Last update:
Tue Dec 17 10:46:32 MST 2024
Hsinchun Chen Editorial: Welcome to the first issue of ACM TMIS . . . . . . . . . . . . . . . . 1:1--1:?? Gordon B. Davis and Paul Gray and Stuart Madnick and Jay F. Nunamaker and Ralph Sprague and Andrew Whinston Ideas for the future of the IS field . . 2:1--2:?? Jingguo Wang and Nan Xiao and H. Raghav Rao Drivers of information security search behavior: an investigation of network attacks and vulnerability disclosures 3:1--3:?? Sulin Ba and Dan Ke and Jan Stallaert and Zhongju Zhang Why give away something for nothing? Investigating virtual goods pricing and permission strategies . . . . . . . . . 4:1--4:?? Lan Cao and Balasubramaniam Ramesh and Tarek Abdel-Hamid Modeling dynamics in agile software development . . . . . . . . . . . . . . 5:1--5:?? Ofer Arazy and Arie Croitoru The sustainability of corporate wikis: a time-series analysis of activity patterns . . . . . . . . . . . . . . . . 6:1--6:?? Yu Fu and Zhiyuan Chen and Gunes Koru and Aryya Gangopadhyay A privacy protection technique for publishing data mining models and research data . . . . . . . . . . . . . 7:1--7:??
Hsinchun Chen Editorial: Design science, grand challenges, and societal impacts . . . . 1:1--1:?? Michael Chau Visualizing Web search results using glyphs: Design and evaluation of a flower metaphor . . . . . . . . . . . . 2:1--2:?? Feng-Yang Kuo and Chun-Po Yin A linguistic analysis of group support systems interactions for uncovering social realities of organizations . . . 3:1--3:?? Gerald C. Kane A multimethod study of information quality in wiki collaboration . . . . . 4:1--4:?? Gregory S. Dawson and Richard T. Watson Uncovering and testing archetypes of effective public sector CIOs . . . . . . 5:1--5:?? Debabrata Dey and Ming Fan and Gang Peng Computer use and wage returns: The complementary roles of IT-related human capital and nonroutine tasks . . . . . . 6:1--6:??
Paul Jen-Hwa Hu and Hsinchun Chen Analyzing information systems researchers' productivity and impacts: a perspective on the $H$ index . . . . . . 7:1--7:?? Sudip Bhattacharjee and Ram D. Gopal and James R. Marsden and Ramesh Sankaranarayanan Digital goods and markets: Emerging issues and challenges . . . . . . . . . 8:1--8:?? Matthias W. Uhl Explaining U.S. consumer behavior with news sentiment . . . . . . . . . . . . . 9:1--9:?? Anna Ye Du and Sanjukta Das and Ram D. Gopal and R. Ramesh Risk hedging in storage grid markets: Do options add value to forwards? . . . . . 10:1--10:?? Jun Liu and Sudha Ram Who does what: Collaboration patterns in the Wikipedia and their impact on article quality . . . . . . . . . . . . 11:1--11:?? D. Harrison Mcknight and Michelle Carter and Jason Bennett Thatcher and Paul F. Clay Trust in a specific technology: an investigation of its components and measures . . . . . . . . . . . . . . . . 12:1--12:??
Alexander Tuzhilin Knowledge management revisited: Old Dogs, New tricks . . . . . . . . . . . . 13:1--13:?? Juliana Sutanto and Atreyi Kankanhalli and Bernard Cheng Yian Tan Eliciting a sense of virtual community among knowledge contributors . . . . . . 14:1--14:?? Jing Peng and Daniel D. Zeng and Zan Huang Latent subject-centered modeling of collaborative tagging: an application in social search . . . . . . . . . . . . . 15:1--15:?? Mohammad M. Masud and Tahseen M. Al-Khateeb and Kevin W. Hamlen and Jing Gao and Latifur Khan and Jiawei Han and Bhavani Thuraisingham Cloud-based malware detection for evolving data streams . . . . . . . . . 16:1--16:?? Susanne Schmidt-Rauch and Gerhard Schwabe From telesales to tele-advisory in travel agencies: Business problems, generic design goals and requirements 17:1--17:?? Ke-Wei Huang and Zhuolun Li A multilabel text classification algorithm for labeling risk factors in SEC form 10-K . . . . . . . . . . . . . 18:1--18:?? Ming-Chih Lin and Anthony J. T. Lee and Rung-Tai Kao and Kuo-Tay Chen Stock price movement prediction using representative prototypes of financial reports . . . . . . . . . . . . . . . . 19:1--19:??
Jay F. Nunamaker, Jr. and Robert O. Briggs Toward a broader vision for Information Systems . . . . . . . . . . . . . . . . 20:1--20:?? Balaji Padmanabhan and Alan Hevner and Michael Cuenco and Crystal Shi From information to operations: Service quality and customer retention . . . . . 21:1--21:?? Huaxia Rui and Andrew Whinston Designing a social-broadcasting-based business intelligence system . . . . . . 22:1--22:?? Hina Arora and T. S. Raghu and Ajay Vinze Decision support for containing pandemic propagation . . . . . . . . . . . . . . 23:1--23:?? Paulo Goes and Noyan Ilk and Wei T. Yue and J. Leon Zhao Live-chat agent assignments to heterogeneous e-customers under imperfect classification . . . . . . . . 24:1--24:?? Raymond Y. K. Lau and S. Y. Liao and Ron Chi-Wai Kwok and Kaiquan Xu and Yunqing Xia and Yuefeng Li Text mining and probabilistic language modeling for online review spam detection . . . . . . . . . . . . . . . 25:1--25:?? Frederik Marx and Jörg H. Mayer and Robert Winter Six principles for redesigning executive information systems-findings of a survey and evaluation of a prototype . . . . . 26:1--26:??
Fred Niederman and Salvatore T. March Design science and the accumulation of knowledge in the information systems discipline . . . . . . . . . . . . . . . 1:1--1:?? K. Asli Basoglu and Mark A. Fuller and Joseph S. Valacich Enhancement of recall within technology-mediated teams through the use of online visual artifacts . . . . . 2:1--2:?? Gediminas Adomavicius and Jingjing Zhang Impact of data characteristics on recommender systems performance . . . . 3:1--3:?? William N. Robinson and Arash Akhlaghi and Tianjie Deng and Ali Raza Syed Discovery and diagnosis of behavioral transitions in patient event streams . . 4:1--4:?? Zhu Zhang and Xin Li and Yubo Chen Deciphering word-of-mouth in social media: Text-based metrics of consumer reviews . . . . . . . . . . . . . . . . 5:1--5:?? Arvind Malhotra and Ann Majchrzak How virtual teams use their virtual workspace to coordinate knowledge . . . 6:1--6:??
Wil van der Aalst Process Mining: Overview and Opportunities . . . . . . . . . . . . . 7:1--7:?? Zhe Shan and Akhil Kumar Optimal Adapter Creation for Process Composition in Synchronous vs. Asynchronous Communication . . . . . . . 8:1--8:?? Zan Huang and Huimin Zhao and Dan Zhu Two New Prediction-Driven Approaches to Discrete Choice Prediction . . . . . . . 9:1--9:?? Thomas L. Ngo-Ye and Atish P. Sinha Analyzing Online Review Helpfulness Using a Regressional ReliefF-Enhanced Text Mining Method . . . . . . . . . . . 10:1--10:?? Philipp Nussbaumer and Inu Matter and Gerhard Schwabe ``Enforced'' vs. ``Casual'' Transparency --- Findings from IT-Supported Financial Advisory Encounters . . . . . . . . . . 11:1--11:??
Roger H. L. Chiang and Paulo Goes and Edward A. Stohr Business Intelligence and Analytics Education, and Program Development: a Unique Opportunity for the Information Systems Discipline . . . . . . . . . . . 12:1--12:?? Palakorn Achananuparp and Ee-Peng Lim and Jing Jiang and Tuan-Anh Hoang Who is Retweeting the Tweeters? Modeling, Originating, and Promoting Behaviors in the Twitter Network . . . . 13:1--13:?? Hsin-Min Lu and Feng-Tse Tsai and Hsinchun Chen and Mao-Wei Hung and Shu-Hsing Li Credit Rating Change Modeling Using News and Financial Ratios . . . . . . . . . . 14:1--14:?? Wei Wei and Sudha Ram Using a Network Analysis Approach for Organizing Social Bookmarking Tags and Enabling Web Content Discovery . . . . . 15:1--15:?? Nan Hu and Hasan Cavusoglu and Ling Liu and Chenkai Ni Do Vendors' Pricing Decisions Fully Reflect Information in Online Reviews? 16:1--16:??
Ee-Peng Lim and Hsinchun Chen and Guoqing Chen Business Intelligence and Analytics: Research Directions . . . . . . . . . . 17:1--17:?? Bin Zhang and Andrew C. Thomas and Patrick Doreian and David Krackhardt and Ramayya Krishnan Contrasting Multiple Social Network Autocorrelations for Binary Outcomes, With Applications To Technology Adoption 18:1--18:?? Nargis Pervin and Fang Fang and Anindya Datta and Kaushik Dutta and Debra Vandermeer Fast, Scalable, and Context-Sensitive Detection of Trending Topics in Microblog Post Streams . . . . . . . . . 19:1--19:?? Zhu Zhang and Chenhui Guo and Paulo Goes Product Comparison Networks for Competitive Analysis of Online Word-of-Mouth . . . . . . . . . . . . . 20:1--20:??
Niam Yaraghi and Anna Ye Du and Raj Sharman and Ram D. Gopal and R. Ramesh Network Effects in Health Information Exchange Growth . . . . . . . . . . . . 1:1--1:?? Rohit Valecha and Raj Sharman and H. Raghav Rao and Shambhu Upadhyaya A Dispatch-Mediated Communication Model for Emergency Response Systems . . . . . 2:1--2:?? Jae Choi and Derek L. Nazareth and Hemant K. Jain The Impact of SOA Implementation on IT-Business Alignment: a System Dynamics Approach . . . . . . . . . . . . . . . . 3:1--3:?? Azmat Ullah and Richard Lai A Systematic Review of Business and Information Technology Alignment . . . . 4:1--4:??
T. Grandon Gill and Alan R. Hevner A Fitness-Utility Model for Design Science Research . . . . . . . . . . . . 5:1--5:?? Jiming Wu and Clyde W. Holsapple Does Knowledge Management Matter? The Empirical Evidence from Market-Based Valuation . . . . . . . . . . . . . . . 6:1--6:?? Levent V. Orman Bayesian Inference in Trust Networks . . 7:1--7:?? Zhu Zhang and Daniel D. Zeng and Ahmed Abbasi and Jing Peng and Xiaolong Zheng A Random Walk Model for Item Recommendation in Social Tagging Systems 8:1--8:?? Douglas C. Derrick and Thomas O. Meservy and Jeffrey L. Jenkins and Judee K. Burgoon and Jay F. Nunamaker, Jr. Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues . . . . . . . . . . . . . . 9:1--9:??
Suprateek Sarker and Suranjan Chakraborty and Patriya Silpakit Tansuhaj and Mark Mulder and Kivilcim Dogerlioglu-Demir The ``Mail-Order-Bride'' (MOB) Phenomenon in the Cyberworld: an Interpretive Investigation . . . . . . . 10:1--10:?? Narges Kasiri and Ramesh Sharda Real Options and System Dynamics for Information Technology Investment Decisions: Application to RFID Adoption in Retail . . . . . . . . . . . . . . . 11:1--11:?? George Mathew and Zoran Obradovic Distributed Privacy-Preserving Decision Support System for Highly Imbalanced Clinical Data . . . . . . . . . . . . . 12:1--12:?? Masato Sakata and Zeynep Yücel and Kazuhiko Shinozawa and Norihiro Hagita and Michita Imai and Michiko Furutani and Rumiko Matsuoka An Inference Engine for Estimating Outside States of Clinical Test Items 13:1--13:?? Alex Edgcomb and Frank Vahid Accurate and Efficient Algorithms that Adapt to Privacy-Enhanced Video for Improved Assistive Monitoring . . . . . 14:1--14:??
Christopher C. Yang and Gondy Leroy and Sophia Ananiadou Smart Health and Wellbeing . . . . . . . 15:1--15:?? Zidong Wang and Julie Eatock and Sally McClean and Dongmei Liu and Xiaohui Liu and Terry Young Modeling Throughput of Emergency Departments via Time Series: an Expectation Maximization Algorithm . . . 16:1--16:?? He Zhang and Sanjay Mehotra and David Liebovitz and Carl A. Gunter and Bradley Malin Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits . . . . . . . . . . . . . 17:1--17:?? Rajiv Khosla and Mei-Tai Chu Embodying Care in Matilda: an Affective Communication Robot for Emotional Wellbeing of Older People in Australian Residential Care Facilities . . . . . . 18:1--18:?? Christine Lisetti and Reza Amini and Ugan Yasavur and Naphtali Rishe I Can Help You Change! An Empathic Virtual Agent Delivers Behavior Change Health Interventions . . . . . . . . . . 19:1--19:?? Rajesh Mirani and Anju Harpalani Business Benefits or Incentive Maximization? Impacts of the Medicare EHR Incentive Program at Acute Care Hospitals . . . . . . . . . . . . . . . 20:1--20:??
Joyce C. Ho and Cheng H. Lee and Joydeep Ghosh Septic Shock Prediction for Patients with Missing Data . . . . . . . . . . . 1:1--1:?? Christopher C. Yang and Haodong Yang and Ling Jiang Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media . . . . . . . . . . . . . . 2:1--2:?? Salah Bouktif and Houari Sahraoui and Faheem Ahmed Predicting Stability of Open-Source Software Systems Using Combination of Bayesian Classifiers . . . . . . . . . . 3:1--3:?? Lihua Huang and Sulin Ba and Xianghua Lu Building Online Trust in a Culture of Confucianism: The Impact of Process Flexibility and Perceived Control . . . 4:1--4:?? M. Lisa Yeo and Erik Rolland and Jackie Rees Ulmer and Raymond A. Patterson Risk Mitigation Decisions for IT Security . . . . . . . . . . . . . . . . 5:1--5:??
S. E. Goodman Building the Nation's Cyber Security Workforce: Contributions from the CAE Colleges and Universities . . . . . . . 6:1--6:?? Suruchi Deodhar and Keith R. Bisset and Jiangzhuo Chen and Yifei Ma and Madhav V. Marathe An Interactive, Web-Based High Performance Modeling Environment for Computational Epidemiology . . . . . . . 7:1--7:?? Patty Kostkova and Martin Szomszor and Connie St. Luis #swineflu: The Use of Twitter as an Early Warning and Risk Communication Tool in the 2009 Swine Flu Pandemic . . 8:1--8:?? Chih-Fong Tsai and Zen-Yu Quan Stock Prediction by Searching for Similarities in Candlestick Charts . . . 9:1--9:??
Matthias Jarke and Kalle Lyytinen Editorial: ``Complexity of Systems Evolution: Requirements Engineering Perspective'' . . . . . . . . . . . . . 11:1--11:?? Gilbert Fridgen and Julia Klier and Martina Beer and Thomas Wolf Improving Business Value Assurance in Large-Scale IT Projects --- a Quantitative Method Based on Founded Requirements Assessment . . . . . . . . 12:1--12:?? John Leslie King and Carl P. Simon Complications with Complexity in Requirements . . . . . . . . . . . . . . 13:1--13:?? Suranjan Chakraborty and Christoph Rosenkranz and Josh Dehlinger Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering 14:1--14:?? Md Rashed I. Nekvi and Nazim H. Madhavji Impediments to Regulatory Compliance of Requirements in Contractual Systems Engineering Projects: a Case Study . . . 15:1--15:?? Radhika Jain and Lan Cao and Kannan Mohan and Balasubramaniam Ramesh Situated Boundary Spanning: an Empirical Investigation of Requirements Engineering Practices in Product Family Development . . . . . . . . . . . . . . 16:1--16:?? Ivan J. Jureta and Alexander Borgida and Neil A. Ernst and John Mylopoulos The Requirements Problem for Adaptive Systems . . . . . . . . . . . . . . . . 17:1--17:??
G. Alan Wang and Harry Jiannan Wang and Jiexun Li and Alan S. Abrahams and Weiguo Fan An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q&A Communities . . . 18:1--18:?? Andrew Partington and Moe Wynn and Suriadi Suriadi and Chun Ouyang and Jonathan Karnon Process Mining for Clinical Processes: a Comparative Analysis of Four Australian Hospitals . . . . . . . . . . . . . . . 19:1--19:?? Jiaqi Yan and Daning Hu and Stephen S. Liao and Huaiqing Wang Mining Agents' Goals in Agent-Oriented Business Processes . . . . . . . . . . . 20:1--20:?? Thushari Silva and Ma Jian and Yang Chen Process Analytics Approach for R&D Project Selection . . . . . . . . . . . 21:1--21:?? Xitong Guo and Sherry X. Sun and Doug Vogel A Dataflow Perspective for Business Process Integration . . . . . . . . . . 22:1--22:?? Jie Jiang and Huib Aldewereld and Virginia Dignum and Yao-Hua Tan Compliance Checking of Organizational Interactions . . . . . . . . . . . . . . 23:1--23:?? Claudio Di Ciccio and Massimo Mecella On the Discovery of Declarative Control Flows for Artful Processes . . . . . . . 24:1--24:?? Thorben Keller and Frédéric Thiesse and Elgar Fleisch Classification Models for RFID-Based Real-Time Detection of Process Events in the Supply Chain: an Empirical Study . . 25:1--25:??
Donald J. Berndt and James A. McCart and Dezon K. Finch and Stephen L. Luther A Case Study of Data Quality in Text Mining Clinical Progress Notes . . . . . 1:1--1:?? David Zimbra and Hsinchun Chen and Robert F. Lusch Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction . . . . . . . . . . . . . . . 2:1--2:?? Shing-Han Li and Yu-Cheng Kao and Zong-Cyuan Zhang and Ying-Ping Chuang and David C. Yen A Network Behavior-Based Botnet Detection Mechanism Using PSO and $K$-means . . . . . . . . . . . . . . . 3:1--3:?? Yen-Hsien Lee and Paul Jen-Hwa Hu and Ching-Yi Tu Ontology-Based Mapping for Automated Document Management: a Concept-Based Technique for Word Mismatch and Ambiguity Problems in Document Clustering . . . . . . . . . . . . . . . 4:1--4:??
Juliana Sutanto and Atreyi Kankanhalli and Bernard Cheng Yian Tan Investigating Task Coordination in Globally Dispersed Teams: a Structural Contingency Perspective . . . . . . . . 5:1--5:?? Rahul C. Basole and Martha G. Russell and Jukka Huhtamäki and Neil Rubens and Kaisa Still and Hyunwoo Park Understanding Business Ecosystem Dynamics: a Data-Driven Approach . . . . 6:1--6:?? Xiaohui Zhao and Chengfei Liu and Sira Yongchareon and Marek Kowalkiewicz and Wasim Sadiq Role-Based Process View Derivation and Composition . . . . . . . . . . . . . . 7:1--7:?? Dengpan Liu and Sumit Sarkar and Chelliah Sriskandarajah Who's Next? Scheduling Personalization Services with Variable Service Times . . 8:1--8:??
Xue Bai and James R. Marsden and William T. Ross, Jr. and Gang Wang Relationships Among Minimum Requirements, Facebook Likes, and Groupon Deal Outcomes . . . . . . . . . 9:1--9:?? Tanmay Bhowmik and Nan Niu and Prachi Singhania and Wentao Wang On the Role of Structural Holes in Requirements Identification: an Exploratory Study on Open-Source Software Development . . . . . . . . . . 10:1--10:?? Devipsita Bhattacharya and Sudha Ram RT @News: an Analysis of News Agency Ego Networks in a Microblogging Environment 11:1--11:?? Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri Minimizing Organizational User Requirement while Meeting Security Constraints . . . . . . . . . . . . . . 12:1--12:??
Carlos A. Gomez-Uribe and Neil Hunt The Netflix Recommender System: Algorithms, Business Value, and Innovation . . . . . . . . . . . . . . . 13:1--13:?? Rajiv Krishnamurthy and Varghese Jacob and Suresh Radhakrishnan and Kutsal Dogan Peripheral Developer Participation in Open Source Projects: an Empirical Analysis . . . . . . . . . . . . . . . . 14:1--14:?? Christos Liaskos and Ageliki Tsioliaridou Service Ratio-Optimal, Content Coherence-Aware Data Push Systems . . . 15:1--15:??
Xianghua Lu and Xia Zhao and Ling Xue Is Combining Contextual and Behavioral Targeting Strategies Effective in Online Advertising? . . . . . . . . . . . . . . 1:1--1:?? Tsz-Wai Lui and Gabriele Piccoli The Effect of a Multichannel Customer Service System on Customer Service and Financial Performance . . . . . . . . . 2:1--2:?? Yutian Sun and Jianwen Su and Jian Yang Universal Artifacts: a New Approach to Business Process Management (BPM) Systems . . . . . . . . . . . . . . . . 3:1--3:??
Shing-Han Li and David C. Yen and Ying-Ping Chuang A Real-Time Audit Mechanism Based on the Compression Technique . . . . . . . . . 4:1--4:?? Khayyam Hashmi and Zaki Malik and Erfan Najmi and Amal Alhosban and Brahim Medjahed A Web Service Negotiation Management and QoS Dependency Modeling Framework . . . 5:1--5:?? Agam Gupta and Biswatosh Saha and Uttam K. Sarkar Systemic Concentration in Sponsored Search Markets: The Role of Time Window in Click-Through-Rate Computation . . . 6:1--6:??
Ming-Feng Tsai and Chuan-Ju Wang and Po-Chuan Chien Discovering Finance Keywords via Continuous-Space Language Models . . . . 7:1--7:?? Corentin Burnay Are Stakeholders the Only Source of Information for Requirements Engineers? Toward a Taxonomy of Elicitation Information Sources . . . . . . . . . . 8:1--8:?? Jiajie Xu and Chengfei Liu and Xiaohui Zhao and Sira Yongchareon and Zhiming Ding Resource Management for Business Process Scheduling in the Presence of Availability Constraints . . . . . . . . 9:1--9:??
Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri On Optimal Employee Assignment in Constrained Role-Based Access Control Systems . . . . . . . . . . . . . . . . 10:1--10:?? Hao Chen and Keli Xiao and Jinwen Sun and Song Wu A Double-Layer Neural Network Framework for High-Frequency Forecasting . . . . . 11:1--11:?? Yan Lu and Michael Chau and Patrick Y. K. Chau Are Sponsored Links Effective? Investigating the Impact of Trust in Search Engine Advertising . . . . . . . 12:1--12:??
Anastasiia Pika and Michael Leyer and Moe T. Wynn and Colin J. Fidge and Arthur H. M. Ter Hofstede and Wil M. P. Van Der Aalst Mining Resource Profiles from Event Logs 1:1--1:?? Saeede Eftekhari and Niam Yaraghi and Ranjit Singh and Ram D. Gopal and R. Ramesh Do Health Information Exchanges Deter Repetition of Medical Services? . . . . 2:1--2:?? Adarsh Kumar Kakar Investigating the Relationships Between the Use Contexts, User Perceived Values, and Loyalty to a Software Product . . . 3:1--3:??
Sudip Bhattacharjee and Varghese Jacob and Zhengrui (Jeffrey) Jiang and Subodha Kumar Introduction to WITS 2015 Special Issue in TMIS . . . . . . . . . . . . . . . . 4:1--4:?? Shuyuan Deng and Atish P. Sinha and Huimin Zhao Resolving Ambiguity in Sentiment Classification: The Role of Dependency Features . . . . . . . . . . . . . . . . 4:1--4:?? Mohammad A. Al-Ramahi and Jun Liu and Omar F. El-Gayar Discovering Design Principles for Health Behavioral Change Support Systems: a Text Mining Approach . . . . . . . . . . 5:1--5:?? Can Sun and Yonghua Ji and Bora Kolfal and Ray Patterson Business-to-Consumer Platform Strategy: How Vendor Certification Changes Platform and Seller Incentives . . . . . 6:1--6:?? Konstantin Bauman and Alexander Tuzhilin and Ryan Zaczynski Using Social Sensors for Detecting Emergency Events: a Case of Power Outages in the Electrical Utility Industry . . . . . . . . . . . . . . . . 7:1--7:?? Michael Mannino and Joel Fredrickson and Farnoush Banaei-Kashani and Iris Linck and Raghda Alqurashi Raghda Development and Evaluation of a Similarity Measure for Medical Event Sequences . . . . . . . . . . . . . . . 8:1--8:?? Atefeh Taghavi and Carson Woo The Role Clarity Framework to Improve Requirements Gathering . . . . . . . . . 9:1--9:?? Anik Mukherjee and R. P. Sundarraj and Kaushik Dutta Apriori Rule-Based In-App Ad Selection Online Algorithm for Improving Supply-Side Platform Revenues . . . . . 10:1--10:??
Tuan Minh Ha and Masaki Samejima and Norihisa Komoda Power and Performance Estimation for Fine-Grained Server Power Capping via Controlling Heterogeneous Applications 11:1--11:?? Rahul C. Basole and Timothy Major and Arjun Srinivasan Understanding Alliance Portfolios Using Visual Analytics . . . . . . . . . . . . 12:1--12:?? Joseph Cazier and Benjamin Shao and Robert St. Louis Value Congruence, Trust, and Their Effects on Purchase Intention and Reservation Price . . . . . . . . . . . 13:1--13:?? Roman Lukyanenko and Binny M. Samuel Are All Classes Created Equal? Increasing Precision of Conceptual Modeling Grammars . . . . . . . . . . . 14:1--14:??
Zhepeng (Lionel) Li and Xiao Fang and Olivia R. Liu Sheng A Survey of Link Recommendation for Social Networks: Methods, Theoretical Foundations, and Future Research Directions . . . . . . . . . . . . . . . 1:1--1:?? Keli Xiao and Qi Liu and Chuanren Liu and Hui Xiong Price Shock Detection With an Influence-Based Model of Social Attention . . . . . . . . . . . . . . . 2:1--2:?? Suppawong Tuarob and Ray Strong and Anca Chandra and Conrad S. Tucker Discovering Discontinuity in Big Financial Transaction Data . . . . . . . 3:1--3:?? Jan Mendling and Ingo Weber and Wil Van Der Aalst and Jan Vom Brocke and Cristina Cabanillas and Florian Daniel and Sòren Debois and Claudio Di Ciccio and Marlon Dumas and Schahram Dustdar and Avigdor Gal and Luciano García-Bañuelos and Guido Governatori and Richard Hull and Marcello La Rosa and Henrik Leopold and Frank Leymann and Jan Recker and Manfred Reichert and Hajo A. Reijers and Stefanie Rinderle-Ma and Andreas Solti and Michael Rosemann and Stefan Schulte and Munindar P. Singh and Tijs Slaats and Mark Staples and Barbara Weber and Matthias Weidlich and Mathias Weske and Xiwei Xu and Liming Zhu Blockchains for Business Process Management --- Challenges and Opportunities . . . . . . . . . . . . . 4:1--4:??
David Zimbra and Ahmed Abbasi and Daniel Zeng and Hsinchun Chen The State-of-the-Art in Twitter Sentiment Analysis: a Review and Benchmark Evaluation . . . . . . . . . . 5:1--5:?? Rahul C. Basole and Arjun Srinivasan and Hyunwoo Park and Shiv Patel ecoxight: Discovery, Exploration, and Analysis of Business Ecosystems Using Interactive Visualization . . . . . . . 6:1--6:?? Xiangyu Fan and Xi Niu Implementing and Evaluating Serendipity in Delivering Personalized Health Information . . . . . . . . . . . . . . 7:1--7:?? Sandeep Purao and Narasimha Bolloju and Chuan-Hoo Tan A Modeling Language for Conceptual Design of Systems Integration Solutions 8:1--8:?? Maria De-Arteaga and William Herlands and Daniel B. Neill and Artur Dubrawski Machine Learning for the Developing World . . . . . . . . . . . . . . . . . 9:1--9:??
Wolfgang Ketter and John Collins and Maytal Saar-Tsechansky and Ori Marom Information Systems for a Smart Electricity Grid: Emerging Challenges and Opportunities . . . . . . . . . . . 10:1--10:?? Daniel Russo and Paolo Ciancarini and Tommaso Falasconi and Massimo Tomasi A Meta-Model for Information Systems Quality: a Mixed Study of the Financial Sector . . . . . . . . . . . . . . . . . 11:1--11:?? Chen Zhu and Hengshu Zhu and Hui Xiong and Chao Ma and Fang Xie and Pengliang Ding and Pan Li Person-Job Fit: Adapting the Right Talent for the Right Job with Joint Representation Learning . . . . . . . . 12:1--12:?? John D. Delano and Hemant K. Jain and Atish P. Sinha System Design through the Exploration of Contemporary Web Services . . . . . . . 13:1--13:??
Kar Kei Lo and Michael Chau A Penny Is Worth a Thousand? Investigating the Relationship Between Social Media and Penny Stocks . . . . . 14:1--14:?? Bernhard Kratzwald and Stefan Feuerriegel Putting Question-Answering Systems into Practice: Transfer Learning for Efficient Domain Customization . . . . . 15:1--15:?? Shuo Yu and Hongyi Zhu and Shan Jiang and Yong Zhang and Chunxiao Xing and Hsinchun Chen Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System 16:1--16:??
Edward Hartono and Clyde W. Holsapple Website Visual Design Qualities: a Threefold Framework . . . . . . . . . . 1:1--1:?? Hu Xiong and Yi Wang and Wenchao Li and Chien-Ming Chen Flexible, Efficient, and Secure Access Delegation in Cloud Computing . . . . . 2:1--2:?? Majid Mohammadi and Wout Hofman and Yao-Hua Tan Simulated Annealing-based Ontology Matching . . . . . . . . . . . . . . . . 3:1--3:??
Hojjat Emami A Graph-based Approach to Person Name Disambiguation in Web . . . . . . . . . 4:1--4:?? Jian-Min Jiang and Zhong Hong and Yangyang Chen Modeling and Analyzing Incremental Natures of Developing Software . . . . . 5:1--5:?? Hemant Jain and T. S. Raghu and Victoria Yoon and Wei Thoo Yue Introduction to Special Section Based on Papers Presented at the Workshop on Information Technology and Systems, 2017 6:1--6:?? Paul Sutterer and Stefan Waldherr and Martin Bichler Are Truthful Bidders Paying too Much? Efficiency and Revenue in Display Ad Auctions . . . . . . . . . . . . . . . . 6:1--6:?? Xu Han and Niam Yaraghi and Ram Gopal Catching Them Red-Handed: Optimizing the Nursing Homes' Rating System . . . . . . 7:1--7:?? Hasan B. Kartal and Xiaoping Liu and Xiao-Bai Li Differential Privacy for the Vast Majority . . . . . . . . . . . . . . . . 8:1--8:??
Ranjan Pal and Leana Golubchik and Konstantions Psounis and Tathagata Bandyopadhyay On Robust Estimates of Correlated Risk in Cyber-Insured IT Firms: a First Look at Optimal AI-Based Estimates under ``Small'' Data . . . . . . . . . . . . . 9:1--9:?? Hangjung Zo and Derek L. Nazareth and Hemant K. Jain Service-oriented Application Composition with Evolutionary Heuristics and Multiple Criteria . . . . . . . . . . . 10:1--10:?? Jianwei Lai and Dongsong Zhang and Sen Wang and Isil Doga Yakut Kilic and Lina Zhou ThumbStroke: a Virtual Keyboard in Support of Sight-Free and One-Handed Text Entry on Touchscreen Mobile Devices 11:1--11:?? Yin Kang and Lina Zhou Helpfulness Assessment of Online Reviews: The Role of Semantic Hierarchy of Product Features . . . . . . . . . . 12:1--12:??
Jiyong Park and Daegon Cho and Jae Kyu Lee and Byungtae Lee The Economics of Cybercrime: The Role of Broadband and Socioeconomic Status . . . 13:1--13:?? Wingyan Chung and Bingbing Rao and Liqiang Wang Interaction Models for Detecting Nodal Activities in Temporal Social Media Networks . . . . . . . . . . . . . . . . 14:1--14:?? Jiawei Chen and Hongyan Liu and Yinghui (Catherine) Yang and Jun He Effective Selection of a Compact and High-Quality Review Set with Information Preservation . . . . . . . . . . . . . . 15:1--15:?? Dietmar Jannach and Michael Jugovac Measuring the Business Value of Recommender Systems . . . . . . . . . . 16:1--16:??
Hongfei Li and Ramesh Shankar and Jan Stallaert Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities . . . . . . . . . . 1:1--1:26 Mohsen Rezvani and Mojtaba Rezvani A Randomized Reputation System in the Presence of Unfair Ratings . . . . . . . 2:1--2:16 Li Ni and Wenjian Luo and Nannan Lu and Wenjie Zhu Mining the Local Dependency Itemset in a Products Network . . . . . . . . . . . . 3:1--3:31 Fabio Pierazzi and Ghita Mezzour and Qian Han and Michele Colajanni and V. S. Subrahmanian A Data-driven Characterization of Modern Android Spyware . . . . . . . . . . . . 4:1--4:38
Ranjan Pal and Konstantinos Psounis and Jon Crowcroft and Frank Kelly and Pan Hui and Sasu Tarkoma and Abhishek Kumar and John Kelly and Aritra Chatterjee and Leana Golubchik and Nishanth Sastry and Bodhibrata Nag When Are Cyber Blackouts in Modern Service Networks Likely?: a Network Oblivious Theory on Cyber (Re)Insurance Feasibility . . . . . . . . . . . . . . 5:1--5:38 Tatiana Ermakova and Benjamin Fabian and Marta Kornacka and Scott Thiebes and Ali Sunyaev Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective . . . . . . . . . . 6:1--6:29 Haibing Lu and Xi Chen and Junmin Shi and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong and Wei Huang Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization . . 7:1--7:33 Moshe Unger and Alexander Tuzhilin and Amit Livne Context-Aware Recommendations Based on Deep Learning Frameworks . . . . . . . . 8:1--8:15
Kaushik Dutta and Xiao Fang and Zhengrui (Jeffrey) Jiang Introduction to WITS 2018 Special Issue in TMIS . . . . . . . . . . . . . . . . 9:1--9:2 Ram D. Gopal and Hooman Hidaji and Sule Nur Kutlu and Raymond A. Patterson and Erik Rolland and Dmitry Zhdanov Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships . . . . . . . . . . . . . . 10:1--10:20 Liling Tan and Maggie Yundi Li and Stanley Kok E-Commerce Product Categorization via Machine Translation . . . . . . . . . . 11:1--11:14 Xiangyu Wang and Kang Zhao and Xun Zhou and Nick Street Predicting User Posting Activities in Online Health Communities with Deep Learning . . . . . . . . . . . . . . . . 12:1--12:15 Jie Tao and Lina Zhou A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews . . . . . . . 13:1--13:22 Wensheng Gan and Jerry Chun-Wei Lin and Han-Chieh Chao and Philippe Fournier-Viger and Xuan Wang and Philip S. Yu Utility-Driven Mining of Trend Information for Intelligent System . . . 14:1--14:28 Nenavath Sreenu Cashless Payment Policy and Its Effects on Economic Growth of India: an Exploratory Study . . . . . . . . . . . 15:1--15:10 Asma Belhadi and Youcef Djenouri and Jerry Chun-Wei Lin and Alberto Cano Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges . . . . . . . . . . . . 16:1--16:29
Sagar Samtani and Murat Kantarcioglu and Hsinchun Chen Trailblazing the Artificial Intelligence for Cybersecurity Discipline: a Multi-Disciplinary Research Roadmap . . 17:1--17:19 Anand Mudgerikar and Puneet Sharma and Elisa Bertino Edge-Based Intrusion Detection for IoT devices . . . . . . . . . . . . . . . . 18:1--18:21 Martin Husák and Tomás Bajtos and Jaroslav Kaspar and Elias Bou-Harb and Pavel Celeda Predictive Cyber Situational Awareness and Personalized Blacklisting: a Sequential Rule Mining Approach . . . . 19:1--19:16 Mahdi R. Alagheband and Atefeh Mashatan and Morteza Zihayat Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media . . 20:1--20:20 Antonio Mangino and Morteza Safaei Pour and Elias Bou-Harb Internet-scale Insecurity of Consumer Internet of Things: an Empirical Measurements Perspective . . . . . . . . 21:1--21:24 Christopher Sweet and Stephen Moskal and Shanchieh Jay Yang On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks . . . . 22:1--22:21 Sharad Mehrotra and Shantanu Sharma and Jeffrey D. Ullman and Dhrubajyoti Ghosh and Peeyush Gupta and Anurag Mishra PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data . . . . . . . . . . . . . . . . . . 23:1--23:41 Sicong Shao and Cihan Tunc and Amany Al-Shawi and Salim Hariri An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics . . . . . . . . . . . . . 24:1--24:25 Jay P. Kesan and Linfeng Zhang Analysis of Cyber Incident Categories Based on Losses . . . . . . . . . . . . 25:1--25:28 Henanksha Sainani and Josephine M. Namayanja and Guneeti Sharma and Vasundhara Misal and Vandana P. Janeja IP Reputation Scoring with Geo-Contextual Feature Augmentation . . 26:1--26:29
Sagar Samtani and Murat Kantarcioglu and Hsinchun Chen A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems 1:1--1:18 Razieh Nokhbeh Zaeem and K. Suzanne Barber The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise . . . . . . . . . . . . . . . . 2:1--2:20 Tanuja Sudhakar and Marina Gavrilova Deep Learning for Multi-instance Biometric Privacy . . . . . . . . . . . 3:1--3:23 Gökhan Kul and Shambhu Upadhyaya and Andrew Hughes An Analysis of Complexity of Insider Attacks to Databases . . . . . . . . . . 4:1--4:18 Dinesha Ranathunga and Matthew Roughan and Hung Nguyen Mathematical Reconciliation of Medical Privacy Policies . . . . . . . . . . . . 5:1--5:18 Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri Optimal Employee Recruitment in Organizations under Attribute-Based Access Control . . . . . . . . . . . . . 6:1--6:24 Oluwafemi Akanfe and Rohit Valecha and H. Raghav Rao Design of an Inclusive Financial Privacy Index (INF-PIE): a Financial Privacy and Digital Financial Inclusion Perspective 7:1--7:21 Sarah A. Alkhodair and Benjamin C. M. Fung and Steven H. H. Ding and William K. Cheung and Shih-Chia Huang Detecting High-Engaging Breaking News Rumors in Social Media . . . . . . . . . 8:1--8:16 Francesco Benedetto and Loretta Mastroeni and Pierluigi Vellucci Extraction of Information Content Exchange in Financial Markets by an Entropy Analysis . . . . . . . . . . . . 9:1--9:16
Ka Chung Ng and Mike K. P. So and Kar Yan Tam A Latent Space Modeling Approach to Interfirm Relationship Analysis . . . . 10:1--10:44 Aristotle Onumo and Irfan Ullah-Awan and Andrea Cullen Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures . . . . . . . . . . . . . . . 11:1--11:29 Asma Belhadi and Youcef Djenouri and Djamel Djenouri and Tomasz Michalak and Jerry Chun-Wei Lin Machine Learning for Identifying Group Trajectory Outliers . . . . . . . . . . 12:1--12:25 Almas Abdibayev and Dongkai Chen and Haipeng Chen and Deepti Poluru and V. S. Subrahmanian Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents 13:1--13:22 Xingsi Xue and Xiaojing Wu and Junfeng Chen Optimizing Ontology Alignment Through an Interactive Compact Genetic Algorithm 14:1--14:17 Youcef Djenouri and Jerry Chun-Wei Lin and Kjetil Nòrvåg and Heri Ramampiaro and Philip S. Yu Exploring Decomposition for Solving Pattern Mining Problems . . . . . . . . 15:1--15:36 Mingfei Teng and Hengshu Zhu and Chuanren Liu and Hui Xiong Exploiting Network Fusion for Organizational Turnover Prediction . . . 16:1--16:18 Ranjan Pal and Ziyuan Huang and Sergey Lototsky and Xinlong Yin and Mingyan Liu and Jon Crowcroft and Nishanth Sastry and Swades De and Bodhibrata Nag Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes . . . . . . . . . . . . . . . . . 17:1--17:36
Makiya Nakashima and Alex Sim and Youngsoo Kim and Jonghyun Kim and Jinoh Kim Automated Feature Selection for Anomaly Detection in Network Traffic Data . . . 18:1--18:28 Lin Qiu and Sruthi Gorantla and Vaibhav Rajan and Bernard C. Y. Tan Multi-disease Predictive Analytics: a Clinical Knowledge-aware Approach . . . 19:1--19:34 Yan Leng and Jinhua Zhao and Haris Koutsopoulos Leveraging Individual and Collective Regularity to Profile and Segment User Locations from Mobile Phone Data . . . . 20:1--20:22 Xi Wang and Yibo Chai and Hui Li and Wenbin Wang and Weishan Sun Graph Convolutional Network-based Model for Incident-related Congestion Prediction: a Case Study of Shanghai Expressways . . . . . . . . . . . . . . 21:1--21:22 Peng Huang and Henry C. Lucas Early Exploration of MOOCs in the U.S. Higher Education: an Absorptive Capacity Perspective . . . . . . . . . . . . . . 22:1--22:28 Pooja Parameshwarappa and Zhiyuan Chen and Günes Koru Anonymization of Daily Activity Data by Using $l$-diversity Privacy Model . . . 23:1--23:21 Jiaheng Xie and Bin Zhang and Susan Brown and Daniel Zeng Write Like a Pro or an Amateur? Effect of Medical Language Formality . . . . . 24:1--24:25 Damodar Reddy Edla and Shubham Dodia and Annushree Bablani and Venkatanareshbabu Kuppili An Efficient Deep Learning Paradigm for Deceit Identification Test on EEG Signals . . . . . . . . . . . . . . . . 25:1--25:20 Qin Wang and Shiping Chen and Yang Xiang Anonymous Blockchain-based System for Consortium . . . . . . . . . . . . . . . 26:1--26:25
Kang Zhao and Qingpeng Zhang and Sean H. Y. Yuan and Kelvin Kam-Fai Tsoi Introduction to the Special Section on Using AI and Data Science to Handle Pandemics and Related Disruptions . . . 27:1--27:2 Manvel Avetisian and Ilya Burenko and Konstantin Egorov and Vladimir Kokh and Aleksandr Nesterov and Aleksandr Nikolaev and Alexander Ponomarchuk and Elena Sokolova and Alex Tuzhilin and Dmitry Umerenkov CoRSAI: a System for Robust Interpretation of CT Scans of COVID-19 Patients Using Deep Learning . . . . . . 28:1--28:16 Maryam Zokaeinikoo and Pooyan Kazemian and Prasenjit Mitra and Soundar Kumara AIDCOV: an Interpretable Artificial Intelligence Model for Detection of COVID-19 from Chest Radiography Images 29:1--29:20 Guanqing Liang and Jingxin Zhao and Helena Yan Ping Lau and Cane Wing-Ki Leung Using Social Media to Analyze Public Concerns and Policy Responses to COVID-19 in Hong Kong . . . . . . . . . 30:1--30:20 Laura Biester and Katie Matton and Janarthanan Rajendran and Emily Mower Provost and Rada Mihalcea Understanding the Impact of COVID-19 on Online Mental Health Forums . . . . . . 31:1--31:28 Kang Gu and Soroush Vosoughi and Temiloluwa Prioleau SymptomID: a Framework for Rapid Symptom Identification in Pandemics Using News Reports . . . . . . . . . . . . . . . . 32:1--32:17 Shixiang Zhu and Alexander Bukharin and Liyan Xie and Mauricio Santillana and Shihao Yang and Yao Xie High-Resolution Spatio-Temporal Model for County-Level COVID-19 Activity in the U.S. . . . . . . . . . . . . . . . . 33:1--33:20 Junye Li and Aryan Sharma and Deepak Mishra and Gustavo Batista and Aruna Seneviratne COVID-Safe Spatial Occupancy Monitoring Using OFDM-Based Features and Passive WiFi Samples . . . . . . . . . . . . . . 34:1--34:24 Himanshu Kharkwal and Dakota Olson and Jiali Huang and Abhiraj Mohan and Ankur Mani and Jaideep Srivastava University Operations During a Pandemic: a Flexible Decision Analysis Toolkit . . 35:1--35:24 Chun Ouyang and Michael Adams and Arthur H. M. Ter Hofstede and Yang Yu Design and Realisation of Scalable Business Process Management Systems for Deployment in the Cloud . . . . . . . . 36:1--36:26 Saurav Chakraborty and Agnieszka Onuchowska and Sagar Samtani and Wolfgang Jank and Brandon Wolfram Machine Learning for Automated Industrial IoT Attack Detection: an Efficiency-Complexity Trade-off . . . . 37:1--37:28
Lin Jerry Cwei and Nachiketa Sahoo and Gautam Srivastava and Weiping Ding Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1 1:1--1:3 Shui-Hua Wang and Xin Zhang and Yu-Dong Zhang DSSAE: Deep Stacked Sparse Autoencoder Analytical Model for COVID-19 Diagnosis by Fractional Fourier Entropy . . . . . 2:1--2:20 Fan Chen and Jiaoxiong Xia and Honghao Gao and Huahu Xu and Wei Wei TRG-DAtt: The Target Relational Graph and Double Attention Network Based Sentiment Analysis and Prediction for Supporting Decision Making . . . . . . . 3:1--3:25 M. Saqib Nawaz and Philippe Fournier-Viger and Unil Yun and Youxi Wu and Wei Song Mining High Utility Itemsets with Hill Climbing and Simulated Annealing . . . . 4:1--4:22 Shuteng Niu and Yushan Jiang and Bowen Chen and Jian Wang and Yongxin Liu and Houbing Song Cross-Modality Transfer Learning for Image-Text Information Management . . . 5:1--5:14 Mu-Yen Chen and Min-Hsuan Fan and Li-Xiang Huang AI-Based Vehicular Network toward 6G and IoT: Deep Learning Approaches . . . . . 6:1--6:12 Zhihan Lv and Ranran Lou and Hailin Feng and Dongliang Chen and Haibin Lv Novel Machine Learning for Big Data Analytics in Intelligent Support Information Management Systems . . . . . 7:1--7:21 Ankit Kumar and Abhishek Kumar and Ali Kashif Bashir and Mamoon Rashid and V. D. Ambeth Kumar and Rupak Kharel Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset . . . . . . . . . . . . . . 8:1--8:17 Mohammad Ehsan Shahmi Chowdhury and Chowdhury Farhan Ahmed and Carson K. Leung A New Approach for Mining Correlated Frequent Subgraphs . . . . . . . . . . . 9:1--9:28 Bo Wen and Paul Jen-Hwa Hu and Mohammadreza Ebrahimi and Hsinchun Chen Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: an Affordance Perspective . . . . . . . 10:1--10:24 Gamal Elkoumy and Stephan A. Fahrenkrog-Petersen and Mohammadreza Fani Sani and Agnes Koschmider and Felix Mannhardt and Saskia Nuñez Von Voigt and Majid Rafiei and Leopold Von Waldthausen Privacy and Confidentiality in Process Mining: Threats and Research Challenges 11:1--11:17
Bo Sun and Takeshi Takahashi and Tao Ban and Daisuke Inoue Detecting Android Malware and Classifying Its Families in Large-scale Datasets . . . . . . . . . . . . . . . . 12:1--12:21 Byron Marshall and Michael Curry and Robert E. Crossler and John Correia Machine Learning and Survey-based Predictors of InfoSec Non-Compliance . . 13:1--13:20 Jiaheng Xie and Bin Zhang and Jian Ma and Daniel Zeng and Jenny Lo-Ciganic Readmission Prediction for Patients with Heterogeneous Medical History: a Trajectory-Based Deep Learning Approach 14:1--14:27 Luo He and Hongyan Liu and Yinghui Yang and Bei Wang A Multi-attention Collaborative Deep Learning Approach for Blood Pressure Prediction . . . . . . . . . . . . . . . 15:1--15:20 Yan Tang and Weilong Cui and Jianwen Su A Query Language for Workflow Logs . . . 16:1--16:28 Shi Ming Huang and David C. Yen and Ting Jyun Yan and Yi Ting Yang An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology . . . . . . . . . . . . . . . 17:1--17:29 Tomasz Miksa and Simon Oblasser and Andreas Rauber Automating Research Data Management Using Machine-Actionable Data Management Plans . . . . . . . . . . . . . . . . . 18:1--18:22 Guangrui (Kayla) Li and Mike K. P. So and Kar Yan Tam Identifying the Big Shots --- a Quantile-Matching Way in the Big Data Context . . . . . . . . . . . . . . . . 19:1--19:30 Xindong Wu and Xingquan Zhu and Minghui Wu The Evolution of Search: Three Computing Paradigms . . . . . . . . . . . . . . . 20:1--20:20 Ning Zhang and Mohammadreza Ebrahimi and Weifeng Li and Hsinchun Chen Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence . . . . . . . . . . . . . . 21:1--21:21 Karl Werder and Balasubramaniam Ramesh and Rongen (Sophia) Zhang Establishing Data Provenance for Responsible Artificial Intelligence Systems . . . . . . . . . . . . . . . . 22:1--22:23
Jerry Chun-Wei Lin and Nachiketa Sahoo and Gautam Srivastava and Weiping Ding Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part II 23:1--23:3 Maryam Ebrahimi and Mohammad Hesam Tadayon and Mohammad Sayad Haghighi and Alireza Jolfaei A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things . . . . . . . . . 24:1--24:30 Youxi Wu and Xiaohui Wang and Yan Li and Lei Guo and Zhao Li and Ji Zhang and Xindong Wu OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining . . . . . 25:1--25:23 Yuan Gao and Laurence T. Yang and Yaliang Zhao and Jing Yang Feature Extraction of High-dimensional Data Based on J-HOSVD for Cyber-Physical-Social Systems . . . . . 26:1--26:21 Hsun-Ping Hsieh and Fandel Lin and Nai-Yu Chen and Tzu-Hsin Yang A Decision Framework to Recommend Cruising Locations for Taxi Drivers under the Constraint of Booking Information . . . . . . . . . . . . . . 27:1--27:30 Anastasiia Pika and Chun Ouyang and Arthur H. M. ter Hofstede Configurable Batch-Processing Discovery from Event Logs . . . . . . . . . . . . 28:1--28:25 A. N. M. Bazlur Rashid and Mohiuddin Ahmed and Leslie F. Sikos and Paul Haskell-Dowland Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection . . 29:1--29:39 Xin Liu and Liang Zheng and Weishan Zhang and Jiehan Zhou and Shuai Cao and Shaowen Yu An Evolutive Frequent Pattern Tree-based Incremental Knowledge Discovery Algorithm . . . . . . . . . . . . . . . 30:1--30:20 Flavio Corradini and Alessandro Marcelletti and Andrea Morichetta and Andrea Polini and Barbara Re and Francesco Tiezzi Engineering Trustable and Auditable Choreography-based Systems Using Blockchain . . . . . . . . . . . . . . . 31:1--31:53 M. Lisa Yeo and Erik Rolland and Jacquelyn Rees Ulmer and Raymond A. Patterson How Customer Demand Reactions Impact Technology Innovation and Security . . . 32:1--32:17 Wanlun Ma and Xiangyu Hu and Chao Chen and Sheng Wen and Kkwang Raymond Choo and Yang Xiang Social Media Event Prediction using DNN with Feedback Mechanism . . . . . . . . 33:1--33:24 Gediminas Adomavicius and Mochen Yang Integrating Behavioral, Economic, and Technical Insights to Understand and Address Algorithmic Bias: a Human-Centric Perspective . . . . . . . 34:1--34:27
Mu-Yen Chen and Bhavani Thuraisingham and Erol Egrioglu and Jose De Jesus Rubio Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT 35:1--35:?? Esteban Elias Romero and Carlos David Camacho and Carlos Enrique Montenegro and Óscar Esneider Acosta and Rubén González Crespo and Elvis Eduardo Gaona and Marcelo Herrera Martínez Integration of DevOps Practices on a Noise Monitor System with CircleCI and Terraform . . . . . . . . . . . . . . . 36:1--36:?? Bin Ren and Yuquiang Chen and Fujie Wang Application Massive Data Processing Platform for Smart Manufacturing Based on Optimization of Data Storage . . . . 37:1--37:?? Genggeng Liu and Yuhan Zhu and Saijuan Xu and Hao Tang and Yeh-Cheng Chen Performance-Driven X-Architecture Routing Algorithm for Artificial Intelligence Chip Design in Smart Manufacturing . . . . . . . . . . . . . 38:1--38:?? Zhihan Lv and Dongliang Chen and Hailin Feng and Amit Kumar Singh and Wei Wei and Haibin Lv Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities 39:1--39:?? Rongli Chen and Xiaozhong Chen and Lei Wang and Jianxin Li The Core Industry Manufacturing Process of Electronics Assembly Based on Smart Manufacturing . . . . . . . . . . . . . 40:1--40:?? Genggeng Liu and Ruping Zhou and Saijuan Xu and Yuhan Zhu and Wenzhong Guo and Yeh-Cheng Chen and Guolong Chen Two-Stage Competitive Particle Swarm Optimization Based Timing-Driven X-Routing for IC Design Under Smart Manufacturing . . . . . . . . . . . . . 41:1--41:?? Xin Du and Songtao Tang and Zhihui Lu and Keke Gai and Jie Wu and Patrick C. K. Hung Scientific Workflows in IoT Environments: a Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing . . . . . . . . . . . . . . . 42:1--42:?? Qi Lin and Wensheng Gan and Yongdong Wu and Jiahui Chen and Chien-Ming Chen Smart System: Joint Utility and Frequency for Pattern Classification . . 43:1--43:?? Rohini Poolat Parameswarath and Prosanta Gope and Biplab Sikdar User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential . . . 44:1--44:?? Mengxin Nong and Lingfeng Huang and Mingtao Liu Allocation of Resources for Cloud Survivability in Smart Manufacturing . . 45:1--45:?? Usman Ahmed and Jerry Chun-Wei Lin and Gautam Srivastava Heterogeneous Energy-aware Load Balancing for Industry 4.0 and IoT Environments . . . . . . . . . . . . . . 46:1--46:?? Yu-Chia Chen and Sin-Ye Jhong and Chih-Hsien Hsia Roadside Unit-based Unknown Object Detection in Adverse Weather Conditions for Smart Internet of Vehicles . . . . . 47:1--47:??
Christian Janiesch and Marcus Fischer and Florian Imgrund and Adrian Hofmann and Axel Winkelmann An Architecture Using Payment Channel Networks for Blockchain-based Wi-Fi Sharing . . . . . . . . . . . . . . . . 1:1--1:?? Mohammad Amin Morid and Olivia R. Liu Sheng and Joseph Dunbar Time Series Prediction Using Deep Learning Methods in Healthcare . . . . . 2:1--2:?? Shuang (Sophie) Zhai and Zhu (Drew) Zhang Read the News, Not the Books: Forecasting Firms' Long-term Financial Performance via Deep Text Mining . . . . 3:1--3:?? Kimia Ameri and Michael Hempel and Hamid Sharif and Juan Lopez and Kalyan Perumalla Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems . . . . . . . . . . . . . . . . 4:1--4:?? Amogh Manoj Joshi and Deepak Ranjan Nayak and Dibyasundar Das and Yudong Zhang LiMS-Net: a Lightweight Multi-Scale CNN for COVID-19 Detection from Chest CT Scans . . . . . . . . . . . . . . . . . 5:1--5:?? Jan-Peter Kucklick and Oliver Müller Tackling the Accuracy-Interpretability Trade-off: Interpretable Deep Learning Models for Satellite Image-based Real Estate Appraisal . . . . . . . . . . . . 6:1--6:?? Patricia Akello and Naga Vemprala and Nicole Lang Beebe and Kim-Kwang Raymond Choo Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence . . . . . 7:1--7:?? Xue Chen and Cheng Wang and Qing Yang and Teng Hu and Changjun Jiang The Opportunity in Difficulty: a Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection . . . . . . . . . . . . 8:1--8:?? Yixiang Hu and Xiaoheng Deng and Congxu Zhu and Xuechen Chen and Laixin Chi Resource Allocation for Heterogeneous Computing Tasks in Wirelessly Powered MEC-enabled IIOT Systems . . . . . . . . 9:1--9:?? Alan Hevner and Veda Storey Research Challenges for the Design of Human-Artificial Intelligence Systems (HAIS) . . . . . . . . . . . . . . . . . 10:1--10:?? Marlon Dumas and Fabiana Fournier and Lior Limonad and Andrea Marrella and Marco Montali and Jana-Rebecca Rehse and Rafael Accorsi and Diego Calvanese and Giuseppe De Giacomo and Dirk Fahland and Avigdor Gal and Marcello La Rosa and Hagen Völzer and Ingo Weber AI-augmented Business Process Management Systems: a Research Manifesto . . . . . 11:1--11:??
Gondy Leroy and Bengisu Tulu and Xiao Liu Introduction to the Special Issue on Design and Data Science Research in Healthcare . . . . . . . . . . . . . . . 12:1--12:?? Matt Baucum and Anahita Khojandi and Carole Myers and Larry Kessler Optimizing Substance Use Treatment Selection Using Reinforcement Learning 13:1--13:?? Christina C. Bartenschlager and Stefanie S. Ebel and Sebastian Kling and Janne Vehreschild and Lutz T. Zabel and Christoph D. Spinner and Andreas Schuler and Axel R. Heller and Stefan Borgmann and Reinhard Hoffmann and Siegbert Rieg and Helmut Messmann and Martin Hower and Jens O. Brunner and Frank Hanses and Christoph Römmele COVIDAL: a Machine Learning Classifier for Digital COVID-19 Diagnosis in German Hospitals . . . . . . . . . . . . . . . 14:1--14:?? Sanne van der Linden and Rita Sevastjanova and Mathias Funk and Mennatallah El-Assady MediCoSpace: Visual Decision-Support for Doctor-Patient Consultations using Medical Concept Spaces from EHRs . . . . 15:1--15:?? Pascal Fechner and Fabian König and Wolfgang Kratsch and Jannik Lockl and Maximilian Röglinger Near-Infrared Spectroscopy for Bladder Monitoring: a Machine Learning Approach 16:1--16:?? Karthik Srinivasan and Jinhang Jiang Examining Disease Multimorbidity in U.S. Hospital Visits Before and During COVID-19 Pandemic: a Graph Analytics Approach . . . . . . . . . . . . . . . . 17:1--17:?? Karthik Srinivasan and Faiz Currim and Sudha Ram A Human-in-the-Loop Segmented Mixed-Effects Modeling Method for Analyzing Wearables Data . . . . . . . . 18:1--18:?? Yidong Chai and Hongyan Liu and Jie Xu and Sagar Samtani and Yuanchun Jiang and Haoxin Liu A Multi-Label Classification with an Adversarial-Based Denoising Autoencoder for Medical Image Annotation . . . . . . 19:1--19:?? Moshe Unger and Pan Li and Sahana (Shahana) Sen and Alexander Tuzhilin Don't Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings . . . . . . . . . . . . . . . 20:1--20:??
Rahul Mishra and Dharavath Ramesh and Salil S. Kanhere and Damodar Reddy Edla Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: a Redactable Blockchain Approach . . . . . . . . . . . . . . . . 21:1--21:?? Eran Rubin and Izak Benbasat Using Toulmin's Argumentation Model to Enhance Trust in Analytics-Based Advice Giving Systems . . . . . . . . . . . . . 22:1--22:?? Kelvin Du and Frank Xing and Erik Cambria Incorporating Multiple Knowledge Sources for Targeted Aspect-based Financial Sentiment Analysis . . . . . . . . . . . 23:1--23:?? Cecil Eng Huang Chua and Fred Niederman Situational Factor Determinants of the Allocation of Decision Rights to Edge Computers . . . . . . . . . . . . . . . 24:1--24:?? Michael Siering Peer-to-Peer (P2P) Lending Risk Management: Assessing Credit Risk on Social Lending Platforms Using Textual Factors . . . . . . . . . . . . . . . . 25:1--25:?? Dazhong Shen and Hengshu Zhu and Keli Xiao and Xi Zhang and Hui Xiong Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint Bayesian Learning . . . . . . . . . . . . . . . . 26:1--26:?? Gary Ang and Zhiling Guo and Ee-Peng Lim On Predicting ESG Ratings Using Dynamic Company Networks . . . . . . . . . . . . 27:1--27:??
Xin Li and Juhee Kwon and Balaji Padmanabhan and Pengzhu Zhang Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era . . . . . . . . . . . . . . . . . . 28:1--28:?? Tianjian Guo and Indranil Bardhan and Anjum Khurshid Social Determinants of Health and ER Utilization: Role of Information Integration during COVID-19 . . . . . . 29:1--29:?? Jayson Andrew Killoran and Tracy A. Jenkin and Jasmin Manseau ICT Interactions and COVID-19 --- a Theorization Across Two Pandemic Waves 30:1--30:?? Giovanni Pilato and Fabio Persia and Mouzhi Ge and Theodoros Chondrogiannis and Daniela D'Auria A Modular Social Sensing System for Personalized Orienteering in the COVID-19 Era . . . . . . . . . . . . . . 31:1--31:?? Xiao Zeng and David Ji and Dimple R. Thadani and Boying Li and Xiaodie Pu and Zhao Cai and Patrick Y. K. Chau Disentangling Affordances of Online Collaboration Tools for Mutual Aid in Emergencies: Insights from the COVID-19 Lockdown . . . . . . . . . . . . . . . . 32:1--32:??
Pei-Chi Lo and Ee-Peng Lim Non-monotonic Generation of Knowledge Paths for Context Understanding . . . . 1:1--1:?? Moufida Aouachria and Abderrahmane Leshob and Abdessamed Réda Ghomari and Mustapha Aouache A Process Mining Method for Inter-organizational Business Process Integration . . . . . . . . . . . . . . 2:1--2:?? Norman Pytel and Christian Ziegler and Axel Winkelmann From Dissonance to Dialogue: a Token-Based Approach to Bridge the Gap Between Manufacturers and Customers . . 3:1--3:?? Veda C. Storey and Richard Baskerville Design with Simon's Inner and Outer Environments: Theoretical Foundations for Design Science Research Methods for Digital Science . . . . . . . . . . . . 4:1--4:?? Joaquin Delgado Fernandez and Tom Barbereau and Orestis Papageorgiou Agent-Based Model of Initial Token Allocations: Simulating Distributions post Fair Launch . . . . . . . . . . . . 5:1--5:?? Giovanni Quattrocchi and Willem-Jan van den Heuvel and Damian Andrew Tamburri The Data Product-service Composition Frontier: a Hybrid Learning Approach . . 6:1--6:??
Natalia Denisenko and Youzhi Zhang and Chiara Pulice and Shohini Bhattasali and Sushil Jajodia and Philip Resnik and V. S. Subrahmanian A Psycholinguistics-inspired Method to Counter IP Theft Using Fake Documents 7:1--7:?? Pei-Xuan Li and Yu-En Chang and Ming-Chun Wei and Hsun-Ping Hsieh Estimating Future Financial Development of Urban Areas for Deploying Bank Branches: a Local-Regional Interpretable Model . . . . . . . . . . . . . . . . . 8:1--8:?? Youxi Wu and Zhen Wang and Yan Li and Yingchun Guo and He Jiang and Xingquan Zhu and Xindong Wu Co-occurrence Order-preserving Pattern Mining with Keypoint Alignment for Time Series . . . . . . . . . . . . . . . . . 9:1--9:?? Jessica Qiuhua Sheng and Da Xu and Paul Jen-Hwa Hu and Liang Li and Ting-Shuo Huang Mining Multimorbidity Trajectories and Co-Medication Effects from Patient Data to Predict Post-Hip Fracture Outcomes 10:1--10:??
Yijun Chen and Reuben Kirkham Exploring How UK Public Authorities Use Redaction to Protect Personal Information . . . . . . . . . . . . . . 11:1--11:?? Thiti Suttaket and Stanley Kok Interpretable Predictive Models for Healthcare via Rational Multi-Layer Perceptrons . . . . . . . . . . . . . . 12:1--12:?? Houssem Eddine Degha and Fatima Zohra Laallam ICA-CRMAS: Intelligent Context-Awareness Approach for Citation Recommendation based on Multi-Agent System . . . . . . 13:1--13:?? Chenglong Zhang and Varghese S. Jacob and Young U. Ryu Modeling Individual Fairness Beliefs and Its Applications . . . . . . . . . . . . 14:1--14:??
Moe Esmaeili and Moez Farokhnia Hamedani and Daniel Zantedeschi and Calvin Sorush Khalesi Election Interference and Online Propaganda Campaigns: Dynamic Interdependencies on Facebook, Google Trends, and the New York Times . . . . . 15:1--15:?? Victor Benjamin Considering Socially Scalable Human--Robot Interfaces . . . . . . . . 16:1--16:?? Yutong Guo* and Chao Ban and Jiang Yang and Khim-Yong Goh and Xiao Liu and Xixian Peng and Xiaobo Li Analyzing and Predicting Consumer Response to Short Videos in E-Commerce 17:1--17:??