Last update:
Thu Oct 2 12:12:41 MDT 2025
Hsinchun Chen Editorial: Welcome to the first issue of
ACM TMIS . . . . . . . . . . . . . . . . 1:1--1:??
Gordon B. Davis and
Paul Gray and
Stuart Madnick and
Jay F. Nunamaker and
Ralph Sprague and
Andrew Whinston Ideas for the future of the IS field . . 2:1--2:??
Jingguo Wang and
Nan Xiao and
H. Raghav Rao Drivers of information security search
behavior: an investigation of network
attacks and vulnerability disclosures 3:1--3:??
Sulin Ba and
Dan Ke and
Jan Stallaert and
Zhongju Zhang Why give away something for nothing?
Investigating virtual goods pricing and
permission strategies . . . . . . . . . 4:1--4:??
Lan Cao and
Balasubramaniam Ramesh and
Tarek Abdel-Hamid Modeling dynamics in agile software
development . . . . . . . . . . . . . . 5:1--5:??
Ofer Arazy and
Arie Croitoru The sustainability of corporate wikis: a
time-series analysis of activity
patterns . . . . . . . . . . . . . . . . 6:1--6:??
Yu Fu and
Zhiyuan Chen and
Gunes Koru and
Aryya Gangopadhyay A privacy protection technique for
publishing data mining models and
research data . . . . . . . . . . . . . 7:1--7:??
Hsinchun Chen Editorial: Design science, grand
challenges, and societal impacts . . . . 1:1--1:??
Michael Chau Visualizing Web search results using
glyphs: Design and evaluation of a
flower metaphor . . . . . . . . . . . . 2:1--2:??
Feng-Yang Kuo and
Chun-Po Yin A linguistic analysis of group support
systems interactions for uncovering
social realities of organizations . . . 3:1--3:??
Gerald C. Kane A multimethod study of information
quality in wiki collaboration . . . . . 4:1--4:??
Gregory S. Dawson and
Richard T. Watson Uncovering and testing archetypes of
effective public sector CIOs . . . . . . 5:1--5:??
Debabrata Dey and
Ming Fan and
Gang Peng Computer use and wage returns: The
complementary roles of IT-related human
capital and nonroutine tasks . . . . . . 6:1--6:??
Paul Jen-Hwa Hu and
Hsinchun Chen Analyzing information systems
researchers' productivity and impacts: a
perspective on the $H$ index . . . . . . 7:1--7:??
Sudip Bhattacharjee and
Ram D. Gopal and
James R. Marsden and
Ramesh Sankaranarayanan Digital goods and markets: Emerging
issues and challenges . . . . . . . . . 8:1--8:??
Matthias W. Uhl Explaining U.S. consumer behavior with
news sentiment . . . . . . . . . . . . . 9:1--9:??
Anna Ye Du and
Sanjukta Das and
Ram D. Gopal and
R. Ramesh Risk hedging in storage grid markets: Do
options add value to forwards? . . . . . 10:1--10:??
Jun Liu and
Sudha Ram Who does what: Collaboration patterns in
the Wikipedia and their impact on
article quality . . . . . . . . . . . . 11:1--11:??
D. Harrison Mcknight and
Michelle Carter and
Jason Bennett Thatcher and
Paul F. Clay Trust in a specific technology: an
investigation of its components and
measures . . . . . . . . . . . . . . . . 12:1--12:??
Alexander Tuzhilin Knowledge management revisited: Old
Dogs, New tricks . . . . . . . . . . . . 13:1--13:??
Juliana Sutanto and
Atreyi Kankanhalli and
Bernard Cheng Yian Tan Eliciting a sense of virtual community
among knowledge contributors . . . . . . 14:1--14:??
Jing Peng and
Daniel D. Zeng and
Zan Huang Latent subject-centered modeling of
collaborative tagging: an application in
social search . . . . . . . . . . . . . 15:1--15:??
Mohammad M. Masud and
Tahseen M. Al-Khateeb and
Kevin W. Hamlen and
Jing Gao and
Latifur Khan and
Jiawei Han and
Bhavani Thuraisingham Cloud-based malware detection for
evolving data streams . . . . . . . . . 16:1--16:??
Susanne Schmidt-Rauch and
Gerhard Schwabe From telesales to tele-advisory in
travel agencies: Business problems,
generic design goals and requirements 17:1--17:??
Ke-Wei Huang and
Zhuolun Li A multilabel text classification
algorithm for labeling risk factors in
SEC form 10-K . . . . . . . . . . . . . 18:1--18:??
Ming-Chih Lin and
Anthony J. T. Lee and
Rung-Tai Kao and
Kuo-Tay Chen Stock price movement prediction using
representative prototypes of financial
reports . . . . . . . . . . . . . . . . 19:1--19:??
Jay F. Nunamaker, Jr. and
Robert O. Briggs Toward a broader vision for Information
Systems . . . . . . . . . . . . . . . . 20:1--20:??
Balaji Padmanabhan and
Alan Hevner and
Michael Cuenco and
Crystal Shi From information to operations: Service
quality and customer retention . . . . . 21:1--21:??
Huaxia Rui and
Andrew Whinston Designing a social-broadcasting-based
business intelligence system . . . . . . 22:1--22:??
Hina Arora and
T. S. Raghu and
Ajay Vinze Decision support for containing pandemic
propagation . . . . . . . . . . . . . . 23:1--23:??
Paulo Goes and
Noyan Ilk and
Wei T. Yue and
J. Leon Zhao Live-chat agent assignments to
heterogeneous e-customers under
imperfect classification . . . . . . . . 24:1--24:??
Raymond Y. K. Lau and
S. Y. Liao and
Ron Chi-Wai Kwok and
Kaiquan Xu and
Yunqing Xia and
Yuefeng Li Text mining and probabilistic language
modeling for online review spam
detection . . . . . . . . . . . . . . . 25:1--25:??
Frederik Marx and
Jörg H. Mayer and
Robert Winter Six principles for redesigning executive
information systems-findings of a survey
and evaluation of a prototype . . . . . 26:1--26:??
Fred Niederman and
Salvatore T. March Design science and the accumulation of
knowledge in the information systems
discipline . . . . . . . . . . . . . . . 1:1--1:??
K. Asli Basoglu and
Mark A. Fuller and
Joseph S. Valacich Enhancement of recall within
technology-mediated teams through the
use of online visual artifacts . . . . . 2:1--2:??
Gediminas Adomavicius and
Jingjing Zhang Impact of data characteristics on
recommender systems performance . . . . 3:1--3:??
William N. Robinson and
Arash Akhlaghi and
Tianjie Deng and
Ali Raza Syed Discovery and diagnosis of behavioral
transitions in patient event streams . . 4:1--4:??
Zhu Zhang and
Xin Li and
Yubo Chen Deciphering word-of-mouth in social
media: Text-based metrics of consumer
reviews . . . . . . . . . . . . . . . . 5:1--5:??
Arvind Malhotra and
Ann Majchrzak How virtual teams use their virtual
workspace to coordinate knowledge . . . 6:1--6:??
Wil van der Aalst Process Mining: Overview and
Opportunities . . . . . . . . . . . . . 7:1--7:??
Zhe Shan and
Akhil Kumar Optimal Adapter Creation for Process
Composition in Synchronous vs.
Asynchronous Communication . . . . . . . 8:1--8:??
Zan Huang and
Huimin Zhao and
Dan Zhu Two New Prediction-Driven Approaches to
Discrete Choice Prediction . . . . . . . 9:1--9:??
Thomas L. Ngo-Ye and
Atish P. Sinha Analyzing Online Review Helpfulness
Using a Regressional ReliefF-Enhanced
Text Mining Method . . . . . . . . . . . 10:1--10:??
Philipp Nussbaumer and
Inu Matter and
Gerhard Schwabe ``Enforced'' vs. ``Casual'' Transparency
--- Findings from IT-Supported Financial
Advisory Encounters . . . . . . . . . . 11:1--11:??
Roger H. L. Chiang and
Paulo Goes and
Edward A. Stohr Business Intelligence and Analytics
Education, and Program Development: a
Unique Opportunity for the Information
Systems Discipline . . . . . . . . . . . 12:1--12:??
Palakorn Achananuparp and
Ee-Peng Lim and
Jing Jiang and
Tuan-Anh Hoang Who is Retweeting the Tweeters?
Modeling, Originating, and Promoting
Behaviors in the Twitter Network . . . . 13:1--13:??
Hsin-Min Lu and
Feng-Tse Tsai and
Hsinchun Chen and
Mao-Wei Hung and
Shu-Hsing Li Credit Rating Change Modeling Using News
and Financial Ratios . . . . . . . . . . 14:1--14:??
Wei Wei and
Sudha Ram Using a Network Analysis Approach for
Organizing Social Bookmarking Tags and
Enabling Web Content Discovery . . . . . 15:1--15:??
Nan Hu and
Hasan Cavusoglu and
Ling Liu and
Chenkai Ni Do Vendors' Pricing Decisions Fully
Reflect Information in Online Reviews? 16:1--16:??
Ee-Peng Lim and
Hsinchun Chen and
Guoqing Chen Business Intelligence and Analytics:
Research Directions . . . . . . . . . . 17:1--17:??
Bin Zhang and
Andrew C. Thomas and
Patrick Doreian and
David Krackhardt and
Ramayya Krishnan Contrasting Multiple Social Network
Autocorrelations for Binary Outcomes,
With Applications To Technology Adoption 18:1--18:??
Nargis Pervin and
Fang Fang and
Anindya Datta and
Kaushik Dutta and
Debra Vandermeer Fast, Scalable, and Context-Sensitive
Detection of Trending Topics in
Microblog Post Streams . . . . . . . . . 19:1--19:??
Zhu Zhang and
Chenhui Guo and
Paulo Goes Product Comparison Networks for
Competitive Analysis of Online
Word-of-Mouth . . . . . . . . . . . . . 20:1--20:??
Niam Yaraghi and
Anna Ye Du and
Raj Sharman and
Ram D. Gopal and
R. Ramesh Network Effects in Health Information
Exchange Growth . . . . . . . . . . . . 1:1--1:??
Rohit Valecha and
Raj Sharman and
H. Raghav Rao and
Shambhu Upadhyaya A Dispatch-Mediated Communication Model
for Emergency Response Systems . . . . . 2:1--2:??
Jae Choi and
Derek L. Nazareth and
Hemant K. Jain The Impact of SOA Implementation on
IT-Business Alignment: a System Dynamics
Approach . . . . . . . . . . . . . . . . 3:1--3:??
Azmat Ullah and
Richard Lai A Systematic Review of Business and
Information Technology Alignment . . . . 4:1--4:??
T. Grandon Gill and
Alan R. Hevner A Fitness-Utility Model for Design
Science Research . . . . . . . . . . . . 5:1--5:??
Jiming Wu and
Clyde W. Holsapple Does Knowledge Management Matter? The
Empirical Evidence from Market-Based
Valuation . . . . . . . . . . . . . . . 6:1--6:??
Levent V. Orman Bayesian Inference in Trust Networks . . 7:1--7:??
Zhu Zhang and
Daniel D. Zeng and
Ahmed Abbasi and
Jing Peng and
Xiaolong Zheng A Random Walk Model for Item
Recommendation in Social Tagging Systems 8:1--8:??
Douglas C. Derrick and
Thomas O. Meservy and
Jeffrey L. Jenkins and
Judee K. Burgoon and
Jay F. Nunamaker, Jr. Detecting Deceptive Chat-Based
Communication Using Typing Behavior and
Message Cues . . . . . . . . . . . . . . 9:1--9:??
Suprateek Sarker and
Suranjan Chakraborty and
Patriya Silpakit Tansuhaj and
Mark Mulder and
Kivilcim Dogerlioglu-Demir The ``Mail-Order-Bride'' (MOB)
Phenomenon in the Cyberworld: an
Interpretive Investigation . . . . . . . 10:1--10:??
Narges Kasiri and
Ramesh Sharda Real Options and System Dynamics for
Information Technology Investment
Decisions: Application to RFID Adoption
in Retail . . . . . . . . . . . . . . . 11:1--11:??
George Mathew and
Zoran Obradovic Distributed Privacy-Preserving Decision
Support System for Highly Imbalanced
Clinical Data . . . . . . . . . . . . . 12:1--12:??
Masato Sakata and
Zeynep Yücel and
Kazuhiko Shinozawa and
Norihiro Hagita and
Michita Imai and
Michiko Furutani and
Rumiko Matsuoka An Inference Engine for Estimating
Outside States of Clinical Test Items 13:1--13:??
Alex Edgcomb and
Frank Vahid Accurate and Efficient Algorithms that
Adapt to Privacy-Enhanced Video for
Improved Assistive Monitoring . . . . . 14:1--14:??
Christopher C. Yang and
Gondy Leroy and
Sophia Ananiadou Smart Health and Wellbeing . . . . . . . 15:1--15:??
Zidong Wang and
Julie Eatock and
Sally McClean and
Dongmei Liu and
Xiaohui Liu and
Terry Young Modeling Throughput of Emergency
Departments via Time Series: an
Expectation Maximization Algorithm . . . 16:1--16:??
He Zhang and
Sanjay Mehotra and
David Liebovitz and
Carl A. Gunter and
Bradley Malin Mining Deviations from Patient Care
Pathways via Electronic Medical Record
System Audits . . . . . . . . . . . . . 17:1--17:??
Rajiv Khosla and
Mei-Tai Chu Embodying Care in Matilda: an Affective
Communication Robot for Emotional
Wellbeing of Older People in Australian
Residential Care Facilities . . . . . . 18:1--18:??
Christine Lisetti and
Reza Amini and
Ugan Yasavur and
Naphtali Rishe I Can Help You Change! An Empathic
Virtual Agent Delivers Behavior Change
Health Interventions . . . . . . . . . . 19:1--19:??
Rajesh Mirani and
Anju Harpalani Business Benefits or Incentive
Maximization? Impacts of the Medicare
EHR Incentive Program at Acute Care
Hospitals . . . . . . . . . . . . . . . 20:1--20:??
Joyce C. Ho and
Cheng H. Lee and
Joydeep Ghosh Septic Shock Prediction for Patients
with Missing Data . . . . . . . . . . . 1:1--1:??
Christopher C. Yang and
Haodong Yang and
Ling Jiang Postmarketing Drug Safety Surveillance
Using Publicly Available
Health-Consumer-Contributed Content in
Social Media . . . . . . . . . . . . . . 2:1--2:??
Salah Bouktif and
Houari Sahraoui and
Faheem Ahmed Predicting Stability of Open-Source
Software Systems Using Combination of
Bayesian Classifiers . . . . . . . . . . 3:1--3:??
Lihua Huang and
Sulin Ba and
Xianghua Lu Building Online Trust in a Culture of
Confucianism: The Impact of Process
Flexibility and Perceived Control . . . 4:1--4:??
M. Lisa Yeo and
Erik Rolland and
Jackie Rees Ulmer and
Raymond A. Patterson Risk Mitigation Decisions for IT
Security . . . . . . . . . . . . . . . . 5:1--5:??
S. E. Goodman Building the Nation's Cyber Security
Workforce: Contributions from the CAE
Colleges and Universities . . . . . . . 6:1--6:??
Suruchi Deodhar and
Keith R. Bisset and
Jiangzhuo Chen and
Yifei Ma and
Madhav V. Marathe An Interactive, Web-Based High
Performance Modeling Environment for
Computational Epidemiology . . . . . . . 7:1--7:??
Patty Kostkova and
Martin Szomszor and
Connie St. Luis #swineflu: The Use of Twitter as an
Early Warning and Risk Communication
Tool in the 2009 Swine Flu Pandemic . . 8:1--8:??
Chih-Fong Tsai and
Zen-Yu Quan Stock Prediction by Searching for
Similarities in Candlestick Charts . . . 9:1--9:??
Matthias Jarke and
Kalle Lyytinen Editorial: ``Complexity of Systems
Evolution: Requirements Engineering
Perspective'' . . . . . . . . . . . . . 11:1--11:??
Gilbert Fridgen and
Julia Klier and
Martina Beer and
Thomas Wolf Improving Business Value Assurance in
Large-Scale IT Projects --- a
Quantitative Method Based on Founded
Requirements Assessment . . . . . . . . 12:1--12:??
John Leslie King and
Carl P. Simon Complications with Complexity in
Requirements . . . . . . . . . . . . . . 13:1--13:??
Suranjan Chakraborty and
Christoph Rosenkranz and
Josh Dehlinger Getting to the Shalls: Facilitating
Sensemaking in Requirements Engineering 14:1--14:??
Md Rashed I. Nekvi and
Nazim H. Madhavji Impediments to Regulatory Compliance of
Requirements in Contractual Systems
Engineering Projects: a Case Study . . . 15:1--15:??
Radhika Jain and
Lan Cao and
Kannan Mohan and
Balasubramaniam Ramesh Situated Boundary Spanning: an Empirical
Investigation of Requirements
Engineering Practices in Product Family
Development . . . . . . . . . . . . . . 16:1--16:??
Ivan J. Jureta and
Alexander Borgida and
Neil A. Ernst and
John Mylopoulos The Requirements Problem for Adaptive
Systems . . . . . . . . . . . . . . . . 17:1--17:??
G. Alan Wang and
Harry Jiannan Wang and
Jiexun Li and
Alan S. Abrahams and
Weiguo Fan An Analytical Framework for
Understanding Knowledge-Sharing
Processes in Online Q&A Communities . . . 18:1--18:??
Andrew Partington and
Moe Wynn and
Suriadi Suriadi and
Chun Ouyang and
Jonathan Karnon Process Mining for Clinical Processes: a
Comparative Analysis of Four Australian
Hospitals . . . . . . . . . . . . . . . 19:1--19:??
Jiaqi Yan and
Daning Hu and
Stephen S. Liao and
Huaiqing Wang Mining Agents' Goals in Agent-Oriented
Business Processes . . . . . . . . . . . 20:1--20:??
Thushari Silva and
Ma Jian and
Yang Chen Process Analytics Approach for R&D
Project Selection . . . . . . . . . . . 21:1--21:??
Xitong Guo and
Sherry X. Sun and
Doug Vogel A Dataflow Perspective for Business
Process Integration . . . . . . . . . . 22:1--22:??
Jie Jiang and
Huib Aldewereld and
Virginia Dignum and
Yao-Hua Tan Compliance Checking of Organizational
Interactions . . . . . . . . . . . . . . 23:1--23:??
Claudio Di Ciccio and
Massimo Mecella On the Discovery of Declarative Control
Flows for Artful Processes . . . . . . . 24:1--24:??
Thorben Keller and
Frédéric Thiesse and
Elgar Fleisch Classification Models for RFID-Based
Real-Time Detection of Process Events in
the Supply Chain: an Empirical Study . . 25:1--25:??
Donald J. Berndt and
James A. McCart and
Dezon K. Finch and
Stephen L. Luther A Case Study of Data Quality in Text
Mining Clinical Progress Notes . . . . . 1:1--1:??
David Zimbra and
Hsinchun Chen and
Robert F. Lusch Stakeholder Analyses of Firm-Related Web
Forums: Applications in Stock Return
Prediction . . . . . . . . . . . . . . . 2:1--2:??
Shing-Han Li and
Yu-Cheng Kao and
Zong-Cyuan Zhang and
Ying-Ping Chuang and
David C. Yen A Network Behavior-Based Botnet
Detection Mechanism Using PSO and
$K$-means . . . . . . . . . . . . . . . 3:1--3:??
Yen-Hsien Lee and
Paul Jen-Hwa Hu and
Ching-Yi Tu Ontology-Based Mapping for Automated
Document Management: a Concept-Based
Technique for Word Mismatch and
Ambiguity Problems in Document
Clustering . . . . . . . . . . . . . . . 4:1--4:??
Juliana Sutanto and
Atreyi Kankanhalli and
Bernard Cheng Yian Tan Investigating Task Coordination in
Globally Dispersed Teams: a Structural
Contingency Perspective . . . . . . . . 5:1--5:??
Rahul C. Basole and
Martha G. Russell and
Jukka Huhtamäki and
Neil Rubens and
Kaisa Still and
Hyunwoo Park Understanding Business Ecosystem
Dynamics: a Data-Driven Approach . . . . 6:1--6:??
Xiaohui Zhao and
Chengfei Liu and
Sira Yongchareon and
Marek Kowalkiewicz and
Wasim Sadiq Role-Based Process View Derivation and
Composition . . . . . . . . . . . . . . 7:1--7:??
Dengpan Liu and
Sumit Sarkar and
Chelliah Sriskandarajah Who's Next? Scheduling Personalization
Services with Variable Service Times . . 8:1--8:??
Xue Bai and
James R. Marsden and
William T. Ross, Jr. and
Gang Wang Relationships Among Minimum
Requirements, Facebook Likes, and
Groupon Deal Outcomes . . . . . . . . . 9:1--9:??
Tanmay Bhowmik and
Nan Niu and
Prachi Singhania and
Wentao Wang On the Role of Structural Holes in
Requirements Identification: an
Exploratory Study on Open-Source
Software Development . . . . . . . . . . 10:1--10:??
Devipsita Bhattacharya and
Sudha Ram RT @News: an Analysis of News Agency Ego
Networks in a Microblogging Environment 11:1--11:??
Arindam Roy and
Shamik Sural and
Arun Kumar Majumdar and
Jaideep Vaidya and
Vijayalakshmi Atluri Minimizing Organizational User
Requirement while Meeting Security
Constraints . . . . . . . . . . . . . . 12:1--12:??
Carlos A. Gomez-Uribe and
Neil Hunt The Netflix Recommender System:
Algorithms, Business Value, and
Innovation . . . . . . . . . . . . . . . 13:1--13:??
Rajiv Krishnamurthy and
Varghese Jacob and
Suresh Radhakrishnan and
Kutsal Dogan Peripheral Developer Participation in
Open Source Projects: an Empirical
Analysis . . . . . . . . . . . . . . . . 14:1--14:??
Christos Liaskos and
Ageliki Tsioliaridou Service Ratio-Optimal, Content
Coherence-Aware Data Push Systems . . . 15:1--15:??
Xianghua Lu and
Xia Zhao and
Ling Xue Is Combining Contextual and Behavioral
Targeting Strategies Effective in Online
Advertising? . . . . . . . . . . . . . . 1:1--1:??
Tsz-Wai Lui and
Gabriele Piccoli The Effect of a Multichannel Customer
Service System on Customer Service and
Financial Performance . . . . . . . . . 2:1--2:??
Yutian Sun and
Jianwen Su and
Jian Yang Universal Artifacts: a New Approach to
Business Process Management (BPM)
Systems . . . . . . . . . . . . . . . . 3:1--3:??
Shing-Han Li and
David C. Yen and
Ying-Ping Chuang A Real-Time Audit Mechanism Based on the
Compression Technique . . . . . . . . . 4:1--4:??
Khayyam Hashmi and
Zaki Malik and
Erfan Najmi and
Amal Alhosban and
Brahim Medjahed A Web Service Negotiation Management and
QoS Dependency Modeling Framework . . . 5:1--5:??
Agam Gupta and
Biswatosh Saha and
Uttam K. Sarkar Systemic Concentration in Sponsored
Search Markets: The Role of Time Window
in Click-Through-Rate Computation . . . 6:1--6:??
Ming-Feng Tsai and
Chuan-Ju Wang and
Po-Chuan Chien Discovering Finance Keywords via
Continuous-Space Language Models . . . . 7:1--7:??
Corentin Burnay Are Stakeholders the Only Source of
Information for Requirements Engineers?
Toward a Taxonomy of Elicitation
Information Sources . . . . . . . . . . 8:1--8:??
Jiajie Xu and
Chengfei Liu and
Xiaohui Zhao and
Sira Yongchareon and
Zhiming Ding Resource Management for Business Process
Scheduling in the Presence of
Availability Constraints . . . . . . . . 9:1--9:??
Arindam Roy and
Shamik Sural and
Arun Kumar Majumdar and
Jaideep Vaidya and
Vijayalakshmi Atluri On Optimal Employee Assignment in
Constrained Role-Based Access Control
Systems . . . . . . . . . . . . . . . . 10:1--10:??
Hao Chen and
Keli Xiao and
Jinwen Sun and
Song Wu A Double-Layer Neural Network Framework
for High-Frequency Forecasting . . . . . 11:1--11:??
Yan Lu and
Michael Chau and
Patrick Y. K. Chau Are Sponsored Links Effective?
Investigating the Impact of Trust in
Search Engine Advertising . . . . . . . 12:1--12:??
Anastasiia Pika and
Michael Leyer and
Moe T. Wynn and
Colin J. Fidge and
Arthur H. M. Ter Hofstede and
Wil M. P. Van Der Aalst Mining Resource Profiles from Event Logs 1:1--1:??
Saeede Eftekhari and
Niam Yaraghi and
Ranjit Singh and
Ram D. Gopal and
R. Ramesh Do Health Information Exchanges Deter
Repetition of Medical Services? . . . . 2:1--2:??
Adarsh Kumar Kakar Investigating the Relationships Between
the Use Contexts, User Perceived Values,
and Loyalty to a Software Product . . . 3:1--3:??
Sudip Bhattacharjee and
Varghese Jacob and
Zhengrui (Jeffrey) Jiang and
Subodha Kumar Introduction to WITS 2015 Special Issue
in TMIS . . . . . . . . . . . . . . . . 4:1--4:??
Shuyuan Deng and
Atish P. Sinha and
Huimin Zhao Resolving Ambiguity in Sentiment
Classification: The Role of Dependency
Features . . . . . . . . . . . . . . . . 4:1--4:??
Mohammad A. Al-Ramahi and
Jun Liu and
Omar F. El-Gayar Discovering Design Principles for Health
Behavioral Change Support Systems: a
Text Mining Approach . . . . . . . . . . 5:1--5:??
Can Sun and
Yonghua Ji and
Bora Kolfal and
Ray Patterson Business-to-Consumer Platform Strategy:
How Vendor Certification Changes
Platform and Seller Incentives . . . . . 6:1--6:??
Konstantin Bauman and
Alexander Tuzhilin and
Ryan Zaczynski Using Social Sensors for Detecting
Emergency Events: a Case of Power
Outages in the Electrical Utility
Industry . . . . . . . . . . . . . . . . 7:1--7:??
Michael Mannino and
Joel Fredrickson and
Farnoush Banaei-Kashani and
Iris Linck and
Raghda Alqurashi Raghda Development and Evaluation of a
Similarity Measure for Medical Event
Sequences . . . . . . . . . . . . . . . 8:1--8:??
Atefeh Taghavi and
Carson Woo The Role Clarity Framework to Improve
Requirements Gathering . . . . . . . . . 9:1--9:??
Anik Mukherjee and
R. P. Sundarraj and
Kaushik Dutta Apriori Rule-Based In-App Ad Selection
Online Algorithm for Improving
Supply-Side Platform Revenues . . . . . 10:1--10:??
Tuan Minh Ha and
Masaki Samejima and
Norihisa Komoda Power and Performance Estimation for
Fine-Grained Server Power Capping via
Controlling Heterogeneous Applications 11:1--11:??
Rahul C. Basole and
Timothy Major and
Arjun Srinivasan Understanding Alliance Portfolios Using
Visual Analytics . . . . . . . . . . . . 12:1--12:??
Joseph Cazier and
Benjamin Shao and
Robert St. Louis Value Congruence, Trust, and Their
Effects on Purchase Intention and
Reservation Price . . . . . . . . . . . 13:1--13:??
Roman Lukyanenko and
Binny M. Samuel Are All Classes Created Equal?
Increasing Precision of Conceptual
Modeling Grammars . . . . . . . . . . . 14:1--14:??
Zhepeng (Lionel) Li and
Xiao Fang and
Olivia R. Liu Sheng A Survey of Link Recommendation for
Social Networks: Methods, Theoretical
Foundations, and Future Research
Directions . . . . . . . . . . . . . . . 1:1--1:??
Keli Xiao and
Qi Liu and
Chuanren Liu and
Hui Xiong Price Shock Detection With an
Influence-Based Model of Social
Attention . . . . . . . . . . . . . . . 2:1--2:??
Suppawong Tuarob and
Ray Strong and
Anca Chandra and
Conrad S. Tucker Discovering Discontinuity in Big
Financial Transaction Data . . . . . . . 3:1--3:??
Jan Mendling and
Ingo Weber and
Wil Van Der Aalst and
Jan Vom Brocke and
Cristina Cabanillas and
Florian Daniel and
Sòren Debois and
Claudio Di Ciccio and
Marlon Dumas and
Schahram Dustdar and
Avigdor Gal and
Luciano García-Bañuelos and
Guido Governatori and
Richard Hull and
Marcello La Rosa and
Henrik Leopold and
Frank Leymann and
Jan Recker and
Manfred Reichert and
Hajo A. Reijers and
Stefanie Rinderle-Ma and
Andreas Solti and
Michael Rosemann and
Stefan Schulte and
Munindar P. Singh and
Tijs Slaats and
Mark Staples and
Barbara Weber and
Matthias Weidlich and
Mathias Weske and
Xiwei Xu and
Liming Zhu Blockchains for Business Process
Management --- Challenges and
Opportunities . . . . . . . . . . . . . 4:1--4:??
David Zimbra and
Ahmed Abbasi and
Daniel Zeng and
Hsinchun Chen The State-of-the-Art in Twitter
Sentiment Analysis: a Review and
Benchmark Evaluation . . . . . . . . . . 5:1--5:??
Rahul C. Basole and
Arjun Srinivasan and
Hyunwoo Park and
Shiv Patel ecoxight: Discovery, Exploration, and
Analysis of Business Ecosystems Using
Interactive Visualization . . . . . . . 6:1--6:??
Xiangyu Fan and
Xi Niu Implementing and Evaluating Serendipity
in Delivering Personalized Health
Information . . . . . . . . . . . . . . 7:1--7:??
Sandeep Purao and
Narasimha Bolloju and
Chuan-Hoo Tan A Modeling Language for Conceptual
Design of Systems Integration Solutions 8:1--8:??
Maria De-Arteaga and
William Herlands and
Daniel B. Neill and
Artur Dubrawski Machine Learning for the Developing
World . . . . . . . . . . . . . . . . . 9:1--9:??
Wolfgang Ketter and
John Collins and
Maytal Saar-Tsechansky and
Ori Marom Information Systems for a Smart
Electricity Grid: Emerging Challenges
and Opportunities . . . . . . . . . . . 10:1--10:??
Daniel Russo and
Paolo Ciancarini and
Tommaso Falasconi and
Massimo Tomasi A Meta-Model for Information Systems
Quality: a Mixed Study of the Financial
Sector . . . . . . . . . . . . . . . . . 11:1--11:??
Chen Zhu and
Hengshu Zhu and
Hui Xiong and
Chao Ma and
Fang Xie and
Pengliang Ding and
Pan Li Person-Job Fit: Adapting the Right
Talent for the Right Job with Joint
Representation Learning . . . . . . . . 12:1--12:??
John D. Delano and
Hemant K. Jain and
Atish P. Sinha System Design through the Exploration of
Contemporary Web Services . . . . . . . 13:1--13:??
Kar Kei Lo and
Michael Chau A Penny Is Worth a Thousand?
Investigating the Relationship Between
Social Media and Penny Stocks . . . . . 14:1--14:??
Bernhard Kratzwald and
Stefan Feuerriegel Putting Question-Answering Systems into
Practice: Transfer Learning for
Efficient Domain Customization . . . . . 15:1--15:??
Shuo Yu and
Hongyi Zhu and
Shan Jiang and
Yong Zhang and
Chunxiao Xing and
Hsinchun Chen Emoticon Analysis for Chinese Social
Media and E-commerce: The AZEmo System 16:1--16:??
Edward Hartono and
Clyde W. Holsapple Website Visual Design Qualities: a
Threefold Framework . . . . . . . . . . 1:1--1:??
Hu Xiong and
Yi Wang and
Wenchao Li and
Chien-Ming Chen Flexible, Efficient, and Secure Access
Delegation in Cloud Computing . . . . . 2:1--2:??
Majid Mohammadi and
Wout Hofman and
Yao-Hua Tan Simulated Annealing-based Ontology
Matching . . . . . . . . . . . . . . . . 3:1--3:??
Hojjat Emami A Graph-based Approach to Person Name
Disambiguation in Web . . . . . . . . . 4:1--4:??
Jian-Min Jiang and
Zhong Hong and
Yangyang Chen Modeling and Analyzing Incremental
Natures of Developing Software . . . . . 5:1--5:??
Hemant Jain and
T. S. Raghu and
Victoria Yoon and
Wei Thoo Yue Introduction to Special Section Based on
Papers Presented at the Workshop on
Information Technology and Systems, 2017 6:1--6:??
Paul Sutterer and
Stefan Waldherr and
Martin Bichler Are Truthful Bidders Paying too Much?
Efficiency and Revenue in Display Ad
Auctions . . . . . . . . . . . . . . . . 6:1--6:??
Xu Han and
Niam Yaraghi and
Ram Gopal Catching Them Red-Handed: Optimizing the
Nursing Homes' Rating System . . . . . . 7:1--7:??
Hasan B. Kartal and
Xiaoping Liu and
Xiao-Bai Li Differential Privacy for the Vast
Majority . . . . . . . . . . . . . . . . 8:1--8:??
Ranjan Pal and
Leana Golubchik and
Konstantions Psounis and
Tathagata Bandyopadhyay On Robust Estimates of Correlated Risk
in Cyber-Insured IT Firms: a First Look
at Optimal AI-Based Estimates under
``Small'' Data . . . . . . . . . . . . . 9:1--9:??
Hangjung Zo and
Derek L. Nazareth and
Hemant K. Jain Service-oriented Application Composition
with Evolutionary Heuristics and
Multiple Criteria . . . . . . . . . . . 10:1--10:??
Jianwei Lai and
Dongsong Zhang and
Sen Wang and
Isil Doga Yakut Kilic and
Lina Zhou ThumbStroke: a Virtual Keyboard in
Support of Sight-Free and One-Handed
Text Entry on Touchscreen Mobile Devices 11:1--11:??
Yin Kang and
Lina Zhou Helpfulness Assessment of Online
Reviews: The Role of Semantic Hierarchy
of Product Features . . . . . . . . . . 12:1--12:??
Jiyong Park and
Daegon Cho and
Jae Kyu Lee and
Byungtae Lee The Economics of Cybercrime: The Role of
Broadband and Socioeconomic Status . . . 13:1--13:??
Wingyan Chung and
Bingbing Rao and
Liqiang Wang Interaction Models for Detecting Nodal
Activities in Temporal Social Media
Networks . . . . . . . . . . . . . . . . 14:1--14:??
Jiawei Chen and
Hongyan Liu and
Yinghui (Catherine) Yang and
Jun He Effective Selection of a Compact and
High-Quality Review Set with Information
Preservation . . . . . . . . . . . . . . 15:1--15:??
Dietmar Jannach and
Michael Jugovac Measuring the Business Value of
Recommender Systems . . . . . . . . . . 16:1--16:??
Hongfei Li and
Ramesh Shankar and
Jan Stallaert Invested or Indebted: Ex-ante and
Ex-post Reciprocity in Online Knowledge
Sharing Communities . . . . . . . . . . 1:1--1:26
Mohsen Rezvani and
Mojtaba Rezvani A Randomized Reputation System in the
Presence of Unfair Ratings . . . . . . . 2:1--2:16
Li Ni and
Wenjian Luo and
Nannan Lu and
Wenjie Zhu Mining the Local Dependency Itemset in a
Products Network . . . . . . . . . . . . 3:1--3:31
Fabio Pierazzi and
Ghita Mezzour and
Qian Han and
Michele Colajanni and
V. S. Subrahmanian A Data-driven Characterization of Modern
Android Spyware . . . . . . . . . . . . 4:1--4:38
Ranjan Pal and
Konstantinos Psounis and
Jon Crowcroft and
Frank Kelly and
Pan Hui and
Sasu Tarkoma and
Abhishek Kumar and
John Kelly and
Aritra Chatterjee and
Leana Golubchik and
Nishanth Sastry and
Bodhibrata Nag When Are Cyber Blackouts in Modern
Service Networks Likely?: a Network
Oblivious Theory on Cyber (Re)Insurance
Feasibility . . . . . . . . . . . . . . 5:1--5:38
Tatiana Ermakova and
Benjamin Fabian and
Marta Kornacka and
Scott Thiebes and
Ali Sunyaev Security and Privacy Requirements for
Cloud Computing in Healthcare:
Elicitation and Prioritization from a
Patient Perspective . . . . . . . . . . 6:1--6:29
Haibing Lu and
Xi Chen and
Junmin Shi and
Jaideep Vaidya and
Vijayalakshmi Atluri and
Yuan Hong and
Wei Huang Algorithms and Applications to Weighted
Rank-one Binary Matrix Factorization . . 7:1--7:33
Moshe Unger and
Alexander Tuzhilin and
Amit Livne Context-Aware Recommendations Based on
Deep Learning Frameworks . . . . . . . . 8:1--8:15
Kaushik Dutta and
Xiao Fang and
Zhengrui (Jeffrey) Jiang Introduction to WITS 2018 Special Issue
in TMIS . . . . . . . . . . . . . . . . 9:1--9:2
Ram D. Gopal and
Hooman Hidaji and
Sule Nur Kutlu and
Raymond A. Patterson and
Erik Rolland and
Dmitry Zhdanov Real or Not?: Identifying Untrustworthy
News Websites Using Third-party
Partnerships . . . . . . . . . . . . . . 10:1--10:20
Liling Tan and
Maggie Yundi Li and
Stanley Kok E-Commerce Product Categorization via
Machine Translation . . . . . . . . . . 11:1--11:14
Xiangyu Wang and
Kang Zhao and
Xun Zhou and
Nick Street Predicting User Posting Activities in
Online Health Communities with Deep
Learning . . . . . . . . . . . . . . . . 12:1--12:15
Jie Tao and
Lina Zhou A Weakly Supervised WordNet-Guided Deep
Learning Approach to Extracting Aspect
Terms from Online Reviews . . . . . . . 13:1--13:22
Wensheng Gan and
Jerry Chun-Wei Lin and
Han-Chieh Chao and
Philippe Fournier-Viger and
Xuan Wang and
Philip S. Yu Utility-Driven Mining of Trend
Information for Intelligent System . . . 14:1--14:28
Nenavath Sreenu Cashless Payment Policy and Its Effects
on Economic Growth of India: an
Exploratory Study . . . . . . . . . . . 15:1--15:10
Asma Belhadi and
Youcef Djenouri and
Jerry Chun-Wei Lin and
Alberto Cano Trajectory Outlier Detection:
Algorithms, Taxonomies, Evaluation, and
Open Challenges . . . . . . . . . . . . 16:1--16:29
Sagar Samtani and
Murat Kantarcioglu and
Hsinchun Chen Trailblazing the Artificial Intelligence
for Cybersecurity Discipline: a
Multi-Disciplinary Research Roadmap . . 17:1--17:19
Anand Mudgerikar and
Puneet Sharma and
Elisa Bertino Edge-Based Intrusion Detection for IoT
devices . . . . . . . . . . . . . . . . 18:1--18:21
Martin Husák and
Tomás Bajtos and
Jaroslav Kaspar and
Elias Bou-Harb and
Pavel Celeda Predictive Cyber Situational Awareness
and Personalized Blacklisting: a
Sequential Rule Mining Approach . . . . 19:1--19:16
Mahdi R. Alagheband and
Atefeh Mashatan and
Morteza Zihayat Time-based Gap Analysis of Cybersecurity
Trends in Academic and Digital Media . . 20:1--20:20
Antonio Mangino and
Morteza Safaei Pour and
Elias Bou-Harb Internet-scale Insecurity of Consumer
Internet of Things: an Empirical
Measurements Perspective . . . . . . . . 21:1--21:24
Christopher Sweet and
Stephen Moskal and
Shanchieh Jay Yang On the Variety and Veracity of Cyber
Intrusion Alerts Synthesized by
Generative Adversarial Networks . . . . 22:1--22:21
Sharad Mehrotra and
Shantanu Sharma and
Jeffrey D. Ullman and
Dhrubajyoti Ghosh and
Peeyush Gupta and
Anurag Mishra PANDA: Partitioned Data Security on
Outsourced Sensitive and Non-sensitive
Data . . . . . . . . . . . . . . . . . . 23:1--23:41
Sicong Shao and
Cihan Tunc and
Amany Al-Shawi and
Salim Hariri An Ensemble of Ensembles Approach to
Author Attribution for Internet Relay
Chat Forensics . . . . . . . . . . . . . 24:1--24:25
Jay P. Kesan and
Linfeng Zhang Analysis of Cyber Incident Categories
Based on Losses . . . . . . . . . . . . 25:1--25:28
Henanksha Sainani and
Josephine M. Namayanja and
Guneeti Sharma and
Vasundhara Misal and
Vandana P. Janeja IP Reputation Scoring with
Geo-Contextual Feature Augmentation . . 26:1--26:29
Sagar Samtani and
Murat Kantarcioglu and
Hsinchun Chen A Multi-Disciplinary Perspective for
Conducting Artificial
Intelligence-enabled Privacy Analytics:
Connecting Data, Algorithms, and Systems 1:1--1:18
Razieh Nokhbeh Zaeem and
K. Suzanne Barber The Effect of the GDPR on Privacy
Policies: Recent Progress and Future
Promise . . . . . . . . . . . . . . . . 2:1--2:20
Tanuja Sudhakar and
Marina Gavrilova Deep Learning for Multi-instance
Biometric Privacy . . . . . . . . . . . 3:1--3:23
Gökhan Kul and
Shambhu Upadhyaya and
Andrew Hughes An Analysis of Complexity of Insider
Attacks to Databases . . . . . . . . . . 4:1--4:18
Dinesha Ranathunga and
Matthew Roughan and
Hung Nguyen Mathematical Reconciliation of Medical
Privacy Policies . . . . . . . . . . . . 5:1--5:18
Arindam Roy and
Shamik Sural and
Arun Kumar Majumdar and
Jaideep Vaidya and
Vijayalakshmi Atluri Optimal Employee Recruitment in
Organizations under Attribute-Based
Access Control . . . . . . . . . . . . . 6:1--6:24
Oluwafemi Akanfe and
Rohit Valecha and
H. Raghav Rao Design of an Inclusive Financial Privacy
Index (INF-PIE): a Financial Privacy and
Digital Financial Inclusion Perspective 7:1--7:21
Sarah A. Alkhodair and
Benjamin C. M. Fung and
Steven H. H. Ding and
William K. Cheung and
Shih-Chia Huang Detecting High-Engaging Breaking News
Rumors in Social Media . . . . . . . . . 8:1--8:16
Francesco Benedetto and
Loretta Mastroeni and
Pierluigi Vellucci Extraction of Information Content
Exchange in Financial Markets by an
Entropy Analysis . . . . . . . . . . . . 9:1--9:16
Ka Chung Ng and
Mike K. P. So and
Kar Yan Tam A Latent Space Modeling Approach to
Interfirm Relationship Analysis . . . . 10:1--10:44
Aristotle Onumo and
Irfan Ullah-Awan and
Andrea Cullen Assessing the Moderating Effect of
Security Technologies on Employees
Compliance with Cybersecurity Control
Procedures . . . . . . . . . . . . . . . 11:1--11:29
Asma Belhadi and
Youcef Djenouri and
Djamel Djenouri and
Tomasz Michalak and
Jerry Chun-Wei Lin Machine Learning for Identifying Group
Trajectory Outliers . . . . . . . . . . 12:1--12:25
Almas Abdibayev and
Dongkai Chen and
Haipeng Chen and
Deepti Poluru and
V. S. Subrahmanian Using Word Embeddings to Deter
Intellectual Property Theft through
Automated Generation of Fake Documents 13:1--13:22
Xingsi Xue and
Xiaojing Wu and
Junfeng Chen Optimizing Ontology Alignment Through an
Interactive Compact Genetic Algorithm 14:1--14:17
Youcef Djenouri and
Jerry Chun-Wei Lin and
Kjetil Nòrvåg and
Heri Ramampiaro and
Philip S. Yu Exploring Decomposition for Solving
Pattern Mining Problems . . . . . . . . 15:1--15:36
Mingfei Teng and
Hengshu Zhu and
Chuanren Liu and
Hui Xiong Exploiting Network Fusion for
Organizational Turnover Prediction . . . 16:1--16:18
Ranjan Pal and
Ziyuan Huang and
Sergey Lototsky and
Xinlong Yin and
Mingyan Liu and
Jon Crowcroft and
Nishanth Sastry and
Swades De and
Bodhibrata Nag Will Catastrophic Cyber-Risk Aggregation
Thrive in the IoT Age? A Cautionary
Economics Tale for (Re-)Insurers and
Likes . . . . . . . . . . . . . . . . . 17:1--17:36
Makiya Nakashima and
Alex Sim and
Youngsoo Kim and
Jonghyun Kim and
Jinoh Kim Automated Feature Selection for Anomaly
Detection in Network Traffic Data . . . 18:1--18:28
Lin Qiu and
Sruthi Gorantla and
Vaibhav Rajan and
Bernard C. Y. Tan Multi-disease Predictive Analytics: a
Clinical Knowledge-aware Approach . . . 19:1--19:34
Yan Leng and
Jinhua Zhao and
Haris Koutsopoulos Leveraging Individual and Collective
Regularity to Profile and Segment User
Locations from Mobile Phone Data . . . . 20:1--20:22
Xi Wang and
Yibo Chai and
Hui Li and
Wenbin Wang and
Weishan Sun Graph Convolutional Network-based Model
for Incident-related Congestion
Prediction: a Case Study of Shanghai
Expressways . . . . . . . . . . . . . . 21:1--21:22
Peng Huang and
Henry C. Lucas Early Exploration of MOOCs in the U.S.
Higher Education: an Absorptive Capacity
Perspective . . . . . . . . . . . . . . 22:1--22:28
Pooja Parameshwarappa and
Zhiyuan Chen and
Günes Koru Anonymization of Daily Activity Data by
Using $l$-diversity Privacy Model . . . 23:1--23:21
Jiaheng Xie and
Bin Zhang and
Susan Brown and
Daniel Zeng Write Like a Pro or an Amateur? Effect
of Medical Language Formality . . . . . 24:1--24:25
Damodar Reddy Edla and
Shubham Dodia and
Annushree Bablani and
Venkatanareshbabu Kuppili An Efficient Deep Learning Paradigm for
Deceit Identification Test on EEG
Signals . . . . . . . . . . . . . . . . 25:1--25:20
Qin Wang and
Shiping Chen and
Yang Xiang Anonymous Blockchain-based System for
Consortium . . . . . . . . . . . . . . . 26:1--26:25
Kang Zhao and
Qingpeng Zhang and
Sean H. Y. Yuan and
Kelvin Kam-Fai Tsoi Introduction to the Special Section on
Using AI and Data Science to Handle
Pandemics and Related Disruptions . . . 27:1--27:2
Manvel Avetisian and
Ilya Burenko and
Konstantin Egorov and
Vladimir Kokh and
Aleksandr Nesterov and
Aleksandr Nikolaev and
Alexander Ponomarchuk and
Elena Sokolova and
Alex Tuzhilin and
Dmitry Umerenkov CoRSAI: a System for Robust
Interpretation of CT Scans of COVID-19
Patients Using Deep Learning . . . . . . 28:1--28:16
Maryam Zokaeinikoo and
Pooyan Kazemian and
Prasenjit Mitra and
Soundar Kumara AIDCOV: an Interpretable Artificial
Intelligence Model for Detection of
COVID-19 from Chest Radiography Images 29:1--29:20
Guanqing Liang and
Jingxin Zhao and
Helena Yan Ping Lau and
Cane Wing-Ki Leung Using Social Media to Analyze Public
Concerns and Policy Responses to
COVID-19 in Hong Kong . . . . . . . . . 30:1--30:20
Laura Biester and
Katie Matton and
Janarthanan Rajendran and
Emily Mower Provost and
Rada Mihalcea Understanding the Impact of COVID-19 on
Online Mental Health Forums . . . . . . 31:1--31:28
Kang Gu and
Soroush Vosoughi and
Temiloluwa Prioleau SymptomID: a Framework for Rapid Symptom
Identification in Pandemics Using News
Reports . . . . . . . . . . . . . . . . 32:1--32:17
Shixiang Zhu and
Alexander Bukharin and
Liyan Xie and
Mauricio Santillana and
Shihao Yang and
Yao Xie High-Resolution Spatio-Temporal Model
for County-Level COVID-19 Activity in
the U.S. . . . . . . . . . . . . . . . . 33:1--33:20
Junye Li and
Aryan Sharma and
Deepak Mishra and
Gustavo Batista and
Aruna Seneviratne COVID-Safe Spatial Occupancy Monitoring
Using OFDM-Based Features and Passive
WiFi Samples . . . . . . . . . . . . . . 34:1--34:24
Himanshu Kharkwal and
Dakota Olson and
Jiali Huang and
Abhiraj Mohan and
Ankur Mani and
Jaideep Srivastava University Operations During a Pandemic:
a Flexible Decision Analysis Toolkit . . 35:1--35:24
Chun Ouyang and
Michael Adams and
Arthur H. M. Ter Hofstede and
Yang Yu Design and Realisation of Scalable
Business Process Management Systems for
Deployment in the Cloud . . . . . . . . 36:1--36:26
Saurav Chakraborty and
Agnieszka Onuchowska and
Sagar Samtani and
Wolfgang Jank and
Brandon Wolfram Machine Learning for Automated
Industrial IoT Attack Detection: an
Efficiency-Complexity Trade-off . . . . 37:1--37:28
Lin Jerry Cwei and
Nachiketa Sahoo and
Gautam Srivastava and
Weiping Ding Introduction to the Special Issue on
Pattern-Driven Mining, Analytics, and
Prediction for Decision Making, Part 1 1:1--1:3
Shui-Hua Wang and
Xin Zhang and
Yu-Dong Zhang DSSAE: Deep Stacked Sparse Autoencoder
Analytical Model for COVID-19 Diagnosis
by Fractional Fourier Entropy . . . . . 2:1--2:20
Fan Chen and
Jiaoxiong Xia and
Honghao Gao and
Huahu Xu and
Wei Wei TRG-DAtt: The Target Relational Graph
and Double Attention Network Based
Sentiment Analysis and Prediction for
Supporting Decision Making . . . . . . . 3:1--3:25
M. Saqib Nawaz and
Philippe Fournier-Viger and
Unil Yun and
Youxi Wu and
Wei Song Mining High Utility Itemsets with Hill
Climbing and Simulated Annealing . . . . 4:1--4:22
Shuteng Niu and
Yushan Jiang and
Bowen Chen and
Jian Wang and
Yongxin Liu and
Houbing Song Cross-Modality Transfer Learning for
Image-Text Information Management . . . 5:1--5:14
Mu-Yen Chen and
Min-Hsuan Fan and
Li-Xiang Huang AI-Based Vehicular Network toward 6G and
IoT: Deep Learning Approaches . . . . . 6:1--6:12
Zhihan Lv and
Ranran Lou and
Hailin Feng and
Dongliang Chen and
Haibin Lv Novel Machine Learning for Big Data
Analytics in Intelligent Support
Information Management Systems . . . . . 7:1--7:21
Ankit Kumar and
Abhishek Kumar and
Ali Kashif Bashir and
Mamoon Rashid and
V. D. Ambeth Kumar and
Rupak Kharel Distance Based Pattern Driven Mining for
Outlier Detection in High Dimensional
Big Dataset . . . . . . . . . . . . . . 8:1--8:17
Mohammad Ehsan Shahmi Chowdhury and
Chowdhury Farhan Ahmed and
Carson K. Leung A New Approach for Mining Correlated
Frequent Subgraphs . . . . . . . . . . . 9:1--9:28
Bo Wen and
Paul Jen-Hwa Hu and
Mohammadreza Ebrahimi and
Hsinchun Chen Key Factors Affecting User Adoption of
Open-Access Data Repositories in
Intelligence and Security Informatics:
an Affordance Perspective . . . . . . . 10:1--10:24
Gamal Elkoumy and
Stephan A. Fahrenkrog-Petersen and
Mohammadreza Fani Sani and
Agnes Koschmider and
Felix Mannhardt and
Saskia Nuñez Von Voigt and
Majid Rafiei and
Leopold Von Waldthausen Privacy and Confidentiality in Process
Mining: Threats and Research Challenges 11:1--11:17
Bo Sun and
Takeshi Takahashi and
Tao Ban and
Daisuke Inoue Detecting Android Malware and
Classifying Its Families in Large-scale
Datasets . . . . . . . . . . . . . . . . 12:1--12:21
Byron Marshall and
Michael Curry and
Robert E. Crossler and
John Correia Machine Learning and Survey-based
Predictors of InfoSec Non-Compliance . . 13:1--13:20
Jiaheng Xie and
Bin Zhang and
Jian Ma and
Daniel Zeng and
Jenny Lo-Ciganic Readmission Prediction for Patients with
Heterogeneous Medical History: a
Trajectory-Based Deep Learning Approach 14:1--14:27
Luo He and
Hongyan Liu and
Yinghui Yang and
Bei Wang A Multi-attention Collaborative Deep
Learning Approach for Blood Pressure
Prediction . . . . . . . . . . . . . . . 15:1--15:20
Yan Tang and
Weilong Cui and
Jianwen Su A Query Language for Workflow Logs . . . 16:1--16:28
Shi Ming Huang and
David C. Yen and
Ting Jyun Yan and
Yi Ting Yang An Intelligent Mechanism to
Automatically Discover Emerging
Technology Trends: Exploring Regulatory
Technology . . . . . . . . . . . . . . . 17:1--17:29
Tomasz Miksa and
Simon Oblasser and
Andreas Rauber Automating Research Data Management
Using Machine-Actionable Data Management
Plans . . . . . . . . . . . . . . . . . 18:1--18:22
Guangrui (Kayla) Li and
Mike K. P. So and
Kar Yan Tam Identifying the Big Shots --- a
Quantile-Matching Way in the Big Data
Context . . . . . . . . . . . . . . . . 19:1--19:30
Xindong Wu and
Xingquan Zhu and
Minghui Wu The Evolution of Search: Three Computing
Paradigms . . . . . . . . . . . . . . . 20:1--20:20
Ning Zhang and
Mohammadreza Ebrahimi and
Weifeng Li and
Hsinchun Chen Counteracting Dark Web Text-Based
CAPTCHA with Generative Adversarial
Learning for Proactive Cyber Threat
Intelligence . . . . . . . . . . . . . . 21:1--21:21
Karl Werder and
Balasubramaniam Ramesh and
Rongen (Sophia) Zhang Establishing Data Provenance for
Responsible Artificial Intelligence
Systems . . . . . . . . . . . . . . . . 22:1--22:23
Jerry Chun-Wei Lin and
Nachiketa Sahoo and
Gautam Srivastava and
Weiping Ding Introduction to the Special Issue on
Pattern-Driven Mining, Analytics, and
Prediction for Decision Making, Part II 23:1--23:3
Maryam Ebrahimi and
Mohammad Hesam Tadayon and
Mohammad Sayad Haghighi and
Alireza Jolfaei A Quantitative Comparative Study of
Data-oriented Trust Management Schemes
in Internet of Things . . . . . . . . . 24:1--24:30
Youxi Wu and
Xiaohui Wang and
Yan Li and
Lei Guo and
Zhao Li and
Ji Zhang and
Xindong Wu OWSP-Miner: Self-adaptive One-off
Weak-gap Strong Pattern Mining . . . . . 25:1--25:23
Yuan Gao and
Laurence T. Yang and
Yaliang Zhao and
Jing Yang Feature Extraction of High-dimensional
Data Based on J-HOSVD for
Cyber-Physical-Social Systems . . . . . 26:1--26:21
Hsun-Ping Hsieh and
Fandel Lin and
Nai-Yu Chen and
Tzu-Hsin Yang A Decision Framework to Recommend
Cruising Locations for Taxi Drivers
under the Constraint of Booking
Information . . . . . . . . . . . . . . 27:1--27:30
Anastasiia Pika and
Chun Ouyang and
Arthur H. M. ter Hofstede Configurable Batch-Processing Discovery
from Event Logs . . . . . . . . . . . . 28:1--28:25
A. N. M. Bazlur Rashid and
Mohiuddin Ahmed and
Leslie F. Sikos and
Paul Haskell-Dowland Anomaly Detection in Cybersecurity
Datasets via Cooperative
Co-evolution-based Feature Selection . . 29:1--29:39
Xin Liu and
Liang Zheng and
Weishan Zhang and
Jiehan Zhou and
Shuai Cao and
Shaowen Yu An Evolutive Frequent Pattern Tree-based
Incremental Knowledge Discovery
Algorithm . . . . . . . . . . . . . . . 30:1--30:20
Flavio Corradini and
Alessandro Marcelletti and
Andrea Morichetta and
Andrea Polini and
Barbara Re and
Francesco Tiezzi Engineering Trustable and Auditable
Choreography-based Systems Using
Blockchain . . . . . . . . . . . . . . . 31:1--31:53
M. Lisa Yeo and
Erik Rolland and
Jacquelyn Rees Ulmer and
Raymond A. Patterson How Customer Demand Reactions Impact
Technology Innovation and Security . . . 32:1--32:17
Wanlun Ma and
Xiangyu Hu and
Chao Chen and
Sheng Wen and
Kkwang Raymond Choo and
Yang Xiang Social Media Event Prediction using DNN
with Feedback Mechanism . . . . . . . . 33:1--33:24
Gediminas Adomavicius and
Mochen Yang Integrating Behavioral, Economic, and
Technical Insights to Understand and
Address Algorithmic Bias: a
Human-Centric Perspective . . . . . . . 34:1--34:27
Mu-Yen Chen and
Bhavani Thuraisingham and
Erol Egrioglu and
Jose De Jesus Rubio Introduction to the Special Issue on
Smart Systems for Industry 4.0 and IoT 35:1--35:??
Esteban Elias Romero and
Carlos David Camacho and
Carlos Enrique Montenegro and
Óscar Esneider Acosta and
Rubén González Crespo and
Elvis Eduardo Gaona and
Marcelo Herrera Martínez Integration of DevOps Practices on a
Noise Monitor System with CircleCI and
Terraform . . . . . . . . . . . . . . . 36:1--36:??
Bin Ren and
Yuquiang Chen and
Fujie Wang Application Massive Data Processing
Platform for Smart Manufacturing Based
on Optimization of Data Storage . . . . 37:1--37:??
Genggeng Liu and
Yuhan Zhu and
Saijuan Xu and
Hao Tang and
Yeh-Cheng Chen Performance-Driven X-Architecture
Routing Algorithm for Artificial
Intelligence Chip Design in Smart
Manufacturing . . . . . . . . . . . . . 38:1--38:??
Zhihan Lv and
Dongliang Chen and
Hailin Feng and
Amit Kumar Singh and
Wei Wei and
Haibin Lv Computational Intelligence in Security
of Digital Twins Big Graphic Data in
Cyber-physical Systems of Smart Cities 39:1--39:??
Rongli Chen and
Xiaozhong Chen and
Lei Wang and
Jianxin Li The Core Industry Manufacturing Process
of Electronics Assembly Based on Smart
Manufacturing . . . . . . . . . . . . . 40:1--40:??
Genggeng Liu and
Ruping Zhou and
Saijuan Xu and
Yuhan Zhu and
Wenzhong Guo and
Yeh-Cheng Chen and
Guolong Chen Two-Stage Competitive Particle Swarm
Optimization Based Timing-Driven
X-Routing for IC Design Under Smart
Manufacturing . . . . . . . . . . . . . 41:1--41:??
Xin Du and
Songtao Tang and
Zhihui Lu and
Keke Gai and
Jie Wu and
Patrick C. K. Hung Scientific Workflows in IoT
Environments: a Data Placement Strategy
Based on Heterogeneous Edge-Cloud
Computing . . . . . . . . . . . . . . . 42:1--42:??
Qi Lin and
Wensheng Gan and
Yongdong Wu and
Jiahui Chen and
Chien-Ming Chen Smart System: Joint Utility and
Frequency for Pattern Classification . . 43:1--43:??
Rohini Poolat Parameswarath and
Prosanta Gope and
Biplab Sikdar User-empowered Privacy-preserving
Authentication Protocol for Electric
Vehicle Charging Based on Decentralized
Identity and Verifiable Credential . . . 44:1--44:??
Mengxin Nong and
Lingfeng Huang and
Mingtao Liu Allocation of Resources for Cloud
Survivability in Smart Manufacturing . . 45:1--45:??
Usman Ahmed and
Jerry Chun-Wei Lin and
Gautam Srivastava Heterogeneous Energy-aware Load
Balancing for Industry 4.0 and IoT
Environments . . . . . . . . . . . . . . 46:1--46:??
Yu-Chia Chen and
Sin-Ye Jhong and
Chih-Hsien Hsia Roadside Unit-based Unknown Object
Detection in Adverse Weather Conditions
for Smart Internet of Vehicles . . . . . 47:1--47:??
Christian Janiesch and
Marcus Fischer and
Florian Imgrund and
Adrian Hofmann and
Axel Winkelmann An Architecture Using Payment Channel
Networks for Blockchain-based Wi-Fi
Sharing . . . . . . . . . . . . . . . . 1:1--1:??
Mohammad Amin Morid and
Olivia R. Liu Sheng and
Joseph Dunbar Time Series Prediction Using Deep
Learning Methods in Healthcare . . . . . 2:1--2:??
Shuang (Sophie) Zhai and
Zhu (Drew) Zhang Read the News, Not the Books:
Forecasting Firms' Long-term Financial
Performance via Deep Text Mining . . . . 3:1--3:??
Kimia Ameri and
Michael Hempel and
Hamid Sharif and
Juan Lopez and
Kalyan Perumalla Design of a Novel Information System for
Semi-automated Management of
Cybersecurity in Industrial Control
Systems . . . . . . . . . . . . . . . . 4:1--4:??
Amogh Manoj Joshi and
Deepak Ranjan Nayak and
Dibyasundar Das and
Yudong Zhang LiMS-Net: a Lightweight Multi-Scale CNN
for COVID-19 Detection from Chest CT
Scans . . . . . . . . . . . . . . . . . 5:1--5:??
Jan-Peter Kucklick and
Oliver Müller Tackling the Accuracy-Interpretability
Trade-off: Interpretable Deep Learning
Models for Satellite Image-based Real
Estate Appraisal . . . . . . . . . . . . 6:1--6:??
Patricia Akello and
Naga Vemprala and
Nicole Lang Beebe and
Kim-Kwang Raymond Choo Blockchain Use Case in Ballistics and
Crime Gun Tracing and Intelligence:
Toward Overcoming Gun Violence . . . . . 7:1--7:??
Xue Chen and
Cheng Wang and
Qing Yang and
Teng Hu and
Changjun Jiang The Opportunity in Difficulty: a Dynamic
Privacy Budget Allocation Mechanism for
Privacy-Preserving Multi-dimensional
Data Collection . . . . . . . . . . . . 8:1--8:??
Yixiang Hu and
Xiaoheng Deng and
Congxu Zhu and
Xuechen Chen and
Laixin Chi Resource Allocation for Heterogeneous
Computing Tasks in Wirelessly Powered
MEC-enabled IIOT Systems . . . . . . . . 9:1--9:??
Alan Hevner and
Veda Storey Research Challenges for the Design of
Human-Artificial Intelligence Systems
(HAIS) . . . . . . . . . . . . . . . . . 10:1--10:??
Marlon Dumas and
Fabiana Fournier and
Lior Limonad and
Andrea Marrella and
Marco Montali and
Jana-Rebecca Rehse and
Rafael Accorsi and
Diego Calvanese and
Giuseppe De Giacomo and
Dirk Fahland and
Avigdor Gal and
Marcello La Rosa and
Hagen Völzer and
Ingo Weber AI-augmented Business Process Management
Systems: a Research Manifesto . . . . . 11:1--11:??
Gondy Leroy and
Bengisu Tulu and
Xiao Liu Introduction to the Special Issue on
Design and Data Science Research in
Healthcare . . . . . . . . . . . . . . . 12:1--12:??
Matt Baucum and
Anahita Khojandi and
Carole Myers and
Larry Kessler Optimizing Substance Use Treatment
Selection Using Reinforcement Learning 13:1--13:??
Christina C. Bartenschlager and
Stefanie S. Ebel and
Sebastian Kling and
Janne Vehreschild and
Lutz T. Zabel and
Christoph D. Spinner and
Andreas Schuler and
Axel R. Heller and
Stefan Borgmann and
Reinhard Hoffmann and
Siegbert Rieg and
Helmut Messmann and
Martin Hower and
Jens O. Brunner and
Frank Hanses and
Christoph Römmele COVIDAL: a Machine Learning Classifier
for Digital COVID-19 Diagnosis in German
Hospitals . . . . . . . . . . . . . . . 14:1--14:??
Sanne van der Linden and
Rita Sevastjanova and
Mathias Funk and
Mennatallah El-Assady MediCoSpace: Visual Decision-Support for
Doctor-Patient Consultations using
Medical Concept Spaces from EHRs . . . . 15:1--15:??
Pascal Fechner and
Fabian König and
Wolfgang Kratsch and
Jannik Lockl and
Maximilian Röglinger Near-Infrared Spectroscopy for Bladder
Monitoring: a Machine Learning Approach 16:1--16:??
Karthik Srinivasan and
Jinhang Jiang Examining Disease Multimorbidity in U.S.
Hospital Visits Before and During
COVID-19 Pandemic: a Graph Analytics
Approach . . . . . . . . . . . . . . . . 17:1--17:??
Karthik Srinivasan and
Faiz Currim and
Sudha Ram A Human-in-the-Loop Segmented
Mixed-Effects Modeling Method for
Analyzing Wearables Data . . . . . . . . 18:1--18:??
Yidong Chai and
Hongyan Liu and
Jie Xu and
Sagar Samtani and
Yuanchun Jiang and
Haoxin Liu A Multi-Label Classification with an
Adversarial-Based Denoising Autoencoder
for Medical Image Annotation . . . . . . 19:1--19:??
Moshe Unger and
Pan Li and
Sahana (Shahana) Sen and
Alexander Tuzhilin Don't Need All Eggs in One Basket:
Reconstructing Composite Embeddings of
Customers from Individual-Domain
Embeddings . . . . . . . . . . . . . . . 20:1--20:??
Rahul Mishra and
Dharavath Ramesh and
Salil S. Kanhere and
Damodar Reddy Edla Enabling Efficient Deduplication and
Secure Decentralized Public Auditing for
Cloud Storage: a Redactable Blockchain
Approach . . . . . . . . . . . . . . . . 21:1--21:??
Eran Rubin and
Izak Benbasat Using Toulmin's Argumentation Model to
Enhance Trust in Analytics-Based Advice
Giving Systems . . . . . . . . . . . . . 22:1--22:??
Kelvin Du and
Frank Xing and
Erik Cambria Incorporating Multiple Knowledge Sources
for Targeted Aspect-based Financial
Sentiment Analysis . . . . . . . . . . . 23:1--23:??
Cecil Eng Huang Chua and
Fred Niederman Situational Factor Determinants of the
Allocation of Decision Rights to Edge
Computers . . . . . . . . . . . . . . . 24:1--24:??
Michael Siering Peer-to-Peer (P2P) Lending Risk
Management: Assessing Credit Risk on
Social Lending Platforms Using Textual
Factors . . . . . . . . . . . . . . . . 25:1--25:??
Dazhong Shen and
Hengshu Zhu and
Keli Xiao and
Xi Zhang and
Hui Xiong Exploiting Connections among
Personality, Job Position, and Work
Behavior: Evidence from Joint Bayesian
Learning . . . . . . . . . . . . . . . . 26:1--26:??
Gary Ang and
Zhiling Guo and
Ee-Peng Lim On Predicting ESG Ratings Using Dynamic
Company Networks . . . . . . . . . . . . 27:1--27:??
Xin Li and
Juhee Kwon and
Balaji Padmanabhan and
Pengzhu Zhang Introduction to the Special Issue on
IT-enabled Business Management and
Decision Making in the (Post) Covid-19
Era . . . . . . . . . . . . . . . . . . 28:1--28:??
Tianjian Guo and
Indranil Bardhan and
Anjum Khurshid Social Determinants of Health and ER
Utilization: Role of Information
Integration during COVID-19 . . . . . . 29:1--29:??
Jayson Andrew Killoran and
Tracy A. Jenkin and
Jasmin Manseau ICT Interactions and COVID-19 --- a
Theorization Across Two Pandemic Waves 30:1--30:??
Giovanni Pilato and
Fabio Persia and
Mouzhi Ge and
Theodoros Chondrogiannis and
Daniela D'Auria A Modular Social Sensing System for
Personalized Orienteering in the
COVID-19 Era . . . . . . . . . . . . . . 31:1--31:??
Xiao Zeng and
David Ji and
Dimple R. Thadani and
Boying Li and
Xiaodie Pu and
Zhao Cai and
Patrick Y. K. Chau Disentangling Affordances of Online
Collaboration Tools for Mutual Aid in
Emergencies: Insights from the COVID-19
Lockdown . . . . . . . . . . . . . . . . 32:1--32:??
Pei-Chi Lo and
Ee-Peng Lim Non-monotonic Generation of Knowledge
Paths for Context Understanding . . . . 1:1--1:??
Moufida Aouachria and
Abderrahmane Leshob and
Abdessamed Réda Ghomari and
Mustapha Aouache A Process Mining Method for
Inter-organizational Business Process
Integration . . . . . . . . . . . . . . 2:1--2:??
Norman Pytel and
Christian Ziegler and
Axel Winkelmann From Dissonance to Dialogue: a
Token-Based Approach to Bridge the Gap
Between Manufacturers and Customers . . 3:1--3:??
Veda C. Storey and
Richard Baskerville Design with Simon's Inner and Outer
Environments: Theoretical Foundations
for Design Science Research Methods for
Digital Science . . . . . . . . . . . . 4:1--4:??
Joaquin Delgado Fernandez and
Tom Barbereau and
Orestis Papageorgiou Agent-Based Model of Initial Token
Allocations: Simulating Distributions
post Fair Launch . . . . . . . . . . . . 5:1--5:??
Giovanni Quattrocchi and
Willem-Jan van den Heuvel and
Damian Andrew Tamburri The Data Product-service Composition
Frontier: a Hybrid Learning Approach . . 6:1--6:??
Natalia Denisenko and
Youzhi Zhang and
Chiara Pulice and
Shohini Bhattasali and
Sushil Jajodia and
Philip Resnik and
V. S. Subrahmanian A Psycholinguistics-inspired Method to
Counter IP Theft Using Fake Documents 7:1--7:??
Pei-Xuan Li and
Yu-En Chang and
Ming-Chun Wei and
Hsun-Ping Hsieh Estimating Future Financial Development
of Urban Areas for Deploying Bank
Branches: a Local-Regional Interpretable
Model . . . . . . . . . . . . . . . . . 8:1--8:??
Youxi Wu and
Zhen Wang and
Yan Li and
Yingchun Guo and
He Jiang and
Xingquan Zhu and
Xindong Wu Co-occurrence Order-preserving Pattern
Mining with Keypoint Alignment for Time
Series . . . . . . . . . . . . . . . . . 9:1--9:??
Jessica Qiuhua Sheng and
Da Xu and
Paul Jen-Hwa Hu and
Liang Li and
Ting-Shuo Huang Mining Multimorbidity Trajectories and
Co-Medication Effects from Patient Data
to Predict Post-Hip Fracture Outcomes 10:1--10:??
Yijun Chen and
Reuben Kirkham Exploring How UK Public Authorities Use
Redaction to Protect Personal
Information . . . . . . . . . . . . . . 11:1--11:??
Thiti Suttaket and
Stanley Kok Interpretable Predictive Models for
Healthcare via Rational Multi-Layer
Perceptrons . . . . . . . . . . . . . . 12:1--12:??
Houssem Eddine Degha and
Fatima Zohra Laallam ICA-CRMAS: Intelligent Context-Awareness
Approach for Citation Recommendation
based on Multi-Agent System . . . . . . 13:1--13:??
Chenglong Zhang and
Varghese S. Jacob and
Young U. Ryu Modeling Individual Fairness Beliefs and
Its Applications . . . . . . . . . . . . 14:1--14:??
Moe Esmaeili and
Moez Farokhnia Hamedani and
Daniel Zantedeschi and
Calvin Sorush Khalesi Election Interference and Online
Propaganda Campaigns: Dynamic
Interdependencies on Facebook, Google
Trends, and the New York Times . . . . . 15:1--15:??
Victor Benjamin Considering Socially Scalable
Human--Robot Interfaces . . . . . . . . 16:1--16:??
Yutong Guo and
Chao Ban and
Jiang Yang and
Khim-Yong Goh and
Xiao Liu and
Xixian Peng and
Xiaobo Li Analyzing and Predicting Consumer
Response to Short Videos in E-Commerce 17:1--17:??
Michael Chau and
Jennifer Xu An IS Research Agenda on Large Language
Models: Development, Applications, and
Impacts on Business and Management . . . 1:1--1:??
Benjamin Ampel and
Chi-Heng Yang and
James Hu and
Hsinchun Chen Large Language Models for Conducting
Advanced Text Analytics Information
Systems Research . . . . . . . . . . . . 2:1--2:??
Aijia Yuan and
Edlin Garcia Colato and
Bernice Pescosolido and
Hyunju Song and
Sagar Samtani Improving Workplace Well-being in Modern
Organizations: a Review of Large
Language Model-based Mental Health
Chatbots . . . . . . . . . . . . . . . . 3:1--3:??
Amrita George and
Veda Catherine Storey and
Shuguang Hong Unraveling the Impact of ChatGPT as a
Knowledge Anchor in Business Education 4:1--4:??
Frank Xing Designing Heterogeneous LLM Agents for
Financial Sentiment Analysis . . . . . . 5:1--5:??
Sorouralsadat Fatemi and
Yuheng Hu and
Maryam Mousavi A Comparative Analysis of Instruction
Fine-Tuning Large Language Models for
Financial Text Classification . . . . . 6:1--6:??
Rudolf Chow and
King Yiu Suen and
Albert Y. S. Lam On Leveraging Large Language Models for
Multilingual Intent Discovery . . . . . 7:1--7:??
Linh Le and
Dung Tran A Metric-Based Detection System for
Large Language Model Texts . . . . . . . 8:1--8:??
Ping Fan Ke and
Ka Chung Ng Human--AI Synergy in Survey Development:
Implications from Large Language Models
in Business and Research . . . . . . . . 9:1--9:??
Wenji Mao and
Xipeng Qiu and
Ahmed Abbasi LLMs and Their Applications in Medical
Artificial Intelligence . . . . . . . . 10:1--10:??
Xiao-Yang Liu and
Rongyi Zhu and
Daochen Zha and
Jiechao Gao and
Shan Zhong and
Matt White and
Meikang Qiu Differentially Private Low-Rank
Adaptation of Large Language Model Using
Federated Learning . . . . . . . . . . . 11:1--11:??
Ruiyang Qin and
Kai Yang and
Ahmed Abbasi and
David Dobolyi and
Salman Seyedi and
Emily Griner and
Hyeokhyen Kwon and
Robert Cotes and
Zifan Jiang and
Gari Clifford and
Ryan A. Cook Language Models for Online Depression
Detection: a Review and Benchmark
Analysis on Remote Interviews . . . . . 12:1--12:??
Junqi Dai and
Qin Zhu and
Jun Zhan and
Bo Wang and
Xipeng Qiu MOSS-MED: a Family of Multimodal Models
Serving Medical Image Analysis . . . . . 13:1--13:??
Ling-I Wu and
Yuxin Su and
Guoqiang Li Zero-Shot Construction of Chinese
Medical Knowledge Graph with
GPT-3.5-turbo and GPT-4 . . . . . . . . 14:1--14:??
Yutao Dou and
Yuwei Huang and
Xiongjun Zhao and
Haitao Zou and
Jiandong Shang and
Ying Lu and
Xiaolin Yang and
Jian Xiao and
Shaoliang Peng ShennongMGS: an LLM-based Chinese
Medication Guidance System . . . . . . . 15:1--15:??
Hao Zhong and
Chuanren Liu and
Chaojiang Wu Uncovering IT Career Path Patterns with
Job Embedding-based Sequence Clustering 16:1--16:??
Chuan Qin and
Chuyu Fang and
Kaichun Yao and
Xi Chen and
Fuzhen Zhuang and
Hengshu Zhu COTR: Efficient Job Task Recognition for
Occupational Information Systems with
Class-Incremental Learning . . . . . . . 17:1--17:??
Haiping Ma and
Manwei Li and
Chuan Qin and
Dazhong Shen and
Hengshu Zhu and
Xingyi Zhang and
Hui Xiong Joint Ability Assessment for Talent
Recruitment: a Neural Cognitive
Diagnosis Approach . . . . . . . . . . . 18:1--18:??
Hemant K. Bhargava and
Susan Brown and
Anindya Ghose and
Alok Gupta and
Dorothy Leidner and
D. J. Wu Exploring Generative AI's Impact on
Research: Perspectives from Senior
Scholars in Management Information
Systems . . . . . . . . . . . . . . . . 19:1--19:??
Pravas Ranjan Bal and
Sandeep Kumar Cross Project Defect Prediction using
Dropout Regularized Deep Learning and
Unique Matched Metrics . . . . . . . . . 20:1--20:32
M. Lisa Yeo and
Hooman Hidaji and
Erik Rolland and
Raymond A. Patterson and
Barrie R. Nault and
Bora Kolfal IT Service Disruptions and Provider
Choice . . . . . . . . . . . . . . . . . 21:1--21:37
Yuan Long and
Arun Rai Decoding Digital Risk From Corporate
Disclosure: a Neural Network Approach 22:1--22:44
Filip Zoubek and
Tomasz Miksa and
Andreas Rauber Conceptual service architecture to
synchronise research data management
services using machine-actionable data
management plans . . . . . . . . . . . . 23:1--23:23
Han Wu and
Le Zhang and
Hengshu Zhu and
Qi Liu and
Enhong Chen and
Hui Xiong Examination Process Modeling for
Intelligent Patent Management: a
Multi-aspect Neural Sequential Approach 24:1--24:23
Fabian König and
Andreas Egger and
Wolfgang Kratsch and
Maximilian Röglinger and
Niklas Wördehoff Unstructured Data in Process Mining: a
Systematic Literature Review . . . . . . 25:1--25:34
Veda Catherine Storey Knowledge Management in a World of
Generative AI: Impact and Implications 26:1--26:14
Minglei Yin and
Bin Liu and
Neil Zhenqiang Gong and
Xin Li Securing Visually-Aware Recommender
Systems: an Adversarial Image
Reconstruction and Detection Framework 27:1--27:29
Wenchang Li and
John P. Lalor and
Yixing Chen and
Vamsi K. Kanuri From Stars to Insights: Exploration and
Implementation of Unified Sentiment
Analysis with Distant Supervision . . . 28:1--28:21