Management Information Systems

Filter
Conference contribution

Search results

  • 2016

    Using social network analysis to identify key hackers for keylogging tools in hacker forums

    Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Who motivates my participation in virtual interorganizational communities of practice: Self, peers, or the firm?

    Zhao, K., Zhang, B. & Bai, X., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems, (2016 International Conference on Information Systems, ICIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2015

    A multi-experimental examination of analyzing mouse cursor trajectories to gauge subject uncertainty

    Jenkins, J. L., Larsen, R., Bodily, R., Sandberg, D., Williams, P., Stokes, S., Harris, S. & Valacich, J. S., 2015, 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, (2015 Americas Conference on Information Systems, AMCIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Big data - Analytics engine for digital transformation: Where is is?

    Goes, P. B., 2015, 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, (2015 Americas Conference on Information Systems, AMCIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews

    Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K. & Nunamaker, J. F., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7165946. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Developing understanding of hacker language through the use of lexical semantics

    Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Exploring hacker assets in underground forums

    Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    95 Scopus citations
  • How to engage users through gamification: The prevalent effects of playing and mastering over competing

    Tomaselli, F. C., Sanchez, O. P. & Brown, S. A., 2015, 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. Association for Information Systems, (2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Intelligence and security informatics: Pacific Asia Workshop, PAISI 2015 Ho Chi Minh City, Vietnam, May 19, 2015 proceedings

    Chau, M., Wang, G. A. & Chen, H., 2015, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Proceedings. Chau, M., Wang, G. A. & Chen, H. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Media capabilities that support identity communication in virtual teams

    Wilson, D. W., Thatcher, S. M. B. & Brown, S. A., Mar 26 2015, Proceedings of the 48th Annual Hawaii International Conference on System Sciences, HICSS 2015. Bui, T. X. & Sprague, R. H. (eds.). IEEE Computer Society, p. 702-711 10 p. 7069739. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2015-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Mind over mouse: The effect of cognitive load on mouse movement behavior

    Grimes, G. M. & Valacich, J. S., 2015, 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. Association for Information Systems, (2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Overcoming free-riding in information goods: Sanctions or rewards?

    Hashim, M. J. & Bockstedt, J. C., Mar 26 2015, Proceedings of the 48th Annual Hawaii International Conference on System Sciences, HICSS 2015. Bui, T. X. & Sprague, R. H. (eds.). IEEE Computer Society, p. 4834-4843 10 p. 7070394. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2015-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Shaping customer confidence in online purchasing decision: The role of DSS tools supporting an information aggregator

    Sanchez, O., Silva E Costa, P. H. & Goes, P., Mar 26 2015, Proceedings of the 48th Annual Hawaii International Conference on System Sciences, HICSS 2015. Bui, T. X. & Sprague, R. H. (eds.). IEEE Computer Society, p. 4294-4303 10 p. 7070334. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2015-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Tensor-based learning for predicting stock movements

    Li, Q., Jiang, L. L., Li, P. & Chen, H., Jun 1 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 1784-1790 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Using big data for predicting freshmen retention

    Ram, S., Wang, Y., Currim, F. & Currim, S., 2015, 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. Association for Information Systems, (2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • When disclosure is involuntary: Empowering users with control to reduce concerns

    Wilson, D. W., Schuetzler, R. M., Dorn, B., Proudfoot, J. G. & Valacich, J. S., 2015, 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. Association for Information Systems, (2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2014

    A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

    Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

    Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Descriptive analytics: Examining expert hackers in web forums

    Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Diabetes-related topic detection in Chinese health websites using deep learning

    Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

    Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Emoticon analysis for Chinese health and fitness topics

    Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Empirical analysis of implicit brand networks on social media

    Zhang, K., Bhattacharyya, S. & Ram, S., 2014, HT 2014 - Proceedings of the 25th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, p. 190-199 10 p. (HT 2014 - Proceedings of the 25th ACM Conference on Hypertext and Social Media).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Extracting value from big data

    Ram, S., 2014, Advances in Conceptual Modeling - ER 2014 Workshops, ENMO, MoBiD, MReBA, QMMQ, SeCoGIS, WISM, and ER Demos, Proceedings. Indulska, M. & Purao, S. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8823).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Generative diffusion of innovations and knowledge networks in open source projects

    Zhang, Z., Yoo, Y., Wattal, S., Zhang, B. & Kulathinal, R., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • HealthQA: A Chinese QA summary system for smart health

    Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Identifying adverse drug events from health social media: A case study on heart disease discussion forums

    Liu, X., Liu, J. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Identifying top sellers in underground economy using deep learning-based sentiment analysis

    Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Investigating the effect of insurance fraud on mouse usage in human-computer interactions

    Hibbeln, M., Jenkins, J. L., Schneider, C., Valacich, J. S. & Weinmann, M., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems, (35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Overview of the ShARe/CLEF eHealth evaluation lab 2014

    Kelly, L., Goeuriot, L., Suominen, H., Schreck, T., Leroy, G., Mowery, D. L., Velupillai, S., Chapman, W. W., Martinez, D., Zuccon, G. & Palotti, J., 2014, Information Access Evaluation: Multilinguality, Multimodality, and Interaction - 5th International Conference of the CLEF Initiative, CLEF 2014, Proceedings. Springer-Verlag, p. 172-191 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8685 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    86 Scopus citations
  • Saving face on Facebook: Privacy concerns, social benefits, and impression management

    Wilson, D. W., Proudfoot, J. G. & Valacich, J. S., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Success of IT outsourcing contracts: Effects of the complexity of the activity, relational governance and structure of incentives

    Sanchez, O. P., Cruz, M. A. & Goes, P. B., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems, (35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Text simplification tools: Using machine learning to discover features that identify difficult text

    Kauchak, D., Mouradi, O., Pentoney, C. & Leroy, G., 2014, Proceedings of the 47th Annual Hawaii International Conference on System Sciences, HICSS 2014. IEEE Computer Society, p. 2616-2625 10 p. 6758930. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Scopus citations
  • Time-to-event modeling for predicting hacker IRC community participant trajectory

    Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

    Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    106 Scopus citations
  • We know where you are tweeting from: Assigning a type of place to tweets using natural language processing and random forests

    Alsudais, A., Leroy, G. & Corso, A., Sep 22 2014, Proceedings - 2014 IEEE International Congress on Big Data, BigData Congress 2014. Chen, P., Chen, P. & Jain, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 594-600 7 p. 6906833. (Proceedings - 2014 IEEE International Congress on Big Data, BigData Congress 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2013

    A computational approach to detecting and assessing sustainability-related communities in social media

    Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • A cross-sectional and temporal analysis of information consumption on twitter

    Velichety, S. & Ram, S., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 124-141 18 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

    Liu, X. & Chen, H., 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • Benefiting from IS research -- Who and how? A panel on the value of IS research

    Hassan, N. R., Benbasat, I., Nunamaker, J., Briggs, R. & Mueller, B., 2013, 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime. p. 556-558 3 p. (19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Breaking out of the design science box: High-value impact through multidisciplinary design science programs of research

    Nunamaker, J. F., Twyman, N. W. & Giboney, J. S., 2013, 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime. p. 575-585 11 p. (19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Comparing peer influences in large social networks - an empirical study on caller ringback tone

    Zhang, B., Pavlou, P., Krishnan, R. & Krackhardt, D., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 844-857 14 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • DiabeticLink: A health big data system for patient empowerment and personalized healthcare

    Chen, H., Compton, S. & Hsiao, O., 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Evaluating text visualization: An experiment in authorship analysis

    Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Examining lists on twitter to uncover relationships between following, membership and subscription

    Velichety, S. & Ram, S., 2013, WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. Association for Computing Machinery, p. 673-675 3 p. (WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Exploring the effect of arousal and valence on mouse interaction

    Grimes, G. M., Jenkins, J. L. & Valacich, J. S., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 1634-1648 15 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Machine learning for attack vector identification in malicious source code

    Benjamin, V. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Modeling Border Traffic Flow Using Cell Phone Header Packets

    Valacich, J. S., Wilson, D. W., Nunamaker, J. F. & Golob, E., 2013, Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013. p. 266-268 3 p. 6657179. (Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical modeling of nanotechnology knowledge diffusion networks

    Jiang, S., Gao, Q. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations