Management Information Systems

Filter
Conference contribution

Search results

  • 2013

    The architecture of generativity in a digital ecosystem: A network biology perspective

    Um, S. Y., Yoo, Y., Wattal, S., Kulathinal, R. J. & Zhang, B., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3721-3733 13 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • The checkpoint simulation: A tool for informing border patrol checkpoint design and resource allocation

    Jenkins, J. L., Marquardson, J., Proudfoot, J. G., Valacich, J. S., Golob, E. & Nunamaker, J. F., 2013, Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013. p. 252-255 4 p. 6657176. (Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2012

    An event-driven SIR model for topic diffusion in web forums

    Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Common citation analysis and technology overlap factor: An empirical investigation of litigated patents using network analysis

    Velichety, S. & Ram, S., 2012, Design Science Research in Information Systems: Advances in Theory and Practice - 7th International Conference, DESRIST 2012, Proceedings. p. 287-293 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7286 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Detecting users' psychological states through mouse cursor movements

    Schneider, C., Valacich, J. S., Weinmann, M. & Robra-Bissantz, S., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 3048 1 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Effects of simultaneous auctions on willingness-to-pay in online auctions

    Bockstedt, J. C., Goh, K. H. & Ng, S., 2012, ICEC 2012 - 14th Annual International Conference on Electronic Commerce. p. 153-154 2 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Embodied agents and the Predictive Elaboration Model of Persuasion - The ability to tailor embodied agents to users' need for cognition

    Pickard, M. D., Jenkins, J. L. & Nunamaker, J. F., 2012, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. IEEE Computer Society, p. 543-552 10 p. 6148671. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Establishing a foundation for automated human credibility screening

    Nunamaker, J. F., Burgoon, J. K., Twyman, N. W., Proudfoot, J. G., Schuetzler, R. & Giboney, J. S., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. IEEE Computer Society, p. 202-211 10 p. 6284309. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Evaluating an integrated forum portal for terrorist surveillance and analysis

    Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Fine-tuning group collaboration environments: How differences in general causality orientation and performance targets shape interaction and performance

    Wang, X., Schneider, C. & Valacich, J. S., 2012, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. IEEE Computer Society, p. 553-561 9 p. 6148672. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • On triangular versus edge representations - Towards scalable modeling of networks

    Ho, Q., Yin, J. & Xing, E. P., 2012, Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012, NIPS 2012. p. 2132-2140 9 p. (Advances in Neural Information Processing Systems; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Partially supervised learning for radical opinion identification in hate group web forums

    Yang, M. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Predicting users' perceived trust in Embodied Conversational Agents using vocal dynamics

    Elkins, A. C., Derrick, D. C., Burgoon, J. K. & Nunamaker, J. F., 2012, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. IEEE Computer Society, p. 579-588 10 p. 6148598. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Scalable sentiment classification across multiple dark web forums

    Zimbra, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Securing cyberspace: Identifying key actors in hacker communities

    Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    66 Scopus citations
  • Sharing news articles using 140 characters: A diffusion analysis on twitter

    Bhattacharya, D. & Ram, S., 2012, Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012. p. 966-971 6 p. 6425634. (Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • SHB 2012: International workshop on smart health and wellbeing

    Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The structuration of task-oriented communication in innovative virtual teams

    Chen, Y. D. & Brown, S. A., 2012, International Conference on Information Systems, ICIS 2012. p. 4531-4539 9 p. (International Conference on Information Systems, ICIS 2012; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Understanding avatar sentiments using verbal and non- verbal cues

    Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Understanding technology adoption in the household context: A comparison of seven theoretical models

    Venkatesh, V., Brown, S. A. & Hoehle, H., 2012, ECIS 2012 - Proceedings of the 20th European Conference on Information Systems. Association for Information Systems, (ECIS 2012 - Proceedings of the 20th European Conference on Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Unethical use of information technology: A two-country study

    Chatterjee, S., Valacich, J. S. & Sarker, S., 2012, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. IEEE Computer Society, p. 3071-3080 10 p. 6149197. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit - Research in progress

    Giboney, J. S., Brown, S. A. & Nunamaker, J. F., 2012, Proceedings of the 45th Annual Hawaii International Conference on System Sciences, HICSS-45. IEEE Computer Society, p. 3719-3727 9 p. 6149346. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Using burst detection techniques to identify suspicious vehicular traffic at border crossings

    Kaza, S., Lu, H. M., Zeng, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2011

    An effective and efficient subpopulation extraction method in large social networks

    Zhang, B., Krackhardt, D., Krishnan, R. & Doreian, P., 2011, International Conference on Information Systems 2011, ICIS 2011. p. 477-493 17 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • An SIR model for violent topic diffusion in social media

    Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Scopus citations
  • Dynamic user-level affect analysis in social media: Modeling violence in the dark web

    Zeng, S., Lin, M. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Examining the evolution of networks based on lists in Twitter

    Zhao, J. & Ram, S., 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings. 6156363. (2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Knowledge sourcing and knowledge consumption in computer-mediated complex decision making

