00594nas a2200145 4500008004100000245011300041210006900154260000900223653000800232100002100240700001800261700001500279700001800294856013600312 2023 eng d00aBest of Both Worlds: The Inclusion of Gamification in Virtual Lab Environments to Increase Educational Value0 aBest of Both Worlds The Inclusion of Gamification in Virtual Lab c202310aBIS1 aShadbad, Forough1 aBahr, Gabriel1 aLuse, Andy1 aHammer, Bryan u/biblio/best-both-worlds-inclusion-gamification-virtual-lab-environments-increase-educational-value00463nas a2200121 4500008004100000245007300041210006900114260000900183653000800192100001500200700002100215856010500236 2023 eng d00aHackalytics: Using Computer Hacking to Engage Students in Analytics0 aHackalytics Using Computer Hacking to Engage Students in Analyti c202310aBIS1 aLuse, Andy1 aShadbad, Forough u/biblio/hackalytics-using-computer-hacking-engage-students-analytics00990nas a2200169 4500008004100000245010900041210006900150260000900219520035400228653000800582653001900590100002200609700001900631700002000650700001800670856013200688 2023 eng d00aInteractive Network Visualization of Educational Standards, Learning Resources and Learning Progressions0 aInteractive Network Visualization of Educational Standards Learn c20233 aWe present a novel, network- and browser-based visualization of the Next Generation Science Standards (NGSS). The NGSS are meant to guide (USA) K-12 science and engineering learning and are almost always presented using text and tables. Their connectivity, however, lends them well for network modeling and interactive network visualization.

10aBIS10aDesign Program1 aReitsma, Reindert1 aHoglund, Brian1 aAchatz, Nikolas1 aMarks, Andrea u/biblio/interactive-network-visualization-educational-standards-learning-resources-and-learning01853nas a2200169 4500008004100000245008700041210006900128260004200197520122100239653001501460653000801475100002001483700002101503700001901524700001701543856012301560 2022 eng d00aDo Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?0 aDo Measures of Security Compliance Intent Equal NonCompliance Sc aCopenhagen, Denmark, Dec. 2022c20223 aTo better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.10aAccounting10aBIS1 aMarshall, Byron1 aShadbad, Forough1 aCurry, Michael1 aBiros, David u/biblio/do-measures-security-compliance-intent-equal-non-compliance-scenario-agreement01771nas a2200169 4500008004100000245008700041210006900128260004200197520122100239653001501460653000801475100002001483700002101503700001901524700001701543856004101560 2022 eng d00aDo Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?0 aDo Measures of Security Compliance Intent Equal NonCompliance Sc aCopenhagen, Denmark, Dec. 2022c20223 aTo better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.10aAccounting10aBIS1 aMarshall, Byron1 aShadbad, Forough1 aCurry, Michael1 aBiros, David uhttps://aisel.aisnet.org/wisp2022/1900453nas a2200145 4500008004100000245005000041210004800091260000900139653000800148100002200156700001200178700001600190700001400206856008700220 2022 eng d00aDoes Platform Control Matter? A Meta-Analysis0 aDoes Platform Control Matter A MetaAnalysis c202210aBIS1 aRoberts, Nicholas1 aKim, I.1 aIyengar, K.1 aGerow, J. u/biblio/does-platform-control-matter-meta-analysis00589nas a2200157 4500008004100000245009300041210006900134260000900203300000900212653000800221100002200229700001700251700002100268700001900289856012300308 2022 eng d00aGenerational Differences in Perceiving the Technology Interruptions: A qualitative Study0 aGenerational Differences in Perceiving the Technology Interrupti c2022 a1-2110aBIS1 aKalgotra, Pankush1 aBaham, Corey1 aShadbad, Forough1 aSharda, Ramesh u/biblio/generational-differences-perceiving-technology-interruptions-qualitative-study00601nas a2200145 4500008004100000245011500041210006900156260000900225653000800234653002300242100002000265700001500285700001700300856013800317 2022 eng d00aNeed for Speed, but How Much Does It Cost? Unpacking the Fee-Speed Relationship in Cryptocurrency Transactions0 aNeed for Speed but How Much Does It Cost Unpacking the FeeSpeed  c202210aBIS10aBusiness Analytics1 aShang, Guangzhi1 aIlk, Noyan1 aFan, Shaokun u/biblio/need-speed-how-much-does-it-cost-unpacking-fee-speed-relationship-cryptocurrency-transactions00408nas a2200133 4500008004100000245005300041210005100094260000900145653000800154100002200162700001900184700002000203856005100223 2022 eng d00aNGSS Explorer (Curriculum Network Visualization)0 aNGSS Explorer Curriculum Network Visualization c202210aBIS1 aReitsma, Reindert1 aHoglund, Brian1 aAchatz, Nikolas uhttps://www.teachengineering.org/ngss_explorer00633nas a2200169 4500008004100000020001400041245010700055210006900162260000900231300000800240653000800248653002300256100002100279700001300300700002400313856012600337 2022 eng d a1865-134800aPixel Importance: The Impact of Saturation and Brightness on the Spread of Information on Social Media0 aPixel Importance The Impact of Saturation and Brightness on the  c2022 a10510aBIS10aBusiness Analytics1 aKaskela, Timothy1 aZhu, Bin1 aSayali, Dhamapurkar u/biblio/pixel-importance-impact-saturation-and-brightness-spread-information-social-media00578nas a2200121 4500008004100000245015200041210006900193260000900262653000800271100001800279700002100297856013800318 2022 eng d00aPsychological Contract Violations on Information Disclosure: A study of Interpersonal Arrangements and Trust Transference in Social Media Platforms0 aPsychological Contract Violations on Information Disclosure A st c202210aBIS1 aHammer, Bryan1 aShadbad, Forough u/biblio/psychological-contract-violations-information-disclosure-study-interpersonal-arrangements-and01266nas a2200145 4500008004100000245010400041210006900145260000900214520070100223653000800924100002000932700001500952700002100967856013200988 2022 eng d00aSupporting Student Collaboration for Online Learning: The Impact of Two Instructional Interventions0 aSupporting Student Collaboration for Online Learning The Impact  c20223 aThis research provides an overview of an exploratory study that is being conducted to investigate two potential ways in which an instructor may be able to support online student teams assigned to analyze a case and create a collaborative digital document. Specifically, the study was designed to examine the impact of instructor leadership style and process structure on student perceptions and performance. Data has been collected for 60 3-person teams of students enrolled in an upper-division undergraduate information systems course entitled “Business Process Management.” The research data has been collected and will be analyzed. Preliminary findings from the study will be discussed.10aBIS1 aTyran, Craig, K1 aRaja, V.T.1 aTyran, Kristi, L u/biblio/supporting-student-collaboration-online-learning-impact-two-instructional-interventions00462nam a2200121 4500008004100000245011500041210006900156260000900225653000800234100002200242700001900264856005700283 2022 eng d00aA Tale of Two Systems. A Review of the architecting and re-architecting of a long-lived website; (2nd edition)0 aTale of Two Systems A Review of the architecting and rearchitect c202210aBIS1 aReitsma, Reindert1 aKrueger, Kevin uhttps://open.oregonstate.education/taleoftwosystems/00839nas a2200169 4500008004100000245009300041210006900134260004200203520019900245653001500444653000800459100001900467700002000486700002100506700001900527856012300546 2022 eng d00aWill SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress0 aWill SOC Telemetry Data Improve Predictive Models of User Riskin aCopenhagen, Denmark, Dec. 2022c20223 aThis extended abstract describes our planned efforts to usefully integrate psychometric and telemetry data to help identify cybersecurity risks and more effectively analyze cybersecurity events.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aShadbad, Forough1 aHong, Sanghyun u/biblio/will-soc-telemetry-data-improve-predictive-models-user-riskiness-work-progress00452nas a2200121 4500008004100000245001600041210001600057260001900073520015200092653000800244100002200252856005600274 2021 eng d00aBreadcrumbs0 aBreadcrumbs aNijmegenc20213 aReflections on the work and contributions of Dr. Paul Hendriks, Professor of Knowledge Management at Radboud University, Nijmegen, The Netherlands.10aBIS1 aReitsma, Reindert u/biblio/breadcrumbs00700nas a2200193 4500008004100000245012100041210006900162260000900231300001200240490000700252653000800259653002300267653001200290653003200302100001600334700001500350700001700365856012400382 2021 eng d00aDestabilization and Consolidation: Conceptualizing, Measuring, and Validating the Dual Characteristics of Technology0 aDestabilization and Consolidation Conceptualizing Measuring and  c2021 a104-1150 v5010aBIS10aBusiness Analytics10aFinance10aStrategy & Entrepreneurship1 aChen, Jiyao1 aShao, Rong1 aFan, Shaokun u/biblio/destabilization-and-consolidation-conceptualizing-measuring-and-validating-dual00610nas a2200169 4500008004100000245009000041210006900131260000900200300000900209653000800218653002300226100001600249700001500265700001700280700001900297856012400316 2021 eng d00aDividend or No Dividend in Delegated Blockchain Governance: A Game Theoretic Analysis0 aDividend or No Dividend in Delegated Blockchain Governance A Gam c2021 a1-1910aBIS10aBusiness Analytics1 aPan, Dapeng1 aZhao, Leon1 aFan, Shaokun1 aZhang, Ziqiong u/biblio/dividend-or-no-dividend-delegated-blockchain-governance-game-theoretic-analysis00502nas a2200121 4500008004100000245008900041210006900130260000900199653000800208100002100216700001700237856012600254 2021 eng d00aDoes Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions0 aDoes Technostress Triger Insider Threat A conceptual Model and M c202110aBIS1 aShadbad, Forough1 aBiros, David u/biblio/does-technostress-triger-insider-threat-conceptual-model-and-mitigation-solutions00477nas a2200145 4500008004100000245005700041210005600098260000900154490000700163653000800170653002300178100002500201700001300226856009200239 2021 eng d00aEnhancing decision-making with data quality metadata0 aEnhancing decisionmaking with data quality metadata c20210 v2310aBIS10aBusiness Analytics1 aShankaranarayanan, G1 aZhu, Bin u/biblio/enhancing-decision-making-data-quality-metadata00568nas a2200157 4500008004100000245007500041210006900116260000900185653001500194653000800209100002000217700001900237700001800256700002400274856011200298 2021 eng d00aMachine Learning and Survey-based Predictors of InfoSec Non-Compliance0 aMachine Learning and Surveybased Predictors of InfoSec NonCompli c202110aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aCorreia, John1 aCrossler, Robert, E u/biblio/machine-learning-and-survey-based-predictors-infosec-non-compliance02597nas a2200193 4500008004100000245007500041210006900116260000900185300000900194490000700203520197500210653001502185653000802200100002002208700001902228700001802247700002402265856011402289 2021 eng d00aMachine Learning and Survey-based Predictors of InfoSec Non-Compliance0 aMachine Learning and Surveybased Predictors of InfoSec NonCompli c2021 a1-200 v133 aSurvey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM's innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69% of the riskiest individuals within the top 25% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.10aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aCorreia, John1 aCrossler, Robert, E u/biblio/machine-learning-and-survey-based-predictors-infosec-non-compliance-000613nas a2200181 4500008004100000245007800041210006900119260001700188300001200205490000700217653000800224653002300232100001500255700002000270700001700290700001500307856010900322 2021 eng d00aStability of Transaction Fees in Bitcoin: A Supply and Demand Perspective0 aStability of Transaction Fees in Bitcoin A Supply and Demand Per aCanyonc2021 a563-6920 v4510aBIS10aBusiness Analytics1 aIlk, Noyan1 aShang, Guangzhi1 aFan, Shaokun1 aZhao, Leon u/biblio/stability-transaction-fees-bitcoin-supply-and-demand-perspective00512nas a2200121 4500008004100000245009500041210006900136260000900205653000800214100002100222700001700243856013000260 2021 eng d00aUnderstanding Employee Information Security Policy Compliance from Role Theory Perspective0 aUnderstanding Employee Information Security Policy Compliance fr c202110aBIS1 aShadbad, Forough1 aBiros, David u/biblio/understanding-employee-information-security-policy-compliance-role-theory-perspective00613nas a2200133 4500008004100000245015200041210006900193260000900262653000800271100002200279700002100301700002200322856013500344 2021 eng d00aUnderstanding IT Value at the Managerial Level: Managerial Ambidexterity, Seizing Opportunities, and the Moderating Role of Information Systems Use0 aUnderstanding IT Value at the Managerial Level Managerial Ambide c202110aBIS1 aRoberts, Nicholas1 aQahri-Saremi, H.1 aVijayasarathy, L. u/biblio/understanding-it-value-managerial-level-managerial-ambidexterity-seizing-opportunities-and00567nas a2200133 4500008004100000245011800041210006900159260000900228653000800237653002300245100001500268700001700283856013300300 2020 eng d00aCombining Textual Cues with Social Clues: Utilizing Social Features to Improve Sentiment Analysis in Social Media0 aCombining Textual Cues with Social Clues Utilizing Social Featur c202010aBIS10aBusiness Analytics1 aIlk, Noyan1 aFan, Shaokun u/biblio/combining-textual-cues-social-clues-utilizing-social-features-improve-sentiment-analysis00510nas a2200121 4500008004100000245010300041210006900144260000900213653000800222100002200230700001400252856012200266 2020 eng d00aConnecting the Role of the Information Technology Function to its Contribution to the Organization0 aConnecting the Role of the Information Technology Function to it c202010aBIS1 aRoberts, Nicholas1 aGerow, J. u/biblio/connecting-role-information-technology-function-its-contribution-organization00357nas a2200121 4500008004100000245003600041210003400077260000900111653000800120100001700128700001900145856007100164 2020 eng d00aConnecting to Place - Virtually0 aConnecting to Place Virtually c202010aBIS1 aArora, Vipin1 aSemken, Steven u/biblio/connecting-place-virtually00673nas a2200181 4500008004100000245009400041210006900135260002300204653000800227653002300235653001200258653003200270100001600302700001500318700001700333700001500350856012600365 2020 eng d00aImpact of Team Size on Technological Contributions: Unpacking Disruption and Development0 aImpact of Team Size on Technological Contributions Unpacking Dis aVancouver CAc202010aBIS10aBusiness Analytics10aFinance10aStrategy & Entrepreneurship1 aChen, Jiyao1 aShao, Rong1 aFan, Shaokun1 aLi, Jiexun u/biblio/impact-team-size-technological-contributions-unpacking-disruption-and-development01604nas a2200193 4500008004100000245010800041210006900149260000900218520090100227653000801128653001901136100002201155700001901177700001801196700001601214700001801230710001801248856014401266 2020 eng d00aK-12 Engineering and the Next Generation Science Standards (NGSS): A Network Visualization and Analysis0 aK12 Engineering and the Next Generation Science Standards NGSS A c20203 aWe present an interactive network visualization of the Next Generation Science Standards (NGSS) and its coverage by collections of aligned curriculum. The visualization presents an alternative to the usual presentation of the NGSS as a set of linked tables. Users can view entire grade bands, search for or drill down to the level of individual NGSS standards or curricular items, or display groups of standards across grade bands. NGSS-aligned curriculum collections can be switched on and off to visually explore their NGSS coverage. Viewing the NGSS and associated curriculum this way facilitates navigating the NGSS and can help with assessment of alignments as lacking or anomalous. Modeling the NGSS as a network also allows for the computation of network metrics to provide insight into core characteristics of the network. It also provides for detecting anomalies and unexpected patterns.10aBIS10aDesign Program1 aReitsma, Reindert1 aHoglund, Brian1 aMarks, Andrea1 aChaker, Dua1 aMarks, Andrea1 aEmptyAuthNode uhttps://strategy.asee.org/k-12-engineering-and-the-next-generation-science-standards-a-network-visualization-and-analysis-resource-exchange00597nas a2200133 4500008004100000245014300041210006900184260000900253653000800262100001500270700002200285700002200307856013400329 2020 eng d00aManaging Software Development Projects for Success: Aligning Plan- and Agility-Based Approaches to Project Complexity and Project Dynamism0 aManaging Software Development Projects for Success Aligning Plan c202010aBIS1 aButler, C.1 aRoberts, Nicholas1 aVijayasarathy, L. u/biblio/managing-software-development-projects-success-aligning-plan-and-agility-based-approaches00545nas a2200157 4500008004100000245012100041210006900162260002800231490000800259653000800267100001600275700002200291700001900313700001700332856003800349 2020 eng d00aPromoting a Sense of Place Virtually: A Review of the ESA Weekly Water Cooler Chat Focused on Virtual Sense of Place0 aPromoting a Sense of Place Virtually A Review of the ESA Weekly  aWiley Periodicalsc20200 v10110aBIS1 aHoke, Kelly1 aO’Connell, Kari1 aSemken, Steven1 aArora, Vipin uhttps://doi.org/10.1002/bes2.173400529nas a2200133 4500008004100000245008900041210006900130260000900199653000800208100002100216700001700237700001700254856012400271 2020 eng d00aA Qualitative Approach to Understand Unintentional Information Security Misbehaviors0 aQualitative Approach to Understand Unintentional Information Sec c202010aBIS1 aShadbad, Forough1 aBaham, Corey1 aBiros, David u/biblio/qualitative-approach-understand-unintentional-information-security-misbehaviors00488nas a2200133 4500008004100000245006400041210006400105260002600169653000800195100001500203700001800218700001600236856010200252 2020 eng d00aTeaching and maintaining campus community during a pandemic0 aTeaching and maintaining campus community during a pandemic aPortland (Zoom)c202010aBIS1 aRaja, V.T.1 aLewis, Steven1 aTolan, Jody u/biblio/teaching-and-maintaining-campus-community-during-pandemic00496nas a2200121 4500008004100000245008600041210006900127260000900196653000800205100002100213700001700234856012300251 2020 eng d00aTechnostress and its Influence on Employee Information Security Policy Compliance0 aTechnostress and its Influence on Employee Information Security  c202010aBIS1 aShadbad, Forough1 aBiros, David u/biblio/technostress-and-its-influence-employee-information-security-policy-compliance00521nas a2200145 4500008004100000245007600041210006900117260000900186490000700195653000800202653002300210100001700233700001500250856011000265 2020 eng d00aA text analytics framework for automated communication pattern analysis0 atext analytics framework for automated communication pattern ana c20200 v5710aBIS10aBusiness Analytics1 aFan, Shaokun1 aIlk, Noyan u/biblio/text-analytics-framework-automated-communication-pattern-analysis00515nas a2200121 4500008004100000245010100041210006900142260000900211653000800220100001300228700002200241856013000263 2019 eng d00aConnecting Personality Traits to Social Networking Site Addiction: The Mediating Role of Motives0 aConnecting Personality Traits to Social Networking Site Addictio c201910aBIS1 aChen, A.1 aRoberts, Nicholas u/biblio/connecting-personality-traits-social-networking-site-addiction-mediating-role-motives00480nas a2200121 4500008004100000245007900041210006900120260000900189653000800198100002100206700001700227856011400244 2019 eng d00aDeveloping an Unintentional Information Security Misbehavior Scale (UISMS)0 aDeveloping an Unintentional Information Security Misbehavior Sca c201910aBIS1 aShadbad, Forough1 aBiros, David u/biblio/developing-unintentional-information-security-misbehavior-scale-uisms00407nas a2200121 4500008004100000245005200041210005200093260000900145653000800154100002200162700001200184856008900196 2019 eng d00aDigital Platform Life Cycles in Nascent Markets0 aDigital Platform Life Cycles in Nascent Markets c201910aBIS1 aRoberts, Nicholas1 aKim, I. u/biblio/digital-platform-life-cycles-nascent-markets00418nas a2200121 4500008004100000245005400041210005400095260000900149653000800158100001700166700002200183856009100205 2019 eng d00aEffective Use of Analytic DSS and Job Performance0 aEffective Use of Analytic DSS and Job Performance c201910aBIS1 aCampbell, D.1 aRoberts, Nicholas u/biblio/effective-use-analytic-dss-and-job-performance00487nas a2200133 4500008004100000245006800041210006600109260000900175653000800184100002100192700001700213700001900230856010400249 2019 eng d00aExamining Technostress on Employees Security-related Behaviors0 aExamining Technostress on Employees Securityrelated Behaviors c201910aBIS1 aShadbad, Forough1 aBiros, David1 aSharma, Madhav u/biblio/examining-technostress-employees-security-related-behaviors01838nas a2200157 4500008004100000245007600041210006700117260000900184490000600193520133400199653000801533653001901541100002201560700001801582856008001600 2019 eng d00aThe Future of Data: Too Much Visualization — Too Little Understanding?0 aFuture of Data Too Much Visualization Too Little Understanding c20190 v23 aData is part of our lives. Information visualizations help us make sense of this data and possibly help us make changes because of it. In this paper, however, we estimate some of the consequences of what seems an ominous trend, namely the needless complication and beautification of such visualizations. We argue that with increased availability of data and ever more powerful and easy to use visualization software, it becomes easy to succumb to the temptation to impress rather than to communicate. And so we wonder: is a future filled with visualizations that are visually complex and stunning, yet fail to properly communicate the data emerging? To assess some of the consequences of this practice we selected five examples from published sources, developed far simpler (and less attractive) versions from the identical data, randomly exposed these visualizations to subjects and asked simple questions about the displayed data. We find that, on average, it takes subjects longer to comprehend the complex versions, that it takes subjects longer to extract information from these versions and that they make more and larger errors doing so. The experiment shows that subjects eventually do learn how to navigate the complex versions, but by then they have spent significantly more time and made serious interpretative errors.10aBIS10aDesign Program1 aReitsma, Reindert1 aMarks, Andrea uhttps://quod.lib.umich.edu/d/dialectic/14932326.0002.207?view=text;rgn=main01598nas a2200157 4500008004100000245013000041210006900171260000900240520106500249653001501314653000801329100001901337700002001356700002401376856004001400 2019 eng d00aIdentifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors0 aIdentifying potentially risky insider oncompliance using machine c20193 aCybersecurity researchers have made significant steps to understand the mechanisms of security policy compliance and unify theories of security behavior. However, due partly to the limitations of traditional variance model statistical methods, these studies by necessity typically focus on a single security policy issue. By contrast, new machine learning algorithms frequently employed by data scientists offer great promise as a new statistical approach for examining robust individualized interpretations of policy and can also identify potentially risky behaviors. This study proposes to explore cybersecurity training impediments of multiple protection motivation behaviors in ransomware prevention training. It demonstrates the feasibility of using machine learning with survey items from the cybersecurity research to predict non-compliance. It also illustrates a potentially novel method to statistically validate research theory through higher levels of ML prediction. This study is a work in progress and we seek feedback on its design and relevance.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aCrossler, Robert, E uhttps://aisel.aisnet.org/wisp2019/100607nas a2200157 4500008004100000245010800041210006900149260000900218300001000227653000800237653002300245100001600268700001500284700001700299856013300316 2019 eng d00aImpacts of Consensus Algorithms in Cryptocurrency: A Theoretical Analysis of PoW versus PoS in Ethereum0 aImpacts of Consensus Algorithms in Cryptocurrency A Theoretical  c2019 a16-2210aBIS10aBusiness Analytics1 aPan, Dapeng1 aZhao, Leon1 aFan, Shaokun u/biblio/impacts-consensus-algorithms-cryptocurrency-theoretical-analysis-pow-versus-pos-ethereum01681nas a2200193 4500008004100000245008400041210006900125260000900194300001200203490000700215520112200222653001501344653000801359100001901367700002001386700001801406700002401424856003901448 2019 eng d00aInfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior0 aInfoSec Process Action Model IPAM Targeting Insiders Weak Passwo c2019 a201-2250 v333 aThe possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations' ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aCorreia, John1 aCrossler, Robert, E uhttps://doi.org/10.2308/isys-5238100614nas a2200157 4500008004100000245009200041210006900133260001700202653000800219653002300227653003200250100001600282700001400298700001700312856012700329 2019 eng d00aKnowledge Networks, Collaboration Networks, and Innovation: A Replication and Extension0 aKnowledge Networks Collaboration Networks and Innovation A Repli aBostonc201910aBIS10aBusiness Analytics10aStrategy & Entrepreneurship1 aChen, Jiyao1 aShen, Jia1 aFan, Shaokun u/biblio/knowledge-networks-collaboration-networks-and-innovation-replication-and-extension00547nas a2200133 4500008004100000245009200041210006900133260002500202653000800227653002300235100001500258700001700273856012300290 2019 eng d00aA Process Mining Framework for Communication Pattern Analysis in Online Contact Centers0 aProcess Mining Framework for Communication Pattern Analysis in O aSalt lake cityc201910aBIS10aBusiness Analytics1 aIlk, Noyan1 aFan, Shaokun u/biblio/process-mining-framework-communication-pattern-analysis-online-contact-centers00531nas a2200145 4500008004100000245007100041210006900112260000900181653000800190100001800198700002000216700002100236700002000257856010800277 2019 eng d00aPsychological Contract Violation and Sharing Intention on Facebook0 aPsychological Contract Violation and Sharing Intention on Facebo c201910aBIS1 aHammer, Bryan1 aZhang, Tianjian1 aShadbad, Forough1 aAgrawal, Rupesh u/biblio/psychological-contract-violation-and-sharing-intention-facebook00521nas a2200145 4500008004100000245006900041210006500110260001700175653000800192653002300200100001500223700002000238700001700258856010000275 2019 eng d00aA Supply and Demand Model for Bitcoin’s Data Space Marketplace0 aSupply and Demand Model for Bitcoin s Data Space Marketplace aMunichc201910aBIS10aBusiness Analytics1 aIlk, Noyan1 aShang, Guangzhi1 aFan, Shaokun u/biblio/supply-and-demand-model-bitcoins-data-space-marketplace00503nas a2200145 4500008004100000245006200041210005900103260002200162653000800184653002300192100001500215700001700230700001600247856009400263 2018 eng d00aBlockchain-Enabled Trust: The Case of Inter-Firm Dataflow0 aBlockchainEnabled Trust The Case of InterFirm Dataflow aNew Orleansc201810aBIS10aBusiness Analytics1 aZhao, Leon1 aFan, Shaokun1 aZheng, Eric u/biblio/blockchain-enabled-trust-case-inter-firm-dataflow00571nas a2200169 4500008004100000245007800041210006900119260000900188300001200197490000700209653000800216653002300224100001100247700001700258700001500275856011100290 2018 eng d00aCommunity Engagement and Online Word of Mouth: An Empirical Investigation0 aCommunity Engagement and Online Word of Mouth An Empirical Inves c2018 a258-2700 v5510aBIS10aBusiness Analytics1 aWu, Ji1 aFan, Shaokun1 aZhao, Leon u/biblio/community-engagement-and-online-word-mouth-empirical-investigation00651nas a2200169 4500008004100000245009800041210006900139260002200208653000800230653002300238653001200261653003200273100001600305700001500321700001700336856012800353 2018 eng d00aDevelopment of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation0 aDevelopment of Contextbased Indices for Measuring Dynamic and Du aChicago, ILc201810aBIS10aBusiness Analytics10aFinance10aStrategy & Entrepreneurship1 aChen, Jiyao1 aShao, Rong1 aFan, Shaokun u/biblio/development-context-based-indices-measuring-dynamic-and-dualistic-nature-innovation00528nas a2200145 4500008004100000245006900041210006600110260001700176653000800193653002300201100001900224700001700243700001600260856010600276 2018 eng d00aAn Efficient Recommender System Using Locality Sensitive Hashing0 aEfficient Recommender System Using Locality Sensitive Hashing aHawaiic201810aBIS10aBusiness Analytics1 aZhang, Kunpeng1 aFan, Shaokun1 aWang, Harry u/biblio/efficient-recommender-system-using-locality-sensitive-hashing00471nas a2200145 4500008004100000245005700041210005700098260000900155653000800164100001600172700001400188700001100202700002200213856009000235 2018 eng d00aExploratory Study for Readmission in Cancer Patients0 aExploratory Study for Readmission in Cancer Patients c201810aBIS1 aHuangfu, L.1 aHayne, S.1 aMa, J.1 aRoberts, Nicholas u/biblio/exploratory-study-readmission-cancer-patients01824nas a2200169 4500008004100000245005500041210005500096260000900151520135500160653001501515653000801530100001901538700002001557700001801577700001801595856004101613 2018 eng d00aFear Appeals Versus Priming in Ransomware Training0 aFear Appeals Versus Priming in Ransomware Training c20183 aEmployee non-compliance is at the heart of many of today’s security incidents. Training programs often employ fear appeals to motivate individuals to follow policy and take action to reduce security risks. While the literature shows that fear appeals drive intent to comply, there is much less evidence of their impact after intention is formed. Building on IPAM – a process nuanced model for compliance training and assessment – this study contrasts the impact of fear appeals vs. self-efficacy priming on ransomware training. In our proposed study, a pool of students will participate in a three-step series of training events. Some participants will encounter enhanced fear appeals at each step while others will be presented with materials that include
priming signals intended to foster development of increased self-efficacy. Previously identified
drivers of behavior (intent, processed-nuanced forms of self-efficacy, and outcome expectations)
are measured so that the effect of the treatments can be contrasted. A scenario agreement
methodology is used to indicate behavior as a dependent variable. We expect to show that while
fear appeals are useful and help build intent to comply at the motivational stage, process-nuanced
self-efficacy treatments are expected have a stronger effect on behavior post-intentional.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aCrossler, Rob1 aCorreia, John uhttps://aisel.aisnet.org/wisp2018/1/02095nas a2200181 4500008004100000245009600041210006900137260000900206490000700215520144300222653001501665653000801680100001901688700002001707700002401727700001801751856014401769 2018 eng d00aInfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior0 aInfoSec Process Action Model IPAM Systematically Addressing Indi c20180 v493 aWhile much of the extant InfoSec research relies on single assessment models that predict intent to act, this article proposes a multi-stage InfoSec Process Action Model (IPAM) that can positively change individual InfoSec behavior. We believe that this model will allow InfoSec researchers to focus more directly on the process which leads to action and develop better interventions that address problematic security behaviors. Building on successful healthcare efforts which resulted in smoking cessation, regular exercise and a healthier diet, among others, IPAM is a hybrid, predictive, process approach to behavioral InfoSec improvement. IPAM formulates the motivational antecedents of intent as separate from the volitional drivers of behavior. Singular fear appeals often seen in InfoSec research are replaced by more nuanced treatments appropriately differentiated to support behavioral change as part of a process; phase-appropriate measures of self-efficacy are employed to more usefully assess the likelihood that a participant will act on good intentions; and decisional balance –assessment of pro and con perceptions – is monitored over time. These notions better align InfoSec research to both leading security practice and to successful comparators in healthcare. We believe IPAM can both help InfoSec research models better explain actual behavior and better inform practical security-behavior improvement initiatives.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aCrossler, Robert, E1 aCorreia, John uhttps://www.researchgate.net/publication/321138048_InfoSec_Process_Action_Model_IPAM_Systematically_Addressing_Individual_Security_Behavior00606nas a2200145 4500008004100000245011100041210006900152260002200221653000800243653002300251100001500274700001700289700002000306856013400326 2018 eng d00aInvestigating the Fee-Delay Relationship in Cryptocurrency Transactions: Evidence from the Bitcoin Network0 aInvestigating the FeeDelay Relationship in Cryptocurrency Transa aSanta Clarac201810aBIS10aBusiness Analytics1 aIlk, Noyan1 aFan, Shaokun1 aShang, Guangzhi u/biblio/investigating-fee-delay-relationship-cryptocurrency-transactions-evidence-bitcoin-network00552nas a2200169 4500008004100000245006300041210006200104260000900166653000800175653002300183653001700206100001500223700001600238700001300254700001600267856009900283 2018 eng d00aMaking Sense of Organization Dynamics Using Text Analysis.0 aMaking Sense of Organization Dynamics Using Text Analysis c201810aBIS10aBusiness Analytics10aSupply Chain1 aLi, Jiexun1 aWu, Zhaohui1 aZhu, Bin1 aXu, Kaiquan u/biblio/making-sense-organization-dynamics-using-text-analysis00431nas a2200121 4500008004100000245005900041210005900100260000900159653000800168100002200176700001200198856009900210 2018 eng d00aOrganizational Identity and Digital Platform Evolution0 aOrganizational Identity and Digital Platform Evolution c201810aBIS1 aRoberts, Nicholas1 aKim, I. u/biblio/organizational-identity-and-digital-platform-evolution00349nas a2200145 4500008004100000245001300041210001300054260000900067653000800076100001600084700001400100700001100114700002200125856005600147 2018 eng d00aUntitled0 aUntitled c201810aBIS1 aHuangfu, L.1 aHayne, S.1 aMa, J.1 aRoberts, Nicholas u/biblio/untitled-3800532nas a2200121 4500008004100000245011100041210006900152260000900221653000800230100002200238700001500260856013500275 2018 eng d00aVirtual Customer Environment Design and Organizational Innovation: An Exploration-Exploitation Perspective0 aVirtual Customer Environment Design and Organizational Innovatio c201810aBIS1 aRoberts, Nicholas1 aDinger, M. u/biblio/virtual-customer-environment-design-and-organizational-innovation-exploration-exploitation00484nas a2200145 4500008004100000245005700041210005700098260000900155653000800164653002300172100001500195700001800210700001300228856009700241 2017 eng d00aBEHAVIOR THEORY ENABLED GENDER CLASSIFICATION METHOD0 aBEHAVIOR THEORY ENABLED GENDER CLASSIFICATION METHOD c201710aBIS10aBusiness Analytics1 aWang, Jing1 aYan, Xiangbin1 aZhu, Bin u/biblio/behavior-theory-enabled-gender-classification-method00625nas a2200169 4500008004100000245011000041210006900151260000900220300001200229490000700241653000800248653002300256100001700279700001200296700001500308856013200323 2017 eng d00aCollaboration Process Pattern Approach to Improving Teamwork Performance: A Data Mining-Based Methodology0 aCollaboration Process Pattern Approach to Improving Teamwork Per c2017 a438-4560 v2910aBIS10aBusiness Analytics1 aFan, Shaokun1 aLi, Xin1 aZhao, Leon u/biblio/collaboration-process-pattern-approach-improving-teamwork-performance-data-mining-based00526nas a2200145 4500008004100000245007600041210006900117260000900186653000800195653002300203100001300226700001300239700001600252856011200268 2017 eng d00aThe Different Behaviors between Product Searchers and Website Searchers0 aDifferent Behaviors between Product Searchers and Website Search c201710aBIS10aBusiness Analytics1 aZun, Kai1 aZhu, Bin1 aZuo, Meiyun u/biblio/different-behaviors-between-product-searchers-and-website-searchers00587nas a2200181 4500008004100000245006900041210006700110260000900177300001000186490000700196653000800203653002300211100001700234700001700251700001600268700001500284856010600299 2017 eng d00aEnabling effective workflow model reuse: A data-centric approach0 aEnabling effective workflow model reuse A datacentric approach c2017 a11-250 v9310aBIS10aBusiness Analytics1 aLiu, Zhiyong1 aFan, Shaokun1 aWang, Harry1 aZhao, Leon u/biblio/enabling-effective-workflow-model-reuse-data-centric-approach00537nas a2200145 4500008004100000245007200041210006900113260000900182653000800191653001400199653001700213653003300230100002100263856010700284 2017 eng d00aHospitality Industry Labor Shortage A Mixed?Methods Investigation0 aHospitality Industry Labor Shortage A MixedMethods Investigation c201710aBIS10aMarketing10aOSU-Cascades10aOSU-Cascades Hospitality Mgt1 aMontgomery, Todd u/biblio/hospitality-industry-labor-shortage-mixedmethods-investigation00562nas a2200157 4500008004100000245008400041210006900125260000900194653000800203653002300211100001700234700001800251700001400269700001500283856010600298 2017 eng d00aIntroduction to the special issue of ECR on E-business innovation with big data0 aIntroduction to the special issue of ECR on Ebusiness innovation c201710aBIS10aBusiness Analytics1 aFan, Shaokun1 aXiao, JInghua1 aXie, Kang1 aZhao, Leon u/biblio/introduction-special-issue-ecr-e-business-innovation-big-data00505nas a2200145 4500008004100000245006700041210006400108260000900172653000800181100002200189700001400211700001600225700001600241856010200257 2017 eng d00aA Meta-Analysis of Organizational Learning and IT Assimilation0 aMetaAnalysis of Organizational Learning and IT Assimilation c201710aBIS1 aRoberts, Nicholas1 aGerow, J.1 aJeyaraj, A.1 aRoberts, S. u/biblio/meta-analysis-organizational-learning-and-it-assimilation01991nas a2200169 4500008004100000245005700041210005500098260000900153490000700162520151400169653001501683653000801698100001901706700002001725700001901745856005701764 2017 eng d00aA Normative Model for Assessing SME IT Effectiveness0 aNormative Model for Assessing SME IT Effectiveness c20170 v153 aInformation technology (IT) is a key enabler of modern small businesses, yet fostering reliably
effective IT systems remains a significant challenge. This paper presents a light weight IT
effectiveness model for small businesses to assess their IT and formulate strategies for
improvement. Employing an action research approach we investigate a mixed method analysis of
120 survey responses from small family businesses and user participation in 10 semi-structured
interviews. We then conduct critical reflection to identify refinements which are validated using
72 survey responses from university students. The results present compelling evidence that
employees’ normative patterns (norms) are a significant driver of IT effectiveness in a second
order PLS predictive model able to explain 26% of observed variance.
A norms-based approach to IT effectiveness helps fill a significant research and managerial gap
for organizations unable or unwilling to adopt IT best practice frameworks used by large
organizations. Our findings imply that comparing norms to IT best practices may offer a less
technical approach to assessing IT operations, which may be well suited to small businesses.
Although further investigation cycles are needed to systematically test this model, we encourage
small business managers to: 1) anticipate IT risks and mitigate them; 2) identify measures of IT
performance, and monitor them, and 3) review/synchronize business and IT goals.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aKawalek, Peter uhttp://scholarworks.lib.csusb.edu/ciima/vol15/iss1/300515nas a2200157 4500008004100000245006700041210006700108260000900175653001500184653000800199100002000207700001900227700001800246700001800264856007500282 2017 eng d00aPersonal Motivation Measures for Personal IT Security Behavior0 aPersonal Motivation Measures for Personal IT Security Behavior c201710aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aCorreia, John1 aCrossler, Rob uhttp://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27/00547nas a2200121 4500008004100000245013100041210006900172260000900241653000800250100001300258700002200271856013200293 2017 eng d00aPreliminary Evidence for the Use and Efficacy of Mobile Health Applications in Managing Posttraumatic Stress Disorder Symptoms0 aPreliminary Evidence for the Use and Efficacy of Mobile Health A c201710aBIS1 aKeen, S.1 aRoberts, Nicholas u/biblio/preliminary-evidence-use-and-efficacy-mobile-health-applications-managing-posttraumatic00551nas a2200133 4500008004100000245011200041210006900153260000900222653000800231100001500239700002200254700001500276856012600291 2017 eng d00aThe Role of Context in IT Assimilation: A Multi-Method Study of a SaaS Platform in the US Nonprofit Sector,0 aRole of Context in IT Assimilation A MultiMethod Study of a SaaS c201710aBIS1 aWright, R.1 aRoberts, Nicholas1 aWilson, D. u/biblio/role-context-it-assimilation-multi-method-study-saas-platform-us-nonprofit-sector00906nas a2200133 4500008004100000245009200041210006900133260002100202520037700223653000800600100001700608700002200625856012500647 2017 eng d00aSense of Virtual Place (SOVP): Conceptual Exploration and Initial Empirical Validation0 aSense of Virtual Place SOVP Conceptual Exploration and Initial E aBoston, MAc20173 aIn this article, we introduce the notion of “Sense of Virtual Place” (SOVP) and explore the factors affecting it. We argue that SOVP can act as a surrogate for user engagement in virtual environments. We develop and validate a SOVP measure, adapting from a widely used measure of Sense of Place (SOP) in the academic disciplines of environmental and social psychology.10aBIS1 aArora, Vipin1 aKhazanchi, Deepak u/biblio/sense-virtual-place-sovp-conceptual-exploration-and-initial-empirical-validation01759nas a2200193 4500008004100000245005900041210005700100260000900157300000700166520123900173653001501412653000801427100001901435700002001454700001501474700002201489700001701511856003701528 2016 eng d00aBA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough0 aBA302 Microsoft Dynamics NAV ERP ExerciseWalkthrough c2016 a253 aWhether you enter the workforce as a sales manager, financial accountant or office admin, chances are that you will be working with some type of Enterprise Resource Planning (ERP) system. The purpose of this exercise/walkthrough is to familiarize you with a typical business process as it is commonly executed with the help of one of the leading ERP systems in the market today – Microsoft Dynamics NAV. This exercise will walk you through the six steps of a typical sales process: 1) Creating a customer order; 2) Backordering an out-of-stock item; 3) Receiving the backordered item; 4) Shipping the customer the ordered items and invoicing the customer; 5) Receiving payment from the customer; 6) Making a payment to the vendor from whom we backordered. As you make your way through this exercise, you should realize that in a real company this process would be executed by different people working in different departments. They all will interact with the ERP; i.e., they all retrieve information from the ERP and store new information in it, as the sales process progresses. In this exercise you take on the role of each of these people, giving you a sense of how the sales order is processed both by the company and by the ERP.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aRaja, V.T.1 aReitsma, Reindert1 aWydner, Kirk uhttp://hdl.handle.net/1957/5985800568nas a2200145 4500008004100000245009400041210006900135260000900204653000800213653002300221100001800244700001300262700001600275856013100291 2016 eng d00aDifferences between Younger and Senior Information Providers in Senior Online Communities0 aDifferences between Younger and Senior Information Providers in  c201610aBIS10aBusiness Analytics1 aWang, Changyu1 aZhu, Bin1 aZuo, Meiyun u/biblio/differences-between-younger-and-senior-information-providers-senior-online-communities00526nas a2200145 4500008004100000245007400041210006900115260000900184653000800193100002200201700001600223700001500239700001700254856010900271 2016 eng d00aElectronic Medical Record System Avoidance in a Turbulent Environment0 aElectronic Medical Record System Avoidance in a Turbulent Enviro c201610aBIS1 aRoberts, Nicholas1 aMellott, M.1 aDinger, M.1 aCampbell, D. u/biblio/electronic-medical-record-system-avoidance-turbulent-environment01745nas a2200145 4500008004100000245006900041210006900110260000900179490000600188520128300194653000801477100002201485700001701507856007501524 2016 eng d00aEvaluating IT Integration Risk Prior to Mergers and Acquisitions0 aEvaluating IT Integration Risk Prior to Mergers and Acquisitions c20160 v13 aIntegration of IT systems and IT management processes is one of the major challenges in the mergers and acquisitions (M&A) process that affects all aspects of the merged business and is, therefore, crucial to the overall success of the M&A process. The purpose of this article is to highlight various types of IT integration risks and the associated costs that must be considered and factored in with the predeal negotiations in each and every M&A. This is important, especially because of the huge costs involved in integrating incompatible systems and meeting the mandatory regulatory compliance requirements. The article suggests looking closely at technical, managerial and user/application level risk factors as part of the M&A pre-merger due diligence. This effort would also evaluate the potential real costs of IT integration post-merger and contribute to the overall M&A valuation. Some of this approach is already widely recommended by M&A advisors and major consulting firms. The article recommends going even further by creating a national M&A IT integration database that provides anonymous inventory of IT integration risk factors and costs before and after an M&A to better understand how IT integration risk impacts the valuation and success or failure of M&As.10aBIS1 aKhazanchi, Deepak1 aArora, Vipin uhttp://www.isaca.org/Journal/archives/2016/Volume-1/Pages/default.aspx03641nas a2200157 4500008004100000245009500041210006900136260000900205520306600214653000803280653002303288100001803311700001303329700001603342856012503358 2016 eng d00aHelping Senior Participants Acquire the Right Type of Social Support in Online Communities0 aHelping Senior Participants Acquire the Right Type of Social Sup c20163 aSenior citizens could greatly be benefited from the social support received from a community(Choi et al. 2014; Goswami et al. 2010). Social support denotes to the interaction/communication with others, verbal or nonverbal, reducing the uncertainty or enhancing the self-perception of in control of one’s own life (Albrecht and Adelman 1987). All participants of online communities are motivated by their desire of seeking social support. And such support occurs when community members form relational links among them and have interactions that intend to help (Heaney and Israel 2002). A network member can receive/send different types of social supports from/to others. Informational support transmits information and provides guidance related to the task/question a community member has (Krause 1986); emotional support expresses understanding, encouragement, empathy affection, affirming, validation, sympathy, caring and concern (House 1981; Wang et al. 2014); companionship or network support gives the recipient a sense of belonging (Keating 2013; Wang et al. 2014); and appraisal support enhances the self-evaluation of the recipient (House 1981). Studies have shown that people are usually motivated by their desire of seeking one or more types of social supports to participate in an online community (Goswami et al. 2010; Kanayama 2003; Pfeil 2007; Pfeil and Zaphiris 2009; Wright 2000; Xie 2008). And such social support can only be acquired during the interaction with others. For senior citizens, even though they can be greatly benefited from the social support received through participation, the obstacles they need to overcome in order to feel engaged could be larger than that of younger people (Charness and Boot 2009; Lee et al. 2011), especially when they come to the community for the first time. They could be easily overwhelmed by the content that has been generated by other existing members, finding it difficult to identify an appropriate member to initiate a meaningful interaction. It therefore is critical for an online community system to help senior participants identify other existing members who are more likely to supply the type of support they are seeking. While many previous studies have uncovered the variety factors, contextual (Pfeil and Zaphiris 2009; Wang et al. 2015; Xie 2008) or individual (Wang et al. 2014, 2015, 2012; Wright 1999), that impact the degree to which a senior citizen receives social support needed from an online community, it remains unclear what the characteristics of existing community members who are more likely to provide a new comer the kind of support, informational, emotional, companionship, or appraisal are. And the answer to this question may have significant academic and practical implications. This study thus proposes to fulfil the gap by utilizing data collected from a senior community website to investigate the links between the characteristics of existing senior members and the amount and the type of support they provided to new comers. 10aBIS10aBusiness Analytics1 aWang, Changyu1 aZhu, Bin1 aZuo, Meiyun u/biblio/helping-senior-participants-acquire-right-type-social-support-online-communities00501nas a2200145 4500008004100000245006400041210006400105260000900169653001500178653000800193100001900201700002000220700001800240856009700258 2016 eng d00aHope for change in individual security behavior assessments0 aHope for change in individual security behavior assessments c201610aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aCrossler, Rob u/biblio/hope-change-individual-security-behavior-assessments00548nas a2200121 4500008004100000245012400041210006900165260000900234653000800243100002200251700001500273856013800288 2016 eng d00aThe Impact of Virtual Customer Community Interactivity on Organizational Innovation: An Absorptive Capacity Perspective0 aImpact of Virtual Customer Community Interactivity on Organizati c201610aBIS1 aRoberts, Nicholas1 aDinger, M. u/biblio/impact-virtual-customer-community-interactivity-organizational-innovation-absorptive-capacity01693nas a2200205 4500008004100000245008600041210006900127260000900196300001200205490000700217520107400224653000801298653001701306100002201323700002101345700001801366700001801384700002001402856006501422 2016 eng d00aMap? or List?based Recommender Agents? Does the Map Metaphor Fulfill its Promise?0 aMap or Listbased Recommender Agents Does the Map Metaphor Fulfil c2016 a291-3080 v163 aWe present a spatialization of digital library content based on item similarity and an experiment which compares the performance of this spatialization relative to a simple list-based display. Items in the library are K-12 science and engineering learning resources. Spatialization and visualization are accomplished through 2D interactive Sammon mapping of pairwise item similarity scores based on the joint occurrence of word bigrams. The 65 science teachers participating in the experiment were asked to search the library for curricular items they would consider using in conducting one or more teaching assignments. Results indicate that whereas the spatializations adequately capture the salient features of the library’s content and teachers actively use them, item retrieval rates, task-completion time and perceived utility do not significantly differ from the semantically poorer but easier to comprehend and navigate list-based representations. These results put into question the usefulness of the rapidly increasing supply of information spatializations.10aBIS10aSupply Chain1 aReitsma, Reindert1 aHsieh, Ping-Hung1 aDiekema, Anne1 aRobson, Robby1 aZarsky, Malinda uhttp://journals.sagepub.com/doi/abs/10.1177/147387161666919300614nas a2200157 4500008004100000245011600041210006900157260000900226490000600235653000800241653002300249100001500272700001700287700001500304856013700319 2016 eng d00aOverview of business innovations and research opportunities in blockchain and introduction to the special issue0 aOverview of business innovations and research opportunities in b c20160 v210aBIS10aBusiness Analytics1 aZhao, Leon1 aFan, Shaokun1 aYan, Jiaqi u/biblio/overview-business-innovations-and-research-opportunities-blockchain-and-introduction-special00613nas a2200169 4500008004100000245009600041210006900137260000900206490000800215653000800223653002300231100001700254700001200271700001500283700001700298856012800315 2016 eng d00aA Process Ontology Based Approach to Easing Semantic Ambiguity in Business Process Modeling0 aProcess Ontology Based Approach to Easing Semantic Ambiguity in  c20160 v10210aBIS10aBusiness Analytics1 aFan, Shaokun1 aHua, Z.1 aStorey, V.1 aZhao, J., L. u/biblio/process-ontology-based-approach-easing-semantic-ambiguity-business-process-modeling00518nas a2200121 4500008004100000245009300041210006900134260002600203653001500229653000800244100002000252856012400272 2016 eng d00a(See proceeding paper above) Hope for change in individual security behavior assessments0 aSee proceeding paper above Hope for change in individual securit aDublin, Irelandc201610aAccounting10aBIS1 aMarshall, Byron u/biblio/see-proceeding-paper-above-hope-change-individual-security-behavior-assessments01389nas a2200157 4500008004100000245006400041210006200105260000900167520087100176653001501047653000801062100002001070700002201090700002101112856009801133 2016 eng d00aUnraveling K-12 Standard Alignment; Report on a New Attempt0 aUnraveling K12 Standard Alignment Report on a New Attempt c20163 aWe present the results of an experiment which indicates that automated alignment of electronic learning objects to educational standards may be more feasible than previously implied. We highlight some important deficiencies in existing alignment systems and formulate suggestions for improved future ones. We consider how the changing substance of newer educational standards, a multi-faceted view of standard alignment, and a more nuanced view of the ‘alignment’ concept may bring the long-sought goal of automated standard alignment closer. We explore how lexical similarity of documents, a World+Method representation of semantics, and network-based analysis can yield promising results. We furthermore investigate the nature of false positives to better understand how validity of match is evaluated so as to better focus future alignment system development.10aAccounting10aBIS1 aMarshall, Byron1 aReitsma, Reindert1 aSamson, Carleigh u/biblio/unraveling-k-12-standard-alignment-report-new-attempt00616nas a2200133 4500008004100000245016300041210006900204260000900273653000800282100002200290700001700312700002200329856013100351 2016 eng d00aUsing Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective0 aUsing Information Systems to Sense Opportunities for Innovation  c201610aBIS1 aRoberts, Nicholas1 aCampbell, D.1 aVijayasarathy, L. u/biblio/using-information-systems-sense-opportunities-innovation-integrating-post-adoptive-use00457nas a2200109 4500008004100000245008000041210006900121260000900190653000800199100002200207856011800229 2015 eng d00aAbsorptive Capacity, Organizational Antecedents, and Environmental Dynamism0 aAbsorptive Capacity Organizational Antecedents and Environmental c201510aBIS1 aRoberts, Nicholas u/biblio/absorptive-capacity-organizational-antecedents-and-environmental-dynamism00614nas a2200133 4500008004100000245016100041210006900202260000900271653001500280653000800295100001900303700002000322856013800342 2015 eng d00aAffordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices0 aAffordance Perception in Risk Adverse IT Adoption An Agenda to I c201510aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron u/biblio/affordance-perception-risk-adverse-it-adoption-agenda-identify-drivers-risk-consideration-and00555nas a2200169 4500008004100000245007000041210006900111260000900180300001000189490000600199653000800205653002300213100001700236700001200253700001700265856010300282 2015 eng d00aDemystifying big data analytics through the lens of marketing mix0 aDemystifying big data analytics through the lens of marketing mi c2015 a28-320 v210aBIS10aBusiness Analytics1 aFan, Shaokun1 aLau, R.1 aZhao, J., L. u/biblio/demystifying-big-data-analytics-through-lens-marketing-mix00558nas a2200145 4500008004100000245009300041210006900134260000900203653000800212653002300220100001500243700001700258700001500275856012200290 2015 eng d00aThe Design of IdeaWorks: Applying Social Learning Networks to Support Tertiary Education0 aDesign of IdeaWorks Applying Social Learning Networks to Support c201510aBIS10aBusiness Analytics1 aKang, Lele1 aFan, Shaokun1 aZhao, Leon u/biblio/design-ideaworks-applying-social-learning-networks-support-tertiary-education01461nas a2200157 4500008004100000245007300041210006900114260000900183520091500192653000801107653001701115100002201132700002101154700001801175856011001193 2015 eng d00aEstimation and Visualization of Digital Library Content Similarities0 aEstimation and Visualization of Digital Library Content Similari c20153 aWe report on a process for similarity estimation and two-dimensional mapping of lesson materials stored in a Web-based K12 Science, Technology, Engineering and Mathematics (STEM) digital library. The process starts with automated removal of all information which should not be included in the similarity estimations followed by automated indexing. Similarity estimation itself is conducted through a natural language processing algorithm which heavily relies on bigrams. The resulting similarities are then used to compute a Sammon-map; i.e., a projection in n dimensions, the item-to-item distances of which best reflect the input similarities. In this paper we concentrate on specification and validation of this process. The similarity results show almost 100% precision-by-rank in the top three to five ranks. Sammon mapping in two dimensions corresponds well with the digital library‘s table of content.10aBIS10aSupply Chain1 aReitsma, Reindert1 aHsieh, Ping-Hung1 aRobson, Robby u/biblio/estimation-and-visualization-digital-library-content-similarities00543nas a2200157 4500008004100000245007200041210006900113260000900182490000600191653000800197653002300205100001200228700002100240700001700261856010700278 2015 eng d00aHarnessing Internet finance with innovative cyber credit management0 aHarnessing Internet finance with innovative cyber credit managem c20150 v110aBIS10aBusiness Analytics1 aLin, Z.1 aWhinston, A., B.1 aFan, Shaokun u/biblio/harnessing-internet-finance-innovative-cyber-credit-management01537nas a2200181 4500008004100000245007500041210006900116260000900185300001000194490000700204520094600211653001501157653000801172100001901180700002001199700001901219856011701238 2015 eng d00aImproving IT Assessment with IT Artifact Affordance Perception Priming0 aImproving IT Assessment with IT Artifact Affordance Perception P c2015 a17-280 v193 aAccurately assessing organizational information technology (IT) is important for accounting professionals, but also difficult. Both auditors and the professionals from whom they gather data are expected to make nuanced judgments regarding the adequacy and effectiveness of controls that protect key systems. IT artifacts (policies, procedures, and systems) are assessed in an audit because they “afford” relevant action possibilities but perception preferences shade the results of even systematic and well-tested assessment tools. This study of 246 business students makes two important contributions. First we demonstrate that a tendency to focus on either artifact or organizational imperative systematically reduces the power of well-regarded IT measurements. Second, we demonstrate that priming is an effective intervention strategy to increase the predictive power of constructs from the familiar technology acceptance model (TAM).10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aKawalek, Peter uhttp://people.oregonstate.edu/~marshaby/Papers/IJAIS%20-%20IT%20Artifact%20Affordance%20Perception%20Priming.pdf00544nas a2200157 4500008004100000245006500041210006500106260002300171653000800194653002300202653001700225100001500242700001600257700001300273856010000286 2015 eng d00aMining Hidden Organizational Structures from Meeting Records0 aMining Hidden Organizational Structures from Meeting Records aPhiladelphiac201510aBIS10aBusiness Analytics10aSupply Chain1 aLi, Jiexun1 aWu, Zhaohui1 aZhu, Bin u/biblio/mining-hidden-organizational-structures-meeting-records00522nas a2200157 4500008004100000245007800041210006900119260002000188653000800208653002300216100001400239700001600253700001300269700001800282856006400300 2015 eng d00aPREDICTING HABITUAL CONTINUING SOCIAL NETWORKING SITES USE OF THE ELDERLY0 aPREDICTING HABITUAL CONTINUING SOCIAL NETWORKING SITES USE OF TH aSingaporec201510aBIS10aBusiness Analytics1 aChai, Wen1 aZuo, Meiyun1 aZhu, Bin1 aTian, Xuesong uhttp://pacis2015.comp.nus.edu.sg/pages/workshops_cnais.html01555nas a2200157 4500008004100000245010500041210006900146260000900215520095300224653000801177100002201185700002101207700001701228700002401245856012801269 2015 eng d00aThe Relevance of K-12 Engineering Curricula to NGSS: an Analysis of TeachEngineering-NGSS Alignments0 aRelevance of K12 Engineering Curricula to NGSS an Analysis of Te c20153 aThe 2013 publication of the Next Generation Science Standards (NGSS) provided the first widely adopted set of science standards to include engineering design throughout all K-12 grades. In doing so, NGSS raised the relevance of the K-12 engineering education sector on a national scale. The TeachEngineering digital library, representative of the K-12 engineering education sector through its collaboration of 36, mostly NSF-funded, K-12 engineering education programs across the US, recently aligned its 1,300+ K-12 engineering lessons and hands-on activities to the NGSS. This paper provides analysis of both the alignment process and its results. As such, we offer insight into the correspondence between the NGSS and a broad, collection of K-12 engineering learning objects and hence, into the mutual relevance of K-12 engineering curriculum and the NGSS. We also provide some recommendations for future K-12 engineering curriculum development.10aBIS1 aReitsma, Reindert1 aSamson, Carleigh1 aSoltys, Mike1 aSullivan, Jacquelyn u/biblio/relevance-k-12-engineering-curricula-ngss-analysis-teachengineering-ngss-alignments00566nas a2200145 4500008004100000245009100041210006900132260001700201653000800218653002300226100001700249700001500266700001900281856012000300 2015 eng d00aSentiment Analysis in Social Media Platforms: The Contribution of Social Relationships0 aSentiment Analysis in Social Media Platforms The Contribution of aDallasc201510aBIS10aBusiness Analytics1 aFan, Shaokun1 aIlk, Noyan1 aZhang, Kunpeng u/biblio/sentiment-analysis-social-media-platforms-contribution-social-relationships00618nas a2200133 4500008004100000245016300041210006900204260000900273653000800282100002200290700001700312700002200329856013300351 2015 eng d00aUsing Information Systems to Sense Opportunities for Innovation: Integrating Post-Adoptive IS Use Behaviors with the Dynamic Managerial Capability Perspective0 aUsing Information Systems to Sense Opportunities for Innovation  c201510aBIS1 aRoberts, Nicholas1 aCampbell, D.1 aVijayasarathy, L. u/biblio/using-information-systems-sense-opportunities-innovation-integrating-post-adoptive-use-000532nas a2200169 4500008004100000245005500041210005400096260000900150653001500159653000800174653002300182100001500205700001500220700001300235700002000248856009400268 2015 eng d00aWeather Factors and Online Product/Service Reviews0 aWeather Factors and Online ProductService Reviews c201510aAccounting10aBIS10aBusiness Analytics1 aFeng, Jiao1 aYao, Zhong1 aZhu, Bin1 aMarshall, Byron u/biblio/weather-factors-and-online-productservice-reviews00574nas a2200169 4500008004100000245007400041210006900115260000900184300001600193490000700209653000800216653002300224100001700247700001200264700001700276856011100293 2015 eng d00aWorkflow-Aware Attention Tracking to Enhance Collaboration Management0 aWorkflowAware Attention Tracking to Enhance Collaboration Manage c2015 a1253–12640 v1710aBIS10aBusiness Analytics1 aFan, Shaokun1 aKang, L1 aZhao, J., L. u/biblio/workflow-aware-attention-tracking-enhance-collaboration-management00626nas a2200145 4500008004100000245012900041210006900170260002200239653000800261100002200269700002000291700001800311700002100329856013000350 2015 eng d00aWorkshop: TeachEngineering Digital Library: Hundreds of Free, Searchable, NGSS-aligned Hands-on Engineering Lessons for K-120 aWorkshop TeachEngineering Digital Library Hundreds of Free Searc aSeattle, WAc201510aBIS1 aReitsma, Reindert1 aZarske, Malinda1 aYowell, Janet1 aSamson, Carleigh u/biblio/workshop-teachengineering-digital-library-hundreds-free-searchable-ngss-aligned-hands00597nas a2200169 4500008004100000245009200041210006900133260000900202300001200211490000600223653000800229653002300237100001700260700001700277700001100294856012200305 2014 eng d00aBusiness Challenges and Research Directions of Management Analytics in the Big Data Era0 aBusiness Challenges and Research Directions of Management Analyt c2014 a169-1740 v110aBIS10aBusiness Analytics1 aZhao, J., L.1 aFan, Shaokun1 aHu, D. u/biblio/business-challenges-and-research-directions-management-analytics-big-data-era00559nas a2200145 4500008004100000245008200041210006900123260003100192653000800223653002300231100001500254700001200269700001300281856011900294 2014 eng d00aCollective opinion classification: A global consistency maximization approach0 aCollective opinion classification A global consistency maximizat aAukland, New Zealandc201410aBIS10aBusiness Analytics1 aLi, Jiexun1 aLi, Xin1 aZhu, Bin u/biblio/collective-opinion-classification-global-consistency-maximization-approach00535nas a2200157 4500008004100000245006000041210005900101260002600160653000800186653002300194100001700217700001700234700002100251700001500272856009000287 2014 eng d00aCredit Risk Assessment of POS-Loans in the Big Data Era0 aCredit Risk Assessment of POSLoans in the Big Data Era aHongkong, Chinac201410aBIS10aBusiness Analytics1 aBian, Yiyang1 aFan, Shaokun1 aYe, Ryan, Liying1 aZhao, Leon u/biblio/credit-risk-assessment-pos-loans-big-data-era00535nas a2200133 4500008004100000245008900041210006900130260001900199653000800218653002300226100001600249700001300265856012300278 2014 eng d00aEnsuring Positive Impact of Data Quality Metadata: Implications for Decision Support0 aEnsuring Positive Impact of Data Quality Metadata Implications f aSavannahc201410aBIS10aBusiness Analytics1 aShankar, G.1 aZhu, Bin u/biblio/ensuring-positive-impact-data-quality-metadata-implications-decision-support-000644nas a2200157 4500008004100000245012300041210006900164260000900233653000800242100001700250700002300267700001500290700002400305700001900329856013800348 2014 eng d00aEvaluation of a hospital admission prediction model adding coded chief complaint data using neural network methodology0 aEvaluation of a hospital admission prediction model adding coded c201410aBIS1 aHandly, Neal1 aThompson, David, A1 aLi, Jiexun1 aChuirazzi, David, M1 aVenkat, Arvind u/biblio/evaluation-hospital-admission-prediction-model-adding-coded-chief-complaint-data-using-neural00593nas a2200145 4500008004100000245011600041210006900157260000900226653000800235100001300243700001500256700002200271700002100293856013300314 2014 eng d00aFirm Valuation Effects of the Decision to Adopt Relationally Governed Business Process Outsourcing Arrangements0 aFirm Valuation Effects of the Decision to Adopt Relationally Gov c201410aBIS1 aDuan, C.1 aGrover, V.1 aRoberts, Nicholas1 aBalakrishnan, J. u/biblio/firm-valuation-effects-decision-adopt-relationally-governed-business-process-outsourcing00616nas a2200157 4500008004100000245010300041210006900144260002500213653000800238653002300246100001100269700001700280700001400297700001500311856013200326 2014 eng d00aFormation and effect of Social Interactions in Online Brand Community: an Empirical Investigation.0 aFormation and effect of Social Interactions in Online Brand Comm aChengdu, Chinac201410aBIS10aBusiness Analytics1 aWu, Ji1 aFan, Shaokun1 aWu, Manli1 aZhao, Leon u/biblio/formation-and-effect-social-interactions-online-brand-community-empirical-investigation01798nas a2200181 4500008004100000245007500041210006800116260000900184300001400193490000700207520122500214653000801439653002301447100001201470700001801482700001301500856010301513 2014 eng d00aThe Hl-index: Improvement of H-index Based on Quality of Citing Papers0 aHlindex Improvement of Hindex Based on Quality of Citing Papers c2014 a1021-10310 v983 aThis paper proposes hl-index as an improvement of the h-index, a popular measurement for the research quality of academic researchers. Although the h-index integrates the number of publications and the academic impact of each publication to evaluate the productivity of a researcher, it assumes that all papers that cite an academic article contribute equally to the academic impact of this article. This assumption, of course, could not be true in most times. The citation from a well-cited paper certainly brings more attention to the article than the citation from a paper that people do not pay attention to. It therefore becomes important to integrate the impact of papers that cite a researcher’s work into the evaluation of the productivity of the researcher. Constructing a citation network among academic papers, this paper therefore proposes hl-index that integrating the h-index with the concept of lobby index, a measures that has been used to evaluate the impact of a node in a complex network based on the impact of other nodes that the focal node has direct link with. This paper also explores the characteristics of the proposed hl-index by comparing it with citations, h-index and its variant g-index.10aBIS10aBusiness Analytics1 aZai, Li1 aYan, Xiangbin1 aZhu, Bin u/biblio/hl-index-improvement-h-index-based-quality-citing-papers-001587nas a2200181 4500008004100000245010400041210006900145260000900214300001200223490000700235520102800242653001501270653000801285100001901293700002001312700001901332856005401351 2014 eng d00aIT Artifact Bias: How exogenous predilections influence organizational information system paradigms0 aIT Artifact Bias How exogenous predilections influence organizat c2014 a427-4360 v343 aEfforts in IS research have long sought to bridge the gap between the information technology (IT) function and strategic business interests. Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and the strategic business interests. People perceive affordances (possibilities for action) in information technology artifacts differently as cognitive structures (schema) which bias individual focus. This study explores how an individual’s tendency to perceive the ‘trees’ in an IT ‘forest’ (artifact preference), affects their assessment of efforts to achieve more effective IT outcomes. The effect is demonstrated using a relatively simple IT success model. Further, in a sample of 120 survey responses supported by ten semi-structured interviews we demonstrate that job role and organizational IT complexity systematically impact artifact perception. A better understanding of IT artifact bias promises to help organizations better assess information systems.10aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron1 aKawalek, Peter uhttp://dx.doi.org/10.1016/j.ijinfomgt.2014.02.00500536nas a2200145 4500008004100000245006700041210006700108260003200175653000800207100001500215700002500230700001500255700001600270856010400286 2014 eng d00aMining knowledge sharing processes in online discussion forums0 aMining knowledge sharing processes in online discussion forums aBig Island, HI. U.S.Ac201410aBIS1 aWang, Alan1 aWang, Harry, Jiannan1 aLi, Jiexun1 aFan, Weiguo u/biblio/mining-knowledge-sharing-processes-online-discussion-forums00517nas a2200145 4500008004100000245006900041210006500110260001900175653001500194653000800209100002000217700001900237700001900256856009600275 2014 eng d00aThe Moderating Power of IT Bias on User Acceptance of Technology0 aModerating Power of IT Bias on User Acceptance of Technology aAucklandc201410aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aKawalek, Peter u/biblio/moderating-power-it-bias-user-acceptance-technology00597nas a2200157 4500008004100000245007900041210006900120260003100189653000800220653002300228100001900251700002100270700001700291700001900308856011200327 2014 eng d00aScalable Audience Targeted Models for Brand Advertising on Social Networks0 aScalable Audience Targeted Models for Brand Advertising on Socia aFoster City, CA, USAc201410aBIS10aBusiness Analytics1 aZhang, Kunpeng1 aOuksel, Aris, M.1 aFan, Shaokun1 aLiu, Hengchang u/biblio/scalable-audience-targeted-models-brand-advertising-social-networks02077nas a2200253 4500008004100000245011700041210006900158260000900227300001400236490000700250520125000257653000801507653002301515100001401538700001701552700001901569700001301588700001701601700001801618700001801636700001801654700001501672856013601687 2013 eng d00aAn ACP Approach to Public Health Emergency Management: Using a Campus Outbreak of H1N1 Influenza as a Case Study0 aACP Approach to Public Health Emergency Management Using a Campu c2013 a1028-10410 v433 aIn order to tackle the infeasibility of building mathematical models and conducting physical experiments for public health emergencies in a real world, we apply the ACP (Artificial societies, Computational experiments, and Parallel execution) approach to public health emergency management. We conducted a case study on the largest collective outbreak of H1N1 influenza at a Chinese university in 2009. We built an artificial society to reproduce H1N1 influenza outbreaks. In computational experiments, aiming to obtain comparable results with the real data, we applied the same intervention strategy as that was used during the real outbreak. Then we compared experiment results with real data to verify our models, including spatial models, population distribution, weighted social networks, contact patterns, students’ behaviors, and models of H1N1 influenza disease, in the artificial society. We then applied alternative intervention strategies to the artificial society. The simulation results suggested that alternative strategies controlled the outbreak of H1N1 influenza more effectively. Our models and their application to intervention strategy improvement show that the ACP approach is useful for public health emergency management10aBIS10aBusiness Analytics1 aDuan, Wei1 aCao, Zhidong1 aWang, Youzhong1 aZhu, Bin1 aZeng, Daniel1 aWang, Fei-Yue1 aQiu, Xiaogang1 aSong, Hongbin1 aWang, Yong u/biblio/acp-approach-public-health-emergency-management-using-campus-outbreak-h1n1-influenza-case-001675nas a2200157 4500008004100000245011300041210006900154260000900223520115900232653000801391653002301399100001801422700002601440700001301466856003801479 2013 eng d00aA cognitive-neural approach to explaining market oscillations in a fully recurrent adaptive agent population0 acognitiveneural approach to explaining market oscillations in a  c20133 aRecreating market oscillations to study the markets often makes use of induced activity reversal via finite share or auction thresholds, strategically replacing agents via bankruptcy or genetic algorithm rules, heavily data specific network parameterization, or stochastic randomness. However, such techniques do not shed any additional light on how and why intelligent individual scale agents may spontaneously and rationally decide to endogenously change from a buying to a selling posture within a population. This paper introduces Social Netmap, an agent based population of general purpose, parameter-free, adaptive agents adjusting their behavior in real time to the directly observed aggregate and individual behaviors of their neighbors much like real intelligent actors might in a population. Without relying on random processes, validated parameters, turning-point thresholds, or agent replacement, Social Netmap was able to endogenously create typical market oscillations in 21 out of 30 cases of real Dow Jones Industrial Average data. Social Netmap points towards future work in more realistic group behavior of intelligent, rational agents.10aBIS10aBusiness Analytics1 aWong, Charles1 aVersace, Massimiliano1 aZhu, Bin uhttp://www.dmi.unict.it/ecal2013/00495nas a2200133 4500008004100000245006300041210006100104260003400165653000800199653002300207100001300230700001900243856009900262 2013 eng d00aData/Knowledge Management for LIDAR Data Users/Researchers0 aDataKnowledge Management for LIDAR Data UsersResearchers ac201310aBIS10aBusiness Analytics1 aZhu, Bin1 aOlson, Michael u/biblio/dataknowledge-management-lidar-data-usersresearchers-000528nas a2200133 4500008004100000245007800041210006900119260002900188653000800217100001600225700002500241700001500266856011300281 2013 eng d00aDiscovering Consumer Health Expressions from Consumer-Contributed Content0 aDiscovering Consumer Health Expressions from ConsumerContributed aWashington DC, USAc201310aBIS1 aJiang, Ling1 aYang, Christopher, C1 aLi, Jiexun u/biblio/discovering-consumer-health-expressions-consumer-contributed-content00578nas a2200133 4500008004100000245012800041210006900169260000900238653000800247100001600255700001700271700002200288856013400310 2013 eng d00aElectronic Medical Record Compliance and Continuity in Delivery of Care: An Empirical Investigation in a Combat Environment0 aElectronic Medical Record Compliance and Continuity in Delivery  c201310aBIS1 aMellott, M.1 aThatcher, J.1 aRoberts, Nicholas u/biblio/electronic-medical-record-compliance-and-continuity-delivery-care-empirical-investigation00581nas a2200145 4500008004100000245009800041210006900139260002300208653000800231653002300239100001700262700001300279700001500292856012800307 2013 eng d00aEver-Changing Workarounds: A Model for Workaround Management Lifecycle in Healthcare Workflow0 aEverChanging Workarounds A Model for Workaround Management Lifec aMilan, Italyc201310aBIS10aBusiness Analytics1 aFan, Shaokun1 aTong, Yu1 aZhao, Leon u/biblio/ever-changing-workarounds-model-workaround-management-lifecycle-healthcare-workflow00541nas a2200145 4500008004100000245007500041210006900116260002300185653000800208100001500216700001500231700002500246700001600271856010800287 2013 eng d00aFinding patterns for effective knowledge sharing in online communities0 aFinding patterns for effective knowledge sharing in online commu aMilan, Italyc201310aBIS1 aLi, Jiexun1 aWang, Alan1 aWang, Harry, Jiannan1 aFan, Weiguo u/biblio/finding-patterns-effective-knowledge-sharing-online-communities01181nas a2200157 4500008004100000245008100041210006900122260000900191520069300200653000800893653002300901100001300924700001800937700001500955856005300970 2013 eng d00aGender Classification for Product Reviewers in China: A Data-Driven Approach0 aGender Classification for Product Reviewers in China A DataDrive c20133 aWhile it is crucial for organizations to automatically identify the gender of participants in product discussion forums, they may have difficulties adopting existing gender classification methods because the associations between the linguistic features used in those studies and gender type usually varies with context. The prototype system we propose to demo validates a framework for the development of gender classification that uses a more “data-driven” approach. It constantly extracts content-specific features from the discussion content. And the system could automatically adjust itself to accommodate the contextual changes in order to achieve better classification accuracy.10aBIS10aBusiness Analytics1 aZhu, Bin1 aYan, Xiangbin1 aWang, Jing uhttp://www.som.buffalo.edu/isinterface/wits2013/00515nas a2200145 4500008004100000245006600041210006600107260002500173653000800198100001500206700001500221700001500236700001500251856010300266 2013 eng d00aIdentifying hidden community elites in online social networks0 aIdentifying hidden community elites in online social networks aTianjin, Chinac201310aBIS1 aHu, Daning1 aLi, Jiexun1 aYang, Xuan1 aYan, Jiaqi u/biblio/identifying-hidden-community-elites-online-social-networks00529nas a2200133 4500008004100000245007500041210006900116260003400185653000800219653002300227100001300250700002300263856010900286 2013 eng d00aMapping User requirements to Design Alternatives: The Whole Nine yards0 aMapping User requirements to Design Alternatives The Whole Nine  ac201310aBIS10aBusiness Analytics1 aZhu, Bin1 aHoyle, Christopher u/biblio/mapping-user-requirements-design-alternatives-whole-nine-yards-001358nas a2200169 4500008004100000245014100041210006900182260004600251300001200297490000700309520068600316653000801002653001701010100001601027700001501043856013001058 2013 eng d00aWhat Do They Know About Me In The Cloud? A Comparative Law Perspective On Protecting the Privacy and Security of Sensitive Consumer Data0 aWhat Do They Know About Me In The Cloud A Comparative Law Perspe aWiley Periodicals, Inc., Malden, MAc2013 a413-4820 v503 aHow much does the cloud know about us? Should we care? In cloud computing, sensitive personal data flows in a global network of internet connected computers, creating attractive targets for hackers, challenging law enforcement and raising concerns about government surveillance. From an information privacy perspective, this article discusses how well the management information systems practices and laws in the United States and Europe protect the privacy and security of sensitive consumer data in the cloud. It examines policies and proposed regulations and makes suggestions for legal reforms in both jurisdictions to protect the privacy and security of sensitive information.10aBIS10aBusiness Law1 aKing, Nancy1 aRaja, V.T. u/biblio/what-do-they-know-about-me-cloud-comparative-law-perspective-protecting-privacy-and-000589nas a2200145 4500008004100000245011200041210006900153260000900222653000800231100002200239700001600261700001500277700001500292856013600307 2012 eng d00aAbsorptive Capacity and Information Systems Research: Review, Synthesis, and Directions for Future Research0 aAbsorptive Capacity and Information Systems Research Review Synt c201210aBIS1 aRoberts, Nicholas1 aGalluch, P.1 aDinger, M.1 aGrover, V. u/biblio/absorptive-capacity-and-information-systems-research-review-synthesis-and-directions-future00433nas a2200145 4500008004100000245003200041210003200073260002300105653000800128100002200136700002100158700001600179700001800195856007400213 2012 eng d00aBusiness Process Management0 aBusiness Process Management aPortland, ORc201210aBIS1 aReitsma, Reindert1 aVan Patten, Mark1 aBaker, Mark1 aCoogan, Chris u/biblio/business-process-management-001920nas a2200181 4500008004100000245012400041210006900165260000900234300001400243490000700257520128200264653001501546653000801561100002201569700002001591700001801611856010901629 2012 eng d00aCan Intermediary-based Science Standards Crosswalking Work? Some Evidence from Mining the Standard Alignment Tool (SAT)0 aCan Intermediarybased Science Standards Crosswalking Work Some E c2012 a1843-18580 v633 aWe explore the feasibility of intermediary-based crosswalking and alignment of K-12 science education standards. With increasing availability of K-12 science, technology, engineering and mathematics (STEM) digital library content, alignment of that content with educational standards is a significant and continuous challenge. Whereas direct, one-to-one alignment of standards is preferable but currently unsustainable in its resource demands, less resource-intensive intermediary-based alignment offers an interesting alternative. But will it work? We present the results from an experiment in which the machine-based Standard Alignment Tool (SAT) —incorporated in the National Science Digital Library (NSDL)— was used to collect over half a million direct alignments between standards from different standard-authoring bodies. These were then used to compute intermediary-based alignments derived from the well-known AAAS Project 2061 Benchmarks and NSES standards. Results show strong variation among authoring bodies in their success to crosswalk with best results for those who modeled their standards on the intermediaries. Results furthermore show a strong inverse relationship between recall and precision when both intermediates where involved in the crosswalking.10aAccounting10aBIS1 aReitsma, Reindert1 aMarshall, Byron1 aChart, Trevor uhttp://people.oregonstate.edu/~marshaby/Papers/ReitsmaMarshallChart_StandardsCrosswalking_JASIST2012.pdf00579nas a2200145 4500008004100000245009400041210006900135260002600204653000800230653002300238100001700261700001200278700001500290856012800305 2012 eng d00aCollaboration Process Patterns and Efficiency of Issue Resolution in Software Development0 aCollaboration Process Patterns and Efficiency of Issue Resolutio aDenver, CO, USAc201210aBIS10aBusiness Analytics1 aFan, Shaokun1 aLi, Xin1 aZhao, Leon u/biblio/collaboration-process-patterns-and-efficiency-issue-resolution-software-development00536nas a2200133 4500008004100000245008300041210006900124260003200193653000800225100001400233700002500247700001500272856011500287 2012 eng d00aA Comparative Study of Smoking Cessation Intervention Programs on Social Media0 aComparative Study of Smoking Cessation Intervention Programs on  aCollege Park, MD, USAc201210aBIS1 aZhang, Mi1 aYang, Christopher, C1 aLi, Jiexun u/biblio/comparative-study-smoking-cessation-intervention-programs-social-media00549nas a2200133 4500008004100000245010000041210006900141260000900210653000800219100001600227700002200243700001700265856013300282 2012 eng d00aConceptualizing Models Using Multidimensional Constructs: A Review and Guidelines for their Use0 aConceptualizing Models Using Multidimensional Constructs A Revie c201210aBIS1 aPolites, G.1 aRoberts, Nicholas1 aThatcher, J. u/biblio/conceptualizing-models-using-multidimensional-constructs-review-and-guidelines-their-use00565nas a2200133 4500008004100000245011600041210006900157260000900226653000800235100001600243700001700259700002200276856013300298 2012 eng d00aControl Mechanisms and Electronic Medical Record Compliance in a Combat Environment: An Empirical Investigation0 aControl Mechanisms and Electronic Medical Record Compliance in a c201210aBIS1 aMellott, M.1 aThatcher, J.1 aRoberts, Nicholas u/biblio/control-mechanisms-and-electronic-medical-record-compliance-combat-environment-empirical00489nas a2200145 4500008004100000245004600041210004600087260003800133300001400171653000800185653002300193100002600216700001300242856008800255 2012 eng d00aData Quality Metadata and Decision Making0 aData Quality Metadata and Decision Making aGrand Wailea, Maui, HI, USAc2012 a1434-144310aBIS10aBusiness Analytics1 aShankaranarayanan, G.1 aZhu, Bin u/biblio/data-quality-metadata-and-decision-making-000671nas a2200181 4500008004100000245011700041210006900158260000900227300001200236490000700248653000800255100001600263700001600279700001500295700002300310700002600333856013000359 2012 eng d00aDiscovering target groups in social networking sites: An effective method for maximizing joint influential power0 aDiscovering target groups in social networking sites An effectiv c2012 a318-3340 v1110aBIS1 aXu, Kaiquan1 aGuo, Xitong1 aLi, Jiexun1 aLau, Raymond, Y.K.1 aLiao, Stephan, Shaoyi u/biblio/discovering-target-groups-social-networking-sites-effective-method-maximizing-joint-000411nas a2200133 4500008004100000245003500041210003500076260002700111653001500138653000800153100001900161700002000180856007700200 2012 eng d00aDisentangling IT Artifact Bias0 aDisentangling IT Artifact Bias aOrlando, Floridac201210aAccounting10aBIS1 aCurry, Michael1 aMarshall, Byron u/biblio/disentangling-it-artifact-bias-000553nas a2200145 4500008004100000245008100041210006900122260002600191653000800217100001600225700001500241700001700256700002300273856011100296 2012 eng d00aAn effective method for discovering target groups on social networking sites0 aeffective method for discovering target groups on social network aShanghai, Chinac201210aBIS1 aXu, Kaiquan1 aLi, Jiexun1 aLiao, Shaoyi1 aLau, Raymond, Y.K. u/biblio/effective-method-discovering-target-groups-social-networking-sites00524nas a2200145 4500008004100000245007700041210006900118260000900187653000800196100001600204700001700220700002200237700001500259856010400274 2012 eng d00aAn Examination of the Role of Military Medical Chief Information Officer0 aExamination of the Role of Military Medical Chief Information Of c201210aBIS1 aMellott, M.1 aThatcher, J.1 aRoberts, Nicholas1 aCarter, M. u/biblio/examination-role-military-medical-chief-information-officer00600nas a2200157 4500008004100000245009400041210006900135260002500204653000800229100001600237700001300253700001500266700001800281700001600299856012700315 2012 eng d00aExploiting Semantic Structure for Mapping User-specified Form Terms to SNOMED CT Concepts0 aExploiting Semantic Structure for Mapping Userspecified Form Ter aMiami, FL, USAc201210aBIS1 aKhare, Ritu1 aAn, Yuan1 aLi, Jiexun1 aSong, Il-Yeol1 aHu, Xiaohua u/biblio/exploiting-semantic-structure-mapping-user-specified-form-terms-snomed-ct-concepts00448nas a2200133 4500008004100000245004500041210004500086260003400131653000800165653002300173100001300196700001800209856008700227 2012 eng d00aFinding People Who Forward Your Messages0 aFinding People Who Forward Your Messages ac201210aBIS10aBusiness Analytics1 aZhu, Bin1 aChau, Michael u/biblio/finding-people-who-forward-your-messages-200439nas a2200133 4500008004100000245004500041210004500086260002500131653000800156653002300164100001300187700001800200856008700218 2012 eng d00aFinding People Who Forward Your Messages0 aFinding People Who Forward Your Messages aSnowbird, Utahc201210aBIS10aBusiness Analytics1 aZhu, Bin1 aChau, Michael u/biblio/finding-people-who-forward-your-messages-100367nas a2200121 4500008004100000245003100041210003100072260002500103653000800128653002300136100001300159856007300172 2012 eng d00aFinding People Who Retweet0 aFinding People Who Retweet aBeijing, Chinac201210aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/finding-people-who-retweet-000595nas a2200181 4500008004100000245008200041210006900123260000900192300001200201490000700213653000800220653002300228100001700251700001700268700001200285700001200297856010400309 2012 eng d00aA Framework for the Transformation from Conceptual to Logical Workflow Models0 aFramework for the Transformation from Conceptual to Logical Work c2012 a781-7940 v5510aBIS10aBusiness Analytics1 aFan, Shaokun1 aZhao, J., L.1 aLiu, M.1 aDou, W. u/biblio/framework-transformation-conceptual-logical-workflow-models00556nas a2200157 4500008004100000245008300041210006900124260000900193300001600202490000700218653000800225100001600233700001500249700001600264856011800280 2012 eng d00aIdentifying valuable customers on social network sites for profit maximization0 aIdentifying valuable customers on social network sites for profi c2012 a13009-130180 v3910aBIS1 aXu, Kaiquan1 aLi, Jiexun1 aSong, Yuxia u/biblio/identifying-valuable-customers-social-network-sites-profit-maximization-000542nas a2200121 4500008004100000245012400041210006900165260000900234653000800243100002200251700001500273856013200288 2012 eng d00aInvestigating Firm’s Customer Agility and Firm Performance: The Importance of Aligning Sense and Respond Capabilities0 aInvestigating Firm s Customer Agility and Firm Performance The I c201210aBIS1 aRoberts, Nicholas1 aGrover, V. u/biblio/investigating-firms-customer-agility-and-firm-performance-importance-aligning-sense-and00459nas a2200109 4500008004100000245007500041210006900116260002500185653000800210100001900218856011200237 2012 eng d00aIT Effectiveness Norms and Organizational Success: a Literature Review0 aIT Effectiveness Norms and Organizational Success a Literature R aManchester, UKc201210aBIS1 aCurry, Michael u/biblio/it-effectiveness-norms-and-organizational-success-literature-review00555nas a2200145 4500008004100000245008000041210006900121260002700190653001500217653000800232653002300240100001300263700002000276856011300296 2012 eng d00aIs It You or the Message: Why Do People Pass Along Micro-Blogging Messages?0 aIt You or the Message Why Do People Pass Along MicroBlogging Mes aOrlando, Floridac201210aAccounting10aBIS10aBusiness Analytics1 aZhu, Bin1 aMarshall, Byron u/biblio/it-you-or-message-why-do-people-pass-along-micro-blogging-messages-000535nas a2200121 4500008004100000245011700041210006900158260000900227653000800236100002200244700001500266856013200281 2012 eng d00aLeveraging IT Infrastructure to Facilitate Competitive Activity via Customer Agility: An Empirical Investigation0 aLeveraging IT Infrastructure to Facilitate Competitive Activity  c201210aBIS1 aRoberts, Nicholas1 aGrover, V. u/biblio/leveraging-it-infrastructure-facilitate-competitive-activity-customer-agility-empirical00592nas a2200145 4500008004100000245011400041210006900155260000900224653000800233100001500241700001700256700001700273700002200290856013400312 2012 eng d00aOperationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research0 aOperationalizing Multidimensional Constructs in Structural Equat c201210aBIS1 aWright, R.1 aCampbell, D.1 aThatcher, J.1 aRoberts, Nicholas u/biblio/operationalizing-multidimensional-constructs-structural-equation-modeling-recommendations00568nas a2200169 4500008004100000245007200041210006900113260000900182300001200191490000700203653000800210653002300218100001900241700001700260700001300277856010800290 2012 eng d00aPatterns of News Dissemination through Online News Network in China0 aPatterns of News Dissemination through Online News Network in Ch c2012 a557-5700 v1610aBIS10aBusiness Analytics1 aWang, Youzhong1 aZeng, Daniel1 aZhu, Bin u/biblio/patterns-news-dissemination-through-online-news-network-china-101334nas a2200169 4500008004100000245008000041210006900121260001700190300001200207490000700219520085600226653000801082653001701090100001601107700001501123856002601138 2012 eng d00aProtecting the Privacy and Security of Sensitive Customer Data in the Cloud0 aProtecting the Privacy and Security of Sensitive Customer Data i aOxfordc2012 a308-3190 v283 aThe global ubiquity of cloud computing may expose consumers' sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers' trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive infomraiton in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry.10aBIS10aBusiness Law1 aKing, Nancy1 aRaja, V.T. uwww.Sciencedirect.com00600nas a2200169 4500008004100000245009300041210006900134260000900203300001200212490000600224653000800230100001500238700001200253700001500265700002100280856012900301 2012 eng d00aSemantic-enhanced models to support timely admission prediction at emergency departments0 aSemanticenhanced models to support timely admission prediction a c2012 a161-1720 v110aBIS1 aLi, Jiexun1 aGuo, L.1 aHandly, N.1 aThompson, D., A. u/biblio/semantic-enhanced-models-support-timely-admission-prediction-emergency-departments-000465nas a2200133 4500008004100000245006500041210006000106260000900166653000800175100001900183700002200202700001700224856009000241 2012 eng d00aThe Semantics of Social Media: The Spread of Occupy Protests0 aSemantics of Social Media The Spread of Occupy Protests c201210aBIS1 aWashington, A.1 aRoberts, Nicholas1 aThatcher, J. u/biblio/semantics-social-media-spread-occupy-protests01761nas a2200181 4500008004100000245009700041210006900138260000900207520113000216653000801346100002201354700001501376700001701391700001401408700001501422700001601437856012601453 2012 eng d00aThe TeachEngineering Digital Library: Improving Access to the P-12 Engineering Conversation0 aTeachEngineering Digital Library Improving Access to the P12 Eng c20123 aThe TeachEngineering digital library is a collection of searchable, standards-based, classroom-tested P-12 engineering curricula for use in science and math classrooms (Sullivan et al., 2005). Its inquiry-based lessons and hands-on activities use real-life engineering as a vehicle for the integration of science and math in P-12 classrooms. Mapped to educational content standards, the activities are age-appropriate, inexpensive to conduct, and relevant to students’ daily lives, helping science and math come alive. The collection is a powerful resource for those in P-12 or higher education, industry and professional communities wanting to improve STEM literacy, to engage young students in the joys and creativity of engineering and the design process, and to increase the number of students pursuing STEM careers.
This paper investigates TeachEngineering usage trends and curricular submission statistics. Specifically, we analyze the submission process for curriculum contributed from external authors, suggest practices for submitting new curriculum, and discuss possible support avenues for future submissions.10aBIS1 aReitsma, Reindert1 aZarske, M.1 aSullivan, J.1 aKlenk, P.1 aForbes, M.1 aCarlson, D. u/biblio/teachengineering-digital-library-improving-access-p-12-engineering-conversation-000510nas a2200133 4500008004100000245007400041210006900115260002700184653000800211100002500219700001500244700001300259856010400272 2012 eng d00aTowards an Intelligent Approach to Extracting Data for Process Mining0 aTowards an Intelligent Approach to Extracting Data for Process M aOrlando, FL, USAc201210aBIS1 aWang, Harry, Jiannan1 aLi, Jiexun1 aBai, Xue u/biblio/towards-intelligent-approach-extracting-data-process-mining00490nas a2200145 4500008004100000245004800041210004800089260003600137653000800173653002300181100001700204700002000221700001500241856008800256 2012 eng d00aTowards Collaboration Virtualization Theory0 aTowards Collaboration Virtualization Theory aHo Chi Minh City, Vietnamc201210aBIS10aBusiness Analytics1 aFan, Shaokun1 aSia, Choon-Ling1 aZhao, Leon u/biblio/towards-collaboration-virtualization-theory01727nas a2200157 4500008004100000245008300041210006900124260000900193300001200202490000700214520117500221653000801396100002201404700002101426856012201447 2011 eng d00aComparison of Human and Machine-based Educational Standard Assignment Networks0 aComparison of Human and Machinebased Educational Standard Assign c2011 a209-2230 v113 aIncreasing availability of digital libraries of K-12 curriculum resources, coupled with an increased emphasis on standard-based teaching necessitates assignment of the standards to the available curriculum. Since such assignment is a laborious and ongoing task, machine-based standard assignment tools have been under development for some time. Unfortunately, data on the performance of these machine-based classifiers are mostly lacking. In this paper we explore network modeling and layout to gain insight into the differences between human assignments and those by one of the better known machine-based classifiers. To build the standard assignment networks we define standards to be linked if they are jointly assigned to the same curricular item. Comparative analysis of the mapped networks shows that that unlike the machine-based assignment maps, the human-based maps elegantly reflect the rationales and principles of the assignment; i.e., clusters of standards separate along lines of lesson content and pedagogical principles. In addition, comparison of the maps clearly indicates that the machine classifier has trouble assigning so-called 'method' standards.10aBIS1 aReitsma, Reindert1 aDiekema, Anne, R u/biblio/comparison-human-and-machine-based-educational-standard-assignment-networks-000559nas a2200133 4500008004100000245011100041210006900152260000900221653000800230100001200238700002200250700001700272856013600289 2011 eng d00aControl Mechanisms and Deployed Electronic Medical Record Policy Compliance: A Principal-Agent Perspective0 aControl Mechanisms and Deployed Electronic Medical Record Policy c201110aBIS1 aMellott1 aRoberts, Nicholas1 aThatcher, J. u/biblio/control-mechanisms-and-deployed-electronic-medical-record-policy-compliance-principal-agent00501nas a2200121 4500008004100000245008300041210006900124260002500193653000800218100001500226700001500241856012300256 2011 eng d00aCriminal identity resolution using social behavior and relationship attributes0 aCriminal identity resolution using social behavior and relations aBeijing, Chinac201110aBIS1 aLi, Jiexun1 aWang, Alan u/biblio/criminal-identity-resolution-using-social-behavior-and-relationship-attributes00708nas a2200157 4500008004100000245018500041210006900226260002600295653000800321100001700329700001500346700002300361700001400384700002000398856013200418 2011 eng d00aDerivation of hospital admission prediction models based on coded chief complaint, demographic, patient acuity and emergency department (ED) operational data available at ED triage0 aDerivation of hospital admission prediction models based on code aBoston, MA, USAc201110aBIS1 aHandly, Neal1 aLi, Jiexun1 aThompson, David, A1 aVenkat, A1 aChuirazzi, D, M u/biblio/derivation-hospital-admission-prediction-models-based-coded-chief-complaint-demographic00487nas a2200133 4500008004100000245007100041210006800112260000900180653000800189100001600197700001700213700002200230856010100252 2011 eng d00aAn Examination of the Deployed Inpatient Electronic Medical Record0 aExamination of the Deployed Inpatient Electronic Medical Record c201110aBIS1 aMellott, M.1 aThatcher, J.1 aRoberts, Nicholas u/biblio/examination-deployed-inpatient-electronic-medical-record00530nas a2200157 4500008004100000245006600041210006600107260000900173300001200182490000700194653000800201100001500209700002100224700001900245856010800264 2011 eng d00aIdentity matching using personal and social identity features0 aIdentity matching using personal and social identity features c2011 a101-1130 v1310aBIS1 aLi, Jiexun1 aWang, Alan, Gang1 aChen, Hsinchun u/biblio/identity-matching-using-personal-and-social-identity-features-000555nas a2200157 4500008004100000245008300041210006900124260000900193300001200202490000700214653000800221100001600229700002100245700001500266856011600281 2011 eng d00aMining comparative opinions from customer reviews for competitive intelligence0 aMining comparative opinions from customer reviews for competitiv c2011 a743-7540 v5010aBIS1 aXu, Kaiquan1 aLiao, Stephan, S1 aLi, Jiexun u/biblio/mining-comparative-opinions-customer-reviews-competitive-intelligence-001804nas a2200169 4500008004100000245006300041210006300104260000900167490000700176520125500183653001501438653000801453100002001461700001901481700002201500856011201522 2011 eng d00aOrganizational Information Technology Norms and IT Quality0 aOrganizational Information Technology Norms and IT Quality c20110 v113 aThe effectiveness of IT governance initiatives in improving IT’s contribution to organizational success has been demonstrated but the mechanisms by which improved outcomes are realized have largely remained unexplored. Although IT governance tools such as COBIT and ITIL specify procedures and policies for the management of IT resources, the experts who developed those tools also embedded a set of core principles or ‘norms’ in the underlying frameworks. This article explores these norms and their role in the realization of organizational IT quality. Through analysis of normative messages implicitly expressed in the documentation elements provided by COBIT, we extract two norms (commitment to improvement and a risk/control perspective) thought to indicate that an organization has adopted the spirit of IT governance. Next, we model the relationship between adoption of these norms and IT quality and evaluate the model with data from a survey of 86 individuals who use, manage, and/or deliver organizational IT services. Principal component analysis is used to validate the survey items. Results show statistically significant relationships between norm adoption, participation in norm-driven activities, and organizational IT quality.10aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aReitsma, Reindert uhttp://www.iima.org/index.php?option=com_phocadownload&view=category&id=60:2011-volume-11-issue-4&Itemid=6800525nas a2200145 4500008004100000245007200041210006900113260000900182653000800191653002300199100001900222700001700241700001300258856010800271 2011 eng d00aPatterns of News Dissemination through Online News Network in China0 aPatterns of News Dissemination through Online News Network in Ch c201110aBIS10aBusiness Analytics1 aWang, Youzhong1 aZeng, Daniel1 aZhu, Bin u/biblio/patterns-news-dissemination-through-online-news-network-china-200616nas a2200157 4500008004100000245011200041210006900153260000900222653000800231100001700239700001700256700001400273700001400287700002200301856013500323 2011 eng d00aThe Role of Trust in Post-Adoption IT Exploration: An Empirical Examination of Knowledge Management Systems0 aRole of Trust in PostAdoption IT Exploration An Empirical Examin c201110aBIS1 aThatcher, J.1 aMcKnight, H.1 aArsal, R.1 aBaker, E.1 aRoberts, Nicholas u/biblio/role-trust-post-adoption-it-exploration-empirical-examination-knowledge-management-systems00537nas a2200145 4500008004100000245007400041210006900115260000900184653000800193653001400201653001700215653003300232100002100265856010500286 2011 eng d00aSegmenting a Fragmented Market – Challenges and How to Get It Right0 aSegmenting a Fragmented Market Challenges and How to Get It Righ c201110aBIS10aMarketing10aOSU-Cascades10aOSU-Cascades Hospitality Mgt1 aMontgomery, Todd u/biblio/segmenting-fragmented-market-challenges-and-how-get-it-right00463nas a2200133 4500008004100000245005300041210005300094260002700147653000800174100001600182700001500198700002600213856009000239 2011 eng d00aSentiment Community Detection in Social Networks0 aSentiment Community Detection in Social Networks aSeattle, WA, USAc201110aBIS1 aXu, Kaiquan1 aLi, Jiexun1 aLiao, Stephen, Shaoyi u/biblio/sentiment-community-detection-social-networks01707nas a2200145 4500008004100000245008200041210006900123260000900192520117300201653001501374653000801389100002001397700002201417856012201439 2011 eng d00aWorld vs. Method: Educational Standard Formulation Impacts Document Retrieval0 aWorld vs Method Educational Standard Formulation Impacts Documen c20113 aAlthough initiatives are underway in the educational community to consolidate disparate collections of educational standards, little has been done to explore the impact of educational standard formulation on information retrieval. Recent research contrasts two categories of educational standards: ‘World’ (topical domain-related concepts) and ‘Method’ (investigative and epistemological principles). This paper explores the information retrieval implications of the World vs. Method distinction. We find that experts are more likely to agree about which educational resources align with a Method standard but that a typical automatic standard assignment tool is more likely to assign a World standard to an educational resource. Further, a text-based information retrieval system is more likely to be accurate in retrieving documents relevant to a World standard as compared to a Method standard. These findings have implications both for educational standard formulation (combining World and Method components in a standard may improve retrieval) and for digital library builders who want to help teachers identify useful, standards-aligned learning objects.10aAccounting10aBIS1 aMarshall, Byron1 aReitsma, Reindert u/biblio/world-vs-method-educational-standard-formulation-impacts-document-retrieval-000548nas a2200133 4500008004100000245010200041210006900143260000900212653000800221100002200229700001700251700001500268856013100283 2010 eng d00aAdvancing Operations Management Theory Using Exploratory Structural Equation Modelling Techniques0 aAdvancing Operations Management Theory Using Exploratory Structu c201010aBIS1 aRoberts, Nicholas1 aThatcher, J.1 aGrover, V. u/biblio/advancing-operations-management-theory-using-exploratory-structural-equation-modelling02129nas a2200157 4500008004100000245013300041210006900174260002500243520149400268653000801762100002201770700001401792700001501806700001701821856013301838 2010 eng d00aAre French Fries and Grades Bad for You? Conflicting Evidence on how K-12 Teachers Search in a K-12 Engineering Digital Library0 aAre French Fries and Grades Bad for You Conflicting Evidence on  aLouisville, KYc20103 aThe TeachEngineering digital library provides teacher-tested, standards-based engineering content for K-12 teachers to use in science and math classrooms. Since its release in 2005, it has demonstrated significant growth in users and in contributors; data on this growth is presented. The TeachEngineering team continues to research its search functions and user interface in order to ensure that it is meeting the needs of its intended users, K-12 teachers. Empirical evidence of an experimental study on the dimensions of alignment between digital K-12 lesson materials and education standards, however, contradicts that of the observed search behavior of patrons of TeachEngineering. Whereas the experiment convincingly shows that grade band information does not add to the teaching materials’ relevance for an educational standard, observed patrons’ searching patterns show ample evidence of grade band-based searches. In this paper we offer that although grade band-based searches should perhaps be avoided because they improperly bias search results, they are such a prominent feature in the actual use of the digital library that as designers we must support them while mitigating the risk of unfortunate search bias. As a possible solution we suggest supporting grade-based searches yet offering query expansion by widening the grade band. These results also imply that curriculum developers pay close attention to the assignment of grade bands to their lessons and activities.10aBIS1 aReitsma, Reindert1 aKlenk, P.1 aZarske, M.1 aSullivan, J. u/biblio/are-french-fries-and-grades-bad-you-conflicting-evidence-how-k-12-teachers-search-k-12-002114nas a2200181 4500008004100000245008500041210006900126260000900195300001200204490000700216520152400223653001501747653000801762100002201770700002001792700002001812856010001832 2010 eng d00aAspects of 'Relevance' in the Alignment of Curriculum with Educational Standards0 aAspects of Relevance in the Alignment of Curriculum with Educati c2010 a362-3760 v463 aRetrieval of useful digitized learning objects is a key objective for educational digital libraries, but imprecise definitions of alignment hinder the development of effective retrieval mechanisms. With over 63,000 U.S. K-12 science and mathematics education standards and a rapid proliferation of Web-enabled curriculum, retrieving curriculum that aligns with the standards to which teachers must teach is increasingly important. Previous studies of such alignment use single-dimensional and binary measures of relevance. Perhaps as a consequence they suffer from low inter-rater reliability (IRR), with experts agreeing about alignments only some 20-40% of the time. We present the results of an experiment in which the dependent variable ‘alignment’ is operationalized using the Saracevic model of relevance in which; i.e., alignment is defined and measured through ‘clues’ from the everyday practice of K-12 teaching. Results show higher inter-rater reliability on all clues with significantly higher IRR on several specific alignment dimensions. In addition, a (linear) model of ‘overall alignment’ is derived and estimated. Both the structure and explanatory power of the model differ significantly between searching vs. assessment. These results illustrate the usefulness of clue-based relevance measures for information retrieval and have important consequences for both the formulation of automated retrieval mechanisms and the construction of a gold standard set of standard-curriculum alignments.10aAccounting10aBIS1 aReitsma, Reindert1 aMarshall, Byron1 aZarske, Malinda uhttp://www.sciencedirect.com/science/article/B6VC8-4XF7Y02-1/2/3fd5e4257f3d904d5929eeff2185c67800641nas a2200145 4500008004100000245017200041210006900213260000900282653000800291100001400299700001400313700002200327700001500349856013100364 2010 eng d00aBuilding and Leveraging Information in Dynamic Markets: The Role of IT Infrastructure Flexibility as Enabler of Organizational Responsiveness and Competitive Advantage0 aBuilding and Leveraging Information in Dynamic Markets The Role  c201010aBIS1 aBhatt, G.1 aEmdad, A.1 aRoberts, Nicholas1 aGrover, V. u/biblio/building-and-leveraging-information-dynamic-markets-role-it-infrastructure-flexibility00573nas a2200157 4500008004100000245008900041210006900130260000900199490000700208653000800215653002300223100001200246700001700258700001700275856012300292 2010 eng d00aA Collaborative Scheduling Approach for Service-Driven Scientific Workflow Execution0 aCollaborative Scheduling Approach for ServiceDriven Scientific W c20100 v7610aBIS10aBusiness Analytics1 aDou, W.1 aZhao, J., L.1 aFan, Shaokun u/biblio/collaborative-scheduling-approach-service-driven-scientific-workflow-execution00584nas a2200145 4500008004100000245010900041210006900150260000900219653000800228100001400236700001500250700002200265700001700287856013400304 2010 eng d00aThe Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-20080 aDiffusion of Second Generation Statistical Techniques in Informa c201010aBIS1 aGerow, J.1 aGrover, V.1 aRoberts, Nicholas1 aThatcher, J. u/biblio/diffusion-second-generation-statistical-techniques-information-systems-research-1990-200800533nas a2200133 4500008004100000245008800041210006900129260002600198653000800224100001900232700001500251700001900266856011400285 2010 eng d00aDiscourse Analysis of the Question-Answering Service of the Internet Public Library0 aDiscourse Analysis of the QuestionAnswering Service of the Inter aBoston, MA, USAc201010aBIS1 aPoole, Erik, V1 aLi, Jiexun1 aPark, Jung-Ran u/biblio/discourse-analysis-question-answering-service-internet-public-library01844nas a2200157 4500008004100000245005200041210005100093260000900144520135600153653001501509653000801524100002001532700001901552700002201571856009301593 2010 eng d00aDoes Using CobiT Improve IT Solution Proposals?0 aDoes Using CobiT Improve IT Solution Proposals c20103 aThe CobiT (Control Objectives for Information and related Technology) framework is designed to help organizations implement IT governance practices by systematically shaping identifiable IT processes to better leverage IT expenditures. The control structure advocated in CobiT embodies governance notions including business alignment, a risk/control perspective, systematic measurement, accountability, and continuous improvement. Despite the rise of internal control regulation, not all organizations have implemented systematic IT controls and many, notably small, organizations may never do so. This study explores whether exposing decision makers to CobiT positively affects the IT solutions they generate. We present a framework (drawn primarily from the structure of CobiT) for identifying normatively better IT plans as measured by application of governance principles. We report on 115 IT solution proposals created by business students. The proposals developed using CobiT more frequently took a risk/control approach, addressed the need for continuous improvement, referred to general IT processes, identified the people who should implement a solution, and proposed more measures of success. Thus, exposing decision makers to a systematic IT governance framework promises to help them generate more comprehensive solutions to IT challenges.10aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aReitsma, Reindert u/biblio/does-using-cobit-improve-it-solution-proposals-000865nas a2200133 4500008004100000245009200041210006900133260000900202520034800211653000800559100002200567700001600589856012600605 2010 eng d00aEducational Standard Assignment; Some recent findings working with NSDL tools CAT & SAT0 aEducational Standard Assignment Some recent findings working wit c20103 aThe NSDL suite of tools offers the Content Assignment and Standard Alignment Tools (CAT & SAT). We present two evaluations of these tools; one is a comparative analysis of human vs. CAT standard assignment. Another is the use of a 24M-row database of SAT-based standard alignments. The latter explores the feasibility of standard cross walking10aBIS1 aReitsma, Reindert1 aDiekema, A. u/biblio/educational-standard-assignment-some-recent-findings-working-nsdl-tools-cat-sat-000445nas a2200157 4500008004100000245003700041210003600078260000900114653000800123653002300131100001300154700001300167700001400180700001800194856007500212 2010 eng d00aFinding Treasures in Your Trash,0 aFinding Treasures in Your Trash c201010aBIS10aBusiness Analytics1 aZhu, Bin1 aLuo, Xin1 aMa, James1 aChau, Michael u/biblio/finding-treasures-your-trash-200451nas a2200157 4500008004100000245003600041210003600077260002500113653000800138653002300146100001300169700001200182700001100194700001300205856007500218 2010 eng d00aFinding Treasures in Your Trash0 aFinding Treasures in Your Trash aChengdu, Chinac201010aBIS10aBusiness Analytics1 aZhu, Bin1 aLuo, X.1 aMa, J.1 aChau, M. u/biblio/finding-treasures-your-trash-100598nas a2200169 4500008004100000245009300041210006900134260000900203300001200212490000700224653000800231100001200239700002000251700001500271700001500286856012700301 2010 eng d00aGene function prediction with gene interaction networks: a context graph kernel approach0 aGene function prediction with gene interaction networks a contex c2010 a119-1280 v1410aBIS1 aLi, Xin1 aChen, Hshinchun1 aLi, Jiexun1 aZhang, Zhu u/biblio/gene-function-prediction-gene-interaction-networks-context-graph-kernel-approach-000566nas a2200145 4500008004100000245008300041210006900124260003300193653000800226100002100234700001700255700001500272700001800287856011500305 2010 eng d00aThe Impact of Relational and Task-Oriented Leaders on Virtual Team Performance0 aImpact of Relational and TaskOriented Leaders on Virtual Team Pe aDelft, The Netherlandsc201010aBIS1 aBajwa, Deepinder1 aTyran, Craig1 aRaja, V.T.1 aTyran, Kristi u/biblio/impact-relational-and-task-oriented-leaders-virtual-team-performance-100537nas a2200133 4500008004100000245009000041210006900131260002300200653000800223100002200231700001400253700001500267856012100282 2010 eng d00aIT curriculum and critical skills set for effective IT professionals: is there a gap?0 aIT curriculum and critical skills set for effective IT professio aPortland, ORc201010aBIS1 aReitsma, Reindert1 aEom, Mike1 aHootman, J u/biblio/it-curriculum-and-critical-skills-set-effective-it-professionals-there-gap-001595nas a2200157 4500008004100000245003900041210003900080260004900119520110400168653001501272653000801287100002001295700001901315700002201334856008101356 2010 eng d00aIT Governance Norms and IT Success0 aIT Governance Norms and IT Success aDecember 2010, Saint Louis, MO, U.S.A.c20103 aThe checklists included in well-known IT governance frameworks may be a good fit for
large organizations that face regulatory pressure and a need for large-scale coordination
but may be less appropriate for smaller organizations. Core IT governance principles
embedded in the structure of CobiT, ITIL, and ISO2000 can be expressed as a set of IT
governance norms including business alignment, a risk/control perspective, systematic
measurement, accountability, and continuous improvement. In this study, we model IT
effectiveness and willingness to comply with best practices as effects of adopting these
norms. We propose a set of survey items tailored to help assess the constructs in this
model then partially validate them using principal components analysis. Survey
responses (n=86) reveal a significant connection between evidence of norm adoption in
organizations and IT success. This norms-based paradigm may be useful in bringing
some of the benefits of IT governance to the smaller organizations that are thought to
drive economic growth and employment.10aAccounting10aBIS1 aMarshall, Byron1 aCurry, Michael1 aReitsma, Reindert u/biblio/it-governance-norms-and-it-success-000524nas a2200133 4500008004100000245009000041210006900131260000900200653000800209100002200217700001400239700001600253856012100269 2010 eng d00aA Meta-Analytic Review and Extension of the Organizational IT Assimilation Literature0 aMetaAnalytic Review and Extension of the Organizational IT Assim c201010aBIS1 aRoberts, Nicholas1 aGerow, J.1 aRoberts, S. u/biblio/meta-analytic-review-and-extension-organizational-it-assimilation-literature01423nas a2200133 4500008004100000245008500041210006900126260001700195520090700212653000801119100002201127700001601149856012401165 2010 eng d00aNetwork Visualization of Human and Machine-based Educational Standard Assignment0 aNetwork Visualization of Human and Machinebased Educational Stan aLondonc20103 aRapid growth in the availability of digital libraries of K-12 curriculum, coupled with an increased emphasis on standard-based teaching has led to the development of automated standard assignment tools. To assess the performance of one of those tools and to gain insight into the differences between how human catalogers and automated tools conduct these standard assignments, we explore the use of network modeling and visualization techniques for comparing and contrasting the two. The results show significant differences between the human-based and machine-based network maps. Unlike the machine-based maps, the human-based assignment maps elegantly reflect the rationales and principles of the assignments; i.e., clusters of standards separate along lines of content and pedagogical principles. In addition, humans seem significantly more apt at assigning so-called ‘methodological’ standards.10aBIS1 aReitsma, Reindert1 aDiekema, A. u/biblio/network-visualization-human-and-machine-based-educational-standard-assignment-000622nas a2200169 4500008004100000245010500041210006900146260000900215300001200224490000600236653000800242100001500250700002400265700001500289700001500304856013300319 2010 eng d00aA policy-based process mining framework: Mining business policy texts for discovering process models0 apolicybased process mining framework Mining business policy text c2010 a169-1880 v810aBIS1 aLi, Jiexun1 aWang, Harry, Jianan1 aZhang, Zhu1 aZhao, Leon u/biblio/policy-based-process-mining-framework-mining-business-policy-texts-discovering-process-000472nas a2200145 4500008004100000245005300041210005200094260000900146653000800155653002300163100001300186700001800199710001800217856009100235 2010 eng d00aUnderstanding Awareness Diffusion at Twitter.com0 aUnderstanding Awareness Diffusion at Twittercom c201010aBIS10aBusiness Analytics1 aZhu, Bin1 aChau, Michael1 aEmptyAuthNode u/biblio/understanding-awareness-diffusion-twittercom-200448nas a2200133 4500008004100000245005300041210005200094260002100146653000800167653002300175100001300198700001200211856009100223 2010 eng d00aUnderstanding Awareness Diffusion at Twitter.com0 aUnderstanding Awareness Diffusion at Twittercom aLima, Peruc201010aBIS10aBusiness Analytics1 aZhu, Bin1 aChau, M u/biblio/understanding-awareness-diffusion-twittercom-100561nas a2200157 4500008004100000245008900041210006900130260000900199300001200208490000700220653000800227653002300235100001300258700001400271856011800285 2010 eng d00aVisualization of network concepts: The impact of working memory capacity differences0 aVisualization of network concepts The impact of working memory c c2010 a327-3440 v2110aBIS10aBusiness Analytics1 aZhu, Bin1 aWatts, S. u/biblio/visualization-network-concepts-impact-working-memory-capacity-differences01453nas a2200193 4500008004100000245008700041210006900128260000900197300001000206490000700216520088000223653001501103653000801118100002001126700002401146700001601170700001701186856005601203 2010 eng d00aVisualizing Basic Accounting Flows: Does XBRL + Model + Animation = Understanding?0 aVisualizing Basic Accounting Flows Does XBRL Model Animation Und c2010 a27-540 v103 aThe usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. This format should allow managers, investors, regulators, and students to aggregate, compare and analyze financial information. This study explores an XBRL-based visualization tool that maps the organization of financial statements captured in the XBRL formalism into a graphical representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students. Our findings suggest the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.10aAccounting10aBIS1 aMarshall, Byron1 aMortenson, Kristian1 aBourne, Amy1 aPrice, Kevin uhttp://www.uhu.es/ijdar/10.4192/1577-8517-v10_2.pdf00472nas a2200169 4500008004100000245004000041210004000081260000900121300001200130490000700142653000800149653002300157100001300180700001400193700001300207856008200220 2010 eng d00aVisualizing Social Network Concepts0 aVisualizing Social Network Concepts c2010 a151-1610 v4910aBIS10aBusiness Analytics1 aZhu, Bin1 aWatts, S.1 aChen, H. u/biblio/visualizing-social-network-concepts-000403nas a2200145 4500008004100000245001700041210001700058260002200075300001200097490000600109520005300115653000800168100002200176856005900198 2010 eng d00aWeb Services0 aWeb Services aHoboken, NJc2010 a578-5920 v33 aOverview of Web services technology and its use.10aBIS1 aReitsma, Reindert u/biblio/web-services-000517nas a2200145 4500008004100000245006600041210006200107260001800169653000800187100002500195700001500220700002000235700001800255856009800273 2009 eng d00aThe adoption and use of technologies to support virtual teams0 aadoption and use of technologies to support virtual teams aTorontoc200910aBIS1 aBajwa, Deepinder, S.1 aRaja, V.T.1 aTyran, Craig, K1 aTyran, Kristi u/biblio/adoption-and-use-technologies-support-virtual-teams-000520nas a2200145 4500008004100000245006500041210006500106260002700171653000800198100002000206700001500226700001800241700001800259856009700277 2009 eng d00aAnalyzing Writing Styles of Bloggers with Different Opinions0 aAnalyzing Writing Styles of Bloggers with Different Opinions aPhoenix, AZ, USAc200910aBIS1 aPark, Thomas, H1 aLi, Jiexun1 aZhao, Haozhen1 aChau, Michaul u/biblio/analyzing-writing-styles-bloggers-different-opinions00584nas a2200157 4500008004100000245008700041210006900128260002200197653000800219653002300227100001200250700001300262700001500275700001600290856012000306 2009 eng d00aCommunication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams0 aCommunication Clique Evolution Graph A Tool to Monitor Conflicts aPhoenix, AZc200910aBIS10aBusiness Analytics1 aQin, J.1 aZhu, Bin1 aGaynor, M.1 aBradner, S. u/biblio/communication-clique-evolution-graph-tool-monitor-conflicts-virtual-teams-100520nas a2200133 4500008004100000245008700041210006900128260000900197653000800206653002300214100001300237700001600250856012000266 2009 eng d00aCommunication Clique Evolution Graph: A Tool to Monitor Conflicts in Virtual Teams0 aCommunication Clique Evolution Graph A Tool to Monitor Conflicts c200910aBIS10aBusiness Analytics1 aZhu, Bin1 aQin, Jialun u/biblio/communication-clique-evolution-graph-tool-monitor-conflicts-virtual-teams-200497nas a2200121 4500008004100000245008500041210006900126260000900195653000800204100002200212700001700234856012400251 2009 eng d00aConceptualizing and Testing Formative Constructs: Tutorial and Annotated Example0 aConceptualizing and Testing Formative Constructs Tutorial and An c200910aBIS1 aRoberts, Nicholas1 aThatcher, J. u/biblio/conceptualizing-and-testing-formative-constructs-tutorial-and-annotated-example00571nas a2200169 4500008004100000245006000041210006000101260002200161653001500183653000800198100002000206700002400226700001600250700001700266700002100283856009700304 2009 eng d00aDelivering Value Beyond Efficiency with Visualized XBRL0 aDelivering Value Beyond Efficiency with Visualized XBRL aPhoenix, AZc200910aAccounting10aBIS1 aMarshall, Byron1 aMortenson, Kristian1 aBourne, Amy1 aPrice, Kevin1 aMarshall, Andrew u/biblio/delivering-value-beyond-efficiency-visualized-xbrl-100511nas a2200145 4500008004100000245011400041210006900155260000900224653001500233653000800248100002000256700002200276700002000298856004700318 2009 eng d00aDimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum0 aDimensional Standard Alignment in K12 Digital Libraries Assessme c200910aAccounting10aBIS1 aMarshall, Byron1 aReitsma, Reindert1 aZarske, Malinda uhttp://doi.acm.org/10.1145/1555400.155540300456nas a2200121 4500008004100000245006300041210006300104260002100167653000800188653002300196100001300219856010200232 2009 eng d00aExpanding Research Using System Development as Methodology0 aExpanding Research Using System Development as Methodology aTucson, AZc200910aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/expanding-research-using-system-development-methodology-000487nas a2200133 4500008004100000245006300041210006200104260002900166653000800195100001500203700001500218700001700233856010300250 2009 eng d00aHospital admission prediction using pre-hospital variables0 aHospital admission prediction using prehospital variables aWashington DC, USAc200910aBIS1 aLi, Jiexun1 aGuo, Lifan1 aHandly, Neal u/biblio/hospital-admission-prediction-using-pre-hospital-variables00487nas a2200121 4500008004100000245008100041210006900122260000900191653000800200100002200208700001400230856012100244 2009 eng d00aIncreasing Process Improvement through Internet-based e-Business Innovations0 aIncreasing Process Improvement through Internetbased eBusiness I c200910aBIS1 aRoberts, Nicholas1 aKlein, R. u/biblio/increasing-process-improvement-through-internet-based-e-business-innovations00429nas a2200133 4500008004100000245005000041210005000091260000900141653000800150653002300158100001300181700001300194856008800207 2009 eng d00aInformation Visualization for Decision Making0 aInformation Visualization for Decision Making c200910aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/information-visualization-decision-making-000459nas a2200109 4500008004100000245007800041210006900119260002300188653000800211100001900219856011100238 2009 eng d00aInternet Marketing: How to Use SEO and Social Networking to Reach Clients0 aInternet Marketing How to Use SEO and Social Networking to Reach aPortland, ORc200910aBIS1 aCurry, Michael u/biblio/internet-marketing-how-use-seo-and-social-networking-reach-clients00471nas a2200109 4500008004100000245008600041210006900127260002400196653000800220100001900228856011400247 2009 eng d00aLightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy.0 aLightening In a Bottle Aligning Technology with Natural Area Goa aVancouver, WAc200910aBIS1 aCurry, Michael u/biblio/lightening-bottle-aligning-technology-natural-area-goals-and-strategy00670nas a2200181 4500008004100000245012500041210006900166260000900235300001200244490000700256653000800263100001200271700002000283700001500303700001500318700002300333856013200356 2009 eng d00aManaging knowledge in light of its evolution process: An empirical study on citation network-based patent classification0 aManaging knowledge in light of its evolution process An empirica c2009 a129-1530 v2610aBIS1 aLi, Xin1 aChen, Hshinchun1 aZhang, Zhu1 aLi, Jiexun1 aNunamaker, Jay, F. u/biblio/managing-knowledge-light-its-evolution-process-empirical-study-citation-network-based-000376nas a2200109 4500008004100000245004500041210004500086260002200131653000800153100002200161856008300183 2009 eng d00aNavigating the TeachEngineering Resource0 aNavigating the TeachEngineering Resource aBoulder, COc200910aBIS1 aReitsma, Reindert u/biblio/navigating-teachengineering-resource-000475nas a2200109 4500008004100000245008600041210006900127260002100196653000800217100002200225856011800247 2009 eng d00aRegionalization of Information Space with Capacity-constrained Voronoi Diagrams0 aRegionalization of Information Space with Capacityconstrained Vo aZurich, CHc200910aBIS1 aReitsma, Reindert u/biblio/regionalization-information-space-capacity-constrained-voronoi-diagrams-000598nas a2200181 4500008004100000245007700041210006900118260000900187300001400196490000700210653000800217100001900225700001700244700001500261700001800276700001500294856010700309 2009 eng d00aSentiment analysis of Chinese documents: From sentence to document level0 aSentiment analysis of Chinese documents From sentence to documen c2009 a2474-24870 v6010aBIS1 aZhang, Changli1 aZeng, Daniel1 aLi, Jiexun1 aWang, Fei-Yue1 aZuo, Wanli u/biblio/sentiment-analysis-chinese-documents-sentence-document-level-000437nas a2200133 4500008004100000245004500041210004300086260002300129653001500152653000800167100002200175700002000197856008600217 2009 eng d00aTeachEngineering: K-12 Teacher Use Study0 aTeachEngineering K12 Teacher Use Study aBoulder, CO.c200910aAccounting10aBIS1 aReitsma, Reindert1 aMarshall, Byron u/biblio/teachengineering-k-12-teacher-use-study-002250nas a2200193 4500008004100000245009000041210006900131260000900200300001200209490000700221520168100228653001501909653000801924100002001932700001701952700002001969700001901989856004802008 2009 eng d00aTopological Analysis of Criminal Activity Networks: Enhancing Transportation Security0 aTopological Analysis of Criminal Activity Networks Enhancing Tra c2009 a83 - 910 v103 aThe security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border are not independent of law enforcement in border-area jurisdictions because the information known by local law enforcement agencies may provide valuable leads that are useful for securing the border and transportation infrastructure. The combined analysis of law enforcement information and data generated by vehicle license plate readers at international borders can be used to identify suspicious vehicles and people at ports of entry. This not only generates better quality leads for border protection agents but may also serve to reduce wait times for commerce, vehicles, and people as they cross the border. This paper explores the use of criminal activity networks (CANs) to analyze information from law enforcement and other sources to provide value for transportation and border security. We analyze the topological characteristics of CAN of individuals and vehicles in a multiple jurisdiction scenario. The advantages of exploring the relationships of individuals and vehicles are shown. We find that large narcotic networks are small world with short average path lengths ranging from 4.5 to 8.5 and have scale-free degree distributions with power law exponents of 0.85–1.3. In addition, we find that utilizing information from multiple jurisdictions provides higher quality leads by reducing the average shortest-path lengths. The inclusion of vehicular relationships and border-crossing information generates more investigative leads that can aid in securing the border and transportation infrastructure.10aAccounting10aBIS1 aKaza, Siddharth1 aXu, Jennifer1 aMarshall, Byron1 aChen, Hsinchun uhttp://dx.doi.org/10.1109/TITS.2008.201169500603nas a2200181 4500008004100000245007800041210006900119260000900188490000600197520001700203653000800220653002300228100001200251700001700263700001700280700001200297856011200309 2009 eng d00aTransformation Framework of Conceptual to Logical Business Process Models0 aTransformation Framework of Conceptual to Logical Business Proce c20090 v33 a(In Chinese)10aBIS10aBusiness Analytics1 aLiu, M.1 aFan, Shaokun1 aZhao, J., L.1 aDou, W. u/biblio/transformation-framework-conceptual-logical-business-process-models00526nas a2200133 4500008004100000245007800041210006900119260002700188653000800215653002300223100001300246700001300259856012000272 2009 eng d00aUnderstanding How Product Information Traverses Across Online Communities0 aUnderstanding How Product Information Traverses Across Online Co aGuangzhou, Chinac200910aBIS10aBusiness Analytics1 aZhu, Bin1 aYang, C. u/biblio/understanding-how-product-information-traverses-across-online-communities-100541nas a2200145 4500008004100000245007800041210006900119260000900188653000800197653002300205100001300228700001600241710001800257856012000275 2009 eng d00aUnderstanding How Product Information Traverses Across Online Communities0 aUnderstanding How Product Information Traverses Across Online Co c200910aBIS10aBusiness Analytics1 aZhu, Bin1 aYang, Chris1 aEmptyAuthNode u/biblio/understanding-how-product-information-traverses-across-online-communities-200287nas a2200109 4500008004100000245001300041210001300054260003100067653000800098100001500106856005600121 2009 eng d00aUntitled0 aUntitled aLa Jolla, Californiac200910aBIS1 aRaja, V.T. u/biblio/untitled-3300552nas a2200133 4500008004100000245009800041210006900139260002700208653000800235100001700243700001500260700001800275856012500293 2009 eng d00aUsing Wikis to Support Virtual Teams in Education: The Effect of Instructor Leadership Style.0 aUsing Wikis to Support Virtual Teams in Education The Effect of  aPhoenix, Arizonac200910aBIS1 aTyran, Craig1 aRaja, V.T.1 aTyran, Kristi u/biblio/using-wikis-support-virtual-teams-education-effect-instructor-leadership-style-101878nas a2200181 4500008004100000245008700041210006900128260002300197520123400220653001501454653000801469100002001477700002401497700001601521700001701537700002101554856012101575 2009 eng d00aVisualizing basic accounting flows: does XBRL + model + animation = understanding?0 aVisualizing basic accounting flows does XBRL model animation und aNew York, NYc20093 aThe usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. Representing traditional financial statements in this electronic and interoperable format should allow managers, investors, regulators, and importantly students to aggregate, compare and analyze financial information. Processing such data requires an understanding of the underlying paradigms embedded in consolidated sets of financial statements. This work explores the feasibility and effectiveness of an XBRL-based visualization tool, presenting an organizational framework, mapping that framework to financial statements and the XBRL formalism, and demonstrating a visual representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students in introductory financial accounting classes. This preliminary finding suggests the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.10aAccounting10aBIS1 aMarshall, Byron1 aMortenson, Kristian1 aBourne, Amy1 aPrice, Kevin1 aMarshall, Andrew u/biblio/visualizing-basic-accounting-flows-does-xbrl-model-animation-understanding-400575nas a2200145 4500008004100000245008700041210006900128260002800197653000800225653002300233100001300256700002600269700001200295856012200307 2009 eng d00aVisualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation0 aVisualizing Data Quality Metadata for Decision Support A Prototy aSan Francisco, CAc200910aBIS10aBusiness Analytics1 aZhu, Bin1 aShankaranarayanan, G.1 aCai, Y. u/biblio/visualizing-data-quality-metadata-decision-support-prototype-and-evaluation-100562nas a2200145 4500008004100000245008700041210006900128260000900197653000800206653002300214100002600237700001300263710001800276856012200294 2009 eng d00aVisualizing Data Quality Metadata for Decision Support: A Prototype and Evaluation0 aVisualizing Data Quality Metadata for Decision Support A Prototy c200910aBIS10aBusiness Analytics1 aShankaranarayanan, G.1 aZhu, Bin1 aEmptyAuthNode u/biblio/visualizing-data-quality-metadata-decision-support-prototype-and-evaluation-200534nas a2200157 4500008004100000245007300041210006900114260000900183300001400192490000700206653000800213100001600221700001800237700001500255856010600270 2009 eng d00aVisualizing the Intellectual Structure with Paper-Reference Matrices0 aVisualizing the Intellectual Structure with PaperReference Matri c2009 a1153-11600 v1510aBIS1 aZhang, Jian1 aChen, Chaomei1 aLi, Jiexun u/biblio/visualizing-intellectual-structure-paper-reference-matrices-000513nas a2200133 4500008004100000245007300041210006900114260003300183653000800216100001600224700001800240700001500258856010600273 2009 eng d00aVisualizing the intellectual structure with paper-reference matrices0 aVisualizing the intellectual structure with paperreference matri aAtlantic City, NJ, USAc200910aBIS1 aZhang, Jian1 aChen, Chaomei1 aLi, Jiexun u/biblio/visualizing-intellectual-structure-paper-reference-matrices-100608nas a2200157 4500008004100000245012000041210006900161260000900230300001200239490000700251653000800258653002300266100001300289700001300302856013500315 2008 eng d00aCommunicationGarden System: Visualizing a Computer Mediated Communication System to Facilitate Knowledge Management0 aCommunicationGarden System Visualizing a Computer Mediated Commu c2008 a778-7940 v4510aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/communicationgarden-system-visualizing-computer-mediated-communication-system-facilitate-000542nas a2200157 4500008004100000245007000041210006900111260000900180490000700189520001700196653000800213653002300221100001700244700001600261856010700277 2008 eng d00aComplex Problem Solving based on Complex Problem Definition Model0 aComplex Problem Solving based on Complex Problem Definition Mode c20080 v253 a(In Chinese)10aBIS10aBusiness Analytics1 aFan, Shaokun1 aWanchun, D. u/biblio/complex-problem-solving-based-complex-problem-definition-model00595nas a2200181 4500008004100000245007100041210006700112260000900179300001400188490000700202653000800209653002300217100001600240700001300256700001700269700001900286856010800305 2008 eng d00aA context- and role-driven scientific workflow development pattern0 acontext and roledriven scientific workflow development pattern c2008 a1741-17570 v2010aBIS10aBusiness Analytics1 aWanchun, D.1 aChen, J.1 aFan, Shaokun1 aCheung, S., C. u/biblio/context-and-role-driven-scientific-workflow-development-pattern00557nas a2200169 4500008004100000245006600041210006500107260000900172490000700181520001700188653000800205653002300213100001700236700001600253700001500269856010300284 2008 eng d00aContext-aware Resource Access Control in Scientific Workflows0 aContextaware Resource Access Control in Scientific Workflows c20080 v293 a(In Chinese)10aBIS10aBusiness Analytics1 aFan, Shaokun1 aWanchun, D.1 aXiping, L. u/biblio/context-aware-resource-access-control-scientific-workflows00471nas a2200145 4500008004100000245004800041210004800089260002100137653000800158653002300166100002600189700001300215700001200228856008500240 2008 eng d00aDecision support with data quality metadata0 aDecision support with data quality metadata aBoston, MAc200810aBIS10aBusiness Analytics1 aShankaranarayanan, G.1 aZhu, Bin1 aCai, Y. u/biblio/decision-support-data-quality-metadata-000500nas a2200133 4500008004100000245006900041210006800110260002500178653000800203653002300211100001300234700001400247856010500261 2008 eng d00aMonitoring Conflicts in Virtual Teams: A Social Network Approach0 aMonitoring Conflicts in Virtual Teams A Social Network Approach aKunming, Chinac200810aBIS10aBusiness Analytics1 aZhu, Bin1 aGaynor, M u/biblio/monitoring-conflicts-virtual-teams-social-network-approach-000539nas a2200145 4500008004100000245007500041210006900116260002400185653000800209653002300217100001300240700001400253700001600267856011000283 2008 eng d00aMonitoring Team Conflicts through the Visualization of Social Networks0 aMonitoring Team Conflicts through the Visualization of Social Ne aParis, Francec200810aBIS10aBusiness Analytics1 aZhu, Bin1 aGaynor, M1 aBradner, S. u/biblio/monitoring-team-conflicts-through-visualization-social-networks-000461nas a2200133 4500008004100000245005300041210005200094260002500146653000800171100001500179700002100194700001900215856009300234 2008 eng d00aPRM-based identity matching using social context0 aPRMbased identity matching using social context aTaipei, Taiwanc200810aBIS1 aLi, Jiexun1 aWang, Gang, Alan1 aChen, Hsinchun u/biblio/prm-based-identity-matching-using-social-context00528nas a2200145 4500008004100000245006800041210006800109260002400177653000800201100001500209700002500224700001500249700001500264856010300279 2008 eng d00aProcess component identification from business policy documents0 aProcess component identification from business policy documents aYunnan, Chinac200810aBIS1 aLi, Jiexun1 aWang, Harry, Jiannan1 aZhang, Zhu1 aZhao, Leon u/biblio/process-component-identification-business-policy-documents00540nas a2200145 4500008004100000245007300041210006900114260002400183653000800207100001500215700002500230700001500255700001500270856010900285 2008 eng d00aRelation-centric task identification for policy-based process mining0 aRelationcentric task identification for policybased process mini aParis, Francec200810aBIS1 aLi, Jiexun1 aWang, Harry, Jiannan1 aZhang, Zhu1 aZhao, Leon u/biblio/relation-centric-task-identification-policy-based-process-mining00499nas a2200133 4500008004100000245006700041210006700108260002400175653000800199100001500207700002400222700001600246856010300262 2008 eng d00aStylometric feature selection for assessing review helpfulness0 aStylometric feature selection for assessing review helpfulness aParis, Francec200810aBIS1 aLi, Jiexun1 aMacDonald, Craig, M1 aZheng, Rong u/biblio/stylometric-feature-selection-assessing-review-helpfulness00420nas a2200133 4500008004100000245004300041210004300084260002600127653000800153100001500161700001300176700001800189856007900207 2008 eng d00aTheme creation for digital collections0 aTheme creation for digital collections aBerlin, Germanyc200810aBIS1 aLi, Jiexun1 aXia, Lin1 aZhou, Xiaohua u/biblio/theme-creation-digital-collections02064nas a2200181 4500008004100000245008400041210006900125260000900194300001400203490000700217520147700224653001501701653000801716100002001724700001901744700002001763856009901783 2008 eng d00aUsing Importance Flooding to Identify Interesting Networks of Criminal Activity0 aUsing Importance Flooding to Identify Interesting Networks of Cr c2008 a2099-21140 v593 aCross-jurisdictional law enforcement data sharing and analysis is of vital importance because law breakers regularly operate in multiple jurisdictions. Agencies continue to invest massive resources in various sharing initiatives despite several high-profile failures. Key difficulties include: privacy concerns, administrative issues, differences in data representation, and a need for better analysis tools. This work presents a methodology for sharing and analyzing investigation-relevant data and is potentially useful across large cross-jurisdictional data sets. The approach promises to allow crime analysts to use their time more effectively when creating link charts and performing similar analysis tasks. Many potential privacy and security pitfalls are avoided by reducing shared data requirements to labeled relationships between entities. Our importance flooding algorithm helps extract interesting networks of relationships from existing law enforcement records using user-controlled investigation heuristics, spreading activation, and path-based interestingness rules. In our experiments, several variations of the importance flooding approach outperformed relationship-weight-only methods in matching expert-selected associations. We find that accuracy in not substantially affected by reasonable variations in algorithm parameters and demonstrate that user feedback and additional, case-specific information can be usefully added to the computational model.10aAccounting10aBIS1 aMarshall, Byron1 aChen, Hsinchun1 aKaza, Siddharth uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_ImportanceFlooding_PrePrint.pdf00657nas a2200193 4500008004100000245009100041210006900132260000900201490000700210653000800217653002300225100001600248700001300264700001100277700001900288700001300307700001700320856012600337 2008 eng d00aA Workflow Engine-Driven SOA-Based Cooperative Computing Paradigm in Grid Environments0 aWorkflow EngineDriven SOABased Cooperative Computing Paradigm in c20080 v2210aBIS10aBusiness Analytics1 aWanchun, D.1 aChen, J.1 aLiu, J1 aCheung, S., C.1 aChen, G.1 aFan, Shaokun u/biblio/workflow-engine-driven-soa-based-cooperative-computing-paradigm-grid-environments00603nas a2200145 4500008004100000245010700041210006900148260004600217653000800263100001200271700001900283700001500302700001500317856012500332 2007 eng d00aAuto patent classification using citation network information: An experimental study in nanotechnology0 aAuto patent classification using citation network information An aVancouver, British Columbia, Canadac200710aBIS1 aLi, Xin1 aChen, Hsinchun1 aZhang, Zhu1 aLi, Jiexun u/biblio/auto-patent-classification-using-citation-network-information-experimental-study00624nas a2200169 4500008004100000245010200041210006900143260000900212300001500221490000600236653000800242100001700250700001900267700001500286700001800301856013500319 2007 eng d00aComplex problem solving: A case study on identity matching based on social contextual information0 aComplex problem solving A case study on identity matching based  c2007 aArticle 310 v810aBIS1 aXu, Jennifer1 aWang, Alan, G.1 aLi, Jiexun1 aChau, Michaul u/biblio/complex-problem-solving-case-study-identity-matching-based-social-contextual-information-000670nas a2200193 4500008004100000245010100041210006900142260000900211490000700220653000800227653002300235100001200258700001600270700001300286700001700299700001900316700001200335856012900347 2007 eng d00aOn Design, Verification, and Dynamic Modification of the Problem-Based Scientific Workflow Model0 aDesign Verification and Dynamic Modification of the ProblemBased c20070 v1510aBIS10aBusiness Analytics1 aLiu, X.1 aWanchun, D.1 aChen, J.1 aFan, Shaokun1 aCheung, S., C.1 aCai, S. u/biblio/design-verification-and-dynamic-modification-problem-based-scientific-workflow-model00522nas a2200121 4500008004100000245010500041210006900146260000900215653000800224100001400232700002200246856013200268 2007 eng d00aDo As Others Do: Modeling IT Adoption Intentions through Institutional and Social Contagion Theories0 aDo As Others Do Modeling IT Adoption Intentions through Institut c200710aBIS1 aKlein, R.1 aRoberts, Nicholas u/biblio/do-others-do-modeling-it-adoption-intentions-through-institutional-and-social-contagion00385nas a2200109 4500008004100000245005300041210005100094260001900145653000800164100001900172856008400191 2007 eng d00aeConsulting to improve the client's bottom line.0 aeConsulting to improve the clients bottom line aReno, NVc200710aBIS1 aCurry, Michael u/biblio/econsulting-improve-clients-bottom-line00526nas a2200157 4500008004100000245006700041210006400108260000900172490000700181653000800188653002300196100001500219700001600234700001700250856010100267 2007 eng d00aA Fuzzy Directed Graph-based QoS Model for Service Composition0 aFuzzy Directed Graphbased QoS Model for Service Composition c20070 v1210aBIS10aBusiness Analytics1 aSanjun, G.1 aWanchun, D.1 aFan, Shaokun u/biblio/fuzzy-directed-graph-based-qos-model-service-composition00565nas a2200145 4500008004100000245009100041210006900132260002700201653000800228100001200236700001500248700001900263700001500282856012200297 2007 eng d00aGraph kernel-based learning for gene function prediction from gene interaction network0 aGraph kernelbased learning for gene function prediction from gen aFremont, CA, USAc200710aBIS1 aLi, Xin1 aZhang, Zhu1 aChen, Hsinchun1 aLi, Jiexun u/biblio/graph-kernel-based-learning-gene-function-prediction-gene-interaction-network01809nas a2200157 4500008004100000245006700041210006700108260000900175300001200184490000600196520128800202653000801490100002201498700002201520856010901542 2007 eng d00aInformation Space Partitioning Using Adaptive Voronoi Diagrams0 aInformation Space Partitioning Using Adaptive Voronoi Diagrams c2007 a123-1380 v63 aIn this paper we present and evaluate a Voronoi method for partitioning continuous information spaces. We define the formal characteristics of the problem and discuss several well-known partitioning methods and approaches. We submit that although they all partially solve the problem, they all have shortcomings. As an alternative, we offer an approach based on an adaptive version of the multiplicatively weighted Voronoi diagram. The diagram is ‘adaptive’ because it is computed backwards; i.e., the generators' weights are treated as dependent rather than independent variables. We successfully test this adaptive solution using both ideal-typical (artificial) and empirical data. Since the resultant visualizations are meant to be used by human subjects, we then discuss the results of a usability experiment, positioning the adaptive solution against a commonly used rectangular solution and the classic nonweighted Voronoi solution. The results indicate that in terms of usability, both the rectangular and the adaptive Voronoi solution outperform the standard Voronoi solution. In addition, although subjects are better able to gage rectangular area relationships, only the adaptive Voronoi solution satisfies all geometric constraints of weight-proportional partitioning.10aBIS1 aReitsma, Reindert1 aTrubin, Stanislav u/biblio/information-space-partitioning-using-adaptive-voronoi-diagrams-000600nas a2200145 4500008004100000245010200041210006900143260002500212653000800237653002300245100001300268700002600281700001200307856013500319 2007 eng d00aIntegrating Data Quality Data into Decision-Making Process: an Information Visualization Approach0 aIntegrating Data Quality Data into DecisionMaking Process an Inf aBeijing, Chinac200710aBIS10aBusiness Analytics1 aZhu, Bin1 aShankaranarayanan, G.1 aCai, Y. u/biblio/integrating-data-quality-data-decision-making-process-information-visualization-approach-000679nas a2200181 4500008004100000245012900041210006900170260000900239300001400248490000700262653000800269100001500277700001500292700001200307700002200319700001900341856013700360 2007 eng d00aLarge-scale regulatory network analysis from microarray data: Modified Bayesian network learning and association rule mining0 aLargescale regulatory network analysis from microarray data Modi c2007 a1207-12250 v4310aBIS1 aHuang, Zan1 aLi, Jiexun1 aSu, Hua1 aWatts, George, S.1 aChen, Hsinchun u/biblio/large-scale-regulatory-network-analysis-microarray-data-modified-bayesian-network-learning-000606nas a2200145 4500008004100000245010200041210006900143260003500212653000800247100001500255700002500270700001500295700001500310856013500325 2007 eng d00aMining business policy texts for discovering process models: A framework and some initial results0 aMining business policy texts for discovering process models A fr aMontreal, Quebec, Canadac200710aBIS1 aLi, Jiexun1 aWang, Harry, Jiannan1 aZhang, Zhu1 aZhao, Leon u/biblio/mining-business-policy-texts-discovering-process-models-framework-and-some-initial-results00594nas a2200169 4500008004100000245008400041210006900125260000900194300001200203490000700215653000800222100001500230700001200245700001900257700002600276856012200302 2007 eng d00aOptimal search-based gene subset selection for gene array cancer classification0 aOptimal searchbased gene subset selection for gene array cancer  c2007 a398-4050 v1110aBIS1 aLi, Jiexun1 aSu, Hua1 aChen, Hsinchun1 aFutscher, Bernard, W. u/biblio/optimal-search-based-gene-subset-selection-gene-array-cancer-classification-000537nas a2200133 4500008004100000245008400041210006900125260002500194653000800219100002200227700002000249700001800269856011600287 2007 eng d00aPoster Session. Aligning Curriculum with Standards: TeachEngineering, SAT & CAT0 aPoster Session Aligning Curriculum with Standards TeachEngineeri aWashington, DCc200710aBIS1 aReitsma, Reindert1 aCyr, Martha, N.1 aDiekema, Anne u/biblio/poster-session-aligning-curriculum-standards-teachengineering-sat-cat-001341nas a2200157 4500008004100000245005000041210004900091260002300140520084900163653001501012653000801027100002001035700002201055700001901077856008701096 2007 eng d00aSemantics or Standards for Curriculum Search?0 aSemantics or Standards for Curriculum Search aNew York, NYc20073 aAligning digital library resources with national and state educational standards to help K-12 teachers search for relevant curriculum is an important issue in the digital library community. Aligning standards from different states promises to help teachers in one state find appropriate materials created and cataloged elsewhere. Although such alignments provide a powerful means for crosswalking standards and curriculum across states, alignment matrices are intrinsically sparse. Hence, we hypothesize that such sparseness may cause significant numbers of false negatives when used for searching curriculum. Our preliminary results confirm the false negative hypothesis, demonstrate the usefulness of term-based techniques in addressing the false negative problem, and explore ways to combine term occurrence data with standards correlations.10aAccounting10aBIS1 aMarshall, Byron1 aReitsma, Reindert1 aCyr, Martha, N u/biblio/semantics-or-standards-curriculum-search-000400nas a2200133 4500008004100000245003600041210003600077260000900113653000800122100002200130700002000152700001600172856007800188 2007 eng d00aTeachEngineering Poster Session0 aTeachEngineering Poster Session c200710aBIS1 aReitsma, Reindert1 aVanlue, William1 aLewis, Paul u/biblio/teachengineering-poster-session-100582nas a2200133 4500008004100000245013000041210006900171260000900240653000800249100002200257700001700279700001400296856013800310 2007 eng d00aTying Context to Post-Adoption Behavior Within Information Technology: A Conceptual and Operational Definition of Mindfulness0 aTying Context to PostAdoption Behavior Within Information Techno c200710aBIS1 aRoberts, Nicholas1 aThatcher, J.1 aKlein, R. u/biblio/tying-context-post-adoption-behavior-within-information-technology-conceptual-and-operational02033nas a2200205 4500008004100000245011700041210006900158260000900227300001200236490000700248520135500255653001501610653000801625100002501633700001201658700002001670700001901690700001901709856009901728 2007 eng d00aUser-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System0 aUserCentered Evaluation of Arizona BioPathway An Information Ext c2007 a527-5360 v113 aExplosive growth in biomedical research has made automated information extraction, knowledge integration, and visualization increasingly important and critically needed. The Arizona BioPathway (ABP) system extracts and displays biological regulatory pathway information from the abstracts of journal articles. This study uses relations extracted from more than 200 PubMed abstracts presented in a tabular and graphical user interface with built-in search and aggregation functionality. This article presents a task-centered assessment of the usefulness and usability of the ABP system focusing on its relation aggregation and visualization functionalities. Results suggest that our graph-based visualization is more efficient in supporting pathway analysis tasks and is perceived as more useful and easier to use as compared to a text-based literature viewing method. Relation aggregation significantly contributes to knowledge acquisition efficiency. Together, the graphic and tabular views in the ABP Visualizer provide a flexible and effective interface for pathway relation browsing and analysis. Our study contributes to pathway-related research and biological information extraction by assessing the value of a multi-view, relation-based interface which supports user-controlled exploration of pathway information across multiple granularities.10aAccounting10aBIS1 aQuiñones, Karin, D.1 aSu, Hua1 aMarshall, Byron1 aEggers, Shauna1 aChen, Hsinchun uhttp://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4300830&arnumber=4300844&count=17&index=500414nas a2200133 4500008004100000245004300041210004300084260000900127653000800136100002200144700001700166700001400183856008300197 2007 eng d00aUsing Information Technology Mindfully0 aUsing Information Technology Mindfully c200710aBIS1 aRoberts, Nicholas1 aThatcher, J.1 aKlein, R. u/biblio/using-information-technology-mindfully01514nas a2200169 4500008004100000245007500041210006900116260000900185300001200194490000700206520095200213653000801165100002201173700001401195700001801209856011701227 2007 eng d00aWeight-proportional Space Partitioning Using Adaptive Voronoi Diagrams0 aWeightproportional Space Partitioning Using Adaptive Voronoi Dia c2007 a383-4050 v113 aTraditional application of Voronoi diagrams for space partitioning results in Voronoi regions, each with a specific area determined by the generators’ relative locations and weights. Particularly in the area of information space (re)construction, however, there is a need for inverse solutions; i.e., finding weights that result in regions with predefined area ratios. In this paper, we formulate an adaptive Voronoi solution and propose a raster-based optimization method for finding the associated weight set. The solution consists of a combination of simple, fixed-point iteration with an optional spatial resolution refinement along the regions’ boundaries using quadtree decomposition. We present the corresponding algorithm and its complexity analysis. The method is successfully tested on a series of ideal”typical cases and the interactions between the adaptive technique and boundary resolution refinement are explored and assessed.10aBIS1 aReitsma, Reindert1 aTrubin, S1 aMortensen, E. u/biblio/weight-proportional-space-partitioning-using-adaptive-voronoi-diagrams-001468nas a2200205 4500008004100000245006900041210006900110260000900179300001300188490000700201520086100208653001501069653000801084100002001092700001201112700002101124700001901145700001901164856007901183 2006 eng d00aAggregating Automatically Extracted Regulatory Pathway Relations0 aAggregating Automatically Extracted Regulatory Pathway Relations c2006 a100- 1080 v103 aAutomatic tools to extract information from biomedical texts are needed to help researchers leverage the vast and increasing body of biomedical literature. While several biomedical relation extraction systems have been created and tested, little work has been done to meaningfully organize the extracted relations. Organizational processes should consolidate multiple references to the same objects over various levels of granularity, connect those references to other resources, and capture contextual information. We propose a feature decomposition approach to relation aggregation to support a five-level aggregation framework. Our BioAggregate tagger uses this approach to identify key features in extracted relation name strings. We show encouraging feature assignment accuracy and report substantial consolidation in a network of extracted relations.10aAccounting10aBIS1 aMarshall, Byron1 aSu, Hua1 aMcDonald, Daniel1 aEggers, Shauna1 aChen, Hsinchun uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_IEEE_TITB_2005.pdf00615nas a2200157 4500008004100000245012900041210006900170260000900239300001000248490000700258653000800265100001600273700001900289700001700308856013200325 2006 eng d00aThe Analytic Hierarchy Process: A Tutorial for Use in Prioritizing Forest Road Investments to Minimize Environmental Effects0 aAnalytic Hierarchy Process A Tutorial for Use in Prioritizing Fo c2006 a51-700 v1710aBIS1 aCoulter, E.1 aCoakley, James1 aSessions, J. u/biblio/analytic-hierarchy-process-tutorial-use-prioritizing-forest-road-investments-minimize-000575nas a2200145 4500008004100000245009800041210006900139260002700208653000800235100001500243700001200258700001200270700001900282856012800301 2006 eng d00aA Bayesian framework of integrating gene functional relations from heterogeneous data sources0 aBayesian framework of integrating gene functional relations from aPhoenix, AZ, USAc200610aBIS1 aLi, Jiexun1 aLi, Xin1 aSu, Hua1 aChen, Hsinchun u/biblio/bayesian-framework-integrating-gene-functional-relations-heterogeneous-data-sources00649nas a2200181 4500008004100000245011900041210006900160260000900229300001200238490000700250653000800257100001600265700001500281700001900296700001500315700001200330856012500342 2006 eng d00aA framework of authorship identification for online messages: Writing style features and classification techniques0 aframework of authorship identification for online messages Writi c2006 a378-3930 v5710aBIS1 aZheng, Rong1 aLi, Jiexun1 aChen, Hsinchun1 aHuang, Zan1 aQin, Yi u/biblio/framework-authorship-identification-online-messages-writing-style-features-and-000673nas a2200181 4500008004100000245012800041210006900169260000900238300001400247490000700261653000800268100001500276700001200291700001200303700001900315700002500334856013200359 2006 eng d00aA framework of integrating gene functional relations from heterogeneous data sources: An experiment on Arabidopsis thaliana0 aframework of integrating gene functional relations from heteroge c2006 a2037-20430 v2210aBIS1 aLi, Jiexun1 aLi, Xin1 aSu, Hua1 aChen, Hsinchun1 aGalbraith, David, W. u/biblio/framework-integrating-gene-functional-relations-heterogeneous-data-sources-experiment-000422nas a2200157 4500008004100000245003500041210003500076260000900111300001000120490000700130653000800137100001500145700001600160700001900176856006900195 2006 eng d00aFrom fingerprint to writeprint0 aFrom fingerprint to writeprint c2006 a76-820 v4910aBIS1 aLi, Jiexun1 aZheng, Rong1 aChen, Hsinchun u/biblio/fingerprint-writeprint-000460nas a2200121 4500008004100000245006300041210006300104260002700167653000800194100001500202700002100217856010000238 2006 eng d00aIdentity matching based on probabilistic relational models0 aIdentity matching based on probabilistic relational models aAcapulco, Mexicoc200610aBIS1 aLi, Jiexun1 aWang, Gang, Alan u/biblio/identity-matching-based-probabilistic-relational-models00482nas a2200121 4500008004100000245008200041210006900123260000900192653000800201100001400209700002200223856011500245 2006 eng d00aInstitutional Influences on Adoption Intention within the Healthcare Industry0 aInstitutional Influences on Adoption Intention within the Health c200610aBIS1 aKlein, R.1 aRoberts, Nicholas u/biblio/institutional-influences-adoption-intention-within-healthcare-industry00424nas a2200121 4500008004100000245005100041210005100092260002500143653000800168653002300176100001300199856009000212 2006 eng d00aManagement Information Systems Research is USA0 aManagement Information Systems Research is USA aChengdu, Chinac200610aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/management-information-systems-research-usa-001362nas a2200181 4500008004100000245008600041210006900127260000900196300001400205490000700219520077400226653001501000653000801015100002001023700001901043700002401062856009401086 2006 eng d00aMatching Knowledge Elements in Concept Maps Using a Similarity Flooding Algorithm0 aMatching Knowledge Elements in Concept Maps Using a Similarity F c2006 a1290-13060 v423 aConcept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of concept maps exhibit terminology variance, informality, and organizational variation. These factors make it difficult to match elements between maps in comparison, retrieval, and merging processes. In this work, we add an element anchoring mechanism to a similarity flooding (SF) algorithm to match nodes and substructures between pairs of simulated maps and student-drawn concept maps. Experimental results show significant improvement over simple string matching with combined recall accuracy of 91% for conceptual nodes and concept ¨ link ¨ concept propositions in student-drawn maps.10aAccounting10aBIS1 aMarshall, Byron1 aChen, Hsinchun1 aMadhusudan, Therani uhttp://people.oregonstate.edu/~marshaby/Papers/MatchKnowledgeElements_PrePrintVersion.pdf00434nas a2200133 4500008004100000245005300041210005300094260000900147653000800156100002200164700001700186700001400203856008300217 2006 eng d00aMindfulness in the Domain of Information Systems0 aMindfulness in the Domain of Information Systems c200610aBIS1 aRoberts, Nicholas1 aThatcher, J.1 aKlein, R. u/biblio/mindfulness-domain-information-systems01741nas a2200181 4500008004100000245008600041210006900127260000900196490000600205520119200211653001501403653000801418100002001426700001901446700001401465700002001479856006001499 2006 eng d00aMoving Digital Libraries into the Student Learning Space: the GetSmart Experience0 aMoving Digital Libraries into the Student Learning Space the Get c20060 v63 aThe GetSmart system was built to support theoretically sound learning processes in a digital library environment by integrating course management, digital library, and concept mapping components to support a constructivist, six-step, information search process. In the fall of 2002 more than 100 students created 1400 concept maps as part of selected computing classes offered at the University of Arizona and Virginia Tech. Those students conducted searches, obtained course information, created concept maps, collaborated in acquiring knowledge, and presented their knowledge representations. This article connects the design elements of the GetSmart system to targeted concept-map-based learning processes, describes our system and research testbed, and analyzes our system usage logs. Results suggest that students did in fact use the tools in an integrated fashion, combining knowledge representation and search activities. After concept mapping was included in the curriculum, we observed improvement in students' online quiz scores. Further, we observed that students in groups collaboratively constructed concept maps with multiple group members viewing and updating map details.10aAccounting10aBIS1 aMarshall, Byron1 aChen, Hsinchun1 aShen, Rao1 aFox, Edward, A. uhttp://portal.acm.org/citation.cfm?doid=1217862.121786400566nas a2200145 4500008004100000245008400041210006900125260002700194653000800221100001500229700001200244700001900256700002500275856012000300 2006 eng d00aOptimal search-based gene subset selection for microarray cancer classification0 aOptimal searchbased gene subset selection for microarray cancer  aPhoenix, AZ, USAc200610aBIS1 aLi, Jiexun1 aSu, Hua1 aChen, Hsinchun1 aFutscher, Bernard, W u/biblio/optimal-search-based-gene-subset-selection-microarray-cancer-classification00410nas a2200133 4500008004100000245003600041210003600077260002500113653000800138100002200146700001600168700001400184856007800198 2006 eng d00aTeachEngineering Poster Session0 aTeachEngineering Poster Session aWashington, DCc200610aBIS1 aReitsma, Reindert1 aSullivan, J1 aCyr, M, N u/biblio/teachengineering-poster-session-200487nas a2200133 4500008004100000245008400041210006900125260002400194653001500218653000800233100002000241700001900261856007300280 2006 eng d00aUsing Importance Flooding to Identify Interesting Networks of Criminal Activity0 aUsing Importance Flooding to Identify Interesting Networks of Cr aSan Diego, CAc200610aAccounting10aBIS1 aMarshall, Byron1 aChen, Hsinchun uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_ISI_2006.pdf00392nas a2200145 4500008004100000245003000041210003000071260000900101490000700110653000800117653002300125100001300148700001300161856007200174 2005 eng d00aInformation Visualization0 aInformation Visualization c20050 v3910aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/information-visualization-001720nas a2200169 4500008004100000245010700041210006900148260000900217520116000226653001501386653000801401100002001409700001201429700001801441700001901459856007201478 2005 eng d00aLinking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations0 aLinking Ontological Resources Using Aggregatable Substance Ident c20053 aSystems that extract biological regulatory pathway relations from free-text sources are
intended to help researchers leverage vast and growing collections of research literature.
Several systems to extract such relations have been developed but little work has focused on
how those relations can be usefully organized (aggregated) to support visualization systems or
analysis algorithms. Ontological resources that enumerate name strings for different types of
biomedical objects should play a key role in the organization process. In this paper we
delineate five potentially useful levels of relational granularity and propose the use of
aggregatable substance identifiers to help reduce lexical ambiguity. An aggregatable
substance identifier applies to a gene and its products. We merged 4 extensive lexicons and
compared the extracted strings to the text of five million MEDLINE abstracts. We report on
the ambiguity within and between name strings and common English words. Our results show
an 89% reduction in ambiguity for the extracted human substance name strings when using an
aggregatable substance approach.10aAccounting10aBIS1 aMarshall, Byron1 aSu, Hua1 aMcDonald, Dan1 aChen, Hsinchun uhttp://people.oregonstate.edu/~marshaby/Papers/marshall_PSB2005.pdf00504nas a2200181 4500008004100000245004500041210004400086260000900130300001200139490000700151653000800158653002300166100001400189700001300203700001300216700001300229856008000242 2005 eng d00aNewsMap: A Knowledge Map for Online News0 aNewsMap A Knowledge Map for Online News c2005 a583-5970 v3910aBIS10aBusiness Analytics1 aOng, T-H.1 aChen, H.1 aSung, WK1 aZhu, Bin u/biblio/newsmap-knowledge-map-online-news-000468nas a2200133 4500008004100000245006100041210006100102260002000163653000800183100001500191700001200206700001900218856009700237 2005 eng d00aOptimal search based gene selection for cancer prognosis0 aOptimal search based gene selection for cancer prognosis aOmaha, NEc200510aBIS1 aLi, Jiexun1 aSu, Hua1 aChen, Hsinchun u/biblio/optimal-search-based-gene-selection-cancer-prognosis00471nas a2200133 4500008004100000245006200041210006000103260002100163653000800184100002200192700001600214700001400230856009300244 2005 eng d00aPoster Session. Just a cute kid with a great imagination?0 aPoster Session Just a cute kid with a great imagination aDenver, COc200510aBIS1 aReitsma, Reindert1 aSullivan, J1 aCyr, M, N u/biblio/poster-session-just-cute-kid-great-imagination-000427nas a2200121 4500008004100000245004700041210004700088260004000135653000800175653002300183100001300206856008600219 2005 eng d00aResearch in Management Information Systems0 aResearch in Management Information Systems aNanchang, Jiangxi, P.R. Chinac200510aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/research-management-information-systems-000599nas a2200157 4500008004100000245011600041210006900157260000900226300001200235490000700247653000800254653002300262100001300285700001300298856013000311 2005 eng d00aUsing 3D Interfaces to Facilitate the Spatial Knowledge Retrieval: A Geo-referenced Knowledge Repository System0 aUsing 3D Interfaces to Facilitate the Spatial Knowledge Retrieva c2005 a167-1820 v4010aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/using-3d-interfaces-facilitate-spatial-knowledge-retrieval-geo-referenced-knowledge-001188nas a2200181 4500008004100000245005600041210005600097260000900153520064400162653001500806653000800821100002000829700002100849700001200870700001900882700001900901856008600920 2005 eng d00aVisualizing Aggregated Biological Pathway Relations0 aVisualizing Aggregated Biological Pathway Relations c20053 aThe Genescene development team has constructed an aggregation interface for automatically-extracted biomedical pathway
relations that is intended to help researchers identify and process relevant information from the vast digital library of abstracts found in the National Library of Medicine’s PubMed collection.
Users view extracted relations at various levels of relational granularity in an interactive and visual node-link interface. Anecdotal feedback reported here suggests that this multigranular visual paradigm aligns well with various research tasks,
helping users find relevant articles and discover new information.10aAccounting10aBIS1 aMarshall, Byron1 aQuiñones, Karin1 aSu, Hua1 aEggers, Shauna1 aChen, Hsinchun uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL_2005_Aggregation.pdf01636nas a2200181 4500008004100000245006700041210006400108260000900172300001100181490000700192520109700199653001501296653000801311100002401319700001501343700002001358856007601378 2004 eng d00aA Case-based Reasoning Framework for Workflow Model Management0 aCasebased Reasoning Framework for Workflow Model Management c2004 a87-1150 v503 aIn order to support efficient workflow design, recent commercial workflow systems are providing templates of common business processes. These templates, called cases, can be modified individually or collectively into a new workflow to meet the business specification. However, little research has been done on how to manage workflow models, including issues such as model storage, model retrieval, model reuse and assembly. In this paper, we propose a novel framework to support workflow modeling and design by adapting workflow cases from a repository of process models. Our approach to workflow model management is based on a structured workflow lifecycle and leverages recent advances in model management and case-based reasoning techniques. Our contributions include a conceptual model of workflow cases, a similarity flooding algorithm for workflow case retrieval, and a domain-independent AI planning approach to workflow case composition. We illustrate the workflow model management framework with a prototype system called Case-Oriented Design Assistant for Workflow Modeling (CODAW).10aAccounting10aBIS1 aMadhusudan, Therani1 aZhao, Leon1 aMarshall, Byron uhttp://people.oregonstate.edu/~marshaby/Papers/Madhusudan_DKE_CODAW.pdf02392nas a2200193 4500008004100000245007400041210006900115260000900184300001200193490000700205520180700212653001502019653000802034100002002042700001802062700001902080700001902099856008002118 2004 eng d00aEBizPort: Collecting and Analyzing Business Intelligence Information0 aEBizPort Collecting and Analyzing Business Intelligence Informat c2004 a873-8910 v553 aIn this article, Marshall, McDonald, Chen, and Chung take a different approach to supporting search services to large and heterogeneous document collections. They propose development of a domain-specific collection by crawling the content of a small set of highly reputable sites, maintaining a local index of the content, and providing browsing and searching services on the specialized content. This resource, known as a vertical portal, has the potential of overcoming several problems associated with bias, update delay, reputation, and integration of scattered information. The article discusses the design of a vertical portal system's architecture called EbizPort, rationale behind its major components, and algorithms and techniques for building collections and search functions. Collection (or more broadly content) has an obvious relationship to the nature of the search interface, as it can impact the type of search functions that can be offered. Powerful search interface functions were built for EbizPort by exploiting the underlying content representation and a relatively narrow and well-defined domain focus. Particularly noteworthy are the innovative browsing functions, which include a summarizer, a categorizer, a visualizer, and a navigation side-bar. The article ends with a discussion of an evaluation study, which compared the EbizPort system with a baseline system called Brint. Results are presented on effectiveness and efficiency, usability and information quality, and quality of local collection and content retrieved from other sources (an extended search operation called meta-search service was also provided in the system). Overall, the authors find that EbizPort outperforms the baseline system, and it provides a viable way to support access to business information.10aAccounting10aBIS1 aMarshall, Byron1 aMcDonald, Dan1 aChen, Hsinchun1 aChung, Wingyan uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_EBizPort.pdf00414nas a2200133 4500008004100000245003700041210003700078260000900115653001500124653000800139100002000147700002400167856008900191 2004 eng d00aElement Matching in Concept Maps0 aElement Matching in Concept Maps c200410aAccounting10aBIS1 aMarshall, Byron1 aMadhusudan, Therani uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2004_ElementMatching.pdf01663nas a2200193 4500008004100000245009100041210006900132260000900201300001100210490000700221520107000228653001501298653000801313100001801321700001901339700001201358700002001370856007901390 2004 eng d00aExtracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser0 aExtracting Gene Pathway Relations Using a Hybrid Grammar The Ari c2004 a3370-80 v203 aMotivation: Text-mining research in the biomedical domain has been motivated by the rapid growth of new research findings. Improving the accessibility of findings has potential to speed hypothesis generation.Results: We present the Arizona Relation Parser that differs from other parsers in its use of a broad coverage syntax-semantic hybrid grammar. While syntax grammars have generally been tested over more documents, semantic grammars have outperformed them in precision and recall. We combined access to syntax and semantic information from a single grammar. The parser was trained using 40 PubMed abstracts and then tested using 100 unseen abstracts, half for precision and half for recall. Expert evaluation showed that the parser extracted biologically relevant relations with 89% precision. Recall of expert identified relations with semantic filtering was 35 and 61% before semantic filtering. Such results approach the higher-performing semantic parsers. However, the AZ parser was tested over a greater variety of writing styles and semantic content. 10aAccounting10aBIS1 aMcDonald, Dan1 aChen, Hsinchun1 aSu, Hua1 aMarshall, Byron uhttp://people.oregonstate.edu/~marshaby/Papers/MCDONALD_BIOINFORMATICS.pdf01858nas a2200169 4500008004100000245008400041210006900125260000900194300001000203490000700213520128800220653000801508100002201516700001601538700001601554856011801570 2004 eng d00aSpatialization of Web Sites Using a Weighted Frequency Model of Navigation Data0 aSpatialization of Web Sites Using a Weighted Frequency Model of  c2004 a13-220 v553 aReitsma, Thabane, and MacLeod are interested in the display of document sets as visualized geometric spaces. Such spaces can use metrics and dimensions determined arbitrarily prior to analysis of data, or they may use secondary data (logged website transaction counts, perhaps) with techniques like factor analysis or MDS to find a structure. Using high transaction volume between an origin and a destination as an indicator of a small distance and a low volume as an indicator of a large distance, a transaction log can provide input to MDS. One problem is the possible origination of multiple sessions from the same address where one can not determine if consecutive requests are part of the same transaction and thus frequencies may be invalid. They suggest the use of the probability that a count is a transaction as a weight rather the count alone, with this probability depending upon the time separation between an origin and a destination with less time indicating a higher probability. A transaction log for a website for undergraduate engineering learning was analyzed in this manner and weighted transaction counts were compared to the use of straight count inputs to MDS using the Euclidean metric and four dimensions. Weighted results were not significantly different.10aBIS1 aReitsma, Reindert1 aThabane, L.1 aMacLeod, J. u/biblio/spatialization-web-sites-using-weighted-frequency-model-navigation-data-000454nas a2200157 4500008004100000245004000041210003900081260000900120653000800129100002200137700001200159700001500171700001700186700001500203856007800218 2004 eng d00aTeachengineering Resources for K-120 aTeachengineering Resources for K12 c200410aBIS1 aReitsma, Reindert1 aCyr, M.1 aMooney, M.1 aSullivan, J.1 aYbarra, G. u/biblio/teachengineering-resources-k-12-000465nas a2200133 4500008004100000245006000041210005600101260002600157653000800183653002300191100001300214700001300227856009100240 2003 eng d00aThe Design for an Effective Knowledge Repository System0 aDesign for an Effective Knowledge Repository System aMinneapolis, MNc200310aBIS10aBusiness Analytics1 aZhu, Bin1 aIyer, B. u/biblio/design-effective-knowledge-repository-system-001380nas a2200157 4500008004100000245009300041210006900134260000900203300001200212490000700224520082200231653000801053100001501061700002101076856012501097 2003 eng d00aAn Efficient Heuristic for Solving an Extended Capacitated Concentrator Location Problem0 aEfficient Heuristic for Solving an Extended Capacitated Concentr c2003 a171-1990 v233 aIn this paper, a mathematical model and a solution algorithm are developed for solving an extended capacitated concentrator location problem. Our model extends the conventional formulation by simultaneously addressing the two capacity constraints, total connection ports and maximum data processing rate, on each concentrator to be selected for satisfying the communication demands of the given end-user nodes. Since the problem is NP-complete, an efficient and effective Lagrangian heuristic is developed and tested by solving 100 randomly generated test problems with sizes ranging from 30(nodes)×30(concentrators) to150×30. Altogether 58% of the tested problems are solved optimally with an average solution gap 0.36% from the optimality and average solution times are from a few seconds to one half of a minute.10aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/efficient-heuristic-solving-extended-capacitated-concentrator-location-problem-000634nas a2200193 4500008004100000245007500041210006900116260000900185300001200194490000700206653000800213100001600221700002200237700002000259700001800279700001700297700001600314856011000330 2003 eng d00aExploiting Engineering as a Unique Distance Learning Tool 19, 379-3880 aExploiting Engineering as a Unique Distance Learning Tool 19 379 c2003 a379-3880 v1910aBIS1 aCarlson, L.1 aReitsma, Reindert1 aBrandemuehl, M.1 aHertzberg, J.1 aSullivan, J.1 aGabbard, S. u/biblio/exploiting-engineering-unique-distance-learning-tool-19-379-388-000518nas a2200145 4500008004100000245006200041210005900103260003200162653001500194653000800209653001800217100001700235700001900252856010100271 2003 eng d00aFinancial neural network applications: 2000 - 2002 update0 aFinancial neural network applications 2000 2002 update aHonolulu, Hawaii, USAc200310aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James u/biblio/financial-neural-network-applications-2000-2002-update-100666nas a2200229 4500008004100000245004700041210004600088260002700134653000800161100001700169700001900186700002100205700001400226700001400240700001400254700001500268700001500283700001700298700002100315700001400336856008600350 2003 eng d00aGenescene: Biomedical text and data mining0 aGenescene Biomedical text and data mining aHouston, TX, USAc200310aBIS1 aLeroy, Gondy1 aChen, Hsinchun1 aMartinez, Jessie1 aEggers, S1 aFalsey, R1 aKislin, K1 aHuang, Zan1 aLi, Jiexun1 aXu, Jennifer1 aMcDonald, Daniel1 aNg, Gavin u/biblio/genescene-biomedical-text-and-data-mining01263nas a2200157 4500008004100000245008800041210006900129260004600198300001200244490000600256520067800262653000800940100002100948700001500969856012100984 2003 eng d00aA GRASP Heuristic for Solving an Extended Capacitated Concentrator Location Problem0 aGRASP Heuristic for Solving an Extended Capacitated Concentrator aWorld Scientific Publishing Companyc2003 a597-6180 v23 aLocal Access Networks (LACNs) are often considered the "last mile" over the Internet provided that they are connected to some existing Wide Area Network backbone. In this paper, a revised LACN-WAN interconnection model is presented as an extension to the conventional Capacitated Concentrator Location Problem (CCLP). An efficient heuristic is also developed to seek near-optimal deployment of telecommunication devices (e.g. links, concentrators, etc.) while minimizing the total connection costs for the network interconnection. Our solution algorithm could serve as a decision-making tool in solving problems with a real world size (i.e. 120 nodes and 30 concentrators).10aBIS1 aHan, Bernard, T.1 aRaja, V.T. u/biblio/grasp-heuristic-solving-extended-capacitated-concentrator-location-problem-000599nas a2200181 4500008004100000245008000041210006900121260000900190300001200199490000700211653000800218653002300226100001300249700001600262700001300278700001300291856011300304 2003 eng d00aHelpfulMed: Intelligent Searching for Medical Information over the Internet0 aHelpfulMed Intelligent Searching for Medical Information over th c2003 a683-6940 v5410aBIS10aBusiness Analytics1 aChen, H.1 aLally, A.M.1 aZhu, Bin1 aChau, M. u/biblio/helpfulmed-intelligent-searching-medical-information-over-internet-001516nas a2200205 4500008004100000245006500041210006300106260000900169520090600178653001501084653000801099100002001107700001701127700001901144700001501163700001401178700001601192700002001208856008201228 2003 eng d00aKnowledge Management and E-Learning: the GetSmart Experience0 aKnowledge Management and ELearning the GetSmart Experience c20033 aThe National Science Digital Library (NSDL), launched in December 2002, is emerging as a center of innovation in digital libraries as applied to education. As a part of this extensive project, the GetSmart system was created to apply knowledge management techniques in a learning environment. The design of the system is based on an analysis of learning theory and theinformation search process. Its key notion is the integration of search tools and curriculum support with concept mapping. More than 100 students at the University of Arizona and Virginia Tech used the system in the fall of 2002. A database of more than one thousand student-prepared concept maps has been collected with more than forty thousand relationships expressed in semantic, graphical, node-link representations. Preliminary analysis of the collected data is revealing interesting knowledge representation patterns. 10aAccounting10aBIS1 aMarshall, Byron1 aZhang, Yiwen1 aChen, Hsinchun1 aLally, Ann1 aShen, Rao1 aFox, Edward1 aCassel, Lillian uhttp://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2003_GetSmart.pdf00459nas a2200109 4500008004100000245008000041210006900121260002400190653000800214100001500222856011200237 2002 eng d00aAn AI-based Heuristic for solving an Extended Concentrator Location Problem0 aAIbased Heuristic for solving an Extended Concentrator Location  aCorvallis, ORc200210aBIS1 aRaja, V.T. u/biblio/ai-based-heuristic-solving-extended-concentrator-location-problem-000543nas a2200145 4500008004100000245008100041210006900122260002400191653000800215100001800223700001500241700001400256700001600270856011100286 2002 eng d00aDiscovering association rules with degrees of support and implication (ARsi)0 aDiscovering association rules with degrees of support and implic aGent, Belgiumc200210aBIS1 aChen, Guoqing1 aLi, Jiexun1 aYan, Peng1 aKerre, E, E u/biblio/discovering-association-rules-degrees-support-and-implication-arsi00560nas a2200133 4500008004100000245009900041210006900140260003100209653000800240100001200248700001800260700001500278856013300293 2002 eng d00aInfluence and conditional influence -- New interestingness measures in association rule mining0 aInfluence and conditional influence New interestingness measures aMelbourne, Australiac200210aBIS1 aLiu, De1 aChen, Guoqing1 aLi, Jiexun u/biblio/influence-and-conditional-influence-new-interestingness-measures-association-rule-mining00533nas a2200145 4500008004100000245008000041210006900121260000900190300001200199490000700211653000800218100002000226700002200246856011900268 2002 eng d00aLoglinear and Multidimensional Scaling Models of Digital Library Navigation0 aLoglinear and Multidimensional Scaling Models of Digital Library c2002 a101-1190 v5710aBIS1 aButtenfield, B.1 aReitsma, Reindert u/biblio/loglinear-and-multidimensional-scaling-models-digital-library-navigation-000562nas a2200145 4500008004100000245009900041210006900140260000900209300001000218490000900228653000800237100002200245700001900267856013000286 2002 eng d00aMaking Sense of Strategic Alignment: An Interpretive View of Alignment Problems and Practices0 aMaking Sense of Strategic Alignment An Interpretive View of Alig c2002 a15-320 vXIII10aBIS1 aFiegener, Mark, K1 aCoakley, James u/biblio/making-sense-strategic-alignment-interpretive-view-alignment-problems-and-practices-000542nas a2200157 4500008004100000245006700041210006400108260002300172653000800195653002300203100001300226700001400239700001300253700001300266856010500279 2002 eng d00aMedTextus: an intelligent web-based medical meta-search system0 aMedTextus an intelligent webbased medical metasearch system aPortland, ORc200210aBIS10aBusiness Analytics1 aZhu, Bin1 aLeory, G.1 aChen, H.1 aChen, Y. u/biblio/medtextus-intelligent-web-based-medical-meta-search-system-000420nas a2200121 4500008004100000245005000041210004700091260003100138653000800169100001500177700001800192856008800210 2002 eng d00aA SAR-based interesting rule mining algorithm0 aSARbased interesting rule mining algorithm aNew Orleans, LA, USAc200210aBIS1 aLi, Jiexun1 aChen, Guoqing u/biblio/sar-based-interesting-rule-mining-algorithm00560nas a2200133 4500008004100000245009900041210006900140260002600209653000800235653002300243100001300266700001300279856013400292 2002 eng d00aVisualizing a computer mediated communication (CMC) process to facilitate knowledge management0 aVisualizing a computer mediated communication CMC process to fac aMinneapolis, MNc200210aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/visualizing-computer-mediated-communication-cmc-process-facilitate-knowledge-management-000425nas a2200121 4500008004100000245005600041210005500097260000900152653000800161653002300169100001300192856009800205 2002 eng d00aVisualizing Computer-Mediated Communication Process0 aVisualizing ComputerMediated Communication Process c200210aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/visualizing-computer-mediated-communication-process-300425nas a2200121 4500008004100000245005600041210005500097260000900152653000800161653002300169100001300192856009800205 2002 eng d00aVisualizing Computer-Mediated Communication Process0 aVisualizing ComputerMediated Communication Process c200210aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/visualizing-computer-mediated-communication-process-400506nas a2200121 4500008004100000245009500041210006900136260000900205653000800214100001900222700001800241856012500259 2001 eng d00aCan E-Cheating be Prevented?: An Approach to Detect Plagiarism in Computer Skills Courses0 aCan ECheating be Prevented An Approach to Detect Plagiarism in C c200110aBIS1 aCoakley, James1 aTyran, C., K. u/biblio/can-e-cheating-be-prevented-approach-detect-plagiarism-computer-skills-courses-000534nas a2200169 4500008004100000245006000041210005800101260000900159300001200168490000600180653001500186653000800201653001800209100001700227700001900244856010100263 2001 eng d00aFinancial neural Network applications: 1998-1999 update0 aFinancial neural Network applications 19981999 update c2001 a167-1820 v710aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James u/biblio/financial-neural-network-applications-1998-1999-update-000440nas a2200121 4500008004100000245005700041210005500098260003300153653000800186100001900194700001800213856008700231 2001 eng d00aA Framework for Controlling Cheating in IS Education0 aFramework for Controlling Cheating in IS Education aNew Orleans, Louisianac200110aBIS1 aCoakley, James1 aTyran, C., K. u/biblio/framework-controlling-cheating-education-000562nas a2200133 4500008004100000245009900041210006900140260003100209653000800240100001500248700001800263700001200281856013500293 2001 eng d00aInfluence and conditional influence -- New interestingness measures in association rule mining0 aInfluence and conditional influence New interestingness measures aMelbourne, Australiac200110aBIS1 aLi, Jiexun1 aChen, Guoqing1 aLiu, De u/biblio/influence-and-conditional-influence-new-interestingness-measures-association-rule-mining-000370nas a2200109 4500008004100000245004600041210004400087260002400131653000800155100001500163856008200178 2001 eng d00aA Lagrangian Heuristic for Network Design0 aLagrangian Heuristic for Network Design aCorvallis, ORc200110aBIS1 aRaja, V.T. u/biblio/lagrangian-heuristic-network-design-000539nas a2200133 4500008004100000245009700041210006900138260000900207653000800216653002300224100001300247700001300260856013200273 2001 eng d00aSocial Visualization for Computer-Mediated Communication: A Knowledge Management Perspective0 aSocial Visualization for ComputerMediated Communication A Knowle c200110aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/social-visualization-computer-mediated-communication-knowledge-management-perspective-000479nas a2200133 4500008004100000245005600041210005500097260002300152653000800175653003200183100001900215700001700234856009400251 2001 eng d00aUsing IT to add value: Innovation versus Efficiency0 aUsing IT to add value Innovation versus Efficiency aPortland, ORc200110aBIS10aStrategy & Entrepreneurship1 aCoakley, James1 aGobeli, Dave u/biblio/using-it-add-value-innovation-versus-efficiency-000442nas a2200121 4500008004100000245005600041210005500097260002600152653000800178653002300186100001300209856009800222 2001 eng d00aVisualizing Computer-Mediated Communication Process0 aVisualizing ComputerMediated Communication Process aBloomington, INc200110aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/visualizing-computer-mediated-communication-process-500440nas a2200121 4500008004100000245005600041210005500097260002400152653000800176653002300184100001300207856009800220 2001 eng d00aVisualizing Computer-Mediated Communication Process0 aVisualizing ComputerMediated Communication Process aRochester, NYc200110aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/visualizing-computer-mediated-communication-process-600447nas a2200121 4500008004100000245005600041210005500097260003100152653000800183653002300191100001300214856009800227 2001 eng d00aVisualizing Computer-Mediated Communication Process0 aVisualizing ComputerMediated Communication Process aColorado Springs, COc200110aBIS10aBusiness Analytics1 aZhu, Bin u/biblio/visualizing-computer-mediated-communication-process-701396nas a2200181 4500008004100000245007400041210006900115260000900184300001200193490000600205520081400211653001501025653000801040653001801048100001901066700001701085856011201102 2000 eng d00aArtificial Neural Networks in Accounting and Finance: Modeling Issues0 aArtificial Neural Networks in Accounting and Finance Modeling Is c2000 a119-1440 v93 aThis article reviews the literature on artificial neural networks (ANNs) applied to accounting and finance problems and summarizes the 'suggestions' from this literature. The first section reviews the basic foundation of ANNs to provide a common basis for further elaboration and suggests criteria that should be used to determine whether the use of an ANN is appropriate. The second section of the paper discusses development of ANN models including: selection of the learning algorithm, choice of the error and transfer functions, specification of the architecture, preparation of the data to match the architecture, and training of the network The final section presents some general guidelines and a brief summary of research progress and open research questions. Copyright © 2000 John Wiley & Sons, Ltd.10aAccounting10aBIS10aDean's Office1 aCoakley, James1 aBrown, Carol u/biblio/artificial-neural-networks-accounting-and-finance-modeling-issues-000371nas a2200121 4500008004100000245003700041210003700078260002100115653000800136653000800144100002000152856007700172 2000 eng d00aBusiness Application Development0 aBusiness Application Development aAlbany, ORc200010aBIS10aMIS1 aSwanson, Parker u/biblio/business-application-development00565nas a2200169 4500008004100000245007300041210006900114260000900183300001200192490000600204653000800210653002300218100001300241700001500254700001300269856011300282 2000 eng d00aCreating a Large-Scale Content-Based Air Photo Image Digital Library0 aCreating a LargeScale ContentBased Air Photo Image Digital Libra c2000 a163-1670 v910aBIS10aBusiness Analytics1 aZhu, Bin1 aRamsey, M.1 aChen, H. u/biblio/creating-large-scale-content-based-air-photo-image-digital-library-000529nas a2200145 4500008004100000245008600041210006900127260000900196300001000205490000600215653000800221100002100229700001900250856011400269 2000 eng d00aThe E-Commerce Course Project: Creating Educational Linkages with the Value Chain0 aECommerce Course Project Creating Educational Linkages with the  c2000 a59-700 v210aBIS1 aTyran, Craig, K.1 aCoakley, James u/biblio/e-commerce-course-project-creating-educational-linkages-value-chain-000494nas a2200145 4500008004100000245005300041210005100094260003200145653001500177653000800192653001800200100001700218700001900235856009400254 2000 eng d00aFinancial Neural Network Applications: 1998-19990 aFinancial Neural Network Applications 19981999 aPhiladelphia, PA, USAc200010aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James u/biblio/financial-neural-network-applications-1998-1999-100432nas a2200121 4500008004100000245006900041210006600110260000900176653000800185653000800193100001900201856009000220 2000 eng d00aInventing the 'Treebook': A Workbook with Pages Linked in a Tree0 aInventing the Treebook A Workbook with Pages Linked in a Tree c200010aBIS10aMIS1 aSullivan, Dave u/biblio/inventing-treebook-workbook-pages-linked-tree00459nas a2200181 4500008004100000245002400041210002200065260000900087300001000096490000700106653000800113100001700121700001600138700001700154700002000171700002200191856006400213 2000 eng d00aA Living Laboratory0 aLiving Laboratory c2000 a31-400 v8810aBIS1 aLightner, M.1 aCarlson, D.1 aSullivan, J.1 aBrandemuehl, M.1 aReitsma, Reindert u/biblio/living-laboratory-000474nas a2200121 4500008004100000245007400041210006900115260002400184653000800208653000800216100001600224856011200240 2000 eng d00aPersonal Action and Ethical Behavior: Responsibilities and Practices.0 aPersonal Action and Ethical Behavior Responsibilities and Practi aCorvallis, ORc200010aBIS10aMIS1 aTanner, Ray u/biblio/personal-action-and-ethical-behavior-responsibilities-and-practices00523nas a2200121 4500008004100000245010200041210006900143260002700212653000800239653000800247100001600255856013000271 2000 eng d00aPresentation:Freshmen students in the College of Business: Coursework and Outcome-based Education0 aPresentationFreshmen students in the College of Business Coursew aPortland, c200010aBIS10aMIS1 aTanner, Ray u/biblio/presentationfreshmen-students-college-business-coursework-and-outcome-based-education00265nas a2200109 4500008004100000245001300041210001300054260000900067653000800076100001500084856005600099 2000 eng d00aUntitled0 aUntitled c200010aBIS1 aRaja, V.T. u/biblio/untitled-3400480nas a2200121 4500008004100000245007100041210006900112260002700181653000800208100001500216700002100231856010600252 2000 eng d00aUsing GRASP to solve the Capacitated Concentrator Location Problem0 aUsing GRASP to solve the Capacitated Concentrator Location Probl aOrlando, Floridac200010aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/using-grasp-solve-capacitated-concentrator-location-problem-100483nas a2200157 4500008004100000245005300041210005300094260000900147300001200156490000700168653000800175653002300183100001300206700001300219856009300232 2000 eng d00aValidating a Geographical Image Retrieval System0 aValidating a Geographical Image Retrieval System c2000 a625-6340 v5110aBIS10aBusiness Analytics1 aZhu, Bin1 aChen, H. u/biblio/validating-geographical-image-retrieval-system-000637nas a2200181 4500008004100000245009600041210006900137260000900206300001200215490000600227653000800233100001500241700002200256700001400278700001700292700001400309856013200323 1999 eng d00aAccessibility of Computer-based Simulation Models in Inherently Conflict-Laden Negotiations0 aAccessibility of Computerbased Simulation Models in Inherently C c1999 a511-5330 v810aBIS1 aZigurs, I.1 aReitsma, Reindert1 aLewis, C.1 aHubscher, R.1 aHayes, C. u/biblio/accessibility-computer-based-simulation-models-inherently-conflict-laden-negotiations-000586nas a2200169 4500008004100000245008800041210006900129260000900198300001200207490000700219653000800226653002300234100001500257700001300272700001300285856011800298 1999 eng d00aA Collection of Visual Thesauri for Browsing Large Collections of Geographic Images0 aCollection of Visual Thesauri for Browsing Large Collections of  c1999 a826-8350 v5010aBIS10aBusiness Analytics1 aRamsey, M.1 aChen, H.1 aZhu, Bin u/biblio/collection-visual-thesauri-browsing-large-collections-geographic-images-000502nas a2200121 4500008004100000245007800041210006900119260003700188653000800225100001500233700002100248856011100269 1999 eng d00aA Comparison of Two Modern Heuristics for Designing Local Access Networks0 aComparison of Two Modern Heuristics for Designing Local Access N aPhiladelphia, Pennsylvaniac199910aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/comparison-two-modern-heuristics-designing-local-access-networks-000600nas a2200181 4500008004100000245007400041210006900115260000900184653000800193653002300201100001300224700001400237700001300251700001600264700001300280700001500293856011000308 1999 eng d00aCreating a Large Scale Digital Library for Geo-Referenced Information0 aCreating a Large Scale Digital Library for GeoReferenced Informa c199910aBIS10aBusiness Analytics1 aZhu, Bin1 aRamsey, M1 aChen, H.1 aHauck, R.V.1 aNg, T.D.1 aSchatz, B. u/biblio/creating-large-scale-digital-library-geo-referenced-information-100591nas a2200145 4500008004100000245009400041210006900135260002900204653001500233653000800248653001800256100001700274700001900291856013500310 1999 eng d00aFinancial Neural Network Applications: Brief Literature Review and Extensive Bibliography0 aFinancial Neural Network Applications Brief Literature Review an aSan Diego, CA, USAc199910aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James u/biblio/financial-neural-network-applications-brief-literature-review-and-extensive-bibliography-100427nas a2200121 4500008004100000245005800041210005400099260002200153653000800175100001500183700002100198856008600219 1999 eng d00aThe State of the Art of Network Design and Management0 aState of the Art of Network Design and Management aNew Orleansc199910aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/state-art-network-design-and-management-100640nas a2200181 4500008004100000245009200041210006900133260000900202653000800211653002300219100001300242700001500255700001300270700001600283700001300299700001500312856013100327 1999 eng d00aSupport Concept-Based Multimedia Information Retrieval: A Knowledge Management Approach0 aSupport ConceptBased Multimedia Information Retrieval A Knowledg c199910aBIS10aBusiness Analytics1 aZhu, Bin1 aRamsey, M.1 aChen, H.1 aHauck, R.V.1 aNg, T.D.1 aSchatz, B. u/biblio/support-concept-based-multimedia-information-retrieval-knowledge-management-approach-000485nas a2200121 4500008004100000245008300041210006900124260000900193653000800202100001900210700001800229856011600247 1999 eng d00aThe WWW and Computer Skills Training: Key Issues for Design and Implementation0 aWWW and Computer Skills Training Key Issues for Design and Imple c199910aBIS1 aCoakley, James1 aTyran, C., K. u/biblio/www-and-computer-skills-training-key-issues-design-and-implementation-000495nas a2200121 4500008004100000245008200041210006900123260002200192653000800214100001500222700002100237856011500258 1998 eng d00aAn AI-based Heuristic for solving a Generalized Concentrator Location Problem0 aAIbased Heuristic for solving a Generalized Concentrator Locatio aSeattle, WAc199810aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/ai-based-heuristic-solving-generalized-concentrator-location-problem-000561nas a2200193 4500008004100000245005200041210005100093260000900144300001200153490000700165653001500172653000800187653001800195653000800213100001900221700001900240700001700259856009100276 1998 eng d00aComputer-Mediated Peer Review of Student Papers0 aComputerMediated Peer Review of Student Papers c1998 a117-1210 v7410aAccounting10aBIS10aDean's Office10aMIS1 aSullivan, Dave1 aNielson, Norma1 aBrown, Carol u/biblio/computer-mediated-peer-review-student-papers-000497nas a2200121 4500008004100000245008300041210006900124260002200193653000800215100001500223700002100238856011600259 1998 eng d00aAn Efficient Heuristic for Solving a Generalized Concentrator Location Problem0 aEfficient Heuristic for Solving a Generalized Concentrator Locat aSeattle, WAc199810aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/efficient-heuristic-solving-generalized-concentrator-location-problem-000490nas a2200121 4500008004100000245007400041210006900115260003000184653000800214100001500222700002100237856011000258 1998 eng d00aA Neural-Net Gaussian Machine for Optimal Local Access Network Design0 aNeuralNet Gaussian Machine for Optimal Local Access Network Desi aBaltimore, Marylandc199810aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/neural-net-gaussian-machine-optimal-local-access-network-design-100416nas a2200121 4500008004100000245004900041210004900090260002800139653000800167100001500175700001600190856008800206 1998 eng d00aStudent Perceptions of Electronic Classrooms0 aStudent Perceptions of Electronic Classrooms aChicago, Illinoisc199810aBIS1 aRaja, V.T.1 aKumar, Anil u/biblio/student-perceptions-electronic-classrooms-000265nas a2200109 4500008004100000245001300041210001300054260000900067653000800076100001500084856005600099 1998 eng d00aUntitled0 aUntitled c199810aBIS1 aRaja, V.T. u/biblio/untitled-3500569nas a2200169 4500008004100000245007200041210006800113260000900181300001200190490000700202653000800209100001900217700002100236700002100257700002000278856010100298 1998 eng d00aUsing a Computer Based Version of The Beer Game - Lessons Learned,"0 aUsing a Computer Based Version of The Beer Game Lessons Learned c1998 a416-4240 v2210aBIS1 aCoakley, James1 aDrexler, John, A1 aKircher, Anna, E1 aLarson, Erik, W u/biblio/using-computer-based-version-beer-game-lessons-learned-000461nas a2200145 4500008004100000245005200041210005100093260000900144653000800153653001500161100001700176700001900193700001800212856008500230 1998 eng d00aUsing a Computer-Based Version of the Beer Game0 aUsing a ComputerBased Version of the Beer Game c199810aBIS10aManagement1 aLarson, Erik1 aCoakley, James1 aDrexler, John u/biblio/using-computer-based-version-beer-game-000503nas a2200121 4500008004100000245009100041210006900132260002700201653000800228100001500236700001600251856011400267 1997 eng d00aIntegration of India into the Global Economy ” An Information Technology Perspective0 aIntegration of India into the Global Economy An Information Tech aDekalb, Illinoisc199710aBIS1 aRaja, V.T.1 aKumar, Anil u/biblio/integration-india-global-economy-information-technology-perspective-000508nas a2200145 4500008004100000245007200041210006900113260000900182300000900191490000600200653000800206100002200214700001500236856011100251 1997 eng d00aObject-oriented Simulation and Evaluation of River Basin Operations0 aObjectoriented Simulation and Evaluation of River Basin Operatio c1997 a9-240 v110aBIS1 aReitsma, Reindert1 aCarron, J. u/biblio/object-oriented-simulation-and-evaluation-river-basin-operations-000606nas a2200145 4500008004100000245014600041210006900187260000900256300001000265490000600275653000800281100002200289700002100311856012800332 1997 eng d00aObject-oriented Simulation and Evaluation of River Basin Operations. Journal of Geographic Information and Decision Analysis. 1, 1, pp. 10-240 aObjectoriented Simulation and Evaluation of River Basin Operatio c1997 a1--240 v110aBIS1 aReitsma, Reindert1 aCarron, John, C. u/biblio/object-oriented-simulation-and-evaluation-river-basin-operations-journal-geographic00448nas a2200121 4500008004100000245006200041210006200103260001700165653000800182100001500190700002100205856010000226 1997 eng d00aSome Design and Planning Issues for Local Access Networks0 aSome Design and Planning Issues for Local Access Networks aTaiwanc199710aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/some-design-and-planning-issues-local-access-networks-000557nas a2200193 4500008004100000245005100041210005100092260000900143300001200152490000700164653001500171653000800186653001800194653000800212100001700220700001900237700001900256856008800275 1996 eng d00aEnhancing Business Classes with World Wide Web0 aEnhancing Business Classes with World Wide Web c1996 a317-3230 v7110aAccounting10aBIS10aDean's Office10aMIS1 aBrown, Carol1 aNielson, Norma1 aSullivan, Dave u/biblio/enhancing-business-classes-world-wide-web-000487nas a2200121 4500008004100000245008800041210006900129260000900198300001000207653000800217100001900225856012100244 1996 eng d00aAn Expert System to Diagnose Anemia and Report Results Directly on Hematology Forms0 aExpert System to Diagnose Anemia and Report Results Directly on  c1996 a16-2610aBIS1 aCoakley, James u/biblio/expert-system-diagnose-anemia-and-report-results-directly-hematology-forms-000494nas a2200133 4500008004100000245007600041210006900117260000900186300001200195490000800207653000800215100002200223856011500245 1996 eng d00aStructure and Support of Water Resources Management and Decision Making0 aStructure and Support of Water Resources Management and Decision c1996 a253-2680 v17710aBIS1 aReitsma, Reindert u/biblio/structure-and-support-water-resources-management-and-decision-making-000501nas a2200121 4500008004100000245009100041210006900132260000900201300001200210653000800222100001900230856013000249 1996 eng d00aUsing Pattern Analysis Methods to Supplement Attention-Directing Analytical Procedures0 aUsing Pattern Analysis Methods to Supplement AttentionDirecting  c1996 a513-52810aBIS1 aCoakley, James u/biblio/using-pattern-analysis-methods-supplement-attention-directing-analytical-procedures-000413nas a2200121 4500008004100000245005600041210005300097260000900150300001000159653000800169100001900177856009500196 1995 eng d00aCIO 'Impression Management:' Problems and Practices0 aCIO Impression Management Problems and Practices c1995 a56-6110aBIS1 aCoakley, James u/biblio/cio-impression-management-problems-and-practices-000307nas a2200109 4500008004100000245002000041210002000061260002800081653000800109100001800117856006200135 1995 eng d00aISO9001 and IPP0 aISO9001 and IPP aSan Francisco, CAc199510aBIS1 aCabak, Carrie u/biblio/iso9001-and-ipp-000476nas a2200109 4500008004100000245008900041210006900130260002600199653000800225100001500233856011800248 1995 eng d00aA Lagrangean Heuristic for the Design of Capacitated Star-Star Concentrator Networks0 aLagrangean Heuristic for the Design of Capacitated StarStar Conc aLos Angeles, CAc199510aBIS1 aRaja, V.T. u/biblio/lagrangean-heuristic-design-capacitated-star-star-concentrator-networks-000580nas a2200181 4500008004100000245006100041210006100102260000900163300001700172490001000189653001500199653000800214653001800222100001700240700001900257700002600276856009600302 1995 eng d00aNeural Networks Enter the World of Management Accounting0 aNeural Networks Enter the World of Management Accounting c1995 a51-53, 56-570 vLXXVI10aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James1 aPhillips, Mary, Ellen u/biblio/neural-networks-enter-world-management-accounting-000503nas a2200181 4500008004100000245003600041210003500077260000900112300001000121490001000131653001500141653000800156653001800164100001700182700001900199700002600218856007700244 1995 eng d00aNeural Networks: Nuts and Bolts0 aNeural Networks Nuts and Bolts c1995 a54-550 vLXXVI10aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James1 aPhillips, Mary, Ellen u/biblio/neural-networks-nuts-and-bolts-000472nas a2200121 4500008004100000245006600041210006600107260002500173653000800198100001500206700002100221856010800242 1995 eng d00aOptimal Telecommunication Facility Planning Under Uncertainty0 aOptimal Telecommunication Facility Planning Under Uncertainty aPittsburgh, PAc199510aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/optimal-telecommunication-facility-planning-under-uncertainty-100598nas a2200133 4500008004100000245013200041210006900173260003000242653000800272100001500280700002100295700002000316856012800336 1995 eng d00aA Robustness Approach to the Telecommunication Facility Management Problem in the Presence of Demand Uncertainty from End-Users0 aRobustness Approach to the Telecommunication Facility Management aBoca Raton, Floridac199510aBIS1 aRaja, V.T.1 aHan, Bernard, T.1 aChen, Bin, Tong u/biblio/robustness-approach-telecommunication-facility-management-problem-presence-demand-000675nas a2200181 4500008004100000245011900041210006900160260000900229300001200238490000600250653001500256653000800271653001800279100001700297700001900314700002200333856013800355 1994 eng d00aConference Report: The Fourth International Symposium on Intelligent Systems in Accounting, Finance and Management0 aConference Report The Fourth International Symposium on Intellig c1994 a223-2350 v310aAccounting10aBIS10aDean's Office1 aBrown, Carol1 aCoakley, James1 aEining, Martha, M u/biblio/conference-report-fourth-international-symposium-intelligent-systems-accounting-finance-and-000520nas a2200157 4500008004100000245006600041210006500107260000900172300001200181490000600193653000800199100002200207700001600229700001600245856010100261 1994 eng d00aConstruction Kit for Visual Programming of River-Basin Models0 aConstruction Kit for Visual Programming of RiverBasin Models c1994 a378-3840 v810aBIS1 aReitsma, Reindert1 aSautins, A.1 aWehrend, S. u/biblio/construction-kit-visual-programming-river-basin-models-000514nas a2200121 4500008004100000245009000041210006900131260002700200653000800227100001500235700002100250856012100271 1994 eng d00aAn Intelligent Solver for the Generalized Telecommunication Facility Location Problem0 aIntelligent Solver for the Generalized Telecommunication Facilit aHonolulu, Hawaiic199410aBIS1 aRaja, V.T.1 aHan, Bernard, T. u/biblio/intelligent-solver-generalized-telecommunication-facility-location-problem-100594nas a2200169 4500008004100000245009000041210006900131260000900200300001000209490000600219653001500225653000800240653001800248100001900266700001700285856012200302 1993 eng d00aArtificial Neural Networks Applied to Ratio Analysis in the Analytical Review Process0 aArtificial Neural Networks Applied to Ratio Analysis in the Anal c1993 a19-390 v210aAccounting10aBIS10aDean's Office1 aCoakley, James1 aBrown, Carol u/biblio/artificial-neural-networks-applied-ratio-analysis-analytical-review-process-100344nas a2200109 4500008004100000245003500041210003500076260002400111653000800135100001800143856007300161 1993 eng d00aISO9001 and the Paper Industry0 aISO9001 and the Paper Industry aSan Diego, CAc199310aBIS1 aCabak, Carrie u/biblio/iso9001-and-paper-industry-000341nas a2200109 4500008004100000245003300041210003300074260002300107653000800130100001800138856007500156 1993 eng d00aISO9001 Registration Process0 aISO9001 Registration Process aSan Jose, CAc199310aBIS1 aCabak, Carrie u/biblio/iso9001-registration-process-000461nas a2200133 4500008004100000245006900041210006600110260000900176300001000185490000600195653000800201100001900209856009900228 1991 eng d00aA Compari­son of User Satisfaction with MIS Across Two Cultures0 aCompari son of User Satisfaction with MIS Across Two Cultures c1991 a22-290 v210aBIS1 aCoakley, James u/biblio/comparison-user-satisfaction-mis-across-two-cultures-000547nas a2200145 4500008004100000245009300041210006900134260000900203300001000212490000600222653000800228100002200236700001700258856012600275 1990 eng d00aWODAN: een Venster op Beleidsinformatie (WODAN: a Window on Decision-making Information)0 aWODAN een Venster op Beleidsinformatie WODAN a Window on Decisio c1990 a15-240 v510aBIS1 aReitsma, Reindert1 aHendriks, P. u/biblio/wodan-een-venster-op-beleidsinformatie-wodan-window-decision-making-information-000513nas a2200145 4500008004100000245007600041210006900117260000900186300001200195490000700207653000800214100002200222700001900244856010400263 1988 eng d00aA Causal Typology of Migration: The Role of Commuting. Regional Studies0 aCausal Typology of Migration The Role of Commuting Regional Stud c1988 a331-3400 v2210aBIS1 aReitsma, Reindert1 aVergoossen, A. u/biblio/causal-typology-migration-role-commuting-regional-studies-000634nas a2200133 4500008004100000245020600041210006900247260000900316300000800325490000600333653000800339100002200347856013100369 1986 eng d00aArtificiele Intelligentie in Geografisch Onderzoek: Cognitie, `Engineering' en Geografische Modellen (Artificial Intelligence in Geographical Research: Cognition, `Engineering' and Geographical Models)0 aArtificiele Intelligentie in Geografisch Onderzoek Cognitie Engi c1986 a4-70 v110aBIS1 aReitsma, Reindert u/biblio/artificiele-intelligentie-geografisch-onderzoek-cognitie-engineering-en-geografische-000462nas a2200121 4500008004100000245007800041210006900119260000900188490000600197653000800203100001900211856011000230 1985 eng d00aThe Expectations of Accounting Errors in Medium-Sized Manufacturing Firms0 aExpectations of Accounting Errors in MediumSized Manufacturing F c19850 v210aBIS1 aCoakley, James u/biblio/expectations-accounting-errors-medium-sized-manufacturing-firms-000570nas a2200145 4500008004100000245011200041210006900153260000900222300001100231490000700242653000800249653002300257100001700280856012700297 1983 eng d00aBayesian Estimation of a Finite Population Total using Auxiliary Information in the Presence of Nonresponse0 aBayesian Estimation of a Finite Population Total using Auxiliary c1983 a97-1020 v7710aBIS10aBusiness Analytics1 aSmouse, Evan u/biblio/bayesian-estimation-finite-population-total-using-auxiliary-information-presence-000441nas a2200145 4500008004100000245004600041210004600087260000900133300001200142490000800154653000800162653002300170100001700193856008500210 1983 eng d00aEstimating proportionate changes in rates0 aEstimating proportionate changes in rates c1983 a235-2430 v11710aBIS10aBusiness Analytics1 aSmouse, Evan u/biblio/estimating-proportionate-changes-rates-000510nas a2200145 4500008004100000245006900041210006900110260000900179300001400188490000700202653000800209653002300217100001700240856010700257 1983 eng d00aNonparametric Bayesian Inference for Dichotomous Response Models0 aNonparametric Bayesian Inference for Dichotomous Response Models c1983 a2847-28590 v1210aBIS10aBusiness Analytics1 aSmouse, Evan u/biblio/nonparametric-bayesian-inference-dichotomous-response-models-000422nas a2200145 4500008004100000245004000041210004000081260000900121300000800130490000800138653000800146653002300154100001700177856008200194 1983 eng d00aStatistical Concepts and Proper Use0 aStatistical Concepts and Proper Use c1983 a5030 v13710aBIS10aBusiness Analytics1 aSmouse, Evan u/biblio/statistical-concepts-and-proper-use-000578nas a2200133 4500008004000000245011900040210006900159260001800228653000800246100002200254700001600276700001400292856013800306 0 engd00aAssessing the Connections Among Top Management Support, IT Assimilation, and Business Value of IT: A Meta-Analysis0 aAssessing the Connections Among Top Management Support IT Assimi c2023 In Press10aBIS1 aRoberts, Nicholas1 aJeyaraj, A.1 aGerow, J. u/biblio/assessing-connections-among-top-management-support-it-assimilation-and-business-value-it-meta