@conference {1975116, title = {Best of Both Worlds: The Inclusion of Gamification in Virtual Lab Environments to Increase Educational Value}, booktitle = {Proceedings of the 56th Hawaii International Conference on System Sciences}, year = {2023}, month = {2023}, keywords = {BIS}, author = {Shadbad,Forough and Bahr,Gabriel and Luse,Andy and Hammer,Bryan} } @article {1975111, title = {Hackalytics: Using Computer Hacking to Engage Students in Analytics}, journal = {Journal of Information Systems Education}, year = {2023}, month = {2023}, keywords = {BIS}, author = {Luse,Andy and Shadbad,Forough} } @conference {1984536, title = {Interactive Network Visualization of Educational Standards, Learning Resources and Learning Progressions}, booktitle = {Proceedings IV2023 - 27th International Conference on Information Visualisation}, year = {2023}, month = {2023}, abstract = {We present a novel, network- and browser-based visualization of the Next Generation Science Standards (NGSS). The NGSS are meant to guide (USA) K-12 science and engineering learning and are almost always presented using text and tables. Their connectivity, however, lends them well for network modeling and interactive network visualization.

}, keywords = {BIS, Design Program}, author = {Reitsma,Reindert and Hoglund,Brian and Achatz,Nikolas and Marks,Andrea} } @conference {1970491, title = {Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?}, booktitle = {WISP2022: 2022 Workshop on Information Security and Privacy (WISP)}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Shadbad,Forough and Curry,Michael and Biros,David} } @conference {1984371, title = {Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?}, booktitle = {WISP2022: 2022 Workshop on Information Security and Privacy (WISP)}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2022/19}, author = {Marshall,Byron and Shadbad,Forough and Curry,Michael and Biros,David} } @article {1985311, title = {Does Platform Control Matter? A Meta-Analysis}, year = {2022}, month = {2022}, keywords = {BIS}, author = {Roberts,Nicholas and Kim,I. and Iyengar,K. and Gerow,J.} } @article {1975126, title = {Generational Differences in Perceiving the Technology Interruptions: A qualitative Study}, journal = {European Journal of Information Systems}, year = {2022}, month = {2022}, pages = {1-21}, keywords = {BIS}, author = {Kalgotra,Pankush and Baham,Corey and Shadbad,Forough and Sharda,Ramesh} } @article {1970826, title = {Need for Speed, but How Much Does It Cost? Unpacking the Fee-Speed Relationship in Cryptocurrency Transactions}, journal = {Journal of Operations Management}, year = {2022}, month = {2022}, keywords = {BIS, Business Analytics}, author = {Shang,Guangzhi and Ilk,Noyan and Fan,Shaokun} } @article {1974486, title = {NGSS Explorer (Curriculum Network Visualization)}, year = {2022}, month = {2022}, keywords = {BIS}, url = {https://www.teachengineering.org/ngss_explorer}, author = {Reitsma,Reindert and Hoglund,Brian and Achatz,Nikolas} } @conference {1972171, title = {Pixel Importance: The Impact of Saturation and Brightness on the Spread of Information on Social Media}, booktitle = {Springer Cham}, year = {2022}, month = {2022}, pages = {105}, keywords = {BIS, Business Analytics}, isbn = {1865-1348}, author = {Kaskela,Timothy and Zhu,Bin and Sayali,Dhamapurkar} } @article {1975121, title = {Psychological Contract Violations on Information Disclosure: A study of Interpersonal Arrangements and Trust Transference in Social Media Platforms}, journal = {Communications of the Association for Information Systems}, year = {2022}, month = {2022}, keywords = {BIS}, author = {Hammer,Bryan and Shadbad,Forough} } @conference {1974326, title = {Supporting Student Collaboration for Online Learning: The Impact of Two Instructional Interventions}, booktitle = {Association for Information Systems - Special Interest Group - Education (AIS - SIG - Ed) - 2021}, year = {2022}, month = {2022}, abstract = {This research provides an overview of an exploratory study that is being conducted to investigate two potential ways in which an instructor may be able to support online student teams assigned to analyze a case and create a collaborative digital document. Specifically, the study was designed to examine the impact of instructor leadership style and process structure on student perceptions and performance. Data has been collected for 60 3-person teams of students enrolled in an upper-division undergraduate information systems course entitled {\textquotedblleft}Business Process Management.{\textquotedblright} The research data has been collected and will be analyzed. Preliminary findings from the study will be discussed.}, keywords = {BIS}, author = {Tyran,Craig K and Raja,V.T. and Tyran,Kristi L} } @book {1974496, title = {A Tale of Two Systems. A Review of the architecting and re-architecting of a long-lived website; (2nd edition)}, year = {2022}, month = {2022}, keywords = {BIS}, url = {https://open.oregonstate.education/taleoftwosystems/}, author = {Reitsma,Reindert and Krueger,Kevin} } @booklet {1970496, title = {Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {This extended abstract describes our planned efforts to usefully integrate psychometric and telemetry data to help identify cybersecurity risks and more effectively analyze cybersecurity events.}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron and Shadbad,Forough and Hong,Sanghyun} } @inbook {1974491, title = {Breadcrumbs}, year = {2021}, month = {2021}, address = {Nijmegen}, abstract = {Reflections on the work and contributions of Dr. Paul Hendriks, Professor of Knowledge Management at Radboud University, Nijmegen, The Netherlands.}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1970126, title = {Destabilization and Consolidation: Conceptualizing, Measuring, and Validating the Dual Characteristics of Technology}, journal = {Research Policy}, volume = {50}, year = {2021}, month = {2021}, pages = {104-115}, keywords = {BIS, Business Analytics, Finance, Strategy \& Entrepreneurship}, author = {Chen,Jiyao and Shao,Rong and Fan,Shaokun} } @article {1970831, title = {Dividend or No Dividend in Delegated Blockchain Governance: A Game Theoretic Analysis}, journal = {Journal of Systems Science and Systems Engineering}, year = {2021}, month = {2021}, pages = {1-19}, keywords = {BIS, Business Analytics}, author = {Pan,Dapeng and Zhao,J. Leon and Fan,Shaokun and Zhang,Ziqiong} } @inbook {1975131, title = {Does Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions}, year = {2021}, month = {2021}, keywords = {BIS}, author = {Shadbad,Forough and Biros,David} } @article {1975716, title = {Enhancing decision-making with data quality metadata}, journal = {Journal of Systems and Information Technology}, volume = {23}, year = {2021}, month = {2021}, keywords = {BIS, Business Analytics}, author = {Shankaranarayanan,G and Zhu,Bin} } @article {1984376, title = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance}, journal = {ACM Transactions on Management Information Systems}, volume = {13}, year = {2021}, month = {2021}, pages = {1-20}, abstract = {Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones{\textquoteright} InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM{\textquoteright}s innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69\% of the riskiest individuals within the top 25\% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Robert E} } @article {1970501, title = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance}, journal = {ACM Transactions on Management Information Systems}, year = {2021}, month = {2021}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Robert E} } @article {1970841, title = {Stability of Transaction Fees in Bitcoin: A Supply and Demand Perspective}, journal = {MIS Quarterly}, volume = {45}, year = {2021}, month = {2021}, pages = {563-692}, address = {Canyon}, keywords = {BIS, Business Analytics}, author = {Ilk,Noyan and Shang,Guangzhi and Fan,Shaokun and Zhao,J. Leon} } @article {1975136, title = {Understanding Employee Information Security Policy Compliance from Role Theory Perspective}, journal = {Journal of Computer Information Systems}, year = {2021}, month = {2021}, keywords = {BIS}, author = {Shadbad,Forough and Biros,David} } @article {1984731, title = {Understanding IT Value at the Managerial Level: Managerial Ambidexterity, Seizing Opportunities, and the Moderating Role of Information Systems Use}, year = {2021}, month = {2021}, keywords = {BIS}, author = {Roberts,Nicholas and Qahri-Saremi,H. and Vijayasarathy,L.} } @article {1970836, title = {Combining Textual Cues with Social Clues: Utilizing Social Features to Improve Sentiment Analysis in Social Media}, journal = {Decision Sciences}, year = {2020}, month = {2020}, keywords = {BIS, Business Analytics}, author = {Ilk,Noyan and Fan,Shaokun} } @article {1984736, title = {Connecting the Role of the Information Technology Function to its Contribution to the Organization}, year = {2020}, month = {2020}, keywords = {BIS}, author = {Roberts,Nicholas and Gerow,J.} } @article {1976011, title = {Connecting to Place - Virtually}, year = {2020}, month = {2020}, keywords = {BIS}, author = {Arora,Vipin and Semken,Steven} } @article {1976981, title = {Impact of Team Size on Technological Contributions: Unpacking Disruption and Development}, year = {2020}, month = {2020}, address = {Vancouver CA}, keywords = {BIS, Business Analytics, Finance, Strategy \& Entrepreneurship}, author = {Chen,Jiyao and Shao,Rong and Fan,Shaokun and Li,Jiexun} } @conference {1973141, title = {K-12 Engineering and the Next Generation Science Standards (NGSS): A Network Visualization and Analysis}, booktitle = {American Society for Engineering Education (ASEE)}, year = {2020}, month = {2020}, abstract = {We present an interactive network visualization of the Next Generation Science Standards (NGSS) and its coverage by collections of aligned curriculum. The visualization presents an alternative to the usual presentation of the NGSS as a set of linked tables. Users can view entire grade bands, search for or drill down to the level of individual NGSS standards or curricular items, or display groups of standards across grade bands. NGSS-aligned curriculum collections can be switched on and off to visually explore their NGSS coverage. Viewing the NGSS and associated curriculum this way facilitates navigating the NGSS and can help with assessment of alignments as lacking or anomalous. Modeling the NGSS as a network also allows for the computation of network metrics to provide insight into core characteristics of the network. It also provides for detecting anomalies and unexpected patterns.}, keywords = {BIS, Design Program}, url = {https://strategy.asee.org/k-12-engineering-and-the-next-generation-science-standards-a-network-visualization-and-analysis-resource-exchange}, author = {Reitsma,Reindert and Hoglund,Brian and Marks,Andrea and Chaker,Dua and Marks,Andrea} } @article {1984741, title = {Managing Software Development Projects for Success: Aligning Plan- and Agility-Based Approaches to Project Complexity and Project Dynamism}, year = {2020}, month = {2020}, keywords = {BIS}, author = {Butler,C. and Roberts,Nicholas and Vijayasarathy,L.} } @article {1968331, title = {Promoting a Sense of Place Virtually: A Review of the ESA Weekly Water Cooler Chat Focused on Virtual Sense of Place}, volume = {101}, year = {2020}, month = {2020}, address = {Wiley Periodicals}, keywords = {BIS}, url = {https://doi.org/10.1002/bes2.1734}, author = {Hoke,Kelly and O{\textquoteright}Connell,Kari and Semken,Steven and Arora,Vipin} } @conference {1975141, title = {A Qualitative Approach to Understand Unintentional Information Security Misbehaviors}, booktitle = {Americas Conference on Information Systems}, year = {2020}, month = {2020}, keywords = {BIS}, author = {Shadbad,Forough and Baham,Corey and Biros,David} } @article {1982676, title = {Teaching and maintaining campus community during a pandemic}, year = {2020}, month = {2020}, address = {Portland (Zoom)}, keywords = {BIS}, author = {Raja,V.T. and Lewis,Steven and Tolan,Jody} } @article {1975151, title = {Technostress and its Influence on Employee Information Security Policy Compliance}, journal = {Information Technology and People}, year = {2020}, month = {2020}, keywords = {BIS}, author = {Shadbad,Forough and Biros,David} } @article {1970851, title = {A text analytics framework for automated communication pattern analysis}, journal = {Information \& Management}, volume = {57}, year = {2020}, month = {2020}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Ilk,Noyan} } @article {1984746, title = {Connecting Personality Traits to Social Networking Site Addiction: The Mediating Role of Motives}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Chen,A. and Roberts,Nicholas} } @conference {1975146, title = {Developing an Unintentional Information Security Misbehavior Scale (UISMS)}, booktitle = {Proceeding of Midwest Association for Information Systems}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Shadbad,Forough and Biros,David} } @article {1985316, title = {Digital Platform Life Cycles in Nascent Markets}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Roberts,Nicholas and Kim,I.} } @article {1984751, title = {Effective Use of Analytic DSS and Job Performance}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Campbell,D. and Roberts,Nicholas} } @article {1983146, title = {Examining Technostress on Employees Security-related Behaviors}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Shadbad,Forough and Biros,David and Sharma,Madhav} } @article {1973146, title = {The Future of Data: Too Much Visualization — Too Little Understanding?}, journal = {Dialectic}, volume = {2}, year = {2019}, month = {2019}, abstract = {Data is part of our lives. Information visualizations help us make sense of this data and possibly help us make changes because of it. In this paper, however, we estimate some of the consequences of what seems an ominous trend, namely the needless complication and beautification of such visualizations. We argue that with increased availability of data and ever more powerful and easy to use visualization software, it becomes easy to succumb to the temptation to impress rather than to communicate. And so we wonder: is a future filled with visualizations that are visually complex and stunning, yet fail to properly communicate the data emerging? To assess some of the consequences of this practice we selected five examples from published sources, developed far simpler (and less attractive) versions from the identical data, randomly exposed these visualizations to subjects and asked simple questions about the displayed data. We find that, on average, it takes subjects longer to comprehend the complex versions, that it takes subjects longer to extract information from these versions and that they make more and larger errors doing so. The experiment shows that subjects eventually do learn how to navigate the complex versions, but by then they have spent significantly more time and made serious interpretative errors.}, keywords = {BIS, Design Program}, url = {https://quod.lib.umich.edu/d/dialectic/14932326.0002.207?view=text;rgn=main}, author = {Reitsma,Reindert and Marks,Andrea} } @conference {1970506, title = {Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors}, booktitle = {WISP2021: 2021 Workshop on Information Security and Privacy (WISP)}, year = {2019}, month = {2019}, abstract = {Cybersecurity researchers have made significant steps to understand the mechanisms of security policy compliance and unify theories of security behavior. However, due partly to the limitations of traditional variance model statistical methods, these studies by necessity typically focus on a single security policy issue. By contrast, new machine learning algorithms frequently employed by data scientists offer great promise as a new statistical approach for examining robust individualized interpretations of policy and can also identify potentially risky behaviors. This study proposes to explore cybersecurity training impediments of multiple protection motivation behaviors in ransomware prevention training. It demonstrates the feasibility of using machine learning with survey items from the cybersecurity research to predict non-compliance. It also illustrates a potentially novel method to statistically validate research theory through higher levels of ML prediction. This study is a work in progress and we seek feedback on its design and relevance.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2019/1}, author = {Curry,Michael and Marshall,Byron and Crossler,Robert E} } @booklet {1970846, title = {Impacts of Consensus Algorithms in Cryptocurrency: A Theoretical Analysis of PoW versus PoS in Ethereum}, year = {2019}, month = {2019}, pages = {16-22}, keywords = {BIS, Business Analytics}, author = {Pan,Dapeng and Zhao,J. Leon and Fan,Shaokun} } @article {1970511, title = {InfoSec Process Action Model (IPAM): Targeting Insider{\textquoteright}s Weak Password Behavior}, journal = {Journal of Information Systems}, volume = {33}, year = {2019}, month = {2019}, pages = {201-225}, abstract = {The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations{\textquoteright} ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior.}, keywords = {Accounting, BIS}, url = {https://doi.org/10.2308/isys-52381}, author = {Curry,Michael and Marshall,Byron and Correia,John and Crossler,Robert E} } @article {1976986, title = {Knowledge Networks, Collaboration Networks, and Innovation: A Replication and Extension}, year = {2019}, month = {2019}, address = {Boston}, keywords = {BIS, Business Analytics, Strategy \& Entrepreneurship}, author = {Chen,Jiyao and Shen,Jia and Fan,Shaokun} } @article {1978186, title = {A Process Mining Framework for Communication Pattern Analysis in Online Contact Centers}, year = {2019}, month = {2019}, address = {Salt lake city}, keywords = {BIS, Business Analytics}, author = {Ilk,Noyan and Fan,Shaokun} } @conference {1975156, title = {Psychological Contract Violation and Sharing Intention on Facebook}, booktitle = {Proceedings of the 52nd Hawaii International Conference on System Sciences}, year = {2019}, month = {2019}, keywords = {BIS}, author = {Hammer,Bryan and Zhang,Tianjian and Shadbad,Forough and Agrawal,Rupesh} } @article {1978181, title = {A Supply and Demand Model for Bitcoin{\textquoteright}s Data Space Marketplace}, year = {2019}, month = {2019}, address = {Munich}, keywords = {BIS, Business Analytics}, author = {Ilk,Noyan and Shang,Guangzhi and Fan,Shaokun} } @article {1978196, title = {Blockchain-Enabled Trust: The Case of Inter-Firm Dataflow}, year = {2018}, month = {2018}, address = {New Orleans}, keywords = {BIS, Business Analytics}, author = {Zhao,J. Leon and Fan,Shaokun and Zheng,Eric} } @article {1970856, title = {Community Engagement and Online Word of Mouth: An Empirical Investigation}, journal = {Information \& Management}, volume = {55}, year = {2018}, month = {2018}, pages = {258-270}, keywords = {BIS, Business Analytics}, author = {Wu,Ji and Fan,Shaokun and Zhao,J. Leon} } @article {1976991, title = {Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation}, year = {2018}, month = {2018}, address = {Chicago, IL}, keywords = {BIS, Business Analytics, Finance, Strategy \& Entrepreneurship}, author = {Chen,Jiyao and Shao,Rong and Fan,Shaokun} } @article {1978201, title = {An Efficient Recommender System Using Locality Sensitive Hashing}, year = {2018}, month = {2018}, address = {Hawaii}, keywords = {BIS, Business Analytics}, author = {Zhang,Kunpeng and Fan,Shaokun and Wang,Harry} } @conference {1984756, title = {Exploratory Study for Readmission in Cancer Patients}, year = {2018}, month = {2018}, keywords = {BIS}, author = {Huangfu,L. and Hayne,S. and Ma,J. and Roberts,Nicholas} } @conference {1973161, title = {Fear Appeals Versus Priming in Ransomware Training}, booktitle = {Pre-ICIS Workshop on Information Security and Privacy (WISP 2018)}, year = {2018}, month = {2018}, abstract = {Employee non-compliance is at the heart of many of today{\textquoteright}s security incidents. Training programs often employ fear appeals to motivate individuals to follow policy and take action to reduce security risks. While the literature shows that fear appeals drive intent to comply, there is much less evidence of their impact after intention is formed. Building on IPAM {\textendash} a process nuanced model for compliance training and assessment {\textendash} this study contrasts the impact of fear appeals vs. self-efficacy priming on ransomware training. In our proposed study, a pool of students will participate in a three-step series of training events. Some participants will encounter enhanced fear appeals at each step while others will be presented with materials that include
priming signals intended to foster development of increased self-efficacy. Previously identified
drivers of behavior (intent, processed-nuanced forms of self-efficacy, and outcome expectations)
are measured so that the effect of the treatments can be contrasted. A scenario agreement
methodology is used to indicate behavior as a dependent variable. We expect to show that while
fear appeals are useful and help build intent to comply at the motivational stage, process-nuanced
self-efficacy treatments are expected have a stronger effect on behavior post-intentional.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2018/1/}, author = {Curry,Michael and Marshall,Byron and Crossler,Rob and Correia,John} } @article {1970516, title = {InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior}, journal = {Data Base for Advances in Information Systems}, volume = {49}, year = {2018}, month = {2018}, abstract = {While much of the extant InfoSec research relies on single assessment models that predict intent to act, this article proposes a multi-stage InfoSec Process Action Model (IPAM) that can positively change individual InfoSec behavior. We believe that this model will allow InfoSec researchers to focus more directly on the process which leads to action and develop better interventions that address problematic security behaviors. Building on successful healthcare efforts which resulted in smoking cessation, regular exercise and a healthier diet, among others, IPAM is a hybrid, predictive, process approach to behavioral InfoSec improvement. IPAM formulates the motivational antecedents of intent as separate from the volitional drivers of behavior. Singular fear appeals often seen in InfoSec research are replaced by more nuanced treatments appropriately differentiated to support behavioral change as part of a process; phase-appropriate measures of self-efficacy are employed to more usefully assess the likelihood that a participant will act on good intentions; and decisional balance {\textendash}assessment of pro and con perceptions {\textendash} is monitored over time. These notions better align InfoSec research to both leading security practice and to successful comparators in healthcare. We believe IPAM can both help InfoSec research models better explain actual behavior and better inform practical security-behavior improvement initiatives.}, keywords = {Accounting, BIS}, url = {https://www.researchgate.net/publication/321138048_InfoSec_Process_Action_Model_IPAM_Systematically_Addressing_Individual_Security_Behavior}, author = {Curry,Michael and Marshall,Byron and Crossler,Robert E and Correia,John} } @article {1978191, title = {Investigating the Fee-Delay Relationship in Cryptocurrency Transactions: Evidence from the Bitcoin Network}, year = {2018}, month = {2018}, address = {Santa Clara}, keywords = {BIS, Business Analytics}, author = {Ilk,Noyan and Fan,Shaokun and Shang,Guangzhi} } @article {1975421, title = {Making Sense of Organization Dynamics Using Text Analysis.}, journal = {Expert Systems with Applications}, year = {2018}, month = {2018}, keywords = {BIS, Business Analytics, Supply Chain}, author = {Li,Jiexun and Wu,Zhaohui and Zhu,Bin and Xu,Kaiquan} } @article {1985321, title = {Organizational Identity and Digital Platform Evolution}, year = {2018}, month = {2018}, keywords = {BIS}, author = {Roberts,Nicholas and Kim,I.} } @article {1984761, title = {Untitled}, year = {2018}, month = {2018}, keywords = {BIS}, author = {Huangfu,L. and Hayne,S. and Ma,J. and Roberts,Nicholas} } @article {1984766, title = {Virtual Customer Environment Design and Organizational Innovation: An Exploration-Exploitation Perspective}, year = {2018}, month = {2018}, keywords = {BIS}, author = {Roberts,Nicholas and Dinger,M.} } @conference {1975726, title = {BEHAVIOR THEORY ENABLED GENDER CLASSIFICATION METHOD}, booktitle = {the Fifteeth workshop on e-Business (WeB 2016) in Dublin}, year = {2017}, month = {2017}, keywords = {BIS, Business Analytics}, author = {Wang,Jing and Yan,Xiangbin and Zhu,Bin} } @article {1970861, title = {Collaboration Process Pattern Approach to Improving Teamwork Performance: A Data Mining-Based Methodology}, journal = {INFORMS Journal on Computing}, volume = {29}, year = {2017}, month = {2017}, pages = {438-456}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Li,Xin and Zhao,J. Leon} } @conference {1975721, title = {The Different Behaviors between Product Searchers and Website Searchers}, year = {2017}, month = {2017}, keywords = {BIS, Business Analytics}, author = {Zun,Kai and Zhu,Bin and Zuo,Meiyun} } @article {1970871, title = {Enabling effective workflow model reuse: A data-centric approach}, journal = {Decision Support Systems}, volume = {93}, year = {2017}, month = {2017}, pages = {11-25}, keywords = {BIS, Business Analytics}, author = {Liu,Zhiyong and Fan,Shaokun and Wang,Harry and Zhao,J. Leon} } @article {1973396, title = {Hospitality Industry Labor Shortage A Mixed?Methods Investigation}, year = {2017}, month = {2017}, keywords = {BIS, Marketing, OSU-Cascades, OSU-Cascades Hospitality Mgt}, author = {Montgomery,Todd} } @article {1970866, title = {Introduction to the special issue of ECR on E-business innovation with big data}, journal = {Electronic Commerce Research}, year = {2017}, month = {2017}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Xiao,JInghua and Xie,Kang and Zhao,J. Leon} } @article {1984771, title = {A Meta-Analysis of Organizational Learning and IT Assimilation}, year = {2017}, month = {2017}, keywords = {BIS}, author = {Roberts,Nicholas and Gerow,J. and Jeyaraj,A. and Roberts,S.} } @article {1970526, title = {A Normative Model for Assessing SME IT Effectiveness}, journal = {Communications of the IIMA}, volume = {15}, year = {2017}, month = {2017}, abstract = {Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably
effective IT systems remains a significant challenge. This paper presents a light weight IT
effectiveness model for small businesses to assess their IT and formulate strategies for
improvement. Employing an action research approach we investigate a mixed method analysis of
120 survey responses from small family businesses and user participation in 10 semi-structured
interviews. We then conduct critical reflection to identify refinements which are validated using
72 survey responses from university students. The results present compelling evidence that
employees{\textquoteright} normative patterns (norms) are a significant driver of IT effectiveness in a second
order PLS predictive model able to explain 26\% of observed variance.
A norms-based approach to IT effectiveness helps fill a significant research and managerial gap
for organizations unable or unwilling to adopt IT best practice frameworks used by large
organizations. Our findings imply that comparing norms to IT best practices may offer a less
technical approach to assessing IT operations, which may be well suited to small businesses.
Although further investigation cycles are needed to systematically test this model, we encourage
small business managers to: 1) anticipate IT risks and mitigate them; 2) identify measures of IT
performance, and monitor them, and 3) review/synchronize business and IT goals.}, keywords = {Accounting, BIS}, url = {http://scholarworks.lib.csusb.edu/ciima/vol15/iss1/3}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @booklet {1973166, title = {Personal Motivation Measures for Personal IT Security Behavior}, year = {2017}, month = {2017}, keywords = {Accounting, BIS}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27/}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Rob} } @article {1984776, title = {Preliminary Evidence for the Use and Efficacy of Mobile Health Applications in Managing Posttraumatic Stress Disorder Symptoms}, year = {2017}, month = {2017}, keywords = {BIS}, author = {Keen,S. and Roberts,Nicholas} } @article {1984781, title = {The Role of Context in IT Assimilation: A Multi-Method Study of a SaaS Platform in the US Nonprofit Sector,}, year = {2017}, month = {2017}, keywords = {BIS}, author = {Wright,R. and Roberts,Nicholas and Wilson,D.} } @conference {1968336, title = {Sense of Virtual Place (SOVP): Conceptual Exploration and Initial Empirical Validation}, booktitle = {AMCIS2017 - Boston, MA, August 10-12, 2017}, year = {2017}, month = {2017}, address = {Boston, MA}, abstract = {In this article, we introduce the notion of {\textquotedblleft}Sense of Virtual Place{\textquotedblright} (SOVP) and explore the factors affecting it. We argue that SOVP can act as a surrogate for user engagement in virtual environments. We develop and validate a SOVP measure, adapting from a widely used measure of Sense of Place (SOP) in the academic disciplines of environmental and social psychology.}, keywords = {BIS}, author = {Arora,Vipin and Khazanchi,Deepak} } @article {1970521, title = {BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough}, year = {2016}, month = {2016}, pages = {25}, abstract = {Whether you enter the workforce as a sales manager, financial accountant or office admin, chances are that you will be working with some type of Enterprise Resource Planning (ERP) system. The purpose of this exercise/walkthrough is to familiarize you with a typical business process as it is commonly executed with the help of one of the leading ERP systems in the market today {\textendash} Microsoft Dynamics NAV. This exercise will walk you through the six steps of a typical sales process: 1) Creating a customer order; 2) Backordering an out-of-stock item; 3) Receiving the backordered item; 4) Shipping the customer the ordered items and invoicing the customer; 5) Receiving payment from the customer; 6) Making a payment to the vendor from whom we backordered. As you make your way through this exercise, you should realize that in a real company this process would be executed by different people working in different departments. They all will interact with the ERP; i.e., they all retrieve information from the ERP and store new information in it, as the sales process progresses. In this exercise you take on the role of each of these people, giving you a sense of how the sales order is processed both by the company and by the ERP.}, keywords = {Accounting, BIS}, url = {http://hdl.handle.net/1957/59858}, author = {Curry,Michael and Marshall,Byron and Raja,V.T. and Reitsma,Reindert and Wydner,Kirk} } @conference {1975731, title = {Differences between Younger and Senior Information Providers in Senior Online Communities}, booktitle = {the Fifteeth workshop on e-Business (WeB 2016) in Dublin}, year = {2016}, month = {2016}, keywords = {BIS, Business Analytics}, author = {Wang,Changyu and Zhu,Bin and Zuo,Meiyun} } @article {1984786, title = {Electronic Medical Record System Avoidance in a Turbulent Environment}, year = {2016}, month = {2016}, keywords = {BIS}, author = {Roberts,Nicholas and Mellott,M. and Dinger,M. and Campbell,D.} } @article {1968341, title = {Evaluating IT Integration Risk Prior to Mergers and Acquisitions}, journal = {ISACA Journal}, volume = {1}, year = {2016}, month = {2016}, abstract = {Integration of IT systems and IT management processes is one of the major challenges in the mergers and acquisitions (M\&A) process that affects all aspects of the merged business and is, therefore, crucial to the overall success of the M\&A process. The purpose of this article is to highlight various types of IT integration risks and the associated costs that must be considered and factored in with the predeal negotiations in each and every M\&A. This is important, especially because of the huge costs involved in integrating incompatible systems and meeting the mandatory regulatory compliance requirements. The article suggests looking closely at technical, managerial and user/application level risk factors as part of the M\&A pre-merger due diligence. This effort would also evaluate the potential real costs of IT integration post-merger and contribute to the overall M\&A valuation. Some of this approach is already widely recommended by M\&A advisors and major consulting firms. The article recommends going even further by creating a national M\&A IT integration database that provides anonymous inventory of IT integration risk factors and costs before and after an M\&A to better understand how IT integration risk impacts the valuation and success or failure of M\&As.}, keywords = {BIS}, url = {http://www.isaca.org/Journal/archives/2016/Volume-1/Pages/default.aspx}, author = {Khazanchi,Deepak and Arora,Vipin} } @conference {1975736, title = {Helping Senior Participants Acquire the Right Type of Social Support in Online Communities}, booktitle = {The 10th China Summer Workshop on Information Management (CSWIM 2016)}, year = {2016}, month = {2016}, abstract = {Senior citizens could greatly be benefited from the social support received from a community(Choi et al. 2014; Goswami et al. 2010). Social support denotes to the interaction/communication with others, verbal or nonverbal, reducing the uncertainty or enhancing the self-perception of in control of one{\textquoteright}s own life (Albrecht and Adelman 1987). All participants of online communities are motivated by their desire of seeking social support. And such support occurs when community members form relational links among them and have interactions that intend to help (Heaney and Israel 2002). A network member can receive/send different types of social supports from/to others. Informational support transmits information and provides guidance related to the task/question a community member has (Krause 1986); emotional support expresses understanding, encouragement, empathy affection, affirming, validation, sympathy, caring and concern (House 1981; Wang et al. 2014); companionship or network support gives the recipient a sense of belonging (Keating 2013; Wang et al. 2014); and appraisal support enhances the self-evaluation of the recipient (House 1981). Studies have shown that people are usually motivated by their desire of seeking one or more types of social supports to participate in an online community (Goswami et al. 2010; Kanayama 2003; Pfeil 2007; Pfeil and Zaphiris 2009; Wright 2000; Xie 2008). And such social support can only be acquired during the interaction with others. For senior citizens, even though they can be greatly benefited from the social support received through participation, the obstacles they need to overcome in order to feel engaged could be larger than that of younger people (Charness and Boot 2009; Lee et al. 2011), especially when they come to the community for the first time. They could be easily overwhelmed by the content that has been generated by other existing members, finding it difficult to identify an appropriate member to initiate a meaningful interaction. It therefore is critical for an online community system to help senior participants identify other existing members who are more likely to supply the type of support they are seeking. While many previous studies have uncovered the variety factors, contextual (Pfeil and Zaphiris 2009; Wang et al. 2015; Xie 2008) or individual (Wang et al. 2014, 2015, 2012; Wright 1999), that impact the degree to which a senior citizen receives social support needed from an online community, it remains unclear what the characteristics of existing community members who are more likely to provide a new comer the kind of support, informational, emotional, companionship, or appraisal are. And the answer to this question may have significant academic and practical implications. This study thus proposes to fulfil the gap by utilizing data collected from a senior community website to investigate the links between the characteristics of existing senior members and the amount and the type of support they provided to new comers. }, keywords = {BIS, Business Analytics}, author = {Wang,Changyu and Zhu,Bin and Zuo,Meiyun} } @conference {1973171, title = {Hope for change in individual security behavior assessments}, booktitle = {2016 Pre-ICIS Workshop on Accounting Information Systems}, year = {2016}, month = {2016}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron and Crossler,Rob} } @article {1984791, title = {The Impact of Virtual Customer Community Interactivity on Organizational Innovation: An Absorptive Capacity Perspective}, year = {2016}, month = {2016}, keywords = {BIS}, author = {Roberts,Nicholas and Dinger,M.} } @article {1971891, title = {Map? or List?based Recommender Agents? Does the Map Metaphor Fulfill its Promise?}, journal = {Information Visualization}, volume = {16}, year = {2016}, month = {2016}, pages = {291-308}, abstract = {We present a spatialization of digital library content based on item similarity and an experiment which compares the performance of this spatialization relative to a simple list-based display. Items in the library are K-12 science and engineering learning resources. Spatialization and visualization are accomplished through 2D interactive Sammon mapping of pairwise item similarity scores based on the joint occurrence of word bigrams. The 65 science teachers participating in the experiment were asked to search the library for curricular items they would consider using in conducting one or more teaching assignments. Results indicate that whereas the spatializations adequately capture the salient features of the library{\textquoteright}s content and teachers actively use them, item retrieval rates, task-completion time and perceived utility do not significantly differ from the semantically poorer but easier to comprehend and navigate list-based representations. These results put into question the usefulness of the rapidly increasing supply of information spatializations.}, keywords = {BIS, Supply Chain}, url = {http://journals.sagepub.com/doi/abs/10.1177/1473871616669193}, author = {Reitsma,Reindert and Hsieh,Ping-Hung and Diekema,Anne and Robson,Robby and Zarsky,Malinda} } @article {1970876, title = {Overview of business innovations and research opportunities in blockchain and introduction to the special issue}, journal = {Financial Innovation}, volume = {2}, year = {2016}, month = {2016}, keywords = {BIS, Business Analytics}, author = {Zhao,J. Leon and Fan,Shaokun and Yan,Jiaqi} } @article {1970881, title = {A Process Ontology Based Approach to Easing Semantic Ambiguity in Business Process Modeling}, journal = {Data and Knowledge Engineering}, volume = {102}, year = {2016}, month = {2016}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Hua,Z. and Storey,V. and Zhao,J. L.} } @article {1981326, title = {(See proceeding paper above) Hope for change in individual security behavior assessments}, year = {2016}, month = {2016}, address = {Dublin, Ireland}, keywords = {Accounting, BIS}, author = {Marshall,Byron} } @conference {1973181, title = {Unraveling K-12 Standard Alignment; Report on a New Attempt}, booktitle = {Joint Conference on Digital Libraries}, year = {2016}, month = {2016}, abstract = {We present the results of an experiment which indicates that automated alignment of electronic learning objects to educational standards may be more feasible than previously implied. We highlight some important deficiencies in existing alignment systems and formulate suggestions for improved future ones. We consider how the changing substance of newer educational standards, a multi-faceted view of standard alignment, and a more nuanced view of the {\textquoteleft}alignment{\textquoteright} concept may bring the long-sought goal of automated standard alignment closer. We explore how lexical similarity of documents, a World+Method representation of semantics, and network-based analysis can yield promising results. We furthermore investigate the nature of false positives to better understand how validity of match is evaluated so as to better focus future alignment system development.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert and Samson,Carleigh} } @article {1984796, title = {Using Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective}, year = {2016}, month = {2016}, keywords = {BIS}, author = {Roberts,Nicholas and Campbell,D. and Vijayasarathy,L.} } @article {1984801, title = {Absorptive Capacity, Organizational Antecedents, and Environmental Dynamism}, year = {2015}, month = {2015}, keywords = {BIS}, author = {Roberts,Nicholas} } @conference {1973176, title = {Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices}, booktitle = {2015 Pre-ICIS Workshop on Accounting Information Systems}, year = {2015}, month = {2015}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron} } @article {1970896, title = {Demystifying big data analytics through the lens of marketing mix}, journal = {Big Data Research}, volume = {2}, year = {2015}, month = {2015}, pages = {28-32}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Lau,R. and Zhao,J. L.