%0 Conference Paper
%B Proceedings of the 56th Hawaii International Conference on System Sciences
%D 2023
%T Best of Both Worlds: The Inclusion of Gamification in Virtual Lab Environments to Increase Educational Value
%A Shadbad,Forough
%A Bahr,Gabriel
%A Luse,Andy
%A Hammer,Bryan
%K BIS
%B Proceedings of the 56th Hawaii International Conference on System Sciences
%8 2023
%G eng
%2 b
%4 251500314624
%$ 251500314624
%0 Journal Article
%J Journal of Information Systems Education
%D 2023
%T Hackalytics: Using Computer Hacking to Engage Students in Analytics
%A Luse,Andy
%A Shadbad,Forough
%K BIS
%B Journal of Information Systems Education
%8 2023
%G eng
%2 a
%4 233743620096
%$ 233743620096
%0 Conference Paper
%B Proceedings IV2023 - 27th International Conference on Information Visualisation
%D 2023
%T Interactive Network Visualization of Educational Standards, Learning Resources and Learning Progressions
%A Reitsma,Reindert
%A Hoglund,Brian
%A Achatz,Nikolas
%A Marks,Andrea
%K BIS
%K Design Program
%X We present a novel, network- and browser-based visualization of the Next Generation Science Standards (NGSS). The NGSS are meant to guide (USA) K-12 science and engineering learning and are almost always presented using text and tables. Their connectivity, however, lends them well for network modeling and interactive network visualization.
%B Proceedings IV2023 - 27th International Conference on Information Visualisation
%8 2023
%G eng
%2 b
%4 256122902528
%$ 256122902528
%0 Conference Paper
%B WISP2022: 2022 Workshop on Information Security and Privacy (WISP)
%D 2022
%T Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?
%A Marshall,Byron
%A Shadbad,Forough
%A Curry,Michael
%A Biros,David
%K Accounting
%K BIS
%X To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.
%B WISP2022: 2022 Workshop on Information Security and Privacy (WISP)
%C Copenhagen, Denmark, Dec. 2022
%8 2022
%G eng
%2 b
%4 245830387712
%$ 245830387712
%0 Conference Paper
%B WISP2022: 2022 Workshop on Information Security and Privacy (WISP)
%D 2022
%T Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?
%A Marshall,Byron
%A Shadbad,Forough
%A Curry,Michael
%A Biros,David
%K Accounting
%K BIS
%X To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.
%B WISP2022: 2022 Workshop on Information Security and Privacy (WISP)
%C Copenhagen, Denmark, Dec. 2022
%8 2022
%G eng
%U https://aisel.aisnet.org/wisp2022/19
%2 b
%4 245830387712
%$ 245830387712
%0 Generic
%D 2022
%T Does Platform Control Matter? A Meta-Analysis
%A Roberts,Nicholas
%A Kim,I.
%A Iyengar,K.
%A Gerow,J.
%K BIS
%B Front Range Information Systems Research Seminar
%8 2022
%G eng
%2 c
%4 272321890304
%$ 272321890304
%0 Journal Article
%J European Journal of Information Systems
%D 2022
%T Generational Differences in Perceiving the Technology Interruptions: A qualitative Study
%A Kalgotra,Pankush
%A Baham,Corey
%A Shadbad,Forough
%A Sharda,Ramesh
%K BIS
%B European Journal of Information Systems
%P 1-21
%8 2022
%G eng
%2 a
%4 222247022592
%$ 222247022592
%0 Journal Article
%J Journal of Operations Management
%D 2022
%T Need for Speed, but How Much Does It Cost? Unpacking the Fee-Speed Relationship in Cryptocurrency Transactions
%A Shang,Guangzhi
%A Ilk,Noyan
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Journal of Operations Management
%8 2022
%G eng
%2 a
%4 218914275328
%$ 218914275328
%0 Audiovisual Material
%D 2022
%T NGSS Explorer (Curriculum Network Visualization)
%A Reitsma,Reindert
%A Hoglund,Brian
%A Achatz,Nikolas
%K BIS
%8 2022
%G eng
%U https://www.teachengineering.org/ngss_explorer
%2 d
%4 253092712448
%$ 253092712448
%0 Conference Paper
%B Springer Cham
%D 2022
%T Pixel Importance: The Impact of Saturation and Brightness on the Spread of Information on Social Media
%A Kaskela,Timothy
%A Zhu,Bin
%A Sayali,Dhamapurkar
%K BIS
%K Business Analytics
%B Springer Cham
%P 105
%8 2022
%@ 1865-1348
%G eng
%N 1
%2 b
%4 233601298432
%$ 233601298432
%0 Journal Article
%J Communications of the Association for Information Systems
%D 2022
%T Psychological Contract Violations on Information Disclosure: A study of Interpersonal Arrangements and Trust Transference in Social Media Platforms
%A Hammer,Bryan
%A Shadbad,Forough
%K BIS
%B Communications of the Association for Information Systems
%8 2022
%G eng
%2 a
%4 222247026688
%$ 222247026688
%0 Conference Paper
%B Association for Information Systems - Special Interest Group - Education (AIS - SIG - Ed) - 2021
%D 2022
%T Supporting Student Collaboration for Online Learning: The Impact of Two Instructional Interventions
%A Tyran,Craig K
%A Raja,V.T.
%A Tyran,Kristi L
%K BIS
%X This research provides an overview of an exploratory study that is being conducted to investigate two potential ways in which an instructor may be able to support online student teams assigned to analyze a case and create a collaborative digital document. Specifically, the study was designed to examine the impact of instructor leadership style and process structure on student perceptions and performance. Data has been collected for 60 3-person teams of students enrolled in an upper-division undergraduate information systems course entitled “Business Process Management.” The research data has been collected and will be analyzed. Preliminary findings from the study will be discussed.
%B Association for Information Systems - Special Interest Group - Education (AIS - SIG - Ed) - 2021
%8 2022
%G eng
%2 b
%4 233775153152
%$ 233775153152
%0 Book
%D 2022
%T A Tale of Two Systems. A Review of the architecting and re-architecting of a long-lived website; (2nd edition)
%A Reitsma,Reindert
%A Krueger,Kevin
%K BIS
%8 2022
%G eng
%U https://open.oregonstate.education/taleoftwosystems/
%2 d
%4 158829608960
%$ 158829608960
%0 Generic
%D 2022
%T Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress
%A Curry,Michael
%A Marshall,Byron
%A Shadbad,Forough
%A Hong,Sanghyun
%K Accounting
%K BIS
%X This extended abstract describes our planned efforts to usefully integrate psychometric and telemetry data to help identify cybersecurity risks and more effectively analyze cybersecurity events.
%C Copenhagen, Denmark, Dec. 2022
%8 2022
%G eng
%2 d
%4 245830223872
%$ 245830223872
%0 Book Section
%D 2021
%T Breadcrumbs
%A Reitsma,Reindert
%K BIS
%X Reflections on the work and contributions of Dr. Paul Hendriks, Professor of Knowledge Management at Radboud University, Nijmegen, The Netherlands.
%C Nijmegen
%8 2021
%G eng
%2 d
%4 233150005248
%$ 233150005248
%0 Journal Article
%J Research Policy
%D 2021
%T Destabilization and Consolidation: Conceptualizing, Measuring, and Validating the Dual Characteristics of Technology
%A Chen,Jiyao
%A Shao,Rong
%A Fan,Shaokun
%K BIS
%K Business Analytics
%K Finance
%K Strategy & Entrepreneurship
%B Research Policy
%V 50
%P 104-115
%8 2021
%G eng
%N 1
%2 a
%4 162168494080
%$ 162168494080
%0 Journal Article
%J Journal of Systems Science and Systems Engineering
%D 2021
%T Dividend or No Dividend in Delegated Blockchain Governance: A Game Theoretic Analysis
%A Pan,Dapeng
%A Zhao,J. Leon
%A Fan,Shaokun
%A Zhang,Ziqiong
%K BIS
%K Business Analytics
%B Journal of Systems Science and Systems Engineering
%P 1-19
%8 2021
%G eng
%2 a
%4 218917623808
%$ 218917623808
%0 Book Section
%D 2021
%T Does Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions
%A Shadbad,Forough
%A Biros,David
%K BIS
%8 2021
%G eng
%2 d
%4 222247006208
%$ 222247006208
%0 Journal Article
%J Journal of Systems and Information Technology
%D 2021
%T Enhancing decision-making with data quality metadata
%A Shankaranarayanan,G
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Journal of Systems and Information Technology
%V 23
%8 2021
%G eng
%N 2
%2 a
%4 167338096640
%$ 167338096640
%0 Journal Article
%J ACM Transactions on Management Information Systems
%D 2021
%T Machine Learning and Survey-based Predictors of InfoSec Non-Compliance
%A Marshall,Byron
%A Curry,Michael
%A Correia,John
%A Crossler,Robert E
%K Accounting
%K BIS
%X Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM's innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69% of the riskiest individuals within the top 25% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.
%B ACM Transactions on Management Information Systems
%V 13
%P 1-20
%8 2021
%G eng
%N 2
%2 a
%4 161400494080
%$ 161400494080
%0 Journal Article
%J ACM Transactions on Management Information Systems
%D 2021
%T Machine Learning and Survey-based Predictors of InfoSec Non-Compliance
%A Marshall,Byron
%A Curry,Michael
%A Correia,John
%A Crossler,Robert E
%K Accounting
%K BIS
%B ACM Transactions on Management Information Systems
%8 2021
%G eng
%2 a
%4 161400494080
%$ 161400494080
%0 Journal Article
%J MIS Quarterly
%D 2021
%T Stability of Transaction Fees in Bitcoin: A Supply and Demand Perspective
%A Ilk,Noyan
%A Shang,Guangzhi
%A Fan,Shaokun
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B MIS Quarterly
%C Canyon
%V 45
%P 563-692
%8 2021
%G eng
%N 2
%2 a
%4 180578840576
%$ 180578840576
%0 Journal Article
%J Journal of Computer Information Systems
%D 2021
%T Understanding Employee Information Security Policy Compliance from Role Theory Perspective
%A Shadbad,Forough
%A Biros,David
%K BIS
%B Journal of Computer Information Systems
%8 2021
%G eng
%2 a
%4 222246877184
%$ 222246877184
%0 Journal Article
%D 2021
%T Understanding IT Value at the Managerial Level: Managerial Ambidexterity, Seizing Opportunities, and the Moderating Role of Information Systems Use
%A Roberts,Nicholas
%A Qahri-Saremi,H.
%A Vijayasarathy,L.
%K BIS
%8 2021
%G eng
%2 a
%4 272321406976
%$ 272321406976
%0 Journal Article
%J Decision Sciences
%D 2020
%T Combining Textual Cues with Social Clues: Utilizing Social Features to Improve Sentiment Analysis in Social Media
%A Ilk,Noyan
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Decision Sciences
%8 2020
%G eng
%2 a
%4 183583891456
%$ 183583891456
%0 Journal Article
%D 2020
%T Connecting the Role of the Information Technology Function to its Contribution to the Organization
%A Roberts,Nicholas
%A Gerow,J.
%K BIS
%8 2020
%G eng
%2 a
%4 272321409024
%$ 272321409024
%0 Generic
%D 2020
%T Connecting to Place - Virtually
%A Arora,Vipin
%A Semken,Steven
%K BIS
%8 2020
%G eng
%2 c
%4 219740094464
%$ 219740094464
%0 Generic
%D 2020
%T Impact of Team Size on Technological Contributions: Unpacking Disruption and Development
%A Chen,Jiyao
%A Shao,Rong
%A Fan,Shaokun
%A Li,Jiexun
%K BIS
%K Business Analytics
%K Finance
%K Strategy & Entrepreneurship
%B AOM Annual Meeting
%C Vancouver CA
%8 2020
%G eng
%2 c
%4 202782855168
%$ 202782855168
%0 Conference Paper
%B American Society for Engineering Education (ASEE)
%D 2020
%T K-12 Engineering and the Next Generation Science Standards (NGSS): A Network Visualization and Analysis
%A Reitsma,Reindert
%A Hoglund,Brian
%A Marks,Andrea
%A Chaker,Dua
%A Marks,Andrea
%K BIS
%K Design Program
%X We present an interactive network visualization of the Next Generation Science Standards (NGSS) and its coverage by collections of aligned curriculum. The visualization presents an alternative to the usual presentation of the NGSS as a set of linked tables. Users can view entire grade bands, search for or drill down to the level of individual NGSS standards or curricular items, or display groups of standards across grade bands. NGSS-aligned curriculum collections can be switched on and off to visually explore their NGSS coverage. Viewing the NGSS and associated curriculum this way facilitates navigating the NGSS and can help with assessment of alignments as lacking or anomalous. Modeling the NGSS as a network also allows for the computation of network metrics to provide insight into core characteristics of the network. It also provides for detecting anomalies and unexpected patterns.
%B American Society for Engineering Education (ASEE)
%8 2020
%G eng
%U https://strategy.asee.org/k-12-engineering-and-the-next-generation-science-standards-a-network-visualization-and-analysis-resource-exchange
%2 b
%4 202185967616
%$ 202185967616
%0 Journal Article
%D 2020
%T Managing Software Development Projects for Success: Aligning Plan- and Agility-Based Approaches to Project Complexity and Project Dynamism
%A Butler,C.
%A Roberts,Nicholas
%A Vijayasarathy,L.
%K BIS
%8 2020
%G eng
%2 a
%4 272321411072
%$ 272321411072
%0 Journal Article
%D 2020
%T Promoting a Sense of Place Virtually: A Review of the ESA Weekly Water Cooler Chat Focused on Virtual Sense of Place
%A Hoke,Kelly
%A O’Connell,Kari
%A Semken,Steven
%A Arora,Vipin
%K BIS
%C Wiley Periodicals
%V 101
%8 2020
%G eng
%U https://doi.org/10.1002/bes2.1734
%N 4
%2 a
%4 219740047360
%$ 219740047360
%0 Conference Paper
%B Americas Conference on Information Systems
%D 2020
%T A Qualitative Approach to Understand Unintentional Information Security Misbehaviors
%A Shadbad,Forough
%A Baham,Corey
%A Biros,David
%K BIS
%B Americas Conference on Information Systems
%8 2020
%G eng
%2 b
%4 222359601152
%$ 222359601152
%0 Generic
%D 2020
%T Teaching and maintaining campus community during a pandemic
%A Raja,V.T.
%A Lewis,Steven
%A Tolan,Jody
%K BIS
%B Higher Ed Community of Practice - Deloitte Faculty Panel
%C Portland (Zoom)
%8 2020
%G eng
%2 c
%4 219667093504
%$ 219667093504
%0 Journal Article
%J Information Technology and People
%D 2020
%T Technostress and its Influence on Employee Information Security Policy Compliance
%A Shadbad,Forough
%A Biros,David
%K BIS
%B Information Technology and People
%8 2020
%G eng
%2 a
%4 222246856704
%$ 222246856704
%0 Journal Article
%J Information & Management
%D 2020
%T A text analytics framework for automated communication pattern analysis
%A Fan,Shaokun
%A Ilk,Noyan
%K BIS
%K Business Analytics
%B Information & Management
%V 57
%8 2020
%G eng
%N 4
%2 a
%4 180758902784
%$ 180758902784
%0 Journal Article
%D 2019
%T Connecting Personality Traits to Social Networking Site Addiction: The Mediating Role of Motives
%A Chen,A.
%A Roberts,Nicholas
%K BIS
%8 2019
%G eng
%2 a
%4 272321413120
%$ 272321413120
%0 Conference Paper
%B Proceeding of Midwest Association for Information Systems
%D 2019
%T Developing an Unintentional Information Security Misbehavior Scale (UISMS)
%A Shadbad,Forough
%A Biros,David
%K BIS
%B Proceeding of Midwest Association for Information Systems
%8 2019
%G eng
%2 b
%4 222359658496
%$ 222359658496
%0 Generic
%D 2019
%T Digital Platform Life Cycles in Nascent Markets
%A Roberts,Nicholas
%A Kim,I.
%K BIS
%B Front Range Information Systems Research Seminar
%8 2019
%G eng
%2 c
%4 272321892352
%$ 272321892352
%0 Journal Article
%D 2019
%T Effective Use of Analytic DSS and Job Performance
%A Campbell,D.
%A Roberts,Nicholas
%K BIS
%8 2019
%G eng
%2 a
%4 272321462272
%$ 272321462272
%0 Generic
%D 2019
%T Examining Technostress on Employees Security-related Behaviors
%A Shadbad,Forough
%A Biros,David
%A Sharma,Madhav
%K BIS
%B INFORMS Annual Meeting
%8 2019
%G eng
%2 c
%4 222359953408
%$ 222359953408
%0 Journal Article
%J Dialectic
%D 2019
%T The Future of Data: Too Much Visualization Too Little Understanding?
%A Reitsma,Reindert
%A Marks,Andrea
%K BIS
%K Design Program
%X Data is part of our lives. Information visualizations help us make sense of this data and possibly help us make changes because of it. In this paper, however, we estimate some of the consequences of what seems an ominous trend, namely the needless complication and beautification of such visualizations. We argue that with increased availability of data and ever more powerful and easy to use visualization software, it becomes easy to succumb to the temptation to impress rather than to communicate. And so we wonder: is a future filled with visualizations that are visually complex and stunning, yet fail to properly communicate the data emerging? To assess some of the consequences of this practice we selected five examples from published sources, developed far simpler (and less attractive) versions from the identical data, randomly exposed these visualizations to subjects and asked simple questions about the displayed data. We find that, on average, it takes subjects longer to comprehend the complex versions, that it takes subjects longer to extract information from these versions and that they make more and larger errors doing so. The experiment shows that subjects eventually do learn how to navigate the complex versions, but by then they have spent significantly more time and made serious interpretative errors.
%B Dialectic
%V 2
%8 2019
%G eng
%U https://quod.lib.umich.edu/d/dialectic/14932326.0002.207?view=text;rgn=main
%N 2
%2 a
%4 161824772096
%$ 161824772096
%0 Conference Paper
%B WISP2021: 2021 Workshop on Information Security and Privacy (WISP)
%D 2019
%T Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors
%A Curry,Michael
%A Marshall,Byron
%A Crossler,Robert E
%K Accounting
%K BIS
%X Cybersecurity researchers have made significant steps to understand the mechanisms of security policy compliance and unify theories of security behavior. However, due partly to the limitations of traditional variance model statistical methods, these studies by necessity typically focus on a single security policy issue. By contrast, new machine learning algorithms frequently employed by data scientists offer great promise as a new statistical approach for examining robust individualized interpretations of policy and can also identify potentially risky behaviors. This study proposes to explore cybersecurity training impediments of multiple protection motivation behaviors in ransomware prevention training. It demonstrates the feasibility of using machine learning with survey items from the cybersecurity research to predict non-compliance. It also illustrates a potentially novel method to statistically validate research theory through higher levels of ML prediction. This study is a work in progress and we seek feedback on its design and relevance.
%B WISP2021: 2021 Workshop on Information Security and Privacy (WISP)
%8 2019
%G eng
%U https://aisel.aisnet.org/wisp2019/1
%2 b
%4 245822898176
%$ 245822898176
%0 Generic
%D 2019
%T Impacts of Consensus Algorithms in Cryptocurrency: A Theoretical Analysis of PoW versus PoS in Ethereum
%A Pan,Dapeng
%A Zhao,J. Leon
%A Fan,Shaokun
%K BIS
%K Business Analytics
%P 16-22
%8 2019
%G eng
%N 1
%2 d
%4 201883080704
%$ 201883080704
%0 Journal Article
%J Journal of Information Systems
%D 2019
%T InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior
%A Curry,Michael
%A Marshall,Byron
%A Correia,John
%A Crossler,Robert E
%K Accounting
%K BIS
%X The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations' ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior.
%B Journal of Information Systems
%V 33
%P 201-225
%8 2019
%G eng
%U https://doi.org/10.2308/isys-52381
%N 3
%2 a
%4 162472024064
%$ 162472024064
%0 Generic
%D 2019
%T Knowledge Networks, Collaboration Networks, and Innovation: A Replication and Extension
%A Chen,Jiyao
%A Shen,Jia
%A Fan,Shaokun
%K BIS
%K Business Analytics
%K Strategy & Entrepreneurship
%B Academy of Management Annual Meeting
%C Boston
%8 2019
%G eng
%2 c
%4 185042847744
%$ 185042847744
%0 Generic
%D 2019
%T A Process Mining Framework for Communication Pattern Analysis in Online Contact Centers
%A Ilk,Noyan
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Winter Conference On Business Analytics
%C Salt lake city
%8 2019
%G eng
%2 c
%4 180759275520
%$ 180759275520
%0 Conference Paper
%B Proceedings of the 52nd Hawaii International Conference on System Sciences
%D 2019
%T Psychological Contract Violation and Sharing Intention on Facebook
%A Hammer,Bryan
%A Zhang,Tianjian
%A Shadbad,Forough
%A Agrawal,Rupesh
%K BIS
%B Proceedings of the 52nd Hawaii International Conference on System Sciences
%8 2019
%G eng
%2 b
%4 222359640064
%$ 222359640064
%0 Generic
%D 2019
%T A Supply and Demand Model for Bitcoin’s Data Space Marketplace
%A Ilk,Noyan
%A Shang,Guangzhi
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Workshop on Information Technologies and Systems
%C Munich
%8 2019
%G eng
%2 c
%4 201886902272
%$ 201886902272
%0 Generic
%D 2018
%T Blockchain-Enabled Trust: The Case of Inter-Firm Dataflow
%A Zhao,J. Leon
%A Fan,Shaokun
%A Zheng,Eric
%K BIS
%K Business Analytics
%B Americas Conference on Information Systems (AMCIS)
%C New Orleans
%8 2018
%G eng
%2 c
%4 180759222272
%$ 180759222272
%0 Journal Article
%J Information & Management
%D 2018
%T Community Engagement and Online Word of Mouth: An Empirical Investigation
%A Wu,Ji
%A Fan,Shaokun
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B Information & Management
%V 55
%P 258-270
%8 2018
%G eng
%N 2
%2 a
%4 162125578240
%$ 162125578240
%0 Generic
%D 2018
%T Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation
%A Chen,Jiyao
%A Shao,Rong
%A Fan,Shaokun
%K BIS
%K Business Analytics
%K Finance
%K Strategy & Entrepreneurship
%B Academy of Management Annual Conference
%C Chicago, IL
%8 2018
%G eng
%2 c
%4 162437109760
%$ 162437109760
%0 Generic
%D 2018
%T An Efficient Recommender System Using Locality Sensitive Hashing
%A Zhang,Kunpeng
%A Fan,Shaokun
%A Wang,Harry
%K BIS
%K Business Analytics
%B Proceedings of the 51st Hawaii International Conference on System Sciences
%C Hawaii
%8 2018
%G eng
%2 c
%4 162460182528
%$ 162460182528
%0 Conference Paper
%D 2018
%T Exploratory Study for Readmission in Cancer Patients
%A Huangfu,L.
%A Hayne,S.
%A Ma,J.
%A Roberts,Nicholas
%K BIS
%8 2018
%G eng
%2 b
%4 272321689600
%$ 272321689600
%0 Conference Paper
%B Pre-ICIS Workshop on Information Security and Privacy (WISP 2018)
%D 2018
%T Fear Appeals Versus Priming in Ransomware Training
%A Curry,Michael
%A Marshall,Byron
%A Crossler,Rob
%A Correia,John
%K Accounting
%K BIS
%X Employee non-compliance is at the heart of many of today’s security incidents. Training programs often employ fear appeals to motivate individuals to follow policy and take action to reduce security risks. While the literature shows that fear appeals drive intent to comply, there is much less evidence of their impact after intention is formed. Building on IPAM – a process nuanced model for compliance training and assessment – this study contrasts the impact of fear appeals vs. self-efficacy priming on ransomware training. In our proposed study, a pool of students will participate in a three-step series of training events. Some participants will encounter enhanced fear appeals at each step while others will be presented with materials that include
priming signals intended to foster development of increased self-efficacy. Previously identified
drivers of behavior (intent, processed-nuanced forms of self-efficacy, and outcome expectations)
are measured so that the effect of the treatments can be contrasted. A scenario agreement
methodology is used to indicate behavior as a dependent variable. We expect to show that while
fear appeals are useful and help build intent to comply at the motivational stage, process-nuanced
self-efficacy treatments are expected have a stronger effect on behavior post-intentional.
%B Pre-ICIS Workshop on Information Security and Privacy (WISP 2018)
%8 2018
%G eng
%U https://aisel.aisnet.org/wisp2018/1/
%2 b
%4 186660982784
%$ 186660982784
%0 Journal Article
%J Data Base for Advances in Information Systems
%D 2018
%T InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior
%A Curry,Michael
%A Marshall,Byron
%A Crossler,Robert E
%A Correia,John
%K Accounting
%K BIS
%X While much of the extant InfoSec research relies on single assessment models that predict intent to act, this article proposes a multi-stage InfoSec Process Action Model (IPAM) that can positively change individual InfoSec behavior. We believe that this model will allow InfoSec researchers to focus more directly on the process which leads to action and develop better interventions that address problematic security behaviors. Building on successful healthcare efforts which resulted in smoking cessation, regular exercise and a healthier diet, among others, IPAM is a hybrid, predictive, process approach to behavioral InfoSec improvement. IPAM formulates the motivational antecedents of intent as separate from the volitional drivers of behavior. Singular fear appeals often seen in InfoSec research are replaced by more nuanced treatments appropriately differentiated to support behavioral change as part of a process; phase-appropriate measures of self-efficacy are employed to more usefully assess the likelihood that a participant will act on good intentions; and decisional balance –assessment of pro and con perceptions – is monitored over time. These notions better align InfoSec research to both leading security practice and to successful comparators in healthcare. We believe IPAM can both help InfoSec research models better explain actual behavior and better inform practical security-behavior improvement initiatives.
%B Data Base for Advances in Information Systems
%V 49
%8 2018
%G eng
%U https://www.researchgate.net/publication/321138048_InfoSec_Process_Action_Model_IPAM_Systematically_Addressing_Individual_Security_Behavior
%N SI
%2 a
%4 144538011648
%$ 144538011648
%0 Generic
%D 2018
%T Investigating the Fee-Delay Relationship in Cryptocurrency Transactions: Evidence from the Bitcoin Network
%A Ilk,Noyan
%A Fan,Shaokun
%A Shang,Guangzhi
%K BIS
%K Business Analytics
%B Workshop on Information Technologies and Systems
%C Santa Clara
%8 2018
%G eng
%2 c
%4 180787425280
%$ 180787425280
%0 Journal Article
%J Expert Systems with Applications
%D 2018
%T Making Sense of Organization Dynamics Using Text Analysis.
%A Li,Jiexun
%A Wu,Zhaohui
%A Zhu,Bin
%A Xu,Kaiquan
%K BIS
%K Business Analytics
%K Supply Chain
%B Expert Systems with Applications
%8 2018
%G eng
%2 a
%4 152771403776
%$ 152771403776
%0 Generic
%D 2018
%T Organizational Identity and Digital Platform Evolution
%A Roberts,Nicholas
%A Kim,I.
%K BIS
%B Front Range Information Systems Research Seminar
%8 2018
%G eng
%2 c
%4 272321894400
%$ 272321894400
%0 Journal Article
%D 2018
%T Untitled
%A Huangfu,L.
%A Hayne,S.
%A Ma,J.
%A Roberts,Nicholas
%K BIS
%8 2018
%G eng
%2 a
%4 272321415168
%$ 272321415168
%0 Journal Article
%D 2018
%T Virtual Customer Environment Design and Organizational Innovation: An Exploration-Exploitation Perspective
%A Roberts,Nicholas
%A Dinger,M.
%K BIS
%8 2018
%G eng
%2 a
%4 272321417216
%$ 272321417216
%0 Conference Paper
%B the Fifteeth workshop on e-Business (WeB 2016) in Dublin
%D 2017
%T BEHAVIOR THEORY ENABLED GENDER CLASSIFICATION METHOD
%A Wang,Jing
%A Yan,Xiangbin
%A Zhu,Bin
%K BIS
%K Business Analytics
%B the Fifteeth workshop on e-Business (WeB 2016) in Dublin
%8 2017
%G eng
%2 b
%4 145142386688
%$ 145142386688
%0 Journal Article
%J INFORMS Journal on Computing
%D 2017
%T Collaboration Process Pattern Approach to Improving Teamwork Performance: A Data Mining-Based Methodology
%A Fan,Shaokun
%A Li,Xin
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B INFORMS Journal on Computing
%V 29
%P 438-456
%8 2017
%G eng
%N 3
%2 a
%4 141136185344
%$ 141136185344
%0 Conference Paper
%D 2017
%T The Different Behaviors between Product Searchers and Website Searchers
%A Zun,Kai
%A Zhu,Bin
%A Zuo,Meiyun
%K BIS
%K Business Analytics
%8 2017
%G eng
%2 b
%4 163038023680
%$ 163038023680
%0 Journal Article
%J Decision Support Systems
%D 2017
%T Enabling effective workflow model reuse: A data-centric approach
%A Liu,Zhiyong
%A Fan,Shaokun
%A Wang,Harry
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 93
%P 11-25
%8 2017
%G eng
%2 a
%4 141136390144
%$ 141136390144
%0 Report
%D 2017
%T Hospitality Industry Labor Shortage A Mixed?Methods Investigation
%A Montgomery,Todd
%K BIS
%K Marketing
%K OSU-Cascades
%K OSU-Cascades Hospitality Mgt
%8 2017
%G eng
%2 d
%4 192619022336
%$ 192619022336
%0 Journal Article
%J Electronic Commerce Research
%D 2017
%T Introduction to the special issue of ECR on E-business innovation with big data
%A Fan,Shaokun
%A Xiao,JInghua
%A Xie,Kang
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B Electronic Commerce Research
%8 2017
%G eng
%2 a
%4 141136570368
%$ 141136570368
%0 Journal Article
%D 2017
%T A Meta-Analysis of Organizational Learning and IT Assimilation
%A Roberts,Nicholas
%A Gerow,J.
%A Jeyaraj,A.
%A Roberts,S.
%K BIS
%8 2017
%G eng
%2 a
%4 272321419264
%$ 272321419264
%0 Journal Article
%J Communications of the IIMA
%D 2017
%T A Normative Model for Assessing SME IT Effectiveness
%A Curry,Michael
%A Marshall,Byron
%A Kawalek,Peter
%K Accounting
%K BIS
%X Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably
effective IT systems remains a significant challenge. This paper presents a light weight IT
effectiveness model for small businesses to assess their IT and formulate strategies for
improvement. Employing an action research approach we investigate a mixed method analysis of
120 survey responses from small family businesses and user participation in 10 semi-structured
interviews. We then conduct critical reflection to identify refinements which are validated using
72 survey responses from university students. The results present compelling evidence that
employees’ normative patterns (norms) are a significant driver of IT effectiveness in a second
order PLS predictive model able to explain 26% of observed variance.
A norms-based approach to IT effectiveness helps fill a significant research and managerial gap
for organizations unable or unwilling to adopt IT best practice frameworks used by large
organizations. Our findings imply that comparing norms to IT best practices may offer a less
technical approach to assessing IT operations, which may be well suited to small businesses.
Although further investigation cycles are needed to systematically test this model, we encourage
small business managers to: 1) anticipate IT risks and mitigate them; 2) identify measures of IT
performance, and monitor them, and 3) review/synchronize business and IT goals.
%B Communications of the IIMA
%V 15
%8 2017
%G eng
%U http://scholarworks.lib.csusb.edu/ciima/vol15/iss1/3
%N 1
%2 a
%4 136324909056
%$ 136324909056
%0 Generic
%D 2017
%T Personal Motivation Measures for Personal IT Security Behavior
%A Marshall,Byron
%A Curry,Michael
%A Correia,John
%A Crossler,Rob
%K Accounting
%K BIS
%8 2017
%G eng
%U http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27/
%2 d
%4 151117963264
%$ 151117963264
%0 Journal Article
%D 2017
%T Preliminary Evidence for the Use and Efficacy of Mobile Health Applications in Managing Posttraumatic Stress Disorder Symptoms
%A Keen,S.
%A Roberts,Nicholas
%K BIS
%8 2017
%G eng
%2 a
%4 272321423360
%$ 272321423360
%0 Journal Article
%D 2017
%T The Role of Context in IT Assimilation: A Multi-Method Study of a SaaS Platform in the US Nonprofit Sector,
%A Wright,R.
%A Roberts,Nicholas
%A Wilson,D.
%K BIS
%8 2017
%G eng
%2 a
%4 272321421312
%$ 272321421312
%0 Conference Paper
%B AMCIS2017 - Boston, MA, August 10-12, 2017
%D 2017
%T Sense of Virtual Place (SOVP): Conceptual Exploration and Initial Empirical Validation
%A Arora,Vipin
%A Khazanchi,Deepak
%K BIS
%X In this article, we introduce the notion of “Sense of Virtual Place” (SOVP) and explore the factors affecting it. We argue that SOVP can act as a surrogate for user engagement in virtual environments. We develop and validate a SOVP measure, adapting from a widely used measure of Sense of Place (SOP) in the academic disciplines of environmental and social psychology.
%B AMCIS2017 - Boston, MA, August 10-12, 2017
%C Boston, MA
%8 2017
%G eng
%2 b
%4 177256935424
%$ 177256935424
%0 Case
%D 2016
%T BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough
%A Curry,Michael
%A Marshall,Byron
%A Raja,V.T.
%A Reitsma,Reindert
%A Wydner,Kirk
%K Accounting
%K BIS
%X Whether you enter the workforce as a sales manager, financial accountant or office admin, chances are that you will be working with some type of Enterprise Resource Planning (ERP) system. The purpose of this exercise/walkthrough is to familiarize you with a typical business process as it is commonly executed with the help of one of the leading ERP systems in the market today – Microsoft Dynamics NAV. This exercise will walk you through the six steps of a typical sales process: 1) Creating a customer order; 2) Backordering an out-of-stock item; 3) Receiving the backordered item; 4) Shipping the customer the ordered items and invoicing the customer; 5) Receiving payment from the customer; 6) Making a payment to the vendor from whom we backordered. As you make your way through this exercise, you should realize that in a real company this process would be executed by different people working in different departments. They all will interact with the ERP; i.e., they all retrieve information from the ERP and store new information in it, as the sales process progresses. In this exercise you take on the role of each of these people, giving you a sense of how the sales order is processed both by the company and by the ERP.
%P 25
%8 2016
%G eng
%U http://hdl.handle.net/1957/59858
%2 d
%4 134050416640
%$ 134050416640
%0 Conference Paper
%B the Fifteeth workshop on e-Business (WeB 2016) in Dublin
%D 2016
%T Differences between Younger and Senior Information Providers in Senior Online Communities
%A Wang,Changyu
%A Zhu,Bin
%A Zuo,Meiyun
%K BIS
%K Business Analytics
%B the Fifteeth workshop on e-Business (WeB 2016) in Dublin
%8 2016
%G eng
%2 b
%4 145142321152
%$ 145142321152
%0 Journal Article
%D 2016
%T Electronic Medical Record System Avoidance in a Turbulent Environment
%A Roberts,Nicholas
%A Mellott,M.
%A Dinger,M.
%A Campbell,D.
%K BIS
%8 2016
%G eng
%2 a
%4 272321427456
%$ 272321427456
%0 Journal Article
%J ISACA Journal
%D 2016
%T Evaluating IT Integration Risk Prior to Mergers and Acquisitions
%A Khazanchi,Deepak
%A Arora,Vipin
%K BIS
%X Integration of IT systems and IT management processes is one of the major challenges in the mergers and acquisitions (M&A) process that affects all aspects of the merged business and is, therefore, crucial to the overall success of the M&A process. The purpose of this article is to highlight various types of IT integration risks and the associated costs that must be considered and factored in with the predeal negotiations in each and every M&A. This is important, especially because of the huge costs involved in integrating incompatible systems and meeting the mandatory regulatory compliance requirements. The article suggests looking closely at technical, managerial and user/application level risk factors as part of the M&A pre-merger due diligence. This effort would also evaluate the potential real costs of IT integration post-merger and contribute to the overall M&A valuation. Some of this approach is already widely recommended by M&A advisors and major consulting firms. The article recommends going even further by creating a national M&A IT integration database that provides anonymous inventory of IT integration risk factors and costs before and after an M&A to better understand how IT integration risk impacts the valuation and success or failure of M&As.
%B ISACA Journal
%V 1
%8 2016
%G eng
%U http://www.isaca.org/Journal/archives/2016/Volume-1/Pages/default.aspx
%2 a
%4 127166369792
%$ 127166369792
%0 Conference Paper
%B The 10th China Summer Workshop on Information Management (CSWIM 2016)
%D 2016
%T Helping Senior Participants Acquire the Right Type of Social Support in Online Communities
%A Wang,Changyu
%A Zhu,Bin
%A Zuo,Meiyun
%K BIS
%K Business Analytics
%X Senior citizens could greatly be benefited from the social support received from a community(Choi et al. 2014; Goswami et al. 2010). Social support denotes to the interaction/communication with others, verbal or nonverbal, reducing the uncertainty or enhancing the self-perception of in control of one’s own life (Albrecht and Adelman 1987). All participants of online communities are motivated by their desire of seeking social support. And such support occurs when community members form relational links among them and have interactions that intend to help (Heaney and Israel 2002). A network member can receive/send different types of social supports from/to others. Informational support transmits information and provides guidance related to the task/question a community member has (Krause 1986); emotional support expresses understanding, encouragement, empathy affection, affirming, validation, sympathy, caring and concern (House 1981; Wang et al. 2014); companionship or network support gives the recipient a sense of belonging (Keating 2013; Wang et al. 2014); and appraisal support enhances the self-evaluation of the recipient (House 1981). Studies have shown that people are usually motivated by their desire of seeking one or more types of social supports to participate in an online community (Goswami et al. 2010; Kanayama 2003; Pfeil 2007; Pfeil and Zaphiris 2009; Wright 2000; Xie 2008). And such social support can only be acquired during the interaction with others. For senior citizens, even though they can be greatly benefited from the social support received through participation, the obstacles they need to overcome in order to feel engaged could be larger than that of younger people (Charness and Boot 2009; Lee et al. 2011), especially when they come to the community for the first time. They could be easily overwhelmed by the content that has been generated by other existing members, finding it difficult to identify an appropriate member to initiate a meaningful interaction. It therefore is critical for an online community system to help senior participants identify other existing members who are more likely to supply the type of support they are seeking. While many previous studies have uncovered the variety factors, contextual (Pfeil and Zaphiris 2009; Wang et al. 2015; Xie 2008) or individual (Wang et al. 2014, 2015, 2012; Wright 1999), that impact the degree to which a senior citizen receives social support needed from an online community, it remains unclear what the characteristics of existing community members who are more likely to provide a new comer the kind of support, informational, emotional, companionship, or appraisal are. And the answer to this question may have significant academic and practical implications. This study thus proposes to fulfil the gap by utilizing data collected from a senior community website to investigate the links between the characteristics of existing senior members and the amount and the type of support they provided to new comers.
%B The 10th China Summer Workshop on Information Management (CSWIM 2016)
%8 2016
%G eng
%2 b
%4 127142539264
%$ 127142539264
%0 Conference Paper
%B 2016 Pre-ICIS Workshop on Accounting Information Systems
%D 2016
%T Hope for change in individual security behavior assessments
%A Curry,Michael
%A Marshall,Byron
%A Crossler,Rob
%K Accounting
%K BIS
%B 2016 Pre-ICIS Workshop on Accounting Information Systems
%8 2016
%G eng
%2 b
%4 136325298176
%$ 136325298176
%0 Journal Article
%D 2016
%T The Impact of Virtual Customer Community Interactivity on Organizational Innovation: An Absorptive Capacity Perspective
%A Roberts,Nicholas
%A Dinger,M.
%K BIS
%8 2016
%G eng
%2 a
%4 272321429504
%$ 272321429504
%0 Journal Article
%J Information Visualization
%D 2016
%T Map? or List?based Recommender Agents? Does the Map Metaphor Fulfill its Promise?
%A Reitsma,Reindert
%A Hsieh,Ping-Hung
%A Diekema,Anne
%A Robson,Robby
%A Zarsky,Malinda
%K BIS
%K Supply Chain
%X We present a spatialization of digital library content based on item similarity and an experiment which compares the performance of this spatialization relative to a simple list-based display. Items in the library are K-12 science and engineering learning resources. Spatialization and visualization are accomplished through 2D interactive Sammon mapping of pairwise item similarity scores based on the joint occurrence of word bigrams. The 65 science teachers participating in the experiment were asked to search the library for curricular items they would consider using in conducting one or more teaching assignments. Results indicate that whereas the spatializations adequately capture the salient features of the library’s content and teachers actively use them, item retrieval rates, task-completion time and perceived utility do not significantly differ from the semantically poorer but easier to comprehend and navigate list-based representations. These results put into question the usefulness of the rapidly increasing supply of information spatializations.
%B Information Visualization
%V 16
%P 291-308
%8 2016
%G eng
%U http://journals.sagepub.com/doi/abs/10.1177/1473871616669193
%2 a
%4 127142455296
%$ 127142455296
%0 Journal Article
%J Financial Innovation
%D 2016
%T Overview of business innovations and research opportunities in blockchain and introduction to the special issue
%A Zhao,J. Leon
%A Fan,Shaokun
%A Yan,Jiaqi
%K BIS
%K Business Analytics
%B Financial Innovation
%V 2
%8 2016
%G eng
%2 a
%4 180758509568
%$ 180758509568
%0 Journal Article
%J Data and Knowledge Engineering
%D 2016
%T A Process Ontology Based Approach to Easing Semantic Ambiguity in Business Process Modeling
%A Fan,Shaokun
%A Hua,Z.
%A Storey,V.
%A Zhao,J. L.
%K BIS
%K Business Analytics
%B Data and Knowledge Engineering
%V 102
%8 2016
%G eng
%2 a
%4 132759660544
%$ 132759660544
%0 Generic
%D 2016
%T (See proceeding paper above) Hope for change in individual security behavior assessments
%A Marshall,Byron
%K Accounting
%K BIS
%B 2016 Pre-ICIS Workshop on Accounting Information Systems.
%C Dublin, Ireland
%8 2016
%G eng
%2 c
%4 144539232256
%$ 144539232256
%0 Conference Paper
%B Joint Conference on Digital Libraries
%D 2016
%T Unraveling K-12 Standard Alignment; Report on a New Attempt
%A Marshall,Byron
%A Reitsma,Reindert
%A Samson,Carleigh
%K Accounting
%K BIS
%X We present the results of an experiment which indicates that automated alignment of electronic learning objects to educational standards may be more feasible than previously implied. We highlight some important deficiencies in existing alignment systems and formulate suggestions for improved future ones. We consider how the changing substance of newer educational standards, a multi-faceted view of standard alignment, and a more nuanced view of the ‘alignment’ concept may bring the long-sought goal of automated standard alignment closer. We explore how lexical similarity of documents, a World+Method representation of semantics, and network-based analysis can yield promising results. We furthermore investigate the nature of false positives to better understand how validity of match is evaluated so as to better focus future alignment system development.
%B Joint Conference on Digital Libraries
%8 2016
%G eng
%2 b
%4 127038310400
%$ 127038310400
%0 Journal Article
%D 2016
%T Using Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective
%A Roberts,Nicholas
%A Campbell,D.
%A Vijayasarathy,L.
%K BIS
%8 2016
%G eng
%2 a
%4 272321425408
%$ 272321425408
%0 Journal Article
%D 2015
%T Absorptive Capacity, Organizational Antecedents, and Environmental Dynamism
%A Roberts,Nicholas
%K BIS
%8 2015
%G eng
%2 a
%4 272321431552
%$ 272321431552
%0 Conference Paper
%B 2015 Pre-ICIS Workshop on Accounting Information Systems
%D 2015
%T Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices
%A Curry,Michael
%A Marshall,Byron
%K Accounting
%K BIS
%B 2015 Pre-ICIS Workshop on Accounting Information Systems
%8 2015
%G eng
%2 b
%4 120099989504
%$ 120099989504
%0 Journal Article
%J Big Data Research
%D 2015
%T Demystifying big data analytics through the lens of marketing mix
%A Fan,Shaokun
%A Lau,R.
%A Zhao,J. L.
%K BIS
%K Business Analytics
%B Big Data Research
%V 2
%P 28-32
%8 2015
%G eng
%N 1
%2 a
%4 132758433792
%$ 132758433792
%0 Generic
%D 2015
%T The Design of IdeaWorks: Applying Social Learning Networks to Support Tertiary Education
%A Kang,Lele
%A Fan,Shaokun
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B 2015 International Conference on HCI in Business
%8 2015
%G eng
%2 c
%4 221564688384
%$ 221564688384
%0 Conference Paper
%B Intern. Conf. on Inf. Systems (ICIS) 2015
%D 2015
%T Estimation and Visualization of Digital Library Content Similarities
%A Reitsma,Reindert
%A Hsieh,Ping-Hung
%A Robson,Robby
%K BIS
%K Supply Chain
%X We report on a process for similarity estimation and two-dimensional mapping of lesson materials stored in a Web-based K12 Science, Technology, Engineering and Mathematics (STEM) digital library. The process starts with automated removal of all information which should not be included in the similarity estimations followed by automated indexing. Similarity estimation itself is conducted through a natural language processing algorithm which heavily relies on bigrams. The resulting similarities are then used to compute a Sammon-map; i.e., a projection in n dimensions, the item-to-item distances of which best reflect the input similarities. In this paper we concentrate on specification and validation of this process. The similarity results show almost 100% precision-by-rank in the top three to five ranks. Sammon mapping in two dimensions corresponds well with the digital library‘s table of content.
%B Intern. Conf. on Inf. Systems (ICIS) 2015
%8 2015
%G eng
%2 b
%4 105616928768
%$ 105616928768
%0 Journal Article
%J Financial Innovation
%D 2015
%T Harnessing Internet finance with innovative cyber credit management
%A Lin,Z.
%A Whinston,A. B.
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Financial Innovation
%V 1
%8 2015
%G eng
%N 1
%2 a
%4 132758345728
%$ 132758345728
%0 Journal Article
%J International Journal of Accounting Information Systems
%D 2015
%T Improving IT Assessment with IT Artifact Affordance Perception Priming
%A Curry,Michael
%A Marshall,Byron
%A Kawalek,Peter
%K Accounting
%K BIS
%X Accurately assessing organizational information technology (IT) is important for accounting professionals, but also difficult. Both auditors and the professionals from whom they gather data are expected to make nuanced judgments regarding the adequacy and effectiveness of controls that protect key systems. IT artifacts (policies, procedures, and systems) are assessed in an audit because they “afford” relevant action possibilities but perception preferences shade the results of even systematic and well-tested assessment tools. This study of 246 business students makes two important contributions. First we demonstrate that a tendency to focus on either artifact or organizational imperative systematically reduces the power of well-regarded IT measurements. Second, we demonstrate that priming is an effective intervention strategy to increase the predictive power of constructs from the familiar technology acceptance model (TAM).
%B International Journal of Accounting Information Systems
%V 19
%P 17-28
%8 2015
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/IJAIS%20-%20IT%20Artifact%20Affordance%20Perception%20Priming.pdf
%2 a
%4 106888814592
%$ 106888814592
%0 Generic
%D 2015
%T Mining Hidden Organizational Structures from Meeting Records
%A Li,Jiexun
%A Wu,Zhaohui
%A Zhu,Bin
%K BIS
%K Business Analytics
%K Supply Chain
%B INFORMS 2015
%C Philadelphia
%8 2015
%G eng
%2 c
%4 125884504064
%$ 125884504064
%0 Conference Paper
%B Workshop on Doing IS Research in China, The 19th Pacific Asia Conference on Information Systems (PACIS 2015)
%D 2015
%T PREDICTING HABITUAL CONTINUING SOCIAL NETWORKING SITES USE OF THE ELDERLY
%A Chai,Wen
%A Zuo,Meiyun
%A Zhu,Bin
%A Tian,Xuesong
%K BIS
%K Business Analytics
%B Workshop on Doing IS Research in China, The 19th Pacific Asia Conference on Information Systems (PACIS 2015)
%C Singapore
%8 2015
%G eng
%U http://pacis2015.comp.nus.edu.sg/pages/workshops_cnais.html
%2 b
%4 115764482048
%$ 115764482048
%0 Conference Paper
%B ASEE 2015 Annual Conference
%D 2015
%T The Relevance of K-12 Engineering Curricula to NGSS: an Analysis of TeachEngineering-NGSS Alignments
%A Reitsma,Reindert
%A Samson,Carleigh
%A Soltys,Mike
%A Sullivan,Jacquelyn
%K BIS
%X The 2013 publication of the Next Generation Science Standards (NGSS) provided the first widely adopted set of science standards to include engineering design throughout all K-12 grades. In doing so, NGSS raised the relevance of the K-12 engineering education sector on a national scale. The TeachEngineering digital library, representative of the K-12 engineering education sector through its collaboration of 36, mostly NSF-funded, K-12 engineering education programs across the US, recently aligned its 1,300+ K-12 engineering lessons and hands-on activities to the NGSS. This paper provides analysis of both the alignment process and its results. As such, we offer insight into the correspondence between the NGSS and a broad, collection of K-12 engineering learning objects and hence, into the mutual relevance of K-12 engineering curriculum and the NGSS. We also provide some recommendations for future K-12 engineering curriculum development.
%B ASEE 2015 Annual Conference
%8 2015
%G eng
%2 b
%4 105617211392
%$ 105617211392
%0 Generic
%D 2015
%T Sentiment Analysis in Social Media Platforms: The Contribution of Social Relationships
%A Fan,Shaokun
%A Ilk,Noyan
%A Zhang,Kunpeng
%K BIS
%K Business Analytics
%B International Conference on Information Systems
%C Dallas
%8 2015
%G eng
%2 c
%4 180787286016
%$ 180787286016
%0 Generic
%D 2015
%T Using Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective
%A Roberts,Nicholas
%A Campbell,D.
%A Vijayasarathy,L.
%K BIS
%B Maastricht University
%8 2015
%G eng
%2 c
%4 272321896448
%$ 272321896448
%0 Conference Paper
%B 'Doing IS Research in China' Workshop of the Pacific Asia Conference on Information Systems (PACIS 2015)
%D 2015
%T Weather Factors and Online Product/Service Reviews
%A Feng,Jiao
%A Yao,Zhong
%A Zhu,Bin
%A Marshall,Byron
%K Accounting
%K BIS
%K Business Analytics
%B 'Doing IS Research in China' Workshop of the Pacific Asia Conference on Information Systems (PACIS 2015)
%8 2015
%G eng
%2 b
%4 107158784000
%$ 107158784000
%0 Journal Article
%J Information Systems Frontiers
%D 2015
%T Workflow-Aware Attention Tracking to Enhance Collaboration Management
%A Fan,Shaokun
%A Kang,L
%A Zhao,J. L.
%K BIS
%K Business Analytics
%B Information Systems Frontiers
%V 17
%P 1253–1264
%8 2015
%G eng
%N 6
%2 a
%4 132758261760
%$ 132758261760
%0 Generic
%D 2015
%T Workshop: TeachEngineering Digital Library: Hundreds of Free, Searchable, NGSS-aligned Hands-on Engineering Lessons for K-12
%A Reitsma,Reindert
%A Zarske,Malinda
%A Yowell,Janet
%A Samson,Carleigh
%K BIS
%B ASEE Annual Conference 2015
%C Seattle, WA
%8 2015
%G eng
%2 c
%4 102487447552
%$ 102487447552
%0 Journal Article
%J Journal of Management Analytics
%D 2014
%T Business Challenges and Research Directions of Management Analytics in the Big Data Era
%A Zhao,J. L.
%A Fan,Shaokun
%A Hu,D.
%K BIS
%K Business Analytics
%B Journal of Management Analytics
%V 1
%P 169-174
%8 2014
%G eng
%N 3
%2 a
%4 132758482944
%$ 132758482944
%0 Generic
%D 2014
%T Collective opinion classification: A global consistency maximization approach
%A Li,Jiexun
%A Li,Xin
%A Zhu,Bin
%K BIS
%K Business Analytics
%B The 24th Workshop on Information Technology and Systems (WITS)
%C Aukland, New Zealand
%8 2014
%G eng
%2 c
%4 98584274944
%$ 98584274944
%0 Generic
%D 2014
%T Credit Risk Assessment of POS-Loans in the Big Data Era
%A Bian,Yiyang
%A Fan,Shaokun
%A Ye,Ryan Liying
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B Workshop on Internet and BigData Finance (WIBF)
%C Hongkong, China
%8 2014
%G eng
%2 c
%4 221565675520
%$ 221565675520
%0 Conference Paper
%B Twentieth Americas Conference on Information Systems (AMCIS' 2014)
%D 2014
%T Ensuring Positive Impact of Data Quality Metadata: Implications for Decision Support
%A Shankar,G.
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Twentieth Americas Conference on Information Systems (AMCIS' 2014)
%C Savannah
%8 2014
%G eng
%2 b
%4 88345614336
%$ 88345614336
%0 Journal Article
%J European Journal of Emergency Medicine
%D 2014
%T Evaluation of a hospital admission prediction model adding coded chief complaint data using neural network methodology
%A Handly,Neal
%A Thompson,David A
%A Li,Jiexun
%A Chuirazzi,David M
%A Venkat,Arvind
%K BIS
%B European Journal of Emergency Medicine
%8 2014
%G eng
%2 a
%4 98168481792
%$ 98168481792
%0 Journal Article
%D 2014
%T Firm Valuation Effects of the Decision to Adopt Relationally Governed Business Process Outsourcing Arrangements
%A Duan,C.
%A Grover,V.
%A Roberts,Nicholas
%A Balakrishnan,J.
%K BIS
%8 2014
%G eng
%2 a
%4 272321433600
%$ 272321433600
%0 Generic
%D 2014
%T Formation and effect of Social Interactions in Online Brand Community: an Empirical Investigation.
%A Wu,Ji
%A Fan,Shaokun
%A Wu,Manli
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B The Pacific Asia Conference on Information Systems (PACIS)
%C Chengdu, China
%8 2014
%G eng
%2 c
%4 221565620224
%$ 221565620224
%0 Journal Article
%J Akadémiai Kiadó and Springer Science+Business Media
%D 2014
%T The Hl-index: Improvement of H-index Based on Quality of Citing Papers
%A Zai,Li
%A Yan,Xiangbin
%A Zhu,Bin
%K BIS
%K Business Analytics
%X This paper proposes hl-index as an improvement of the h-index, a popular measurement for the research quality of academic researchers. Although the h-index integrates the number of publications and the academic impact of each publication to evaluate the productivity of a researcher, it assumes that all papers that cite an academic article contribute equally to the academic impact of this article. This assumption, of course, could not be true in most times. The citation from a well-cited paper certainly brings more attention to the article than the citation from a paper that people do not pay attention to. It therefore becomes important to integrate the impact of papers that cite a researcher’s work into the evaluation of the productivity of the researcher. Constructing a citation network among academic papers, this paper therefore proposes hl-index that integrating the h-index with the concept of lobby index, a measures that has been used to evaluate the impact of a node in a complex network based on the impact of other nodes that the focal node has direct link with. This paper also explores the characteristics of the proposed hl-index by comparing it with citations, h-index and its variant g-index.
%B Akadémiai Kiadó and Springer Science+Business Media
%V 98
%P 1021-1031
%8 2014
%G eng
%N 2
%2 a
%4 69565954048
%$ 69565954048
%0 Journal Article
%J International Journal of Information Management
%D 2014
%T IT Artifact Bias: How exogenous predilections influence organizational information system paradigms
%A Curry,Michael
%A Marshall,Byron
%A Kawalek,Peter
%K Accounting
%K BIS
%X Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and strategic business interests. Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and the strategic business interests. People perceive affordances (possibilities for action) in information technology artifacts differently as cognitive structures (schema) which bias individual focus. This study explores how an individual’s tendency to perceive the ‘trees’ in an IT ‘forest’ (artifact preference), affects their assessment of efforts to achieve more effective IT outcomes. The effect is demonstrated using a relatively simple IT success model. Further, in a sample of 120 survey responses supported by ten semi-structured interviews we demonstrate that job role and organizational IT complexity systematically impact artifact perception. A better understanding of IT artifact bias promises to help organizations better assess information systems.
%B International Journal of Information Management
%V 34
%P 427-436
%8 2014
%G eng
%U http://dx.doi.org/10.1016/j.ijinfomgt.2014.02.005
%N 4
%2 a
%4 86233214976
%$ 86233214976
%0 Generic
%D 2014
%T Mining knowledge sharing processes in online discussion forums
%A Wang,G. Alan
%A Wang,Harry Jiannan
%A Li,Jiexun
%A Fan,Weiguo
%K BIS
%B The 47th Hawaii International Conference on System Sciences (HICSS)
%C Big Island, HI. U.S.A
%8 2014
%G eng
%2 c
%4 98583332864
%$ 98583332864
%0 Conference Paper
%B Sixth Annual Pre-ICIS Workshop on Accounting Information Systems
%D 2014
%T The Moderating Power of IT Bias on User Acceptance of Technology
%A Marshall,Byron
%A Curry,Michael
%A Kawalek,Peter
%K Accounting
%K BIS
%B Sixth Annual Pre-ICIS Workshop on Accounting Information Systems
%C Auckland
%8 2014
%G eng
%2 b
%4 105740615680
%$ 105740615680
%0 Generic
%D 2014
%T Scalable Audience Targeted Models for Brand Advertising on Social Networks
%A Zhang,Kunpeng
%A Ouksel,Aris M.
%A Fan,Shaokun
%A Liu,Hengchang
%K BIS
%K Business Analytics
%B Proceedings of the 8th ACM Conference on Recommender systems
%C Foster City, CA, USA
%8 2014
%G eng
%2 c
%4 221565589504
%$ 221565589504
%0 Journal Article
%J IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems & Humans
%D 2013
%T An ACP Approach to Public Health Emergency Management: Using a Campus Outbreak of H1N1 Influenza as a Case Study
%A Duan,Wei
%A Cao,Zhidong
%A Wang,Youzhong
%A Zhu,Bin
%A Zeng,Daniel
%A Wang,Fei-Yue
%A Qiu,Xiaogang
%A Song,Hongbin
%A Wang,Yong
%K BIS
%K Business Analytics
%X In order to tackle the infeasibility of building mathematical models and conducting physical experiments for public health emergencies in a real world, we apply the ACP (Artificial societies, Computational experiments, and Parallel execution) approach to public health emergency management. We conducted a case study on the largest collective outbreak of H1N1 influenza at a Chinese university in 2009. We built an artificial society to reproduce H1N1 influenza outbreaks. In computational experiments, aiming to obtain comparable results with the real data, we applied the same intervention strategy as that was used during the real outbreak. Then we compared experiment results with real data to verify our models, including spatial models, population distribution, weighted social networks, contact patterns, students’ behaviors, and models of H1N1 influenza disease, in the artificial society. We then applied alternative intervention strategies to the artificial society. The simulation results suggested that alternative strategies controlled the outbreak of H1N1 influenza more effectively. Our models and their application to intervention strategy improvement show that the ACP approach is useful for public health emergency management
%B IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems & Humans
%V 43
%P 1028-1041
%8 2013
%G eng
%N 5
%2 a
%4 69564794880
%$ 69564794880
%0 Conference Paper
%D 2013
%T A cognitive-neural approach to explaining market oscillations in a fully recurrent adaptive agent population
%A Wong,Charles
%A Versace,Massimiliano
%A Zhu,Bin
%K BIS
%K Business Analytics
%X Recreating market oscillations to study the markets often makes use of induced activity reversal via finite share or auction thresholds, strategically replacing agents via bankruptcy or genetic algorithm rules, heavily data specific network parameterization, or stochastic randomness. However, such techniques do not shed any additional light on how and why intelligent individual scale agents may spontaneously and rationally decide to endogenously change from a buying to a selling posture within a population. This paper introduces Social Netmap, an agent based population of general purpose, parameter-free, adaptive agents adjusting their behavior in real time to the directly observed aggregate and individual behaviors of their neighbors much like real intelligent actors might in a population. Without relying on random processes, validated parameters, turning-point thresholds, or agent replacement, Social Netmap was able to endogenously create typical market oscillations in 21 out of 30 cases of real Dow Jones Industrial Average data. Social Netmap points towards future work in more realistic group behavior of intelligent, rational agents.
%8 2013
%G eng
%U http://www.dmi.unict.it/ecal2013/
%2 b
%4 69566212096
%$ 69566212096
%0 Generic
%D 2013
%T Data/Knowledge Management for LIDAR Data Users/Researchers
%A Zhu,Bin
%A Olson,Michael
%K BIS
%K Business Analytics
%B NSF I/UCRC Center for e-Design Strategic Planning Meeting
%C 91
%8 2013
%G eng
%2 c
%4 88240963584
%$ 88240963584
%0 Generic
%D 2013
%T Discovering Consumer Health Expressions from Consumer-Contributed Content
%A Jiang,Ling
%A Yang,Christopher C
%A Li,Jiexun
%K BIS
%B 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013)
%C Washington DC, USA
%8 2013
%G eng
%2 c
%4 98583427072
%$ 98583427072
%0 Journal Article
%D 2013
%T Electronic Medical Record Compliance and Continuity in Delivery of Care: An Empirical Investigation in a Combat Environment
%A Mellott,M.
%A Thatcher,J.
%A Roberts,Nicholas
%K BIS
%8 2013
%G eng
%2 a
%4 272321435648
%$ 272321435648
%0 Generic
%D 2013
%T Ever-Changing Workarounds: A Model for Workaround Management Lifecycle in Healthcare Workflow
%A Fan,Shaokun
%A Tong,Yu
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B 2013 SIGBPS Workshop on Business Processes and Service
%C Milan, Italy
%8 2013
%G eng
%2 c
%4 221565501440
%$ 221565501440
%0 Generic
%D 2013
%T Finding patterns for effective knowledge sharing in online communities
%A Li,Jiexun
%A Wang,G. Alan
%A Wang,Harry Jiannan
%A Fan,Weiguo
%K BIS
%B The 23rd Workshop on Information Technology and Systems (WITS)
%C Milan, Italy
%8 2013
%G eng
%2 c
%4 98583351296
%$ 98583351296
%0 Generic
%D 2013
%T Gender Classification for Product Reviewers in China: A Data-Driven Approach
%A Zhu,Bin
%A Yan,Xiangbin
%A Wang,Jing
%K BIS
%K Business Analytics
%X While it is crucial for organizations to automatically identify the gender of participants in product discussion forums, they may have difficulties adopting existing gender classification methods because the associations between the linguistic features used in those studies and gender type usually varies with context. The prototype system we propose to demo validates a framework for the development of gender classification that uses a more “data-driven” approach. It constantly extracts content-specific features from the discussion content. And the system could automatically adjust itself to accommodate the contextual changes in order to achieve better classification accuracy.
%8 2013
%G eng
%U http://www.som.buffalo.edu/isinterface/wits2013/
%2 d
%4 88335765504
%$ 88335765504
%0 Generic
%D 2013
%T Identifying hidden community elites in online social networks
%A Hu,Daning
%A Li,Jiexun
%A Yang,Xuan
%A Yan,Jiaqi
%K BIS
%B China Summer Workshop on Information Management (CSWIM 2013)
%C Tianjin, China
%8 2013
%G eng
%2 c
%4 98583384064
%$ 98583384064
%0 Generic
%D 2013
%T Mapping User requirements to Design Alternatives: The Whole Nine yards
%A Zhu,Bin
%A Hoyle,Christopher
%K BIS
%K Business Analytics
%B NSF I/UCRC Center for e-Design Strategic Planning Meeting
%C 91
%8 2013
%G eng
%2 c
%4 88240386048
%$ 88240386048
%0 Journal Article
%J American Business Law Journal
%D 2013
%T What Do They Know About Me In The Cloud? A Comparative Law Perspective On Protecting the Privacy and Security of Sensitive Consumer Data
%A King,Nancy
%A Raja,V.T.
%K BIS
%K Business Law
%X How much does the cloud know about us? Should we care? In cloud computing, sensitive personal data flows in a global network of internet connected computers, creating attractive targets for hackers, challenging law enforcement and raising concerns about government surveillance. From an information privacy perspective, this article discusses how well the management information systems practices and laws in the United States and Europe protect the privacy and security of sensitive consumer data in the cloud. It examines policies and proposed regulations and makes suggestions for legal reforms in both jurisdictions to protect the privacy and security of sensitive information.
%B American Business Law Journal
%C Wiley Periodicals, Inc., Malden, MA
%V 50
%P 413-482
%8 2013
%G eng
%N 2
%2 a
%4 55693561856
%$ 55693561856
%0 Journal Article
%D 2012
%T Absorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research
%A Roberts,Nicholas
%A Galluch,P.
%A Dinger,M.
%A Grover,V.
%K BIS
%8 2012
%G eng
%2 a
%4 272321437696
%$ 272321437696
%0 Generic
%D 2012
%T Business Process Management
%A Reitsma,Reindert
%A Van Patten,Mark
%A Baker,Mark
%A Coogan,Chris
%K BIS
%B 2012 Portland CIO Forum
%C Portland, OR
%8 2012
%G eng
%2 c
%4 63034542081
%$ 63034542081
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2012
%T Can Intermediary-based Science Standards Crosswalking Work? Some Evidence from Mining the Standard Alignment Tool (SAT)
%A Reitsma,Reindert
%A Marshall,Byron
%A Chart,Trevor
%K Accounting
%K BIS
%X We explore the feasibility of intermediary-based crosswalking and alignment of K-12 science education standards. With increasing availability of K-12 science, technology, engineering and mathematics (STEM) digital library content, alignment of that content with educational standards is a significant and continuous challenge. Whereas direct, one-to-one alignment of standards is preferable but currently unsustainable in its resource demands, less resource-intensive intermediary-based alignment offers an interesting alternative. But will it work? We present the results from an experiment in which the machine-based Standard Alignment Tool (SAT) —incorporated in the National Science Digital Library (NSDL)— was used to collect over half a million direct alignments between standards from different standard-authoring bodies. These were then used to compute intermediary-based alignments derived from the well-known AAAS Project 2061 Benchmarks and NSES standards. Results show strong variation among authoring bodies in their success to crosswalk with best results for those who modeled their standards on the intermediaries. Results furthermore show a strong inverse relationship between recall and precision when both intermediates where involved in the crosswalking.
%B Journal of the Association for Information Science and Technology
%V 63
%P 1843-1858
%8 2012
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/ReitsmaMarshallChart_StandardsCrosswalking_JASIST2012.pdf
%2 a
%4 43025678337
%$ 43025678337
%0 Generic
%D 2012
%T Collaboration Process Patterns and Efficiency of Issue Resolution in Software Development
%A Fan,Shaokun
%A Li,Xin
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B 2012 International Conference on Collaboration Technologies and Systems (CTS)
%C Denver, CO, USA
%8 2012
%G eng
%2 c
%4 221565446144
%$ 221565446144
%0 Generic
%D 2012
%T A Comparative Study of Smoking Cessation Intervention Programs on Social Media
%A Zhang,Mi
%A Yang,Christopher C
%A Li,Jiexun
%K BIS
%B 2012 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP12)
%C College Park, MD, USA
%8 2012
%G eng
%2 c
%4 98583535616
%$ 98583535616
%0 Journal Article
%D 2012
%T Conceptualizing Models Using Multidimensional Constructs: A Review and Guidelines for their Use
%A Polites,G.
%A Roberts,Nicholas
%A Thatcher,J.
%K BIS
%8 2012
%G eng
%2 a
%4 272321443840
%$ 272321443840
%0 Conference Paper
%D 2012
%T Control Mechanisms and Electronic Medical Record Compliance in a Combat Environment: An Empirical Investigation
%A Mellott,M.
%A Thatcher,J.
%A Roberts,Nicholas
%K BIS
%8 2012
%G eng
%2 b
%4 272321691648
%$ 272321691648
%0 Conference Paper
%B 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings,
%D 2012
%T Data Quality Metadata and Decision Making
%A Shankaranarayanan,G.
%A Zhu,Bin
%K BIS
%K Business Analytics
%B 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings,
%C Grand Wailea, Maui, HI, USA
%P 1434-1443
%8 2012
%G eng
%2 b
%4 52814555136
%$ 52814555136
%0 Journal Article
%J Electronic Commerce Research and Applications
%D 2012
%T Discovering target groups in social networking sites: An effective method for maximizing joint influential power
%A Xu,Kaiquan
%A Guo,Xitong
%A Li,Jiexun
%A Lau,Raymond Y.K.
%A Liao,Stephan Shaoyi
%K BIS
%B Electronic Commerce Research and Applications
%V 11
%P 318-334
%8 2012
%G eng
%N 4
%2 a
%4 86815690752
%$ 86815690752
%0 Generic
%D 2012
%T Disentangling IT Artifact Bias
%A Curry,Michael
%A Marshall,Byron
%K Accounting
%K BIS
%B 4th Annual Pre-ICIS Workshop on Accounting Information Systems
%C Orlando, Florida
%8 2012
%G eng
%2 c
%4 69567012864
%$ 69567012864
%0 Generic
%D 2012
%T An effective method for discovering target groups on social networking sites
%A Xu,Kaiquan
%A Li,Jiexun
%A Liao,Shaoyi
%A Lau,Raymond Y.K.
%K BIS
%B 2011 International Conference on Information Systems (ICIS 2011)
%C Shanghai, China
%8 2012
%G eng
%2 c
%4 98583597056
%$ 98583597056
%0 Journal Article
%D 2012
%T An Examination of the Role of Military Medical Chief Information Officer
%A Mellott,M.
%A Thatcher,J.
%A Roberts,Nicholas
%A Carter,M.
%K BIS
%8 2012
%G eng
%2 a
%4 272321447936
%$ 272321447936
%0 Generic
%D 2012
%T Exploiting Semantic Structure for Mapping User-specified Form Terms to SNOMED CT Concepts
%A Khare,Ritu
%A An,Yuan
%A Li,Jiexun
%A Song,Il-Yeol
%A Hu,Xiaohua
%K BIS
%B 2012 ACM SIGHIT International Health Informatics Symposium (IHI 2012)
%C Miami, FL, USA
%8 2012
%G eng
%2 c
%4 98583576576
%$ 98583576576
%0 Generic
%D 2012
%T Finding People Who Forward Your Messages
%A Zhu,Bin
%A Chau,Michael
%K BIS
%K Business Analytics
%B School of Mechanical, Industrial, & Manufacturing Engineering Seminar Series
%C 91
%8 2012
%G eng
%2 c
%4 52770985984
%$ 52770985984
%0 Generic
%D 2012
%T Finding People Who Forward Your Messages
%A Zhu,Bin
%A Chau,Michael
%K BIS
%K Business Analytics
%B 2012 Winter Conference on Business Intelligence
%C Snowbird, Utah
%8 2012
%G eng
%2 c
%4 52770910208
%$ 52770910208
%0 Generic
%D 2012
%T Finding People Who Retweet
%A Zhu,Bin
%K BIS
%K Business Analytics
%B 2012 INFORMS International Conference
%C Beijing, China
%8 2012
%G eng
%2 c
%4 52771076096
%$ 52771076096
%0 Journal Article
%J Decision Support Systems
%D 2012
%T A Framework for the Transformation from Conceptual to Logical Workflow Models
%A Fan,Shaokun
%A Zhao,J. L.
%A Liu,M.
%A Dou,W.
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 55
%P 781-794
%8 2012
%G eng
%N 1
%2 a
%4 132759138304
%$ 132759138304
%0 Journal Article
%J Expert Systems with Applications
%D 2012
%T Identifying valuable customers on social network sites for profit maximization
%A Xu,Kaiquan
%A Li,Jiexun
%A Song,Yuxia
%K BIS
%B Expert Systems with Applications
%V 39
%P 13009-13018
%8 2012
%G eng
%N 17
%2 a
%4 86816428032
%$ 86816428032
%0 Journal Article
%D 2012
%T Investigating Firm’s Customer Agility and Firm Performance: The Importance of Aligning Sense and Respond Capabilities
%A Roberts,Nicholas
%A Grover,V.
%K BIS
%8 2012
%G eng
%2 a
%4 272321441792
%$ 272321441792
%0 Generic
%D 2012
%T IT Effectiveness Norms and Organizational Success: a Literature Review
%A Curry,Michael
%K BIS
%B Doctoral Symposium
%C Manchester, UK
%8 2012
%G eng
%2 c
%4 51281883136
%$ 51281883136
%0 Conference Paper
%B The Eleventh Workshop on e-Business (WeB'12)
%D 2012
%T Is It You or the Message: Why Do People Pass Along Micro-Blogging Messages?
%A Zhu,Bin
%A Marshall,Byron
%K Accounting
%K BIS
%K Business Analytics
%B The Eleventh Workshop on e-Business (WeB'12)
%C Orlando, Florida
%8 2012
%G eng
%2 b
%4 107914813440
%$ 107914813440
%0 Journal Article
%D 2012
%T Leveraging IT Infrastructure to Facilitate Competitive Activity via Customer Agility: An Empirical Investigation
%A Roberts,Nicholas
%A Grover,V.
%K BIS
%8 2012
%G eng
%2 a
%4 272321439744
%$ 272321439744
%0 Journal Article
%D 2012
%T Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research
%A Wright,R.
%A Campbell,D.
%A Thatcher,J.
%A Roberts,Nicholas
%K BIS
%8 2012
%G eng
%2 a
%4 272321445888
%$ 272321445888
%0 Journal Article
%J Information Systems Frontiers
%D 2012
%T Patterns of News Dissemination through Online News Network in China
%A Wang,Youzhong
%A Zeng,Daniel
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Information Systems Frontiers
%V 16
%P 557-570
%8 2012
%G eng
%N 4
%2 a
%4 52770017280
%$ 52770017280
%0 Journal Article
%J Computer Law and Security Review
%D 2012
%T Protecting the Privacy and Security of Sensitive Customer Data in the Cloud
%A King,Nancy
%A Raja,V.T.
%K BIS
%K Business Law
%X The global ubiquity of cloud computing may expose consumers' sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers' trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive infomraiton in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry.
%B Computer Law and Security Review
%C Oxford
%V 28
%P 308-319
%8 2012
%G eng
%U www.Sciencedirect.com
%N 3
%2 a
%4 40841897985
%$ 40841897985
%0 Journal Article
%J Network Modeling Analysis in Health Informatics and Bioinformatics
%D 2012
%T Semantic-enhanced models to support timely admission prediction at emergency departments
%A Li,Jiexun
%A Guo,L.
%A Handly,N.
%A Thompson,D. A.
%K BIS
%B Network Modeling Analysis in Health Informatics and Bioinformatics
%V 1
%P 161-172
%8 2012
%G eng
%N 4
%2 a
%4 86815619072
%$ 86815619072
%0 Conference Paper
%D 2012
%T The Semantics of Social Media: The Spread of Occupy Protests
%A Washington,A.
%A Roberts,Nicholas
%A Thatcher,J.
%K BIS
%8 2012
%G eng
%2 b
%4 272321705984
%$ 272321705984
%0 Conference Paper
%B Proceedings 2nd P-12 Engineering and Design Education Research Summit
%D 2012
%T The TeachEngineering Digital Library: Improving Access to the P-12 Engineering Conversation
%A Reitsma,Reindert
%A Zarske,M.
%A Sullivan,J.
%A Klenk,P.
%A Forbes,M.
%A Carlson,D.
%K BIS
%X The TeachEngineering digital library is a collection of searchable, standards-based, classroom-tested P-12 engineering curricula for use in science and math classrooms (Sullivan et al., 2005). Its inquiry-based lessons and hands-on activities use real-life engineering as a vehicle for the integration of science and math in P-12 classrooms. Mapped to educational content standards, the activities are age-appropriate, inexpensive to conduct, and relevant to students’ daily lives, helping science and math come alive. The collection is a powerful resource for those in P-12 or higher education, industry and professional communities wanting to improve STEM literacy, to engage young students in the joys and creativity of engineering and the design process, and to increase the number of students pursuing STEM careers.
This paper investigates TeachEngineering usage trends and curricular submission statistics. Specifically, we analyze the submission process for curriculum contributed from external authors, suggest practices for submitting new curriculum, and discuss possible support avenues for future submissions.
%B Proceedings 2nd P-12 Engineering and Design Education Research Summit
%8 2012
%G eng
%2 b
%4 50961645568
%$ 50961645568
%0 Generic
%D 2012
%T Towards an Intelligent Approach to Extracting Data for Process Mining
%A Wang,Harry Jiannan
%A Li,Jiexun
%A Bai,Xue
%K BIS
%B SIGBPS Workshop on Business Processes and Services (BPS'12)
%C Orlando, FL, USA
%8 2012
%G eng
%2 c
%4 98583465984
%$ 98583465984
%0 Generic
%D 2012
%T Towards Collaboration Virtualization Theory
%A Fan,Shaokun
%A Sia,Choon-Ling
%A Zhao,J. Leon
%K BIS
%K Business Analytics
%B The Pacific Asia Conference on Information Systems (PACIS)
%C Ho Chi Minh City, Vietnam
%8 2012
%G eng
%2 c
%4 221565396992
%$ 221565396992
%0 Journal Article
%J International Journal on Digital Libraries
%D 2011
%T Comparison of Human and Machine-based Educational Standard Assignment Networks
%A Reitsma,Reindert
%A Diekema,Anne R
%K BIS
%X Increasing availability of digital libraries of K-12 curriculum resources, coupled with an increased emphasis on standard-based teaching necessitates assignment of the standards to the available curriculum. Since such assignment is a laborious and ongoing task, machine-based standard assignment tools have been under development for some time. Unfortunately, data on the performance of these machine-based classifiers are mostly lacking. In this paper we explore network modeling and layout to gain insight into the differences between human assignments and those by one of the better known machine-based classifiers. To build the standard assignment networks we define standards to be linked if they are jointly assigned to the same curricular item. Comparative analysis of the mapped networks shows that that unlike the machine-based assignment maps, the human-based maps elegantly reflect the rationales and principles of the assignment; i.e., clusters of standards separate along lines of lesson content and pedagogical principles. In addition, comparison of the maps clearly indicates that the machine classifier has trouble assigning so-called 'method' standards.
%B International Journal on Digital Libraries
%V 11
%P 209-223
%8 2011
%G eng
%2 a
%4 26462951425
%$ 26462951425
%0 Conference Paper
%D 2011
%T Control Mechanisms and Deployed Electronic Medical Record Policy Compliance: A Principal-Agent Perspective
%A Mellott,
%A Roberts,Nicholas
%A Thatcher,J.
%K BIS
%8 2011
%G eng
%2 b
%4 272321708032
%$ 272321708032
%0 Generic
%D 2011
%T Criminal identity resolution using social behavior and relationship attributes
%A Li,Jiexun
%A Wang,G. Alan
%K BIS
%B IEEE International Conference on Intelligence and Security Informatics (ISI 2011)
%C Beijing, China
%8 2011
%G eng
%2 c
%4 98583638016
%$ 98583638016
%0 Generic
%D 2011
%T Derivation of hospital admission prediction models based on coded chief complaint, demographic, patient acuity and emergency department (ED) operational data available at ED triage
%A Handly,Neal
%A Li,Jiexun
%A Thompson,David A
%A Venkat,A
%A Chuirazzi,D M
%K BIS
%B 2011 Society for Academic Emergency Medicine (SAEM) Annual Meeting
%C Boston, MA, USA
%8 2011
%G eng
%2 c
%4 98583676928
%$ 98583676928
%0 Journal Article
%D 2011
%T An Examination of the Deployed Inpatient Electronic Medical Record
%A Mellott,M.
%A Thatcher,J.
%A Roberts,Nicholas
%K BIS
%8 2011
%G eng
%2 a
%4 272321452032
%$ 272321452032
%0 Journal Article
%J Information Systems Frontiers
%D 2011
%T Identity matching using personal and social identity features
%A Li,Jiexun
%A Wang,Alan Gang
%A Chen,Hsinchun
%K BIS
%B Information Systems Frontiers
%V 13
%P 101-113
%8 2011
%G eng
%N 1
%2 a
%4 86816591872
%$ 86816591872
%0 Journal Article
%J Decision Support Systems
%D 2011
%T Mining comparative opinions from customer reviews for competitive intelligence
%A Xu,Kaiquan
%A Liao,Stephan S
%A Li,Jiexun
%K BIS
%B Decision Support Systems
%V 50
%P 743-754
%8 2011
%G eng
%N 4
%2 a
%4 86816761856
%$ 86816761856
%0 Journal Article
%J Communications of the IIMA
%D 2011
%T Organizational Information Technology Norms and IT Quality
%A Marshall,Byron
%A Curry,Michael
%A Reitsma,Reindert
%K Accounting
%K BIS
%X The effectiveness of IT governance initiatives in improving IT’s contribution to organizational success has been demonstrated but the mechanisms by which improved outcomes are realized have largely remained unexplored. Although IT governance tools such as COBIT and ITIL specify procedures and policies for the management of IT resources, the experts who developed those tools also embedded a set of core principles or ‘norms’ in the underlying frameworks. This article explores these norms and their role in the realization of organizational IT quality. Through analysis of normative messages implicitly expressed in the documentation elements provided by COBIT, we extract two norms (commitment to improvement and a risk/control perspective) thought to indicate that an organization has adopted the spirit of IT governance. Next, we model the relationship between adoption of these norms and IT quality and evaluate the model with data from a survey of 86 individuals who use, manage, and/or deliver organizational IT services. Principal component analysis is used to validate the survey items. Results show statistically significant relationships between norm adoption, participation in norm-driven activities, and organizational IT quality.
%B Communications of the IIMA
%V 11
%8 2011
%G eng
%U http://www.iima.org/index.php?option=com_phocadownload&view=category&id=60:2011-volume-11-issue-4&Itemid=68
%N 4
%2 a
%4 40795119617
%$ 40795119617
%0 Conference Paper
%B Proceedings of the 21st Workshop on Information Technologies and Systems (WITS 2011), Shanghai, China, December 3rd, 2011
%D 2011
%T Patterns of News Dissemination through Online News Network in China
%A Wang,Youzhong
%A Zeng,Daniel
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Proceedings of the 21st Workshop on Information Technologies and Systems (WITS 2011), Shanghai, China, December 3rd, 2011
%8 2011
%G eng
%2 b
%4 42184273921
%$ 42184273921
%0 Journal Article
%D 2011
%T The Role of Trust in Post-Adoption IT Exploration: An Empirical Examination of Knowledge Management Systems
%A Thatcher,J.
%A McKnight,H.
%A Arsal,R.
%A Baker,E.
%A Roberts,Nicholas
%K BIS
%8 2011
%G eng
%2 a
%4 272321449984
%$ 272321449984
%0 Generic
%D 2011
%T Segmenting a Fragmented Market – Challenges and How to Get It Right
%A Montgomery,Todd
%K BIS
%K Marketing
%K OSU-Cascades
%K OSU-Cascades Hospitality Mgt
%B Pricing Trends Monthly Webinar Series
%8 2011
%G eng
%2 c
%4 103259822080
%$ 103259822080
%0 Generic
%D 2011
%T Sentiment Community Detection in Social Networks
%A Xu,Kaiquan
%A Li,Jiexun
%A Liao,Stephen Shaoyi
%K BIS
%B 2011 iConference
%C Seattle, WA, USA
%8 2011
%G eng
%2 c
%4 98583699456
%$ 98583699456
%0 Conference Paper
%B Proceedings of the Joint Conference on Digital Libraries (JCDL'11),Ottawa, Canada.
%D 2011
%T World vs. Method: Educational Standard Formulation Impacts Document Retrieval
%A Marshall,Byron
%A Reitsma,Reindert
%K Accounting
%K BIS
%X Although initiatives are underway in the educational community to consolidate disparate collections of educational standards, little has been done to explore the impact of educational standard formulation on information retrieval. Recent research contrasts two categories of educational standards: ‘World’ (topical domain-related concepts) and ‘Method’ (investigative and epistemological principles). This paper explores the information retrieval implications of the World vs. Method distinction. We find that experts are more likely to agree about which educational resources align with a Method standard but that a typical automatic standard assignment tool is more likely to assign a World standard to an educational resource. Further, a text-based information retrieval system is more likely to be accurate in retrieving documents relevant to a World standard as compared to a Method standard. These findings have implications both for educational standard formulation (combining World and Method components in a standard may improve retrieval) and for digital library builders who want to help teachers identify useful, standards-aligned learning objects.
%B Proceedings of the Joint Conference on Digital Libraries (JCDL'11),Ottawa, Canada.
%8 2011
%G eng
%2 b
%4 33636190209
%$ 33636190209
%0 Journal Article
%D 2010
%T Advancing Operations Management Theory Using Exploratory Structural Equation Modelling Techniques
%A Roberts,Nicholas
%A Thatcher,J.
%A Grover,V.
%K BIS
%8 2010
%G eng
%2 a
%4 272321458176
%$ 272321458176
%0 Conference Paper
%B Am. Soc. of Engr. Education (ASEE) Annual Conf. 2010
%D 2010
%T Are French Fries and Grades Bad for You? Conflicting Evidence on how K-12 Teachers Search in a K-12 Engineering Digital Library
%A Reitsma,Reindert
%A Klenk,P.
%A Zarske,M.
%A Sullivan,J.
%K BIS
%X The TeachEngineering digital library provides teacher-tested, standards-based engineering content for K-12 teachers to use in science and math classrooms. Since its release in 2005, it has demonstrated significant growth in users and in contributors; data on this growth is presented. The TeachEngineering team continues to research its search functions and user interface in order to ensure that it is meeting the needs of its intended users, K-12 teachers. Empirical evidence of an experimental study on the dimensions of alignment between digital K-12 lesson materials and education standards, however, contradicts that of the observed search behavior of patrons of TeachEngineering. Whereas the experiment convincingly shows that grade band information does not add to the teaching materials’ relevance for an educational standard, observed patrons’ searching patterns show ample evidence of grade band-based searches. In this paper we offer that although grade band-based searches should perhaps be avoided because they improperly bias search results, they are such a prominent feature in the actual use of the digital library that as designers we must support them while mitigating the risk of unfortunate search bias. As a possible solution we suggest supporting grade-based searches yet offering query expansion by widening the grade band. These results also imply that curriculum developers pay close attention to the assignment of grade bands to their lessons and activities.
%B Am. Soc. of Engr. Education (ASEE) Annual Conf. 2010
%C Louisville, KY
%8 2010
%G eng
%2 b
%4 21031903233
%$ 21031903233
%0 Journal Article
%J Information Processing & Management
%D 2010
%T Aspects of 'Relevance' in the Alignment of Curriculum with Educational Standards
%A Reitsma,Reindert
%A Marshall,Byron
%A Zarske,Malinda
%K Accounting
%K BIS
%X Retrieval of useful digitized learning objects is a key objective for educational digital libraries, but imprecise definitions of alignment hinder the development of effective retrieval mechanisms. With over 63,000 U.S. K-12 science and mathematics education standards and a rapid proliferation of Web-enabled curriculum, retrieving curriculum that aligns with the standards to which teachers must teach is increasingly important. Previous studies of such alignment use single-dimensional and binary measures of relevance. Perhaps as a consequence they suffer from low inter-rater reliability (IRR), with experts agreeing about alignments only some 20-40% of the time. We present the results of an experiment in which the dependent variable ‘alignment’ is operationalized using the Saracevic model of relevance in which; i.e., alignment is defined and measured through ‘clues’ from the everyday practice of K-12 teaching. Results show higher inter-rater reliability on all clues with significantly higher IRR on several specific alignment dimensions. In addition, a (linear) model of ‘overall alignment’ is derived and estimated. Both the structure and explanatory power of the model differ significantly between searching vs. assessment. These results illustrate the usefulness of clue-based relevance measures for information retrieval and have important consequences for both the formulation of automated retrieval mechanisms and the construction of a gold standard set of standard-curriculum alignments.
%B Information Processing & Management
%V 46
%P 362-376
%8 2010
%G eng
%U http://www.sciencedirect.com/science/article/B6VC8-4XF7Y02-1/2/3fd5e4257f3d904d5929eeff2185c678
%N 3
%2 a
%4 12651030529
%$ 12651030529
%0 Journal Article
%D 2010
%T Building and Leveraging Information in Dynamic Markets: The Role of IT Infrastructure Flexibility as Enabler of Organizational Responsiveness and Competitive Advantage
%A Bhatt,G.
%A Emdad,A.
%A Roberts,Nicholas
%A Grover,V.
%K BIS
%8 2010
%G eng
%2 a
%4 272321456128
%$ 272321456128
%0 Journal Article
%J Journal of Computer and System Sciences
%D 2010
%T A Collaborative Scheduling Approach for Service-Driven Scientific Workflow Execution
%A Dou,W.
%A Zhao,J. L.
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Journal of Computer and System Sciences
%V 76
%8 2010
%G eng
%N 6
%2 a
%4 132759257088
%$ 132759257088
%0 Journal Article
%D 2010
%T The Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-2008
%A Gerow,J.
%A Grover,V.
%A Roberts,Nicholas
%A Thatcher,J.
%K BIS
%8 2010
%G eng
%2 a
%4 272321454080
%$ 272321454080
%0 Generic
%D 2010
%T Discourse Analysis of the Question-Answering Service of the Internet Public Library
%A Poole,Erik V
%A Li,Jiexun
%A Park,Jung-Ran
%K BIS
%B Annual Conference of Association for Library and Information Science Education (ALISE 2010)
%C Boston, MA, USA
%8 2010
%G eng
%2 c
%4 98583732224
%$ 98583732224
%0 Conference Paper
%B AAA Annual Meeting, IS Section
%D 2010
%T Does Using CobiT Improve IT Solution Proposals?
%A Marshall,Byron
%A Curry,Michael
%A Reitsma,Reindert
%K Accounting
%K BIS
%X The CobiT (Control Objectives for Information and related Technology) framework is designed to help organizations implement IT governance practices by systematically shaping identifiable IT processes to better leverage IT expenditures. The control structure advocated in CobiT embodies governance notions including business alignment, a risk/control perspective, systematic measurement, accountability, and continuous improvement. Despite the rise of internal control regulation, not all organizations have implemented systematic IT controls and many, notably small, organizations may never do so. This study explores whether exposing decision makers to CobiT positively affects the IT solutions they generate. We present a framework (drawn primarily from the structure of CobiT) for identifying normatively better IT plans as measured by application of governance principles. We report on 115 IT solution proposals created by business students. The proposals developed using CobiT more frequently took a risk/control approach, addressed the need for continuous improvement, referred to general IT processes, identified the people who should implement a solution, and proposed more measures of success. Thus, exposing decision makers to a systematic IT governance framework promises to help them generate more comprehensive solutions to IT challenges.
%B AAA Annual Meeting, IS Section
%8 2010
%G eng
%2 b
%4 16758226945
%$ 16758226945
%0 Conference Paper
%B National Science Digital Library (NSDL) 2010 Annual Meeting
%D 2010
%T Educational Standard Assignment; Some recent findings working with NSDL tools CAT & SAT
%A Reitsma,Reindert
%A Diekema,A.
%K BIS
%X The NSDL suite of tools offers the Content Assignment and Standard Alignment Tools (CAT & SAT). We present two evaluations of these tools; one is a comparative analysis of human vs. CAT standard assignment. Another is the use of a 24M-row database of SAT-based standard alignments. The latter explores the feasibility of standard cross walking
%B National Science Digital Library (NSDL) 2010 Annual Meeting
%8 2010
%G eng
%2 b
%4 33900787713
%$ 33900787713
%0 Conference Paper
%B Proceedings of Joint Conference of eServices and Business Intelligence, Chengdu, China, June 4th-6th, 2010
%D 2010
%T Finding Treasures in Your Trash,
%A Zhu,Bin
%A Luo,Xin
%A Ma,James
%A Chau,Michael
%K BIS
%K Business Analytics
%B Proceedings of Joint Conference of eServices and Business Intelligence, Chengdu, China, June 4th-6th, 2010
%8 2010
%G eng
%2 b
%4 42184540161
%$ 42184540161
%0 Generic
%D 2010
%T Finding Treasures in Your Trash
%A Zhu,Bin
%A Luo,X.
%A Ma,J.
%A Chau,M.
%K BIS
%K Business Analytics
%B Joint Conference of eServices and Business Intelligence
%C Chengdu, China
%8 2010
%G eng
%2 c
%4 39442378753
%$ 39442378753
%0 Journal Article
%J IEEE Transactions on Information Technology in Biomedicine
%D 2010
%T Gene function prediction with gene interaction networks: a context graph kernel approach
%A Li,Xin
%A Chen,Hshinchun
%A Li,Jiexun
%A Zhang,Zhu
%K BIS
%B IEEE Transactions on Information Technology in Biomedicine
%V 14
%P 119-128
%8 2010
%G eng
%N 1
%2 a
%4 86817409024
%$ 86817409024
%0 Generic
%D 2010
%T The Impact of Relational and Task-Oriented Leaders on Virtual Team Performance
%A Bajwa,Deepinder
%A Tyran,Craig
%A Raja,V.T.
%A Tyran,Kristi
%K BIS
%B Group Decision and Negotiation (GDN) 2010 Conference
%C Delft, The Netherlands
%8 2010
%G eng
%2 c
%4 35581231105
%$ 35581231105
%0 Generic
%D 2010
%T IT curriculum and critical skills set for effective IT professionals: is there a gap?
%A Reitsma,Reindert
%A Eom,Mike
%A Hootman,J
%K BIS
%B 2010 Portland CIO Forum
%C Portland, OR
%8 2010
%G eng
%2 c
%4 27415453697
%$ 27415453697
%0 Conference Paper
%B 2nd annual Pre‐ICIS Workshop on Accounting Information Systems
%D 2010
%T IT Governance Norms and IT Success
%A Marshall,Byron
%A Curry,Michael
%A Reitsma,Reindert
%K Accounting
%K BIS
%X The checklists included in well-known IT governance frameworks may be a good fit for
large organizations that face regulatory pressure and a need for large-scale coordination
but may be less appropriate for smaller organizations. Core IT governance principles
embedded in the structure of CobiT, ITIL, and ISO2000 can be expressed as a set of IT
governance norms including business alignment, a risk/control perspective, systematic
measurement, accountability, and continuous improvement. In this study, we model IT
effectiveness and willingness to comply with best practices as effects of adopting these
norms. We propose a set of survey items tailored to help assess the constructs in this
model then partially validate them using principal components analysis. Survey
responses (n=86) reveal a significant connection between evidence of norm adoption in
organizations and IT success. This norms-based paradigm may be useful in bringing
some of the benefits of IT governance to the smaller organizations that are thought to
drive economic growth and employment.
%B 2nd annual Pre‐ICIS Workshop on Accounting Information Systems
%C December 2010, Saint Louis, MO, U.S.A.
%8 2010
%G eng
%2 b
%4 31898748929
%$ 31898748929
%0 Conference Paper
%D 2010
%T A Meta-Analytic Review and Extension of the Organizational IT Assimilation Literature
%A Roberts,Nicholas
%A Gerow,J.
%A Roberts,S.
%K BIS
%8 2010
%G eng
%2 b
%4 272321693696
%$ 272321693696
%0 Conference Paper
%B Information Visualization 2010 (IV-10)
%D 2010
%T Network Visualization of Human and Machine-based Educational Standard Assignment
%A Reitsma,Reindert
%A Diekema,A.
%K BIS
%X Rapid growth in the availability of digital libraries of K-12 curriculum, coupled with an increased emphasis on standard-based teaching has led to the development of automated standard assignment tools. To assess the performance of one of those tools and to gain insight into the differences between how human catalogers and automated tools conduct these standard assignments, we explore the use of network modeling and visualization techniques for comparing and contrasting the two. The results show significant differences between the human-based and machine-based network maps. Unlike the machine-based maps, the human-based assignment maps elegantly reflect the rationales and principles of the assignments; i.e., clusters of standards separate along lines of content and pedagogical principles. In addition, humans seem significantly more apt at assigning so-called ‘methodological’ standards.
%B Information Visualization 2010 (IV-10)
%C London
%8 2010
%G eng
%2 b
%4 21412300801
%$ 21412300801
%0 Journal Article
%J Information Systems and e-Business Management
%D 2010
%T A policy-based process mining framework: Mining business policy texts for discovering process models
%A Li,Jiexun
%A Wang,Harry Jianan
%A Zhang,Zhu
%A Zhao,J Leon
%K BIS
%B Information Systems and e-Business Management
%V 8
%P 169-188
%8 2010
%G eng
%2 a
%4 86817249280
%$ 86817249280
%0 Conference Paper
%B Proceedings of the Sixteenth Americas Conference on Information Systems, Lima, Peru, August 12th-15th 2010
%D 2010
%T Understanding Awareness Diffusion at Twitter.com
%A Zhu,Bin
%A Chau,Michael
%K BIS
%K Business Analytics
%B Proceedings of the Sixteenth Americas Conference on Information Systems, Lima, Peru, August 12th-15th 2010
%8 2010
%G eng
%2 b
%4 42184370177
%$ 42184370177
%0 Generic
%D 2010
%T Understanding Awareness Diffusion at Twitter.com
%A Zhu,Bin
%A Chau,M
%K BIS
%K Business Analytics
%C Lima, Peru
%8 2010
%G eng
%2 c
%4 39441920001
%$ 39441920001
%0 Journal Article
%J Decision Support Systems
%D 2010
%T Visualization of network concepts: The impact of working memory capacity differences
%A Zhu,Bin
%A Watts,S.
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 21
%P 327-344
%8 2010
%G eng
%N 2
%2 a
%4 39437588481
%$ 39437588481
%0 Journal Article
%J International Journal of Digital Accounting Research
%D 2010
%T Visualizing Basic Accounting Flows: Does XBRL + Model + Animation = Understanding?
%A Marshall,Byron
%A Mortenson,Kristian
%A Bourne,Amy
%A Price,Kevin
%K Accounting
%K BIS
%X The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. This format should allow managers, investors, regulators, and students to aggregate, compare and analyze financial information. This study explores an XBRL-based visualization tool that maps the organization of financial statements captured in the XBRL formalism into a graphical representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students. Our findings suggest the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.
%B International Journal of Digital Accounting Research
%V 10
%P 27-54
%8 2010
%G eng
%U http://www.uhu.es/ijdar/10.4192/1577-8517-v10_2.pdf
%2 a
%4 21706715137
%$ 21706715137
%0 Journal Article
%J Decision Support Systems
%D 2010
%T Visualizing Social Network Concepts
%A Zhu,Bin
%A Watts,S.
%A Chen,H.
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 49
%P 151-161
%8 2010
%G eng
%N 2
%2 a
%4 39437791233
%$ 39437791233
%0 Book Section
%D 2010
%T Web Services
%A Reitsma,Reindert
%K BIS
%X Overview of Web services technology and its use.
%C Hoboken, NJ
%V 3
%P 578-592
%8 2010
%G eng
%2 d
%4 7908530177
%$ 7908530177
%0 Generic
%D 2009
%T The adoption and use of technologies to support virtual teams
%A Bajwa,Deepinder S.
%A Raja,V.T.
%A Tyran,Craig K
%A Tyran,Kristi
%K BIS
%B Group Decision and Negotiation (GDN) 2009 Conference
%C Toronto
%8 2009
%G eng
%2 c
%4 14247702529
%$ 14247702529
%0 Generic
%D 2009
%T Analyzing Writing Styles of Bloggers with Different Opinions
%A Park,Thomas H
%A Li,Jiexun
%A Zhao,Haozhen
%A Chau,Michaul
%K BIS
%B The 9th Workshop on Information Technology and Systems (WITS)
%C Phoenix, AZ, USA
%8 2009
%G eng
%2 c
%4 98583756800
%$ 98583756800
%0 Generic
%D 2009
%T Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams
%A Qin,J.
%A Zhu,Bin
%A Gaynor,M.
%A Bradner,S.
%K BIS
%K Business Analytics
%B 8th Workshop on e-Business
%C Phoenix, AZ
%8 2009
%G eng
%2 c
%4 39442464769
%$ 39442464769
%0 Conference Paper
%B Proceedings of 8th Workshop on e-Business (WeB'09), Phoenix, AZ, USA.
%D 2009
%T Communication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams
%A Zhu,Bin
%A Qin,Jialun
%K BIS
%K Business Analytics
%B Proceedings of 8th Workshop on e-Business (WeB'09), Phoenix, AZ, USA.
%8 2009
%G eng
%2 b
%4 42184617985
%$ 42184617985
%0 Journal Article
%D 2009
%T Conceptualizing and Testing Formative Constructs: Tutorial and Annotated Example
%A Roberts,Nicholas
%A Thatcher,J.
%K BIS
%8 2009
%G eng
%2 a
%4 272321460224
%$ 272321460224
%0 Conference Paper
%B International Conference on Information Systems (ICIS 2009)
%D 2009
%T Delivering Value Beyond Efficiency with Visualized XBRL
%A Marshall,Byron
%A Mortenson,Kristian
%A Bourne,Amy
%A Price,Kevin
%A Marshall,Andrew
%K Accounting
%K BIS
%B International Conference on Information Systems (ICIS 2009)
%C Phoenix, AZ
%8 2009
%G eng
%2 b
%4 16758251521
%$ 16758251521
%0 Conference Paper
%B Proceedings of the Joint Conference on Digital Libraries (JCDL'09), Austin, TX
%D 2009
%T Dimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum
%A Marshall,Byron
%A Reitsma,Reindert
%A Zarske,Malinda
%K Accounting
%K BIS
%B Proceedings of the Joint Conference on Digital Libraries (JCDL'09), Austin, TX
%8 2009
%G eng
%U http://doi.acm.org/10.1145/1555400.1555403
%2 b
%4 12651069441
%$ 12651069441
%0 Generic
%D 2009
%T Expanding Research Using System Development as Methodology
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Artificial Intelligence Lab, MIS department
%C Tucson, AZ
%8 2009
%G eng
%2 c
%4 39444781057
%$ 39444781057
%0 Generic
%D 2009
%T Hospital admission prediction using pre-hospital variables
%A Li,Jiexun
%A Guo,Lifan
%A Handly,Neal
%K BIS
%B IEEE International Conference on Bioinformatics and Biomedicine (IEEE-BIBM 2009)
%C Washington DC, USA
%8 2009
%G eng
%2 c
%4 98583777280
%$ 98583777280
%0 Conference Paper
%D 2009
%T Increasing Process Improvement through Internet-based e-Business Innovations
%A Roberts,Nicholas
%A Klein,R.
%K BIS
%8 2009
%G eng
%2 b
%4 272321695744
%$ 272321695744
%0 Book Section
%D 2009
%T Information Visualization for Decision Making
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%8 2009
%G eng
%2 d
%4 39444719617
%$ 39444719617
%0 Generic
%D 2009
%T Internet Marketing: How to Use SEO and Social Networking to Reach Clients
%A Curry,Michael
%K BIS
%B Monthly IMC PDX Meeting
%C Portland, OR
%8 2009
%G eng
%2 c
%4 22435635201
%$ 22435635201
%0 Generic
%D 2009
%T Lightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy.
%A Curry,Michael
%K BIS
%B Natural Areas Association 2009 Conference
%C Vancouver, WA
%8 2009
%G eng
%2 c
%4 21919137793
%$ 21919137793
%0 Journal Article
%J Journal of Management Information Systems
%D 2009
%T Managing knowledge in light of its evolution process: An empirical study on citation network-based patent classification
%A Li,Xin
%A Chen,Hshinchun
%A Zhang,Zhu
%A Li,Jiexun
%A Nunamaker,Jay F.
%K BIS
%B Journal of Management Information Systems
%V 26
%P 129-153
%8 2009
%G eng
%N 1
%2 a
%4 86817787904
%$ 86817787904
%0 Generic
%D 2009
%T Navigating the TeachEngineering Resource
%A Reitsma,Reindert
%K BIS
%B NSF TeachEngineering/GK-12 Workshop
%C Boulder, CO
%8 2009
%G eng
%2 c
%4 14032785409
%$ 14032785409
%0 Generic
%D 2009
%T Regionalization of Information Space with Capacity-constrained Voronoi Diagrams
%A Reitsma,Reindert
%K BIS
%B Colloquium Geographic Information Science (GIS)
%C Zurich, CH
%8 2009
%G eng
%2 c
%4 14032777217
%$ 14032777217
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2009
%T Sentiment analysis of Chinese documents: From sentence to document level
%A Zhang,Changli
%A Zeng,Daniel
%A Li,Jiexun
%A Wang,Fei-Yue
%A Zuo,Wanli
%K BIS
%B Journal of the Association for Information Science and Technology
%V 60
%P 2474-2487
%8 2009
%G eng
%N 12
%2 a
%4 86817697792
%$ 86817697792
%0 Generic
%D 2009
%T TeachEngineering: K-12 Teacher Use Study
%A Reitsma,Reindert
%A Marshall,Byron
%K Accounting
%K BIS
%B Special Workshop on TeachEngineering/GK-12 Integration
%C Boulder, CO.
%8 2009
%G eng
%2 c
%4 12650889217
%$ 12650889217
%0 Journal Article
%J IEEE Transactions on Intelligent Transportation Systems
%D 2009
%T Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security
%A Kaza,Siddharth
%A Xu,Jennifer
%A Marshall,Byron
%A Chen,Hsinchun
%K Accounting
%K BIS
%X The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border are not independent of law enforcement in border-area jurisdictions because the information known by local law enforcement agencies may provide valuable leads that are useful for securing the border and transportation infrastructure. The combined analysis of law enforcement information and data generated by vehicle license plate readers at international borders can be used to identify suspicious vehicles and people at ports of entry. This not only generates better quality leads for border protection agents but may also serve to reduce wait times for commerce, vehicles, and people as they cross the border. This paper explores the use of criminal activity networks (CANs) to analyze information from law enforcement and other sources to provide value for transportation and border security. We analyze the topological characteristics of CAN of individuals and vehicles in a multiple jurisdiction scenario. The advantages of exploring the relationships of individuals and vehicles are shown. We find that large narcotic networks are small world with short average path lengths ranging from 4.5 to 8.5 and have scale-free degree distributions with power law exponents of 0.85–1.3. In addition, we find that utilizing information from multiple jurisdictions provides higher quality leads by reducing the average shortest-path lengths. The inclusion of vehicular relationships and border-crossing information generates more investigative leads that can aid in securing the border and transportation infrastructure.
%B IEEE Transactions on Intelligent Transportation Systems
%V 10
%P 83 - 91
%8 2009
%G eng
%U http://dx.doi.org/10.1109/TITS.2008.2011695
%N 1
%2 a
%4 2609299457
%$ 2609299457
%0 Journal Article
%J China Journal of Information Systems
%D 2009
%T Transformation Framework of Conceptual to Logical Business Process Models
%A Liu,M.
%A Fan,Shaokun
%A Zhao,J. L.
%A Dou,W.
%K BIS
%K Business Analytics
%X (In Chinese)
%B China Journal of Information Systems
%V 3
%8 2009
%G eng
%N 1
%2 a
%4 132759312384
%$ 132759312384
%0 Generic
%D 2009
%T Understanding How Product Information Traverses Across Online Communities
%A Zhu,Bin
%A Yang,C.
%K BIS
%K Business Analytics
%B Third China Workshop on Information Management 2009
%C Guangzhou, China
%8 2009
%G eng
%2 c
%4 39443169281
%$ 39443169281
%0 Conference Paper
%B Proceedings of Third China Workshop on Information Management 2009, Guangzhou, China
%D 2009
%T Understanding How Product Information Traverses Across Online Communities
%A Zhu,Bin
%A Yang,Chris
%K BIS
%K Business Analytics
%B Proceedings of Third China Workshop on Information Management 2009, Guangzhou, China
%8 2009
%G eng
%2 b
%4 42184730625
%$ 42184730625
%0 Generic
%D 2009
%T Untitled
%A Raja,V.T.
%K BIS
%B Management Information Systems (MIS) Symposium
%C La Jolla, California
%8 2009
%G eng
%2 c
%4 14248052737
%$ 14248052737
%0 Generic
%D 2009
%T Using Wikis to Support Virtual Teams in Education: The Effect of Instructor Leadership Style.
%A Tyran,Craig
%A Raja,V.T.
%A Tyran,Kristi
%K BIS
%B Association of Information Systems - SIGED Conference
%C Phoenix, Arizona
%8 2009
%G eng
%2 c
%4 22506346497
%$ 22506346497
%0 Conference Paper
%B American Accounting Association 18th Annual Strategic and Emerging Technologies Research Workshop
%D 2009
%T Visualizing basic accounting flows: does XBRL + model + animation = understanding?
%A Marshall,Byron
%A Mortenson,Kristian
%A Bourne,Amy
%A Price,Kevin
%A Marshall,Andrew
%K Accounting
%K BIS
%X The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. Representing traditional financial statements in this electronic and interoperable format should allow managers, investors, regulators, and importantly students to aggregate, compare and analyze financial information. Processing such data requires an understanding of the underlying paradigms embedded in consolidated sets of financial statements. This work explores the feasibility and effectiveness of an XBRL-based visualization tool, presenting an organizational framework, mapping that framework to financial statements and the XBRL formalism, and demonstrating a visual representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students in introductory financial accounting classes. This preliminary finding suggests the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.
%B American Accounting Association 18th Annual Strategic and Emerging Technologies Research Workshop
%C New York, NY
%8 2009
%G eng
%2 b
%4 16758294529
%$ 16758294529
%0 Generic
%D 2009
%T Visualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation
%A Zhu,Bin
%A Shankaranarayanan,G.
%A Cai,Y.
%K BIS
%K Business Analytics
%B Fifteenth Americas Conference on Information Systems
%C San Francisco, CA
%8 2009
%G eng
%2 c
%4 39442620417
%$ 39442620417
%0 Conference Paper
%B Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California
%D 2009
%T Visualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation
%A Shankaranarayanan,G.
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California
%8 2009
%G eng
%2 b
%4 42184697857
%$ 42184697857
%0 Journal Article
%J IEEE Transactions on Visualization and Computer Graphics
%D 2009
%T Visualizing the Intellectual Structure with Paper-Reference Matrices
%A Zhang,Jian
%A Chen,Chaomei
%A Li,Jiexun
%K BIS
%B IEEE Transactions on Visualization and Computer Graphics
%V 15
%P 1153-1160
%8 2009
%G eng
%N 6
%2 a
%4 86817558528
%$ 86817558528
%0 Generic
%D 2009
%T Visualizing the intellectual structure with paper-reference matrices
%A Zhang,Jian
%A Chen,Chaomei
%A Li,Jiexun
%K BIS
%B IEEE Information Visualization Conference (IEEE InfoVis 2009)
%C Atlantic City, NJ, USA
%8 2009
%G eng
%2 c
%4 98583795712
%$ 98583795712
%0 Journal Article
%J Decision Support Systems
%D 2008
%T CommunicationGarden System: Visualizing a Computer Mediated Communication System to Facilitate Knowledge Management
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 45
%P 778-794
%8 2008
%G eng
%N 4
%2 a
%4 39437830145
%$ 39437830145
%0 Journal Article
%J Application Research of Computers
%D 2008
%T Complex Problem Solving based on Complex Problem Definition Model
%A Fan,Shaokun
%A Wanchun,D.
%K BIS
%K Business Analytics
%X (In Chinese)
%B Application Research of Computers
%V 25
%8 2008
%G eng
%N 3
%2 a
%4 132759437312
%$ 132759437312
%0 Journal Article
%J Concurrency and Computation: Practice and Experience
%D 2008
%T A context- and role-driven scientific workflow development pattern
%A Wanchun,D.
%A Chen,J.
%A Fan,Shaokun
%A Cheung,S. C.
%K BIS
%K Business Analytics
%B Concurrency and Computation: Practice and Experience
%V 20
%P 1741-1757
%8 2008
%G eng
%N 15
%2 a
%4 132759416832
%$ 132759416832
%0 Journal Article
%J Computer Engineering and Design
%D 2008
%T Context-aware Resource Access Control in Scientific Workflows
%A Fan,Shaokun
%A Wanchun,D.
%A Xiping,L.
%K BIS
%K Business Analytics
%X (In Chinese)
%B Computer Engineering and Design
%V 29
%8 2008
%G eng
%N 2
%2 a
%4 132759474176
%$ 132759474176
%0 Generic
%D 2008
%T Decision support with data quality metadata
%A Shankaranarayanan,G.
%A Zhu,Bin
%A Cai,Y.
%K BIS
%K Business Analytics
%B International Conference on Information Quality 2008
%C Boston, MA
%8 2008
%G eng
%2 c
%4 39444242433
%$ 39444242433
%0 Generic
%D 2008
%T Monitoring Conflicts in Virtual Teams: A Social Network Approach
%A Zhu,Bin
%A Gaynor,M
%K BIS
%K Business Analytics
%B Second China Summer Workshop on Information Management
%C Kunming, China
%8 2008
%G eng
%2 c
%4 39443273729
%$ 39443273729
%0 Generic
%D 2008
%T Monitoring Team Conflicts through the Visualization of Social Networks
%A Zhu,Bin
%A Gaynor,M
%A Bradner,S.
%K BIS
%K Business Analytics
%B 7th Workshop on e-Business
%C Paris, France
%8 2008
%G eng
%2 c
%4 39443214337
%$ 39443214337
%0 Generic
%D 2008
%T PRM-based identity matching using social context
%A Li,Jiexun
%A Wang,Gang Alan
%A Chen,Hsinchun
%K BIS
%B IEEE International Conference on Intelligence and Security Informatics (ISI 2008)
%C Taipei, Taiwan
%8 2008
%G eng
%2 c
%4 98583906304
%$ 98583906304
%0 Generic
%D 2008
%T Process component identification from business policy documents
%A Li,Jiexun
%A Wang,Harry Jiannan
%A Zhang,Zhu
%A Zhao,J Leon
%K BIS
%B China Summer Workshop on Information Management (CSWIM 2008)
%C Yunnan, China
%8 2008
%G eng
%2 c
%4 98583873536
%$ 98583873536
%0 Generic
%D 2008
%T Relation-centric task identification for policy-based process mining
%A Li,Jiexun
%A Wang,Harry Jiannan
%A Zhang,Zhu
%A Zhao,J Leon
%K BIS
%B International Conference on Information Systems (ICIS 2008)
%C Paris, France
%8 2008
%G eng
%2 c
%4 98583812096
%$ 98583812096
%0 Generic
%D 2008
%T Stylometric feature selection for assessing review helpfulness
%A Li,Jiexun
%A MacDonald,Craig M
%A Zheng,Rong
%K BIS
%B The 18th Workshop on Information Technology and Systems (WITS)
%C Paris, France
%8 2008
%G eng
%2 c
%4 98583836672
%$ 98583836672
%0 Generic
%D 2008
%T Theme creation for digital collections
%A Li,Jiexun
%A Xia,Lin
%A Zhou,Xiaohua
%K BIS
%B International Dublin Core and Metadata Applications (DC 2008)
%C Berlin, Germany
%8 2008
%G eng
%2 c
%4 98583859200
%$ 98583859200
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2008
%T Using Importance Flooding to Identify Interesting Networks of Criminal Activity
%A Marshall,Byron
%A Chen,Hsinchun
%A Kaza,Siddharth
%K Accounting
%K BIS
%X Cross-jurisdictional law enforcement data sharing and analysis is of vital importance because law breakers regularly operate in multiple jurisdictions. Agencies continue to invest massive resources in various sharing initiatives despite several high-profile failures. Key difficulties include: privacy concerns, administrative issues, differences in data representation, and a need for better analysis tools. This work presents a methodology for sharing and analyzing investigation-relevant data and is potentially useful across large cross-jurisdictional data sets. The approach promises to allow crime analysts to use their time more effectively when creating link charts and performing similar analysis tasks. Many potential privacy and security pitfalls are avoided by reducing shared data requirements to labeled relationships between entities. Our importance flooding algorithm helps extract interesting networks of relationships from existing law enforcement records using user-controlled investigation heuristics, spreading activation, and path-based interestingness rules. In our experiments, several variations of the importance flooding approach outperformed relationship-weight-only methods in matching expert-selected associations. We find that accuracy in not substantially affected by reasonable variations in algorithm parameters and demonstrate that user feedback and additional, case-specific information can be usefully added to the computational model.
%B Journal of the Association for Information Science and Technology
%V 59
%P 2099-2114
%8 2008
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_ImportanceFlooding_PrePrint.pdf
%N 13
%2 a
%4 2609309697
%$ 2609309697
%0 Journal Article
%J International Journal of High Performance Computing Applications
%D 2008
%T A Workflow Engine-Driven SOA-Based Cooperative Computing Paradigm in Grid Environments
%A Wanchun,D.
%A Chen,J.
%A Liu,J
%A Cheung,S. C.
%A Chen,G.
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B International Journal of High Performance Computing Applications
%V 22
%8 2008
%G eng
%N 3
%2 a
%4 132759375872
%$ 132759375872
%0 Generic
%D 2007
%T Auto patent classification using citation network information: An experimental study in nanotechnology
%A Li,Xin
%A Chen,Hsinchun
%A Zhang,Zhu
%A Li,Jiexun
%K BIS
%B ACM/IEEE Joint Conference on Digital Libraries (JCDL 2007)
%C Vancouver, British Columbia, Canada
%8 2007
%G eng
%2 c
%4 98583994368
%$ 98583994368
%0 Journal Article
%J Journal of the Association for Information Systems: Special Issue Enid Mumford's Contribution to Information Systems Theory and Theoretical Thinking
%D 2007
%T Complex problem solving: A case study on identity matching based on social contextual information
%A Xu,Jennifer
%A Wang,Alan G.
%A Li,Jiexun
%A Chau,Michaul
%K BIS
%B Journal of the Association for Information Systems: Special Issue Enid Mumford's Contribution to Information Systems Theory and Theoretical Thinking
%V 8
%P Article 31
%8 2007
%G eng
%N 10
%2 a
%4 86818070528
%$ 86818070528
%0 Journal Article
%J Simulation Modeling Practice and Theory
%D 2007
%T On Design, Verification, and Dynamic Modification of the Problem-Based Scientific Workflow Model
%A Liu,X.
%A Wanchun,D.
%A Chen,J.
%A Fan,Shaokun
%A Cheung,S. C.
%A Cai,S.
%K BIS
%K Business Analytics
%B Simulation Modeling Practice and Theory
%V 15
%8 2007
%G eng
%N 9
%2 a
%4 132759525376
%$ 132759525376
%0 Conference Paper
%D 2007
%T Do As Others Do: Modeling IT Adoption Intentions through Institutional and Social Contagion Theories
%A Klein,R.
%A Roberts,Nicholas
%K BIS
%8 2007
%G eng
%2 b
%4 272321701888
%$ 272321701888
%0 Generic
%D 2007
%T eConsulting to improve the client's bottom line.
%A Curry,Michael
%K BIS
%B CONFAB: the Next Generation Consultant
%C Reno, NV
%8 2007
%G eng
%2 c
%4 22435559425
%$ 22435559425
%0 Journal Article
%J Wuhan University Journal of Natural Sciences
%D 2007
%T A Fuzzy Directed Graph-based QoS Model for Service Composition
%A Sanjun,G.
%A Wanchun,D.
%A Fan,Shaokun
%K BIS
%K Business Analytics
%B Wuhan University Journal of Natural Sciences
%V 12
%8 2007
%G eng
%N 5
%2 a
%4 132759564288
%$ 132759564288
%0 Generic
%D 2007
%T Graph kernel-based learning for gene function prediction from gene interaction network
%A Li,Xin
%A Zhang,Zhu
%A Chen,Hsinchun
%A Li,Jiexun
%K BIS
%B IEEE International Conference on Bioinformatics and Biomedicine (IEEE-BIBM 2007)
%C Fremont, CA, USA
%8 2007
%G eng
%2 c
%4 98583965696
%$ 98583965696
%0 Journal Article
%J Information Visualization
%D 2007
%T Information Space Partitioning Using Adaptive Voronoi Diagrams
%A Reitsma,Reindert
%A Trubin,Stanislav
%K BIS
%X In this paper we present and evaluate a Voronoi method for partitioning continuous information spaces. We define the formal characteristics of the problem and discuss several well-known partitioning methods and approaches. We submit that although they all partially solve the problem, they all have shortcomings. As an alternative, we offer an approach based on an adaptive version of the multiplicatively weighted Voronoi diagram. The diagram is ‘adaptive’ because it is computed backwards; i.e., the generators' weights are treated as dependent rather than independent variables. We successfully test this adaptive solution using both ideal-typical (artificial) and empirical data. Since the resultant visualizations are meant to be used by human subjects, we then discuss the results of a usability experiment, positioning the adaptive solution against a commonly used rectangular solution and the classic nonweighted Voronoi solution. The results indicate that in terms of usability, both the rectangular and the adaptive Voronoi solution outperform the standard Voronoi solution. In addition, although subjects are better able to gage rectangular area relationships, only the adaptive Voronoi solution satisfies all geometric constraints of weight-proportional partitioning.
%B Information Visualization
%V 6
%P 123-138
%8 2007
%G eng
%2 a
%4 649322496
%$ 649322496
%0 Generic
%D 2007
%T Integrating Data Quality Data into Decision-Making Process: an Information Visualization Approach
%A Zhu,Bin
%A Shankaranarayanan,G.
%A Cai,Y.
%K BIS
%K Business Analytics
%B HCI International 2007
%C Beijing, China
%8 2007
%G eng
%2 c
%4 39444291585
%$ 39444291585
%0 Journal Article
%J Decision Support Systems
%D 2007
%T Large-scale regulatory network analysis from microarray data: Modified Bayesian network learning and association rule mining
%A Huang,Zan
%A Li,Jiexun
%A Su,Hua
%A Watts,George S.
%A Chen,Hsinchun
%K BIS
%B Decision Support Systems
%V 43
%P 1207-1225
%8 2007
%G eng
%2 a
%4 86818299904
%$ 86818299904
%0 Generic
%D 2007
%T Mining business policy texts for discovering process models: A framework and some initial results
%A Li,Jiexun
%A Wang,Harry Jiannan
%A Zhang,Zhu
%A Zhao,J Leon
%K BIS
%B The 6th Workshop on e-Business (WeB 2007)
%C Montreal, Quebec, Canada
%8 2007
%G eng
%2 c
%4 98583932928
%$ 98583932928
%0 Journal Article
%J IEEE Transactions on Information Technology in Biomedicine
%D 2007
%T Optimal search-based gene subset selection for gene array cancer classification
%A Li,Jiexun
%A Su,Hua
%A Chen,Hsinchun
%A Futscher,Bernard W.
%K BIS
%B IEEE Transactions on Information Technology in Biomedicine
%V 11
%P 398-405
%8 2007
%G eng
%N 4
%2 a
%4 86818201600
%$ 86818201600
%0 Generic
%D 2007
%T Poster Session. Aligning Curriculum with Standards: TeachEngineering, SAT & CAT
%A Reitsma,Reindert
%A Cyr,Martha N.
%A Diekema,Anne
%K BIS
%B National Science Digital Library Annual Meeting
%C Washington, DC
%8 2007
%G eng
%2 c
%4 8579811329
%$ 8579811329
%0 Conference Paper
%B Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, 181-182
%D 2007
%T Semantics or Standards for Curriculum Search?
%A Marshall,Byron
%A Reitsma,Reindert
%A Cyr,Martha N
%K Accounting
%K BIS
%X Aligning digital library resources with national and state educational standards to help K-12 teachers search for relevant curriculum is an important issue in the digital library community. Aligning standards from different states promises to help teachers in one state find appropriate materials created and cataloged elsewhere. Although such alignments provide a powerful means for crosswalking standards and curriculum across states, alignment matrices are intrinsically sparse. Hence, we hypothesize that such sparseness may cause significant numbers of false negatives when used for searching curriculum. Our preliminary results confirm the false negative hypothesis, demonstrate the usefulness of term-based techniques in addressing the false negative problem, and explore ways to combine term occurrence data with standards correlations.
%B Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, 181-182
%C New York, NY
%8 2007
%G eng
%2 b
%4 2606370817
%$ 2606370817
%0 Generic
%D 2007
%T TeachEngineering Poster Session
%A Reitsma,Reindert
%A Vanlue,William
%A Lewis,Paul
%K BIS
%B OSU 2007 National Science Board Site Visit
%8 2007
%G eng
%2 c
%4 2606598145
%$ 2606598145
%0 Conference Paper
%D 2007
%T Tying Context to Post-Adoption Behavior Within Information Technology: A Conceptual and Operational Definition of Mindfulness
%A Roberts,Nicholas
%A Thatcher,J.
%A Klein,R.
%K BIS
%8 2007
%G eng
%2 b
%4 272321697792
%$ 272321697792
%0 Journal Article
%J IEEE Transactions on Information Technology in Biomedicine
%D 2007
%T User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System
%A Quiñones,Karin D.
%A Su,Hua
%A Marshall,Byron
%A Eggers,Shauna
%A Chen,Hsinchun
%K Accounting
%K BIS
%X Explosive growth in biomedical research has made automated information extraction, knowledge integration, and visualization increasingly important and critically needed. The Arizona BioPathway (ABP) system extracts and displays biological regulatory pathway information from the abstracts of journal articles. This study uses relations extracted from more than 200 PubMed abstracts presented in a tabular and graphical user interface with built-in search and aggregation functionality. This article presents a task-centered assessment of the usefulness and usability of the ABP system focusing on its relation aggregation and visualization functionalities. Results suggest that our graph-based visualization is more efficient in supporting pathway analysis tasks and is perceived as more useful and easier to use as compared to a text-based literature viewing method. Relation aggregation significantly contributes to knowledge acquisition efficiency. Together, the graphic and tabular views in the ABP Visualizer provide a flexible and effective interface for pathway relation browsing and analysis. Our study contributes to pathway-related research and biological information extraction by assessing the value of a multi-view, relation-based interface which supports user-controlled exploration of pathway information across multiple granularities.
%B IEEE Transactions on Information Technology in Biomedicine
%V 11
%P 527-536
%8 2007
%G eng
%U http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4300830&arnumber=4300844&count=17&index=5
%N 5
%2 a
%4 648212480
%$ 648212480
%0 Conference Paper
%D 2007
%T Using Information Technology Mindfully
%A Roberts,Nicholas
%A Thatcher,J.
%A Klein,R.
%K BIS
%8 2007
%G eng
%2 b
%4 272321699840
%$ 272321699840
%0 Journal Article
%J Geoinformatica
%D 2007
%T Weight-proportional Space Partitioning Using Adaptive Voronoi Diagrams
%A Reitsma,Reindert
%A Trubin,S,
%A Mortensen,E.
%K BIS
%X Traditional application of Voronoi diagrams for space partitioning results in Voronoi regions, each with a specific area determined by the generators’ relative locations and weights. Particularly in the area of information space (re)construction, however, there is a need for inverse solutions; i.e., finding weights that result in regions with predefined area ratios. In this paper, we formulate an adaptive Voronoi solution and propose a raster-based optimization method for finding the associated weight set. The solution consists of a combination of simple, fixed-point iteration with an optional spatial resolution refinement along the regions’ boundaries using quadtree decomposition. We present the corresponding algorithm and its complexity analysis. The method is successfully tested on a series of ideal”typical cases and the interactions between the adaptive technique and boundary resolution refinement are explored and assessed.
%B Geoinformatica
%V 11
%P 383-405
%8 2007
%G eng
%N 3
%2 a
%4 649330688
%$ 649330688
%0 Journal Article
%J IEEE Transactions on Information Technology in Biomedicine
%D 2006
%T Aggregating Automatically Extracted Regulatory Pathway Relations
%A Marshall,Byron
%A Su,Hua
%A McDonald,Daniel
%A Eggers,Shauna
%A Chen,Hsinchun
%K Accounting
%K BIS
%X Automatic tools to extract information from biomedical texts are needed to help researchers leverage the vast and increasing body of biomedical literature. While several biomedical relation extraction systems have been created and tested, little work has been done to meaningfully organize the extracted relations. Organizational processes should consolidate multiple references to the same objects over various levels of granularity, connect those references to other resources, and capture contextual information. We propose a feature decomposition approach to relation aggregation to support a five-level aggregation framework. Our BioAggregate tagger uses this approach to identify key features in extracted relation name strings. We show encouraging feature assignment accuracy and report substantial consolidation in a network of extracted relations.
%B IEEE Transactions on Information Technology in Biomedicine
%V 10
%P 100- 108
%8 2006
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_IEEE_TITB_2005.pdf
%N 1
%2 a
%4 648208384
%$ 648208384
%0 Journal Article
%J International Journal of Forest Engineering
%D 2006
%T The Analytic Hierarchy Process: A Tutorial for Use in Prioritizing Forest Road Investments to Minimize Environmental Effects
%A Coulter,E.
%A Coakley,James
%A Sessions,J.
%K BIS
%B International Journal of Forest Engineering
%V 17
%P 51-70
%8 2006
%G eng
%N 2
%2 a
%4 645136384
%$ 645136384
%0 Generic
%D 2006
%T A Bayesian framework of integrating gene functional relations from heterogeneous data sources
%A Li,Jiexun
%A Li,Xin
%A Su,Hua
%A Chen,Hsinchun
%K BIS
%B American Medical Informatics Association (AMIA) Spring Congress
%C Phoenix, AZ, USA
%8 2006
%G eng
%2 c
%4 98584031232
%$ 98584031232
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2006
%T A framework of authorship identification for online messages: Writing style features and classification techniques
%A Zheng,Rong
%A Li,Jiexun
%A Chen,Hsinchun
%A Huang,Zan
%A Qin,Yi
%K BIS
%B Journal of the Association for Information Science and Technology
%V 57
%P 378-393
%8 2006
%G eng
%N 3
%2 a
%4 86818478080
%$ 86818478080
%0 Journal Article
%J Bioinformatics
%D 2006
%T A framework of integrating gene functional relations from heterogeneous data sources: An experiment on Arabidopsis thaliana
%A Li,Jiexun
%A Li,Xin
%A Su,Hua
%A Chen,Hsinchun
%A Galbraith,David W.
%K BIS
%B Bioinformatics
%V 22
%P 2037-2043
%8 2006
%G eng
%N 16
%2 a
%4 86818365440
%$ 86818365440
%0 Journal Article
%J Communications of the ACM
%D 2006
%T From fingerprint to writeprint
%A Li,Jiexun
%A Zheng,Rong
%A Chen,Hsinchun
%K BIS
%B Communications of the ACM
%V 49
%P 76-82
%8 2006
%G eng
%N 4
%2 a
%4 86818414592
%$ 86818414592
%0 Generic
%D 2006
%T Identity matching based on probabilistic relational models
%A Li,Jiexun
%A Wang,Gang Alan
%K BIS
%B Americas Conference on Information Systems (AMCIS’06)
%C Acapulco, Mexico
%8 2006
%G eng
%2 c
%4 98584014848
%$ 98584014848
%0 Conference Paper
%D 2006
%T Institutional Influences on Adoption Intention within the Healthcare Industry
%A Klein,R.
%A Roberts,Nicholas
%K BIS
%8 2006
%G eng
%2 b
%4 272321710080
%$ 272321710080
%0 Generic
%D 2006
%T Management Information Systems Research is USA
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Chengdu University of Information Technology
%C Chengdu, China
%8 2006
%G eng
%2 c
%4 39444944897
%$ 39444944897
%0 Journal Article
%J Decision Support Systems
%D 2006
%T Matching Knowledge Elements in Concept Maps Using a Similarity Flooding Algorithm
%A Marshall,Byron
%A Chen,Hsinchun
%A Madhusudan,Therani
%K Accounting
%K BIS
%X Concept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of concept maps exhibit terminology variance, informality, and organizational variation. These factors make it difficult to match elements between maps in comparison, retrieval, and merging processes. In this work, we add an element anchoring mechanism to a similarity flooding (SF) algorithm to match nodes and substructures between pairs of simulated maps and student-drawn concept maps. Experimental results show significant improvement over simple string matching with combined recall accuracy of 91% for conceptual nodes and concept ¨ link ¨ concept propositions in student-drawn maps.
%B Decision Support Systems
%V 42
%P 1290-1306
%8 2006
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/MatchKnowledgeElements_PrePrintVersion.pdf
%N 3
%2 a
%4 648204288
%$ 648204288
%0 Conference Paper
%D 2006
%T Mindfulness in the Domain of Information Systems
%A Roberts,Nicholas
%A Thatcher,J.
%A Klein,R.
%K BIS
%8 2006
%G eng
%2 b
%4 272321703936
%$ 272321703936
%0 Journal Article
%J Journal on Educational Resources in Computing
%D 2006
%T Moving Digital Libraries into the Student Learning Space: the GetSmart Experience
%A Marshall,Byron
%A Chen,Hsinchun
%A Shen,Rao
%A Fox,Edward A.
%K Accounting
%K BIS
%X The GetSmart system was built to support theoretically sound learning processes in a digital library environment by integrating course management, digital library, and concept mapping components to support a constructivist, six-step, information search process. In the fall of 2002 more than 100 students created 1400 concept maps as part of selected computing classes offered at the University of Arizona and Virginia Tech. Those students conducted searches, obtained course information, created concept maps, collaborated in acquiring knowledge, and presented their knowledge representations. This article connects the design elements of the GetSmart system to targeted concept-map-based learning processes, describes our system and research testbed, and analyzes our system usage logs. Results suggest that students did in fact use the tools in an integrated fashion, combining knowledge representation and search activities. After concept mapping was included in the curriculum, we observed improvement in students' online quiz scores. Further, we observed that students in groups collaboratively constructed concept maps with multiple group members viewing and updating map details.
%B Journal on Educational Resources in Computing
%V 6
%8 2006
%G eng
%U http://portal.acm.org/citation.cfm?doid=1217862.1217864
%N 1
%2 a
%4 648214528
%$ 648214528
%0 Generic
%D 2006
%T Optimal search-based gene subset selection for microarray cancer classification
%A Li,Jiexun
%A Su,Hua
%A Chen,Hsinchun
%A Futscher,Bernard W
%K BIS
%B American Medical Informatics Association (AMIA) Spring Congress
%C Phoenix, AZ, USA
%8 2006
%G eng
%2 c
%4 98584055808
%$ 98584055808
%0 Generic
%D 2006
%T TeachEngineering Poster Session
%A Reitsma,Reindert
%A Sullivan,J
%A Cyr,M N
%K BIS
%B National Science Digital Library Annual Meeting
%C Washington, DC
%8 2006
%G eng
%2 c
%4 2606585857
%$ 2606585857
%0 Conference Paper
%B Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), IEEE
%D 2006
%T Using Importance Flooding to Identify Interesting Networks of Criminal Activity
%A Marshall,Byron
%A Chen,Hsinchun
%K Accounting
%K BIS
%B Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), IEEE
%C San Diego, CA
%8 2006
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_ISI_2006.pdf
%2 b
%4 2606608385
%$ 2606608385
%0 Journal Article
%J Annual Review of Information Science and Technology
%D 2005
%T Information Visualization
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Annual Review of Information Science and Technology
%V 39
%8 2005
%G eng
%2 a
%4 39437971457
%$ 39437971457
%0 Conference Paper
%B Proceedings of the Pacific Symposium on Biocomputing, Jan 4-8, 2005, Big Island, Hawaii
%D 2005
%T Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations
%A Marshall,Byron
%A Su,Hua
%A McDonald,Dan
%A Chen,Hsinchun
%K Accounting
%K BIS
%X Systems that extract biological regulatory pathway relations from free-text sources are
intended to help researchers leverage vast and growing collections of research literature.
Several systems to extract such relations have been developed but little work has focused on
how those relations can be usefully organized (aggregated) to support visualization systems or
analysis algorithms. Ontological resources that enumerate name strings for different types of
biomedical objects should play a key role in the organization process. In this paper we
delineate five potentially useful levels of relational granularity and propose the use of
aggregatable substance identifiers to help reduce lexical ambiguity. An aggregatable
substance identifier applies to a gene and its products. We merged 4 extensive lexicons and
compared the extracted strings to the text of five million MEDLINE abstracts. We report on
the ambiguity within and between name strings and common English words. Our results show
an 89% reduction in ambiguity for the extracted human substance name strings when using an
aggregatable substance approach.
%B Proceedings of the Pacific Symposium on Biocomputing, Jan 4-8, 2005, Big Island, Hawaii
%8 2005
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/marshall_PSB2005.pdf
%2 b
%4 2606753793
%$ 2606753793
%0 Journal Article
%J Decision Support Systems
%D 2005
%T NewsMap: A Knowledge Map for Online News
%A Ong,T-H.
%A Chen,H.
%A Sung,WK
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 39
%P 583-597
%8 2005
%G eng
%N 4
%2 a
%4 39437928449
%$ 39437928449
%0 Generic
%D 2005
%T Optimal search based gene selection for cancer prognosis
%A Li,Jiexun
%A Su,Hua
%A Chen,Hsinchun
%K BIS
%B Americas Conference on Information Systems (AMCIS’05)
%C Omaha, NE
%8 2005
%G eng
%2 c
%4 98584080384
%$ 98584080384
%0 Generic
%D 2005
%T Poster Session. Just a cute kid with a great imagination?
%A Reitsma,Reindert
%A Sullivan,J
%A Cyr,M N
%K BIS
%B National Science Digital Library Annual Meeting
%C Denver, CO
%8 2005
%G eng
%2 c
%4 2606573569
%$ 2606573569
%0 Generic
%D 2005
%T Research in Management Information Systems
%A Zhu,Bin
%K BIS
%K Business Analytics
%C Nanchang, Jiangxi, P.R. China
%8 2005
%G eng
%2 c
%4 39456548865
%$ 39456548865
%0 Journal Article
%J Decision Support Systems
%D 2005
%T Using 3D Interfaces to Facilitate the Spatial Knowledge Retrieval: A Geo-referenced Knowledge Repository System
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Decision Support Systems
%V 40
%P 167-182
%8 2005
%G eng
%N 2
%2 a
%4 39437864961
%$ 39437864961
%0 Conference Paper
%B Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11, 2005 , Denver, CO
%D 2005
%T Visualizing Aggregated Biological Pathway Relations
%A Marshall,Byron
%A Quiñones,Karin
%A Su,Hua
%A Eggers,Shauna
%A Chen,Hsinchun
%K Accounting
%K BIS
%X The Genescene development team has constructed an aggregation interface for automatically-extracted biomedical pathway
relations that is intended to help researchers identify and process relevant information from the vast digital library of abstracts found in the National Library of Medicine’s PubMed collection.
Users view extracted relations at various levels of relational granularity in an interactive and visual node-link interface. Anecdotal feedback reported here suggests that this multigranular visual paradigm aligns well with various research tasks,
helping users find relevant articles and discover new information.
%B Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11, 2005 , Denver, CO
%8 2005
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL_2005_Aggregation.pdf
%2 b
%4 2606727169
%$ 2606727169
%0 Journal Article
%J Data and Knowledge Engineering
%D 2004
%T A Case-based Reasoning Framework for Workflow Model Management
%A Madhusudan,Therani
%A Zhao,J. Leon
%A Marshall,Byron
%K Accounting
%K BIS
%X In order to support efficient workflow design, recent commercial workflow systems are providing templates of common business processes. These templates, called cases, can be modified individually or collectively into a new workflow to meet the business specification. However, little research has been done on how to manage workflow models, including issues such as model storage, model retrieval, model reuse and assembly. In this paper, we propose a novel framework to support workflow modeling and design by adapting workflow cases from a repository of process models. Our approach to workflow model management is based on a structured workflow lifecycle and leverages recent advances in model management and case-based reasoning techniques. Our contributions include a conceptual model of workflow cases, a similarity flooding algorithm for workflow case retrieval, and a domain-independent AI planning approach to workflow case composition. We illustrate the workflow model management framework with a prototype system called Case-Oriented Design Assistant for Workflow Modeling (CODAW).
%B Data and Knowledge Engineering
%V 50
%P 87-115
%8 2004
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Madhusudan_DKE_CODAW.pdf
%N 1
%2 a
%4 648202240
%$ 648202240
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2004
%T EBizPort: Collecting and Analyzing Business Intelligence Information
%A Marshall,Byron
%A McDonald,Dan
%A Chen,Hsinchun
%A Chung,Wingyan
%K Accounting
%K BIS
%X In this article, Marshall, McDonald, Chen, and Chung take a different approach to supporting search services to large and heterogeneous document collections. They propose development of a domain-specific collection by crawling the content of a small set of highly reputable sites, maintaining a local index of the content, and providing browsing and searching services on the specialized content. This resource, known as a vertical portal, has the potential of overcoming several problems associated with bias, update delay, reputation, and integration of scattered information. The article discusses the design of a vertical portal system's architecture called EbizPort, rationale behind its major components, and algorithms and techniques for building collections and search functions. Collection (or more broadly content) has an obvious relationship to the nature of the search interface, as it can impact the type of search functions that can be offered. Powerful search interface functions were built for EbizPort by exploiting the underlying content representation and a relatively narrow and well-defined domain focus. Particularly noteworthy are the innovative browsing functions, which include a summarizer, a categorizer, a visualizer, and a navigation side-bar. The article ends with a discussion of an evaluation study, which compared the EbizPort system with a baseline system called Brint. Results are presented on effectiveness and efficiency, usability and information quality, and quality of local collection and content retrieved from other sources (an extended search operation called meta-search service was also provided in the system). Overall, the authors find that EbizPort outperforms the baseline system, and it provides a viable way to support access to business information.
%B Journal of the Association for Information Science and Technology
%V 55
%P 873-891
%8 2004
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_EBizPort.pdf
%N 1
%2 a
%4 648210432
%$ 648210432
%0 Conference Paper
%B Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2004), June 7-11, 2004 , Tucson, AZ
%D 2004
%T Element Matching in Concept Maps
%A Marshall,Byron
%A Madhusudan,Therani
%K Accounting
%K BIS
%B Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2004), June 7-11, 2004 , Tucson, AZ
%8 2004
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2004_ElementMatching.pdf
%2 b
%4 2606778369
%$ 2606778369
%0 Journal Article
%J Bioinformatics
%D 2004
%T Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser
%A McDonald,Dan
%A Chen,Hsinchun
%A Su,Hua
%A Marshall,Byron
%K Accounting
%K BIS
%X Motivation: Text-mining research in the biomedical domain has been motivated by the rapid growth of new research findings. Improving the accessibility of findings has potential to speed hypothesis generation.Results: We present the Arizona Relation Parser that differs from other parsers in its use of a broad coverage syntax-semantic hybrid grammar. While syntax grammars have generally been tested over more documents, semantic grammars have outperformed them in precision and recall. We combined access to syntax and semantic information from a single grammar. The parser was trained using 40 PubMed abstracts and then tested using 100 unseen abstracts, half for precision and half for recall. Expert evaluation showed that the parser extracted biologically relevant relations with 89% precision. Recall of expert identified relations with semantic filtering was 35 and 61% before semantic filtering. Such results approach the higher-performing semantic parsers. However, the AZ parser was tested over a greater variety of writing styles and semantic content.
%B Bioinformatics
%V 20
%P 3370-8
%8 2004
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/MCDONALD_BIOINFORMATICS.pdf
%N 18
%2 a
%4 648206336
%$ 648206336
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2004
%T Spatialization of Web Sites Using a Weighted Frequency Model of Navigation Data
%A Reitsma,Reindert
%A Thabane,L.
%A MacLeod,J.
%K BIS
%X Reitsma, Thabane, and MacLeod are interested in the display of document sets as visualized geometric spaces. Such spaces can use metrics and dimensions determined arbitrarily prior to analysis of data, or they may use secondary data (logged website transaction counts, perhaps) with techniques like factor analysis or MDS to find a structure. Using high transaction volume between an origin and a destination as an indicator of a small distance and a low volume as an indicator of a large distance, a transaction log can provide input to MDS. One problem is the possible origination of multiple sessions from the same address where one can not determine if consecutive requests are part of the same transaction and thus frequencies may be invalid. They suggest the use of the probability that a count is a transaction as a weight rather the count alone, with this probability depending upon the time separation between an origin and a destination with less time indicating a higher probability. A transaction log for a website for undergraduate engineering learning was analyzed in this manner and weighted transaction counts were compared to the use of straight count inputs to MDS using the Euclidean metric and four dimensions. Weighted results were not significantly different.
%B Journal of the Association for Information Science and Technology
%V 55
%P 13-22
%8 2004
%G eng
%N 1
%2 a
%4 649314304
%$ 649314304
%0 Generic
%D 2004
%T Teachengineering Resources for K-12
%A Reitsma,Reindert
%A Cyr,M.
%A Mooney,M.
%A Sullivan,J.
%A Ybarra,G.
%K BIS
%B 4th Annual NSF-NSDL meeting
%8 2004
%G eng
%2 c
%4 649347072
%$ 649347072
%0 Generic
%D 2003
%T The Design for an Effective Knowledge Repository System
%A Zhu,Bin
%A Iyer,B.
%K BIS
%K Business Analytics
%B Minnesota Symposium on Knowledge Management
%C Minneapolis, MN
%8 2003
%G eng
%2 c
%4 39456614401
%$ 39456614401
%0 Journal Article
%J Telecommunication Systems
%D 2003
%T An Efficient Heuristic for Solving an Extended Capacitated Concentrator Location Problem
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%X In this paper, a mathematical model and a solution algorithm are developed for solving an extended capacitated concentrator location problem. Our model extends the conventional formulation by simultaneously addressing the two capacity constraints, total connection ports and maximum data processing rate, on each concentrator to be selected for satisfying the communication demands of the given end-user nodes. Since the problem is NP-complete, an efficient and effective Lagrangian heuristic is developed and tested by solving 100 randomly generated test problems with sizes ranging from 30(nodes)×30(concentrators) to150×30. Altogether 58% of the tested problems are solved optimally with an average solution gap 0.36% from the optimality and average solution times are from a few seconds to one half of a minute.
%B Telecommunication Systems
%V 23
%P 171-199
%8 2003
%G eng
%N 1-2
%2 a
%4 649193472
%$ 649193472
%0 Journal Article
%J International Journal of Engineering Education
%D 2003
%T Exploiting Engineering as a Unique Distance Learning Tool 19, 379-388
%A Carlson,L.
%A Reitsma,Reindert
%A Brandemuehl,M.
%A Hertzberg,J.
%A Sullivan,J.
%A Gabbard,S.
%K BIS
%B International Journal of Engineering Education
%V 19
%P 379-388
%8 2003
%G eng
%2 a
%4 649318400
%$ 649318400
%0 Generic
%D 2003
%T Financial neural network applications: 2000 - 2002 update
%A Brown,Carol
%A Coakley,James
%K Accounting
%K BIS
%K Dean's Office
%B Twelfth Annual Research Workshop on: Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax
%C Honolulu, Hawaii, USA
%8 2003
%G eng
%2 c
%4 7499407361
%$ 7499407361
%0 Generic
%D 2003
%T Genescene: Biomedical text and data mining
%A Leroy,Gondy
%A Chen,Hsinchun
%A Martinez,Jessie
%A Eggers,S
%A Falsey,R
%A Kislin,K
%A Huang,Zan
%A Li,Jiexun
%A Xu,Jennifer
%A McDonald,Daniel
%A Ng,Gavin
%K BIS
%B ACM/IEEE Joint Conference on Digital Libraries (JCDL 2003)
%C Houston, TX, USA
%8 2003
%G eng
%2 c
%4 98584117248
%$ 98584117248
%0 Journal Article
%J International Journal of Information Technology and Decision Making
%D 2003
%T A GRASP Heuristic for Solving an Extended Capacitated Concentrator Location Problem
%A Han ,Bernard T.
%A Raja,V.T.
%K BIS
%X Local Access Networks (LACNs) are often considered the "last mile" over the Internet provided that they are connected to some existing Wide Area Network backbone. In this paper, a revised LACN-WAN interconnection model is presented as an extension to the conventional Capacitated Concentrator Location Problem (CCLP). An efficient heuristic is also developed to seek near-optimal deployment of telecommunication devices (e.g. links, concentrators, etc.) while minimizing the total connection costs for the network interconnection. Our solution algorithm could serve as a decision-making tool in solving problems with a real world size (i.e. 120 nodes and 30 concentrators).
%B International Journal of Information Technology and Decision Making
%C World Scientific Publishing Company
%V 2
%P 597-618
%8 2003
%G eng
%N 4
%2 a
%4 649197568
%$ 649197568
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2003
%T HelpfulMed: Intelligent Searching for Medical Information over the Internet
%A Chen,H.
%A Lally,A.M.
%A Zhu,Bin
%A Chau,M.
%K BIS
%K Business Analytics
%B Journal of the Association for Information Science and Technology
%V 54
%P 683-694
%8 2003
%G eng
%N 7
%2 a
%4 39438098433
%$ 39438098433
%0 Conference Paper
%B Proceedings of the 2003 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2003), May 2003, Houston, Texas
%D 2003
%T Knowledge Management and E-Learning: the GetSmart Experience
%A Marshall,Byron
%A Zhang,Yiwen
%A Chen,Hsinchun
%A Lally,Ann
%A Shen,Rao
%A Fox,Edward
%A Cassel,Lillian
%K Accounting
%K BIS
%X The National Science Digital Library (NSDL), launched in December 2002, is emerging as a center of innovation in digital libraries as applied to education. As a part of this extensive project, the GetSmart system was created to apply knowledge management techniques in a learning environment. The design of the system is based on an analysis of learning theory and theinformation search process. Its key notion is the integration of search tools and curriculum support with concept mapping. More than 100 students at the University of Arizona and Virginia Tech used the system in the fall of 2002. A database of more than one thousand student-prepared concept maps has been collected with more than forty thousand relationships expressed in semantic, graphical, node-link representations. Preliminary analysis of the collected data is revealing interesting knowledge representation patterns.
%B Proceedings of the 2003 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2003), May 2003, Houston, Texas
%8 2003
%G eng
%U http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2003_GetSmart.pdf
%2 b
%4 2606821377
%$ 2606821377
%0 Generic
%D 2002
%T An AI-based Heuristic for solving an Extended Concentrator Location Problem
%A Raja,V.T.
%K BIS
%B College of Business Research Seminar Series
%C Corvallis, OR
%8 2002
%G eng
%2 c
%4 2726858753
%$ 2726858753
%0 Generic
%D 2002
%T Discovering association rules with degrees of support and implication (ARsi)
%A Chen,Guoqing
%A Li,Jiexun
%A Yan,Peng
%A Kerre,E E
%K BIS
%B Computational Intelligent Systems for Applied Research: Proceedings of the 5th International Flins Conference
%C Gent, Belgium
%8 2002
%G eng
%2 c
%4 98584174592
%$ 98584174592
%0 Generic
%D 2002
%T Influence and conditional influence -- New interestingness measures in association rule mining
%A Liu,De
%A Chen,Guoqing
%A Li,Jiexun
%K BIS
%B IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2001)
%C Melbourne, Australia
%8 2002
%G eng
%2 c
%4 98583285760
%$ 98583285760
%0 Journal Article
%J International Journal of Human-Computer Studies
%D 2002
%T Loglinear and Multidimensional Scaling Models of Digital Library Navigation
%A Buttenfield,B.
%A Reitsma,Reindert
%K BIS
%B International Journal of Human-Computer Studies
%V 57
%P 101-119
%8 2002
%G eng
%2 a
%4 51551979520
%$ 51551979520
%0 Journal Article
%J Journal of Information Technology Management
%D 2002
%T Making Sense of Strategic Alignment: An Interpretive View of Alignment Problems and Practices
%A Fiegener,Mark K
%A Coakley,James
%K BIS
%B Journal of Information Technology Management
%V XIII
%P 15-32
%8 2002
%G eng
%N 3-4
%2 a
%4 19389708289
%$ 19389708289
%0 Generic
%D 2002
%T MedTextus: an intelligent web-based medical meta-search system
%A Zhu,Bin
%A Leory,G.
%A Chen,H.
%A Chen,Y.
%K BIS
%K Business Analytics
%B 2nd ACM/IEEE-CS Joint Conference on Digital libraries
%C Portland, OR
%8 2002
%G eng
%2 c
%4 39444371457
%$ 39444371457
%0 Generic
%D 2002
%T A SAR-based interesting rule mining algorithm
%A Li,Jiexun
%A Chen,Guoqing
%K BIS
%B Joint Conference of the North American Fuzzy Information Processing Society and the Special Interest Group on Fuzzy Logic and the Internet (NAFIPS-FLINT 2002)
%C New Orleans, LA, USA
%8 2002
%G eng
%2 c
%4 98584221696
%$ 98584221696
%0 Generic
%D 2002
%T Visualizing a computer mediated communication (CMC) process to facilitate knowledge management
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Conference on Human Factors in Computing Systems
%C Minneapolis, MN
%8 2002
%G eng
%2 c
%4 39444410369
%$ 39444410369
%0 Generic
%D 2002
%T Visualizing Computer-Mediated Communication Process
%A Zhu,Bin
%K BIS
%K Business Analytics
%8 2002
%G eng
%2 c
%4 39459280897
%$ 39459280897
%0 Generic
%D 2002
%T Visualizing Computer-Mediated Communication Process
%A Zhu,Bin
%K BIS
%K Business Analytics
%8 2002
%G eng
%2 c
%4 39459266561
%$ 39459266561
%0 Generic
%D 2001
%T Can E-Cheating be Prevented?: An Approach to Detect Plagiarism in Computer Skills Courses
%A Coakley,James
%A Tyran,C. K.
%K BIS
%B Proceedings of Seventh Americas Conference on Information System
%8 2001
%G eng
%2 c
%4 645144576
%$ 645144576
%0 Journal Article
%J New Review of Applied Expert Systems and Emerging Technologies
%D 2001
%T Financial neural Network applications: 1998-1999 update
%A Brown,Carol
%A Coakley,James
%K Accounting
%K BIS
%K Dean's Office
%B New Review of Applied Expert Systems and Emerging Technologies
%V 7
%P 167-182
%8 2001
%G eng
%2 a
%4 644880384
%$ 644880384
%0 Generic
%D 2001
%T A Framework for Controlling Cheating in IS Education
%A Coakley,James
%A Tyran,C. K.
%K BIS
%B Proceedings of International Conference on Informatics Education & Research
%C New Orleans, Louisiana
%8 2001
%G eng
%2 c
%4 645142528
%$ 645142528
%0 Generic
%D 2001
%T Influence and conditional influence -- New interestingness measures in association rule mining
%A Li,Jiexun
%A Chen,Guoqing
%A Liu,De
%K BIS
%B IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2001)
%C Melbourne, Australia
%8 2001
%G eng
%2 c
%4 98584236032
%$ 98584236032
%0 Generic
%D 2001
%T A Lagrangian Heuristic for Network Design
%A Raja,V.T.
