Management Information Systems

Filter
Chapter

Search results

  • 2021

    Science Education as a Barrier Against “Fake Health News”

    Keselman, A., Smith, C. A., Leroy, G. & Kaufman, D. R., 2021, Contributions from Science Education Research. Springer Science and Business Media B.V., p. 225-250 26 p. (Contributions from Science Education Research; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 2018

    Automatic interfacing of application software in the GPLAN framework

    Nunamaker, J. F., Pomeranz, J. & Whinston, A., Jan 1 2018, Information Systems and Organizational Structure. de Gruyter, p. 382-396 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements

    Elkins, A. C., Proudfoot, J. G., Twyman, N., Burgoon, J. K. & Nunamaker, J. F., 2018, Lecture Notes in Networks and Systems. Springer, p. 294-307 14 p. (Lecture Notes in Networks and Systems; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Out of the shadow? Promises and challenges of peer-to-peer lending

    Lin, M., May 25 2018, Research Handbook on Shadow Banking: Legal and Regulatory Aspects. Edward Elgar Publishing Ltd., p. 297-313 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Privacy and Human Behavior in the Information Age

    Acquisti, A., Brandimarte, L. & Loewenstein, G., Jan 1 2018, The Cambridge Handbook of Consumer Privacy. Cambridge University Press, p. 184-197 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • 2017

    Collaborative cross-border security infrastructure and systems: Identifying policy, managerial and technological challenges

    Luna-Reyes, L. F., Derrick, D. C., Langhals, B. & Nunamaker, J. F., Mar 20 2017, Remote Work and Collaboration: Breakthroughs in Research and Practice. IGI Global, Vol. 2-2. p. 640-658 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2016

    Conducting large-scale analyses of underground hacker communities

    Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    7 Scopus citations
  • Vehicle routing with stochastic demands: Models & computational methods

    Dror, M., 2016, International Series in Operations Research and Management Science. Springer New York LLC, p. 425-449 25 p. (International Series in Operations Research and Management Science; vol. 46).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 2015

    Finding and understanding medical information online

    Harwell, J., Pentoney, C. & Leroy, G. A., Jan 1 2015, Information Technology for Patient Empowerment in Healthcare. Walter de Gruyter GmbH, p. 165-178 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • How Does Variety Seeking Affect Product Usage?

    Ram, S. & Jung, H. S., 2015, Developments in Marketing Science: Proceedings of the Academy of Marketing Science. Springer Nature, p. 85-89 5 p. (Developments in Marketing Science: Proceedings of the Academy of Marketing Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2014

    CONDUCTING EXPERIMENTAL RESEARCH IN HCI: From Topic Selection to Publication

    Dennis, A. R., Garfield, M. J., Topi, H. & Valacich, J. S., Jan 1 2014, Human-Computer Interaction and Management Information Systems: Applications. Taylor and Francis, p. 403-423 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2013

    Lessons about leadership at a distance and future research directions

    Weisband, S., Jan 1 2013, Leadership at a Distance: Research in Technologically-Supported Work. Taylor and Francis, p. 247-255 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Research challenges for studying leadership at a distance

    Weisband, S., Jan 1 2013, Leadership at a Distance: Research in Technologically-Supported Work. Taylor and Francis, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Revealing the Hidden World of the Dark Web: Social Media Forums and Videos11

    Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2013, Intelligent Systems for Security Informatics. Elsevier Inc., p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 2009

    Media synchronicity and media choice: Choosing media for performance

    Dennis, A. R., Fuller, R. M. & Valacich, J. S., Apr 13 2009, Media Choice: A Theoretical and Empirical Overview. Routledge Taylor & Francis Group, p. 247-273 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    12 Scopus citations
  • Survey of cardinality constraints in snapshot and temporal semantic data models

    Currim, F. & Ram, S., 2009, Systems Analysis and Design for Advanced Modeling Methods: Best Practices. IGI Global, p. 25-41 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2008

    Exploring gray web forums: Analysis and investigation of forum-based communities in Taiwan

    Wang, J. H., Fu, T., Lin, H. M. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 121-134 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Suspect vehicle identification for border safety

    Kaza, S. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 305-318 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Syndromic surveillance systems

    Yan, P., Chen, H. & Zeng, D., 2008, Annual Review of Information Science and Technology. Information Today, p. 425-495 71 p. (Annual Review of Information Science and Technology; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    44 Scopus citations
  • Understanding the nexus of terrorist web sites

    Xu, J. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 65-78 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Using decision trees to predict crime reporting

    Gutierrez, J. & Leroy, G., 2008, Advanced Principles for Improving Database Design, Systems Modeling, and Software Development. IGI Global, p. 132-145 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Scopus citations
  • Video-based deception detection

    Jensen, M. L., Meservy, T. O., Burgoon, J. K. & Nunamaker, J. F., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 425-441 17 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • 2007

    Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification

    Li, J., Su, H. & Chen, H., May 23 2007, Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications. John Wiley & Sons, Inc., p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2006

    Clustering similar schema elements across heterogeneous databases: A first step in database integration

    Zhao, H. & Ram, S., 2006, Advanced Topics in Database Research. IGI Global, Vol. 5. p. 227-248 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Scopus citations
  • OABIS: An ontology-based approach to business rules sourcing in supply chain management systems

    Ram, S. & Liu, J., 2006, Application of Agents and Intelligent Information Technologies. IGI Global, p. 1-21 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2005

    Enabling information sharing across government agencies

    Bajaj, A. & Ram, S., 2005, Advanced Topics in Database Research. IGI Global, Vol. 4. p. 341-366 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Routing propane deliveries

    Dror, M., 2005, Logistics Systems: Design and Optimization. Springer US, p. 299-322 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    7 Scopus citations
  • 2004

    Analyzing and visualizing criminal network dynamics: A case study

    Xu, J., Marshall, B., Kaza, S. & Chen, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 359-377 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    39 Scopus citations
  • Modeling the semantics of 3d protein structures

    Ram, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Atzeni, P., Chu, W., Lu, H., Zhou, S. & Ling, T. W. (eds.). Springer-Verlag, p. 696-708 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3288).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    18 Scopus citations
  • Terrorism Knowledge Discovery Project: A knowledge discovery approach to addressing the threats of terrorism

    Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M. & Chen, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 125-145 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    30 Scopus citations
  • West Nile Virus and Botulism portal: A case study in infectious disease informatics

    Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C. & Ascher, M., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 28-41 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Scopus citations
  • 2003

    An international perspective on fighting cybercrime

    Chang, W., Chung, W., Chen, H. & Chou, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 379-384 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    13 Scopus citations
  • A spatio temporal visualizer for law enforcement

    Buetow, T., Chaboya, L., O'Toole, C., Cushna, T., Daspit, D., Petersen, T., Atabakhsh, H. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 181-194 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    10 Scopus citations
  • Authorship analysis in cybercrime investigation

    Zheng, R., Qin, Y., Huang, Z. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    74 Scopus citations
  • Collaborative workflow management for interagency crime analysis

    Zhao, J. L., Bi, H. H. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 266-280 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Scopus citations
  • COPLINK agent: An architecture for information monitoring and sharing in law enforcement

    Zeng, D., Chen, H., Daspit, D., Shan, F., Nandiraju, S., Chau, M. & Lin, C., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 281-295 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    5 Scopus citations
  • CrimeLink Explorer: Using domain knowledge to facilitate automated crime association analysis

    Schroeder, J., Xu, J. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    16 Scopus citations
  • Designing Agent99 Trainer: A learner-centered, web-based training system for deception detection

    Cao, J., Crews, J. M., Lin, M., Burgoon, J. & Nunamaker, J. F., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 358-365 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Scopus citations
  • Detecting deception through linguistic analysis

    Burgoon, J. K., Blair, J. P., Qin, T. & Nunamaker, J. F., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 91-101 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    120 Scopus citations
  • Supporting multilingual information retrieval in Web applications: An English-Chinese Web portal experiment

    Qin, J., Zhou, Y., Chau, M. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Tengku Sembok, T. M., Zaman, H. B., Chen, H., Urs, S. R. & Myaeng, S. H. (eds.). Springer-Verlag, p. 149-152 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2911).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    3 Scopus citations
  • Untangling criminal networks: A Case study

    Xu, J. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 232-248 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    38 Scopus citations
  • 1999

    Digital Libraries: Social Issues and Technological Advances

    Chen, H. & Houston, A. L., 1999, Advances in Computers. C ed. Academic Press Inc., p. 257-314 58 p. (Advances in Computers; vol. 48, no. C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Scopus citations
  • 1990

    Distributed knowledge based systems for computer integrated manufacturing

    Ram, S., Carlson, D. & Jones, A., May 1990, NIST Special Publication. 785 ed. Publ by Natl Inst of Standards & Technology, p. 334-352 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations