"Hillman, S., & Neustaedter, C. (2017). Trust and mobile commerce in North America. Computers in Human Behavior, 70, 10\u201321.","journal-title":"Computers in Human Behavior"},{"key":"272_CR53","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.enbuild.2015.11.066","volume":"112","author":"Y Hu","year":"2016","unstructured":"Hu, Y., Chen, H., Li, G., Li, H., Xu, R., & Li, J. (2016). A statistical training data cleaning strategy for the PCA-based chiller sensor fault detection, diagnosis and data reconstruction method. Energy and Buildings, 112, 270\u2013278.","journal-title":"Energy and Buildings"},{"key":"272_CR54","doi-asserted-by":"publisher","unstructured":"Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., & Sangaiah, A. K. (2017). A unified face identification and resolution scheme using cloud computing in internet of things. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2017.03.030 .","DOI":"10.1016\/j.future.2017.03.030"},{"issue":"2","key":"272_CR55","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10676-015-9363-z","volume":"17","author":"G Hull","year":"2015","unstructured":"Hull, G. (2015). Successful failure: What Foucault can teach us about privacy self-management in a world of Facebook and big data. Ethics and Information Technology, 17(2), 89\u2013101.","journal-title":"Ethics and Information Technology"},{"key":"272_CR56","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.jnca.2016.08.016","volume":"74","author":"S Iqbal","year":"2016","unstructured":"Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., & Choo, K. K. R. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98\u2013120.","journal-title":"Journal of Network and Computer Applications"},{"key":"272_CR57","doi-asserted-by":"publisher","unstructured":"Jayaraman, P. P., Yang, X., Yavari, A., Georgakopoulos, D., & Yi, X. (2017). Privacy preserving internet of things: From privacy techniques to a blueprint architecture and efficient implementation. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2017.03.001 .","DOI":"10.1016\/j.future.2017.03.001"},{"issue":"23\u201324","key":"272_CR58","doi-asserted-by":"crossref","first-page":"9692","DOI":"10.1016\/j.apm.2016.05.030","volume":"40","author":"P Jiang","year":"2016","unstructured":"Jiang, P., Liu, F., Wang, J., & Song, Y. (2016). Cuckoo search-designated fractal interpolation functions with winner combination for estimating missing values in time series. Applied Mathematical Modelling, 40(23\u201324), 9692\u20139718.","journal-title":"Applied Mathematical Modelling"},{"issue":"8","key":"272_CR59","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481\u20132501.","journal-title":"Wireless Networks"},{"issue":"2","key":"272_CR60","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/S0957-4174(02)00137-9","volume":"24","author":"GS Jo","year":"2003","unstructured":"Jo, G. S., & Chae, Y. M. (2003). Intelligent electronic commerce. Expert Systems with Applications, 24(2), 151\u2013151.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"272_CR61","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1016\/j.csi.2013.12.010","volume":"36","author":"C Kalloniatis","year":"2014","unstructured":"Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., & Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces, 36(4), 759\u2013775.","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"272_CR62","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/1470593105049602","volume":"5","author":"M Karavdic","year":"2005","unstructured":"Karavdic, M., & Gregory, G. (2005). Integrating e-commerce into existing export marketing theories: A contingency model. Marketing Theory, 5(1), 75\u2013104.","journal-title":"Marketing Theory"},{"key":"272_CR63","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.jnca.2016.08.002","volume":"73","author":"A Karkouch","year":"2016","unstructured":"Karkouch, A., Mousannif, H., Al Moatassime, H., & Noel, T. (2016). Data quality in internet of things: A state-of-the-art survey. Journal of Network and Computer Applications, 73, 57\u201381.","journal-title":"Journal of Network and Computer Applications"},{"key":"272_CR64","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.jretconser.2016.11.007","volume":"35","author":"LA Kasiri","year":"2017","unstructured":"Kasiri, L. A., Cheng, K. T. G., Sambasivan, M., & Sidin, S. M. (2017). Integration of standardization and customization: Impact on service quality, customer satisfaction, and loyalty. Journal of Retailing and Consumer Services, 35, 91\u201397.","journal-title":"Journal of Retailing and Consumer Services"},{"key":"272_CR65","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.elerap.2016.12.005","volume":"21","author":"NR Kermany","year":"2017","unstructured":"Kermany, N. R., & Alizadeh, S. H. (2017). A hybrid multi-criteria recommender system using ontology and neuro-fuzzy techniques. Electronic Commerce Research and Applications, 21, 50\u201364.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"3","key":"272_CR66","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.bushor.2011.01.005","volume":"54","author":"JH Kietzmann","year":"2011","unstructured":"Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241\u2013251.","journal-title":"Business Horizons"},{"issue":"2","key":"272_CR67","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s10796-005-1486-z","volume":"7","author":"H Kim","year":"2005","unstructured":"Kim, H., Kim, J., & Lee, Y. (2005). An empirical study of use contexts in the mobile internet, focusing on the usability of information architecture. Information Systems Frontiers, 7(2), 175\u2013186.","journal-title":"Information Systems Frontiers"},{"key":"272_CR68","doi-asserted-by":"publisher","unstructured":"Klein, A., & Lehner, W. (2009). Representing data quality in sensor data streaming environments. Journal of Data and Information Quality, 1(2). https:\/\/doi.org\/10.1145\/1577840.1577845 .","DOI":"10.1145\/1577840.1577845"},{"key":"272_CR69","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1016\/j.procs.2015.07.106","volume":"55","author":"M Komarov","year":"2015","unstructured":"Komarov, M., & Avdeeva, Z. (2015). Customer experience management for smart commerce based on cognitive maps. Procedia Computer Science, 55, 970\u2013979.","journal-title":"Procedia Computer Science"},{"key":"272_CR70","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.indmarman.2016.01.001","volume":"54","author":"E Lacka","year":"2016","unstructured":"Lacka, E., & Chong, A. (2016). Usability perspective on social media sites' adoption in the B2B context. Industrial Marketing Management, 54, 80\u201391.","journal-title":"Industrial Marketing Management"},{"key":"272_CR71","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.jom.2016.06.001","volume":"47-48","author":"HKS Lam","year":"2016","unstructured":"Lam, H. K. S., Yeung, A. C. L., & Cheng, T. C. E. (2016). The impact of firms\u2019 social media initiatives on operational efficiency and innovativeness. Journal of Operations Management, 47-48, 28\u201343.","journal-title":"Journal of Operations Management"},{"issue":"8","key":"272_CR72","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1016\/j.im.2016.07.008","volume":"53","author":"RYK Lau","year":"2016","unstructured":"Lau, R. Y. K., Zhao, J. L., Chen, G., & Guo, X. (2016). Big data commerce. Information Management, 53(8), 929\u2013933.","journal-title":"Information Management"},{"issue":"3","key":"272_CR73","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.bushor.2017.01.004","volume":"63","author":"I Lee","year":"2017","unstructured":"Lee, I. (2017). Big data: Dimensions, evolution, impacts, and challenges. Business Horizons, 63(3), 293\u2013303.","journal-title":"Business Horizons"},{"issue":"2","key":"272_CR74","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.dss.2005.05.022","volume":"43","author":"EY Li","year":"2007","unstructured":"Li, E. Y., Du, T. C., & Wong, J. W. (2007). Access control in collaborative commerce. Decision Support Systems, 43(2), 675\u2013685.","journal-title":"Decision Support Systems"},{"key":"272_CR75","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.elerap.2016.01.005","volume":"18","author":"WH Lin","year":"2016","unstructured":"Lin, W. H., Wang, P., & Tsai, C. F. (2016). Face recognition using support vector model classifier for user authentication. Electronic Commerce Research and Applications, 18, 71\u201382.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"3","key":"272_CR76","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ijinfomgt.2016.06.006","volume":"37","author":"X Lin","year":"2017","unstructured":"Lin, X., Li, Y., & Wang, X. (2017). Social commerce research: Definition, research themes and the trends. International Journal of Information Management, 37(3), 190\u2013201.","journal-title":"International Journal of Information Management"},{"key":"272_CR77","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.procs.2015.03.069","volume":"44","author":"R Malak","year":"2015","unstructured":"Malak, R., Baxter, B., & Hsiao, C. (2015). A decision-based perspective on assessing system robustness. Procedia Computer Science, 44, 619\u2013629.","journal-title":"Procedia Computer Science"},{"key":"272_CR78","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.comnet.2016.03.011","volume":"102","author":"L Malina","year":"2016","unstructured":"Malina, L., Hajny, J., Fujdiak, R., & Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83\u201395.","journal-title":"Computer Networks"},{"issue":"1","key":"272_CR79","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.elerap.2005.08.002","volume":"5","author":"A Malucelli","year":"2006","unstructured":"Malucelli, A., Palzer, D., & Oliveira, E. (2006). Ontology-based services to help solving the heterogeneity problem in e-commerce negotiations. Electronic Commerce Research and Applications, 5(1), 29\u201343.","journal-title":"Electronic Commerce Research and Applications"},{"key":"272_CR80","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.csi.2015.08.009","volume":"44","author":"D Mart\u00edn","year":"2016","unstructured":"Mart\u00edn, D., Lamsfus, C., & Alzua-Sorzabal, A. (2016). A cloud-based platform to develop context-aware mobile applications by domain experts. Computer Standards & Interfaces, 44, 177\u2013184.","journal-title":"Computer Standards & Interfaces"},{"key":"272_CR81","unstructured":"Mell, P., & Grance, T. (2009). Perspectives on cloud computing and standards. USA: National Institute of Standards and Technology (NIST). https:\/\/csrc.nist.gov\/csrc\/media\/events\/ispab-december-2008-meeting\/documents\/cloud-computing-standards_ispab-dec2008_p-mell.pdf ."},{"issue":"4","key":"272_CR82","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1057\/palgrave.jit.2000081","volume":"21","author":"Y Merali","year":"2006","unstructured":"Merali, Y. (2006). Complexity and information systems: The emergent domain. Journal of Information Technology, 21(4), 216\u2013228.","journal-title":"Journal of Information Technology"},{"issue":"4","key":"272_CR83","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1057\/palgrave.jit.2000082","volume":"21","author":"Y Merali","year":"2006","unstructured":"Merali, Y., & Mckelvey, B. (2006). Using complexity science to effect a paradigm shift in information systems for the 21st century. Journal of Information Technology, 21(4), 211\u2013215.","journal-title":"Journal of Information Technology"},{"issue":"2","key":"272_CR84","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jsis.2012.04.002","volume":"21","author":"Y Merali","year":"2012","unstructured":"Merali, Y., Papadopoulos, T., & Nadkarni, T. (2012). Information systems strategy: Past, present, future? The Journal of Strategic Information Systems, 21(2), 125\u2013153.","journal-title":"The Journal of Strategic Information Systems"},{"issue":"5","key":"272_CR85","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.elerap.2014.06.005","volume":"13","author":"PJ Mitrevski","year":"2014","unstructured":"Mitrevski, P. J., & Hristoski, I. S. (2014). Behavioral-based performability modeling and evaluation of e-commerce systems. Electronic Commerce Research and Applications, 13(5), 320\u2013340.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"9","key":"272_CR86","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1016\/j.compind.2014.07.007","volume":"65","author":"D Nadoveza","year":"2014","unstructured":"Nadoveza, D., & Kiritsis, D. (2014). Ontology-based approach for context modeling in enterprise applications. Computers in Industry, 65(9), 1218\u20131231.","journal-title":"Computers in Industry"},{"key":"272_CR87","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/j.procs.2016.04.251","volume":"83","author":"AM Nagib","year":"2016","unstructured":"Nagib, A. M., & Hamza, H. S. (2016). SIGHTED: A framework for semantic integration of heterogeneous sensor data on the internet of things. Procedia Computer Science, 83, 529\u2013536.","journal-title":"Procedia Computer Science"},{"key":"272_CR88","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ins.2016.10.031","volume":"378","author":"NM Nascimento do","year":"2017","unstructured":"do Nascimento, N. M., & de Lucena, C. J. P. (2017). FIoT: An agent-based framework for self-adaptive and self-organizing applications based on the internet of things. Information Sciences, 378, 161\u2013176.","journal-title":"Information Sciences"},{"issue":"5","key":"272_CR89","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1108\/IMDS-03-2015-0075","volume":"115","author":"EWT Ngai","year":"2015","unstructured":"Ngai, E. W. T., Moon, K. K., Lam, S. S., Chin, E. S. K., & Tao, S. S. C. (2015). Social media models, technologies, and applications. Industrial Management & Data Systems, 115(5), 769\u2013802.","journal-title":"Industrial Management & Data Systems"},{"key":"272_CR90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2016.11.001","volume":"65","author":"M Niemimaa","year":"2017","unstructured":"Niemimaa, M. (2017). Information systems continuity process: Conceptual foundations for the study of the \u201csocial\u201d. Computers & Security, 65, 1\u201313.","journal-title":"Computers & Security"},{"key":"272_CR91","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.compind.2015.08.001","volume":"79","author":"H Panetto","year":"2016","unstructured":"Panetto, H., Zdravkovic, M., Jardim-Goncalves, R., Romero, D., Cecil, J., & Mezg\u00e1r, I. (2016). New perspectives for the future interoperable enterprise systems. Computers in Industry, 79, 47\u201363.","journal-title":"Computers in Industry"},{"issue":"5","key":"272_CR92","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1016\/j.tele.2016.08.021","volume":"34","author":"IO Pappas","year":"2017","unstructured":"Pappas, I. O., Kourouthanassis, P. E., Giannakos, M. N., & Lekakos, G. (2017). The interplay of online shopping motivations and experiential factors on personalized e-commerce: A complexity theory approach. Telematics and Informatics, 34(5), 730\u2013742.","journal-title":"Telematics and Informatics"},{"issue":"12","key":"272_CR93","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"DL Parnas","year":"1972","unstructured":"Parnas, D. L. (1972). On the criteria to be used in decomposing systems into modules. Communications of the ACM, 15(12), 1053\u20131058.","journal-title":"Communications of the ACM"},{"issue":"1","key":"272_CR94","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2014","unstructured":"Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE Communication Surveys and Tutorials, 16(1), 414\u2013454.","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"272_CR95","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.elerap.2016.03.005","volume":"18","author":"C Piao","year":"2016","unstructured":"Piao, C., Li, X., Pan, X., & Zhang, C. (2016). User privacy protection for a mobile commerce alliance. Electronic Commerce Research and Applications, 18, 58\u201370.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"8","key":"272_CR96","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1016\/j.im.2016.06.002","volume":"53","author":"J Qi","year":"2016","unstructured":"Qi, J., Zhang, Z., Jeon, S., & Zhou, Y. (2016). Mining customer requirements from online reviews: A product improvement perspective. Information Management, 53(8), 951\u2013963.","journal-title":"Information Management"},{"key":"272_CR97","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.comnet.2015.12.019","volume":"101","author":"T Qiu","year":"2016","unstructured":"Qiu, T., Luo, D., Xia, F., Deonauth, N., Si, W., & Tolba, A. (2016). A greedy model with small world for improving the robustness of heterogeneous internet of things. Computer Networks, 101, 127\u2013143.","journal-title":"Computer Networks"},{"key":"272_CR98","doi-asserted-by":"publisher","unstructured":"Ray, B. R., Abawajy, J., Chowdhury, M., & Alelaiwi, A. (2017). Universal and secure object ownership transfer protocol for the internet of things. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2017.02.020 .","DOI":"10.1016\/j.future.2017.02.020"},{"key":"272_CR99","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.compind.2016.03.001","volume":"79","author":"D Romero","year":"2016","unstructured":"Romero, D., & Vernadat, F. (2016). Enterprise information systems state of the art: Past, present and future trends. Computers in Industry, 79, 3\u201313.","journal-title":"Computers in Industry"},{"issue":"12","key":"272_CR100","first-page":"133","volume":"21","author":"K Ryszard","year":"2001","unstructured":"Ryszard, K., & Lee, M. (2001). Artificial intelligence in electronic commerce. Lecture Notes in Computer Science, 21(12), 133\u2013134.","journal-title":"Lecture Notes in Computer Science"},{"issue":"1","key":"272_CR101","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ejor.2016.09.057","volume":"259","author":"M Scholz","year":"2017","unstructured":"Scholz, M., Dorner, V., Schryen, G., & Benlian, A. (2017). A configuration-based recommender system for supporting e-commerce decisions. European Journal of Operational Research, 259(1), 205\u2013215.","journal-title":"European Journal of Operational Research"},{"key":"272_CR102","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1016\/j.future.2016.02.013","volume":"68","author":"K Schweinsberg","year":"2017","unstructured":"Schweinsberg, K., & Wegner, L. (2017). Advantages of complex SQL types in storing XML documents. Future Generation Computer Systems, 68, 500\u2013507.","journal-title":"Future Generation Computer Systems"},{"key":"272_CR103","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.autcon.2016.08.020","volume":"72","author":"Q Shi","year":"2016","unstructured":"Shi, Q., Ding, X., Zuo, J., & Zillante, G. (2016). Mobile internet based construction supply chain management: A critical review. Automation in Construction, 72, 143\u2013154.","journal-title":"Automation in Construction"},{"issue":"5","key":"272_CR104","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1007\/s11036-015-0664-6","volume":"21","author":"Z Shu","year":"2016","unstructured":"Shu, Z., Wan, J., Zhang, D., & Li, D. (2016). Cloud-integrated cyber-physical systems for complex industrial applications. Mobile Networks and Applications, 21(5), 865\u2013878.","journal-title":"Mobile Networks and Applications"},{"key":"272_CR105","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88\u2013115.","journal-title":"Journal of Network and Computer Applications"},{"key":"272_CR106","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.jbusres.2016.08.001","volume":"70","author":"U Sivarajah","year":"2017","unstructured":"Sivarajah, U., Kamal, M. M., Irani, Z., & Weerakkody, V. (2017). Critical analysis of big data challenges and analytical methods. Journal of Business Research, 70, 263\u2013286.","journal-title":"Journal of Business Research"},{"key":"272_CR107","doi-asserted-by":"crossref","first-page":"1672","DOI":"10.1016\/j.jclepro.2016.09.111","volume":"140","author":"W Song","year":"2017","unstructured":"Song, W., & Sakao, T. (2017). A customization-oriented framework for design of sustainable product\/service system. Journal of Cleaner Production, 140, 1672\u20131685.","journal-title":"Journal of Cleaner Production"},{"key":"272_CR108","volume-title":"Complexity: Theory and applications","author":"NP Suh","year":"2005","unstructured":"Suh, N. P. (2005). Complexity: Theory and applications. Oxford: Oxford University Press."},{"issue":"12","key":"272_CR109","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1016\/j.technovation.2007.01.001","volume":"27","author":"PL To","year":"2007","unstructured":"To, P. L., Liao, C., & Lin, T. H. (2007). Shopping motivations on internet: A study based on utilitarian and hedonic value. Technovation, 27(12), 774\u2013787.","journal-title":"Technovation"},{"issue":"2","key":"272_CR110","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s12525-012-0120-4","volume":"23","author":"S Trigueros-Preciado","year":"2013","unstructured":"Trigueros-Preciado, S., P\u00e9rez-Gonz\u00e1lez, D., & Solana-Gonz\u00e1lez, P. (2013). Cloud computing in industrial SMEs: Identification of the barriers to its adoption and effects of its application. Electronic Markets, 23(2), 105\u2013114.","journal-title":"Electronic Markets"},{"key":"272_CR111","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.jnca.2016.08.011","volume":"75","author":"PK Verma","year":"2016","unstructured":"Verma, P. K., Verma, R., Prakash, A., Tripathi, R., & Naik, K. (2016). A novel hybrid medium access control protocol for inter-M2M communications. Journal of Network and Computer Applications, 75, 77\u201388.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"272_CR112","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s11036-014-0499-6","volume":"19","author":"J Wan","year":"2014","unstructured":"Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., & Cai, H. (2014). VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. Mobile Networks and Applications, 19(2), 153\u2013160.","journal-title":"Mobile Networks and Applications"},{"key":"272_CR113","doi-asserted-by":"crossref","first-page":"8977","DOI":"10.1109\/ACCESS.2016.2631152","volume":"4","author":"J Wan","year":"2016","unstructured":"Wan, J., Yi, M., Li, D., Zhang, C., Wang, S., & Zhou, K. (2016). Mobile services for customization manufacturing systems: An example of industry 4.0. IEEE Access, 4, 8977\u20138986.","journal-title":"IEEE Access"},{"issue":"4","key":"272_CR114","doi-asserted-by":"crossref","first-page":"2039","DOI":"10.1109\/TII.2017.2670505","volume":"13","author":"J Wan","year":"2017","unstructured":"Wan, J., Tang, S., Li, D., Wang, S., Liu, C., Abbas, H., & Vasilakos, A. V. (2017). A manufacturing big data solution for active preventive maintenance. IEEE Transactions on Industrial Informatics, 13(4), 2039\u20132047.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"4","key":"272_CR115","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang, R. Y., & Strong, D. M. (1996). Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems, 12(4), 5\u201333.","journal-title":"Journal of Management Information Systems"},{"key":"272_CR116","doi-asserted-by":"publisher","unstructured":"Wang, Y., Kung, L., & Byrd, T. A. (2016). Big data analytics: Understanding its capabilities and potential benefits for healthcare organizations. Technological Forecasting and Social Change. https:\/\/doi.org\/10.1016\/j.techfore.2015.12.019 .","DOI":"10.1016\/j.techfore.2015.12.019"},{"key":"272_CR117","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.csi.2015.05.006","volume":"42","author":"A Wasala","year":"2015","unstructured":"Wasala, A., Buckley, J., Sch\u00e4ler, R., & Exton, C. (2015). An empirical framework for evaluating interoperability of data exchange standards based on their actual usage: A case study on XLIFF. Computer Standards & Interfaces, 42, 157\u2013170.","journal-title":"Computer Standards & Interfaces"},{"key":"272_CR118","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.compind.2015.07.002","volume":"79","author":"G Weichhart","year":"2016","unstructured":"Weichhart, G., Molina, A., Chen, D., Whitman, L. E., & Vernadat, F. (2016). Challenges and current developments for sensing, smart and sustainable enterprise systems. Computers in Industry, 79, 34\u201346.","journal-title":"Computers in Industry"},{"issue":"1","key":"272_CR119","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compag.2007.01.016","volume":"57","author":"W Wen","year":"2007","unstructured":"Wen, W. (2007). A knowledge-based intelligent electronic commerce system for selling agricultural products. Computers and Electronics in Agriculture, 57(1), 33\u201346.","journal-title":"Computers and Electronics in Agriculture"},{"issue":"8","key":"272_CR120","first-page":"1","volume":"1997","author":"CC Wood","year":"1997","unstructured":"Wood, C. C. (1997). Logging, auditing and filtering for internet electronic commerce. Computer Fraud & Security, 1997(8), 1\u201316.","journal-title":"Computer Fraud & Security"},{"issue":"8","key":"272_CR121","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.im.2016.06.003","volume":"53","author":"K Xie","year":"2016","unstructured":"Xie, K., Wu, Y., Xiao, J., & Hu, Q. (2016). Value co-creation between firms and customers: The role of big data-based cooperative assets. Information Management, 53(8), 1034\u20131048.","journal-title":"Information Management"},{"issue":"2","key":"272_CR122","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCC.2016.29","volume":"3","author":"Z Yan","year":"2016","unstructured":"Yan, Z., Wang, M., Li, Y., & Vasilakos, A. V. (2016). Encrypted data management with deduplication in cloud computing. IEEE Cloud Computing, 3(2), 28\u201335.","journal-title":"IEEE Cloud Computing"},{"key":"272_CR123","doi-asserted-by":"publisher","unstructured":"Yang, S., Guo, J., & Wei, R. (2016a). Semantic interoperability with heterogeneous information systems on the internet through automatic tabular document exchange. Information Systems. https:\/\/doi.org\/10.1016\/j.is.2016.10.010 .","DOI":"10.1016\/j.is.2016.10.010"},{"key":"272_CR124","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.elerap.2016.07.003","volume":"20","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Shi, Y., & Yan, H. (2016b). Scale, congestion, efficiency and effectiveness in e-commerce firms. Electronic Commerce Research and Applications, 20, 171\u2013182.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"1","key":"272_CR125","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1108\/09685220110366786","volume":"9","author":"N Ye","year":"2001","unstructured":"Ye, N. (2001). Robust intrusion tolerance in information systems. Information Management & Computer Security, 9(1), 38\u201343.","journal-title":"Information Management & Computer Security"},{"issue":"4","key":"272_CR126","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1287\/isre.1100.0322","volume":"21","author":"Y Yoo","year":"2010","unstructured":"Yoo, Y., Henfridsson, O., & Lyytinen, K. (2010). Research commentary \u2013 The new organizing logic of digital innovation: An agenda for information systems research. Information Systems Research, 21(4), 724\u2013735.","journal-title":"Information Systems Research"},{"key":"272_CR127","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.jlp.2016.11.011","volume":"45","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Zhu, D., Wang, J., & Zhao, Y. (2017). Abnormal data detection for multivariate alarm systems based on correlation directions. Journal of Loss Prevention in the Process Industries, 45, 43\u201355.","journal-title":"Journal of Loss Prevention in the Process Industries"},{"issue":"8","key":"272_CR128","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1016\/j.micpro.2015.08.013","volume":"39","author":"X Yue","year":"2015","unstructured":"Yue, X., Cai, H., Yan, H., Zou, C., & Zhou, K. (2015). Cloud-assisted industrial cyber-physical systems: An insight. Microprocessors and Microsystems, 39(8), 1262\u20131270.","journal-title":"Microprocessors and Microsystems"},{"key":"272_CR129","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.cma.2016.10.004","volume":"313","author":"KV Yuen","year":"2017","unstructured":"Yuen, K. V., & Ortiz, G. A. (2017). Outlier detection and robust regression for correlated data. Computer Methods in Applied Mechanics and Engineering, 313, 632\u2013646.","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"key":"272_CR130","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84, 25\u201337.","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"272_CR131","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TSC.2016.2592520","volume":"9","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y. (2016). GroRec: A group-centric intelligent recommender system integrating social, mobile and big data technologies. IEEE Transactions on Services Computing, 9(5), 786\u2013795.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"272_CR132","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7\u201318.","journal-title":"Journal of Internet Services and Applications"},{"issue":"3","key":"272_CR133","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/s11036-014-0537-4","volume":"20","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Zhang, D., Hassan, M. M., Alamri, A., & Peng, L. (2015). CADRE: Cloud-assisted drug recommendation service for online pharmacies. Mobile Networks and Applications, 20(3), 348\u2013355.","journal-title":"Mobile Networks and Applications"},{"key":"272_CR134","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.elerap.2016.02.002","volume":"17","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Wang, C., Li, Z., Zhu, J., Shi, W., & Wang, Q. (2016a). Exploring the sequential usage patterns of mobile internet services based on Markov models. Electronic Commerce Research and Applications, 17, 1\u201311.","journal-title":"Electronic Commerce Research and Applications"},{"issue":"5","key":"272_CR135","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MWC.2016.7721738","volume":"23","author":"D Zhang","year":"2016","unstructured":"Zhang, D., He, Z., Qian, Y., Wan, J., Li, D., & Zhao, S. (2016b). Revisiting unknown RFID tag identification in large-scale internet of things. IEEE Wireless Communications, 23(5), 24\u201329.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"272_CR136","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","volume":"11","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Qiu, M., Tsai, C. W., Hassan, M. M., & Alamri, A. (2017a). Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1), 88\u201395.","journal-title":"IEEE Systems Journal"},{"key":"272_CR137","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.future.2015.12.001","volume":"66","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Chen, M., Huang, D., Wu, D., & Li, Y. (2017b). iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Future Generation Computer Systems, 66, 30\u201335.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"272_CR138","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSYST.2015.2457244","volume":"11","author":"C Zou","year":"2017","unstructured":"Zou, C., Zhang, D., Wan, J., Hassan, M. M., & Lloret, J. (2017). Using concept lattice for personalized recommendation system design. IEEE Systems Journal, 11(1), 305\u2013314.","journal-title":"IEEE Systems Journal"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-017-0272-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-017-0272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-017-0272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T12:16:52Z","timestamp":1659874612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-017-0272-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,16]]},"references-count":138,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1007\/s12525-017-0272-3","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,16]]},"assertion":[{"value":"1 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}