} } @article {1978211, title = {The Design of IdeaWorks: Applying Social Learning Networks to Support Tertiary Education}, year = {2015}, month = {2015}, keywords = {BIS, Business Analytics}, author = {Kang,Lele and Fan,Shaokun and Zhao,J. Leon} } @conference {1971896, title = {Estimation and Visualization of Digital Library Content Similarities}, booktitle = {Intern. Conf. on Inf. Systems (ICIS) 2015}, year = {2015}, month = {2015}, abstract = {We report on a process for similarity estimation and two-dimensional mapping of lesson materials stored in a Web-based K12 Science, Technology, Engineering and Mathematics (STEM) digital library. The process starts with automated removal of all information which should not be included in the similarity estimations followed by automated indexing. Similarity estimation itself is conducted through a natural language processing algorithm which heavily relies on bigrams. The resulting similarities are then used to compute a Sammon-map; i.e., a projection in n dimensions, the item-to-item distances of which best reflect the input similarities. In this paper we concentrate on specification and validation of this process. The similarity results show almost 100\% precision-by-rank in the top three to five ranks. Sammon mapping in two dimensions corresponds well with the digital library{\textquoteleft}s table of content.}, keywords = {BIS, Supply Chain}, author = {Reitsma,Reindert and Hsieh,Ping-Hung and Robson,Robby} } @article {1970886, title = {Harnessing Internet finance with innovative cyber credit management}, journal = {Financial Innovation}, volume = {1}, year = {2015}, month = {2015}, keywords = {BIS, Business Analytics}, author = {Lin,Z. and Whinston,A. B. and Fan,Shaokun} } @article {1970531, title = {Improving IT Assessment with IT Artifact Affordance Perception Priming}, journal = {International Journal of Accounting Information Systems}, volume = {19}, year = {2015}, month = {2015}, pages = {17-28}, abstract = {Accurately assessing organizational information technology (IT) is important for accounting professionals, but also difficult. Both auditors and the professionals from whom they gather data are expected to make nuanced judgments regarding the adequacy and effectiveness of controls that protect key systems. IT artifacts (policies, procedures, and systems) are assessed in an audit because they {\textquotedblleft}afford{\textquotedblright} relevant action possibilities but perception preferences shade the results of even systematic and well-tested assessment tools. This study of 246 business students makes two important contributions. First we demonstrate that a tendency to focus on either artifact or organizational imperative systematically reduces the power of well-regarded IT measurements. Second, we demonstrate that priming is an effective intervention strategy to increase the predictive power of constructs from the familiar technology acceptance model (TAM).}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/IJAIS\%20-\%20IT\%20Artifact\%20Affordance\%20Perception\%20Priming.pdf}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @article {1980746, title = {Mining Hidden Organizational Structures from Meeting Records}, year = {2015}, month = {2015}, address = {Philadelphia}, keywords = {BIS, Business Analytics, Supply Chain}, author = {Li,Jiexun and Wu,Zhaohui and Zhu,Bin} } @conference {1975741, title = {PREDICTING HABITUAL CONTINUING SOCIAL NETWORKING SITES USE OF THE ELDERLY}, booktitle = {Workshop on Doing IS Research in China, The 19th Pacific Asia Conference on Information Systems (PACIS 2015)}, year = {2015}, month = {2015}, address = {Singapore}, keywords = {BIS, Business Analytics}, url = {http://pacis2015.comp.nus.edu.sg/pages/workshops_cnais.html}, author = {Chai,Wen and Zuo,Meiyun and Zhu,Bin and Tian,Xuesong} } @conference {1974501, title = {The Relevance of K-12 Engineering Curricula to NGSS: an Analysis of TeachEngineering-NGSS Alignments}, booktitle = {ASEE 2015 Annual Conference}, year = {2015}, month = {2015}, abstract = {The 2013 publication of the Next Generation Science Standards (NGSS) provided the first widely adopted set of science standards to include engineering design throughout all K-12 grades. In doing so, NGSS raised the relevance of the K-12 engineering education sector on a national scale. The TeachEngineering digital library, representative of the K-12 engineering education sector through its collaboration of 36, mostly NSF-funded, K-12 engineering education programs across the US, recently aligned its 1,300+ K-12 engineering lessons and hands-on activities to the NGSS. This paper provides analysis of both the alignment process and its results. As such, we offer insight into the correspondence between the NGSS and a broad, collection of K-12 engineering learning objects and hence, into the mutual relevance of K-12 engineering curriculum and the NGSS. We also provide some recommendations for future K-12 engineering curriculum development.}, keywords = {BIS}, author = {Reitsma,Reindert and Samson,Carleigh and Soltys,Mike and Sullivan,Jacquelyn} } @article {1978206, title = {Sentiment Analysis in Social Media Platforms: The Contribution of Social Relationships}, year = {2015}, month = {2015}, address = {Dallas}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Ilk,Noyan and Zhang,Kunpeng} } @article {1985326, title = {Using Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective}, year = {2015}, month = {2015}, keywords = {BIS}, author = {Roberts,Nicholas and Campbell,D. and Vijayasarathy,L.} } @conference {1973186, title = {Weather Factors and Online Product/Service Reviews}, booktitle = {{\textquoteright}Doing IS Research in China{\textquoteright} Workshop of the Pacific Asia Conference on Information Systems (PACIS 2015)}, year = {2015}, month = {2015}, keywords = {Accounting, BIS, Business Analytics}, author = {Feng,Jiao and Yao,Zhong and Zhu,Bin and Marshall,Byron} } @article {1970891, title = {Workflow-Aware Attention Tracking to Enhance Collaboration Management}, journal = {Information Systems Frontiers}, volume = {17}, year = {2015}, month = {2015}, pages = {1253{\textendash}1264}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Kang,L and Zhao,J. L.} } @article {1982871, title = {Workshop: TeachEngineering Digital Library: Hundreds of Free, Searchable, NGSS-aligned Hands-on Engineering Lessons for K-12}, year = {2015}, month = {2015}, address = {Seattle, WA}, keywords = {BIS}, author = {Reitsma,Reindert and Zarske,Malinda and Yowell,Janet and Samson,Carleigh} } @article {1970901, title = {Business Challenges and Research Directions of Management Analytics in the Big Data Era}, journal = {Journal of Management Analytics}, volume = {1}, year = {2014}, month = {2014}, pages = {169-174}, keywords = {BIS, Business Analytics}, author = {Zhao,J. L. and Fan,Shaokun and Hu,D.} } @article {1980751, title = {Collective opinion classification: A global consistency maximization approach}, year = {2014}, month = {2014}, address = {Aukland, New Zealand}, keywords = {BIS, Business Analytics}, author = {Li,Jiexun and Li,Xin and Zhu,Bin} } @article {1978226, title = {Credit Risk Assessment of POS-Loans in the Big Data Era}, year = {2014}, month = {2014}, address = {Hongkong, China}, keywords = {BIS, Business Analytics}, author = {Bian,Yiyang and Fan,Shaokun and Ye,Ryan Liying and Zhao,J. Leon} } @conference {1975746, title = {Ensuring Positive Impact of Data Quality Metadata: Implications for Decision Support}, booktitle = {Twentieth Americas Conference on Information Systems (AMCIS{\textquoteright} 2014)}, year = {2014}, month = {2014}, address = {Savannah}, keywords = {BIS, Business Analytics}, author = {Shankar,G. and Zhu,Bin} } @article {1972831, title = {Evaluation of a hospital admission prediction model adding coded chief complaint data using neural network methodology}, journal = {European Journal of Emergency Medicine}, year = {2014}, month = {2014}, keywords = {BIS}, author = {Handly,Neal and Thompson,David A and Li,Jiexun and Chuirazzi,David M and Venkat,Arvind} } @article {1984806, title = {Firm Valuation Effects of the Decision to Adopt Relationally Governed Business Process Outsourcing Arrangements}, year = {2014}, month = {2014}, keywords = {BIS}, author = {Duan,C. and Grover,V. and Roberts,Nicholas and Balakrishnan,J.} } @article {1978221, title = {Formation and effect of Social Interactions in Online Brand Community: an Empirical Investigation.}, year = {2014}, month = {2014}, address = {Chengdu, China}, keywords = {BIS, Business Analytics}, author = {Wu,Ji and Fan,Shaokun and Wu,Manli and Zhao,J. Leon} } @article {1975751, title = {The Hl-index: Improvement of H-index Based on Quality of Citing Papers}, journal = {Akad{\'e}miai Kiad{\'o} and Springer Science+Business Media}, volume = {98}, year = {2014}, month = {2014}, pages = {1021-1031}, abstract = {This paper proposes hl-index as an improvement of the h-index, a popular measurement for the research quality of academic researchers. Although the h-index integrates the number of publications and the academic impact of each publication to evaluate the productivity of a researcher, it assumes that all papers that cite an academic article contribute equally to the academic impact of this article. This assumption, of course, could not be true in most times. The citation from a well-cited paper certainly brings more attention to the article than the citation from a paper that people do not pay attention to. It therefore becomes important to integrate the impact of papers that cite a researcher{\textquoteright}s work into the evaluation of the productivity of the researcher. Constructing a citation network among academic papers, this paper therefore proposes hl-index that integrating the h-index with the concept of lobby index, a measures that has been used to evaluate the impact of a node in a complex network based on the impact of other nodes that the focal node has direct link with. This paper also explores the characteristics of the proposed hl-index by comparing it with citations, h-index and its variant g-index.}, keywords = {BIS, Business Analytics}, author = {Zai,Li and Yan,Xiangbin and Zhu,Bin} } @article {1970541, title = {IT Artifact Bias: How exogenous predilections influence organizational information system paradigms}, journal = {International Journal of Information Management}, volume = {34}, year = {2014}, month = {2014}, pages = {427-436}, abstract = {Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and strategic business interests. Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and the strategic business interests. People perceive affordances (possibilities for action) in information technology artifacts differently as cognitive structures (schema) which bias individual focus. This study explores how an individual{\textquoteright}s tendency to perceive the {\textquoteleft}trees{\textquoteright} in an IT {\textquoteleft}forest{\textquoteright} (artifact preference), affects their assessment of efforts to achieve more effective IT outcomes. The effect is demonstrated using a relatively simple IT success model. Further, in a sample of 120 survey responses supported by ten semi-structured interviews we demonstrate that job role and organizational IT complexity systematically impact artifact perception. A better understanding of IT artifact bias promises to help organizations better assess information systems.}, keywords = {Accounting, BIS}, url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.02.005}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @article {1980756, title = {Mining knowledge sharing processes in online discussion forums}, year = {2014}, month = {2014}, address = {Big Island, HI. U.S.A}, keywords = {BIS}, author = {Wang,G. Alan and Wang,Harry Jiannan and Li,Jiexun and Fan,Weiguo} } @conference {1970536, title = {The Moderating Power of IT Bias on User Acceptance of Technology}, booktitle = {Sixth Annual Pre-ICIS Workshop on Accounting Information Systems}, year = {2014}, month = {2014}, address = {Auckland}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Kawalek,Peter} } @article {1978216, title = {Scalable Audience Targeted Models for Brand Advertising on Social Networks}, year = {2014}, month = {2014}, address = {Foster City, CA, USA}, keywords = {BIS, Business Analytics}, author = {Zhang,Kunpeng and Ouksel,Aris M. and Fan,Shaokun and Liu,Hengchang} } @article {1975761, title = {An ACP Approach to Public Health Emergency Management: Using a Campus Outbreak of H1N1 Influenza as a Case Study}, journal = {IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems \& Humans}, volume = {43}, year = {2013}, month = {2013}, pages = {1028-1041}, abstract = {In order to tackle the infeasibility of building mathematical models and conducting physical experiments for public health emergencies in a real world, we apply the ACP (Artificial societies, Computational experiments, and Parallel execution) approach to public health emergency management. We conducted a case study on the largest collective outbreak of H1N1 influenza at a Chinese university in 2009. We built an artificial society to reproduce H1N1 influenza outbreaks. In computational experiments, aiming to obtain comparable results with the real data, we applied the same intervention strategy as that was used during the real outbreak. Then we compared experiment results with real data to verify our models, including spatial models, population distribution, weighted social networks, contact patterns, students{\textquoteright} behaviors, and models of H1N1 influenza disease, in the artificial society. We then applied alternative intervention strategies to the artificial society. The simulation results suggested that alternative strategies controlled the outbreak of H1N1 influenza more effectively. Our models and their application to intervention strategy improvement show that the ACP approach is useful for public health emergency management}, keywords = {BIS, Business Analytics}, author = {Duan,Wei and Cao,Zhidong and Wang,Youzhong and Zhu,Bin and Zeng,Daniel and Wang,Fei-Yue and Qiu,Xiaogang and Song,Hongbin and Wang,Yong} } @conference {1975756, title = {A cognitive-neural approach to explaining market oscillations in a fully recurrent adaptive agent population}, year = {2013}, month = {2013}, abstract = {Recreating market oscillations to study the markets often makes use of induced activity reversal via finite share or auction thresholds, strategically replacing agents via bankruptcy or genetic algorithm rules, heavily data specific network parameterization, or stochastic randomness. However, such techniques do not shed any additional light on how and why intelligent individual scale agents may spontaneously and rationally decide to endogenously change from a buying to a selling posture within a population. This paper introduces Social Netmap, an agent based population of general purpose, parameter-free, adaptive agents adjusting their behavior in real time to the directly observed aggregate and individual behaviors of their neighbors much like real intelligent actors might in a population. Without relying on random processes, validated parameters, turning-point thresholds, or agent replacement, Social Netmap was able to endogenously create typical market oscillations in 21 out of 30 cases of real Dow Jones Industrial Average data. Social Netmap points towards future work in more realistic group behavior of intelligent, rational agents.}, keywords = {BIS, Business Analytics}, url = {http://www.dmi.unict.it/ecal2013/}, author = {Wong,Charles and Versace,Massimiliano and Zhu,Bin} } @article {1983941, title = {Data/Knowledge Management for LIDAR Data Users/Researchers}, year = {2013}, month = {2013}, address = {91}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Olson,Michael} } @article {1980771, title = {Discovering Consumer Health Expressions from Consumer-Contributed Content}, year = {2013}, month = {2013}, address = {Washington DC, USA}, keywords = {BIS}, author = {Jiang,Ling and Yang,Christopher C and Li,Jiexun} } @article {1984811, title = {Electronic Medical Record Compliance and Continuity in Delivery of Care: An Empirical Investigation in a Combat Environment}, year = {2013}, month = {2013}, keywords = {BIS}, author = {Mellott,M. and Thatcher,J. and Roberts,Nicholas} } @article {1978231, title = {Ever-Changing Workarounds: A Model for Workaround Management Lifecycle in Healthcare Workflow}, year = {2013}, month = {2013}, address = {Milan, Italy}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Tong,Yu and Zhao,J. Leon} } @article {1980761, title = {Finding patterns for effective knowledge sharing in online communities}, year = {2013}, month = {2013}, address = {Milan, Italy}, keywords = {BIS}, author = {Li,Jiexun and Wang,G. Alan and Wang,Harry Jiannan and Fan,Weiguo} } @booklet {1985036, title = {Gender Classification for Product Reviewers in China: A Data-Driven Approach}, year = {2013}, month = {2013}, abstract = {While it is crucial for organizations to automatically identify the gender of participants in product discussion forums, they may have difficulties adopting existing gender classification methods because the associations between the linguistic features used in those studies and gender type usually varies with context. The prototype system we propose to demo validates a framework for the development of gender classification that uses a more {\textquotedblleft}data-driven{\textquotedblright} approach. It constantly extracts content-specific features from the discussion content. And the system could automatically adjust itself to accommodate the contextual changes in order to achieve better classification accuracy.}, keywords = {BIS, Business Analytics}, url = {http://www.som.buffalo.edu/isinterface/wits2013/}, author = {Zhu,Bin and Yan,Xiangbin and Wang,Jing} } @article {1980766, title = {Identifying hidden community elites in online social networks}, year = {2013}, month = {2013}, address = {Tianjin, China}, keywords = {BIS}, author = {Hu,Daning and Li,Jiexun and Yang,Xuan and Yan,Jiaqi} } @article {1983946, title = {Mapping User requirements to Design Alternatives: The Whole Nine yards}, year = {2013}, month = {2013}, address = {91}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Hoyle,Christopher} } @article {1972311, title = {What Do They Know About Me In The Cloud? A Comparative Law Perspective On Protecting the Privacy and Security of Sensitive Consumer Data}, journal = {American Business Law Journal}, volume = {50}, year = {2013}, month = {2013}, pages = {413-482}, address = {Wiley Periodicals, Inc., Malden, MA}, abstract = {How much does the cloud know about us? Should we care? In cloud computing, sensitive personal data flows in a global network of internet connected computers, creating attractive targets for hackers, challenging law enforcement and raising concerns about government surveillance. From an information privacy perspective, this article discusses how well the management information systems practices and laws in the United States and Europe protect the privacy and security of sensitive consumer data in the cloud. It examines policies and proposed regulations and makes suggestions for legal reforms in both jurisdictions to protect the privacy and security of sensitive information.}, keywords = {BIS, Business Law}, author = {King,Nancy and Raja,V.T.} } @article {1984816, title = {Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Roberts,Nicholas and Galluch,P. and Dinger,M. and Grover,V.} } @article {1982876, title = {Business Process Management}, year = {2012}, month = {2012}, address = {Portland, OR}, keywords = {BIS}, author = {Reitsma,Reindert and Van Patten,Mark and Baker,Mark and Coogan,Chris} } @article {1973191, title = {Can Intermediary-based Science Standards Crosswalking Work? Some Evidence from Mining the Standard Alignment Tool (SAT)}, journal = {Journal of the Association for Information Science and Technology}, volume = {63}, year = {2012}, month = {2012}, pages = {1843-1858}, abstract = {We explore the feasibility of intermediary-based crosswalking and alignment of K-12 science education standards. With increasing availability of K-12 science, technology, engineering and mathematics (STEM) digital library content, alignment of that content with educational standards is a significant and continuous challenge. Whereas direct, one-to-one alignment of standards is preferable but currently unsustainable in its resource demands, less resource-intensive intermediary-based alignment offers an interesting alternative. But will it work? We present the results from an experiment in which the machine-based Standard Alignment Tool (SAT) {\textemdash}incorporated in the National Science Digital Library (NSDL){\textemdash} was used to collect over half a million direct alignments between standards from different standard-authoring bodies. These were then used to compute intermediary-based alignments derived from the well-known AAAS Project 2061 Benchmarks and NSES standards. Results show strong variation among authoring bodies in their success to crosswalk with best results for those who modeled their standards on the intermediaries. Results furthermore show a strong inverse relationship between recall and precision when both intermediates where involved in the crosswalking.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/ReitsmaMarshallChart_StandardsCrosswalking_JASIST2012.pdf}, author = {Reitsma,Reindert and Marshall,Byron and Chart,Trevor} } @article {1978241, title = {Collaboration Process Patterns and Efficiency of Issue Resolution in Software Development}, year = {2012}, month = {2012}, address = {Denver, CO, USA}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Li,Xin and Zhao,J. Leon} } @article {1980786, title = {A Comparative Study of Smoking Cessation Intervention Programs on Social Media}, year = {2012}, month = {2012}, address = {College Park, MD, USA}, keywords = {BIS}, author = {Zhang,Mi and Yang,Christopher C and Li,Jiexun} } @article {1984826, title = {Conceptualizing Models Using Multidimensional Constructs: A Review and Guidelines for their Use}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Polites,G. and Roberts,Nicholas and Thatcher,J.} } @conference {1984831, title = {Control Mechanisms and Electronic Medical Record Compliance in a Combat Environment: An Empirical Investigation}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Mellott,M. and Thatcher,J. and Roberts,Nicholas} } @conference {1985041, title = {Data Quality Metadata and Decision Making}, booktitle = {45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings,}, year = {2012}, month = {2012}, pages = {1434-1443}, address = {Grand Wailea, Maui, HI, USA}, keywords = {BIS, Business Analytics}, author = {Shankaranarayanan,G. and Zhu,Bin} } @article {1972836, title = {Discovering target groups in social networking sites: An effective method for maximizing joint influential power}, journal = {Electronic Commerce Research and Applications}, volume = {11}, year = {2012}, month = {2012}, pages = {318-334}, keywords = {BIS}, author = {Xu,Kaiquan and Guo,Xitong and Li,Jiexun and Lau,Raymond Y.K. and Liao,Stephan Shaoyi} } @article {1977451, title = {Disentangling IT Artifact Bias}, year = {2012}, month = {2012}, address = {Orlando, Florida}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron} } @article {1980781, title = {An effective method for discovering target groups on social networking sites}, year = {2012}, month = {2012}, address = {Shanghai, China}, keywords = {BIS}, author = {Xu,Kaiquan and Li,Jiexun and Liao,Shaoyi and Lau,Raymond Y.K.} } @article {1984821, title = {An Examination of the Role of Military Medical Chief Information Officer}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Mellott,M. and Thatcher,J. and Roberts,Nicholas and Carter,M.} } @article {1980791, title = {Exploiting Semantic Structure for Mapping User-specified Form Terms to SNOMED CT Concepts}, year = {2012}, month = {2012}, address = {Miami, FL, USA}, keywords = {BIS}, author = {Khare,Ritu and An,Yuan and Li,Jiexun and Song,Il-Yeol and Hu,Xiaohua} } @article {1983961, title = {Finding People Who Forward Your Messages}, year = {2012}, month = {2012}, address = {91}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chau,Michael} } @article {1983956, title = {Finding People Who Forward Your Messages}, year = {2012}, month = {2012}, address = {Snowbird, Utah}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chau,Michael} } @article {1983951, title = {Finding People Who Retweet}, year = {2012}, month = {2012}, address = {Beijing, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1970906, title = {A Framework for the Transformation from Conceptual to Logical Workflow Models}, journal = {Decision Support Systems}, volume = {55}, year = {2012}, month = {2012}, pages = {781-794}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Zhao,J. L. and Liu,M. and Dou,W.} } @article {1972841, title = {Identifying valuable customers on social network sites for profit maximization}, journal = {Expert Systems with Applications}, volume = {39}, year = {2012}, month = {2012}, pages = {13009-13018}, keywords = {BIS}, author = {Xu,Kaiquan and Li,Jiexun and Song,Yuxia} } @article {1984836, title = {Investigating Firm{\textquoteright}s Customer Agility and Firm Performance: The Importance of Aligning Sense and Respond Capabilities}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Roberts,Nicholas and Grover,V.} } @article {1977456, title = {IT Effectiveness Norms and Organizational Success: a Literature Review}, year = {2012}, month = {2012}, address = {Manchester, UK}, keywords = {BIS}, author = {Curry,Michael} } @conference {1984581, title = {Is It You or the Message: Why Do People Pass Along Micro-Blogging Messages?}, booktitle = {The Eleventh Workshop on e-Business (WeB{\textquoteright}12)}, year = {2012}, month = {2012}, address = {Orlando, Florida}, keywords = {Accounting, BIS, Business Analytics}, author = {Zhu,Bin and Marshall,Byron} } @article {1984841, title = {Leveraging IT Infrastructure to Facilitate Competitive Activity via Customer Agility: An Empirical Investigation}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Roberts,Nicholas and Grover,V.} } @article {1984846, title = {Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Wright,R. and Campbell,D. and Thatcher,J. and Roberts,Nicholas} } @article {1975766, title = {Patterns of News Dissemination through Online News Network in China}, journal = {Information Systems Frontiers}, volume = {16}, year = {2012}, month = {2012}, pages = {557-570}, keywords = {BIS, Business Analytics}, author = {Wang,Youzhong and Zeng,Daniel and Zhu,Bin} } @article {1972316, title = {Protecting the Privacy and Security of Sensitive Customer Data in the Cloud}, journal = {Computer Law and Security Review}, volume = {28}, year = {2012}, month = {2012}, pages = {308-319}, address = {Oxford}, abstract = {The global ubiquity of cloud computing may expose consumers{\textquoteright} sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers{\textquoteright} trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive infomraiton in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry.}, keywords = {BIS, Business Law}, url = {www.Sciencedirect.com}, author = {King,Nancy and Raja,V.T.} } @article {1972846, title = {Semantic-enhanced models to support timely admission prediction at emergency departments}, journal = {Network Modeling Analysis in Health Informatics and Bioinformatics}, volume = {1}, year = {2012}, month = {2012}, pages = {161-172}, keywords = {BIS}, author = {Li,Jiexun and Guo,L. and Handly,N. and Thompson,D. A.} } @conference {1984851, title = {The Semantics of Social Media: The Spread of Occupy Protests}, year = {2012}, month = {2012}, keywords = {BIS}, author = {Washington,A. and Roberts,Nicholas and Thatcher,J.} } @conference {1984701, title = {The TeachEngineering Digital Library: Improving Access to the P-12 Engineering Conversation}, booktitle = {Proceedings 2nd P-12 Engineering and Design Education Research Summit}, year = {2012}, month = {2012}, abstract = {The TeachEngineering digital library is a collection of searchable, standards-based, classroom-tested P-12 engineering curricula for use in science and math classrooms (Sullivan et al., 2005). Its inquiry-based lessons and hands-on activities use real-life engineering as a vehicle for the integration of science and math in P-12 classrooms. Mapped to educational content standards, the activities are age-appropriate, inexpensive to conduct, and relevant to students{\textquoteright} daily lives, helping science and math come alive. The collection is a powerful resource for those in P-12 or higher education, industry and professional communities wanting to improve STEM literacy, to engage young students in the joys and creativity of engineering and the design process, and to increase the number of students pursuing STEM careers.
This paper investigates TeachEngineering usage trends and curricular submission statistics. Specifically, we analyze the submission process for curriculum contributed from external authors, suggest practices for submitting new curriculum, and discuss possible support avenues for future submissions.}, keywords = {BIS}, author = {Reitsma,Reindert and Zarske,M. and Sullivan,J. and Klenk,P. and Forbes,M. and Carlson,D.} } @article {1980776, title = {Towards an Intelligent Approach to Extracting Data for Process Mining}, year = {2012}, month = {2012}, address = {Orlando, FL, USA}, keywords = {BIS}, author = {Wang,Harry Jiannan and Li,Jiexun and Bai,Xue} } @article {1978236, title = {Towards Collaboration Virtualization Theory}, year = {2012}, month = {2012}, address = {Ho Chi Minh City, Vietnam}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Sia,Choon-Ling and Zhao,J. Leon} } @article {1974506, title = {Comparison of Human and Machine-based Educational Standard Assignment Networks}, journal = {International Journal on Digital Libraries}, volume = {11}, year = {2011}, month = {2011}, pages = {209-223}, abstract = {Increasing availability of digital libraries of K-12 curriculum resources, coupled with an increased emphasis on standard-based teaching necessitates assignment of the standards to the available curriculum. Since such assignment is a laborious and ongoing task, machine-based standard assignment tools have been under development for some time. Unfortunately, data on the performance of these machine-based classifiers are mostly lacking. In this paper we explore network modeling and layout to gain insight into the differences between human assignments and those by one of the better known machine-based classifiers. To build the standard assignment networks we define standards to be linked if they are jointly assigned to the same curricular item. Comparative analysis of the mapped networks shows that that unlike the machine-based assignment maps, the human-based maps elegantly reflect the rationales and principles of the assignment; i.e., clusters of standards separate along lines of lesson content and pedagogical principles. In addition, comparison of the maps clearly indicates that the machine classifier has trouble assigning so-called {\textquoteright}method{\textquoteright} standards.}, keywords = {BIS}, author = {Reitsma,Reindert and Diekema,Anne R} } @conference {1984861, title = {Control Mechanisms and Deployed Electronic Medical Record Policy Compliance: A Principal-Agent Perspective}, year = {2011}, month = {2011}, keywords = {BIS}, author = {Mellott, and Roberts,Nicholas and Thatcher,J.} } @article {1980796, title = {Criminal identity resolution using social behavior and relationship attributes}, year = {2011}, month = {2011}, address = {Beijing, China}, keywords = {BIS}, author = {Li,Jiexun and Wang,G. Alan} } @article {1980801, title = {Derivation of hospital admission prediction models based on coded chief complaint, demographic, patient acuity and emergency department (ED) operational data available at ED triage}, year = {2011}, month = {2011}, address = {Boston, MA, USA}, keywords = {BIS}, author = {Handly,Neal and Li,Jiexun and Thompson,David A and Venkat,A and Chuirazzi,D M} } @article {1984856, title = {An Examination of the Deployed Inpatient Electronic Medical Record}, year = {2011}, month = {2011}, keywords = {BIS}, author = {Mellott,M. and Thatcher,J. and Roberts,Nicholas} } @article {1972851, title = {Identity matching using personal and social identity features}, journal = {Information Systems Frontiers}, volume = {13}, year = {2011}, month = {2011}, pages = {101-113}, keywords = {BIS}, author = {Li,Jiexun and Wang,Alan Gang and Chen,Hsinchun} } @article {1972856, title = {Mining comparative opinions from customer reviews for competitive intelligence}, journal = {Decision Support Systems}, volume = {50}, year = {2011}, month = {2011}, pages = {743-754}, keywords = {BIS}, author = {Xu,Kaiquan and Liao,Stephan S and Li,Jiexun} } @article {1970546, title = {Organizational Information Technology Norms and IT Quality}, journal = {Communications of the IIMA}, volume = {11}, year = {2011}, month = {2011}, abstract = {The effectiveness of IT governance initiatives in improving IT{\textquoteright}s contribution to organizational success has been demonstrated but the mechanisms by which improved outcomes are realized have largely remained unexplored. Although IT governance tools such as COBIT and ITIL specify procedures and policies for the management of IT resources, the experts who developed those tools also embedded a set of core principles or {\textquoteleft}norms{\textquoteright} in the underlying frameworks. This article explores these norms and their role in the realization of organizational IT quality. Through analysis of normative messages implicitly expressed in the documentation elements provided by COBIT, we extract two norms (commitment to improvement and a risk/control perspective) thought to indicate that an organization has adopted the spirit of IT governance. Next, we model the relationship between adoption of these norms and IT quality and evaluate the model with data from a survey of 86 individuals who use, manage, and/or deliver organizational IT services. Principal component analysis is used to validate the survey items. Results show statistically significant relationships between norm adoption, participation in norm-driven activities, and organizational IT quality.}, keywords = {Accounting, BIS}, url = {http://www.iima.org/index.php?option=com_phocadownload\&view=category\&id=60:2011-volume-11-issue-4\&Itemid=68}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @conference {1985046, title = {Patterns of News Dissemination through Online News Network in China}, booktitle = {Proceedings of the 21st Workshop on Information Technologies and Systems (WITS 2011), Shanghai, China, December 3rd, 2011}, year = {2011}, month = {2011}, keywords = {BIS, Business Analytics}, author = {Wang,Youzhong and Zeng,Daniel and Zhu,Bin} } @article {1984866, title = {The Role of Trust in Post-Adoption IT Exploration: An Empirical Examination of Knowledge Management Systems}, year = {2011}, month = {2011}, keywords = {BIS}, author = {Thatcher,J. and McKnight,H. and Arsal,R. and Baker,E. and Roberts,Nicholas} } @article {1981586, title = {Segmenting a Fragmented Market {\textendash} Challenges and How to Get It Right}, year = {2011}, month = {2011}, keywords = {BIS, Marketing, OSU-Cascades, OSU-Cascades Hospitality Mgt}, author = {Montgomery,Todd} } @article {1980806, title = {Sentiment Community Detection in Social Networks}, year = {2011}, month = {2011}, address = {Seattle, WA, USA}, keywords = {BIS}, author = {Xu,Kaiquan and Li,Jiexun and Liao,Stephen Shaoyi} } @conference {1984586, title = {World vs. Method: Educational Standard Formulation Impacts Document Retrieval}, booktitle = {Proceedings of the Joint Conference on Digital Libraries (JCDL{\textquoteright}11),Ottawa, Canada.}, year = {2011}, month = {2011}, abstract = {Although initiatives are underway in the educational community to consolidate disparate collections of educational standards, little has been done to explore the impact of educational standard formulation on information retrieval. Recent research contrasts two categories of educational standards: {\textquoteleft}World{\textquoteright} (topical domain-related concepts) and {\textquoteleft}Method{\textquoteright} (investigative and epistemological principles). This paper explores the information retrieval implications of the World vs. Method distinction. We find that experts are more likely to agree about which educational resources align with a Method standard but that a typical automatic standard assignment tool is more likely to assign a World standard to an educational resource. Further, a text-based information retrieval system is more likely to be accurate in retrieving documents relevant to a World standard as compared to a Method standard. These findings have implications both for educational standard formulation (combining World and Method components in a standard may improve retrieval) and for digital library builders who want to help teachers identify useful, standards-aligned learning objects.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert} } @article {1984876, title = {Advancing Operations Management Theory Using Exploratory Structural Equation Modelling Techniques}, year = {2010}, month = {2010}, keywords = {BIS}, author = {Roberts,Nicholas and Thatcher,J. and Grover,V.} } @conference {1984716, title = {Are French Fries and Grades Bad for You? Conflicting Evidence on how K-12 Teachers Search in a K-12 Engineering Digital Library}, booktitle = {Am. Soc. of Engr. Education (ASEE) Annual Conf. 2010}, year = {2010}, month = {2010}, address = {Louisville, KY}, abstract = {The TeachEngineering digital library provides teacher-tested, standards-based engineering content for K-12 teachers to use in science and math classrooms. Since its release in 2005, it has demonstrated significant growth in users and in contributors; data on this growth is presented. The TeachEngineering team continues to research its search functions and user interface in order to ensure that it is meeting the needs of its intended users, K-12 teachers. Empirical evidence of an experimental study on the dimensions of alignment between digital K-12 lesson materials and education standards, however, contradicts that of the observed search behavior of patrons of TeachEngineering. Whereas the experiment convincingly shows that grade band information does not add to the teaching materials{\textquoteright} relevance for an educational standard, observed patrons{\textquoteright} searching patterns show ample evidence of grade band-based searches. In this paper we offer that although grade band-based searches should perhaps be avoided because they improperly bias search results, they are such a prominent feature in the actual use of the digital library that as designers we must support them while mitigating the risk of unfortunate search bias. As a possible solution we suggest supporting grade-based searches yet offering query expansion by widening the grade band. These results also imply that curriculum developers pay close attention to the assignment of grade bands to their lessons and activities.}, keywords = {BIS}, author = {Reitsma,Reindert and Klenk,P. and Zarske,M. and Sullivan,J.} } @article {1973196, title = {Aspects of {\textquoteright}Relevance{\textquoteright} in the Alignment of Curriculum with Educational Standards}, journal = {Information Processing \& Management}, volume = {46}, year = {2010}, month = {2010}, pages = {362-376}, abstract = {Retrieval of useful digitized learning objects is a key objective for educational digital libraries, but imprecise definitions of alignment hinder the development of effective retrieval mechanisms. With over 63,000 U.S. K-12 science and mathematics education standards and a rapid proliferation of Web-enabled curriculum, retrieving curriculum that aligns with the standards to which teachers must teach is increasingly important. Previous studies of such alignment use single-dimensional and binary measures of relevance. Perhaps as a consequence they suffer from low inter-rater reliability (IRR), with experts agreeing about alignments only some 20-40\% of the time. We present the results of an experiment in which the dependent variable {\textquoteleft}alignment{\textquoteright} is operationalized using the Saracevic model of relevance in which; i.e., alignment is defined and measured through {\textquoteleft}clues{\textquoteright} from the everyday practice of K-12 teaching. Results show higher inter-rater reliability on all clues with significantly higher IRR on several specific alignment dimensions. In addition, a (linear) model of {\textquoteleft}overall alignment{\textquoteright} is derived and estimated. Both the structure and explanatory power of the model differ significantly between searching vs. assessment. These results illustrate the usefulness of clue-based relevance measures for information retrieval and have important consequences for both the formulation of automated retrieval mechanisms and the construction of a gold standard set of standard-curriculum alignments.}, keywords = {Accounting, BIS}, url = {http://www.sciencedirect.com/science/article/B6VC8-4XF7Y02-1/2/3fd5e4257f3d904d5929eeff2185c678}, author = {Reitsma,Reindert and Marshall,Byron and Zarske,Malinda} } @article {1984881, title = {Building and Leveraging Information in Dynamic Markets: The Role of IT Infrastructure Flexibility as Enabler of Organizational Responsiveness and Competitive Advantage}, year = {2010}, month = {2010}, keywords = {BIS}, author = {Bhatt,G. and Emdad,A. and Roberts,Nicholas and Grover,V.} } @article {1970911, title = {A Collaborative Scheduling Approach for Service-Driven Scientific Workflow Execution}, journal = {Journal of Computer and System Sciences}, volume = {76}, year = {2010}, month = {2010}, keywords = {BIS, Business Analytics}, author = {Dou,W. and Zhao,J. L. and Fan,Shaokun} } @article {1984886, title = {The Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-2008}, year = {2010}, month = {2010}, keywords = {BIS}, author = {Gerow,J. and Grover,V. and Roberts,Nicholas and Thatcher,J.} } @article {1980811, title = {Discourse Analysis of the Question-Answering Service of the Internet Public Library}, year = {2010}, month = {2010}, address = {Boston, MA, USA}, keywords = {BIS}, author = {Poole,Erik V and Li,Jiexun and Park,Jung-Ran} } @conference {1984386, title = {Does Using CobiT Improve IT Solution Proposals?}, booktitle = {AAA Annual Meeting, IS Section}, year = {2010}, month = {2010}, abstract = {The CobiT (Control Objectives for Information and related Technology) framework is designed to help organizations implement IT governance practices by systematically shaping identifiable IT processes to better leverage IT expenditures. The control structure advocated in CobiT embodies governance notions including business alignment, a risk/control perspective, systematic measurement, accountability, and continuous improvement. Despite the rise of internal control regulation, not all organizations have implemented systematic IT controls and many, notably small, organizations may never do so. This study explores whether exposing decision makers to CobiT positively affects the IT solutions they generate. We present a framework (drawn primarily from the structure of CobiT) for identifying normatively better IT plans as measured by application of governance principles. We report on 115 IT solution proposals created by business students. The proposals developed using CobiT more frequently took a risk/control approach, addressed the need for continuous improvement, referred to general IT processes, identified the people who should implement a solution, and proposed more measures of success. Thus, exposing decision makers to a systematic IT governance framework promises to help them generate more comprehensive solutions to IT challenges.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @conference {1984706, title = {Educational Standard Assignment; Some recent findings working with NSDL tools CAT \& SAT}, booktitle = {National Science Digital Library (NSDL) 2010 Annual Meeting}, year = {2010}, month = {2010}, abstract = {The NSDL suite of tools offers the Content Assignment and Standard Alignment Tools (CAT \& SAT). We present two evaluations of these tools; one is a comparative analysis of human vs. CAT standard assignment. Another is the use of a 24M-row database of SAT-based standard alignments. The latter explores the feasibility of standard cross walking}, keywords = {BIS}, author = {Reitsma,Reindert and Diekema,A.} } @conference {1985061, title = {Finding Treasures in Your Trash,}, booktitle = {Proceedings of Joint Conference of eServices and Business Intelligence, Chengdu, China, June 4th-6th, 2010}, year = {2010}, month = {2010}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Luo,Xin and Ma,James and Chau,Michael} } @article {1983971, title = {Finding Treasures in Your Trash}, year = {2010}, month = {2010}, address = {Chengdu, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Luo,X. and Ma,J. and Chau,M.} } @article {1972866, title = {Gene function prediction with gene interaction networks: a context graph kernel approach}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {14}, year = {2010}, month = {2010}, pages = {119-128}, keywords = {BIS}, author = {Li,Xin and Chen,Hshinchun and Li,Jiexun and Zhang,Zhu} } @article {1982681, title = {The Impact of Relational and Task-Oriented Leaders on Virtual Team Performance}, year = {2010}, month = {2010}, address = {Delft, The Netherlands}, keywords = {BIS}, author = {Bajwa,Deepinder and Tyran,Craig and Raja,V.T. and Tyran,Kristi} } @article {1982881, title = {IT curriculum and critical skills set for effective IT professionals: is there a gap?}, year = {2010}, month = {2010}, address = {Portland, OR}, keywords = {BIS}, author = {Reitsma,Reindert and Eom,Mike and Hootman,J} } @conference {1984381, title = {IT Governance Norms and IT Success}, booktitle = {2nd annual Pre-ICIS Workshop on Accounting Information Systems}, year = {2010}, month = {2010}, address = {December 2010, Saint Louis, MO, U.S.A.}, abstract = {The checklists included in well-known IT governance frameworks may be a good fit for
large organizations that face regulatory pressure and a need for large-scale coordination
but may be less appropriate for smaller organizations. Core IT governance principles
embedded in the structure of CobiT, ITIL, and ISO2000 can be expressed as a set of IT
governance norms including business alignment, a risk/control perspective, systematic
measurement, accountability, and continuous improvement. In this study, we model IT
effectiveness and willingness to comply with best practices as effects of adopting these
norms. We propose a set of survey items tailored to help assess the constructs in this
model then partially validate them using principal components analysis. Survey
responses (n=86) reveal a significant connection between evidence of norm adoption in
organizations and IT success. This norms-based paradigm may be useful in bringing
some of the benefits of IT governance to the smaller organizations that are thought to
drive economic growth and employment.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @conference {1984871, title = {A Meta-Analytic Review and Extension of the Organizational IT Assimilation Literature}, year = {2010}, month = {2010}, keywords = {BIS}, author = {Roberts,Nicholas and Gerow,J. and Roberts,S.} } @conference {1984721, title = {Network Visualization of Human and Machine-based Educational Standard Assignment}, booktitle = {Information Visualization 2010 (IV-10)}, year = {2010}, month = {2010}, address = {London}, abstract = {Rapid growth in the availability of digital libraries of K-12 curriculum, coupled with an increased emphasis on standard-based teaching has led to the development of automated standard assignment tools. To assess the performance of one of those tools and to gain insight into the differences between how human catalogers and automated tools conduct these standard assignments, we explore the use of network modeling and visualization techniques for comparing and contrasting the two. The results show significant differences between the human-based and machine-based network maps. Unlike the machine-based maps, the human-based assignment maps elegantly reflect the rationales and principles of the assignments; i.e., clusters of standards separate along lines of content and pedagogical principles. In addition, humans seem significantly more apt at assigning so-called {\textquoteleft}methodological{\textquoteright} standards.}, keywords = {BIS}, author = {Reitsma,Reindert and Diekema,A.} } @article {1972861, title = {A policy-based process mining framework: Mining business policy texts for discovering process models}, journal = {Information Systems and e-Business Management}, volume = {8}, year = {2010}, month = {2010}, pages = {169-188}, keywords = {BIS}, author = {Li,Jiexun and Wang,Harry Jianan and Zhang,Zhu and Zhao,J Leon} } @conference {1985051, title = {Understanding Awareness Diffusion at Twitter.com}, booktitle = {Proceedings of the Sixteenth Americas Conference on Information Systems, Lima, Peru, August 12th-15th 2010}, year = {2010}, month = {2010}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chau,Michael} } @article {1983966, title = {Understanding Awareness Diffusion at Twitter.com}, year = {2010}, month = {2010}, address = {Lima, Peru}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chau,M} } @article {1975771, title = {Visualization of network concepts: The impact of working memory capacity differences}, journal = {Decision Support Systems}, volume = {21}, year = {2010}, month = {2010}, pages = {327-344}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Watts,S.} } @article {1969181, title = {Visualizing Basic Accounting Flows: Does XBRL + Model + Animation = Understanding?}, journal = {International Journal of Digital Accounting Research}, volume = {10}, year = {2010}, month = {2010}, pages = {27-54}, abstract = {The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. This format should allow managers, investors, regulators, and students to aggregate, compare and analyze financial information. This study explores an XBRL-based visualization tool that maps the organization of financial statements captured in the XBRL formalism into a graphical representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students. Our findings suggest the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.}, keywords = {Accounting, BIS}, url = {http://www.uhu.es/ijdar/10.4192/1577-8517-v10_2.pdf}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin} } @article {1975776, title = {Visualizing Social Network Concepts}, journal = {Decision Support Systems}, volume = {49}, year = {2010}, month = {2010}, pages = {151-161}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Watts,S. and Chen,H.} } @inbook {1984711, title = {Web Services}, volume = {3}, year = {2010}, month = {2010}, pages = {578-592}, address = {Hoboken, NJ}, abstract = {Overview of Web services technology and its use.}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1982691, title = {The adoption and use of technologies to support virtual teams}, year = {2009}, month = {2009}, address = {Toronto}, keywords = {BIS}, author = {Bajwa,Deepinder S. and Raja,V.T. and Tyran,Craig K and Tyran,Kristi} } @article {1980816, title = {Analyzing Writing Styles of Bloggers with Different Opinions}, year = {2009}, month = {2009}, address = {Phoenix, AZ, USA}, keywords = {BIS}, author = {Park,Thomas H and Li,Jiexun and Zhao,Haozhen and Chau,Michaul} } @article {1983976, title = {Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams}, year = {2009}, month = {2009}, address = {Phoenix, AZ}, keywords = {BIS, Business Analytics}, author = {Qin,J. and Zhu,Bin and Gaynor,M. and Bradner,S.} } @conference {1985056, title = {Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams}, booktitle = {Proceedings of 8th Workshop on e-Business (WeB{\textquoteright}09), Phoenix, AZ, USA.}, year = {2009}, month = {2009}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Qin,Jialun} } @article {1984891, title = {Conceptualizing and Testing Formative Constructs: Tutorial and Annotated Example}, year = {2009}, month = {2009}, keywords = {BIS}, author = {Roberts,Nicholas and Thatcher,J.} } @conference {1969176, title = {Delivering Value Beyond Efficiency with Visualized XBRL}, booktitle = {International Conference on Information Systems (ICIS 2009)}, year = {2009}, month = {2009}, address = {Phoenix, AZ}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin and Marshall,Andrew} } @conference {1984591, title = {Dimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum}, booktitle = {Proceedings of the Joint Conference on Digital Libraries (JCDL{\textquoteright}09), Austin, TX}, year = {2009}, month = {2009}, keywords = {Accounting, BIS}, url = {http://doi.acm.org/10.1145/1555400.1555403}, author = {Marshall,Byron and Reitsma,Reindert and Zarske,Malinda} } @article {1983991, title = {Expanding Research Using System Development as Methodology}, year = {2009}, month = {2009}, address = {Tucson, AZ}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1980821, title = {Hospital admission prediction using pre-hospital variables}, year = {2009}, month = {2009}, address = {Washington DC, USA}, keywords = {BIS}, author = {Li,Jiexun and Guo,Lifan and Handly,Neal} } @conference {1984896, title = {Increasing Process Improvement through Internet-based e-Business Innovations}, year = {2009}, month = {2009}, keywords = {BIS}, author = {Roberts,Nicholas and Klein,R.} } @inbook {1985071, title = {Information Visualization for Decision Making}, year = {2009}, month = {2009}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @article {1977466, title = {Internet Marketing: How to Use SEO and Social Networking to Reach Clients}, year = {2009}, month = {2009}, address = {Portland, OR}, keywords = {BIS}, author = {Curry,Michael} } @article {1977461, title = {Lightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy.}, year = {2009}, month = {2009}, address = {Vancouver, WA}, keywords = {BIS}, author = {Curry,Michael} } @article {1972876, title = {Managing knowledge in light of its evolution process: An empirical study on citation network-based patent classification}, journal = {Journal of Management Information Systems}, volume = {26}, year = {2009}, month = {2009}, pages = {129-153}, keywords = {BIS}, author = {Li,Xin and Chen,Hshinchun and Zhang,Zhu and Li,Jiexun and Nunamaker,Jay F.} } @article {1982891, title = {Navigating the TeachEngineering Resource}, year = {2009}, month = {2009}, address = {Boulder, CO}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1982886, title = {Regionalization of Information Space with Capacity-constrained Voronoi Diagrams}, year = {2009}, month = {2009}, address = {Zurich, CH}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1972881, title = {Sentiment analysis of Chinese documents: From sentence to document level}, journal = {Journal of the Association for Information Science and Technology}, volume = {60}, year = {2009}, month = {2009}, pages = {2474-2487}, keywords = {BIS}, author = {Zhang,Changli and Zeng,Daniel and Li,Jiexun and Wang,Fei-Yue and Zuo,Wanli} } @article {1981331, title = {TeachEngineering: K-12 Teacher Use Study}, year = {2009}, month = {2009}, address = {Boulder, CO.}, keywords = {Accounting, BIS}, author = {Reitsma,Reindert and Marshall,Byron} } @article {1973201, title = {Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security}, journal = {IEEE Transactions on Intelligent Transportation Systems}, volume = {10}, year = {2009}, month = {2009}, pages = {83 - 91}, abstract = {The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border are not independent of law enforcement in border-area jurisdictions because the information known by local law enforcement agencies may provide valuable leads that are useful for securing the border and transportation infrastructure. The combined analysis of law enforcement information and data generated by vehicle license plate readers at international borders can be used to identify suspicious vehicles and people at ports of entry. This not only generates better quality leads for border protection agents but may also serve to reduce wait times for commerce, vehicles, and people as they cross the border. This paper explores the use of criminal activity networks (CANs) to analyze information from law enforcement and other sources to provide value for transportation and border security. We analyze the topological characteristics of CAN of individuals and vehicles in a multiple jurisdiction scenario. The advantages of exploring the relationships of individuals and vehicles are shown. We find that large narcotic networks are small world with short average path lengths ranging from 4.5 to 8.5 and have scale-free degree distributions with power law exponents of 0.85{\textendash}1.3. In addition, we find that utilizing information from multiple jurisdictions provides higher quality leads by reducing the average shortest-path lengths. The inclusion of vehicular relationships and border-crossing information generates more investigative leads that can aid in securing the border and transportation infrastructure.}, keywords = {Accounting, BIS}, url = {http://dx.doi.org/10.1109/TITS.2008.2011695}, author = {Kaza,Siddharth and Xu,Jennifer and Marshall,Byron and Chen,Hsinchun} } @article {1970916, title = {Transformation Framework of Conceptual to Logical Business Process Models}, journal = {China Journal of Information Systems}, volume = {3}, year = {2009}, month = {2009}, abstract = {(In Chinese)}, keywords = {BIS, Business Analytics}, author = {Liu,M. and Fan,Shaokun and Zhao,J. L. and Dou,W.} } @article {1983981, title = {Understanding How Product Information Traverses Across Online Communities}, year = {2009}, month = {2009}, address = {Guangzhou, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Yang,C.} } @conference {1985076, title = {Understanding How Product Information Traverses Across Online Communities}, booktitle = {Proceedings of Third China Workshop on Information Management 2009, Guangzhou, China}, year = {2009}, month = {2009}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Yang,Chris} } @article {1982696, title = {Untitled}, year = {2009}, month = {2009}, address = {La Jolla, California}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982686, title = {Using Wikis to Support Virtual Teams in Education: The Effect of Instructor Leadership Style.}, year = {2009}, month = {2009}, address = {Phoenix, Arizona}, keywords = {BIS}, author = {Tyran,Craig and Raja,V.T. and Tyran,Kristi} } @conference {1984331, title = {Visualizing basic accounting flows: does XBRL + model + animation = understanding?}, booktitle = {American Accounting Association 18th Annual Strategic and Emerging Technologies Research Workshop}, year = {2009}, month = {2009}, address = {New York, NY}, abstract = {The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. Representing traditional financial statements in this electronic and interoperable format should allow managers, investors, regulators, and importantly students to aggregate, compare and analyze financial information. Processing such data requires an understanding of the underlying paradigms embedded in consolidated sets of financial statements. This work explores the feasibility and effectiveness of an XBRL-based visualization tool, presenting an organizational framework, mapping that framework to financial statements and the XBRL formalism, and demonstrating a visual representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students in introductory financial accounting classes. This preliminary finding suggests the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin and Marshall,Andrew} } @article {1983986, title = {Visualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation}, year = {2009}, month = {2009}, address = {San Francisco, CA}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Shankaranarayanan,G. and Cai,Y.} } @conference {1985066, title = {Visualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation}, booktitle = {Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California}, year = {2009}, month = {2009}, keywords = {BIS, Business Analytics}, author = {Shankaranarayanan,G. and Zhu,Bin} } @article {1972871, title = {Visualizing the Intellectual Structure with Paper-Reference Matrices}, journal = {IEEE Transactions on Visualization and Computer Graphics}, volume = {15}, year = {2009}, month = {2009}, pages = {1153-1160}, keywords = {BIS}, author = {Zhang,Jian and Chen,Chaomei and Li,Jiexun} } @article {1980826, title = {Visualizing the intellectual structure with paper-reference matrices}, year = {2009}, month = {2009}, address = {Atlantic City, NJ, USA}, keywords = {BIS}, author = {Zhang,Jian and Chen,Chaomei and Li,Jiexun} } @article {1975781, title = {CommunicationGarden System: Visualizing a Computer Mediated Communication System to Facilitate Knowledge Management}, journal = {Decision Support Systems}, volume = {45}, year = {2008}, month = {2008}, pages = {778-794}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @article {1970931, title = {Complex Problem Solving based on Complex Problem Definition Model}, journal = {Application Research of Computers}, volume = {25}, year = {2008}, month = {2008}, abstract = {(In Chinese)}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Wanchun,D.} } @article {1970921, title = {A context- and role-driven scientific workflow development pattern}, journal = {Concurrency and Computation: Practice and Experience}, volume = {20}, year = {2008}, month = {2008}, pages = {1741-1757}, keywords = {BIS, Business Analytics}, author = {Wanchun,D. and Chen,J. and Fan,Shaokun and Cheung,S. C.} } @article {1970936, title = {Context-aware Resource Access Control in Scientific Workflows}, journal = {Computer Engineering and Design}, volume = {29}, year = {2008}, month = {2008}, abstract = {(In Chinese)}, keywords = {BIS, Business Analytics}, author = {Fan,Shaokun and Wanchun,D. and Xiping,L.} } @article {1984001, title = {Decision support with data quality metadata}, year = {2008}, month = {2008}, address = {Boston, MA}, keywords = {BIS, Business Analytics}, author = {Shankaranarayanan,G. and Zhu,Bin and Cai,Y.} } @article {1984006, title = {Monitoring Conflicts in Virtual Teams: A Social Network Approach}, year = {2008}, month = {2008}, address = {Kunming, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Gaynor,M} } @article {1983996, title = {Monitoring Team Conflicts through the Visualization of Social Networks}, year = {2008}, month = {2008}, address = {Paris, France}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Gaynor,M and Bradner,S.} } @article {1980851, title = {PRM-based identity matching using social context}, year = {2008}, month = {2008}, address = {Taipei, Taiwan}, keywords = {BIS}, author = {Li,Jiexun and Wang,Gang Alan and Chen,Hsinchun} } @article {1980846, title = {Process component identification from business policy documents}, year = {2008}, month = {2008}, address = {Yunnan, China}, keywords = {BIS}, author = {Li,Jiexun and Wang,Harry Jiannan and Zhang,Zhu and Zhao,J Leon} } @article {1980831, title = {Relation-centric task identification for policy-based process mining}, year = {2008}, month = {2008}, address = {Paris, France}, keywords = {BIS}, author = {Li,Jiexun and Wang,Harry Jiannan and Zhang,Zhu and Zhao,J Leon} } @article {1980836, title = {Stylometric feature selection for assessing review helpfulness}, year = {2008}, month = {2008}, address = {Paris, France}, keywords = {BIS}, author = {Li,Jiexun and MacDonald,Craig M and Zheng,Rong} } @article {1980841, title = {Theme creation for digital collections}, year = {2008}, month = {2008}, address = {Berlin, Germany}, keywords = {BIS}, author = {Li,Jiexun and Xia,Lin and Zhou,Xiaohua} } @article {1973206, title = {Using Importance Flooding to Identify Interesting Networks of Criminal Activity}, journal = {Journal of the Association for Information Science and Technology}, volume = {59}, year = {2008}, month = {2008}, pages = {2099-2114}, abstract = {Cross-jurisdictional law enforcement data sharing and analysis is of vital importance because law breakers regularly operate in multiple jurisdictions. Agencies continue to invest massive resources in various sharing initiatives despite several high-profile failures. Key difficulties include: privacy concerns, administrative issues, differences in data representation, and a need for better analysis tools. This work presents a methodology for sharing and analyzing investigation-relevant data and is potentially useful across large cross-jurisdictional data sets. The approach promises to allow crime analysts to use their time more effectively when creating link charts and performing similar analysis tasks. Many potential privacy and security pitfalls are avoided by reducing shared data requirements to labeled relationships between entities. Our importance flooding algorithm helps extract interesting networks of relationships from existing law enforcement records using user-controlled investigation heuristics, spreading activation, and path-based interestingness rules. In our experiments, several variations of the importance flooding approach outperformed relationship-weight-only methods in matching expert-selected associations. We find that accuracy in not substantially affected by reasonable variations in algorithm parameters and demonstrate that user feedback and additional, case-specific information can be usefully added to the computational model.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_ImportanceFlooding_PrePrint.pdf}, author = {Marshall,Byron and Chen,Hsinchun and Kaza,Siddharth} } @article {1970926, title = {A Workflow Engine-Driven SOA-Based Cooperative Computing Paradigm in Grid Environments}, journal = {International Journal of High Performance Computing Applications}, volume = {22}, year = {2008}, month = {2008}, keywords = {BIS, Business Analytics}, author = {Wanchun,D. and Chen,J. and Liu,J and Cheung,S. C. and Chen,G. and Fan,Shaokun} } @article {1980866, title = {Auto patent classification using citation network information: An experimental study in nanotechnology}, year = {2007}, month = {2007}, address = {Vancouver, British Columbia, Canada}, keywords = {BIS}, author = {Li,Xin and Chen,Hsinchun and Zhang,Zhu and Li,Jiexun} } @article {1972886, title = {Complex problem solving: A case study on identity matching based on social contextual information}, journal = {Journal of the Association for Information Systems: Special Issue Enid Mumford{\textquoteright}s Contribution to Information Systems Theory and Theoretical Thinking}, volume = {8}, year = {2007}, month = {2007}, pages = {Article 31}, keywords = {BIS}, author = {Xu,Jennifer and Wang,Alan G. and Li,Jiexun and Chau,Michaul} } @article {1970946, title = {On Design, Verification, and Dynamic Modification of the Problem-Based Scientific Workflow Model}, journal = {Simulation Modeling Practice and Theory}, volume = {15}, year = {2007}, month = {2007}, keywords = {BIS, Business Analytics}, author = {Liu,X. and Wanchun,D. and Chen,J. and Fan,Shaokun and Cheung,S. C. and Cai,S.} } @conference {1984901, title = {Do As Others Do: Modeling IT Adoption Intentions through Institutional and Social Contagion Theories}, year = {2007}, month = {2007}, keywords = {BIS}, author = {Klein,R. and Roberts,Nicholas} } @article {1977471, title = {eConsulting to improve the client{\textquoteright}s bottom line.}, year = {2007}, month = {2007}, address = {Reno, NV}, keywords = {BIS}, author = {Curry,Michael} } @article {1970941, title = {A Fuzzy Directed Graph-based QoS Model for Service Composition}, journal = {Wuhan University Journal of Natural Sciences}, volume = {12}, year = {2007}, month = {2007}, keywords = {BIS, Business Analytics}, author = {Sanjun,G. and Wanchun,D. and Fan,Shaokun} } @article {1980861, title = {Graph kernel-based learning for gene function prediction from gene interaction network}, year = {2007}, month = {2007}, address = {Fremont, CA, USA}, keywords = {BIS}, author = {Li,Xin and Zhang,Zhu and Chen,Hsinchun and Li,Jiexun} } @article {1974511, title = {Information Space Partitioning Using Adaptive Voronoi Diagrams}, journal = {Information Visualization}, volume = {6}, year = {2007}, month = {2007}, pages = {123-138}, abstract = {In this paper we present and evaluate a Voronoi method for partitioning continuous information spaces. We define the formal characteristics of the problem and discuss several well-known partitioning methods and approaches. We submit that although they all partially solve the problem, they all have shortcomings. As an alternative, we offer an approach based on an adaptive version of the multiplicatively weighted Voronoi diagram. The diagram is {\textquoteleft}adaptive{\textquoteright} because it is computed backwards; i.e., the generators{\textquoteright} weights are treated as dependent rather than independent variables. We successfully test this adaptive solution using both ideal-typical (artificial) and empirical data. Since the resultant visualizations are meant to be used by human subjects, we then discuss the results of a usability experiment, positioning the adaptive solution against a commonly used rectangular solution and the classic nonweighted Voronoi solution. The results indicate that in terms of usability, both the rectangular and the adaptive Voronoi solution outperform the standard Voronoi solution. In addition, although subjects are better able to gage rectangular area relationships, only the adaptive Voronoi solution satisfies all geometric constraints of weight-proportional partitioning.}, keywords = {BIS}, author = {Reitsma,Reindert and Trubin,Stanislav} } @article {1984011, title = {Integrating Data Quality Data into Decision-Making Process: an Information Visualization Approach}, year = {2007}, month = {2007}, address = {Beijing, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Shankaranarayanan,G. and Cai,Y.} } @article {1972891, title = {Large-scale regulatory network analysis from microarray data: Modified Bayesian network learning and association rule mining}, journal = {Decision Support Systems}, volume = {43}, year = {2007}, month = {2007}, pages = {1207-1225}, keywords = {BIS}, author = {Huang,Zan and Li,Jiexun and Su,Hua and Watts,George S. and Chen,Hsinchun} } @article {1980856, title = {Mining business policy texts for discovering process models: A framework and some initial results}, year = {2007}, month = {2007}, address = {Montreal, Quebec, Canada}, keywords = {BIS}, author = {Li,Jiexun and Wang,Harry Jiannan and Zhang,Zhu and Zhao,J Leon} } @article {1972896, title = {Optimal search-based gene subset selection for gene array cancer classification}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {11}, year = {2007}, month = {2007}, pages = {398-405}, keywords = {BIS}, author = {Li,Jiexun and Su,Hua and Chen,Hsinchun and Futscher,Bernard W.} } @article {1982896, title = {Poster Session. Aligning Curriculum with Standards: TeachEngineering, SAT \& CAT}, year = {2007}, month = {2007}, address = {Washington, DC}, keywords = {BIS}, author = {Reitsma,Reindert and Cyr,Martha N. and Diekema,Anne} } @conference {1984596, title = {Semantics or Standards for Curriculum Search?}, booktitle = {Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, 181-182}, year = {2007}, month = {2007}, address = {New York, NY}, abstract = {Aligning digital library resources with national and state educational standards to help K-12 teachers search for relevant curriculum is an important issue in the digital library community. Aligning standards from different states promises to help teachers in one state find appropriate materials created and cataloged elsewhere. Although such alignments provide a powerful means for crosswalking standards and curriculum across states, alignment matrices are intrinsically sparse. Hence, we hypothesize that such sparseness may cause significant numbers of false negatives when used for searching curriculum. Our preliminary results confirm the false negative hypothesis, demonstrate the usefulness of term-based techniques in addressing the false negative problem, and explore ways to combine term occurrence data with standards correlations.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert and Cyr,Martha N} } @article {1982901, title = {TeachEngineering Poster Session}, year = {2007}, month = {2007}, keywords = {BIS}, author = {Reitsma,Reindert and Vanlue,William and Lewis,Paul} } @conference {1984906, title = {Tying Context to Post-Adoption Behavior Within Information Technology: A Conceptual and Operational Definition of Mindfulness}, year = {2007}, month = {2007}, keywords = {BIS}, author = {Roberts,Nicholas and Thatcher,J. and Klein,R.} } @article {1973211, title = {User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {11}, year = {2007}, month = {2007}, pages = {527-536}, abstract = {Explosive growth in biomedical research has made automated information extraction, knowledge integration, and visualization increasingly important and critically needed. The Arizona BioPathway (ABP) system extracts and displays biological regulatory pathway information from the abstracts of journal articles. This study uses relations extracted from more than 200 PubMed abstracts presented in a tabular and graphical user interface with built-in search and aggregation functionality. This article presents a task-centered assessment of the usefulness and usability of the ABP system focusing on its relation aggregation and visualization functionalities. Results suggest that our graph-based visualization is more efficient in supporting pathway analysis tasks and is perceived as more useful and easier to use as compared to a text-based literature viewing method. Relation aggregation significantly contributes to knowledge acquisition efficiency. Together, the graphic and tabular views in the ABP Visualizer provide a flexible and effective interface for pathway relation browsing and analysis. Our study contributes to pathway-related research and biological information extraction by assessing the value of a multi-view, relation-based interface which supports user-controlled exploration of pathway information across multiple granularities.}, keywords = {Accounting, BIS}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4300830\&arnumber=4300844\&count=17\&index=5}, author = {Qui{\~n}ones,Karin D. and Su,Hua and Marshall,Byron and Eggers,Shauna and Chen,Hsinchun} } @conference {1984911, title = {Using Information Technology Mindfully}, year = {2007}, month = {2007}, keywords = {BIS}, author = {Roberts,Nicholas and Thatcher,J. and Klein,R.} } @article {1974516, title = {Weight-proportional Space Partitioning Using Adaptive Voronoi Diagrams}, journal = {Geoinformatica}, volume = {11}, year = {2007}, month = {2007}, pages = {383-405}, abstract = {Traditional application of Voronoi diagrams for space partitioning results in Voronoi regions, each with a specific area determined by the generators{\textquoteright} relative locations and weights. Particularly in the area of information space (re)construction, however, there is a need for inverse solutions; i.e., finding weights that result in regions with predefined area ratios. In this paper, we formulate an adaptive Voronoi solution and propose a raster-based optimization method for finding the associated weight set. The solution consists of a combination of simple, fixed-point iteration with an optional spatial resolution refinement along the regions{\textquoteright} boundaries using quadtree decomposition. We present the corresponding algorithm and its complexity analysis. The method is successfully tested on a series of ideal{\textquotedblright}typical cases and the interactions between the adaptive technique and boundary resolution refinement are explored and assessed.}, keywords = {BIS}, author = {Reitsma,Reindert and Trubin,S, and Mortensen,E.} } @article {1973221, title = {Aggregating Automatically Extracted Regulatory Pathway Relations}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {10}, year = {2006}, month = {2006}, pages = {100- 108}, abstract = {Automatic tools to extract information from biomedical texts are needed to help researchers leverage the vast and increasing body of biomedical literature. While several biomedical relation extraction systems have been created and tested, little work has been done to meaningfully organize the extracted relations. Organizational processes should consolidate multiple references to the same objects over various levels of granularity, connect those references to other resources, and capture contextual information. We propose a feature decomposition approach to relation aggregation to support a five-level aggregation framework. Our BioAggregate tagger uses this approach to identify key features in extracted relation name strings. We show encouraging feature assignment accuracy and report substantial consolidation in a network of extracted relations.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_IEEE_TITB_2005.pdf}, author = {Marshall,Byron and Su,Hua and McDonald,Daniel and Eggers,Shauna and Chen,Hsinchun} } @article {1970366, title = {The Analytic Hierarchy Process: A Tutorial for Use in Prioritizing Forest Road Investments to Minimize Environmental Effects}, journal = {International Journal of Forest Engineering}, volume = {17}, year = {2006}, month = {2006}, pages = {51-70}, keywords = {BIS}, author = {Coulter,E. and Coakley,James and Sessions,J.} } @article {1980876, title = {A Bayesian framework of integrating gene functional relations from heterogeneous data sources}, year = {2006}, month = {2006}, address = {Phoenix, AZ, USA}, keywords = {BIS}, author = {Li,Jiexun and Li,Xin and Su,Hua and Chen,Hsinchun} } @article {1972911, title = {A framework of authorship identification for online messages: Writing style features and classification techniques}, journal = {Journal of the Association for Information Science and Technology}, volume = {57}, year = {2006}, month = {2006}, pages = {378-393}, keywords = {BIS}, author = {Zheng,Rong and Li,Jiexun and Chen,Hsinchun and Huang,Zan and Qin,Yi} } @article {1972901, title = {A framework of integrating gene functional relations from heterogeneous data sources: An experiment on Arabidopsis thaliana}, journal = {Bioinformatics}, volume = {22}, year = {2006}, month = {2006}, pages = {2037-2043}, keywords = {BIS}, author = {Li,Jiexun and Li,Xin and Su,Hua and Chen,Hsinchun and Galbraith,David W.} } @article {1972906, title = {From fingerprint to writeprint}, journal = {Communications of the ACM}, volume = {49}, year = {2006}, month = {2006}, pages = {76-82}, keywords = {BIS}, author = {Li,Jiexun and Zheng,Rong and Chen,Hsinchun} } @article {1980871, title = {Identity matching based on probabilistic relational models}, year = {2006}, month = {2006}, address = {Acapulco, Mexico}, keywords = {BIS}, author = {Li,Jiexun and Wang,Gang Alan} } @conference {1984916, title = {Institutional Influences on Adoption Intention within the Healthcare Industry}, year = {2006}, month = {2006}, keywords = {BIS}, author = {Klein,R. and Roberts,Nicholas} } @article {1984016, title = {Management Information Systems Research is USA}, year = {2006}, month = {2006}, address = {Chengdu, China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1973216, title = {Matching Knowledge Elements in Concept Maps Using a Similarity Flooding Algorithm}, journal = {Decision Support Systems}, volume = {42}, year = {2006}, month = {2006}, pages = {1290-1306}, abstract = {Concept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of concept maps exhibit terminology variance, informality, and organizational variation. These factors make it difficult to match elements between maps in comparison, retrieval, and merging processes. In this work, we add an element anchoring mechanism to a similarity flooding (SF) algorithm to match nodes and substructures between pairs of simulated maps and student-drawn concept maps. Experimental results show significant improvement over simple string matching with combined recall accuracy of 91\% for conceptual nodes and concept {\textasciidieresis} link {\textasciidieresis} concept propositions in student-drawn maps.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/MatchKnowledgeElements_PrePrintVersion.pdf}, author = {Marshall,Byron and Chen,Hsinchun and Madhusudan,Therani} } @conference {1984921, title = {Mindfulness in the Domain of Information Systems}, year = {2006}, month = {2006}, keywords = {BIS}, author = {Roberts,Nicholas and Thatcher,J. and Klein,R.} } @article {1973226, title = {Moving Digital Libraries into the Student Learning Space: the GetSmart Experience}, journal = {Journal on Educational Resources in Computing}, volume = {6}, year = {2006}, month = {2006}, abstract = {The GetSmart system was built to support theoretically sound learning processes in a digital library environment by integrating course management, digital library, and concept mapping components to support a constructivist, six-step, information search process. In the fall of 2002 more than 100 students created 1400 concept maps as part of selected computing classes offered at the University of Arizona and Virginia Tech. Those students conducted searches, obtained course information, created concept maps, collaborated in acquiring knowledge, and presented their knowledge representations. This article connects the design elements of the GetSmart system to targeted concept-map-based learning processes, describes our system and research testbed, and analyzes our system usage logs. Results suggest that students did in fact use the tools in an integrated fashion, combining knowledge representation and search activities. After concept mapping was included in the curriculum, we observed improvement in students{\textquoteright} online quiz scores. Further, we observed that students in groups collaboratively constructed concept maps with multiple group members viewing and updating map details.}, keywords = {Accounting, BIS}, url = {http://portal.acm.org/citation.cfm?doid=1217862.1217864}, author = {Marshall,Byron and Chen,Hsinchun and Shen,Rao and Fox,Edward A.} } @article {1980881, title = {Optimal search-based gene subset selection for microarray cancer classification}, year = {2006}, month = {2006}, address = {Phoenix, AZ, USA}, keywords = {BIS}, author = {Li,Jiexun and Su,Hua and Chen,Hsinchun and Futscher,Bernard W} } @article {1982906, title = {TeachEngineering Poster Session}, year = {2006}, month = {2006}, address = {Washington, DC}, keywords = {BIS}, author = {Reitsma,Reindert and Sullivan,J and Cyr,M N} } @conference {1984601, title = {Using Importance Flooding to Identify Interesting Networks of Criminal Activity}, booktitle = {Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), IEEE}, year = {2006}, month = {2006}, address = {San Diego, CA}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_ISI_2006.pdf}, author = {Marshall,Byron and Chen,Hsinchun} } @article {1975786, title = {Information Visualization}, journal = {Annual Review of Information Science and Technology}, volume = {39}, year = {2005}, month = {2005}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @conference {1984606, title = {Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations}, booktitle = {Proceedings of the Pacific Symposium on Biocomputing, Jan 4-8, 2005, Big Island, Hawaii}, year = {2005}, month = {2005}, abstract = {Systems that extract biological regulatory pathway relations from free-text sources are
intended to help researchers leverage vast and growing collections of research literature.
Several systems to extract such relations have been developed but little work has focused on
how those relations can be usefully organized (aggregated) to support visualization systems or
analysis algorithms. Ontological resources that enumerate name strings for different types of
biomedical objects should play a key role in the organization process. In this paper we
delineate five potentially useful levels of relational granularity and propose the use of
aggregatable substance identifiers to help reduce lexical ambiguity. An aggregatable
substance identifier applies to a gene and its products. We merged 4 extensive lexicons and
compared the extracted strings to the text of five million MEDLINE abstracts. We report on
the ambiguity within and between name strings and common English words. Our results show
an 89\% reduction in ambiguity for the extracted human substance name strings when using an
aggregatable substance approach.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/marshall_PSB2005.pdf}, author = {Marshall,Byron and Su,Hua and McDonald,Dan and Chen,Hsinchun} } @article {1975791, title = {NewsMap: A Knowledge Map for Online News}, journal = {Decision Support Systems}, volume = {39}, year = {2005}, month = {2005}, pages = {583-597}, keywords = {BIS, Business Analytics}, author = {Ong,T-H. and Chen,H. and Sung,WK and Zhu,Bin} } @article {1980886, title = {Optimal search based gene selection for cancer prognosis}, year = {2005}, month = {2005}, address = {Omaha, NE}, keywords = {BIS}, author = {Li,Jiexun and Su,Hua and Chen,Hsinchun} } @article {1982911, title = {Poster Session. Just a cute kid with a great imagination?}, year = {2005}, month = {2005}, address = {Denver, CO}, keywords = {BIS}, author = {Reitsma,Reindert and Sullivan,J and Cyr,M N} } @article {1984021, title = {Research in Management Information Systems}, year = {2005}, month = {2005}, address = {Nanchang, Jiangxi, P.R. China}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1975796, title = {Using 3D Interfaces to Facilitate the Spatial Knowledge Retrieval: A Geo-referenced Knowledge Repository System}, journal = {Decision Support Systems}, volume = {40}, year = {2005}, month = {2005}, pages = {167-182}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @conference {1984611, title = {Visualizing Aggregated Biological Pathway Relations}, booktitle = {Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11, 2005 , Denver, CO}, year = {2005}, month = {2005}, abstract = {The Genescene development team has constructed an aggregation interface for automatically-extracted biomedical pathway
relations that is intended to help researchers identify and process relevant information from the vast digital library of abstracts found in the National Library of Medicine{\textquoteright}s PubMed collection.
Users view extracted relations at various levels of relational granularity in an interactive and visual node-link interface. Anecdotal feedback reported here suggests that this multigranular visual paradigm aligns well with various research tasks,
helping users find relevant articles and discover new information.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL_2005_Aggregation.pdf}, author = {Marshall,Byron and Qui{\~n}ones,Karin and Su,Hua and Eggers,Shauna and Chen,Hsinchun} } @article {1973236, title = {A Case-based Reasoning Framework for Workflow Model Management}, journal = {Data and Knowledge Engineering}, volume = {50}, year = {2004}, month = {2004}, pages = {87-115}, abstract = {In order to support efficient workflow design, recent commercial workflow systems are providing templates of common business processes. These templates, called cases, can be modified individually or collectively into a new workflow to meet the business specification. However, little research has been done on how to manage workflow models, including issues such as model storage, model retrieval, model reuse and assembly. In this paper, we propose a novel framework to support workflow modeling and design by adapting workflow cases from a repository of process models. Our approach to workflow model management is based on a structured workflow lifecycle and leverages recent advances in model management and case-based reasoning techniques. Our contributions include a conceptual model of workflow cases, a similarity flooding algorithm for workflow case retrieval, and a domain-independent AI planning approach to workflow case composition. We illustrate the workflow model management framework with a prototype system called Case-Oriented Design Assistant for Workflow Modeling (CODAW).}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Madhusudan_DKE_CODAW.pdf}, author = {Madhusudan,Therani and Zhao,J. Leon and Marshall,Byron} } @article {1973241, title = {EBizPort: Collecting and Analyzing Business Intelligence Information}, journal = {Journal of the Association for Information Science and Technology}, volume = {55}, year = {2004}, month = {2004}, pages = {873-891}, abstract = {In this article, Marshall, McDonald, Chen, and Chung take a different approach to supporting search services to large and heterogeneous document collections. They propose development of a domain-specific collection by crawling the content of a small set of highly reputable sites, maintaining a local index of the content, and providing browsing and searching services on the specialized content. This resource, known as a vertical portal, has the potential of overcoming several problems associated with bias, update delay, reputation, and integration of scattered information. The article discusses the design of a vertical portal system{\textquoteright}s architecture called EbizPort, rationale behind its major components, and algorithms and techniques for building collections and search functions. Collection (or more broadly content) has an obvious relationship to the nature of the search interface, as it can impact the type of search functions that can be offered. Powerful search interface functions were built for EbizPort by exploiting the underlying content representation and a relatively narrow and well-defined domain focus. Particularly noteworthy are the innovative browsing functions, which include a summarizer, a categorizer, a visualizer, and a navigation side-bar. The article ends with a discussion of an evaluation study, which compared the EbizPort system with a baseline system called Brint. Results are presented on effectiveness and efficiency, usability and information quality, and quality of local collection and content retrieved from other sources (an extended search operation called meta-search service was also provided in the system). Overall, the authors find that EbizPort outperforms the baseline system, and it provides a viable way to support access to business information.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_EBizPort.pdf}, author = {Marshall,Byron and McDonald,Dan and Chen,Hsinchun and Chung,Wingyan} } @conference {1984616, title = {Element Matching in Concept Maps}, booktitle = {Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2004), June 7-11, 2004 , Tucson, AZ}, year = {2004}, month = {2004}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2004_ElementMatching.pdf}, author = {Marshall,Byron and Madhusudan,Therani} } @article {1973231, title = {Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser}, journal = {Bioinformatics}, volume = {20}, year = {2004}, month = {2004}, pages = {3370-8}, abstract = {Motivation: Text-mining research in the biomedical domain has been motivated by the rapid growth of new research findings. Improving the accessibility of findings has potential to speed hypothesis generation.Results: We present the Arizona Relation Parser that differs from other parsers in its use of a broad coverage syntax-semantic hybrid grammar. While syntax grammars have generally been tested over more documents, semantic grammars have outperformed them in precision and recall. We combined access to syntax and semantic information from a single grammar. The parser was trained using 40 PubMed abstracts and then tested using 100 unseen abstracts, half for precision and half for recall. Expert evaluation showed that the parser extracted biologically relevant relations with 89\% precision. Recall of expert identified relations with semantic filtering was 35 and 61\% before semantic filtering. Such results approach the higher-performing semantic parsers. However, the AZ parser was tested over a greater variety of writing styles and semantic content. }, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/MCDONALD_BIOINFORMATICS.pdf}, author = {McDonald,Dan and Chen,Hsinchun and Su,Hua and Marshall,Byron} } @article {1974521, title = {Spatialization of Web Sites Using a Weighted Frequency Model of Navigation Data}, journal = {Journal of the Association for Information Science and Technology}, volume = {55}, year = {2004}, month = {2004}, pages = {13-22}, abstract = {Reitsma, Thabane, and MacLeod are interested in the display of document sets as visualized geometric spaces. Such spaces can use metrics and dimensions determined arbitrarily prior to analysis of data, or they may use secondary data (logged website transaction counts, perhaps) with techniques like factor analysis or MDS to find a structure. Using high transaction volume between an origin and a destination as an indicator of a small distance and a low volume as an indicator of a large distance, a transaction log can provide input to MDS. One problem is the possible origination of multiple sessions from the same address where one can not determine if consecutive requests are part of the same transaction and thus frequencies may be invalid. They suggest the use of the probability that a count is a transaction as a weight rather the count alone, with this probability depending upon the time separation between an origin and a destination with less time indicating a higher probability. A transaction log for a website for undergraduate engineering learning was analyzed in this manner and weighted transaction counts were compared to the use of straight count inputs to MDS using the Euclidean metric and four dimensions. Weighted results were not significantly different.}, keywords = {BIS}, author = {Reitsma,Reindert and Thabane,L. and MacLeod,J.} } @article {1982916, title = {Teachengineering Resources for K-12}, year = {2004}, month = {2004}, keywords = {BIS}, author = {Reitsma,Reindert and Cyr,M. and Mooney,M. and Sullivan,J. and Ybarra,G.} } @article {1984026, title = {The Design for an Effective Knowledge Repository System}, year = {2003}, month = {2003}, address = {Minneapolis, MN}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Iyer,B.} } @article {1974336, title = {An Efficient Heuristic for Solving an Extended Capacitated Concentrator Location Problem}, journal = {Telecommunication Systems}, volume = {23}, year = {2003}, month = {2003}, pages = {171-199}, abstract = {In this paper, a mathematical model and a solution algorithm are developed for solving an extended capacitated concentrator location problem. Our model extends the conventional formulation by simultaneously addressing the two capacity constraints, total connection ports and maximum data processing rate, on each concentrator to be selected for satisfying the communication demands of the given end-user nodes. Since the problem is NP-complete, an efficient and effective Lagrangian heuristic is developed and tested by solving 100 randomly generated test problems with sizes ranging from 30(nodes){\texttimes}30(concentrators) to150{\texttimes}30. Altogether 58\% of the tested problems are solved optimally with an average solution gap 0.36\% from the optimality and average solution times are from a few seconds to one half of a minute.}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1974526, title = {Exploiting Engineering as a Unique Distance Learning Tool 19, 379-388}, journal = {International Journal of Engineering Education}, volume = {19}, year = {2003}, month = {2003}, pages = {379-388}, keywords = {BIS}, author = {Carlson,L. and Reitsma,Reindert and Brandemuehl,M. and Hertzberg,J. and Sullivan,J. and Gabbard,S.} } @article {1976686, title = {Financial neural network applications: 2000 - 2002 update}, year = {2003}, month = {2003}, address = {Honolulu, Hawaii, USA}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James} } @article {1980891, title = {Genescene: Biomedical text and data mining}, year = {2003}, month = {2003}, address = {Houston, TX, USA}, keywords = {BIS}, author = {Leroy,Gondy and Chen,Hsinchun and Martinez,Jessie and Eggers,S and Falsey,R and Kislin,K and Huang,Zan and Li,Jiexun and Xu,Jennifer and McDonald,Daniel and Ng,Gavin} } @article {1974331, title = {A GRASP Heuristic for Solving an Extended Capacitated Concentrator Location Problem}, journal = {International Journal of Information Technology and Decision Making}, volume = {2}, year = {2003}, month = {2003}, pages = {597-618}, address = {World Scientific Publishing Company}, abstract = {Local Access Networks (LACNs) are often considered the "last mile" over the Internet provided that they are connected to some existing Wide Area Network backbone. In this paper, a revised LACN-WAN interconnection model is presented as an extension to the conventional Capacitated Concentrator Location Problem (CCLP). An efficient heuristic is also developed to seek near-optimal deployment of telecommunication devices (e.g. links, concentrators, etc.) while minimizing the total connection costs for the network interconnection. Our solution algorithm could serve as a decision-making tool in solving problems with a real world size (i.e. 120 nodes and 30 concentrators).}, keywords = {BIS}, author = {Han ,Bernard T. and Raja,V.T.} } @article {1975801, title = {HelpfulMed: Intelligent Searching for Medical Information over the Internet}, journal = {Journal of the Association for Information Science and Technology}, volume = {54}, year = {2003}, month = {2003}, pages = {683-694}, keywords = {BIS, Business Analytics}, author = {Chen,H. and Lally,A.M. and Zhu,Bin and Chau,M.} } @conference {1973246, title = {Knowledge Management and E-Learning: the GetSmart Experience}, booktitle = {Proceedings of the 2003 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2003), May 2003, Houston, Texas}, year = {2003}, month = {2003}, abstract = {The National Science Digital Library (NSDL), launched in December 2002, is emerging as a center of innovation in digital libraries as applied to education. As a part of this extensive project, the GetSmart system was created to apply knowledge management techniques in a learning environment. The design of the system is based on an analysis of learning theory and theinformation search process. Its key notion is the integration of search tools and curriculum support with concept mapping. More than 100 students at the University of Arizona and Virginia Tech used the system in the fall of 2002. A database of more than one thousand student-prepared concept maps has been collected with more than forty thousand relationships expressed in semantic, graphical, node-link representations. Preliminary analysis of the collected data is revealing interesting knowledge representation patterns. }, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2003_GetSmart.pdf}, author = {Marshall,Byron and Zhang,Yiwen and Chen,Hsinchun and Lally,Ann and Shen,Rao and Fox,Edward and Cassel,Lillian} } @article {1982701, title = {An AI-based Heuristic for solving an Extended Concentrator Location Problem}, year = {2002}, month = {2002}, address = {Corvallis, OR}, keywords = {BIS}, author = {Raja,V.T.} } @article {1980901, title = {Discovering association rules with degrees of support and implication (ARsi)}, year = {2002}, month = {2002}, address = {Gent, Belgium}, keywords = {BIS}, author = {Chen,Guoqing and Li,Jiexun and Yan,Peng and Kerre,E E} } @article {1980896, title = {Influence and conditional influence -- New interestingness measures in association rule mining}, year = {2002}, month = {2002}, address = {Melbourne, Australia}, keywords = {BIS}, author = {Liu,De and Chen,Guoqing and Li,Jiexun} } @article {1974531, title = {Loglinear and Multidimensional Scaling Models of Digital Library Navigation}, journal = {International Journal of Human-Computer Studies}, volume = {57}, year = {2002}, month = {2002}, pages = {101-119}, keywords = {BIS}, author = {Buttenfield,B. and Reitsma,Reindert} } @article {1970371, title = {Making Sense of Strategic Alignment: An Interpretive View of Alignment Problems and Practices}, journal = {Journal of Information Technology Management}, volume = {XIII}, year = {2002}, month = {2002}, pages = {15-32}, keywords = {BIS}, author = {Fiegener,Mark K and Coakley,James} } @article {1984031, title = {MedTextus: an intelligent web-based medical meta-search system}, year = {2002}, month = {2002}, address = {Portland, OR}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Leory,G. and Chen,H. and Chen,Y.} } @article {1980906, title = {A SAR-based interesting rule mining algorithm}, year = {2002}, month = {2002}, address = {New Orleans, LA, USA}, keywords = {BIS}, author = {Li,Jiexun and Chen,Guoqing} } @article {1984036, title = {Visualizing a computer mediated communication (CMC) process to facilitate knowledge management}, year = {2002}, month = {2002}, address = {Minneapolis, MN}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @article {1984041, title = {Visualizing Computer-Mediated Communication Process}, year = {2002}, month = {2002}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1984046, title = {Visualizing Computer-Mediated Communication Process}, year = {2002}, month = {2002}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1977331, title = {Can E-Cheating be Prevented?: An Approach to Detect Plagiarism in Computer Skills Courses}, year = {2001}, month = {2001}, keywords = {BIS}, author = {Coakley,James and Tyran,C. K.} } @article {1969311, title = {Financial neural Network applications: 1998-1999 update}, journal = {New Review of Applied Expert Systems and Emerging Technologies}, volume = {7}, year = {2001}, month = {2001}, pages = {167-182}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James} } @article {1977336, title = {A Framework for Controlling Cheating in IS Education}, year = {2001}, month = {2001}, address = {New Orleans, Louisiana}, keywords = {BIS}, author = {Coakley,James and Tyran,C. K.} } @article {1980911, title = {Influence and conditional influence -- New interestingness measures in association rule mining}, year = {2001}, month = {2001}, address = {Melbourne, Australia}, keywords = {BIS}, author = {Li,Jiexun and Chen,Guoqing and Liu,De} } @article {1982706, title = {A Lagrangian Heuristic for Network Design}, year = {2001}, month = {2001}, address = {Corvallis, OR}, keywords = {BIS}, author = {Raja,V.T.} } @article {1984051, title = {Social Visualization for Computer-Mediated Communication: A Knowledge Management Perspective}, year = {2001}, month = {2001}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @article {1977341, title = {Using IT to add value: Innovation versus Efficiency}, year = {2001}, month = {2001}, address = {Portland, OR}, keywords = {BIS, Strategy \& Entrepreneurship}, author = {Coakley,James and Gobeli,Dave} } @article {1984056, title = {Visualizing Computer-Mediated Communication Process}, year = {2001}, month = {2001}, address = {Bloomington, IN}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1984061, title = {Visualizing Computer-Mediated Communication Process}, year = {2001}, month = {2001}, address = {Rochester, NY}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1984066, title = {Visualizing Computer-Mediated Communication Process}, year = {2001}, month = {2001}, address = {Colorado Springs, CO}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin} } @article {1969316, title = {Artificial Neural Networks in Accounting and Finance: Modeling Issues}, journal = {International Journal of Intelligent Systems in Accounting Finance and Management}, volume = {9}, year = {2000}, month = {2000}, pages = {119-144}, abstract = {This article reviews the literature on artificial neural networks (ANNs) applied to accounting and finance problems and summarizes the {\textquoteright}suggestions{\textquoteright} from this literature. The first section reviews the basic foundation of ANNs to provide a common basis for further elaboration and suggests criteria that should be used to determine whether the use of an ANN is appropriate. The second section of the paper discusses development of ANN models including: selection of the learning algorithm, choice of the error and transfer functions, specification of the architecture, preparation of the data to match the architecture, and training of the network The final section presents some general guidelines and a brief summary of research progress and open research questions. Copyright {\textcopyright} 2000 John Wiley \& Sons, Ltd.}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Coakley,James and Brown,Carol} } @article {1983506, title = {Business Application Development}, year = {2000}, month = {2000}, address = {Albany, OR}, keywords = {BIS, MIS}, author = {Swanson,Parker} } @article {1975806, title = {Creating a Large-Scale Content-Based Air Photo Image Digital Library}, journal = {IEEE Transactions on Image Processing}, volume = {9}, year = {2000}, month = {2000}, pages = {163-167}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Ramsey,M. and Chen,H.} } @article {1970376, title = {The E-Commerce Course Project: Creating Educational Linkages with the Value Chain}, journal = {Journal of Informatics Education and Research}, volume = {2}, year = {2000}, month = {2000}, pages = {59-70}, keywords = {BIS}, author = {Tyran,Craig K. and Coakley,James} } @article {1976696, title = {Financial Neural Network Applications: 1998-1999}, year = {2000}, month = {2000}, address = {Philadelphia, PA, USA}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James} } @article {1983501, title = {Inventing the {\textquoteright}Treebook{\textquoteright}: A Workbook with Pages Linked in a Tree}, year = {2000}, month = {2000}, keywords = {BIS, MIS}, author = {Sullivan,Dave} } @article {1974536, title = {A Living Laboratory}, journal = {Proceedings of the IEEE}, volume = {88}, year = {2000}, month = {2000}, pages = {31-40}, keywords = {BIS}, author = {Lightner,M. and Carlson,D. and Sullivan,J. and Brandemuehl,M. and Reitsma,Reindert} } @article {1983606, title = {Personal Action and Ethical Behavior: Responsibilities and Practices.}, year = {2000}, month = {2000}, address = {Corvallis, OR}, keywords = {BIS, MIS}, author = {Tanner,Ray} } @article {1983611, title = {Presentation:Freshmen students in the College of Business: Coursework and Outcome-based Education}, year = {2000}, month = {2000}, address = {Portland, 91}, keywords = {BIS, MIS}, author = {Tanner,Ray} } @article {1982711, title = {Untitled}, year = {2000}, month = {2000}, keywords = {BIS}, author = {Raja,V.T.} } @article {1982716, title = {Using GRASP to solve the Capacitated Concentrator Location Problem}, year = {2000}, month = {2000}, address = {Orlando, Florida}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1975811, title = {Validating a Geographical Image Retrieval System}, journal = {Journal of the Association for Information Science and Technology}, volume = {51}, year = {2000}, month = {2000}, pages = {625-634}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Chen,H.} } @article {1974541, title = {Accessibility of Computer-based Simulation Models in Inherently Conflict-Laden Negotiations}, journal = {Group Decision and Negotiation}, volume = {8}, year = {1999}, month = {1999}, pages = {511-533}, keywords = {BIS}, author = {Zigurs,I. and Reitsma,Reindert and Lewis,C. and Hubscher,R. and Hayes,C.} } @article {1975816, title = {A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images}, journal = {Journal of the Association for Information Science and Technology}, volume = {50}, year = {1999}, month = {1999}, pages = {826-835}, keywords = {BIS, Business Analytics}, author = {Ramsey,M. and Chen,H. and Zhu,Bin} } @article {1982726, title = {A Comparison of Two Modern Heuristics for Designing Local Access Networks}, year = {1999}, month = {1999}, address = {Philadelphia, Pennsylvania}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1984071, title = {Creating a Large Scale Digital Library for Geo-Referenced Information}, year = {1999}, month = {1999}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Ramsey,M and Chen,H. and Hauck,R.V. and Ng,T.D. and Schatz,B.} } @article {1976701, title = {Financial Neural Network Applications: Brief Literature Review and Extensive Bibliography}, year = {1999}, month = {1999}, address = {San Diego, CA, USA}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James} } @article {1982721, title = {The State of the Art of Network Design and Management}, year = {1999}, month = {1999}, address = {New Orleans}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1984076, title = {Support Concept-Based Multimedia Information Retrieval: A Knowledge Management Approach}, year = {1999}, month = {1999}, keywords = {BIS, Business Analytics}, author = {Zhu,Bin and Ramsey,M. and Chen,H. and Hauck,R.V. and Ng,T.D. and Schatz,B.} } @article {1977346, title = {The WWW and Computer Skills Training: Key Issues for Design and Implementation}, year = {1999}, month = {1999}, keywords = {BIS}, author = {Coakley,James and Tyran,C. K.} } @article {1982736, title = {An AI-based Heuristic for solving a Generalized Concentrator Location Problem}, year = {1998}, month = {1998}, address = {Seattle, WA}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1969326, title = {Computer-Mediated Peer Review of Student Papers}, journal = {The Journal of Education for Business}, volume = {74}, year = {1998}, month = {1998}, pages = {117-121}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office, MIS}, author = {Sullivan,Dave and Nielson,Norma and Brown,Carol} } @article {1982741, title = {An Efficient Heuristic for Solving a Generalized Concentrator Location Problem}, year = {1998}, month = {1998}, address = {Seattle, WA}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982746, title = {A Neural-Net Gaussian Machine for Optimal Local Access Network Design}, year = {1998}, month = {1998}, address = {Baltimore, Maryland}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1982751, title = {Student Perceptions of Electronic Classrooms}, year = {1998}, month = {1998}, address = {Chicago, Illinois}, keywords = {BIS}, author = {Raja,V.T. and Kumar,Anil} } @article {1982731, title = {Untitled}, year = {1998}, month = {1998}, keywords = {BIS}, author = {Raja,V.T.} } @article {1970381, title = {Using a Computer Based Version of The Beer Game - Lessons Learned,"}, journal = {Journal of Management Education}, volume = {22}, year = {1998}, month = {1998}, pages = {416-424}, keywords = {BIS}, author = {Coakley,James and Drexler,John A and Kircher,Anna E and Larson,Erik W} } @article {1970386, title = {Using a Computer-Based Version of the Beer Game}, journal = {Journal of Management Education}, year = {1998}, month = {1998}, keywords = {BIS, Management}, author = {Larson,Erik and Coakley,James and Drexler,John} } @article {1982756, title = {Integration of India into the Global Economy {\textquotedblright} An Information Technology Perspective}, year = {1997}, month = {1997}, address = {Dekalb, Illinois}, keywords = {BIS}, author = {Raja,V.T. and Kumar,Anil} } @article {1974546, title = {Object-oriented Simulation and Evaluation of River Basin Operations}, journal = {Journal of Geographic Information and Decision Analysis}, volume = {1}, year = {1997}, month = {1997}, pages = {9-24}, keywords = {BIS}, author = {Reitsma,Reindert and Carron,J.} } @article {1974551, title = {Object-oriented Simulation and Evaluation of River Basin Operations. Journal of Geographic Information and Decision Analysis. 1, 1, pp. 10-24}, volume = {1}, year = {1997}, month = {1997}, pages = {1--24}, keywords = {BIS}, author = {Reitsma,Reindert and Carron,John C.} } @article {1982761, title = {Some Design and Planning Issues for Local Access Networks}, year = {1997}, month = {1997}, address = {Taiwan}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T.} } @article {1969336, title = {Enhancing Business Classes with World Wide Web}, journal = {Journal of Education for Business}, volume = {71}, year = {1996}, month = {1996}, pages = {317-323}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office, MIS}, author = {Brown,Carol and Nielson,Norma and Sullivan,Dave} } @article {1970396, title = {An Expert System to Diagnose Anemia and Report Results Directly on Hematology Forms}, journal = {Computers and Biomedical Research}, year = {1996}, month = {1996}, pages = {16-26}, keywords = {BIS}, author = {Coakley,James} } @article {1974556, title = {Structure and Support of Water Resources Management and Decision Making}, journal = {Journal of Hydrology}, volume = {177}, year = {1996}, month = {1996}, pages = {253-268}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1970391, title = {Using Pattern Analysis Methods to Supplement Attention-Directing Analytical Procedures}, journal = {Expert Systems with Applications}, year = {1996}, month = {1996}, pages = {513-528}, keywords = {BIS}, author = {Coakley,James} } @article {1970401, title = {CIO {\textquoteright}Impression Management:{\textquoteright} Problems and Practices}, journal = {Journal of Systems Management}, year = {1995}, month = {1995}, pages = {56-61}, keywords = {BIS}, author = {Coakley,James} } @article {1976856, title = {ISO9001 and IPP}, year = {1995}, month = {1995}, address = {San Francisco, CA}, keywords = {BIS}, author = {Cabak,Carrie} } @article {1982771, title = {A Lagrangean Heuristic for the Design of Capacitated Star-Star Concentrator Networks}, year = {1995}, month = {1995}, address = {Los Angeles, CA}, keywords = {BIS}, author = {Raja,V.T.} } @article {1969361, title = {Neural Networks Enter the World of Management Accounting}, journal = {Management Accounting}, volume = {LXXVI}, year = {1995}, month = {1995}, pages = {51-53, 56-57}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James and Phillips,Mary Ellen} } @article {1969366, title = {Neural Networks: Nuts and Bolts}, journal = {Management Accounting}, volume = {LXXVI}, year = {1995}, month = {1995}, pages = {54-55}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James and Phillips,Mary Ellen} } @article {1982766, title = {Optimal Telecommunication Facility Planning Under Uncertainty}, year = {1995}, month = {1995}, address = {Pittsburgh, PA}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1982776, title = {A Robustness Approach to the Telecommunication Facility Management Problem in the Presence of Demand Uncertainty from End-Users}, year = {1995}, month = {1995}, address = {Boca Raton, Florida}, keywords = {BIS}, author = {Raja,V.T. and Han ,Bernard T. and Chen,Bin Tong} } @article {1969376, title = {Conference Report: The Fourth International Symposium on Intelligent Systems in Accounting, Finance and Management}, journal = {International Journal of Intelligent Systems in Accounting Finance and Management}, volume = {3}, year = {1994}, month = {1994}, pages = {223-235}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Brown,Carol and Coakley,James and Eining,Martha M} } @article {1974561, title = {Construction Kit for Visual Programming of River-Basin Models}, journal = {Journal of Computing in Civil Engineering}, volume = {8}, year = {1994}, month = {1994}, pages = {378-384}, keywords = {BIS}, author = {Reitsma,Reindert and Sautins,A. and Wehrend,S.} } @article {1982781, title = {An Intelligent Solver for the Generalized Telecommunication Facility Location Problem}, year = {1994}, month = {1994}, address = {Honolulu, Hawaii}, keywords = {BIS}, author = {Raja,V.T. and Han,Bernard T.} } @article {1969391, title = {Artificial Neural Networks Applied to Ratio Analysis in the Analytical Review Process}, journal = {International Journal of Intelligent Systems in Accounting, Finance and Management}, volume = {2}, year = {1993}, month = {1993}, pages = {19-39}, keywords = {Accounting, BIS, Dean{\textquoteright}s Office}, author = {Coakley,James and Brown,Carol} } @article {1976861, title = {ISO9001 and the Paper Industry}, year = {1993}, month = {1993}, address = {San Diego, CA}, keywords = {BIS}, author = {Cabak,Carrie} } @article {1976866, title = {ISO9001 Registration Process}, year = {1993}, month = {1993}, address = {San Jose, CA}, keywords = {BIS}, author = {Cabak,Carrie} } @article {1970406, title = {A Compari-son of User Satisfaction with MIS Across Two Cultures}, journal = {International Journal of Logistics Management}, volume = {2}, year = {1991}, month = {1991}, pages = {22-29}, keywords = {BIS}, author = {Coakley,James} } @article {1974566, title = {WODAN: een Venster op Beleidsinformatie (WODAN: a Window on Decision-making Information)}, journal = {SWIM}, volume = {5}, year = {1990}, month = {1990}, pages = {15-24}, keywords = {BIS}, author = {Reitsma,Reindert and Hendriks,P.} } @article {1974571, title = {A Causal Typology of Migration: The Role of Commuting. Regional Studies}, journal = {Regional Studies}, volume = {22}, year = {1988}, month = {1988}, pages = {331-340}, keywords = {BIS}, author = {Reitsma,Reindert and Vergoossen,A.} } @article {1974576, title = {Artificiele Intelligentie in Geografisch Onderzoek: Cognitie, {\textquoteleft}Engineering{\textquoteright} en Geografische Modellen (Artificial Intelligence in Geographical Research: Cognition, {\textquoteleft}Engineering{\textquoteright} and Geographical Models)}, journal = {SWIM}, volume = {1}, year = {1986}, month = {1986}, pages = {4-7}, keywords = {BIS}, author = {Reitsma,Reindert} } @article {1970411, title = {The Expectations of Accounting Errors in Medium-Sized Manufacturing Firms}, journal = {Advances in Accounting}, volume = {2}, year = {1985}, month = {1985}, keywords = {BIS}, author = {Coakley,James} } @article {1975171, title = {Bayesian Estimation of a Finite Population Total using Auxiliary Information in the Presence of Nonresponse}, journal = {Journal of the American Statistical Association}, volume = {77}, year = {1983}, month = {1983}, pages = {97-102}, keywords = {BIS, Business Analytics}, author = {Smouse,Evan} } @article {1975176, title = {Estimating proportionate changes in rates}, journal = {American Journal of Epidemiology}, volume = {117}, year = {1983}, month = {1983}, pages = {235-243}, keywords = {BIS, Business Analytics}, author = {Smouse,Evan} } @article {1975181, title = {Nonparametric Bayesian Inference for Dichotomous Response Models}, journal = {Communications in Statistics - Theory \& Methods}, volume = {12}, year = {1983}, month = {1983}, pages = {2847-2859}, keywords = {BIS, Business Analytics}, author = {Smouse,Evan} } @article {1975186, title = {Statistical Concepts and Proper Use}, journal = {Archives of Pediatrics and Adolescent Medicine}, volume = {137}, year = {1983}, month = {1983}, pages = {503}, keywords = {BIS, Business Analytics}, author = {Smouse,Evan} } @article {1984726, title = {Assessing the Connections Among Top Management Support, IT Assimilation, and Business Value of IT: A Meta-Analysis}, month = {2023 In Press}, keywords = {BIS}, author = {Roberts,Nicholas and Jeyaraj,A. and Gerow,J.} }