%K BIS
%B College of Business Research Seminar Series
%C Corvallis, OR
%8 2001
%G eng
%2 c
%4 2726852609
%$ 2726852609
%0 Generic
%D 2001
%T Social Visualization for Computer-Mediated Communication: A Knowledge Management Perspective
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Eleventh Workshop on Information Technologies and Systems
%8 2001
%G eng
%2 c
%4 39444449281
%$ 39444449281
%0 Generic
%D 2001
%T Using IT to add value: Innovation versus Efficiency
%A Coakley,James
%A Gobeli,Dave
%K BIS
%K Strategy & Entrepreneurship
%B Portland Chapter of the Society for Information Management
%C Portland, OR
%8 2001
%G eng
%2 c
%4 645146624
%$ 645146624
%0 Generic
%D 2001
%T Visualizing Computer-Mediated Communication Process
%A Zhu,Bin
%K BIS
%K Business Analytics
%C Bloomington, IN
%8 2001
%G eng
%2 c
%4 39459424257
%$ 39459424257
%0 Generic
%D 2001
%T Visualizing Computer-Mediated Communication Process
%A Zhu,Bin
%K BIS
%K Business Analytics
%C Rochester, NY
%8 2001
%G eng
%2 c
%4 39459442689
%$ 39459442689
%0 Generic
%D 2001
%T Visualizing Computer-Mediated Communication Process
%A Zhu,Bin
%K BIS
%K Business Analytics
%C Colorado Springs, CO
%8 2001
%G eng
%2 c
%4 39459450881
%$ 39459450881
%0 Journal Article
%J International Journal of Intelligent Systems in Accounting Finance and Management
%D 2000
%T Artificial Neural Networks in Accounting and Finance: Modeling Issues
%A Coakley,James
%A Brown,Carol
%K Accounting
%K BIS
%K Dean's Office
%X This article reviews the literature on artificial neural networks (ANNs) applied to accounting and finance problems and summarizes the 'suggestions' from this literature. The first section reviews the basic foundation of ANNs to provide a common basis for further elaboration and suggests criteria that should be used to determine whether the use of an ANN is appropriate. The second section of the paper discusses development of ANN models including: selection of the learning algorithm, choice of the error and transfer functions, specification of the architecture, preparation of the data to match the architecture, and training of the network The final section presents some general guidelines and a brief summary of research progress and open research questions. Copyright © 2000 John Wiley & Sons, Ltd.
%B International Journal of Intelligent Systems in Accounting Finance and Management
%V 9
%P 119-144
%8 2000
%G eng
%N 2
%2 a
%4 644878336
%$ 644878336
%0 Generic
%D 2000
%T Business Application Development
%A Swanson,Parker
%K BIS
%K MIS
%B Linn-Benton Community College (LBCC)
%C Albany, OR
%8 2000
%G eng
%2 c
%4 649652224
%$ 649652224
%0 Journal Article
%J IEEE Transactions on Image Processing
%D 2000
%T Creating a Large-Scale Content-Based Air Photo Image Digital Library
%A Zhu,Bin
%A Ramsey,M.
%A Chen,H.
%K BIS
%K Business Analytics
%B IEEE Transactions on Image Processing
%V 9
%P 163-167
%8 2000
%G eng
%N 1
%2 a
%4 39438198785
%$ 39438198785
%0 Journal Article
%J Journal of Informatics Education and Research
%D 2000
%T The E-Commerce Course Project: Creating Educational Linkages with the Value Chain
%A Tyran,Craig K.
%A Coakley,James
%K BIS
%B Journal of Informatics Education and Research
%V 2
%P 59-70
%8 2000
%G eng
%N 2
%2 a
%4 645134336
%$ 645134336
%0 Generic
%D 2000
%T Financial Neural Network Applications: 1998-1999
%A Brown,Carol
%A Coakley,James
%K Accounting
%K BIS
%K Dean's Office
%B Ninth Annual Research Workshop on: Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax
%C Philadelphia, PA, USA
%8 2000
%G eng
%2 c
%4 7512172545
%$ 7512172545
%0 Generic
%D 2000
%T Inventing the 'Treebook': A Workbook with Pages Linked in a Tree
%A Sullivan,Dave
%K BIS
%K MIS
%B ISECON Conference Proceedings
%8 2000
%G eng
%2 c
%4 649592832
%$ 649592832
%0 Journal Article
%J Proceedings of the IEEE
%D 2000
%T A Living Laboratory
%A Lightner,M.
%A Carlson,D.
%A Sullivan,J.
%A Brandemuehl,M.
%A Reitsma,Reindert
%K BIS
%B Proceedings of the IEEE
%V 88
%P 31-40
%8 2000
%G eng
%2 a
%4 51551956992
%$ 51551956992
%0 Generic
%D 2000
%T Personal Action and Ethical Behavior: Responsibilities and Practices.
%A Tanner,Ray
%K BIS
%K MIS
%B 91 College of Business; Finance Course Guest lecturer
%C Corvallis, OR
%8 2000
%G eng
%2 c
%4 649730048
%$ 649730048
%0 Generic
%D 2000
%T Presentation:Freshmen students in the College of Business: Coursework and Outcome-based Education
%A Tanner,Ray
%K BIS
%K MIS
%B 91 College of Business; MIS Curriculum Advisory Council
%C Portland, 91
%8 2000
%G eng
%2 c
%4 649728000
%$ 649728000
%0 Generic
%D 2000
%T Untitled
%A Raja,V.T.
%K BIS
%8 2000
%G eng
%2 c
%4 27371016192
%$ 27371016192
%0 Generic
%D 2000
%T Using GRASP to solve the Capacitated Concentrator Location Problem
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%B Decision Sciences Institute National Meeting
%C Orlando, Florida
%8 2000
%G eng
%2 c
%4 649213952
%$ 649213952
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 2000
%T Validating a Geographical Image Retrieval System
%A Zhu,Bin
%A Chen,H.
%K BIS
%K Business Analytics
%B Journal of the Association for Information Science and Technology
%V 51
%P 625-634
%8 2000
%G eng
%N 7
%2 a
%4 39438256129
%$ 39438256129
%0 Journal Article
%J Group Decision and Negotiation
%D 1999
%T Accessibility of Computer-based Simulation Models in Inherently Conflict-Laden Negotiations
%A Zigurs,I.
%A Reitsma,Reindert
%A Lewis,C.
%A Hubscher,R.
%A Hayes,C.
%K BIS
%B Group Decision and Negotiation
%V 8
%P 511-533
%8 1999
%G eng
%2 a
%4 51551926272
%$ 51551926272
%0 Journal Article
%J Journal of the Association for Information Science and Technology
%D 1999
%T A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images
%A Ramsey,M.
%A Chen,H.
%A Zhu,Bin
%K BIS
%K Business Analytics
%B Journal of the Association for Information Science and Technology
%V 50
%P 826-835
%8 1999
%G eng
%N 9
%2 a
%4 39438444545
%$ 39438444545
%0 Generic
%D 1999
%T A Comparison of Two Modern Heuristics for Designing Local Access Networks
%A Raja,V.T.
%A Han ,Bernard T.
%K BIS
%B INFORMS National Meeting
%C Philadelphia, Pennsylvania
%8 1999
%G eng
%2 c
%4 649218048
%$ 649218048
%0 Generic
%D 1999
%T Creating a Large Scale Digital Library for Geo-Referenced Information
%A Zhu,Bin
%A Ramsey,M
%A Chen,H.
%A Hauck,R.V.
%A Ng,T.D.
%A Schatz,B.
%K BIS
%K Business Analytics
%B Digital Library‘99, the 4th ACM Conference on Digital Libraries
%8 1999
%G eng
%2 c
%4 39444551681
%$ 39444551681
%0 Generic
%D 1999
%T Financial Neural Network Applications: Brief Literature Review and Extensive Bibliography
%A Brown,Carol
%A Coakley,James
%K Accounting
%K BIS
%K Dean's Office
%B Eighth Annual Research Workshop on: Artificial Intelligence and Emerging Technologies in Accounting, Auditing and Tax
%C San Diego, CA, USA
%8 1999
%G eng
%2 c
%4 7512272897
%$ 7512272897
%0 Generic
%D 1999
%T The State of the Art of Network Design and Management
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%B Decision Sciences Institute National Meeting
%C New Orleans
%8 1999
%G eng
%2 c
%4 649216000
%$ 649216000
%0 Generic
%D 1999
%T Support Concept-Based Multimedia Information Retrieval: A Knowledge Management Approach
%A Zhu,Bin
%A Ramsey,M.
%A Chen,H.
%A Hauck,R.V.
%A Ng,T.D.
%A Schatz,B.
%K BIS
%K Business Analytics
%B ICIS’99, 20th Annual International Conference on Information Systems
%8 1999
%G eng
%2 c
%4 39444617217
%$ 39444617217
%0 Generic
%D 1999
%T The WWW and Computer Skills Training: Key Issues for Design and Implementation
%A Coakley,James
%A Tyran,C. K.
%K BIS
%B Proceedings of the International Academy for Information Management
%8 1999
%G eng
%2 c
%4 645148672
%$ 645148672
%0 Generic
%D 1998
%T An AI-based Heuristic for solving a Generalized Concentrator Location Problem
%A Raja,V.T.
%A Han ,Bernard T.
%K BIS
%B INFORMS National Meeting
%C Seattle, WA
%8 1998
%G eng
%2 c
%4 649222144
%$ 649222144
%0 Journal Article
%J The Journal of Education for Business
%D 1998
%T Computer-Mediated Peer Review of Student Papers
%A Sullivan,Dave
%A Nielson,Norma
%A Brown,Carol
%K Accounting
%K BIS
%K Dean's Office
%K MIS
%B The Journal of Education for Business
%V 74
%P 117-121
%8 1998
%G eng
%N 2
%2 a
%4 3842539521
%$ 3842539521
%0 Generic
%D 1998
%T An Efficient Heuristic for Solving a Generalized Concentrator Location Problem
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%B INFORMS National Meeting
%C Seattle, WA
%8 1998
%G eng
%2 c
%4 649220096
%$ 649220096
%0 Generic
%D 1998
%T A Neural-Net Gaussian Machine for Optimal Local Access Network Design
%A Raja,V.T.
%A Han ,Bernard T.
%K BIS
%B Association for Information Systems, Americas Conference
%C Baltimore, Maryland
%8 1998
%G eng
%2 c
%4 649224192
%$ 649224192
%0 Generic
%D 1998
%T Student Perceptions of Electronic Classrooms
%A Raja,V.T.
%A Kumar,Anil
%K BIS
%B Midwest Business Administration Conference
%C Chicago, Illinois
%8 1998
%G eng
%2 c
%4 649226240
%$ 649226240
%0 Generic
%D 1998
%T Untitled
%A Raja,V.T.
%K BIS
%8 1998
%G eng
%2 c
%4 27371014144
%$ 27371014144
%0 Journal Article
%J Journal of Management Education
%D 1998
%T Using a Computer Based Version of The Beer Game - Lessons Learned,"
%A Coakley,James
%A Drexler,John A
%A Kircher,Anna E
%A Larson,Erik W
%K BIS
%B Journal of Management Education
%V 22
%P 416-424
%8 1998
%G eng
%N 3
%2 a
%4 19389732865
%$ 19389732865
%0 Journal Article
%J Journal of Management Education
%D 1998
%T Using a Computer-Based Version of the Beer Game
%A Larson,Erik
%A Coakley,James
%A Drexler,John
%K BIS
%K Management
%B Journal of Management Education
%8 1998
%G eng
%2 a
%4 28690448385
%$ 28690448385
%0 Generic
%D 1997
%T Integration of India into the Global Economy ” An Information Technology Perspective
%A Raja,V.T.
%A Kumar,Anil
%K BIS
%B Midwest Conference on Asian Affairs
%C Dekalb, Illinois
%8 1997
%G eng
%2 c
%4 649228288
%$ 649228288
%0 Journal Article
%J Journal of Geographic Information and Decision Analysis
%D 1997
%T Object-oriented Simulation and Evaluation of River Basin Operations
%A Reitsma,Reindert
%A Carron,J.
%K BIS
%B Journal of Geographic Information and Decision Analysis
%V 1
%P 9-24
%8 1997
%G eng
%2 a
%4 51551909888
%$ 51551909888
%0 Journal Article
%D 1997
%T Object-oriented Simulation and Evaluation of River Basin Operations. Journal of Geographic Information and Decision Analysis. 1, 1, pp. 10-24
%A Reitsma,Reindert
%A Carron,John C.
%K BIS
%V 1
%P 1--24
%8 1997
%G eng
%N 1
%2 a
%4 240165423104
%$ 240165423104
%0 Generic
%D 1997
%T Some Design and Planning Issues for Local Access Networks
%A Raja,V.T.
%A Han ,Bernard T.
%K BIS
%B 14th Symposium on Combinatorial Optimization and Applications of Mathematical Programming
%C Taiwan
%8 1997
%G eng
%2 c
%4 649230336
%$ 649230336
%0 Journal Article
%J Journal of Education for Business
%D 1996
%T Enhancing Business Classes with World Wide Web
%A Brown,Carol
%A Nielson,Norma
%A Sullivan,Dave
%K Accounting
%K BIS
%K Dean's Office
%K MIS
%B Journal of Education for Business
%V 71
%P 317-323
%8 1996
%G eng
%N 6
%2 a
%4 3842570241
%$ 3842570241
%0 Journal Article
%J Computers and Biomedical Research
%D 1996
%T An Expert System to Diagnose Anemia and Report Results Directly on Hematology Forms
%A Coakley,James
%K BIS
%B Computers and Biomedical Research
%P 16-26
%8 1996
%G eng
%2 a
%4 28690677761
%$ 28690677761
%0 Journal Article
%J Journal of Hydrology
%D 1996
%T Structure and Support of Water Resources Management and Decision Making
%A Reitsma,Reindert
%K BIS
%B Journal of Hydrology
%V 177
%P 253-268
%8 1996
%G eng
%2 a
%4 51551893504
%$ 51551893504
%0 Journal Article
%J Expert Systems with Applications
%D 1996
%T Using Pattern Analysis Methods to Supplement Attention-Directing Analytical Procedures
%A Coakley,James
%K BIS
%B Expert Systems with Applications
%P 513-528
%8 1996
%G eng
%N December
%2 a
%4 28690763777
%$ 28690763777
%0 Journal Article
%J Journal of Systems Management
%D 1995
%T CIO 'Impression Management:' Problems and Practices
%A Coakley,James
%K BIS
%B Journal of Systems Management
%P 56-61
%8 1995
%G eng
%N Nov/Dec
%2 a
%4 28690798593
%$ 28690798593
%0 Generic
%D 1995
%T ISO9001 and IPP
%A Cabak,Carrie
%K BIS
%B Institute of Packing Professionals
%C San Francisco, CA
%8 1995
%G eng
%2 c
%4 91514275840
%$ 91514275840
%0 Generic
%D 1995
%T A Lagrangean Heuristic for the Design of Capacitated Star-Star Concentrator Networks
%A Raja,V.T.
%K BIS
%B INFORMS Joint National Meeting
%C Los Angeles, CA
%8 1995
%G eng
%2 c
%4 649234432
%$ 649234432
%0 Journal Article
%J Management Accounting
%D 1995
%T Neural Networks Enter the World of Management Accounting
%A Brown,Carol
%A Coakley,James
%A Phillips,Mary Ellen
%K Accounting
%K BIS
%K Dean's Office
%B Management Accounting
%V LXXVI
%P 51-53, 56-57
%8 1995
%G eng
%N 11
%2 a
%4 3842607105
%$ 3842607105
%0 Journal Article
%J Management Accounting
%D 1995
%T Neural Networks: Nuts and Bolts
%A Brown,Carol
%A Coakley,James
%A Phillips,Mary Ellen
%K Accounting
%K BIS
%K Dean's Office
%B Management Accounting
%V LXXVI
%P 54-55
%8 1995
%G eng
%N 11
%2 a
%4 3842613249
%$ 3842613249
%0 Generic
%D 1995
%T Optimal Telecommunication Facility Planning Under Uncertainty
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%B Americas Conference on Information Systems
%C Pittsburgh, PA
%8 1995
%G eng
%2 c
%4 649232384
%$ 649232384
%0 Generic
%D 1995
%T A Robustness Approach to the Telecommunication Facility Management Problem in the Presence of Demand Uncertainty from End-Users
%A Raja,V.T.
%A Han ,Bernard T.
%A Chen,Bin Tong
%K BIS
%B Third INFORMS Telecommunications Conference
%C Boca Raton, Florida
%8 1995
%G eng
%2 c
%4 649236480
%$ 649236480
%0 Journal Article
%J International Journal of Intelligent Systems in Accounting Finance and Management
%D 1994
%T Conference Report: The Fourth International Symposium on Intelligent Systems in Accounting, Finance and Management
%A Brown,Carol
%A Coakley,James
%A Eining,Martha M
%K Accounting
%K BIS
%K Dean's Office
%B International Journal of Intelligent Systems in Accounting Finance and Management
%V 3
%P 223-235
%8 1994
%G eng
%N 3
%2 a
%4 3842625537
%$ 3842625537
%0 Journal Article
%J Journal of Computing in Civil Engineering
%D 1994
%T Construction Kit for Visual Programming of River-Basin Models
%A Reitsma,Reindert
%A Sautins,A.
%A Wehrend,S.
%K BIS
%B Journal of Computing in Civil Engineering
%V 8
%P 378-384
%8 1994
%G eng
%2 a
%4 51551885312
%$ 51551885312
%0 Generic
%D 1994
%T An Intelligent Solver for the Generalized Telecommunication Facility Location Problem
%A Raja,V.T.
%A Han,Bernard T.
%K BIS
%B Decision Sciences 25th Annual Meeting
%C Honolulu, Hawaii
%8 1994
%G eng
%2 c
%4 649238528
%$ 649238528
%0 Journal Article
%J International Journal of Intelligent Systems in Accounting, Finance and Management
%D 1993
%T Artificial Neural Networks Applied to Ratio Analysis in the Analytical Review Process
%A Coakley,James
%A Brown,Carol
%K Accounting
%K BIS
%K Dean's Office
%B International Journal of Intelligent Systems in Accounting, Finance and Management
%V 2
%P 19-39
%8 1993
%G eng
%N 1
%2 a
%4 3842660353
%$ 3842660353
%0 Generic
%D 1993
%T ISO9001 and the Paper Industry
%A Cabak,Carrie
%K BIS
%B Paper Industry Management Association (PIMA) Conference
%C San Diego, CA
%8 1993
%G eng
%2 c
%4 91514347520
%$ 91514347520
%0 Generic
%D 1993
%T ISO9001 Registration Process
%A Cabak,Carrie
%K BIS
%B Q90/ISO9000 TAG Meeting
%C San Jose, CA
%8 1993
%G eng
%2 c
%4 91514400768
%$ 91514400768
%0 Journal Article
%J International Journal of Logistics Management
%D 1991
%T A Comparison of User Satisfaction with MIS Across Two Cultures
%A Coakley,James
%K BIS
%B International Journal of Logistics Management
%V 2
%P 22-29
%8 1991
%G eng
%2 a
%4 28690823169
%$ 28690823169
%0 Journal Article
%J SWIM
%D 1990
%T WODAN: een Venster op Beleidsinformatie (WODAN: a Window on Decision-making Information)
%A Reitsma,Reindert
%A Hendriks,P.
%K BIS
%B SWIM
%V 5
%P 15-24
%8 1990
%G eng
%2 a
%4 51551875072
%$ 51551875072
%0 Journal Article
%J Regional Studies
%D 1988
%T A Causal Typology of Migration: The Role of Commuting. Regional Studies
%A Reitsma,Reindert
%A Vergoossen,A.
%K BIS
%B Regional Studies
%V 22
%P 331-340
%8 1988
%G eng
%2 a
%4 51551858688
%$ 51551858688
%0 Journal Article
%J SWIM
%D 1986
%T Artificiele Intelligentie in Geografisch Onderzoek: Cognitie, `Engineering' en Geografische Modellen (Artificial Intelligence in Geographical Research: Cognition, `Engineering' and Geographical Models)
%A Reitsma,Reindert
%K BIS
%B SWIM
%V 1
%P 4-7
%8 1986
%G eng
%2 a
%4 51551834112
%$ 51551834112
%0 Journal Article
%J Advances in Accounting
%D 1985
%T The Expectations of Accounting Errors in Medium-Sized Manufacturing Firms
%A Coakley,James
%K BIS
%B Advances in Accounting
%V 2
%8 1985
%G eng
%N 199-245
%2 a
%4 28690843649
%$ 28690843649
%0 Journal Article
%J Journal of the American Statistical Association
%D 1983
%T Bayesian Estimation of a Finite Population Total using Auxiliary Information in the Presence of Nonresponse
%A Smouse,Evan
%K BIS
%K Business Analytics
%B Journal of the American Statistical Association
%V 77
%P 97-102
%8 1983
%G eng
%N 377
%2 a
%4 58073522176
%$ 58073522176
%0 Journal Article
%J American Journal of Epidemiology
%D 1983
%T Estimating proportionate changes in rates
%A Smouse,Evan
%K BIS
%K Business Analytics
%B American Journal of Epidemiology
%V 117
%P 235-243
%8 1983
%G eng
%2 a
%4 58094718976
%$ 58094718976
%0 Journal Article
%J Communications in Statistics - Theory & Methods
%D 1983
%T Nonparametric Bayesian Inference for Dichotomous Response Models
%A Smouse,Evan
%K BIS
%K Business Analytics
%B Communications in Statistics - Theory & Methods
%V 12
%P 2847-2859
%8 1983
%G eng
%N 24
%2 a
%4 58073720832
%$ 58073720832
%0 Journal Article
%J Archives of Pediatrics and Adolescent Medicine
%D 1983
%T Statistical Concepts and Proper Use
%A Smouse,Evan
%K BIS
%K Business Analytics
%B Archives of Pediatrics and Adolescent Medicine
%V 137
%P 503
%8 1983
%G eng
%N 5
%2 a
%4 58094786560
%$ 58094786560
%0 Journal Article
%D 0
%T Assessing the Connections Among Top Management Support, IT Assimilation, and Business Value of IT: A Meta-Analysis
%A Roberts,Nicholas
%A Jeyaraj,A.
%A Gerow,J.
%K BIS
%8 2023 In Press
%G eng
%2 a
%4 272321404928
%$ 272321404928