    Twyman, N. W., Jenkins, J. L., Nunamaker, J. F. & Carl, K., 2011, Proceedings of the 44th Annual Hawaii International Conference on System Sciences, HICSS-44 2010. 5718459. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Panel: New directions for conceptual modeling

    Parsons, J., Olivé, A., Ram, S., Wagner, G., Wand, Y. & Yu, E., 2011, Conceptual Modeling, ER 2011 - 30th International Conference, Proceedings. p. 524-525 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6998 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical analysis and anomaly detection of SMS social networks

    Zhang, B., Ma, L. & Krishnan, R., 2011, International Conference on Information Systems 2011, ICIS 2011. p. 3007-3015 9 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The credibility crisis in IS: A global stakeholder perspective

    Looney, C. A., Firth, D., Koch, H., Cecez-Kecmanovic, D., Hsieh, J. J. P. A., Soh, C., Valacich, J. S. & Whitley, E., 2011, International Conference on Information Systems 2011, ICIS 2011. p. 4426-4430 5 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • The dark web forum portal: From multi-lingual to video

    Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Scopus citations
  • The Geopolitical Web: Assessing societal risk in an uncertain world

    Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • What are the grand challenges in information systems research? a debate and discussion

    Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., 2011, International Conference on Information Systems 2011, ICIS 2011. p. 4421-4425 5 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2010

    A framework to support service-oriented architecture investment decision

    Ilk, N., Goes, P. & Zhao, J. L., 2010, ICIS 2010 Proceedings - Thirty First International Conference on Information Systems. (ICIS 2010 Proceedings - Thirty First International Conference on Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • AIS siged IAIM panel: Where have you gone Joe DiMaggio?

    Elder, K. L., Nunamaker, J. F., Galletta, D. F., George, J. F., Granger, M. J. & Zmud, R. W., 2010, Proceedings of the 2010 International SIGED: IAIM Conference. (Proceedings of the 2010 International SIGED: IAIM Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Comparing the virtual linkage intensity and real world proximity of social movements

    Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Designing collaborative systems for better knowledge management and team performance

    Zhang, X., Venkatesh, V. & Brown, S. A., 2010, Proceedings of the 43rd Annual Hawaii International Conference on System Sciences, HICSS-43. 5428722. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Developing a Dark Web collection and infrastructure for computational and social sciences

    Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Encouraging users to behave securely: Examining the influence of technical, managerial, and educational controls on users' secure behavior

    Jenkins, J. L., Durcikova, A., Ross, G. & Nunamaker, J. F., 2010, ICIS 2010 Proceedings - Thirty First International Conference on Information Systems. (ICIS 2010 Proceedings - Thirty First International Conference on Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • FASTS: FAcets Structured Tag Space - A novel approach to organize and reuse social bookmarking tags

    Ram, S. & Wei, W., 2010, Global Perspectives on Design Science Research - 5th International Conference, DESRIST 2010, Proceedings. p. 426-438 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Global disease surveillance using social media: HIV/AIDS content intervention in web forums

    Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 170 1 p. 5484749. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • How social is social bookmarking?

    Ram, S. & Wei, W., 2010, 2010 IEEE International Workshop on Business Applications of Social Network Analysis, BASNA 2010. 5730302. (2010 IEEE International Workshop on Business Applications of Social Network Analysis, BASNA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Managing knowledge in a changing scientific landscape: The impact of cyberinfrastructure

    Brown, S. A., Thatcher, S. & Dang, Y., 2010, Proceedings of the 43rd Annual Hawaii International Conference on System Sciences, HICSS-43. 5428464. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Provenance management in BioSciences

    Ram, S. & Liu, J., 2010, Advances in Conceptual Modeling - Applications and Challenges, ER 2010 Workshops ACM-L, CMLSA, CMS, DE@ER, FP-UML, SeCoGIS, WISM, Proceedings. p. 54-64 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6413 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • The evolving influence of diversity and media in virtual organizations

    Brown, S. A., Thatcher, S. & Dang, Y., 2010, 16th Americas Conference on Information Systems 2010, AMCIS 2010. p. 1091-1099 9 p. (16th Americas Conference on Information Systems 2010, AMCIS 2010; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • When entities are types: Effectively modeling type-instantiation relationships

    Currim, F. & Ram, S., 2010, Advances in Conceptual Modeling - Applications and Challenges, ER 2010 Workshops ACM-L, CMLSA, CMS, DE@ER, FP-UML, SeCoGIS, WISM, Proceedings. p. 138-147 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6413 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2009

    Analyzing seller practices in a Brazilian marketplace

    Pereira, A., Duarte, D., Meira, W., Almeida, V. & Góes, P., 2009, WWW'09 - Proceedings of the 18th International World Wide Web Conference. p. 1031-1040 10 p. (WWW'09 - Proceedings of the 18th International World Wide Web Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Assessing success factors of selling practices in electronic marketplaces

    Pereira, A., Duarte, D., Meira, W. & Góes, P., 2009, Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES '09. p. 261-268 8 p. (Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Dark web forums portal: Searching and analyzing Jihadist forums

    Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations