Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%% BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.41",
%%%     date            = "25 March 2024",
%%%     time            = "11:36:10 MST",
%%%     filename        = "tmis.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "55553 12792 64889 624803",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "ACM Transactions on Management Information
%%%                        Systems (TMIS); bibliography; TMIS",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE BibTeX bibliography for
%%%                        ACM Transactions on Management Information
%%%                        Systems (TMIS) (CODEN none, ISSN 2158-656X
%%%                        (print), 2158-6578 (electronic)), covering
%%%                        all journal issues from 2010 -- date.
%%%
%%%                        At version 1.41, the COMPLETE journal
%%%                        coverage looked like this:
%%%
%%%                             2010 (   7)    2015 (  27)    2020 (  26)
%%%                             2011 (  26)    2016 (  12)    2021 (  37)
%%%                             2012 (  16)    2017 (  18)    2022 (  47)
%%%                             2013 (  24)    2018 (  13)    2023 (  32)
%%%                             2014 (   9)    2019 (  20)    2024 (   6)
%%%
%%%                             Article:        320
%%%
%%%                             Total entries:  320
%%%
%%%                        The journal Web page can be found at:
%%%
%%%                            http://www.acm.org/pubs/tmis.html
%%%
%%%                        The journal table of contents page is at:
%%%
%%%                            http://www.acm.org/tmis/
%%%                            http://portal.acm.org/browse_dl.cfm?idx=J1320
%%%
%%%                        Qualified subscribers can retrieve the full
%%%                        text of recent articles in PDF form.
%%%
%%%                        The initial draft was extracted from the ACM
%%%                        Web pages.
%%%
%%%                        ACM copyrights explicitly permit abstracting
%%%                        with credit, so article abstracts, keywords,
%%%                        and subject classifications have been
%%%                        included in this bibliography wherever
%%%                        available.  Article reviews have been
%%%                        omitted, until their copyright status has
%%%                        been clarified.
%%%
%%%                        bibsource keys in the bibliography entries
%%%                        below indicate the entry originally came
%%%                        from the computer science bibliography
%%%                        archive, even though it has likely since
%%%                        been corrected and updated.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume.''
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility."
%%%     }
%%% ====================================================================
@Preamble{"\input bibnames.sty" #
    "\def \TM {${}^{\sc TM}$}"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-TMIS                  = "ACM Transactions on Management Information
                                  Systems (TMIS)"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Chen:2010:EWF,
  author =       "Hsinchun Chen",
  title =        "Editorial: {Welcome} to the first issue of {ACM
                 TMIS}",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "1:1--1:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877726",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Davis:2010:IFF,
  author =       "Gordon B. Davis and Paul Gray and Stuart Madnick and
                 Jay F. Nunamaker and Ralph Sprague and Andrew Whinston",
  title =        "Ideas for the future of the {IS} field",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877727",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Wang:2010:DIS,
  author =       "Jingguo Wang and Nan Xiao and H. Raghav Rao",
  title =        "Drivers of information security search behavior: an
                 investigation of network attacks and vulnerability
                 disclosures",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877728",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ba:2010:WGS,
  author =       "Sulin Ba and Dan Ke and Jan Stallaert and Zhongju
                 Zhang",
  title =        "Why give away something for nothing? {Investigating}
                 virtual goods pricing and permission strategies",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877729",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Cao:2010:MDA,
  author =       "Lan Cao and Balasubramaniam Ramesh and Tarek
                 Abdel-Hamid",
  title =        "Modeling dynamics in agile software development",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877730",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Arazy:2010:SCW,
  author =       "Ofer Arazy and Arie Croitoru",
  title =        "The sustainability of corporate wikis: a time-series
                 analysis of activity patterns",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877731",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Fu:2010:PPT,
  author =       "Yu Fu and Zhiyuan Chen and Gunes Koru and Aryya
                 Gangopadhyay",
  title =        "A privacy protection technique for publishing data
                 mining models and research data",
  journal =      j-TMIS,
  volume =       "1",
  number =       "1",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1877725.1877732",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:24 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chen:2011:EDS,
  author =       "Hsinchun Chen",
  title =        "Editorial: {Design} science, grand challenges, and
                 societal impacts",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929917",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chau:2011:VWS,
  author =       "Michael Chau",
  title =        "Visualizing {Web} search results using glyphs:
                 {Design} and evaluation of a flower metaphor",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929918",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kuo:2011:LAG,
  author =       "Feng-Yang Kuo and Chun-Po Yin",
  title =        "A linguistic analysis of group support systems
                 interactions for uncovering social realities of
                 organizations",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929919",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kane:2011:MSI,
  author =       "Gerald C. Kane",
  title =        "A multimethod study of information quality in wiki
                 collaboration",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929920",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Dawson:2011:UTA,
  author =       "Gregory S. Dawson and Richard T. Watson",
  title =        "Uncovering and testing archetypes of effective public
                 sector {CIOs}",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929921",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Dey:2011:CUW,
  author =       "Debabrata Dey and Ming Fan and Gang Peng",
  title =        "Computer use and wage returns: {The} complementary
                 roles of {IT}-related human capital and nonroutine
                 tasks",
  journal =      j-TMIS,
  volume =       "2",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1929916.1929922",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 28 11:02:25 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Hu:2011:AIS,
  author =       "Paul Jen-Hwa Hu and Hsinchun Chen",
  title =        "Analyzing information systems researchers'
                 productivity and impacts: a perspective on the {$H$}
                 index",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "7:1--7:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985348",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bhattacharjee:2011:DGM,
  author =       "Sudip Bhattacharjee and Ram D. Gopal and James R.
                 Marsden and Ramesh Sankaranarayanan",
  title =        "Digital goods and markets: {Emerging} issues and
                 challenges",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985349",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Uhl:2011:EUC,
  author =       "Matthias W. Uhl",
  title =        "Explaining {U.S.} consumer behavior with news
                 sentiment",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985350",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Du:2011:RHS,
  author =       "Anna Ye Du and Sanjukta Das and Ram D. Gopal and R.
                 Ramesh",
  title =        "Risk hedging in storage grid markets: {Do} options add
                 value to forwards?",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "10:1--10:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985351",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Liu:2011:WDW,
  author =       "Jun Liu and Sudha Ram",
  title =        "Who does what: {Collaboration} patterns in the
                 {Wikipedia} and their impact on article quality",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "11:1--11:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985352",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mcknight:2011:TST,
  author =       "D. Harrison Mcknight and Michelle Carter and Jason
                 Bennett Thatcher and Paul F. Clay",
  title =        "Trust in a specific technology: an investigation of
                 its components and measures",
  journal =      j-TMIS,
  volume =       "2",
  number =       "2",
  pages =        "12:1--12:??",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1985347.1985353",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 22 08:37:49 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Tuzhilin:2011:KMR,
  author =       "Alexander Tuzhilin",
  title =        "Knowledge management revisited: {Old Dogs}, {New}
                 tricks",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "13:1--13:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019619",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sutanto:2011:ESV,
  author =       "Juliana Sutanto and Atreyi Kankanhalli and Bernard
                 Cheng Yian Tan",
  title =        "Eliciting a sense of virtual community among knowledge
                 contributors",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019620",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Peng:2011:LSC,
  author =       "Jing Peng and Daniel D. Zeng and Zan Huang",
  title =        "Latent subject-centered modeling of collaborative
                 tagging: an application in social search",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "15:1--15:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019621",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Masud:2011:CBM,
  author =       "Mohammad M. Masud and Tahseen M. Al-Khateeb and Kevin
                 W. Hamlen and Jing Gao and Latifur Khan and Jiawei Han
                 and Bhavani Thuraisingham",
  title =        "Cloud-based malware detection for evolving data
                 streams",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "16:1--16:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019622",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Schmidt-Rauch:2011:TTA,
  author =       "Susanne Schmidt-Rauch and Gerhard Schwabe",
  title =        "From telesales to tele-advisory in travel agencies:
                 {Business} problems, generic design goals and
                 requirements",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "17:1--17:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019623",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Huang:2011:MTC,
  author =       "Ke-Wei Huang and Zhuolun Li",
  title =        "A multilabel text classification algorithm for
                 labeling risk factors in {SEC} form {10-K}",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "18:1--18:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019624",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lin:2011:SPM,
  author =       "Ming-Chih Lin and Anthony J. T. Lee and Rung-Tai Kao
                 and Kuo-Tay Chen",
  title =        "Stock price movement prediction using representative
                 prototypes of financial reports",
  journal =      j-TMIS,
  volume =       "2",
  number =       "3",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2019618.2019625",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Nov 6 07:18:27 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Nunamaker:2011:TBV,
  author =       "Jay F. {Nunamaker, Jr.} and Robert O. Briggs",
  title =        "Toward a broader vision for {Information Systems}",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "20:1--20:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070711",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In December of 2009, several founders of the
                 Information Systems (IS) academic discipline gathered
                 for a panel discussion at the International Conference
                 on Information Systems to present their visions for the
                 future of the field, and their comments were summarized
                 in the inaugural issue of TMIS [Davis et al., 2010; J.
                 F. J. Nunamaker et al., 1991]. To assure a robust
                 future, they argued, IS journals, conferences,
                 reviewers, promotion committees, teachers, researchers,
                 and curriculum developers must broaden the scope of IS.
                 This article explores the need for a broader vision to
                 drive future development of the IS discipline.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Padmanabhan:2011:IOS,
  author =       "Balaji Padmanabhan and Alan Hevner and Michael Cuenco
                 and Crystal Shi",
  title =        "From information to operations: {Service} quality and
                 customer retention",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "21:1--21:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070712",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In business, information is abundant. Yet, effective
                 use of that information to inform and drive business
                 operations is a challenge. Our industry-university
                 collaborative project draws from a rich dataset of
                 commercial demographics, transaction history, product
                 features, and Service Quality Index (SQI) factors on
                 shipping transactions at FedEx. We apply inductive
                 methods to understand and predict customer churn in a
                 noncontractual setting. Results identify several SQI
                 variables as important determinants of churn across a
                 variety of analytic approaches. Building on this we
                 propose the design of a Business Intelligence (BI)
                 dashboard as an innovative approach for increasing
                 customer retention by identifying potential churners
                 based on combinations of predictor variables such as
                 demographics and SQI factors. This empirical study
                 contributes to BI research and practice by
                 demonstrating the application of data analytics to the
                 fundamental business operations problem of customer
                 churn.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Rui:2011:DSB,
  author =       "Huaxia Rui and Andrew Whinston",
  title =        "Designing a social-broadcasting-based business
                 intelligence system",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "22:1--22:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070713",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The rise of social media has fundamentally changed the
                 way information is produced, disseminated, and consumed
                 in the digital age, which has profound economic and
                 business effects. Among many different types of social
                 media, social broadcasting networks such as Twitter in
                 the U.S. and `Weibo' in China are particularly
                 interesting from a business perspective. In the case of
                 Twitter, the huge amounts of real-time data with
                 extremely rich text, along with valuable structural
                 information, makes Twitter a great platform to build
                 Business Intelligence (BI) systems. We propose a
                 framework of social-broadcasting-based BI systems that
                 utilizes real-time information extracted from these
                 data with text mining techniques. To demonstrate this
                 framework, we designed and implemented a Twitter-based
                 BI system that forecasts movie box office revenues
                 during the opening weekend and forecasts daily revenue
                 after 4 weeks. We found that incorporating information
                 from Twitter could reduce the Mean Absolute Percentage
                 Error (MAPE) by 44\% for the opening weekend and by
                 36\% for total revenue. For daily revenue forecasting,
                 including Twitter information into a baseline model
                 could reduce forecasting errors by 17.5\% on average.
                 On the basis of these results, we conclude that
                 social-broadcasting-based BI systems have great
                 potential and should be explored by both researchers
                 and practitioners.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Arora:2011:DSC,
  author =       "Hina Arora and T. S. Raghu and Ajay Vinze",
  title =        "Decision support for containing pandemic propagation",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070714",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This research addresses complexities inherent in
                 dynamic decision making settings represented by global
                 disasters such as influenza pandemics. By coupling a
                 theoretically grounded Equation-Based Modeling (EBM)
                 approach with more practically nuanced Agent-Based
                 Modeling (ABM) approach we address the inherent
                 heterogeneity of the `influenza pandemic' decision
                 space more effectively. In addition to modeling
                 contributions, results and findings of this study have
                 three important policy implications for pandemic
                 containment; first, an effective way of checking the
                 progression of a pandemic is a multipronged approach
                 that includes a combination of pharmaceutical and
                 non-pharmaceutical interventions. Second, mutual aid is
                 effective only when regions that have been affected by
                 the pandemic are sufficiently isolated from other
                 regions through non-pharmaceutical interventions. When
                 regions are not sufficiently isolated, mutual aid can
                 in fact be detrimental. Finally, intraregion
                 non-pharmaceutical interventions such as school
                 closures are more effective than interregion
                 nonpharmaceutical interventions such as border
                 closures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Goes:2011:LCA,
  author =       "Paulo Goes and Noyan Ilk and Wei T. Yue and J. Leon
                 Zhao",
  title =        "Live-chat agent assignments to heterogeneous
                 e-customers under imperfect classification",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070715",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Many e-commerce firms provide live-chat capability on
                 their Web sites to promote product sales and to offer
                 customer support. With increasing traffic on e-commerce
                 Web sites, providing such live-chat services requires a
                 good allocation of service resources to serve the
                 customers. When resources are limited, firms may
                 consider employing priority-processing and reserving
                 resources for high-value customers. In this article, we
                 model a reserve-based priority-processing policy for
                 e-commerce systems that have imperfect customer
                 classification. Two policy decisions considered in the
                 model are: (1) the number of agents exclusively
                 reserved for high-value customers, and (2) the
                 configuration of the classification system. We derive
                 explicit expressions for average waiting times of
                 high-value and low-value customer classes and define a
                 total waiting cost function. Through numerical
                 analysis, we study the impact of these two policy
                 decisions on average waiting times and total waiting
                 costs. Our analysis finds that reserving agents for
                 high-value customers may have negative consequences for
                 such customers under imperfect classification. Further,
                 we study the interaction between the two policy
                 decisions and discuss how one decision should be
                 modified with respect to a change in the other one in
                 order to keep the waiting costs minimized.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lau:2011:TMP,
  author =       "Raymond Y. K. Lau and S. Y. Liao and Ron Chi-Wai Kwok
                 and Kaiquan Xu and Yunqing Xia and Yuefeng Li",
  title =        "Text mining and probabilistic language modeling for
                 online review spam detection",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070716",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In the era of Web 2.0, huge volumes of consumer
                 reviews are posted to the Internet every day. Manual
                 approaches to detecting and analyzing fake reviews
                 (i.e., spam) are not practical due to the problem of
                 information overload. However, the design and
                 development of automated methods of detecting fake
                 reviews is a challenging research problem. The main
                 reason is that fake reviews are specifically composed
                 to mislead readers, so they may appear the same as
                 legitimate reviews (i.e., ham). As a result,
                 discriminatory features that would enable individual
                 reviews to be classified as spam or ham may not be
                 available. Guided by the design science research
                 methodology, the main contribution of this study is the
                 design and instantiation of novel computational models
                 for detecting fake reviews. In particular, a novel text
                 mining model is developed and integrated into a
                 semantic language model for the detection of untruthful
                 reviews. The models are then evaluated based on a
                 real-world dataset collected from amazon.com. The
                 results of our experiments confirm that the proposed
                 models outperform other well-known baseline models in
                 detecting fake reviews. To the best of our knowledge,
                 the work discussed in this article represents the first
                 successful attempt to apply text mining methods and
                 semantic language models to the detection of fake
                 consumer reviews. A managerial implication of our
                 research is that firms can apply our design artifacts
                 to monitor online consumer reviews to develop effective
                 marketing or product design strategies based on genuine
                 consumer feedback posted to the Internet.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Marx:2011:SPR,
  author =       "Frederik Marx and J{\"o}rg H. Mayer and Robert
                 Winter",
  title =        "Six principles for redesigning executive information
                 systems-findings of a survey and evaluation of a
                 prototype",
  journal =      j-TMIS,
  volume =       "2",
  number =       "4",
  pages =        "26:1--26:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2070710.2070717",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 16 15:06:39 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Information Systems (IS) meant to help senior managers
                 are known as Executive Information Systems (EIS).
                 Despite a five-decade tradition of such IS, many
                 executives still complain that they bear little
                 relevance to managing a company and, even more, fail to
                 accommodate their working style. The increasing
                 acceptance of IS among today's executives and
                 technological advances of the Internet era make the
                 present moment favorable for redesigning EIS. Following
                 the design science paradigm in IS research, this
                 article provides six principles for such a redesign. To
                 do so, we survey executives regarding their
                 requirements and the IS they currently use. We then
                 derive principles for a redesign to fill the gaps. They
                 address diverse areas: a comprehensive information
                 model, functions to better analyze and process
                 information, easy-to-use IS handling, a more flexible
                 IS architecture and data model, a proper information
                 management, and fast prototype implementation. Finally
                 a field test demonstrates and evaluates the utility of
                 our proposal by means of a prototype.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Niederman:2012:DSA,
  author =       "Fred Niederman and Salvatore T. March",
  title =        "Design science and the accumulation of knowledge in
                 the information systems discipline",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151164",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Design science has emerged as an important research
                 paradigm in the information systems (IS) discipline,
                 and much has been written on how it should be conducted
                 and evaluated (e.g., Hevner et al. [2004]; Walls et al.
                 [1992]; Vaishnavi and Kuechler [2007]; Kuechler and
                 Vaishnavi [2008]; Peffers et al. [2007]; Iivari [2010];
                 Pigneur [2011]). We contend that, as a socio-technical
                 discipline, IS research must address the interaction
                 between design and behavior. We begin with a background
                 discussion of what we mean by IS research and the
                 nature of the relationship between design and
                 behavioral approaches to IS research. We discuss the
                 nature of design, design science, and IT artifacts
                 within information systems research and describe the
                 importance of linking design and behavioral
                 perspectives. We illustrate several key points using
                 selected articles recently published in ACM
                 Transactions on Management Information Systems
                 [Schmidt-Rauch and Schwabe 2011; Lau et al. 2011]. We
                 conclude with a vision of IS research in which the
                 capabilities and affordances of IT artifacts are
                 incorporated into behavioral studies; the results of
                 behavioral studies are utilized in the development and
                 evaluation of IT artifacts; and both behavioral and
                 design perspectives are used to address the important
                 problems of our constituent community.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Basoglu:2012:ERW,
  author =       "K. Asli Basoglu and Mark A. Fuller and Joseph S.
                 Valacich",
  title =        "Enhancement of recall within technology-mediated teams
                 through the use of online visual artifacts",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "2:1--2:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151165",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Given the distributed nature of modern organizations,
                 the use of technology-mediated teams is a critical
                 aspect of their success. These teams use various media
                 that are arguably less personal than face-to-face
                 communication. One factor influencing the success of
                 these teams is their ability to develop an
                 understanding of who knows what during the initial team
                 development stage. However, this development of
                 understanding within dispersed teams may be impeded
                 because of the limitations of technology-enabled
                 communication environments. Past research has found
                 that a limited understanding of team member
                 capabilities hinders team performance. As such, this
                 article investigates mechanisms for improving the
                 recall of individuals within dispersed teams. Utilizing
                 the input-process-output model to conceptualize the
                 group interaction process, three input factors-visual
                 artifacts (i.e., a computer-generated image of each
                 team member), team size, and work interruptions-are
                 manipulated to assess their influence on a person's
                 ability to recall important characteristics of their
                 virtual team members. Results show that visual
                 artifacts significantly increase the recall of
                 individuals' information. However, high-urgency
                 interruptions significantly deteriorate the recall of
                 individuals, regardless of the visual artifact or team
                 size. These findings provide theoretical and practical
                 implications on knowledge acquisition and project
                 success within technology-mediated teams.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Adomavicius:2012:IDC,
  author =       "Gediminas Adomavicius and Jingjing Zhang",
  title =        "Impact of data characteristics on recommender systems
                 performance",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "3:1--3:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151166",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This article investigates the impact of rating data
                 characteristics on the performance of several popular
                 recommendation algorithms, including user-based and
                 item-based collaborative filtering, as well as matrix
                 factorization. We focus on three groups of data
                 characteristics: rating space, rating frequency
                 distribution, and rating value distribution. A sampling
                 procedure was employed to obtain different rating data
                 subsamples with varying characteristics; recommendation
                 algorithms were used to estimate the predictive
                 accuracy for each sample; and linear regression-based
                 models were used to uncover the relationships between
                 data characteristics and recommendation accuracy.
                 Experimental results on multiple rating datasets show
                 the consistent and significant effects of several data
                 characteristics on recommendation accuracy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Robinson:2012:DDB,
  author =       "William N. Robinson and Arash Akhlaghi and Tianjie
                 Deng and Ali Raza Syed",
  title =        "Discovery and diagnosis of behavioral transitions in
                 patient event streams",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "4:1--4:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151167",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Users with cognitive impairments use assistive
                 technology (AT) as part of a clinical treatment plan.
                 As the AT interface is manipulated, data stream mining
                 techniques are used to monitor user goals. In this
                 context, real-time data mining aids clinicians in
                 tracking user behaviors as they attempt to achieve
                 their goals. Quality metrics over stream-mined models
                 identify potential changes in user goal attainment, as
                 the user learns his or her personalized emailing
                 system. When the quality of some data-mined models
                 varies significantly from nearby models-as defined by
                 quality metrics-the user's behavior is then flagged as
                 a significant behavioral change. The specific changes
                 in user behavior are then characterized by differencing
                 the data-mined decision tree models. This article
                 describes how model quality monitoring and decision
                 tree differencing can aid in recognition and diagnoses
                 of behavioral changes in a case study of cognitive
                 rehabilitation via emailing. The technique may be more
                 widely applicable to other real-time data-intensive
                 analysis problems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhang:2012:DWM,
  author =       "Zhu Zhang and Xin Li and Yubo Chen",
  title =        "Deciphering word-of-mouth in social media: Text-based
                 metrics of consumer reviews",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "5:1--5:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151168",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Enabled by Web 2.0 technologies, social media provide
                 an unparalleled platform for consumers to share their
                 product experiences and opinions through word-of-mouth
                 (WOM) or consumer reviews. It has become increasingly
                 important to understand how WOM content and metrics
                 influence consumer purchases and product sales. By
                 integrating marketing theories with text mining
                 techniques, we propose a set of novel measures that
                 focus on sentiment divergence in consumer product
                 reviews. To test the validity of these metrics, we
                 conduct an empirical study based on data from
                 Amazon.com and BN.com (Barnes {\&} Noble). The results
                 demonstrate significant effects of our proposed
                 measures on product sales. This effect is not fully
                 captured by nontextual review measures such as
                 numerical ratings. Furthermore, in capturing the sales
                 effect of review content, our divergence metrics are
                 shown to be superior to and more appropriate than some
                 commonly used textual measures the literature. The
                 findings provide important insights into the business
                 impact of social media and user-generated content, an
                 emerging problem in business intelligence research.
                 From a managerial perspective, our results suggest that
                 firms should pay special attention to textual content
                 information when managing social media and, more
                 importantly, focus on the right measures.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Malhotra:2012:HVT,
  author =       "Arvind Malhotra and Ann Majchrzak",
  title =        "How virtual teams use their virtual workspace to
                 coordinate knowledge",
  journal =      j-TMIS,
  volume =       "3",
  number =       "1",
  pages =        "6:1--6:??",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2151163.2151169",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:08 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Virtual team members increasingly rely on virtual
                 workspace tools to coordinate knowledge that each
                 individual brings to the team. How the use of these
                 tools affects knowledge coordination within virtual
                 teams is not well understood. We distinguish between
                 tools as features and the use of the virtual workspace
                 as providing affordances for behaviors. Using
                 situational awareness theory, we hypothesized two
                 affordances of virtual workspaces that facilitate
                 knowledge coordination. Using trading zone theory, we
                 hypothesized two forms of trading zones created by
                 features of virtual workspaces and the impact of these
                 trading zones on the creation of affordances for team
                 members. Members of 54 teams were asked about the
                 affordances of the virtual workspace, and team leaders
                 were asked about specific tools provided to the team.
                 Our hypothesized model was supported: the different
                 forms of trading zones were differentially related to
                 the different affordances and on affordances were
                 related to knowledge coordination satisfaction.
                 Theoretical implications focus on the distinction
                 between features and affordances and on the
                 identification of specific features that affect
                 specific affordances. Practical implications for
                 managers and engineers supporting virtual teams include
                 the utility of becoming knowledgeable about different
                 forms of trading zones that virtual workspaces can
                 provide and understanding the relationship between
                 trading zones and different affordances.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{vanderAalst:2012:PMO,
  author =       "Wil van der Aalst",
  title =        "Process Mining: Overview and Opportunities",
  journal =      j-TMIS,
  volume =       "3",
  number =       "2",
  pages =        "7:1--7:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2229156.2229157",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:09 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Over the last decade, process mining emerged as a new
                 research field that focuses on the analysis of
                 processes using event data. Classical data mining
                 techniques such as classification, clustering,
                 regression, association rule learning, and
                 sequence/episode mining do not focus on business
                 process models and are often only used to analyze a
                 specific step in the overall process. Process mining
                 focuses on end-to-end processes and is possible because
                 of the growing availability of event data and new
                 process discovery and conformance checking techniques.
                 Process models are used for analysis (e.g., simulation
                 and verification) and enactment by BPM/WFM systems.
                 Previously, process models were typically made by hand
                 without using event data. However, activities executed
                 by people, machines, and software leave trails in
                 so-called event logs. Process mining techniques use
                 such logs to discover, analyze, and improve business
                 processes. Recently, the Task Force on Process Mining
                 released the Process Mining Manifesto. This manifesto
                 is supported by 53 organizations and 77 process mining
                 experts contributed to it. The active involvement of
                 end-users, tool vendors, consultants, analysts, and
                 researchers illustrates the growing significance of
                 process mining as a bridge between data mining and
                 business process modeling. The practical relevance of
                 process mining and the interesting scientific
                 challenges make process mining one of the ``hot''
                 topics in Business Process Management (BPM). This
                 article introduces process mining as a new research
                 field and summarizes the guiding principles and
                 challenges described in the manifesto.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Shan:2012:OAC,
  author =       "Zhe Shan and Akhil Kumar",
  title =        "Optimal Adapter Creation for Process Composition in
                 Synchronous vs. Asynchronous Communication",
  journal =      j-TMIS,
  volume =       "3",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2229156.2229160",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:09 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "A key issue in process-aware e-commerce collaboration
                 is to orchestrate business processes of multiple
                 business partners throughout a supply chain network in
                 an automated and seamless way. Since each partner has
                 its own internal processes with different control flow
                 structures and message interfaces, the real challenge
                 lies in verifying the correctness of process
                 collaboration, and reconciling conflicts in an
                 automated manner to make collaboration successful. The
                 purpose of business process adaptation is to mediate
                 the communication between independent processes to
                 overcome their mismatches and incompatibilities. The
                 goal of this article is to develop and compare
                 efficient approaches of optimal adapter (i.e. one that
                 minimizes the number of messages to be adapted)
                 creation for multiple interacting processes under both
                 synchronous and asynchronous communication. We start
                 with an analysis of interactions of each message pair,
                 and show how to identify incompatible cases and their
                 adaptation elements for both types of communication.
                 Then, we show how to extend this analysis into more
                 general cases involving M messages and N processes ( M,
                 N {$>$} 2). Further, we present optimal adapter
                 creation algorithms for both scenarios based on our
                 analysis technique. The algorithms were implemented in
                 a Java-based prototype system, and results of two
                 experiments are reported. We compare and discuss the
                 insights gained about adapter creation in these two
                 scenarios.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Huang:2012:TNP,
  author =       "Zan Huang and Huimin Zhao and Dan Zhu",
  title =        "Two New Prediction-Driven Approaches to Discrete
                 Choice Prediction",
  journal =      j-TMIS,
  volume =       "3",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2229156.2229159",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:09 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The ability to predict consumer choices is essential
                 in understanding the demand structure of products and
                 services. Typical discrete choice models that are
                 targeted at providing an understanding of the
                 behavioral process leading to choice outcomes are
                 developed around two main assumptions: the existence of
                 a utility function that represents the preferences over
                 a choice set and the relatively simple and
                 interpretable functional form for the utility function
                 with respect to attributes of alternatives and decision
                 makers. These assumptions lead to models that can be
                 easily interpreted to provide insights into the effects
                 of individual variables, such as price and promotion,
                 on consumer choices. However, these restrictive
                 assumptions might impede the ability of such
                 theory-driven models to deliver accurate predictions
                 and forecasts. In this article, we develop novel
                 approaches targeted at providing more accurate choice
                 predictions. Specifically, we propose two
                 prediction-driven approaches: pairwise preference
                 learning using classification techniques and ranking
                 function learning using evolutionary computation. We
                 compare our proposed approaches with a multiclass
                 classification approach, as well as a standard discrete
                 choice model. Our empirical results show that the
                 proposed approaches achieved significantly higher
                 choice prediction accuracy.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ngo-Ye:2012:AOR,
  author =       "Thomas L. Ngo-Ye and Atish P. Sinha",
  title =        "Analyzing Online Review Helpfulness Using a
                 Regressional {ReliefF}-Enhanced Text Mining Method",
  journal =      j-TMIS,
  volume =       "3",
  number =       "2",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2229156.2229158",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:09 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Within the emerging context of Web 2.0 social media,
                 online customer reviews are playing an increasingly
                 important role in disseminating information,
                 facilitating trust, and promoting commerce in the
                 e-marketplace. The sheer volume of customer reviews on
                 the web produces information overload for readers.
                 Developing a system that can automatically identify the
                 most helpful reviews would be valuable to businesses
                 that are interested in gathering informative and
                 meaningful customer feedback. Because the target
                 variable---review helpfulness---is continuous, common
                 feature selection techniques from text classification
                 cannot be applied. In this article, we propose and
                 investigate a text mining model, enhanced using the
                 Regressional ReliefF (RReliefF) feature selection
                 method, for predicting the helpfulness of online
                 reviews from Amazon.com. We find that RReliefF
                 significantly outperforms two popular dimension
                 reduction methods. This study is the first to
                 investigate and compare different dimension reduction
                 techniques in the context of applying text regression
                 for predicting online review helpfulness. Another
                 contribution is that our analysis of the keywords
                 selected by RReliefF reveals meaningful feature
                 groupings.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Nussbaumer:2012:EVC,
  author =       "Philipp Nussbaumer and Inu Matter and Gerhard
                 Schwabe",
  title =        "``Enforced'' vs. ``Casual'' Transparency --- Findings
                 from {IT}-Supported Financial Advisory Encounters",
  journal =      j-TMIS,
  volume =       "3",
  number =       "2",
  pages =        "11:1--11:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2229156.2229161",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:09 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In sales-oriented service encounters like financial
                 advice, the client may perceive information and
                 interest asymmetries as a lack of transparency
                 regarding the advisor's activities. In this article, we
                 will discuss two design iterations of a supportive
                 tabletop application that we built to increase process
                 and information transparency as compared to the
                 traditional pen and paper encounters. While the first
                 iteration's design was ``enforcing'' transparency and
                 therefore proved to be a failure [Nussbaumer et al.
                 2011], we built the second iteration on design
                 rationales enabling more ``casual'' transparency.
                 Experimental evaluations show that the redesigned
                 system significantly increases the client's perceived
                 transparency, her perceived control of the encounter
                 and improves her perceived trustworthiness of and
                 satisfaction with the encounter. With these findings,
                 we contribute to (1) insight into the role of
                 transparency advisory encounter design; (2) design
                 solutions for establishing particular facets of
                 transparency and their potential instantiations in
                 tabletop systems; and (3) insight into the process of
                 designing for transparency with socio-technical
                 artifacts that are emergent as a result of design
                 activities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chiang:2012:BIA,
  author =       "Roger H. L. Chiang and Paulo Goes and Edward A.
                 Stohr",
  title =        "Business Intelligence and Analytics Education, and
                 Program Development: a Unique Opportunity for the
                 Information Systems Discipline",
  journal =      j-TMIS,
  volume =       "3",
  number =       "3",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2361256.2361257",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:10 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "``Big Data,'' huge volumes of data in both structured
                 and unstructured forms generated by the Internet,
                 social media, and computerized transactions, is
                 straining our technical capacity to manage it. More
                 importantly, the new challenge is to develop the
                 capability to understand and interpret the burgeoning
                 volume of data to take advantage of the opportunities
                 it provides in many human endeavors, ranging from
                 science to business. Data Science, and in business
                 schools, Business Intelligence and Analytics (BI{\&}A)
                 are emerging disciplines that seek to address the
                 demands of this new era. Big Data and BI{\&}A present
                 unique challenges and opportunities not only for the
                 research community, but also for Information Systems
                 (IS) programs at business schools. In this essay, we
                 provide a brief overview of BI{\&}A, speculate on the
                 role of BI{\&}A education in business schools, present
                 the challenges facing IS departments, and discuss the
                 role of IS curricula and program development, in
                 delivering BI{\&}A education. We contend that a new
                 vision for the IS discipline should address these
                 challenges.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Achananuparp:2012:WRT,
  author =       "Palakorn Achananuparp and Ee-Peng Lim and Jing Jiang
                 and Tuan-Anh Hoang",
  title =        "Who is Retweeting the Tweeters? {Modeling},
                 Originating, and Promoting Behaviors in the {Twitter}
                 Network",
  journal =      j-TMIS,
  volume =       "3",
  number =       "3",
  pages =        "13:1--13:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2361256.2361258",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:10 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Real-time microblogging systems such as Twitter offer
                 users an easy and lightweight means to exchange
                 information. Instead of writing formal and lengthy
                 messages, microbloggers prefer to frequently broadcast
                 several short messages to be read by other users. Only
                 when messages are interesting, are they propagated
                 further by the readers. In this article, we examine
                 user behavior relevant to information propagation
                 through microblogging. We specifically use retweeting
                 activities among Twitter users to define and model
                 originating and promoting behavior. We propose a basic
                 model for measuring the two behaviors, a mutual
                 dependency model, which considers the mutual
                 relationships between the two behaviors, and a
                 range-based model, which considers the depth and reach
                 of users' original tweets. Next, we compare the three
                 behavior models and contrast them with the existing
                 work on modeling influential Twitter users. Last, to
                 demonstrate their applicability, we further employ the
                 behavior models to detect interesting events from
                 sudden changes in aggregated information propagation
                 behavior of Twitter users. The results will show that
                 the proposed behavior models can be effectively applied
                 to detect interesting events in the Twitter stream,
                 compared to the baseline tweet-based approaches.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lu:2012:CRC,
  author =       "Hsin-Min Lu and Feng-Tse Tsai and Hsinchun Chen and
                 Mao-Wei Hung and Shu-Hsing Li",
  title =        "Credit Rating Change Modeling Using News and Financial
                 Ratios",
  journal =      j-TMIS,
  volume =       "3",
  number =       "3",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2361256.2361259",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:10 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Credit ratings convey credit risk information to
                 participants in financial markets, including investors,
                 issuers, intermediaries, and regulators. Accurate
                 credit rating information plays a crucial role in
                 supporting sound financial decision-making processes.
                 Most previous studies on credit rating modeling are
                 based on accounting and market information. Text data
                 are largely ignored despite the potential benefit of
                 conveying timely information regarding a firm's
                 outlook. To leverage the additional information in news
                 full-text for credit rating prediction, we designed and
                 implemented a news full-text analysis system that
                 provides firm-level coverage, topic, and sentiment
                 variables. The novel topic-specific sentiment variables
                 contain a large fraction of missing values because of
                 uneven news coverage. The missing value problem creates
                 a new challenge for credit rating prediction
                 approaches. We address this issue by developing a
                 missing-tolerant multinomial probit (MT-MNP) model,
                 which imputes missing values based on the Bayesian
                 theoretical framework. Our experiments using seven and
                 a half years of real-world credit ratings and news
                 full-text data show that (1) the overall news coverage
                 can explain future credit rating changes while the
                 aggregated news sentiment cannot; (2) topic-specific
                 news coverage and sentiment have statistically
                 significant impact on future credit rating changes; (3)
                 topic-specific negative sentiment has a more salient
                 impact on future credit rating changes compared to
                 topic-specific positive sentiment; (4) MT-MNP performs
                 better in predicting future credit rating changes
                 compared to support vector machines (SVM). The
                 performance gap as measured by macroaveraging F-measure
                 is small but consistent.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Wei:2012:UNA,
  author =       "Wei Wei and Sudha Ram",
  title =        "Using a Network Analysis Approach for Organizing
                 Social Bookmarking Tags and Enabling {Web} Content
                 Discovery",
  journal =      j-TMIS,
  volume =       "3",
  number =       "3",
  pages =        "15:1--15:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2361256.2361260",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:10 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This article describes an innovative approach to
                 reorganizing the tag space generated by social
                 bookmarking services. The objective of this work is to
                 enable effective search and discovery of Web content
                 using social bookmarking tags. Tags are metadata
                 generated by users for Web content annotation. Their
                 potential as effective Web search and discovery tool is
                 hindered by challenges such as, the tag space being
                 untidy due to ambiguity, and hidden or implicit
                 semantics. Using a novel analytics approach, we
                 conducted network analyses on tags and discovered that
                 tags are generated for different purposes and that
                 there are inherent relationships among tags. Our
                 approach can be used to extract the purposes of tags
                 and relationships among the tags and this information
                 can be used as facets to add structure and hierarchy to
                 reorganize the flat tag space. The semantics of
                 relationships and hierarchy in our proposed faceted
                 model of tags enable searches on annotated Web content
                 in an effective manner. We describe the implementation
                 of a prototype system called FASTS to demonstrate
                 feasibility and effectiveness of our approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Hu:2012:DVP,
  author =       "Nan Hu and Hasan Cavusoglu and Ling Liu and Chenkai
                 Ni",
  title =        "Do Vendors' Pricing Decisions Fully Reflect
                 Information in Online Reviews?",
  journal =      j-TMIS,
  volume =       "3",
  number =       "3",
  pages =        "16:1--16:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2361256.2361261",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Nov 6 19:02:10 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "By using online retail data collected from Amazon,
                 Barnes {\&} Nobel, and Pricegrabber, this paper
                 investigates whether online vendors' pricing decisions
                 fully reflect the information contained in various
                 components of customers' online reviews. The findings
                 suggest that there is inefficiency in vendors' pricing
                 decisions. Specifically, vendors do not appear to fully
                 understand the incremental predictive power of online
                 reviews in forecasting future sales when they adjust
                 their prices. However, they do understand demand
                 persistence. Interestingly, vendors reduce price if the
                 actual demand is higher than the expected demand
                 (positive demand shock). This phenomenon is attributed
                 to the advertising effect suggested in previous
                 literature and the intense competitiveness of
                 e-Commerce. Finally, we document that vendors do not
                 change their prices directly in response to online
                 reviews; their response to online reviews is through
                 forecasting consumer's future demand.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lim:2013:BIA,
  author =       "Ee-Peng Lim and Hsinchun Chen and Guoqing Chen",
  title =        "Business Intelligence and Analytics: Research
                 Directions",
  journal =      j-TMIS,
  volume =       "3",
  number =       "4",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2407740.2407741",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business intelligence and analytics (BIA) is about the
                 development of technologies, systems, practices, and
                 applications to analyze critical business data so as to
                 gain new insights about business and markets. The new
                 insights can be used for improving products and
                 services, achieving better operational efficiency, and
                 fostering customer relationships. In this article, we
                 will categorize BIA research activities into three
                 broad research directions: (a) big data analytics, (b)
                 text analytics, and (c) network analytics. The article
                 aims to review the state-of-the-art techniques and
                 models and to summarize their use in BIA applications.
                 For each research direction, we will also determine a
                 few important questions to be addressed in future
                 research.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhang:2013:CMS,
  author =       "Bin Zhang and Andrew C. Thomas and Patrick Doreian and
                 David Krackhardt and Ramayya Krishnan",
  title =        "Contrasting Multiple Social Network Autocorrelations
                 for Binary Outcomes, With Applications To Technology
                 Adoption",
  journal =      j-TMIS,
  volume =       "3",
  number =       "4",
  pages =        "18:1--18:??",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2407740.2407742",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The rise of socially targeted marketing suggests that
                 decisions made by consumers can be predicted not only
                 from their personal tastes and characteristics, but
                 also from the decisions of people who are close to them
                 in their networks. One obstacle to consider is that
                 there may be several different measures for closeness
                 that are appropriate, either through different types of
                 friendships, or different functions of distance on one
                 kind of friendship, where only a subset of these
                 networks may actually be relevant. Another is that
                 these decisions are often binary and more difficult to
                 model with conventional approaches, both conceptually
                 and computationally. To address these issues, we
                 present a hierarchical auto-probit model for individual
                 binary outcomes that uses and extends the machinery of
                 the auto-probit method for binary data. We demonstrate
                 the behavior of the parameters estimated by the
                 multiple network-regime auto-probit model (m-NAP) under
                 various sensitivity conditions, such as the impact of
                 the prior distribution and the nature of the structure
                 of the network. We also demonstrate several examples of
                 correlated binary data outcomes in networks of interest
                 to information systems, including the adoption of
                 caller ring-back tones, whose use is governed by direct
                 connection but explained by additional network
                 topologies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Pervin:2013:FSC,
  author =       "Nargis Pervin and Fang Fang and Anindya Datta and
                 Kaushik Dutta and Debra Vandermeer",
  title =        "Fast, Scalable, and Context-Sensitive Detection of
                 Trending Topics in Microblog Post Streams",
  journal =      j-TMIS,
  volume =       "3",
  number =       "4",
  pages =        "19:1--19:??",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2407740.2407743",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Social networks, such as Twitter, can quickly and
                 broadly disseminate news and memes across both
                 real-world events and cultural trends. Such networks
                 are often the best sources of up-to-the-minute
                 information, and are therefore of considerable
                 commercial and consumer interest. The trending topics
                 that appear first on these networks represent an answer
                 to the age-old query ``what are people talking about?''
                 Given the incredible volume of posts (on the order of
                 45,000 or more per minute), and the vast number of
                 stories about which users are posting at any given
                 time, it is a formidable problem to extract trending
                 stories in real time. In this article, we describe a
                 method and implementation for extracting trending
                 topics from a high-velocity real-time stream of
                 microblog posts. We describe our approach and
                 implementation, and a set of experimental results that
                 show that our system can accurately find ``hot''
                 stories from high-rate Twitter-scale text streams.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhang:2013:PCN,
  author =       "Zhu Zhang and Chenhui Guo and Paulo Goes",
  title =        "Product Comparison Networks for Competitive Analysis
                 of Online Word-of-Mouth",
  journal =      j-TMIS,
  volume =       "3",
  number =       "4",
  pages =        "20:1--20:??",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2407740.2407744",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Enabled by Web 2.0 technologies social media provide
                 an unparalleled platform for consumers to share their
                 product experiences and opinions---through
                 word-of-mouth (WOM) or consumer reviews. It has become
                 increasingly important to understand how WOM content
                 and metrics thereof are related to consumer purchases
                 and product sales. By integrating network analysis with
                 text sentiment mining techniques, we propose product
                 comparison networks as a novel construct, computed from
                 consumer product reviews. To test the validity of these
                 product ranking measures, we conduct an empirical study
                 based on a digital camera dataset from Amazon.com. The
                 results demonstrate significant linkage between
                 network-based measures and product sales, which is not
                 fully captured by existing review measures such as
                 numerical ratings. The findings provide important
                 insights into the business impact of social media and
                 user-generated content, an emerging problem in business
                 intelligence research. From a managerial perspective,
                 our results suggest that WOM in social media also
                 constitutes a competitive landscape for firms to
                 understand and manipulate.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yaraghi:2013:NEH,
  author =       "Niam Yaraghi and Anna Ye Du and Raj Sharman and Ram D.
                 Gopal and R. Ramesh",
  title =        "Network Effects in Health Information Exchange
                 Growth",
  journal =      j-TMIS,
  volume =       "4",
  number =       "1",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2445560.2445561",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The importance of the Healthcare Information Exchange
                 (HIE) in increasing healthcare quality and reducing
                 risks and costs has led to greater interest in
                 identifying factors that enhance adoption and
                 meaningful use of HIE by healthcare providers. In this
                 research we study the interlinked network effects
                 between two different groups of physicians --- primary
                 care physicians and specialists --- as significant
                 factors in increasing the growth of each group in an
                 exchange. An analytical model of interlinked and
                 intragroup influences on adoption is developed using
                 the Bass diffusion model as a basis. Adoption data on
                 1,060 different primary and secondary care physicians
                 over 32 consecutive months was used to test the model.
                 The results indicate not only the presence of
                 interlinked effects, but also that their influence is
                 stronger than that of the intragroup. Further, the
                 influence of primary care physicians on specialists is
                 stronger than that of specialists on primary care
                 physicians. We also provide statistical evidence that
                 the new model performs better than the conventional
                 Bass model, and the assumptions of diffusion symmetry
                 in the market are statistically valid. Together, the
                 findings provide important guidelines on triggers that
                 enhance the overall growth of HIE and potential
                 marketing strategies for HIE services.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Valecha:2013:DMC,
  author =       "Rohit Valecha and Raj Sharman and H. Raghav Rao and
                 Shambhu Upadhyaya",
  title =        "A Dispatch-Mediated Communication Model for Emergency
                 Response Systems",
  journal =      j-TMIS,
  volume =       "4",
  number =       "1",
  pages =        "2:1--2:??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2445560.2445562",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The current state of emergency communication is
                 dispatch-mediated (the messages from the scene are
                 directed towards the responders and agencies through
                 the dispatch agency). These messages are logged in
                 electronic documents called incident reports, which are
                 useful in monitoring the incident, off-site
                 supervision, resource allocation, and post-incident
                 analysis. However, these messages do not adhere to any
                 particular structure, and there is no set format. The
                 lack of standards creates a problem for sharing
                 information among systems and responders and has a
                 detrimental impact on systems interoperability. In this
                 article, we develop a National Information Exchange
                 Model (NIEM) and Universal Core (UCORE) compliant
                 messaging model, considering message structures and
                 formats, to foster message standardization.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Choi:2013:ISI,
  author =       "Jae Choi and Derek L. Nazareth and Hemant K. Jain",
  title =        "The Impact of {SOA} Implementation on {IT}-Business
                 Alignment: a System Dynamics Approach",
  journal =      j-TMIS,
  volume =       "4",
  number =       "1",
  pages =        "3:1--3:??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2445560.2445563",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "With firms facing intense rivalry, globalization, and
                 time-to-market pressures, the need for organizational
                 agility assumes greater importance. One of the primary
                 vehicles for achieving organizational agility is the
                 use of agile information systems [IS] and the close
                 alignment of information technologies [IT] with
                 business. However, IS is often viewed as an impediment
                 to organization agility. Recently, service-oriented
                 architecture [SOA] has emerged as a prominent IS
                 agility-enhancing technology. The fundamental question
                 of how SOA can enhance organization agility and foster
                 closer alignment between IT and business has not been
                 adequately addressed. The dynamic interaction among
                 external business environmental factors, organizational
                 agility, and IS architecture makes the process of
                 keeping IT and business aligned more complex. This
                 study uses a design science approach to build a system
                 dynamics model to examine the effect of employing
                 alternative SOA implementation strategies in various
                 organizational and external business environments on
                 the IT business alignment and IS cost. The results
                 provide insights into the shaping of IT-business
                 alignment. Additionally, the system dynamics model
                 serves as a tool for supporting managerial decisions
                 related to SOA implementation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ullah:2013:SRB,
  author =       "Azmat Ullah and Richard Lai",
  title =        "A Systematic Review of Business and Information
                 Technology Alignment",
  journal =      j-TMIS,
  volume =       "4",
  number =       "1",
  pages =        "4:1--4:??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2445560.2445564",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 30 18:40:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business organizations have become heavily dependent
                 on information technology (IT) services. The process of
                 alignment is defined as the mutual synchronization of
                 business goals and IT services. However, achieving
                 mature alignment between business and IT is difficult
                 due to the rapid changes in the business and IT
                 environments. This article provides a systematic review
                 of studies on the alignment of business and IT. The
                 research articles reviewed are based on topics of
                 alignment, the definition of alignment, history,
                 alignment challenges, phases of alignment, alignment
                 measurement approaches, the importance of alignment in
                 business industries, how software engineering helps in
                 better alignment, and the role of the business
                 environment in aligning business with IT. It aims to
                 present a thorough understanding of business-IT
                 alignment and to provide a list of future research
                 directions regarding alignment. To perform the
                 systematic review, we used the guidelines developed by
                 Kitchenham for reviewing the available research papers
                 relevant to our topic.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Gill:2013:FUM,
  author =       "T. Grandon Gill and Alan R. Hevner",
  title =        "A Fitness-Utility Model for Design Science Research",
  journal =      j-TMIS,
  volume =       "4",
  number =       "2",
  pages =        "5:1--5:??",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499962.2499963",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:56 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Current thinking in design science research (DSR)
                 defines the usefulness of the design artifact in a
                 relevant problem environment as the primary research
                 goal. Here we propose a complementary evaluation model
                 for DSR. Drawing from evolutionary economics, we define
                 a fitness-utility model that better captures the
                 evolutionary nature of design improvements and the
                 essential DSR nature of searching for a satisfactory
                 design across a fitness landscape. Our goal is to move
                 DSR to more meaningful evaluations of design artifacts
                 for sustainable impacts. A key premise of this new
                 thinking is that the evolutionary fitness of a design
                 artifact is more valuable than its immediate
                 usefulness. We conclude with a discussion of the
                 strengths and challenges of the fitness-utility model
                 for the performance of rigorous and relevant DSR.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Wu:2013:DKM,
  author =       "Jiming Wu and Clyde W. Holsapple",
  title =        "Does Knowledge Management Matter? {The} Empirical
                 Evidence from Market-Based Valuation",
  journal =      j-TMIS,
  volume =       "4",
  number =       "2",
  pages =        "6:1--6:??",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2500750",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:56 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Information technology is inseparable from
                 contemporary knowledge management (KM). Although
                 anecdotal evidence and individual case studies suggest
                 that effective knowledge management initiatives
                 contribute to superior firm performance, other kinds of
                 empirical investigations are scarce, and more to the
                 point, most of them are based on perceptions of survey
                 participants embedded in the firms being studied.
                 Moreover, studies analyzing the question of whether
                 superior KM performance can predict superior
                 market-based valuation appear to be virtually
                 nonexistent. Findings of such studies would be of value
                 to those who champion and direct a firm's KM efforts,
                 and to the firm's strategists, planners, and
                 operational managers. Here, we empirically examine the
                 relationship between KM performance and firm valuation;
                 the former is assessed by international panels of
                 independent KM experts and the latter is evaluated in
                 terms of market-based measures. Based on data spanning
                 eight years, the results show that superior KM
                 performance has a statistically significant positive
                 association with firm valuation in terms of Tobin's q,
                 price-to-book ratio, and price-to-sales ratio. This
                 study contributes to the management literature by using
                 independent expert judges and archival data to
                 substantiate the notion that KM competencies are an
                 important ingredient in a firm's performance as
                 indicated by market-based valuation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Orman:2013:BIT,
  author =       "Levent V. Orman",
  title =        "{Bayesian} Inference in Trust Networks",
  journal =      j-TMIS,
  volume =       "4",
  number =       "2",
  pages =        "7:1--7:??",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2489790",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:56 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Trust has emerged as a major impediment to the success
                 of electronic markets and communities where interaction
                 with the strangers is the norm. Social Networks and
                 Online Communities enable interaction with complete
                 strangers, and open up new commercial, political, and
                 social possibilities. But those promises are rarely
                 achieved because it is difficult to trust the online
                 contacts. A common approach to remedy this problem is
                 to compute trust values for the new contacts from the
                 existing trust values in the network. There are two
                 main methods: aggregation and transitivity. Yet,
                 neither method provides satisfactory results because
                 trust networks are sparse and transitivity may not
                 hold. This article develops a Bayesian formulation of
                 the problem, where trust is defined as a conditional
                 probability, and a Bayesian Network analysis is
                 employed to compute the unknown trust values in terms
                 of the known trust values. The algorithms used to
                 propagate conditional probabilities through the network
                 are theoretically sound and based on a long-standing
                 literature on probability propagation in Bayesian
                 networks. Moreover, the context information that is
                 typically ignored in trust literature is included here
                 as a major factor in computing new trust values. These
                 changes have led to significant improvements over
                 existing approaches in the accuracy of computed trust,
                 and with some modifications to the algorithm, in its
                 reach. Real data acquired from Advogato network is used
                 to do extensive testing, and the results confirm the
                 practical value of a theoretically sound Bayesian
                 approach.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhang:2013:RWM,
  author =       "Zhu Zhang and Daniel D. Zeng and Ahmed Abbasi and Jing
                 Peng and Xiaolong Zheng",
  title =        "A Random Walk Model for Item Recommendation in Social
                 Tagging Systems",
  journal =      j-TMIS,
  volume =       "4",
  number =       "2",
  pages =        "8:1--8:??",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2490860",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:56 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Social tagging, as a novel approach to information
                 organization and discovery, has been widely adopted in
                 many Web 2.0 applications. Tags contributed by users to
                 annotate a variety of Web resources or items provide a
                 new type of information that can be exploited by
                 recommender systems. Nevertheless, the sparsity of the
                 ternary interaction data among users, items, and tags
                 limits the performance of tag-based recommendation
                 algorithms. In this article, we propose to deal with
                 the sparsity problem in social tagging by applying
                 random walks on ternary interaction graphs to explore
                 transitive associations between users and items. The
                 transitive associations in this article refer to the
                 path of the link between any two nodes whose length is
                 greater than one. Taking advantage of these transitive
                 associations can allow more accurate measurement of the
                 relevance between two entities (e.g., user-item,
                 user-user, and item-item). A PageRank-like algorithm
                 has been developed to explore these transitive
                 associations by spreading users' preferences on an item
                 similarity graph and spreading items' influences on a
                 user similarity graph. Empirical evaluation on three
                 real-world datasets demonstrates that our approach can
                 effectively alleviate the sparsity problem and improve
                 the quality of item recommendation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Derrick:2013:DDC,
  author =       "Douglas C. Derrick and Thomas O. Meservy and Jeffrey
                 L. Jenkins and Judee K. Burgoon and Jay F. {Nunamaker,
                 Jr.}",
  title =        "Detecting Deceptive Chat-Based Communication Using
                 Typing Behavior and Message Cues",
  journal =      j-TMIS,
  volume =       "4",
  number =       "2",
  pages =        "9:1--9:??",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2499962.2499967",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:56 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Computer-mediated deception is prevalent and may have
                 serious consequences for individuals, organizations,
                 and society. This article investigates several metrics
                 as predictors of deception in synchronous chat-based
                 environments, where participants must often
                 spontaneously formulate deceptive responses. Based on
                 cognitive load theory, we hypothesize that deception
                 influences response time, word count, lexical
                 diversity, and the number of times a chat message is
                 edited. Using a custom chatbot to conduct interviews in
                 an experiment, we collected 1,572 deceitful and 1,590
                 truthful chat-based responses. The results of the
                 experiment confirm that deception is positively
                 correlated with response time and the number of edits
                 and negatively correlated to word count. Contrary to
                 our prediction, we found that deception is not
                 significantly correlated with lexical diversity.
                 Furthermore, the age of the participant moderates the
                 influence of deception on response time. Our results
                 have implications for understanding deceit in
                 chat-based communication and building
                 deception-detection decision aids in chat-based
                 systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sarker:2013:MOB,
  author =       "Suprateek Sarker and Suranjan Chakraborty and Patriya
                 Silpakit Tansuhaj and Mark Mulder and Kivilcim
                 Dogerlioglu-Demir",
  title =        "The {``Mail-Order-Bride'' (MOB)} Phenomenon in the
                 Cyberworld: an Interpretive Investigation",
  journal =      j-TMIS,
  volume =       "4",
  number =       "3",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2524263",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:58 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Information technology (IT) is often an enabler in
                 bringing people together. In the context of this study,
                 IT helps connect matchmaking service providers with
                 those looking for love, particularly when a male seeks
                 to meet and possibly marry a female from another
                 country: a process which results in over 16,500 such
                 `mail-order-bride' (MOB) marriages a year in the United
                 States alone. Past research in business disciplines has
                 been largely silent about the way in which this process
                 unfolds, the perspectives of the participants at
                 different points of time, and the role of IT underlying
                 the MOB matchmaking service. Adopting an interpretivist
                 stance, and utilizing some of the methodological
                 guidelines associated with the Grounded Theory
                 Methodology (GTM), we develop a process model which
                 highlights: (a) the key states of the process through
                 which the relationship between the MOB seeker (the man)
                 and the MOB (the woman) unfolds, (b) the transitions
                 between states, and (c) the triggering conditions for
                 the transitions from one state to another. This study
                 also highlights key motivations of the individuals
                 participating in the MOB process, the effect of power
                 and the role it plays in the dynamics of the
                 relationships, the status of women and how their status
                 evolves during the MOB process, and the unique
                 affordance provided by IT as the relationships
                 evolve.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kasiri:2013:ROS,
  author =       "Narges Kasiri and Ramesh Sharda",
  title =        "Real Options and System Dynamics for Information
                 Technology Investment Decisions: Application to {RFID}
                 Adoption in Retail",
  journal =      j-TMIS,
  volume =       "4",
  number =       "3",
  pages =        "11:1--11:??",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2517309",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:58 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We propose a unique combination of system dynamics and
                 real options into a robust and innovative model for
                 analyzing return on investments in IT. Real options
                 modeling allows a cost benefit analysis to take into
                 account managerial flexibilities when there is
                 uncertainty in the investment, while system dynamics
                 can build a predictive model, in which one can simulate
                 different real-life and hypothetical scenarios in order
                 to provide measurements that can be used in the real
                 options model. Our return on the investment model
                 combines these long-established quantitative techniques
                 in a novel manner. This study applies this robust
                 hybrid model to a challenging IT investment problem:
                 adoption of RFID in retail. Item-level RFID is the next
                 generation of identification technology in the retail
                 sector. Our method can help managers to overcome the
                 complexity and uncertainties in the investment timing
                 of this technology. We analyze the RFID considerations
                 in retail decision-making using real data compiled from
                 a Delphi study. Our model demonstrates how the cost and
                 benefits of such an investment change over time. The
                 results highlight the variable cost of RFID tags as the
                 key factor in the decision process concerning whether
                 to immediately adopt or postpone the use of RFID in
                 retail. Our exploratory work suggests that it is
                 possible to combine merchandising and pricing issues in
                 addition to the traditional supply chain management
                 issues in studying any multifaceted problem in
                 retail.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mathew:2013:DPP,
  author =       "George Mathew and Zoran Obradovic",
  title =        "Distributed Privacy-Preserving Decision Support System
                 for Highly Imbalanced Clinical Data",
  journal =      j-TMIS,
  volume =       "4",
  number =       "3",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2517310",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:58 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "When a medical practitioner encounters a patient with
                 rare symptoms that translates to rare occurrences in
                 the local database, it is quite valuable to draw
                 conclusions collectively from such occurrences in other
                 hospitals. However, for such rare conditions, there
                 will be a huge imbalance in classes among the relevant
                 base population. Due to regulations and privacy
                 concerns, collecting data from other hospitals will be
                 problematic. Consequently, distributed decision support
                 systems that can use just the statistics of data from
                 multiple hospitals are valuable. We present a system
                 that can collectively build a distributed
                 classification model dynamically without the need of
                 patient data from each site in the case of imbalanced
                 data. The system uses a voting ensemble of experts for
                 the decision model. The imbalance condition and number
                 of experts can be determined by the system. Since only
                 statistics of the data and no raw data are required by
                 the system, patient privacy issues are addressed. We
                 demonstrate the outlined principles using the
                 Nationwide Inpatient Sample (NIS) database. Results of
                 experiments conducted on 7,810,762 patients from 1050
                 hospitals show improvement of 13.68\% to 24.46\% in
                 balanced prediction accuracy using our model over the
                 baseline model, illustrating the effectiveness of the
                 proposed methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sakata:2013:IEE,
  author =       "Masato Sakata and Zeynep Y{\"u}cel and Kazuhiko
                 Shinozawa and Norihiro Hagita and Michita Imai and
                 Michiko Furutani and Rumiko Matsuoka",
  title =        "An Inference Engine for Estimating Outside States of
                 Clinical Test Items",
  journal =      j-TMIS,
  volume =       "4",
  number =       "3",
  pages =        "13:1--13:??",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2517084",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:58 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Common periodical health check-ups include several
                 clinical test items with affordable cost. However,
                 these standard tests do not directly indicate signs of
                 most lifestyle diseases. In order to detect such
                 diseases, a number of additional specific clinical
                 tests are required, which increase the cost of the
                 health check-up. This study aims to enrich our
                 understanding of the common health check-ups and
                 proposes a way to estimate the signs of several
                 lifestyle diseases based on the standard tests in
                 common examinations without performing any additional
                 specific tests. In this manner, we enable a diagnostic
                 process, where the physician may prefer to perform or
                 avoid a costly test according to the estimation carried
                 out through a set of common affordable tests. To that
                 end, the relation between standard and specific test
                 results is modeled with a multivariate kernel density
                 estimate. The condition of the patient regarding a
                 specific test is assessed following a Bayesian
                 framework. Our results indicate that the proposed
                 method achieves an overall estimation accuracy of 84\%.
                 In addition, an outstanding estimation accuracy is
                 achieved for a subset of high-cost tests. Moreover,
                 comparison with standard artificial intelligence
                 methods suggests that our algorithm outperforms the
                 conventional methods. Our contributions are as follows:
                 (i) promotion of affordable health check-ups, (ii) high
                 estimation accuracy in certain tests, (iii)
                 generalization capability due to ease of implementation
                 on different platforms and institutions, (iv)
                 flexibility to apply to various tests and potential to
                 improve early detection rates.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Edgcomb:2013:AEA,
  author =       "Alex Edgcomb and Frank Vahid",
  title =        "Accurate and Efficient Algorithms that Adapt to
                 Privacy-Enhanced Video for Improved Assistive
                 Monitoring",
  journal =      j-TMIS,
  volume =       "4",
  number =       "3",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2523025.2523026",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:58 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Automated monitoring algorithms operating on live
                 video streamed from a home can effectively aid in
                 several assistive monitoring goals, such as detecting
                 falls or estimating daily energy expenditure. Use of
                 video raises obvious privacy concerns. Several privacy
                 enhancements have been proposed such as modifying a
                 person in video by introducing blur, silhouette, or
                 bounding-box. Person extraction is fundamental in
                 video-based assistive monitoring and degraded in the
                 presence of privacy enhancements; however, privacy
                 enhancements have characteristics that can
                 opportunistically be adapted to. We propose two
                 adaptive algorithms for improving assistive monitoring
                 goal performance with privacy-enhanced video:
                 specific-color hunter and edge-void filler. A
                 nonadaptive algorithm, foregrounding, is used as the
                 default algorithm for the adaptive algorithms. We
                 compare nonadaptive and adaptive algorithms with 5
                 common privacy enhancements on the effectiveness of 8
                 automated monitoring goals. The nonadaptive algorithm
                 performance on privacy-enhanced video is degraded from
                 raw video. However, adaptive algorithms can compensate
                 for the degradation. Energy estimation accuracy in our
                 tests degraded from 90.9\% to 83.9\%, but the adaptive
                 algorithms significantly compensated by bringing the
                 accuracy up to 87.1\%. Similarly, fall detection
                 accuracy degraded from 1.0 sensitivity to 0.86 and from
                 1.0 specificity to 0.79, but the adaptive algorithms
                 compensated accuracy back to 0.92 sensitivity and 0.90
                 specificity. Additionally, the adaptive algorithms were
                 computationally more efficient than the nonadaptive
                 algorithm, averaging 1.7\% more frames processed per
                 second.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yang:2013:SHW,
  author =       "Christopher C. Yang and Gondy Leroy and Sophia
                 Ananiadou",
  title =        "Smart Health and Wellbeing",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "15:1--15:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2555810.2555811",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Healthcare informatics has drawn substantial attention
                 in recent years. Current work on healthcare informatics
                 is highly interdisciplinary involving methodologies
                 from computing, engineering, information science,
                 behavior science, management science, social science,
                 as well as many different areas in medicine and public
                 health. Three major tracks, (i) systems, (ii)
                 analytics, and (iii) human factors, can be identified.
                 The systems track focuses on healthcare system
                 architecture, framework, design, engineering, and
                 application; the analytics track emphasizes
                 data/information processing, retrieval, mining,
                 analytics, as well as knowledge discovery; the human
                 factors track targets the understanding of users or
                 context, interface design, and user studies of
                 healthcare applications. In this article, we discuss
                 some of the latest development and introduce several
                 articles selected for this special issue. We envision
                 that the development of computing-oriented healthcare
                 informatics research will continue to grow rapidly. The
                 integration of different disciplines to advance the
                 healthcare and wellbeing of our society will also be
                 accelerated.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Wang:2013:MTE,
  author =       "Zidong Wang and Julie Eatock and Sally McClean and
                 Dongmei Liu and Xiaohui Liu and Terry Young",
  title =        "Modeling Throughput of Emergency Departments via Time
                 Series: an Expectation Maximization Algorithm",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "16:1--16:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2544105",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In this article, the expectation maximization (EM)
                 algorithm is applied for modeling the throughput of
                 emergency departments via available time-series data.
                 The dynamics of emergency department throughput is
                 developed and evaluated, for the first time, as a
                 stochastic dynamic model that consists of the noisy
                 measurement and first-order autoregressive (AR)
                 stochastic dynamic process. By using the EM algorithm,
                 the model parameters, the actual throughput, as well as
                 the noise intensity, can be identified simultaneously.
                 Four real-world time series collected from an emergency
                 department in West London are employed to demonstrate
                 the effectiveness of the introduced algorithm. Several
                 quantitative indices are proposed to evaluate the
                 inferred models. The simulation shows that the
                 identified model fits the data very well.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhang:2013:MDP,
  author =       "He Zhang and Sanjay Mehotra and David Liebovitz and
                 Carl A. Gunter and Bradley Malin",
  title =        "Mining Deviations from Patient Care Pathways via
                 Electronic Medical Record System Audits",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "17:1--17:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2544102",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In electronic medical record (EMR) systems,
                 administrators often provide EMR users with broad
                 access privileges, which may leave the system
                 vulnerable to misuse and abuse. Given that patient care
                 is based on a coordinated workflow, we hypothesize that
                 care pathways can be represented as the progression of
                 a patient through a system and introduce a strategy to
                 model the patient's flow as a sequence of accesses
                 defined over a graph. Elements in the sequence
                 correspond to features associated with the access
                 transaction (e.g., reason for access). Based on this
                 motivation, we model patterns of patient record usage,
                 which may indicate deviations from care workflows. We
                 evaluate our approach using several months of data from
                 a large academic medical center. Empirical results show
                 that this framework finds a small portion of accesses
                 constitute outliers from such flows. We also observe
                 that the violation patterns deviate for different types
                 of medical services. Analysis of our results suggests
                 greater deviation from normal access patterns by
                 nonclinical users. We simulate anomalies in the context
                 of real accesses to illustrate the efficiency of the
                 proposed method for different medical services. As an
                 illustration of the capabilities of our method, it was
                 observed that the area under the receiver operating
                 characteristic (ROC) curve for the Pediatrics service
                 was found to be 0.9166. The results suggest that our
                 approach is competitive with, and often better than,
                 the existing state-of-the-art in its outlier detection
                 performance. At the same time, our method is more
                 efficient, by orders of magnitude, than previous
                 approaches, allowing for detection of thousands of
                 accesses in seconds.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Khosla:2013:ECM,
  author =       "Rajiv Khosla and Mei-Tai Chu",
  title =        "Embodying Care in {Matilda}: an Affective
                 Communication Robot for Emotional Wellbeing of Older
                 People in {Australian} Residential Care Facilities",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "18:1--18:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2544104",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Ageing population is at the center of the looming
                 healthcare crisis in most parts of the developed and
                 developing world. Australia, like most of the western
                 world, is bracing up for the looming ageing population
                 crisis, spiraling healthcare costs, and expected
                 serious shortage of healthcare workers. Assistive
                 service and companion (social) robots are being seen as
                 one of the ways for supporting aged care facilities to
                 meet this challenge and improve the quality of care of
                 older people including mental and physical health
                 outcomes, as well as to support healthcare workers in
                 personalizing care. In this article, the authors report
                 on the design and implementation of first-ever field
                 trials of Matilda, a human-like assistive communication
                 (service and companion) robot for improving the
                 emotional well-being of older people in three
                 residential care facilities in Australia involving 70
                 participants. The research makes several unique
                 contributions including Matilda's ability to break
                 technology barriers, positively engage older people in
                 group and one-to-one activities, making these older
                 people productive and useful, helping them become
                 resilient and cope better through personalization of
                 care, and finally providing them sensory enrichment
                 through Matilda's multimodal communication
                 capabilities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lisetti:2013:CHY,
  author =       "Christine Lisetti and Reza Amini and Ugan Yasavur and
                 Naphtali Rishe",
  title =        "{I} Can Help You Change! {An} Empathic Virtual Agent
                 Delivers Behavior Change Health Interventions",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "19:1--19:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2544103",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We discuss our approach to developing a novel modality
                 for the computer-delivery of Brief Motivational
                 Interventions (BMIs) for behavior change in the form of
                 a personalized On-Demand VIrtual Counselor (ODVIC),
                 accessed over the internet. ODVIC is a multimodal
                 Embodied Conversational Agent (ECA) that empathically
                 delivers an evidence-based behavior change intervention
                 by adapting, in real-time, its verbal and nonverbal
                 communication messages to those of the user's during
                 their interaction. We currently focus our work on
                 excessive alcohol consumption as a target behavior, and
                 our approach is adaptable to other target behaviors
                 (e.g., overeating, lack of exercise, narcotic drug use,
                 non-adherence to treatment). We based our current
                 approach on a successful existing patient-centered
                 brief motivational intervention for behavior
                 change---the Drinker's Check-Up (DCU)---whose
                 computer-delivery with a text-only interface has been
                 found effective in reducing alcohol consumption in
                 problem drinkers. We discuss the results of users'
                 evaluation of the computer-based DCU intervention
                 delivered with a text-only interface compared to the
                 same intervention delivered with two different ECAs (a
                 neutral one and one with some empathic abilities).
                 Users rate the three systems in terms of acceptance,
                 perceived enjoyment, and intention to use the system,
                 among other dimensions. We conclude with a discussion
                 of how our positive results encourage our long-term
                 goals of on-demand conversations, anytime, anywhere,
                 with virtual agents as personal health and well-being
                 helpers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mirani:2013:BBI,
  author =       "Rajesh Mirani and Anju Harpalani",
  title =        "Business Benefits or Incentive Maximization? Impacts
                 of the {Medicare} {EHR} Incentive Program at Acute Care
                 Hospitals",
  journal =      j-TMIS,
  volume =       "4",
  number =       "4",
  pages =        "20:1--20:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2543900",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 13 06:54:59 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This study investigates the influence of the Medicare
                 EHR Incentive Program on EHR adoption at acute care
                 hospitals and the impact of EHR adoption on operational
                 and financial efficiency/effectiveness. It finds that
                 even before joining the incentive program, adopter
                 hospitals had more efficient and effective Medicare
                 operations than those of non-adopters. Adopters were
                 also financially more efficient. After joining the
                 program, adopter hospitals treated significantly more
                 Medicare patients by shortening their stay durations,
                 relative to their own non-Medicare patients and also to
                 patients at non-adopter hospitals, even as their
                 overall capacity utilization remained relatively
                 unchanged. The study concludes that many of these
                 hospitals had implemented EHR even before the
                 initiation of the incentive program. It further infers
                 that they joined this program with opportunistic
                 intentions of tapping into incentive payouts which they
                 maximized by taking on more Medicare patients. These
                 findings give credence to critics of the program who
                 have questioned its utility and alleged that it serves
                 only to reward existing users of EHR technologies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ho:2014:SSP,
  author =       "Joyce C. Ho and Cheng H. Lee and Joydeep Ghosh",
  title =        "Septic Shock Prediction for Patients with Missing
                 Data",
  journal =      j-TMIS,
  volume =       "5",
  number =       "1",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2591676",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 15 17:44:19 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Sepsis and septic shock are common and potentially
                 fatal conditions that often occur in intensive care
                 unit (ICU) patients. Early prediction of patients at
                 risk for septic shock is therefore crucial to
                 minimizing the effects of these complications.
                 Potential indications for septic shock risk span a wide
                 range of measurements, including physiological data
                 gathered at different temporal resolutions and gene
                 expression levels, leading to a nontrivial prediction
                 problem. Previous works on septic shock prediction have
                 used small, carefully curated datasets or clinical
                 measurements that may not be available for many ICU
                 patients. The recent availability of a large, rich ICU
                 dataset called MIMIC-II has provided the opportunity
                 for more extensive modeling of this problem. However,
                 such a large clinical dataset inevitably contains a
                 substantial amount of missing data. We investigate how
                 different imputation selection criteria and methods can
                 overcome the missing data problem. Our results show
                 that imputation methods in conjunction with predictive
                 modeling can lead to accurate septic shock prediction,
                 even if the features are restricted primarily to
                 noninvasive measurements. Our models provide a
                 generalized approach for predicting septic shock in any
                 ICU patient.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yang:2014:PDS,
  author =       "Christopher C. Yang and Haodong Yang and Ling Jiang",
  title =        "Postmarketing Drug Safety Surveillance Using Publicly
                 Available Health-Consumer-Contributed Content in Social
                 Media",
  journal =      j-TMIS,
  volume =       "5",
  number =       "1",
  pages =        "2:1--2:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2576233",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 15 17:44:19 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Postmarketing drug safety surveillance is important
                 because many potential adverse drug reactions cannot be
                 identified in the premarketing review process. It is
                 reported that about 5\% of hospital admissions are
                 attributed to adverse drug reactions and many deaths
                 are eventually caused, which is a serious concern in
                 public health. Currently, drug safety detection relies
                 heavily on voluntarily reporting system, electronic
                 health records, or relevant databases. There is often a
                 time delay before the reports are filed and only a
                 small portion of adverse drug reactions experienced by
                 health consumers are reported. Given the popularity of
                 social media, many health social media sites are now
                 available for health consumers to discuss any
                 health-related issues, including adverse drug reactions
                 they encounter. There is a large volume of
                 health-consumer-contributed content available, but
                 little effort has been made to harness this information
                 for postmarketing drug safety surveillance to
                 supplement the traditional approach. In this work, we
                 propose the association rule mining approach to
                 identify the association between a drug and an adverse
                 drug reaction. We use the alerts posted by Food and
                 Drug Administration as the gold standard to evaluate
                 the effectiveness of our approach. The result shows
                 that the performance of harnessing health-related
                 social media content to detect adverse drug reaction is
                 good and promising.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bouktif:2014:PSO,
  author =       "Salah Bouktif and Houari Sahraoui and Faheem Ahmed",
  title =        "Predicting Stability of Open-Source Software Systems
                 Using Combination of {Bayesian} Classifiers",
  journal =      j-TMIS,
  volume =       "5",
  number =       "1",
  pages =        "3:1--3:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2555596",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 15 17:44:19 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The use of free and Open-Source Software (OSS) systems
                 is gaining momentum. Organizations are also now
                 adopting OSS, despite some reservations, particularly
                 about the quality issues. Stability of software is one
                 of the main features in software quality management
                 that needs to be understood and accurately predicted.
                 It deals with the impact resulting from software
                 changes and argues that stable components lead to a
                 cost-effective software evolution. Changes are most
                 common phenomena present in OSS in comparison to
                 proprietary software. This makes OSS system evolution a
                 rich context to study and predict stability. Our
                 objective in this work is to build stability prediction
                 models that are not only accurate but also
                 interpretable, that is, able to explain the link
                 between the architectural aspects of a software
                 component and its stability behavior in the context of
                 OSS. Therefore, we propose a new approach based on
                 classifiers combination capable of preserving
                 prediction interpretability. Our approach is
                 classifier-structure dependent. Therefore, we propose a
                 particular solution for combining Bayesian classifiers
                 in order to derive a more accurate composite classifier
                 that preserves interpretability. This solution is
                 implemented using a genetic algorithm and applied in
                 the context of an OSS large-scale system, namely the
                 standard Java API. The empirical results show that our
                 approach outperforms state-of-the-art approaches from
                 both machine learning and software engineering.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Huang:2014:BOT,
  author =       "Lihua Huang and Sulin Ba and Xianghua Lu",
  title =        "Building Online Trust in a Culture of {Confucianism}:
                 The Impact of Process Flexibility and Perceived
                 Control",
  journal =      j-TMIS,
  volume =       "5",
  number =       "1",
  pages =        "4:1--4:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2576756",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 15 17:44:19 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The success of e-commerce companies in a Confucian
                 cultural context takes more than advanced IT and
                 process design that have proven successful in Western
                 countries. The example of eBay's failure in China
                 indicates that earning the trust of Chinese consumers
                 is essential to success, yet the process of building
                 that trust requires something different from that in
                 the Western culture. This article attempts to build a
                 theoretical model to explore the relationship between
                 the Confucian culture and online trust. We introduce
                 two new constructs, namely process flexibility and
                 perceived control, as particularly important factors in
                 online trust formation in the Chinese cultural context.
                 A survey was conducted to test the proposed theoretical
                 model. This study offers a new explanation for online
                 trust formation in the Confucian context. The findings
                 of this article can provide guidance for companies
                 hoping to successfully navigate the Chinese online
                 market in the future.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yeo:2014:RMD,
  author =       "M. Lisa Yeo and Erik Rolland and Jackie Rees Ulmer and
                 Raymond A. Patterson",
  title =        "Risk Mitigation Decisions for {IT} Security",
  journal =      j-TMIS,
  volume =       "5",
  number =       "1",
  pages =        "5:1--5:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2576757",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 15 17:44:19 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Enterprises must manage their information risk as part
                 of their larger operational risk management program.
                 Managers must choose how to control for such
                 information risk. This article defines the flow risk
                 reduction problem and presents a formal model using a
                 workflow framework. Three different control placement
                 methods are introduced to solve the problem, and a
                 comparative analysis is presented using a robust test
                 set of 162 simulations. One year of simulated attacks
                 is used to validate the quality of the solutions. We
                 find that the math programming control placement method
                 yields substantial improvements in terms of risk
                 reduction and risk reduction on investment when
                 compared to heuristics that would typically be used by
                 managers to solve the problem. The contribution of this
                 research is to provide managers with methods to
                 substantially reduce information and security risks,
                 while obtaining significantly better returns on their
                 security investments. By using a workflow approach to
                 control placement, which guides the manager to examine
                 the entire infrastructure in a holistic manner, this
                 research is unique in that it enables information risk
                 to be examined strategically.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Goodman:2014:BNC,
  author =       "S. E. Goodman",
  title =        "Building the Nation's Cyber Security Workforce:
                 Contributions from the {CAE} Colleges and
                 Universities",
  journal =      j-TMIS,
  volume =       "5",
  number =       "2",
  pages =        "6:1--6:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629636",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 8 11:44:01 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This article presents a view of the necessary size and
                 composition of the US national cyber security
                 workforce, and considers some of the contributions that
                 the government-designated Centers of Academic
                 Excellence (CAE) might make to it. Over the last dozen
                 years about 200 million taxpayer dollars have gone into
                 funding many of these CAEs, with millions explicitly
                 targeted to help them build capacity. The most visible
                 intended output has been in the form of around 125
                 Scholarship for Service (SFS) students per year going
                 mostly into the workforce of the federal government.
                 Surely the output capacity of these 181 colleges and
                 universities is greater than that, and should be
                 helping to protect the rest of US citizens and
                 taxpayers. We take a need-based look at what the
                 nation's workforce should look like, and then consider
                 some possibilities of what the CAE schools could be
                 doing to help to close the gaps between that perceived
                 need and the supply and demand.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Deodhar:2014:IWB,
  author =       "Suruchi Deodhar and Keith R. Bisset and Jiangzhuo Chen
                 and Yifei Ma and Madhav V. Marathe",
  title =        "An Interactive, {Web}-Based High Performance Modeling
                 Environment for Computational Epidemiology",
  journal =      j-TMIS,
  volume =       "5",
  number =       "2",
  pages =        "7:1--7:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629692",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 8 11:44:01 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We present an integrated interactive modeling
                 environment to support public health epidemiology. The
                 environment combines a high resolution individual-based
                 model with a user-friendly Web-based interface that
                 allows analysts to access the models and the analytics
                 backend remotely from a desktop or a mobile device. The
                 environment is based on a loosely coupled
                 service-oriented-architecture that allows analysts to
                 explore various counterfactual scenarios. As the
                 modeling tools for public health epidemiology are
                 getting more sophisticated, it is becoming increasingly
                 difficult for noncomputational scientists to
                 effectively use the systems that incorporate such
                 models. Thus an important design consideration for an
                 integrated modeling environment is to improve ease of
                 use such that experimental simulations can be driven by
                 the users. This is achieved by designing intuitive and
                 user-friendly interfaces that allow users to design and
                 analyze a computational experiment and steer the
                 experiment based on the state of the system. A key
                 feature of a system that supports this design goal is
                 the ability to start, stop, pause, and roll back the
                 disease propagation and intervention application
                 process interactively. An analyst can access the state
                 of the system at any point in time and formulate
                 dynamic interventions based on additional information
                 obtained through state assessment. In addition, the
                 environment provides automated services for experiment
                 set-up and management, thus reducing the overall time
                 for conducting end-to-end experimental studies. We
                 illustrate the applicability of the system by
                 describing computational experiments based on realistic
                 pandemic planning scenarios. The experiments are
                 designed to demonstrate the system's capability and
                 enhanced user productivity.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kostkova:2014:SUT,
  author =       "Patty Kostkova and Martin Szomszor and Connie {St.
                 Luis}",
  title =        "\#swineflu: The Use of {Twitter} as an Early Warning
                 and Risk Communication Tool in the 2009 Swine Flu
                 Pandemic",
  journal =      j-TMIS,
  volume =       "5",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2597892",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 8 11:44:01 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The need to improve population monitoring and enhance
                 surveillance of infectious diseases has never been more
                 pressing. Factors such as air travel act as a catalyst
                 in the spread of new and existing viruses. The
                 unprecedented user-generated activity on social
                 networks over the last few years has created real-time
                 streams of personal data that provide an invaluable
                 tool for monitoring and sampling large populations.
                 Epidemic intelligence relies on constant monitoring of
                 online media sources for early warning, detection, and
                 rapid response; however, the real-time information
                 available in social networks provides a new paradigm
                 for the early warning function. The communication of
                 risk in any public health emergency is a complex task
                 for governments and healthcare agencies. This task is
                 made more challenging in the current situation when the
                 public has access to a wide range of online resources,
                 ranging from traditional news channels to information
                 posted on blogs and social networks. Twitter's strength
                 is its two-way communication nature --- both as an
                 information source but also as a central hub for
                 publishing, disseminating and discovering online media.
                 This study addresses these two challenges by
                 investigating the role of Twitter during the 2009 swine
                 flu pandemic by analysing data collected from the SN,
                 and by Twitter using the opposite way for dissemination
                 information through the network. First, we demonstrate
                 the role of the social network for early warning by
                 detecting an upcoming spike in an epidemic before the
                 official surveillance systems by up to two weeks in the
                 U.K. and up to two to three weeks in the U.S. Second,
                 we illustrate how online resources are propagated
                 through Twitter at the time of the WHO's declaration of
                 the swine flu ``pandemic''. Our findings indicate that
                 Twitter does favour reputable t bogus information can
                 still leak into the network.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Tsai:2014:SPS,
  author =       "Chih-Fong Tsai and Zen-Yu Quan",
  title =        "Stock Prediction by Searching for Similarities in
                 Candlestick Charts",
  journal =      j-TMIS,
  volume =       "5",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2591672",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 8 11:44:01 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The aim of stock prediction is to effectively predict
                 future stock market trends (or stock prices), which can
                 lead to increased profit. One major stock analysis
                 method is the use of candlestick charts. However,
                 candlestick chart analysis has usually been based on
                 the utilization of numerical formulas. There has been
                 no work taking advantage of an image processing
                 technique to directly analyze the visual content of the
                 candlestick charts for stock prediction. Therefore, in
                 this study we apply the concept of image retrieval to
                 extract seven different wavelet-based texture features
                 from candlestick charts. Then, similar historical
                 candlestick charts are retrieved based on different
                 texture features related to the query chart, and the
                 ``future'' stock movements of the retrieved charts are
                 used for stock prediction. To assess the applicability
                 of this approach to stock prediction, two datasets are
                 used, containing 5-year and 10-year training and
                 testing sets, collected from the Dow Jones Industrial
                 Average Index (INDU) for the period between 1990 and
                 2009. Moreover, two datasets (2010 and 2011) are used
                 to further validate the proposed approach. The
                 experimental results show that visual content
                 extraction and similarity matching of candlestick
                 charts is a new and useful analytical method for stock
                 prediction. More specifically, we found that the
                 extracted feature vectors of 30, 90, and 120, the
                 number of textual features extracted from the
                 candlestick charts in the BMP format, are more suitable
                 for predicting stock movements, while the 90 feature
                 vector offers the best performance for predicting
                 short- and medium-term stock movements. That is, using
                 the 90 feature vector provides the lowest MAPE
                 (3.031\%) and Theil's U (1.988\%) rates in the
                 twenty-year dataset, and the best MAPE (2.625\%,
                 2.945\%) and Theil's U (1.622\%, 1.972\%) rates in the
                 two validation datasets (2010 and 2011).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jarke:2015:ECS,
  author =       "Matthias Jarke and Kalle Lyytinen",
  title =        "Editorial: {``Complexity of Systems Evolution:
                 Requirements Engineering Perspective''}",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629597",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Walking on water, and programming according to
                 specifications is easy-as long as both of them are
                 frozen. --Robert Glass This introduction discusses the
                 changing nature of complexity associated with
                 requirements engineering (RE) tasks and how it has
                 shifted from managing internal complexity to adapting
                 and leveraging upon external and dynamic complexity. We
                 note several significant drivers in the requirements
                 knowledge that have resulted in this change and discuss
                 in light of complexity theory how the RE research
                 community can respond to this. We observe several
                 research challenges associated with ``new complexity''
                 and highlight how the articles included in the special
                 issue advance the field by defining complexity more
                 accurately, observing more vigilantly new sources of
                 complexity, and suggesting new ways to manage
                 complexity in terms of economic assessments, knowledge
                 flows, and modeling for adaptability.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Fridgen:2015:IBV,
  author =       "Gilbert Fridgen and Julia Klier and Martina Beer and
                 Thomas Wolf",
  title =        "Improving Business Value Assurance in Large-Scale {IT}
                 Projects --- a Quantitative Method Based on Founded
                 Requirements Assessment",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2638544",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The probability of IT project failures can be
                 mitigated more successfully when discovered early. To
                 support a more insightful management of IT projects,
                 which may also facilitate an early detection of IT
                 project failures, transparency regarding a project's
                 cash flows shall be increased. Therefore, an
                 appropriate analysis of a project's benefits, costs,
                 requirements, their respective risks and
                 interdependencies is inevitable. However, to date, in
                 requirements engineering only few methods exist that
                 appropriately consider these factors when estimating
                 the ex ante project business case. Furthermore,
                 empirical studies reveal that a lot of risk factors
                 emerge during the runtime of projects why the ex ante
                 valuation of IT projects even with respect to
                 requirements seems insufficient. Therefore, using the
                 Action Design Research approach, we design, apply, and
                 evaluate a practicable method for value-based
                 continuous IT project steering especially for
                 large-scale IT projects.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{King:2015:CCR,
  author =       "John Leslie King and Carl P. Simon",
  title =        "Complications with Complexity in Requirements",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "13:1--13:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629375",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Requirements engineering must recognize the difference
                 between complicated and complex problems. The former
                 can lead to successful solutions. The latter should be
                 avoided because they often lead to failure. As a
                 starting point for distinguishing between complicated
                 and complex, this article offers six characteristics of
                 complex problems, with examples from economics,
                 logistics, forecasting, among others. These
                 characteristics make it easier and more systematic to
                 recognize complexity during requirements elicitation
                 and formulation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chakraborty:2015:GSF,
  author =       "Suranjan Chakraborty and Christoph Rosenkranz and Josh
                 Dehlinger",
  title =        "Getting to the Shalls: Facilitating Sensemaking in
                 Requirements Engineering",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629351",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Sensemaking in Requirements Engineering (RE) relies on
                 knowledge transfer, communication, and negotiation of
                 project stakeholders. It is a critical and challenging
                 aspect of Information Systems (IS) development. One of
                 the most fundamental aspects of RE is the specification
                 of traceable, unambiguous, and operationalizable
                 functional and nonfunctional requirements. This remains
                 a nontrivial task in the face of the complexity
                 inherent in RE due to the lack of well-documented,
                 systematic procedures that facilitate a structured
                 analysis of the qualitative data from stakeholder
                 interviews, observations, and documents that are
                 typically the input to this activity. This research
                 develops a systematic and traceable procedure, for
                 non-functional requirements the Grounded and
                 Linguistic-Based Requirements Analysis Procedure
                 (GLAP), which can fill this gap by incorporating
                 perspectives from Grounded Theory Method, linguistic
                 analysis of language quality, Volere typology, and the
                 Nonfunctional Requirements Framework without
                 significantly deviating from existing practice. The
                 application of GLAP is described along with empirical
                 illustrations using RE data from a redesign initiative
                 of a library website of a public university in the
                 United States. An outlook is given on further work and
                 necessary evaluation steps.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Nekvi:2015:IRC,
  author =       "Md Rashed I. Nekvi and Nazim H. Madhavji",
  title =        "Impediments to Regulatory Compliance of Requirements
                 in Contractual Systems Engineering Projects: a Case
                 Study",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "15:1--15:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629432",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Large-scale contractual systems engineering projects
                 often need to comply with myriad government regulations
                 and standards as part of contractual obligations. A key
                 activity in the requirements engineering (RE) process
                 for such a project is to demonstrate that all relevant
                 requirements have been elicited from the regulatory
                 documents and have been traced to the contract as well
                 as to the target system components. That is, the
                 requirements have met regulatory compliance. However,
                 there are impediments to achieving this level of
                 compliance due to such complexity factors as voluminous
                 contract, large number of regulatory documents, and
                 multiple domains of the system. Little empirical
                 research has been conducted in the scientific community
                 on identifying these impediments. Knowing these
                 impediments is a driver for change in the solutions
                 domain (i.e., creating improved or new methods, tools,
                 processes, etc.) to deal with such impediments. Through
                 a case study of an industrial RE project, we have
                 identified a number of key impediments to achieving
                 regulatory compliance in a large-scale, complex,
                 systems engineering project. This project is an upgrade
                 of a rail infrastructure system. The key contribution
                 of the article is a number of hitherto uncovered
                 impediments described in qualitative and quantitative
                 terms. The article also describes an artefact model,
                 depicting key artefacts and relationships involved in
                 such a compliance project. This model was created from
                 data gathered and observations made in this compliance
                 project. In addition, the article describes emergent
                 metrics on regulatory compliance of requirements that
                 can possibly be used for estimating the effort needed
                 to achieve regulatory compliance of system
                 requirements.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jain:2015:SBS,
  author =       "Radhika Jain and Lan Cao and Kannan Mohan and
                 Balasubramaniam Ramesh",
  title =        "Situated Boundary Spanning: an Empirical Investigation
                 of Requirements Engineering Practices in Product Family
                 Development",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "16:1--16:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629395",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Requirements Engineering (RE) faces considerable
                 challenges that are often related to boundaries between
                 various stakeholders involved in the software
                 development process. These challenges may be addressed
                 by boundary spanning practices. We examine how boundary
                 spanning can be adapted to address RE challenges in
                 Product Family Development (PFD), a context that
                 involves complex RE. We study two different development
                 approaches, namely, conventional and agile PFD, because
                 these present considerably different challenges. Our
                 findings from a multisite case study present boundary
                 spanning as a solution to improve the quality of RE
                 processes and highlight interesting differences in how
                 boundary spanner roles and boundary objects are adapted
                 in conventional and agile PFD.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jureta:2015:RPA,
  author =       "Ivan J. Jureta and Alexander Borgida and Neil A. Ernst
                 and John Mylopoulos",
  title =        "The Requirements Problem for Adaptive Systems",
  journal =      j-TMIS,
  volume =       "5",
  number =       "3",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629376",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Requirements Engineering (RE) focuses on eliciting,
                 modeling, and analyzing the requirements and
                 environment of a system-to-be in order to design its
                 specification. The design of the specification, known
                 as the Requirements Problem (RP), is a complex
                 problem-solving task because it involves, for each new
                 system, the discovery and exploration of, and decision
                 making in a new problem space. A system is adaptive if
                 it can detect deviations between its runtime behavior
                 and its requirements, specifically situations where its
                 behavior violates one or more of its requirements.
                 Given such a deviation, an Adaptive System uses
                 feedback mechanisms to analyze these changes and
                 decide, with or without human intervention, how to
                 adjust its behavior as a result. We are interested in
                 defining the Requirements Problem for Adaptive Systems
                 (RPAS). In our case, we are looking for a configurable
                 specification such that whenever requirements fail to
                 be fulfilled, the system can go through a series of
                 adaptations that change its configuration and
                 eventually restore fulfilment of the requirements. From
                 a theoretical perspective, this article formally shows
                 the fundamental differences between standard RE
                 (notably Zave and Jackson [1997]) and RE for Adaptive
                 Systems (see the seminal work by Fickas and Feather
                 [1995], to Letier and van Lamsweerde [2004], and up to
                 Whittle et al. [2010]). The main contribution of this
                 article is to introduce the RPAS as a new RP class that
                 is specific to Adaptive Systems. We relate the RPAS to
                 RE research on the relaxation of requirements, the
                 evaluation of their partial satisfaction, and the
                 monitoring and control of requirements, all topics of
                 particular interest in research on adaptive systems [de
                 Lemos et al. 2013]. From an engineering perspective, we
                 define a proto-framework for solving RPAS, which
                 illustrates features needed in future frameworks for
                 adaptive software systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Wang:2015:AFU,
  author =       "G. Alan Wang and Harry Jiannan Wang and Jiexun Li and
                 Alan S. Abrahams and Weiguo Fan",
  title =        "An Analytical Framework for Understanding
                 Knowledge-Sharing Processes in Online {Q\&A}
                 Communities",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "18:1--18:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629445",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Online communities have become popular knowledge
                 sources for both individuals and organizations.
                 Computer-mediated communication research shows that
                 communication patterns play an important role in the
                 collaborative efforts of online knowledge-sharing
                 activities. Existing research is mainly focused on
                 either user egocentric positions in communication
                 networks or communication patterns at the community
                 level. Very few studies examine thread-level
                 communication and process patterns and their impacts on
                 the effectiveness of knowledge sharing. In this study,
                 we fill this research gap by proposing an innovative
                 analytical framework for understanding thread-level
                 knowledge sharing in online Q{\&}A communities based on
                 dialogue act theory, network analysis, and process
                 mining. More specifically, we assign a dialogue act tag
                 for each post in a discussion thread to capture its
                 conversation purpose and then apply graph and process
                 mining algorithms to examine knowledge-sharing
                 processes. Our results, which are based on a real
                 support forum dataset, show that the proposed
                 analytical framework is effective in identifying
                 important communication, conversation, and process
                 patterns that lead to helpful knowledge sharing in
                 online Q{\&}A communities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Partington:2015:PMC,
  author =       "Andrew Partington and Moe Wynn and Suriadi Suriadi and
                 Chun Ouyang and Jonathan Karnon",
  title =        "Process Mining for Clinical Processes: a Comparative
                 Analysis of Four {Australian} Hospitals",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "19:1--19:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629446",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business process analysis and process mining,
                 particularly within the health care domain, remain
                 under-utilized. Applied research that employs such
                 techniques to routinely collected health care data
                 enables stakeholders to empirically investigate care as
                 it is delivered by different health providers. However,
                 cross-organizational mining and the comparative
                 analysis of processes present a set of unique
                 challenges in terms of ensuring population and activity
                 comparability, visualizing the mined models, and
                 interpreting the results. Without addressing these
                 issues, health providers will find it difficult to use
                 process mining insights, and the potential benefits of
                 evidence-based process improvement within health will
                 remain unrealized. In this article, we present a brief
                 introduction on the nature of health care processes, a
                 review of process mining in health literature, and a
                 case study conducted to explore and learn how health
                 care data and cross-organizational comparisons with
                 process-mining techniques may be approached. The case
                 study applies process-mining techniques to
                 administrative and clinical data for patients who
                 present with chest pain symptoms at one of four public
                 hospitals in South Australia. We demonstrate an
                 approach that provides detailed insights into clinical
                 (quality of patient health) and fiscal (hospital
                 budget) pressures in the delivery of health care. We
                 conclude by discussing the key lessons learned from our
                 experience in conducting business process analysis and
                 process mining based on the data from four different
                 hospitals.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yan:2015:MAG,
  author =       "Jiaqi Yan and Daning Hu and Stephen S. Liao and
                 Huaiqing Wang",
  title =        "Mining Agents' Goals in Agent-Oriented Business
                 Processes",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "20:1--20:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629448",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "When designing a business process, individual agents
                 are assigned to perform tasks based on certain goals
                 (i.e., designed process goals). However, based on their
                 own interests, real-world agents often have different
                 goals (i.e., agents' goals) and thus may behave
                 differently than designed, often resulting in reduced
                 effectiveness or efficiencies of the executed process.
                 Moreover, existing business process research lacks
                 effective methods for discovering agents' goals in the
                 actual execution of the designed business processes. To
                 address this problem, we propose an agent-oriented goal
                 mining approach to modeling, discovering, and analyzing
                 agents' goals in executed business processes using
                 historical event logs and domain data. To the best of
                 our knowledge, our research is the first to adopt the
                 agents' goal perspective to study inconsistencies
                 between the design and execution of business processes.
                 Moreover, it also provides a useful tool for
                 stakeholders to discover real-world agents' actual
                 goals and thus provides insights for improving the task
                 assignment mechanism or business process design in
                 general.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Silva:2015:PAA,
  author =       "Thushari Silva and Ma Jian and Yang Chen",
  title =        "Process Analytics Approach for {R\&D} Project
                 Selection",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "21:1--21:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629436",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "R{\&}D project selection plays an important role in
                 government funding agencies, as allocation of billions
                 of dollars among the proposals deemed highly
                 influential and contributive solely depend on it.
                 Efficacious assignment of reviewers is one of the most
                 critical processes that controls the quality of the
                 entire project selection and also has a serious
                 implication on business profit. Current methods that
                 focus on workflow automation are more efficient than
                 manual assignment; however, they are not effective, as
                 they fail to consider the real insight of core tasks.
                 Other decision models that analyze core tasks are
                 effective but inefficient when handling large amounts
                 of submissions, and they suffer from irrelevant
                 assignment. Furthermore, they largely ignore real deep
                 insight of back-end data such as quality of the
                 reviewers (e.g., quality and citation impact of their
                 produced research) and the effect of social
                 relationships in project selection processes that are
                 essential for identifying reviewers for
                 interdisciplinary proposal evaluation. In light of
                 these deficiencies, this research proposes a novel
                 hybrid process analytics approach to decompose the
                 complex reviewer assignment process into manageable
                 subprocesses and applies data-driven decision models
                 cum process analytics systematically from a triangular
                 perspective via the research analytics framework to
                 achieve high operational efficiencies and high-quality
                 assignment. It also analyzes big data from scientific
                 databases and generates visualized decision-ready
                 information to support effective decision making. The
                 proposed approach has been implemented to aid the
                 project selection process of the largest funding agency
                 in China and has been tested. The test results show
                 that the proposed approach has the potential to add
                 great benefits, including cost saving, improved
                 effectiveness, and increased business value.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Guo:2015:DPB,
  author =       "Xitong Guo and Sherry X. Sun and Doug Vogel",
  title =        "A Dataflow Perspective for Business Process
                 Integration",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "22:1--22:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629450",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business process integration has become prevalent as
                 business increasingly crosses organizational
                 boundaries. To address the issue of protecting
                 organizations' competitive knowledge and private
                 information while also enabling business-to-business
                 (B2B) collaboration, past research has focused mainly
                 on customized public and private process design, as
                 well as structural correctness of the integrated
                 workflow. However, a dataflow perspective is important
                 for business process integration. This article presents
                 a data-flow perspective using workflow management and
                 mathematical techniques to address data exchange
                 problems in independent multistakeholder business
                 process integration in dynamic circumstances. The
                 research is conducted following a design science
                 paradigm. We build artifacts that include
                 interorganizational workflow concepts, a workflow
                 model, and a public dataset calculation method. The use
                 of the proposed artifacts is illustrated by applying
                 them to a real-world case in the Shenzhen (Chaiwan)
                 port. The utility of the artifacts is evaluated through
                 interviews with practitioners in industry. We conclude
                 that this research complements the control-flow
                 perspective in the interorganizational workflow
                 management area and also contributes to B2B
                 information-sharing literature; further, the dataflow
                 formalism can help practitioners to formally provide
                 the right data at the right time in dynamic
                 circumstances.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jiang:2015:CCO,
  author =       "Jie Jiang and Huib Aldewereld and Virginia Dignum and
                 Yao-Hua Tan",
  title =        "Compliance Checking of Organizational Interactions",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "23:1--23:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629630",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In business environments, different sorts of
                 regulations are imposed to restrict the behavior of
                 both public and private organizations, ranging from
                 legal regulations to internal policies. Regulatory
                 compliance is important for the safety of individual
                 actors as well as the overall business environment.
                 However, complexity derives from not only the contents
                 of the regulations but also their interdependencies. As
                 such, the verification of whether actors are able to
                 comply with the combined regulations cannot be done by
                 checking each regulation separately. To these ends, we
                 introduce a normative structure Norm Nets (NNs) for
                 modeling sets of interrelated regulations and setting a
                 basis for compliance checking of organizational
                 interactions against interrelated regulations. NNs
                 support a modular design by providing the constructs to
                 represent regulations and the relationships between
                 them. Additionally, we propose a computational
                 mechanism to reason about regulatory compliance by
                 mapping NNs to Colored Petri Nets (CPNs). We show that
                 compliance checking of both individual actors' behavior
                 and the collective behavior of the business environment
                 can be achieved automatically using state space
                 analysis techniques of CPNs. The approach is
                 illustrated with a case study from the domain of
                 international trade.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ciccio:2015:DDC,
  author =       "Claudio {Di Ciccio} and Massimo Mecella",
  title =        "On the Discovery of Declarative Control Flows for
                 Artful Processes",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "24:1--24:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629447",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Artful processes are those processes in which the
                 experience, intuition, and knowledge of the actors are
                 the key factors in determining the decision making.
                 They are typically carried out by the ``knowledge
                 workers,'' such as professors, managers, and
                 researchers. They are often scarcely formalized or
                 completely unknown a priori. Throughout this article,
                 we discuss how we addressed the challenge of
                 discovering declarative control flows in the context of
                 artful processes. To this extent, we devised and
                 implemented a two-phase algorithm, named MINERful. The
                 first phase builds a knowledge base, where statistical
                 information extracted from logs is represented. During
                 the second phase, queries are evaluated on that
                 knowledge base, in order to infer the constraints that
                 constitute the discovered process. After outlining the
                 overall approach and offering insight on the adopted
                 process modeling language, we describe in detail our
                 discovery technique. Thereupon, we analyze its
                 performances, both from a theoretical and an
                 experimental perspective. A user-driven evaluation of
                 the quality of results is also reported on the basis of
                 a real case study. Finally, a study on the fitness of
                 discovered models with respect to synthetic and real
                 logs is presented.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Keller:2015:CMR,
  author =       "Thorben Keller and Fr{\'e}d{\'e}ric Thiesse and Elgar
                 Fleisch",
  title =        "Classification Models for {RFID}-Based Real-Time
                 Detection of Process Events in the Supply Chain: an
                 Empirical Study",
  journal =      j-TMIS,
  volume =       "5",
  number =       "4",
  pages =        "25:1--25:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629449",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Feb 11 13:49:27 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "RFID technology allows the collecting of fine-grained
                 real-time information on physical processes in the
                 supply chain that often cannot be monitored using
                 conventional approaches. However, because of the
                 phenomenon of false-positive reads, RFID data streams
                 resemble noisy analog measurements rather than the
                 desired recordings of activities within a business
                 process. The present study investigates the use of data
                 mining techniques for filtering and aggregating raw
                 RFID data. We consider classifiers based on logistic
                 regression, decision trees, and artificial neural
                 networks using attributes derived from low-level reader
                 data. In addition, we present a custom-made algorithm
                 for generating decision rules using artificial
                 attributes and an iterative training procedure. We
                 evaluate the classifiers using a massive set of data on
                 pallet movements collected under real-world conditions
                 at one of the largest retailers worldwide. The results
                 clearly indicate high classification performance of the
                 classification models, with the rule-based classifier
                 outperforming all others. Moreover, we show that
                 utilizing the full spectrum of data generated by the
                 reader hardware leads to superior performance compared
                 with the approaches based on timestamp and antenna
                 information proposed in prior research.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Berndt:2015:CSD,
  author =       "Donald J. Berndt and James A. McCart and Dezon K.
                 Finch and Stephen L. Luther",
  title =        "A Case Study of Data Quality in Text Mining Clinical
                 Progress Notes",
  journal =      j-TMIS,
  volume =       "6",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2669368",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Apr 3 16:18:04 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Text analytic methods are often aimed at extracting
                 useful information from the vast array of unstructured,
                 free format text documents that are created by almost
                 all organizational processes. The success of any text
                 mining application rests on the quality of the
                 underlying data being analyzed, including both
                 predictive features and outcome labels. In this case
                 study, some focused experiments regarding data quality
                 are used to assess the robustness of Statistical Text
                 Mining (STM) algorithms when applied to clinical
                 progress notes. In particular, the experiments consider
                 the impacts of task complexity (by removing signals),
                 training set size, and target outcome quality. While
                 this research is conducted using a dataset drawn from
                 the medical domain, the data quality issues explored
                 are of more general interest.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zimbra:2015:SAF,
  author =       "David Zimbra and Hsinchun Chen and Robert F. Lusch",
  title =        "Stakeholder Analyses of Firm-Related {Web} Forums:
                 Applications in Stock Return Prediction",
  journal =      j-TMIS,
  volume =       "6",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2675693",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Apr 3 16:18:04 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In this study, we present stakeholder analyses of
                 firm-related web forums. Prior analyses of firm-related
                 forums have considered all participants in the
                 aggregate, failing to recognize the potential for
                 diversity within the populations. However, distinctive
                 groups of forum participants may represent various
                 interests and stakes in a firm worthy of consideration.
                 To perform the stakeholder analyses, the Stakeholder
                 Analyzer system for firm-related web forums is
                 developed following the design science paradigm of
                 information systems research. The design of the system
                 and its approach to stakeholder analysis is guided by
                 two kernel theories, the stakeholder theory of the firm
                 and the systemic functional linguistic theory. A
                 stakeholder analysis identifies distinctive groups of
                 forum participants with shared characteristics
                 expressed in discussion and evaluates their specific
                 opinions and interests in the firm. Stakeholder
                 analyses are performed in six major firm-related forums
                 hosted on Yahoo Finance over a 3-month period. The
                 relationships between measures extracted from the
                 forums and subsequent daily firm stock returns are
                 examined using multiple linear regression models,
                 revealing statistically significant indicators of firm
                 stock returns in the discussions of the stakeholder
                 groups of each firm with stakeholder-model-adjusted
                 R$^2$ values reaching 0.83. Daily stock return
                 prediction is also performed for 31 trading days, and
                 stakeholder models correctly predicted the direction of
                 return on 67\% of trading days and generated an
                 impressive 17\% return in simulated trading of the six
                 firm stocks. These evaluations demonstrate that the
                 stakeholder analyses provided more refined assessments
                 of the firm-related forums, yielding measures at the
                 stakeholder group level that better explain and predict
                 daily firm stock returns than aggregate forum-level
                 information.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Li:2015:NBB,
  author =       "Shing-Han Li and Yu-Cheng Kao and Zong-Cyuan Zhang and
                 Ying-Ping Chuang and David C. Yen",
  title =        "A Network Behavior-Based {Botnet} Detection Mechanism
                 Using {PSO} and {$K$}-means",
  journal =      j-TMIS,
  volume =       "6",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2676869",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Apr 3 16:18:04 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In today's world, Botnet has become one of the
                 greatest threats to network security. Network
                 attackers, or Botmasters, use Botnet to launch the
                 Distributed Denial of Service (DDoS) to paralyze
                 large-scale websites or steal confidential data from
                 infected computers. They also employ ``phishing''
                 attacks to steal sensitive information (such as users'
                 accounts and passwords), send bulk email advertising,
                 and/or conduct click fraud. Even though detection
                 technology has been much improved and some solutions to
                 Internet security have been proposed and improved, the
                 threat of Botnet still exists. Most of the past studies
                 dealing with this issue used either packet contents or
                 traffic flow characteristics to identify the invasion
                 of Botnet. However, there still exist many problems in
                 the areas of packet encryption and data privacy, simply
                 because Botnet can easily change the packet contents
                 and flow characteristics to circumvent the Intrusion
                 Detection System (IDS). This study combines Particle
                 Swarm Optimization (PSO) and $K$-means algorithms to
                 provide a solution to remedy those problems and
                 develop, step by step, a mechanism for Botnet
                 detection. First, three important network behaviors are
                 identified: long active communication behavior
                 (ActBehavior), connection failure behavior
                 (FailBehavior), and network scanning behavior
                 (ScanBehavior). These behaviors are defined according
                 to the relevant prior studies and used to analyze the
                 communication activities among the infected computers.
                 Second, the features of network behaviors are extracted
                 from the flow traces in the network layer and transport
                 layer of the network equipment. Third, PSO and
                 $K$-means techniques are used to uncover the host
                 members of Botnet in the organizational network. This
                 study mainly utilizes the flow traces of a campus
                 network as an experiment. The experimental findings
                 show that this proposed approach can be employed to
                 detect the suspicious Botnet members earlier than the
                 detection application systems. In addition, this
                 proposed approach is easy to implement and can be
                 further used and extended in the campus dormitory
                 network, home networks, and the mobile 3G network.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lee:2015:OBM,
  author =       "Yen-Hsien Lee and Paul Jen-Hwa Hu and Ching-Yi Tu",
  title =        "Ontology-Based Mapping for Automated Document
                 Management: a Concept-Based Technique for Word Mismatch
                 and Ambiguity Problems in Document Clustering",
  journal =      j-TMIS,
  volume =       "6",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2688488",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 5 07:57:33 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Document clustering is crucial to automated document
                 management, especially for the fast-growing volume of
                 textual documents available digitally. Traditional
                 lexicon-based approaches depend on document content
                 analysis and measure overlap of the feature vectors
                 representing different documents, which cannot
                 effectively address word mismatch or ambiguity
                 problems. Alternative query expansion and local context
                 discovery approaches are developed but suffer from
                 limited efficiency and effectiveness, because the large
                 number of expanded terms create noise and increase the
                 dimensionality and complexity of the overall feature
                 space. Several techniques extend lexicon-based analysis
                 by incorporating latent semantic indexing but produce
                 less comprehensible clustering results and questionable
                 performance. We instead propose a concept-based
                 document representation and clustering (CDRC) technique
                 and empirically examine its effectiveness using 433
                 articles concerning information systems and technology,
                 randomly selected from a popular digital library. Our
                 evaluation includes two widely used benchmark
                 techniques and shows that CDRC outperforms them.
                 Overall, our results reveal that clustering documents
                 at an ontology-based, concept-based level is more
                 effective than techniques using lexicon-based document
                 features and can generate more comprehensible
                 clustering results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sutanto:2015:ITC,
  author =       "Juliana Sutanto and Atreyi Kankanhalli and Bernard
                 Cheng Yian Tan",
  title =        "Investigating Task Coordination in Globally Dispersed
                 Teams: a Structural Contingency Perspective",
  journal =      j-TMIS,
  volume =       "6",
  number =       "2",
  pages =        "5:1--5:??",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2688489",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 7 09:26:12 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Task coordination poses significant challenges for
                 globally dispersed teams (GDTs). Although various task
                 coordination mechanisms have been proposed for such
                 teams, there is a lack of systematic examination of the
                 appropriate coordination mechanisms for different teams
                 based on the nature of their task and the context under
                 which they operate. Prior studies on collocated teams
                 suggest matching their levels of task dependence to
                 specific task coordination mechanisms for effective
                 coordination. This research goes beyond the earlier
                 work by also considering additional contextual factors
                 of GDT (i.e., temporal dispersion and time constraints)
                 in deriving their optimal IT-mediated task coordination
                 mechanisms. Adopting the structural contingency theory,
                 we propose optimal IT-mediated task coordination
                 portfolios to fit the different levels of task
                 dependence, temporal dispersion, and perceived time
                 constraint of GDTs. The proposed fit is tested through
                 a survey and profile analysis of 95 globally dispersed
                 software development teams in a large financial
                 organization. We find, as hypothesized, that the extent
                 of fit between the actual IT-mediated task coordination
                 portfolios used by the surveyed teams and their optimal
                 portfolios proposed here is positively related to their
                 task coordination effectiveness that in turn impacts
                 the team's efficiency and effectiveness. The
                 implications for theory and practice are discussed.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Basole:2015:UBE,
  author =       "Rahul C. Basole and Martha G. Russell and Jukka
                 Huhtam{\"a}ki and Neil Rubens and Kaisa Still and
                 Hyunwoo Park",
  title =        "Understanding Business Ecosystem Dynamics: a
                 Data-Driven Approach",
  journal =      j-TMIS,
  volume =       "6",
  number =       "2",
  pages =        "6:1--6:??",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2724730",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 7 09:26:12 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business ecosystems consist of a heterogeneous and
                 continuously evolving set of entities that are
                 interconnected through a complex, global network of
                 relationships. However, there is no well-established
                 methodology to study the dynamics of this network.
                 Traditional approaches have primarily utilized a single
                 source of data of relatively established firms;
                 however, these approaches ignore the vast number of
                 relevant activities that often occur at the individual
                 and entrepreneurial levels. We argue that a data-driven
                 visualization approach, using both institutionally and
                 socially curated datasets, can provide important
                 complementary, triangulated explanatory insights into
                 the dynamics of interorganizational networks in general
                 and business ecosystems in particular. We develop novel
                 visualization layouts to help decision makers
                 systemically identify and compare ecosystems. Using
                 traditionally disconnected data sources on deals and
                 alliance relationships (DARs), executive and funding
                 relationships (EFRs), and public opinion and discourse
                 (POD), we empirically illustrate our data-driven method
                 of data triangulation and visualization techniques
                 through three cases in the mobile industry Google's
                 acquisition of Motorola Mobility, the coopetitive
                 relation between Apple and Samsung, and the strategic
                 partnership between Nokia and Microsoft. The article
                 concludes with implications and future research
                 opportunities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhao:2015:RBP,
  author =       "Xiaohui Zhao and Chengfei Liu and Sira Yongchareon and
                 Marek Kowalkiewicz and Wasim Sadiq",
  title =        "Role-Based Process View Derivation and Composition",
  journal =      j-TMIS,
  volume =       "6",
  number =       "2",
  pages =        "7:1--7:??",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2744207",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 7 09:26:12 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The process view concept deploys a partial and
                 temporal representation to adjust the visible view of a
                 business process according to various perception
                 constraints of users. Process view technology is of
                 practical use for privacy protection and authorization
                 control in process-oriented business management. Owing
                 to complex organizational structure, it is challenging
                 for large companies to accurately specify the diverse
                 perception of different users over business processes.
                 Aiming to tackle this issue, this article presents a
                 role-based process view model to incorporate role
                 dependencies into process view derivation. Compared to
                 existing process view approaches, ours particularly
                 supports runtime updates to the process view
                 perceivable to a user with specific view merging
                 operations, thereby enabling the dynamic tracing of
                 process perception. A series of rules and theorems are
                 established to guarantee the structural consistency and
                 validity of process view transformation. A hypothetical
                 case is conducted to illustrate the feasibility of our
                 approach, and a prototype is developed for the
                 proof-of-concept purpose.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Liu:2015:WNS,
  author =       "Dengpan Liu and Sumit Sarkar and Chelliah
                 Sriskandarajah",
  title =        "Who's Next? {Scheduling} Personalization Services with
                 Variable Service Times",
  journal =      j-TMIS,
  volume =       "6",
  number =       "2",
  pages =        "8:1--8:??",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2764920",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Aug 7 09:26:12 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Online personalization has become quite prevalent in
                 recent years, with firms able to derive additional
                 profits from such services. As the adoption of such
                 services grows, firms implementing such practices face
                 some operational challenges. One important challenge
                 lies in the complexity associated with the
                 personalization process and how to deploy available
                 resources to handle such complexity. The complexity is
                 exacerbated when a site faces a large volume of
                 requests in a short amount of time, as is often the
                 case for e-commerce and content delivery sites. In such
                 situations, it is generally not possible for a site to
                 provide perfectly personalized service to all requests.
                 Instead, a firm can provide differentiated service to
                 requests based on the amount of profiling information
                 available about the visitor. We consider a scenario
                 where the revenue function is concave, capturing the
                 diminishing returns from personalization effort. Using
                 a batching approach, we determine the optimal
                 scheduling policy (i.e., time allocation and sequence
                 of service) for a batch that accounts for the
                 externality cost incurred when a request is provided
                 service before other waiting requests. The batching
                 approach leads to sunk costs incurred when visitors
                 wait for the next batch to begin. An optimal admission
                 control policy is developed to prescreen new request
                 arrivals. We show how the policy can be implemented
                 efficiently when the revenue function is complex and
                 there are a large number of requests that can be served
                 in a batch. Numerical experiments show that the
                 proposed approach leads to substantial improvements
                 over a linear approximation of the concave revenue
                 function. Interestingly, we find that the improvements
                 in firm profits are not only (or primarily) due to the
                 different service times that are obtained when using
                 the nonlinear personalization function-there is a
                 ripple effect on the admission control policy that
                 incorporates these optimized service times, which
                 contributes even more to the additional profits than
                 the service time optimization by itself.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bai:2015:RAM,
  author =       "Xue Bai and James R. Marsden and William T. {Ross,
                 Jr.} and Gang Wang",
  title =        "Relationships Among Minimum Requirements, {Facebook}
                 Likes, and {Groupon} Deal Outcomes",
  journal =      j-TMIS,
  volume =       "6",
  number =       "3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2764919",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:47 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Daily deal coupons have gained a prominent foothold on
                 the web. The earliest and largest player is Groupon.
                 Originally, Groupon deals were a mix of deals with a
                 minimum requirement (MR) of coupon sales before a
                 deal became effective and of deals without a minimum
                 requirement (NMR). Eventually, Groupon stopped using
                 MR deals. For Groupon and its retailer customers, might
                 this decision have actually resulted in negative
                 impacts for both parties (fewer coupons sold and lower
                 revenue)? The structure of Groupon deals (including a
                 ``Facebook like'' option) together with electronic
                 access to the necessary data offered the opportunity to
                 empirically investigate these questions. We analyzed
                 relationships among MR, Facebook likes (FL), quantity
                 of coupons sold, and total revenue, performing the
                 analysis across the four largest retail categories.
                 Using timestamped empirical data, we completed a
                 propensity score analysis of causal effects. We find
                 that the presence of MR increases Facebook likes,
                 quantity of coupons sold, and total revenue at the time
                 point when the MR is met and at subsequent 2-hour
                 intervals over the horizon of deals. A key finding is
                 that the initial differences observed when MR is met
                 not only continue but also actually increase over the
                 life of the deals.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bhowmik:2015:RSH,
  author =       "Tanmay Bhowmik and Nan Niu and Prachi Singhania and
                 Wentao Wang",
  title =        "On the Role of Structural Holes in Requirements
                 Identification: an Exploratory Study on Open-Source
                 Software Development",
  journal =      j-TMIS,
  volume =       "6",
  number =       "3",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2795235",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:47 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Requirements identification is a human-centric
                 activity that involves interaction among multiple
                 stakeholders. Traditional requirements engineering (RE)
                 techniques addressing stakeholders' social interaction
                 are mainly part of a centralized process intertwined
                 with a specific phase of software development. However,
                 in open-source software (OSS) development,
                 stakeholders' social interactions are often
                 decentralized, iterative, and dynamic. Little is known
                 about new requirements identification in OSS and the
                 stakeholders' organizational arrangements supporting
                 such an activity. In this article, we investigate the
                 theory of structural hole from the context of
                 contributing new requirements in OSS projects.
                 Structural hole theory suggests that stakeholders
                 positioned in the structural holes in their social
                 network are able to produce new ideas. In this study,
                 we find that structural hole positions emerge in
                 stakeholders' social network and these positions are
                 positively related to contributing a higher number of
                 new requirements. We find that along with structural
                 hole positions, stakeholders' role is also an important
                 part in identifying new requirements. We further
                 observe that structural hole positions evolve over
                 time, thereby identifying requirements to realize
                 enriched features. Our work advances the fundamental
                 understanding of the RE process in a decentralized
                 environment and opens avenues for improved techniques
                 supporting this process.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bhattacharya:2015:RNA,
  author =       "Devipsita Bhattacharya and Sudha Ram",
  title =        "{RT @News}: an Analysis of News Agency Ego Networks in
                 a Microblogging Environment",
  journal =      j-TMIS,
  volume =       "6",
  number =       "3",
  pages =        "11:1--11:??",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2811270",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:47 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "News agencies regularly use Twitter to publicize and
                 increase readership of their articles. Although
                 substantial research on the spread of news on Twitter
                 exists, there hasn't been much focus on the study of
                 the spread of news articles. In this study, we present
                 an innovative methodology involving weighted ego
                 networks to understand how news agencies propagate news
                 articles using their Twitter handle. We propose a set
                 of measures to compare the propagation process of
                 different news agencies by studying important aspects
                 such as volume, extent of spread, conversion rate,
                 multiplier effect, lifespan, hourly response, and
                 audience participation. Using a dataset of tweets
                 collected over a period of 6 months, we apply our
                 methodology and suggest a framework to help news
                 agencies gauge their performance on social media and
                 also provide critical insights into the phenomenon of
                 news article propagation on Twitter.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Roy:2015:MOU,
  author =       "Arindam Roy and Shamik Sural and Arun Kumar Majumdar
                 and Jaideep Vaidya and Vijayalakshmi Atluri",
  title =        "Minimizing Organizational User Requirement while
                 Meeting Security Constraints",
  journal =      j-TMIS,
  volume =       "6",
  number =       "3",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2811269",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:47 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Large systems are complex and typically need automatic
                 configuration to be managed effectively. In any
                 organization, numerous tasks have to be carried out by
                 employees. However, due to security needs, it is not
                 feasible to directly assign any existing task to the
                 first available employee. In order to meet many
                 additional security requirements, constraints such as
                 separation of duty, cardinality and binding have to be
                 taken into consideration. Meeting these requirements
                 imposes extra burden on organizations, which, however,
                 is unavoidable in order to ensure security. While a
                 trivial way of ensuring security is to assign each user
                 to a single task, business organizations would
                 typically like to minimize their costs and keep
                 staffing requirements to a minimum. To meet these
                 contradictory goals, we define the problem of
                 Cardinality Constrained-Mutually Exclusive Task Minimum
                 User Problem (CMUP), which aims to find the minimum
                 users that can carry out a set of tasks while
                 satisfying the given security constraints. We show that
                 the CMUP problem is equivalent to a constrained version
                 of the weak chromatic number problem in hypergraphs,
                 which is NP-hard. We, therefore, propose a greedy
                 solution. Our experimental evaluation shows that the
                 proposed algorithm is both efficient and effective.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Gomez-Uribe:2016:NRS,
  author =       "Carlos A. Gomez-Uribe and Neil Hunt",
  title =        "The {Netflix} Recommender System: Algorithms, Business
                 Value, and Innovation",
  journal =      j-TMIS,
  volume =       "6",
  number =       "4",
  pages =        "13:1--13:??",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2843948",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:48 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This article discusses the various algorithms that
                 make up the Netflix recommender system, and describes
                 its business purpose. We also describe the role of
                 search and related algorithms, which for us turns into
                 a recommendations problem as well. We explain the
                 motivations behind and review the approach that we use
                 to improve the recommendation algorithms, combining A/B
                 testing focused on improving member retention and
                 medium term engagement, as well as offline
                 experimentation using historical member engagement
                 data. We discuss some of the issues in designing and
                 interpreting A/B tests. Finally, we describe some
                 current areas of focused innovation, which include
                 making our recommender system global and language
                 aware.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Krishnamurthy:2016:PDP,
  author =       "Rajiv Krishnamurthy and Varghese Jacob and Suresh
                 Radhakrishnan and Kutsal Dogan",
  title =        "Peripheral Developer Participation in Open Source
                 Projects: an Empirical Analysis",
  journal =      j-TMIS,
  volume =       "6",
  number =       "4",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2820618",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:48 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The success of the Open Source model of software
                 development depends on the voluntary participation of
                 external developers (the peripheral developers), a
                 group that can have distinct motivations from that of
                 project founders (the core developers). In this study,
                 we examine peripheral developer participation by
                 empirically examining approximately 2,600 open source
                 projects. In particular, we hypothesize that peripheral
                 developer participation is higher when the potential
                 for building reputation by gaining recognition from
                 project stakeholders is higher. We consider recognition
                 by internal stakeholders (such as core developers) and
                 external stakeholders (such as end-users and peers). We
                 find a positive association between peripheral
                 developer participation and the potential of
                 stakeholder recognition after controlling for bug
                 reports, feature requests, and other key factors. Our
                 findings provide important insights for OSS founders
                 and corporate managers for open sourcing or OSS
                 adoption decisions.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Liaskos:2016:SRO,
  author =       "Christos Liaskos and Ageliki Tsioliaridou",
  title =        "Service Ratio-Optimal, Content Coherence-Aware Data
                 Push Systems",
  journal =      j-TMIS,
  volume =       "6",
  number =       "4",
  pages =        "15:1--15:??",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2850423",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 25 07:36:48 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Advertising new information to users via push is the
                 trigger of operation for many contemporary information
                 systems. Furthermore, passive optical networks are
                 expected to extend the reachability of high-quality
                 push services to thousands of clients. The efficiency
                 of a push service is the ratio of successfully informed
                 users. However, pushing only data of high popularity
                 can degrade the thematic coherency of the content. The
                 present work offers a novel, analysis-derived, tunable
                 way for selecting data for push services. The proposed
                 scheme can maximize the service ratio of a push system
                 with regard to data coherence constraints. Extensive
                 simulations demonstrate the efficiency of the scheme
                 compared to alternative solutions. The proposed scheme
                 is the first to tackle the problem of data
                 coherence-aware, service ratio optimization of push
                 services.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lu:2016:CCB,
  author =       "Xianghua Lu and Xia Zhao and Ling Xue",
  title =        "Is Combining Contextual and Behavioral Targeting
                 Strategies Effective in Online Advertising?",
  journal =      j-TMIS,
  volume =       "7",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2883816",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jun 20 11:28:19 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Online targeting has been increasingly used to deliver
                 ads to consumers. But discovering how to target the
                 most valuable web visitors and generate a high response
                 rate is still a challenge for advertising
                 intermediaries and advertisers. The purpose of this
                 study is to examine how behavioral targeting (BT)
                 impacts users' responses to online ads and particularly
                 whether BT works better in combination with contextual
                 targeting (CT). Using a large, individual-level
                 clickstream data set of an automobile advertising
                 campaign from an Internet advertising intermediary,
                 this study examines the impact of BT and CT strategies
                 on users' click behavior. The results show that (1)
                 targeting a user with behavioral characteristics that
                 are closely related to ads does not necessarily
                 increase the click through rates (CTRs); whereas,
                 targeting a user with behavioral characteristics that
                 are loosely related to ads leads to a higher CTR, and
                 (2) BT and CT work better in combination. Our study
                 contributes to online advertising design literature and
                 provides important managerial implications for
                 advertising intermediaries and advertisers on targeting
                 individual users.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lui:2016:EMC,
  author =       "Tsz-Wai Lui and Gabriele Piccoli",
  title =        "The Effect of a Multichannel Customer Service System
                 on Customer Service and Financial Performance",
  journal =      j-TMIS,
  volume =       "7",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2875444",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jun 20 11:28:19 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Customer service is an important competitive lever for
                 the modern firm. At the same time, the continuous
                 evolution and performance improvements in information
                 technology (IT) capabilities have enabled the
                 utilization of multichannel service delivery
                 strategies. Our research focuses on IT-enabled customer
                 service systems (CSS) and their effect on firm
                 performance. Previous studies have failed to find a
                 consensus on the effect of a new self-service channel
                 on the firm's performance. We argue that the embedded
                 assumptions underpinning the previous research are
                 responsible for these mixed findings. Consequently,
                 using archival data from 169 hotels affiliated with a
                 hotel chain, we designed a longitudinal multichannel
                 study to resolve some of these inconsistencies. Our
                 results illustrate that when firms implement an
                 IT-enabled self-service channel to complement their
                 existing customer service infrastructure, they
                 experience an early negative effect on financial
                 performance due to the disruption of the service
                 processes. Thus, the multichannel CSS generates a
                 positive effect only when the new process becomes a
                 stable part of the organizational procedures. Our
                 findings suggest that researchers evaluate the effect
                 of a technological initiative after the new business
                 process has been stabilized and consider that an
                 additional IT-enabled self-service channel rarely
                 operates in isolation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sun:2016:UAN,
  author =       "Yutian Sun and Jianwen Su and Jian Yang",
  title =        "Universal Artifacts: a New Approach to Business
                 Process Management {(BPM)} Systems",
  journal =      j-TMIS,
  volume =       "7",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2886104",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jun 20 11:28:19 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In most BPM systems (a.k.a. workflow systems), the
                 data for process execution is scattered across
                 databases for enterprise, auxiliary local data stores
                 within the BPM systems, and even file systems (e.g.,
                 specification of process models). The interleaving
                 nature of data management and BP execution and the lack
                 of a coherent conceptual data model for all data needed
                 for execution make it hard for (1) providing
                 Business-Process-as-a-Service (BPaaS) and (2) effective
                 support for collaboration between business processes.
                 The primary reason is that an enormous effort is
                 required for maintaining both the engines and the data
                 for the client applications. In particular, different
                 modeling languages and different BPM systems make
                 process interoperation one of the toughest challenges.
                 In this article, we formulate a concept of a
                 ``universal artifact,'' which extends artifact-centric
                 models by capturing all needed data for a process
                 instance throughout its execution. A framework called
                 SeGA based on universal artifacts is developed to
                 support separation of data and BP execution, a key
                 principle for BPM systems. We demonstrate in this
                 article that SeGA is versatile enough to fully
                 facilitate not only executions of individual processes
                 (to support BPaaS) but also various collaboration
                 models. Moreover, SeGA reduces the complexity in
                 runtime management including runtime querying,
                 constraints enforcement, and dynamic modification upon
                 collaboration across possibly different BPM systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Li:2016:RTA,
  author =       "Shing-Han Li and David C. Yen and Ying-Ping Chuang",
  title =        "A Real-Time Audit Mechanism Based on the Compression
                 Technique",
  journal =      j-TMIS,
  volume =       "7",
  number =       "2",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629569",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:29 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Log management and log auditing have become
                 increasingly crucial for enterprises in this era of
                 information and technology explosion. The log analysis
                 technique is useful for discovering possible problems
                 in business processes and preventing illegal-intrusion
                 attempts and data-tampering attacks. Because of the
                 complexity of the dynamically changing environment,
                 auditing a tremendous number of data is a challenging
                 issue. We provide a real-time audit mechanism to
                 improve the aforementioned problems in log auditing.
                 This mechanism was developed based on the
                 Lempel--Ziv--Welch (LZW) compression technique to
                 facilitate effective compression and provide reliable
                 auditing log entries. The mechanism can be used to
                 predict unusual activities when compressing the log
                 data according to pre-defined auditing rules. Auditors
                 using real-time and continuous monitoring can perceive
                 instantly the most likely anomalies or exceptions that
                 could cause problems. We also designed a user interface
                 that allows auditors to define the various compression
                 and audit parameters, using real log cases in the
                 experiment to verify the feasibility and effectiveness
                 of this proposed audit mechanism. In summary, this
                 mechanism changes the log access method and improves
                 the efficiency of log analysis. This mechanism greatly
                 simplifies auditing so that auditors must only trace
                 the sources and causes of the problems related to the
                 detected anomalies. This greatly reduces the processing
                 time of analytical audit procedures and the manual
                 checking time, and improves the log audit efficiency.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Hashmi:2016:WSN,
  author =       "Khayyam Hashmi and Zaki Malik and Erfan Najmi and Amal
                 Alhosban and Brahim Medjahed",
  title =        "A {Web} Service Negotiation Management and {QoS}
                 Dependency Modeling Framework",
  journal =      j-TMIS,
  volume =       "7",
  number =       "2",
  pages =        "5:1--5:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2893187",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:29 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Information Management Systems that outsource part of
                 the functionality to other (likely unknown) services
                 need an effective way to communicate with these
                 services, so that a mutually beneficial solution can be
                 generated. This includes bargaining for their optimal
                 customizations and the discovery of overlooked
                 potential solutions. In this article, we present an
                 automated negotiation framework for information systems
                 (denoted as WebNeg ) that can be used by both the
                 parties for conducting negotiations. WebNeg uses a
                 Genetic Algorithm (GA)-based approach for finding
                 acceptable solutions in multiparty and multiobjective
                 scenarios. The GA is enhanced using a new operator
                 called Norm, which represents the cumulative knowledge
                 of all the parties involved in the negotiation process.
                 Norm incorporates the dependencies of different quality
                 attributes of independently developed component
                 services for the system composition. This enables
                 WebNeg to find a better solution in the context of the
                 current requirements. Experiment results indicate the
                 applicability and improved performance of WebNeg (in
                 comparison with existing similar works) in facilitating
                 the negotiation management involved in a web
                 service-based information composition process.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Gupta:2016:SCS,
  author =       "Agam Gupta and Biswatosh Saha and Uttam K. Sarkar",
  title =        "Systemic Concentration in Sponsored Search Markets:
                 The Role of Time Window in Click-Through-Rate
                 Computation",
  journal =      j-TMIS,
  volume =       "7",
  number =       "2",
  pages =        "6:1--6:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2934695",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:29 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Keyword-based search engine advertising markets on the
                 Internet, referred to as Sponsored Search Markets
                 (SSMs), have reduced entry barriers to advertising for
                 niche players. Known empirical research, though scant
                 and emerging, suggests that while these markets
                 provided niche firms with greater access, they do
                 exhibit high levels of concentration-a phenomenon that
                 warrants further study. This research, using
                 agent-based simulation of SSM, investigates the role of
                 ``market rules'' and ``advertiser practices'' in
                 generating emergent click share heterogeneity among
                 advertisers in an industry. SSMs often rank ads based
                 on the click-through rate (CTR) that gives rise to
                 reinforcing dynamics at an individual keyword level. In
                 the presence of spillovers arising from advertisers'
                 practice of managing keyword bids with a cost cap
                 operating on the keyword portfolio, these reinforcing
                 dynamics can endogenously generate industry-level
                 concentration. Analysis of counterfactual markets with
                 different window sizes used to compute CTR reveals that
                 industry-level concentration bears an inverted-``U''
                 relationship with window size.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Tsai:2016:DFK,
  author =       "Ming-Feng Tsai and Chuan-Ju Wang and Po-Chuan Chien",
  title =        "Discovering Finance Keywords via Continuous-Space
                 Language Models",
  journal =      j-TMIS,
  volume =       "7",
  number =       "3",
  pages =        "7:1--7:??",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2948072",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The growing amount of public financial data makes it
                 increasingly important to learn how to discover
                 valuable information for financial decision making.
                 This article proposes an approach to discovering
                 financial keywords from a large number of financial
                 reports. In particular, we apply the continuous
                 bag-of-words (CBOW) model, a well-known
                 continuous-space language model, to the textual
                 information in 10-K financial reports to discover new
                 finance keywords. In order to capture word meanings to
                 better locate financial terms, we also present a novel
                 technique to incorporate syntactic information into the
                 CBOW model. Experimental results on four prediction
                 tasks using the discovered keywords demonstrate that
                 our approach is effective for discovering
                 predictability keywords for post-event volatility,
                 stock volatility, abnormal trading volume, and excess
                 return predictions. We also analyze the discovered
                 keywords that attest to the ability of the proposed
                 method to capture both syntactic and contextual
                 information between words. This shows the success of
                 this method when applied to the field of finance.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Burnay:2016:SOS,
  author =       "Corentin Burnay",
  title =        "Are Stakeholders the Only Source of Information for
                 Requirements Engineers? {Toward} a Taxonomy of
                 Elicitation Information Sources",
  journal =      j-TMIS,
  volume =       "7",
  number =       "3",
  pages =        "8:1--8:??",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2965085",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Requirements elicitation consists in collecting and
                 documenting information about the requirements from a
                 system-to-be and about the environment of that system.
                 Elicitation forms a critical step in the design of any
                 information system, subject to many challenges like
                 information incompleteness, variability, or ambiguity.
                 To deal with these challenges, requirements engineers
                 heavily rely on stakeholders, who turn out to be one of
                 the most significant provider of information during
                 elicitation. Sometimes, this comes at the cost of less
                 attention being paid by engineers to other sources of
                 information accessible in a business. In this article,
                 we try to deal with this issue by studying the
                 different sources of information that can be used by
                 engineers when designing a system. We propose TELIS (a
                 Taxonomy of Elicitation Sources), which can be used
                 during elicitation to review more systematically the
                 sources of information about a system-to-be. TELIS was
                 produced through a series of empirical studies and was
                 partially validated through a real-world case study.
                 Our objective in this article is to increase the
                 awareness of engineers about the other information
                 providers within a business. Ultimately, we believe our
                 taxonomy may help in better dealing with classical
                 elicitation challenges and increase the chances of
                 successful information systems design.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Xu:2016:RMB,
  author =       "Jiajie Xu and Chengfei Liu and Xiaohui Zhao and Sira
                 Yongchareon and Zhiming Ding",
  title =        "Resource Management for Business Process Scheduling in
                 the Presence of Availability Constraints",
  journal =      j-TMIS,
  volume =       "7",
  number =       "3",
  pages =        "9:1--9:??",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2990197",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In the context of business process management, the
                 resources required by business processes, such as
                 workshop staff, manufacturing machines, etc., tend to
                 follow certain availability patterns, due to
                 maintenance cycles, work shifts and other factors. Such
                 availability patterns heavily influence the efficiency
                 and effectiveness of enterprise resource management.
                 Most existing process scheduling and resource
                 management approaches tend to tune the process
                 structure to seek better resource utilisation, yet
                 neglect the constraints on resource availability. In
                 this article, we investigate the scheduling of business
                 process instances in accordance with resource
                 availability patterns, to find out how enterprise
                 resources can be rationally and sufficiently used.
                 Three heuristic-based planning strategies are proposed
                 to maximise the process instance throughput together
                 with another strategy based on a genetic algorithm. The
                 performance of these strategies has been evaluated by
                 conducting experiments of different settings and
                 analysing the strategy characteristics.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Roy:2017:OEA,
  author =       "Arindam Roy and Shamik Sural and Arun Kumar Majumdar
                 and Jaideep Vaidya and Vijayalakshmi Atluri",
  title =        "On Optimal Employee Assignment in Constrained
                 Role-Based Access Control Systems",
  journal =      j-TMIS,
  volume =       "7",
  number =       "4",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996470",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Since any organizational environment is typically
                 resource constrained, especially in terms of human
                 capital, organization managers would like to maximize
                 the utilization of available human resources. However,
                 tasks cannot simply be assigned to arbitrary employees
                 since the employee needs to have the necessary
                 capabilities for executing a task. Furthermore,
                 security policies constrain the assignment of tasks to
                 employees, especially given the other tasks assigned to
                 the same employee. Since role-based access control
                 (RBAC) is the most commonly used access control model
                 for commercial information systems, we limit our
                 attention to consider constraints in RBAC. In this
                 article, we define the Employee Assignment Problem
                 (EAP), which aims to identify an employee to role
                 assignment such that it permits the maximal flexibility
                 in assigning tasks to employees while ensuring that the
                 required security constraints are met. We prove that
                 finding an optimal solution is NP-complete and
                 therefore provide a greedy solution. Experimental
                 evaluation of the proposed approach shows that it is
                 both efficient and effective.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chen:2017:DLN,
  author =       "Hao Chen and Keli Xiao and Jinwen Sun and Song Wu",
  title =        "A Double-Layer Neural Network Framework for
                 High-Frequency Forecasting",
  journal =      j-TMIS,
  volume =       "7",
  number =       "4",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3021380",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Nowadays, machine trading contributes significantly to
                 activities in the equity market, and forecasting market
                 movement under high-frequency scenario has become an
                 important topic in finance. A key challenge in
                 high-frequency market forecasting is modeling the
                 dependency structure among stocks and business sectors,
                 with their high dimensionality and the requirement of
                 computational efficiency. As a group of powerful
                 models, neural networks (NNs) have been used to capture
                 the complex structure in many studies. However, most
                 existing applications of NNs only focus on forecasting
                 with daily or monthly data, not with minute-level data
                 that usually contains more noises. In this article, we
                 propose a novel double-layer neural (DNN) network for
                 high-frequency forecasting, with links specially
                 designed to capture dependence structures among stock
                 returns within different business sectors. Various
                 important technical indicators are also included at
                 different layers of the DNN framework. Our model
                 framework allows update over time to achieve the best
                 goodness-of-fit with the most recent data. The model
                 performance is tested based on 100 stocks with the
                 largest capitals from the S8P 500. The results show
                 that the proposed framework outperforms benchmark
                 methods in terms of the prediction accuracy and
                 returns. Our method will help in financial analysis and
                 trading strategy designs.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lu:2017:SLE,
  author =       "Yan Lu and Michael Chau and Patrick Y. K. Chau",
  title =        "Are Sponsored Links Effective? {Investigating} the
                 Impact of Trust in Search Engine Advertising",
  journal =      j-TMIS,
  volume =       "7",
  number =       "4",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3023365",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 16 15:48:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "As information on the Internet grows exponentially,
                 online users primarily rely on search engines (SEs) to
                 locate e-commerce sites for online shopping. To
                 generate revenue while providing free service to users,
                 SE companies offer sponsored link (SL) placements to
                 e-commerce sites that want to appear in the first SE
                 results page. However, the lack of users' trust in SE
                 advertising indicates that SEs should utilize
                 strategies to project trustworthiness on this
                 mechanism. Despite these insights, the role of users'
                 trust in the operation of SE advertising is still an
                 unexplored territory. To address this issue, a
                 theoretical model was synthesized from the social
                 psychology literature, the marketing literature, and
                 the trust literature to investigate the factors that
                 may pose impacts on the effectiveness of SE advertising
                 by influencing users' perception of both cognitive and
                 emotional trust. A laboratory experiment was conducted.
                 The findings document the importance of incorporating
                 emotional components of trust in the study of online
                 communication by showing that emotional dimension of
                 trust is different from and complementary to cognitive
                 trust in facilitating online communication. The
                 findings also provide valuable implications for
                 practitioners to design and provide more effective SLs
                 that can benefit all parties involved.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Pika:2017:MRP,
  author =       "Anastasiia Pika and Michael Leyer and Moe T. Wynn and
                 Colin J. Fidge and Arthur H. M. Ter Hofstede and Wil M.
                 P. {Van Der Aalst}",
  title =        "Mining Resource Profiles from Event Logs",
  journal =      j-TMIS,
  volume =       "8",
  number =       "1",
  pages =        "1:1--1:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3041218",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:32 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In most business processes, several activities need to
                 be executed by human resources and cannot be fully
                 automated. To evaluate resource performance and
                 identify best practices as well as opportunities for
                 improvement, managers need objective information about
                 resource behaviors. Companies often use information
                 systems to support their processes, and these systems
                 record information about process execution in event
                 logs. We present a framework for analyzing and
                 evaluating resource behavior through mining such event
                 logs. The framework provides (1) a method for
                 extracting descriptive information about resource
                 skills, utilization, preferences, productivity, and
                 collaboration patterns; (2) a method for analyzing
                 relationships between different resource behaviors and
                 outcomes; and (3) a method for evaluating the overall
                 resource productivity, tracking its changes over time,
                 and comparing it to the productivity of other
                 resources. To demonstrate the applicability of our
                 framework, we apply it to analyze employee behavior in
                 an Australian company and evaluate its usefulness by a
                 survey among industry managers.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Eftekhari:2017:DHI,
  author =       "Saeede Eftekhari and Niam Yaraghi and Ranjit Singh and
                 Ram D. Gopal and R. Ramesh",
  title =        "Do Health Information Exchanges Deter Repetition of
                 Medical Services?",
  journal =      j-TMIS,
  volume =       "8",
  number =       "1",
  pages =        "2:1--2:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3057272",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:32 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Repetition of medical services by providers is one of
                 the major sources of healthcare costs. The lack of
                 access to previous medical information on a patient at
                 the point of care often leads a physician to perform
                 medical procedures that have already been done.
                 Multiple healthcare initiatives and legislation at both
                 the federal and state levels have mandated Health
                 Information Exchange (HIE) systems to address this
                 problem. This study aims to assess the extent to which
                 HIE could reduce these repetitions, using data from
                 Centers for Medicare 8 Medicaid Services and a regional
                 HIE organization. A 2-Stage Least Square model is
                 developed to predict the impact of HIE on repetitions
                 of two classes of procedures: diagnostic and
                 therapeutic. The first stage is a predictive analytic
                 model that estimates the duration of tenure of each HIE
                 member-practice. Based on these estimates, the second
                 stage predicts the effect of providers' HIE tenure on
                 their repetition of medical services. The model
                 incorporates moderating effects of a federal quality
                 assurance program and the complexity of medical
                 procedures with a set of control variables. Our
                 analyses show that a practice's tenure with HIE
                 significantly lowers the repetition of therapeutic
                 medical procedures, while diagnostic procedures are not
                 impacted. The medical reasons for the effects observed
                 in each class of procedures are discussed. The results
                 will inform healthcare policymakers and provide
                 insights on the business models of HIE platforms.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kakar:2017:IRB,
  author =       "Adarsh Kumar Kakar",
  title =        "Investigating the Relationships Between the Use
                 Contexts, User Perceived Values, and Loyalty to a
                 Software Product",
  journal =      j-TMIS,
  volume =       "8",
  number =       "1",
  pages =        "3:1--3:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3057271",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:32 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In this study, we propose that software products
                 provide three types of value-utilitarian, hedonic, and
                 social-that impact user loyalty. Although the
                 Technology Acceptance Model (TAM) has focused on the
                 user impacts of utilitarian and hedonic values provided
                 by utilitarian and hedonic software products on system
                 use, the impact of social value provided by the
                 software products in general have been largely ignored.
                 The results of a longitudinal study with actual users
                 of three types of software products show that all three
                 types of software products-utilitarian (Producteev),
                 hedonic (Kerbal), and social (Facebook)-provide
                 significant but varying degrees of all three types of
                 values. Further, the value derived by the users'
                 primary use context moderated the impact of the
                 secondary values provided by the software product to
                 the users on their loyalty for the product.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bhattacharjee:2017:IWS,
  author =       "Sudip Bhattacharjee and Varghese Jacob and Zhengrui
                 (Jeffrey) Jiang and Subodha Kumar",
  title =        "Introduction to {WITS 2015} Special Issue in {TMIS}",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3108899",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4e",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Deng:2017:RAS,
  author =       "Shuyuan Deng and Atish P. Sinha and Huimin Zhao",
  title =        "Resolving Ambiguity in Sentiment Classification: The
                 Role of Dependency Features",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3046684",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Sentiment analysis has become popular in business
                 intelligence and analytics applications due to the
                 great need for learning insights from the vast amounts
                 of user generated content on the Internet. One major
                 challenge of sentiment analysis, like most text
                 classification tasks, is finding structures from
                 unstructured texts. Existing sentiment analysis
                 techniques employ the supervised learning approach and
                 the lexicon scoring approach, both of which largely
                 rely on the representation of a document as a
                 collection of words and phrases. The semantic ambiguity
                 (i.e., polysemy) of single words and the sparsity of
                 phrases negatively affect the robustness of sentiment
                 analysis, especially in the context of short social
                 media texts. In this study, we propose to represent
                 texts using dependency features. We test the
                 effectiveness of dependency features in supervised
                 sentiment classification. We compare our method with
                 the current standard practice using a labeled data set
                 containing 170,874 microblogging messages. The
                 combination of unigram features and dependency features
                 significantly outperformed other popular types of
                 features.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Al-Ramahi:2017:DDP,
  author =       "Mohammad A. Al-Ramahi and Jun Liu and Omar F.
                 El-Gayar",
  title =        "Discovering Design Principles for Health Behavioral
                 Change Support Systems: a Text Mining Approach",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "5:1--5:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3055534",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Behavioral Change Support Systems (BCSSs) aim to
                 change users' behavior and lifestyle. These systems
                 have been gaining popularity with the proliferation of
                 wearable devices and recent advances in mobile
                 technologies. In this article, we extend the existing
                 literature by discovering design principles for health
                 BCSSs based on a systematic analysis of users'
                 feedback. Using mobile diabetes applications as an
                 example of Health BCSSs, we use topic modeling to
                 discover design principles from online user reviews. We
                 demonstrate the importance of the design principles
                 through analyzing their existence in users' complaints.
                 Overall, the results highlight the necessity of going
                 beyond the techno-centric approach used in current
                 practice and incorporating the social and
                 organizational features into persuasive systems design,
                 as well as integrating with medical devices and other
                 systems in their usage context.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sun:2017:BCP,
  author =       "Can Sun and Yonghua Ji and Bora Kolfal and Ray
                 Patterson",
  title =        "Business-to-Consumer Platform Strategy: How Vendor
                 Certification Changes Platform and Seller Incentives",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "6:1--6:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3057273",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We build an economic model to study the problem of
                 offering a new, high-certainty channel on an existing
                 business-to-consumer platform such as Taobao and eBay.
                 On this new channel, the platform owner exerts effort
                 to reduce the uncertainty of service quality. Sellers
                 can either sell through the existing low-certainty
                 channel or go through additional screening to sell on
                 this new channel. We model the problem as a Bertrand
                 competition game where sellers compete on price and
                 exert effort to provide better service to consumers. In
                 this game, we consider a reputation spillover effect
                 that refers to the impact of the high-certainty channel
                 on the perceived service quality in the low-certainty
                 channel. Counter-intuitively, we find that
                 low-certainty channel demand will decrease as the
                 reputation spillover effect increases, in the case of
                 low inter-channel competition. Also, low-certainty
                 channel demand increases as the quality uncertainty
                 increases, in the case of intense inter-channel
                 competition. Furthermore, the platform owner should
                 offer a new high-certainty channel when (i) the
                 perceived quality for this channel is sufficiently
                 high, (ii) sellers in this channel are able to
                 efficiently provide quality service, (iii) consumers in
                 this channel are not so sensitive to the quality
                 uncertainty, or (iv) the reputation spillover effect is
                 high. In the one-channel case, the incentives of the
                 platform owner and sellers are aligned for all model
                 parameters. However, this is not the case for the
                 two-channel solution, and our model reveals where
                 tensions will arise between parties.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Bauman:2017:USS,
  author =       "Konstantin Bauman and Alexander Tuzhilin and Ryan
                 Zaczynski",
  title =        "Using Social Sensors for Detecting Emergency Events: a
                 Case of Power Outages in the Electrical Utility
                 Industry",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "7:1--7:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3052931",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "This article presents a novel approach to detecting
                 emergency events, such as power outages, that utilizes
                 social media users as ``social sensors'' for virtual
                 detection of such events. The proposed new method is
                 based on the analysis of the Twitter data that leads to
                 the detection of Twitter discussions about these
                 emergency events. The method described in the article
                 was implemented and deployed by one of the vendors in
                 the context of detecting power outages as a part of
                 their comprehensive social engagement platform. It was
                 also field tested on Twitter users in an industrial
                 setting and performed well during these tests.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mannino:2017:DES,
  author =       "Michael Mannino and Joel Fredrickson and Farnoush
                 Banaei-Kashani and Iris Linck and Raghda Alqurashi
                 Raghda",
  title =        "Development and Evaluation of a Similarity Measure for
                 Medical Event Sequences",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "8:1--8:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3070684",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We develop a similarity measure for medical event
                 sequences (MESs) and empirically evaluate it using U.S.
                 Medicare claims data. Existing similarity measures do
                 not use unique characteristics of MESs and have never
                 been evaluated on real MESs. Our similarity measure,
                 the Optimal Temporal Common Subsequence for Medical
                 Event Sequences (OTCS-MES), provides a matching
                 component that integrates event prevalence, event
                 duplication, and hierarchical coding, important
                 elements of MESs. The OTCS-MES also uses normalization
                 to mitigate the impact of heavy positive skew of
                 matching events and compact distribution of event
                 prevalence. We empirically evaluate the OTCS-MES
                 measure against two other measures specifically
                 designed for MESs, the original OTCS and Artemis, a
                 measure incorporating event alignment. Our evaluation
                 uses two substantial data sets of Medicare claims data
                 containing inpatient and outpatient sequences with
                 different medical event coding. We find a small overlap
                 in nearest neighbors among the three similarity
                 measures, demonstrating the superior design of the
                 OTCS-MES with its emphasis on unique aspects of MESs.
                 The evaluation also provides evidence about the impact
                 of component weights, neighborhood size, and sequence
                 length.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Taghavi:2017:RCF,
  author =       "Atefeh Taghavi and Carson Woo",
  title =        "The Role Clarity Framework to Improve Requirements
                 Gathering",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "9:1--9:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3083726",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Incorrect and incomplete requirements have been
                 reported as two of the top reasons for information
                 systems (IS) project failures. In order to address
                 these concerns, several IS analysis and design studies
                 have focused on understanding the business needs and
                 organizational factors prior to specifying the
                 requirements. In this research, we add to the existing
                 incremental solutions, such as the work system method
                 and goal-oriented requirements engineering, by
                 proposing the Role Clarity Framework drawn from the
                 theories of ``role dynamics'' and ``goal setting and
                 task performance'' in organization studies. The Role
                 Clarity Framework consists of three main concepts
                 related to any organizational role: expectations,
                 activities, and consequences. Based on the interactions
                 among different roles, this framework demonstrates how
                 the business goals and activities of each role, as
                 played out by IS users, are formed and/or changed in
                 the organization. Finally, the Role Clarity Framework
                 helps IS analysts to improve their communication with
                 users and anticipate changes in their requirements,
                 thus improving the gathering of requirements for IS
                 design.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mukherjee:2017:ARB,
  author =       "Anik Mukherjee and R. P. Sundarraj and Kaushik Dutta",
  title =        "Apriori Rule-Based In-App Ad Selection Online
                 Algorithm for Improving Supply-Side Platform Revenues",
  journal =      j-TMIS,
  volume =       "8",
  number =       "2--3",
  pages =        "10:1--10:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3086188",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Sep 16 11:43:33 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tmis/;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Today, smartphone-based in-app advertisement forms a
                 substantial portion of the online advertising market.
                 In-app publishers go through ad-space aggregators known
                 as Supply-Side Platforms (SSPs), who, in turn, act as
                 intermediaries for ad-agency aggregators known as
                 demand-side platforms. The SSPs face the twin issue of
                 making ad placement decisions within an order of
                 milliseconds, even though their revenue streams can be
                 optimized only by a careful selection of ads that
                 elicit appropriate user responses regarding
                 impressions, clicks, and conversions. This article
                 considers the SSP's perspective and presents an online
                 algorithm that balances these two issues. Our
                 experimental results indicate that the decision-making
                 time generally ranges between 20 ms and 50 ms and
                 accuracy from 1\% to 10\%. Further, we conduct
                 statistical analysis comparing the theoretical
                 complexity of the online algorithm with its empirical
                 performance. Empirically, we observe that the time is
                 directly proportional to the number of incoming ads and
                 the number of online rules.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ha:2017:PPE,
  author =       "Tuan Minh Ha and Masaki Samejima and Norihisa Komoda",
  title =        "Power and Performance Estimation for Fine-Grained
                 Server Power Capping via Controlling Heterogeneous
                 Applications",
  journal =      j-TMIS,
  volume =       "8",
  number =       "4",
  pages =        "11:1--11:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3086449",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 22 17:26:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Power capping is a method to save power consumption of
                 servers by limiting performance of the servers.
                 Although users frequently run applications on different
                 virtual machines (VMs) for keeping their performance
                 and having them isolated from the other applications,
                 power capping may degrade performance of all the
                 applications running on the server. We present
                 fine-grained power capping by limiting performance of
                 each application individually. For keeping performance
                 defined in Quality of Service (QoS) requirements, it is
                 important to estimate applications' performance and
                 power consumption after the fine-grained power capping
                 is applied. We propose the estimation method of
                 physical CPU usage when limiting virtual CPU usage of
                 applications on VMs. On servers where multiple VMs run,
                 VM's usage of physical CPU is interrupted by the other
                 VMs, and a hypervisor uses physical CPU to control VMs.
                 These VMs' and hypervisor's behaviors make it difficult
                 to estimate performance and power consumption by
                 straightforward methods, such as linear regression and
                 polynomial regression. The proposed method uses
                 Piecewise Linear Regression to estimate physical CPU
                 usage by assuming that VM's access to physical CPU is
                 not interrupted by the other VMs. Then we estimate how
                 much physical CPU usage is reduced by the interruption.
                 Because physical CPU usage is not stable soon after
                 limiting CPU usage, the proposed method estimates a
                 convergence value of CPU usage after many interruptions
                 are repeated.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Basole:2017:UAP,
  author =       "Rahul C. Basole and Timothy Major and Arjun
                 Srinivasan",
  title =        "Understanding Alliance Portfolios Using Visual
                 Analytics",
  journal =      j-TMIS,
  volume =       "8",
  number =       "4",
  pages =        "12:1--12:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3086308",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 22 17:26:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "In an increasingly global and competitive business
                 landscape, firms must collaborate and partner with
                 others to ensure survival, growth, and innovation.
                 Understanding the evolutionary composition of a firm's
                 relationship portfolio and the underlying formation
                 strategy is a difficult task given the
                 multidimensional, temporal, and geospatial nature of
                 the data. In collaboration with senior executives, we
                 iteratively determine core design requirements and then
                 design and implement an interactive visualization
                 system that enables decision makers to gain both
                 systemic (macro) and detailed (micro) insights into a
                 firm's alliance activities and discover patterns of
                 multidimensional relationship formation. Our system
                 provides both sequential and temporal representation
                 modes, a rich set of additive cross-linked filters, the
                 ability to stack multiple alliance portfolios, and a
                 dynamically updated activity state model visualization
                 to inform decision makers of past and likely future
                 relationship moves. We illustrate our tool with
                 examples of alliance activities of firms listed on the
                 S8P 500. A controlled experiment and real-world
                 evaluation with practitioners and researchers reveals
                 significant evidence of the value of our visual
                 analytic tool. Our design study contributes to design
                 science by addressing a known problem (i.e., alliance
                 portfolio analysis) with a novel solution (interactive,
                 pixel-based multivariate visualization) and to the
                 rapidly emerging area of data-driven visual decision
                 support in corporate strategy contexts. We conclude
                 with implications and future research opportunities.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Cazier:2017:VCT,
  author =       "Joseph Cazier and Benjamin Shao and Robert
                 {St. Louis}",
  title =        "Value Congruence, Trust, and Their Effects on Purchase
                 Intention and Reservation Price",
  journal =      j-TMIS,
  volume =       "8",
  number =       "4",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3110939",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 22 17:26:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "We study the roles of value congruence and trust in
                 increasing online shoppers' intention to purchase goods
                 and their reservation prices for these goods.
                 Hypotheses are developed and a controlled experiment is
                 conducted to measure subjects' value congruence with
                 and their trust in online sellers with disparate
                 values, along with their purchase intention and
                 willingness to pay price premiums. Using social
                 exchange theory, we find that, for business-to-consumer
                 (B2C) e-commerce, value congruence increases consumer
                 online trust, and both value congruence and online
                 trust have direct effects on purchase intention and
                 reservation prices. In particular, in the positive
                 value congruence vs. value neutral case, trust has a
                 greater effect than value congruence on purchase
                 intention, but value congruence has a greater effect
                 than trust on reservation price. These findings suggest
                 that trust is essential to a consumer's intention to
                 purchase online but value congruence can induce price
                 premiums from potential buyers for online sellers. This
                 implies that trust is essential to B2C e-commerce, but
                 value congruence can be a more effective instrument for
                 online sellers to achieve competitive advantage through
                 value-based differentiation in the virtual
                 marketplace.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lukyanenko:2017:ACC,
  author =       "Roman Lukyanenko and Binny M. Samuel",
  title =        "Are All Classes Created Equal? {Increasing} Precision
                 of Conceptual Modeling Grammars",
  journal =      j-TMIS,
  volume =       "8",
  number =       "4",
  pages =        "14:1--14:??",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3131780",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Jan 22 17:26:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Recent decade has seen a dramatic change in the
                 information systems landscape that alters the ways we
                 design and interact with information technologies,
                 including such developments as the rise of business
                 analytics, user-generated content, and NoSQL databases,
                 to name just a few. These changes challenge conceptual
                 modeling research to offer innovative solutions
                 tailored to these environments. Conceptual models
                 typically represent classes (categories, kinds) of
                 objects rather than concrete specific objects, making
                 the class construct a critical medium for capturing
                 domain semantics. While representation of classes may
                 differ between grammars, a common design assumption is
                 what we term different semantics same syntax (D3S).
                 Under D3S, all classes are depicted using the same
                 syntactic symbols. Following recent findings in
                 psychology, we introduce a novel assumption
                 semantics-contingent syntax (SCS) whereby syntactic
                 representations of classes in conceptual models may
                 differ based on their semantic meaning. We propose a
                 core SCS design principle and five guidelines pertinent
                 for conceptual modeling. We believe SCS carries
                 profound implications for theory and practice of
                 conceptual modeling as it seeks to better support
                 modern information environments.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Li:2018:SLR,
  author =       "Zhepeng (Lionel) Li and Xiao Fang and Olivia R. Liu
                 Sheng",
  title =        "A Survey of Link Recommendation for Social Networks:
                 Methods, Theoretical Foundations, and Future Research
                 Directions",
  journal =      j-TMIS,
  volume =       "9",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3131782",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Link recommendation has attracted significant
                 attention from both industry practitioners and academic
                 researchers. In industry, link recommendation has
                 become a standard and most important feature in online
                 social networks, prominent examples of which include
                 ``People You May Know'' on LinkedIn and ``You May
                 Know'' on Google+. In academia, link recommendation has
                 been and remains a highly active research area. This
                 article surveys state-of-the-art link recommendation
                 methods, which can be broadly categorized into
                 learning-based methods and proximity-based methods. We
                 further identify social and economic theories, such as
                 social interaction theory, that underlie these methods
                 and explain from a theoretical perspective why a link
                 recommendation method works. Finally, we propose to
                 extend link recommendation research in several
                 directions that include utility-based link
                 recommendation, diversity of link recommendation, link
                 recommendation from incomplete data, and experimental
                 study of link recommendation.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Xiao:2018:PSD,
  author =       "Keli Xiao and Qi Liu and Chuanren Liu and Hui Xiong",
  title =        "Price Shock Detection With an Influence-Based Model of
                 Social Attention",
  journal =      j-TMIS,
  volume =       "9",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3131781",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "There has been increasing interest in exploring the
                 impact of human behavior on financial market dynamics.
                 One of the important related questions is whether
                 attention from society can lead to significant stock
                 price movements or even abnormal returns. To answer the
                 question, we develop a new measurement of social
                 attention, named periodic cumulative degree of social
                 attention, by simultaneously considering the individual
                 influence and the information propagation in social
                 networks. Based on the vast social network data, we
                 evaluate the new attention measurement by testing its
                 significance in explaining future abnormal returns. In
                 addition, we test the forecasting ability of social
                 attention for stock price shocks, defined by the
                 cumulative abnormal returns. Our results provide
                 significant evidence to support the intercorrelated
                 relationship between the social attention and future
                 abnormal returns. The outperformance of the new
                 approach in predicting price shocks is also confirmed
                 by comparison with several benchmark methods.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Tuarob:2018:DDB,
  author =       "Suppawong Tuarob and Ray Strong and Anca Chandra and
                 Conrad S. Tucker",
  title =        "Discovering Discontinuity in Big Financial Transaction
                 Data",
  journal =      j-TMIS,
  volume =       "9",
  number =       "1",
  pages =        "3:1--3:??",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3159445",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Business transactions are typically recorded in the
                 company ledger. The primary purpose of such financial
                 information is to accompany a monthly or quarterly
                 report for executives to make sound business decisions
                 and strategies for the next business period. These
                 business strategies often result in transitions that
                 cause underlying infrastructures and components to
                 change, including alteration in the nomenclature system
                 of the business components. As a result, a transaction
                 stream of an affected component would be replaced by
                 another stream with a different component name,
                 resulting in discontinuity of a financial stream of the
                 same component. Recently, advancement in large-scale
                 data mining technologies has enabled a set of critical
                 applications to utilize knowledge extracted from a vast
                 amount of existing data that would otherwise have been
                 unused or underutilized. In financial and services
                 computing domains, recent studies have illustrated that
                 historical financial data could be used to predict
                 future revenues and profits, optimizing costs, among
                 other potential applications. These prediction models
                 rely on long-term availability of the historical data
                 that traces back for multiple years. However, the
                 discontinuity of the financial transaction stream
                 associated with a business component has limited the
                 learning capability of the prediction models. In this
                 article, we propose a set of machine learning-based
                 algorithms to automatically discover component name
                 replacements, using information available in general
                 ledger databases. The algorithms are designed to be
                 scalable for handling massive data points, especially
                 in large companies. Furthermore, the proposed
                 algorithms are generalizable to other domains whose
                 data is time series and shares the same nature as the
                 financial data available in business ledgers. A case
                 study of real-world IBM service delivery retrieved from
                 four different geographical regions is used to validate
                 the efficacy of the proposed methodology.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mendling:2018:BBP,
  author =       "Jan Mendling and Ingo Weber and Wil {Van Der Aalst}
                 and Jan {Vom Brocke and} Cristina Cabanillas and
                 Florian Daniel and S{\o}ren Debois and Claudio {Di
                 Ciccio} and Marlon Dumas and Schahram Dustdar and
                 Avigdor Gal and Luciano Garc{\'\i}a-Ba{\~n}uelos and
                 Guido Governatori and Richard Hull and Marcello {La
                 Rosa} and Henrik Leopold and Frank Leymann and Jan
                 Recker and Manfred Reichert and Hajo A. Reijers and
                 Stefanie Rinderle-Ma and Andreas Solti and Michael
                 Rosemann and Stefan Schulte and Munindar P. Singh and
                 Tijs Slaats and Mark Staples and Barbara Weber and
                 Matthias Weidlich and Mathias Weske and Xiwei Xu and
                 Liming Zhu",
  title =        "Blockchains for Business Process Management ---
                 Challenges and Opportunities",
  journal =      j-TMIS,
  volume =       "9",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3183367",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Blockchain technology offers a sizable promise to
                 rethink the way interorganizational business processes
                 are managed because of its potential to realize
                 execution without a central party serving as a single
                 point of trust (and failure). To stimulate research on
                 this promise and the limits thereof, in this article,
                 we outline the challenges and opportunities of
                 blockchain for business process management (BPM). We
                 first reflect how blockchains could be used in the
                 context of the established BPM lifecycle and second how
                 they might become relevant beyond. We conclude our
                 discourse with a summary of seven research directions
                 for investigating the application of blockchain
                 technology in the context of BPM.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zimbra:2018:SAT,
  author =       "David Zimbra and Ahmed Abbasi and Daniel Zeng and
                 Hsinchun Chen",
  title =        "The State-of-the-Art in {Twitter} Sentiment Analysis:
                 a Review and Benchmark Evaluation",
  journal =      j-TMIS,
  volume =       "9",
  number =       "2",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3185045",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Twitter has emerged as a major social media platform
                 and generated great interest from sentiment analysis
                 researchers. Despite this attention, state-of-the-art
                 Twitter sentiment analysis approaches perform
                 relatively poorly with reported classification
                 accuracies often below 70\%, adversely impacting
                 applications of the derived sentiment information. In
                 this research, we investigate the unique challenges
                 presented by Twitter sentiment analysis and review the
                 literature to determine how the devised approaches have
                 addressed these challenges. To assess the
                 state-of-the-art in Twitter sentiment analysis, we
                 conduct a benchmark evaluation of 28 top academic and
                 commercial systems in tweet sentiment classification
                 across five distinctive data sets. We perform an error
                 analysis to uncover the causes of commonly occurring
                 classification errors. To further the evaluation, we
                 apply select systems in an event detection case study.
                 Finally, we summarize the key trends and takeaways from
                 the review and benchmark evaluation and provide
                 suggestions to guide the design of the next generation
                 of approaches.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Basole:2018:EDE,
  author =       "Rahul C. Basole and Arjun Srinivasan and Hyunwoo Park
                 and Shiv Patel",
  title =        "{\tt ecoxight}: Discovery, Exploration, and Analysis
                 of Business Ecosystems Using Interactive
                 Visualization",
  journal =      j-TMIS,
  volume =       "9",
  number =       "2",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3185047",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "The term ecosystem is used pervasively in industry,
                 government, and academia to describe the complex,
                 dynamic, hyperconnected nature of many social,
                 economic, and technical systems that exist today.
                 Ecosystems are characterized by a large, dynamic, and
                 heterogeneous set of geospatially distributed entities
                 that are interconnected through various types of
                 relationships. This study describes the design and
                 development of ecoxight, a Web-based visualization
                 platform that provides multiple coordinated views of
                 multipartite, multiattribute, dynamic, and geospatial
                 ecosystem data with novel and rich interaction
                 capabilities to augment decision makers ecosystem
                 intelligence. The design of ecoxight was informed by an
                 extensive multiphase field study of executives. The
                 ecoxight platform not only provides capabilities to
                 interactively explore and make sense of ecosystems but
                 also provides rich visual construction capabilities to
                 help decision makers align their mental model. We
                 demonstrate the usability, utility, and value of our
                 system using multiple evaluation studies with
                 practitioners using socially curated data on the
                 emerging application programming interface ecosystem.
                 We report on our findings and conclude with research
                 implications. Collectively, our study contributes to
                 design science research at the intersection of
                 information systems and strategy and the rapidly
                 emerging field of visual enterprise analytics.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Fan:2018:IES,
  author =       "Xiangyu Fan and Xi Niu",
  title =        "Implementing and Evaluating Serendipity in Delivering
                 Personalized Health Information",
  journal =      j-TMIS,
  volume =       "9",
  number =       "2",
  pages =        "7:1--7:??",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3205849",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Serendipity has been recognized to have the potential
                 of enhancing unexpected information discovery. This
                 study shows that decomposing the concept of serendipity
                 into unexpectedness and interest is a useful way for
                 implementing this concept. Experts' domain knowledge
                 helps in providing serendipitous recommendation, which
                 can be further improved by adaptively incorporating
                 users' real-time feedback. This research also conducts
                 an empirical user-study to analyze the influence of
                 serendipity in a health news delivery context. A
                 personalized filtering system named MedSDFilter was
                 developed, on top of which serendipitous recommendation
                 was implemented using three approaches: random,
                 static-knowledge-based, and adaptive-knowledge-based
                 models. The three different models were compared. The
                 results indicate that the adaptive-knowledge-based
                 method has the highest ability in helping people
                 discover unexpected and interesting contents. The
                 insights of the research will make researchers and
                 practitioners rethink the way in which search engines
                 and recommender systems operate to address the
                 challenges of discovering unexpected and interesting
                 information. The outcome will have implications for
                 empowering ordinary people with more chances of bumping
                 into beneficial information.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Purao:2018:MLC,
  author =       "Sandeep Purao and Narasimha Bolloju and Chuan-Hoo
                 Tan",
  title =        "A Modeling Language for Conceptual Design of Systems
                 Integration Solutions",
  journal =      j-TMIS,
  volume =       "9",
  number =       "2",
  pages =        "8:1--8:??",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3185046",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Systems integration-connecting software systems for
                 cross-functional work-is a significant concern in many
                 large organizations, which continue to maintain
                 hundreds, if not thousands, of independently evolving
                 software systems. Current approaches in this space
                 remain ad hoc, and closely tied to technology
                 platforms. Following a design science approach, and via
                 multiple design-evaluate cycles, we develop Systems
                 Integration Requirements Engineering Modeling Language
                 (SIRE-ML) to address this problem. SIRE-ML builds on
                 the foundation of coordination theory, and incorporates
                 important semantic information about the systems
                 integration domain. The article develops constructs in
                 SIRE-ML, and a merge algorithm that allows both
                 functional managers and integration professionals to
                 contribute to building a systems integration solution.
                 Integration models built with SIRE-ML provide benefits
                 such as ensuring coverage and minimizing ambiguity, and
                 can be used to drive implementation with different
                 platforms such as middleware, services, and distributed
                 objects. We evaluate SIRE-ML for ontological
                 expressiveness and report findings about applicability
                 check with an expert panel. The article discusses
                 implications for future research such as tool building
                 and empirical evaluation, as well as implications for
                 practice.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{De-Arteaga:2018:MLD,
  author =       "Maria De-Arteaga and William Herlands and Daniel B.
                 Neill and Artur Dubrawski",
  title =        "Machine Learning for the Developing World",
  journal =      j-TMIS,
  volume =       "9",
  number =       "2",
  pages =        "9:1--9:??",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3210548",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  abstract =     "Researchers from across the social and computer
                 sciences are increasingly using machine learning to
                 study and address global development challenges. This
                 article examines the burgeoning field of machine
                 learning for the developing world (ML4D). First, we
                 present a review of prominent literature. Next, we
                 suggest best practices drawn from the literature for
                 ensuring that ML4D projects are relevant to the
                 advancement of development objectives. Finally, we
                 discuss how developing world challenges can motivate
                 the design of novel machine learning methodologies.
                 This article provides insights into systematic
                 differences between ML4D and more traditional machine
                 learning applications. It also discusses how technical
                 complications of ML4D can be treated as novel research
                 questions, how ML4D can motivate new research
                 directions, and where machine learning can be most
                 useful.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Ketter:2018:ISS,
  author =       "Wolfgang Ketter and John Collins and Maytal
                 Saar-Tsechansky and Ori Marom",
  title =        "Information Systems for a Smart Electricity Grid:
                 Emerging Challenges and Opportunities",
  journal =      j-TMIS,
  volume =       "9",
  number =       "3",
  pages =        "10:1--10:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3230712",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230712",
  abstract =     "The drive for sustainability as evidenced by the Paris
                 Accords is forcing a radical re-examination of the way
                 electricity is produced, managed, and consumed.
                 Research on sustainable smart electricity markets is
                 facilitating the emergence of sustainable energy
                 systems and a revolution in the efficiency and
                 reliability of electricity consumption, production, and
                 distribution. Traditional electricity grids and markets
                 are being disrupted by a range of forces, including the
                 rise of weather-dependent and distributed renewable
                 sources, growing consumer involvement in managing their
                 power consumption and production, and the
                 electrification of transport. These changes will likely
                 bring about complex and dynamic smart electricity
                 markets that rely on analysis of information to inform
                 stakeholders, and on effective integration of
                 stakeholders' actions. We outline a research agenda on
                 how advances in information-intensive processes are
                 fundamental for facilitating these transformations,
                 describe the roles that such processes will play, and
                 discuss Information Systems research challenges
                 necessary to achieve these goals. These challenges span
                 public policy, privacy, and security; market
                 mechanisms; and data-driven decision support. The
                 diverse challenges we outline also underscore that the
                 diverse IS research perspective is instrumental for
                 addressing the complexity and interdisciplinary nature
                 of this research.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Russo:2018:MMI,
  author =       "Daniel Russo and Paolo Ciancarini and Tommaso
                 Falasconi and Massimo Tomasi",
  title =        "A Meta-Model for Information Systems Quality: a Mixed
                 Study of the Financial Sector",
  journal =      j-TMIS,
  volume =       "9",
  number =       "3",
  pages =        "11:1--11:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3230713",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3230713",
  abstract =     "Information Systems Quality (ISQ) is a critical source
                 of competitive advantages for organizations. In a
                 scenario of increasing competition on digital services,
                 ISQ is a competitive differentiation asset. In this
                 regard, managing, maintaining, and evolving IT
                 infrastructures have become a primary concern of
                 organizations. Thus, a technical perspective on ISQ
                 provides useful guidance to meet current challenges.
                 The financial sector is paradigmatic, since it is a
                 traditional business, with highly complex
                 business-critical legacy systems, facing a tremendous
                 change due to market and regulation drivers. We carried
                 out a Mixed-Methods study, performing a Delphi-like
                 study on the financial sector. We developed a specific
                 research framework to pursue this vertical study. Data
                 were collected in four phases starting with a
                 high-level randomly stratified panel of 13 senior
                 managers and then a target panel of 124 carefully
                 selected and well-informed domain experts. We have
                 identified and dealt with several quality factors; they
                 were discussed in a comprehensive model inspired by the
                 ISO 25010, 42010, and 12207 standards, corresponding to
                 software quality, software architecture, and software
                 process, respectively. Our results suggest that the
                 relationship among quality, architecture, and process
                 is a valuable technical perspective to explain the
                 quality of an information system. Thus, we introduce
                 and illustrate a novel meta-model, named SQuAP
                 (Software Quality, Architecture, Process), which is
                 intended to give a comprehensive picture of ISQ by
                 abstracting and connecting detailed individual ISO
                 models.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zhu:2018:PJF,
  author =       "Chen Zhu and Hengshu Zhu and Hui Xiong and Chao Ma and
                 Fang Xie and Pengliang Ding and Pan Li",
  title =        "Person-Job Fit: Adapting the Right Talent for the
                 Right Job with Joint Representation Learning",
  journal =      j-TMIS,
  volume =       "9",
  number =       "3",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3234465",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234465",
  abstract =     "Person-Job Fit is the process of matching the right
                 talent for the right job by identifying talent
                 competencies that are required for the job. While many
                 qualitative efforts have been made in related fields,
                 it still lacks quantitative ways of measuring talent
                 competencies as well as the job's talent requirements.
                 To this end, in this article, we propose a novel
                 end-to-end data-driven model based on a Convolutional
                 Neural Network (CNN), namely, the Person-Job Fit Neural
                 Network (PJFNN), for matching a talent qualification to
                 the requirements of a job. To be specific, PJFNN is a
                 bipartite neural network that can effectively learn the
                 joint representation of Person-Job fitness from
                 historical job applications. In particular, due to the
                 design of a hierarchical representation structure,
                 PJFNN can not only estimate whether a candidate fits a
                 job but also identify which specific requirement items
                 in the job posting are satisfied by the candidate by
                 measuring the distances between corresponding latent
                 representations. Finally, the extensive experiments on
                 a large-scale real-world dataset clearly validate the
                 performance of PJFNN in terms of Person-Job Fit
                 prediction. Also, we provide effective data
                 visualization to show some job and talent benchmark
                 insights obtained by PJFNN.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Delano:2018:SDT,
  author =       "John D. Delano and Hemant K. Jain and Atish P. Sinha",
  title =        "System Design through the Exploration of Contemporary
                 {Web} Services",
  journal =      j-TMIS,
  volume =       "9",
  number =       "3",
  pages =        "13:1--13:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3273932",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3273932",
  abstract =     "In this article, we develop a Contemporary Web Service
                 (CWS) repository of system designs, which are encoded
                 as metadata of contemporary web services. We examine if
                 this CWS repository serves as an effective design tool
                 for initial CWS design and as an effective support tool
                 for business users and analysts working together on
                 system design. The CWS repository reduces the cognitive
                 load of both the analyst and the business user as they
                 jointly explore the CWS repository of system designs.
                 It supports an evolutionary approach to system design
                 through rapid selection of appropriate CWS metadata. To
                 accomplish that, we introduce several new design
                 characteristics for the CWS repository. The evaluation
                 results demonstrate that the CWS repository is an
                 effective tool for supporting designers during initial
                 service design, as well as for supporting business
                 users and analysts during system design.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lo:2019:PWT,
  author =       "Kar Kei Lo and Michael Chau",
  title =        "A Penny Is Worth a Thousand? {Investigating} the
                 Relationship Between Social Media and Penny Stocks",
  journal =      j-TMIS,
  volume =       "9",
  number =       "4",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309704",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309704",
  abstract =     "Increasingly more investors are seeking information
                 from social media to help make investment decisions.
                 Considering that information on penny stocks is often
                 less reported in traditional media, investors may rely
                 more on social media to obtain such information for
                 investment advice. Although previous research has shown
                 that stock opinions in traditional media is a possible
                 predictor of stock returns, no previous research has
                 considered the effect of the stock opinions in social
                 media on these stocks in terms of future stock
                 performance and the moderation effect of penny stocks.
                 In this research, we studied the relationship between
                 social media and the financial performance of penny
                 stocks. We used the net proportion of positive words in
                 stock articles in social media to help predict the
                 future stock performance for penny stocks. The
                 moderation effect of penny stocks on the net fraction
                 of positive words was found to be significant in short
                 terms, revealing a stronger relationship between social
                 media and stock performance at lower price and market
                 capitalization (MC) levels. Based on the findings, we
                 proposed simple strategies utilizing social media and
                 our measure. The results of our applications will be of
                 interest to individual and institutional investors,
                 shareholders, and regulators.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kratzwald:2019:PQA,
  author =       "Bernhard Kratzwald and Stefan Feuerriegel",
  title =        "Putting Question-Answering Systems into Practice:
                 Transfer Learning for Efficient Domain Customization",
  journal =      j-TMIS,
  volume =       "9",
  number =       "4",
  pages =        "15:1--15:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309706",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309706",
  abstract =     "Traditional information retrieval (such as that
                 offered by web search engines) impedes users with
                 information overload from extensive result pages and
                 the need to manually locate the desired information
                 therein. Conversely, question-answering systems change
                 how humans interact with information systems: users can
                 now ask specific questions and obtain a tailored
                 answer-both conveniently in natural language. Despite
                 obvious benefits, their use is often limited to an
                 academic context, largely because of expensive domain
                 customizations, which means that the performance in
                 domain-specific applications often fails to meet
                 expectations. This article proposes cost-efficient
                 remedies: (i) we leverage metadata through a filtering
                 mechanism, which increases the precision of document
                 retrieval, and (ii) we develop a novel
                 fuse-and-oversample approach for transfer learning to
                 improve the performance of answer extraction. Here,
                 knowledge is inductively transferred from related, yet
                 different, tasks to the domain-specific application,
                 while accounting for potential differences in the
                 sample sizes across both tasks. The resulting
                 performance is demonstrated with actual use cases from
                 a finance company and the film industry, where fewer
                 than 400 question-answer pairs had to be annotated to
                 yield significant performance gains. As a direct
                 implication to management, this presents a promising
                 path to better leveraging of knowledge stored in
                 information systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Yu:2019:EAC,
  author =       "Shuo Yu and Hongyi Zhu and Shan Jiang and Yong Zhang
                 and Chunxiao Xing and Hsinchun Chen",
  title =        "Emoticon Analysis for {Chinese} Social Media and
                 E-commerce: The {AZEmo} System",
  journal =      j-TMIS,
  volume =       "9",
  number =       "4",
  pages =        "16:1--16:??",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309707",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Mar 12 16:04:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309707",
  abstract =     "This article presents a novel system, AZEmo, which
                 extracts and classifies emoticons from the ever-growing
                 critical Chinese social media and E-commerce. An
                 emoticon is a meta-communicative pictorial
                 representation of facial expressions, which helps to
                 describe the sender's emotional state. To complement
                 non-verbal communication, emoticons are frequently used
                 in social media websites. However, limited research has
                 been done to effectively analyze the affects of
                 emoticons in a Chinese context. In this study, we
                 developed an emoticon analysis system to extract
                 emoticons from Chinese text and classify them into one
                 of seven affect categories. The system is based on a
                 kinesics model that divides emoticons into semantic
                 areas (eyes, mouths, etc.), with improvements for
                 adaptation in the Chinese context. Machine-learning
                 methods were developed based on feature vector
                 extraction of emoticons. Empirical tests were conducted
                 to evaluate the effectiveness of the proposed system in
                 extracting and classifying emoticons, based on corpora
                 from a video sharing website and an E-commerce website.
                 Results showed the effectiveness of the system in
                 detecting and extracting emoticons from text and in
                 interpreting the affects conveyed by emoticons.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Hartono:2019:WVD,
  author =       "Edward Hartono and Clyde W. Holsapple",
  title =        "{Website} Visual Design Qualities: a Threefold
                 Framework",
  journal =      j-TMIS,
  volume =       "10",
  number =       "1",
  pages =        "1:1--1:??",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3309708",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:31:35 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309708",
  abstract =     "The present study aims to contribute to the
                 information systems (IS) literature by developing a new
                 theoretical perspective that integrates three
                 dimensions of artifact visual design quality-namely
                 aesthetic, functional, and symbolic dimensions-in the
                 investigation of website visual design qualities that
                 influence visitors' attitudes and behaviors. Results
                 suggest that website aesthetic, functional, and
                 symbolic qualities positively influence intention to
                 use the website and positive word of mouth and that
                 website aesthetic quality positively influences website
                 functional and symbolic qualities. Results also
                 demonstrate that functional and symbolic qualities
                 mediate the relationships between aesthetic quality and
                 intention to use and positive word of mouth.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Xiong:2019:FES,
  author =       "Hu Xiong and Yi Wang and Wenchao Li and Chien-Ming
                 Chen",
  title =        "Flexible, Efficient, and Secure Access Delegation in
                 Cloud Computing",
  journal =      j-TMIS,
  volume =       "10",
  number =       "1",
  pages =        "2:1--2:??",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3318212",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:31:35 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3318212",
  abstract =     "The convenience of the cloud-assisted Internet of
                 Things has led to the need for improved protections for
                 the large volumes of data collected from devices around
                 the world and stored on cloud-based servers. Proxy
                 re-encryption (PRE) has been presented as a suitable
                 mechanism for secure transmission and sharing of files
                 within the cloud. However, existing PRE schemes do not
                 support unidirectional data transformation,
                 fine-grained controls, multiple hops, and
                 identity-based encryption simultaneously. To solve
                 these problems, we propose a unidirectional multi-hop
                 identity based-conditional PRE scheme that meets all of
                 the above requirements. Our proposal has the additional
                 benefits of a constant ciphertext size,
                 non-interactivity, and collusion resistance. We also
                 prove that our scheme is secure against adaptive
                 identity chosen-ciphertext attacks in the standard
                 model.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Mohammadi:2019:SAB,
  author =       "Majid Mohammadi and Wout Hofman and Yao-Hua Tan",
  title =        "Simulated Annealing-based Ontology Matching",
  journal =      j-TMIS,
  volume =       "10",
  number =       "1",
  pages =        "3:1--3:??",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3314948",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:31:35 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3314948",
  abstract =     "Ontology alignment is a fundamental task to reconcile
                 the heterogeneity among various information systems
                 using distinct information sources. The evolutionary
                 algorithms (EAs) have been already considered as the
                 primary strategy to develop an ontology alignment
                 system. However, such systems have two significant
                 drawbacks: they either need a ground truth that is
                 often unavailable, or they utilize the population-based
                 EAs in a way that they require massive computation and
                 memory. This article presents a new ontology alignment
                 system, called SANOM, which uses the well-known
                 simulated annealing as the principal technique to find
                 the mappings between two given ontologies while no
                 ground truth is available. In contrast to
                 population-based EAs, the simulated annealing need not
                 generate populations, which makes it significantly
                 swift and memory-efficient for the ontology alignment
                 problem. This article models the ontology alignment
                 problem as optimizing the fitness of a state whose
                 optimum is obtained by using the simulated annealing. A
                 complex fitness function is developed that takes
                 advantage of various similarity metrics including
                 string, linguistic, and structural similarities. A
                 randomized warm initialization is specially tailored
                 for the simulated annealing to expedite its
                 convergence. The experiments illustrate that SANOM is
                 competitive with the state-of-the-art and is
                 significantly superior to other EA-based systems.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Emami:2019:GBA,
  author =       "Hojjat Emami",
  title =        "A Graph-based Approach to Person Name Disambiguation
                 in {Web}",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3314949",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3314949",
  abstract =     "This article presents a name disambiguation approach
                 to resolve ambiguities between person names and group
                 web pages according to the individuals they refer to.
                 The proposed approach exploits two important sources of
                 entity-centric semantic information extracted from web
                 pages, including personal attributes and social
                 relationships. It takes as input the web pages that are
                 results for a person name search. The web pages are
                 analyzed to extract personal attributes and social
                 relationships. The personal attributes and social
                 relationships are mapped into an undirected weighted
                 graph, called attribute-relationship graph. A
                 graph-based clustering algorithm is proposed to group
                 the nodes representing the web pages, each of which
                 refers to a person entity. The outcome is a set of
                 clusters such that the web pages within each cluster
                 refer to the same person. We show the effectiveness of
                 our approach by evaluating it on large-scale datasets
                 WePS-1, WePS-2, and WePS-3. Experimental results are
                 encouraging and show that the proposed method clearly
                 outperforms several baseline methods and also its
                 counterparts.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jiang:2019:MAI,
  author =       "Jian-Min Jiang and Zhong Hong and Yangyang Chen",
  title =        "Modeling and Analyzing Incremental Natures of
                 Developing Software",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "5:1--5:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3333535",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3333535",
  abstract =     "The basic premise of iterative and evolutionary
                 project management is that a project is divided into
                 early, frequent, and short duration delivery steps.
                 Each step attempts to deliver some real value to
                 stakeholders. The increment size and iteration length
                 usually depend on profitability, finance, deadline, and
                 so on, rather than the functionality of a developing
                 system. It is difficult to guarantee the correctness in
                 every iteration step. In this article, we propose a
                 method of ensuring the correctness of iterative design
                 in terms of deadlock-freedom of the behavior of
                 software. The method first obtains the correct
                 (deadlock-free) atomic subsystems of a system using a
                 decomposition approach. In the iterative development
                 process, the method then requires that one atomic
                 subsystem or the composition of multiple atomic
                 subsystems should be regarded as one increment. Every
                 increment is naturally correct and can be completely
                 independently developed, independently deployed, and
                 independently maintained. The currently released system
                 in each iteration step is naturally guaranteed to be
                 correct. It is not necessary for developers to consider
                 the composition of the increment and the previously
                 released system may cause flaws and errors. We also
                 discuss the approach for ensuring correctness when
                 design modifications are made in an iteration step.
                 Finally, we explore the automatic decomposition of a
                 system into multiple atomic subsystems and present the
                 corresponding algorithm. A case demonstrates these
                 results.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jain:2019:ISS,
  author =       "Hemant Jain and T. S. Raghu and Victoria Yoon and Wei
                 Thoo Yue",
  title =        "Introduction to Special Section Based on Papers
                 Presented at the {Workshop on Information Technology
                 and Systems, 2017}",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "6:1--6:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3342557",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3342557",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6e",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Sutterer:2019:TBP,
  author =       "Paul Sutterer and Stefan Waldherr and Martin Bichler",
  title =        "Are Truthful Bidders Paying too Much? {Efficiency} and
                 Revenue in Display Ad Auctions",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "6:1--6:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3325523",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3325523",
  abstract =     "Display ad auctions have become the predominant means
                 to allocate user impressions on a website to
                 advertisers. These auctions are conducted in
                 milliseconds online, whenever a user visits a website.
                 The impressions are typically priced via a simple
                 second-price rule. For single-item auctions, this
                 Vickrey payment rule is known to be
                 incentive-compatible. However, it is unclear whether
                 bidders should still bid truthful in an online auction
                 where impressions (or items) arrive dynamically over
                 time and their valuations are not separable, as is the
                 case with campaign targets or budgets. The allocation
                 process might not maximize welfare and the payments can
                 differ substantially from those paid in an offline
                 auction with a Vickrey-Clarke-Groves (VCG) payment rule
                 or also competitive equilibrium prices. We study the
                 properties of the offline problem and model it as a
                 mathematical program. In numerical experiments, we find
                 that the welfare achieved in the online auction process
                 with truthful bidders is high compared to the
                 theoretical worst-case efficiency, but that the bidders
                 pay significantly more on average compared to what they
                 would need to pay in a corresponding offline auction in
                 thin markets with up to four bidders. However,
                 incentives for bid shading in these second-price
                 auctions decrease quickly with additional competition
                 and bidders risk losing.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Han:2019:CTR,
  author =       "Xu Han and Niam Yaraghi and Ram Gopal",
  title =        "Catching Them Red-Handed: Optimizing the Nursing
                 Homes' Rating System",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "7:1--7:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3325522",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3325522",
  abstract =     "The Centers for Medicare 8 Medicaid Services (CMS)
                 launched its nursing home rating system in 2008, which
                 has been widely used among patients, doctors, and
                 insurance companies since then. The system rates
                 nursing homes based on a combination of CMS's
                 inspection results and nursing homes' self-reported
                 measures. Prior research has shown that the rating
                 system is subject to inflation in the self-reporting
                 procedure, leading to biased overall ratings. Given the
                 limited resources CMS has, it is important to optimize
                 the inspection process and develop an effective audit
                 process to detect and deter inflation. We first examine
                 if the domain that CMS currently inspects is the best
                 choice in terms of minimizing the population of nursing
                 homes that can inflate and minimizing the difficulty of
                 detecting such inflators. To do this, we formulate the
                 problem mathematically and test the model by using
                 publicly available CMS data on nursing home ratings. We
                 show that CMS's current choice of inspection domain is
                 not optimal if it intends to minimize the number of
                 nursing homes that can inflate their reports, and CMS
                 will be better off if it inspects the staffing domain
                 instead. We also show that CMS's current choice of
                 inspection domain is only optimal had there been an
                 audit system in place to complement it. We then design
                 an audit system for CMS which will be coupled with its
                 current inspection strategy to either minimize the
                 initial budget required to conduct the audits or to
                 maximize the efficiency of the audit process. To design
                 the audit system, we consider nursing homes' reactions
                 to different audit policies, and conduct a detailed
                 simulation study on the optimal audit parameter
                 settings. Our result suggests that CMS should use a
                 moderate audit policy in order to carefully balance the
                 tradeoff between audit net budget and audit
                 efficiency.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kartal:2019:DPV,
  author =       "Hasan B. Kartal and Xiaoping Liu and Xiao-Bai Li",
  title =        "Differential Privacy for the Vast Majority",
  journal =      j-TMIS,
  volume =       "10",
  number =       "2",
  pages =        "8:1--8:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3329717",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:32:09 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329717",
  abstract =     "Differential privacy has become one of the widely used
                 mechanisms for protecting sensitive information in
                 databases and information systems. Although
                 differential privacy provides a clear measure of
                 privacy guarantee, it implicitly assumes that each
                 individual corresponds to a single record in the result
                 of a database query. This assumption may not hold in
                 many database query applications. When an individual
                 has multiple records, strict implementation of
                 differential privacy may cause significant information
                 loss. In this study, we extend the differential privacy
                 principle to situations where multiple records in a
                 database are associated with the same individual. We
                 propose a new privacy principle that integrates
                 differential privacy with the Pareto principle in
                 analyzing privacy risk and data utility. When applied
                 to the situations with multiple records per person, the
                 proposed approach can significantly reduce the
                 information loss in the released query results with a
                 relatively small relaxation in the differential privacy
                 guarantee. The effectiveness of the proposed approach
                 is evaluated using three real-world databases.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Pal:2019:REC,
  author =       "Ranjan Pal and Leana Golubchik and Konstantions
                 Psounis and Tathagata Bandyopadhyay",
  title =        "On Robust Estimates of Correlated Risk in
                 Cyber-Insured {IT} Firms: a First Look at Optimal
                 {AI}-Based Estimates under ``Small'' Data",
  journal =      j-TMIS,
  volume =       "10",
  number =       "3",
  pages =        "9:1--9:??",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3351158",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:28:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3351158",
  abstract =     "In this article, we comment on the drawbacks of the
                 existing AI-based Bayesian network (BN)
                 cyber-vulnerability analysis (C-VA) model proposed in
                 Mukhopadhyay et al. (2013) to assess cyber-risk in IT
                 firms, where this quantity is usually a joint
                 distribution of multiple risk (random) variables (e.g.,
                 quality of antivirus, frequency of monitoring, etc.)
                 coming from heterogeneous distribution families. As a
                 major modeling drawback, Mukhopadhyay et al. (2013)
                 assume that any pair of random variables in the BN are
                 linearly correlated with each other. This simplistic
                 assumption might not always hold true for general IT
                 organizational environments. Thus, the use of the C-VA
                 model in general will result in loose estimates of
                 correlated IT risk and will subsequently affect
                 cyber-insurance companies in framing profitable
                 coverage policies for IT organizations. To this end, we
                 propose methods to (1) find a closed-form expression
                 for the maximal correlation arising between pairs of
                 discrete random variables, whose value finds importance
                 in getting robust estimates of copula-induced
                 computations of organizational cyber-risk, and (2)
                 arrive at a computationally effective mechanism to
                 compute nonlinear correlations among pairs of discrete
                 random variables in the correlation matrix of the CBBN
                 model (Mukhopadhyay et al. 2013). We also prove that an
                 empirical computation of MC using our method converges
                 rapidly, that is, exponentially fast, to the true
                 correlation value in the number of samples. Our
                 proposed method contributes to a tighter estimate of IT
                 cyber-risk under environments of low-risk data
                 availability and will enable insurers to better assess
                 organizational risks and subsequently underwrite
                 profitable cyber-insurance policies.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Zo:2019:SOA,
  author =       "Hangjung Zo and Derek L. Nazareth and Hemant K. Jain",
  title =        "Service-oriented Application Composition with
                 Evolutionary Heuristics and Multiple Criteria",
  journal =      j-TMIS,
  volume =       "10",
  number =       "3",
  pages =        "10:1--10:??",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3354288",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:28:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3354288",
  abstract =     "The need to create and deploy business application
                 systems rapidly has sparked interest in using web
                 services to compose them. When creating
                 mission-critical business applications through web
                 service compositions, in addition to ensuring that
                 functional requirements are met, designers need to
                 consider the end-to-end reliability, security,
                 performance, and overall cost of the application. As
                 the number of available coarse-grain business services
                 grows, the problem of selecting appropriate services
                 quickly becomes combinatorially explosive for
                 realistic-sized business applications. This article
                 develops a business-process-driven approach for
                 composing service-oriented applications. We use a
                 combination of weights to explore the entire QoS
                 criteria landscape through the use of a multi-criteria
                 genetic algorithm (GA) to identify a Pareto-optimal
                 multidimensional frontier that permits managers to
                 trade off conflicting objectives when selecting a set
                 of services. We illustrate the effectiveness of the
                 approach by applying it to a real-world drop-ship
                 business application and compare its performance to
                 another GA-based approach for service composition.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Lai:2019:TVK,
  author =       "Jianwei Lai and Dongsong Zhang and Sen Wang and Isil
                 Doga Yakut Kilic and Lina Zhou",
  title =        "{ThumbStroke}: a Virtual Keyboard in Support of
                 Sight-Free and One-Handed Text Entry on Touchscreen
                 Mobile Devices",
  journal =      j-TMIS,
  volume =       "10",
  number =       "3",
  pages =        "11:1--11:??",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3343858",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:28:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3343858",
  abstract =     "The QWERTY keyboard on mobile devices usually requires
                 users' full visual attention and both hands, which is
                 not always possible. We propose a thumb-stroke-based
                 keyboard, ThumbStroke, to support both sight-free and
                 one-handed text entry. Text entry via ThumbStroke
                 completely relies on the directions of thumb strokes at
                 any place on the screen of a mobile device. It does not
                 require physical press on any specific keys, thus
                 eliminating the need for visual attention and reducing
                 errors due to tiny key size, fat thumbs, limited thumb
                 reachability, and visual occlusion. We empirically
                 evaluated ThumbStroke through a 20-session longitudinal
                 controlled lab experiment. ThumbStroke shows advantages
                 in typing accuracy and user perceptions in comparison
                 to the Escape and QWERTY keyboards and results in
                 faster typing speed than QWERTY in sight-free and
                 one-handed text entry. This study provides novel
                 research contributions to mobile HCI, advancing the
                 design of soft keyboards for one-handed interaction
                 with mobile devices and mobile accessibility.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Kang:2019:HAO,
  author =       "Yin Kang and Lina Zhou",
  title =        "Helpfulness Assessment of Online Reviews: The Role of
                 Semantic Hierarchy of Product Features",
  journal =      j-TMIS,
  volume =       "10",
  number =       "3",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3365538",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Nov 29 07:28:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3365538",
  abstract =     "Effective use of online consumer reviews is hampered
                 by uncertainty about their helpfulness. Despite a
                 growing body of knowledge on indicators of review
                 helpfulness, previous studies have overlooked rich
                 semantic information embedded in review content.
                 Following design science principles, this study
                 introduces a semantic hierarchy of product features by
                 probing the review text. Using the hierarchical
                 framework as a guide, we develop a research model of
                 review helpfulness assessment. In the model, we propose
                 and conceptualize three new factors-breadth, depth, and
                 redundancy, by building on and/or extending product
                 uncertainty, information quality, signaling, and
                 encoding variability theories. The model-testing
                 results lend strong support to the proposed effects of
                 those factors on review helpfulness. They also reveal
                 interesting differences in the effects of redundancy
                 and readability between different types of products.
                 This study embodies knowledge moments of multiple
                 genres of inquiry in design science research, which
                 have multifold research and practical implications.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Park:2019:ECR,
  author =       "Jiyong Park and Daegon Cho and Jae Kyu Lee and
                 Byungtae Lee",
  title =        "The Economics of Cybercrime: The Role of Broadband and
                 Socioeconomic Status",
  journal =      j-TMIS,
  volume =       "10",
  number =       "4",
  pages =        "13:1--13:??",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3351159",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Dec 20 07:16:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3351159",
  abstract =     "Under what conditions is the Internet more likely to
                 be used maliciously for criminal activity? This study
                 examines the conditions under which the Internet is
                 associated with cybercriminal offenses. Using
                 comprehensive state-level data in the United States
                 during 2004--2010, our findings show that there is no
                 clear empirical evidence that the Internet penetration
                 rate is related to the number of Internet crime
                 perpetrators; however, cybercriminal activities are
                 contingent upon socioeconomic factors and connection
                 speed. Specifically, a higher income, more education, a
                 lower poverty rate, and a higher inequality are likely
                 to make the Internet penetration be more positively
                 related with cybercrime perpetrators, which are indeed
                 different from the conditions of terrestrial crime in
                 the real world. In addition, as opposed to narrowband,
                 the broadband connections are significantly and
                 positively associated with the number of Internet crime
                 perpetrators, and it amplifies the aforementioned
                 moderating effects of socioeconomic status on Internet
                 crime offenses. Taken together, cybercrime requires
                 more than just a skilled perpetrator, and it requires
                 an infrastructure to facilitate profiteering from the
                 act.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chung:2019:IMD,
  author =       "Wingyan Chung and Bingbing Rao and Liqiang Wang",
  title =        "Interaction Models for Detecting Nodal Activities in
                 Temporal Social Media Networks",
  journal =      j-TMIS,
  volume =       "10",
  number =       "4",
  pages =        "14:1--14:??",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3365537",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Dec 20 07:16:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3365537",
  abstract =     "Detecting nodal activities in dynamic social networks
                 has strategic importance in many applications, such as
                 online marketing campaigns and homeland security
                 surveillance. How peer-to-peer exchanges in social
                 media can facilitate nodal activity detection is not
                 well explored. Existing models assume network nodes to
                 be static in time and do not adequately consider
                 features from social theories. This research developed
                 and validated two theory-based models, Random
                 Interaction Model (RIM) and Preferential Interaction
                 Model (PIM), to characterize temporal nodal activities
                 in social media networks of human agents. The models
                 capture the network characteristics of randomness and
                 preferential interaction due to community size, human
                 bias, declining connection cost, and rising
                 reachability. The models were compared against three
                 benchmark models (abbreviated as EAM, TAM, and DBMM)
                 using a social media community consisting of 790,462
                 users who posted over 3,286,473 tweets and formed more
                 than 3,055,797 links during 2013-2015. The experimental
                 results show that both RIM and PIM outperformed EAM and
                 TAM significantly in accuracy across different dates
                 and time windows. Both PIM and RIM scored significantly
                 smaller errors than DBMM did. Structural properties of
                 social networks were found to provide a simple and yet
                 accurate approach to predicting model performances.
                 These results indicate the models' strong capability of
                 accounting for user interactions in real-world social
                 media networks and temporal activity detection. The
                 research should provide new approaches for temporal
                 network activity detection, develop relevant new
                 measures, and report new findings from large social
                 media datasets.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Chen:2019:ESC,
  author =       "Jiawei Chen and Hongyan Liu and Yinghui (Catherine)
                 Yang and Jun He",
  title =        "Effective Selection of a Compact and High-Quality
                 Review Set with Information Preservation",
  journal =      j-TMIS,
  volume =       "10",
  number =       "4",
  pages =        "15:1--15:??",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3369395",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Dec 20 07:16:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3369395",
  abstract =     "Consumers increasingly make informed buying decisions
                 based on reading online reviews for products and
                 services. Due to the large volume of available online
                 reviews, consumers hardly have the time and patience to
                 read them all. This article aims to select a compact
                 set of high-quality reviews that can cover a specific
                 set of product features and related consumer
                 sentiments. Selecting such a subset of reviews can
                 significantly save the time spent on reading reviews
                 while preserving the information needed. A unique
                 review selection problem is defined and modeled as a
                 bi-objective combinatorial optimization problem, which
                 is then transformed into a minimum-cost set cover
                 problem that is NP-complete. Several approximation
                 algorithms are then designed, which can sustain
                 performance guarantees in polynomial time. Our
                 effective selection algorithms can also be upgraded to
                 handle dynamic situations. Comprehensive experiments
                 conducted on twelve real datasets demonstrate that the
                 proposed algorithms significantly outperform benchmark
                 methods by generating a more compact review set with
                 much lower computational cost. The number of reviews
                 selected is much smaller compared to the quantity of
                 all available reviews, and the selection efficiency is
                 deeply increased by accelerating strategies, making it
                 very practical to adopt the methods in real-world
                 online applications.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Jannach:2019:MBV,
  author =       "Dietmar Jannach and Michael Jugovac",
  title =        "Measuring the Business Value of Recommender Systems",
  journal =      j-TMIS,
  volume =       "10",
  number =       "4",
  pages =        "16:1--16:??",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3370082",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Dec 20 07:16:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3370082",
  abstract =     "Recommender Systems are nowadays successfully used by
                 all major web sites-from e-commerce to social media-to
                 filter content and make suggestions in a personalized
                 way. Academic research largely focuses on the value of
                 recommenders for consumers, e.g., in terms of reduced
                 information overload. To what extent and in which ways
                 recommender systems create business value is, however,
                 much less clear, and the literature on the topic is
                 scattered. In this research commentary, we review
                 existing publications on field tests of recommender
                 systems and report which business-related performance
                 measures were used in such real-world deployments. We
                 summarize common challenges of measuring the business
                 value in practice and critically discuss the value of
                 algorithmic improvements and offline experiments as
                 commonly done in academic environments. Overall, our
                 review indicates that various open questions remain
                 both regarding the realistic quantification of the
                 business effects of recommenders and the performance
                 assessment of recommendation algorithms in academia.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1320",
}

@Article{Li:2020:IIE,
  author =       "Hongfei Li and Ramesh Shankar and Jan Stallaert",
  title =        "Invested or Indebted: Ex-ante and Ex-post Reciprocity
                 in Online Knowledge Sharing Communities",
  journal =      j-TMIS,
  volume =       "11",
  number =       "1",
  pages =        "1:1--1:26",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3371388",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 21 08:19:23 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3371388",
  abstract =     "Online communities that curate knowledge critically
                 depend on high-quality contributions from anonymous
                 expert users. Understanding users' motivation to
                 contribute knowledge helps practitioners design such
                 websites for optimal user contribution and user
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Rezvani:2020:RRS,
  author =       "Mohsen Rezvani and Mojtaba Rezvani",
  title =        "A Randomized Reputation System in the Presence of
                 Unfair Ratings",
  journal =      j-TMIS,
  volume =       "11",
  number =       "1",
  pages =        "2:1--2:16",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3384472",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 21 08:19:23 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3384472",
  abstract =     "With the increasing popularity of online shopping
                 markets, a significant number of consumers rely on
                 these venues to meet their demands while choosing
                 different products based on the ratings provided by
                 others. Simultaneously, consumers feel confident
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ni:2020:MLD,
  author =       "Li Ni and Wenjian Luo and Nannan Lu and Wenjie Zhu",
  title =        "Mining the Local Dependency Itemset in a Products
                 Network",
  journal =      j-TMIS,
  volume =       "11",
  number =       "1",
  pages =        "3:1--3:31",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3384473",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 21 08:19:23 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3384473",
  abstract =     "Many studies have been conducted on market basket
                 analysis such as association rules and dependent
                 patterns. These studies mainly focus on mining all
                 significant patterns or patterns directly associated
                 with a given item in a dataset. The problem that
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pierazzi:2020:DDC,
  author =       "Fabio Pierazzi and Ghita Mezzour and Qian Han and
                 Michele Colajanni and V. S. Subrahmanian",
  title =        "A Data-driven Characterization of Modern {Android}
                 Spyware",
  journal =      j-TMIS,
  volume =       "11",
  number =       "1",
  pages =        "4:1--4:38",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3382158",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Apr 21 08:19:23 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3382158",
  abstract =     "According to Nokia's 2017 Threat Intelligence Report,
                 68.5\% of malware targets the Android platform; Windows
                 is second with 28\%, followed by iOS and other
                 platforms with 3.5\%. The Android spyware family UAPUSH
                 was responsible for the most infections, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pal:2020:WCB,
  author =       "Ranjan Pal and Konstantinos Psounis and Jon Crowcroft
                 and Frank Kelly and Pan Hui and Sasu Tarkoma and
                 Abhishek Kumar and John Kelly and Aritra Chatterjee and
                 Leana Golubchik and Nishanth Sastry and Bodhibrata
                 Nag",
  title =        "When Are Cyber Blackouts in Modern Service Networks
                 Likely?: a Network Oblivious Theory on Cyber
                 (Re)Insurance Feasibility",
  journal =      j-TMIS,
  volume =       "11",
  number =       "2",
  pages =        "5:1--5:38",
  month =        jul,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3386159",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 10 09:12:15 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386159",
  abstract =     "Service liability interconnections among globally
                 networked IT- and IoT-driven service organizations
                 create potential channels for cascading service
                 disruptions worth billions of dollars, due to modern
                 cyber-crimes such as DDoS, APT, and ransomware
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ermakova:2020:SPR,
  author =       "Tatiana Ermakova and Benjamin Fabian and Marta
                 Kornacka and Scott Thiebes and Ali Sunyaev",
  title =        "Security and Privacy Requirements for Cloud Computing
                 in Healthcare: Elicitation and Prioritization from a
                 Patient Perspective",
  journal =      j-TMIS,
  volume =       "11",
  number =       "2",
  pages =        "6:1--6:29",
  month =        jul,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3386160",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 10 09:12:15 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386160",
  abstract =     "Cloud computing promises essential improvements in
                 healthcare delivery performance. However, its wide
                 adoption in healthcare is yet to be seen, one main
                 reason being patients' concerns for security and
                 privacy of their sensitive medical records. These
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lu:2020:AAW,
  author =       "Haibing Lu and Xi Chen and Junmin Shi and Jaideep
                 Vaidya and Vijayalakshmi Atluri and Yuan Hong and Wei
                 Huang",
  title =        "Algorithms and Applications to Weighted Rank-one
                 Binary Matrix Factorization",
  journal =      j-TMIS,
  volume =       "11",
  number =       "2",
  pages =        "7:1--7:33",
  month =        jul,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3386599",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 10 09:12:15 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386599",
  abstract =     "Many applications use data that are better represented
                 in the binary matrix form, such as click-stream data,
                 market basket data, document-term data, user-permission
                 data in access control, and others. Matrix
                 factorization methods have been widely used \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Unger:2020:CAR,
  author =       "Moshe Unger and Alexander Tuzhilin and Amit Livne",
  title =        "Context-Aware Recommendations Based on Deep Learning
                 Frameworks",
  journal =      j-TMIS,
  volume =       "11",
  number =       "2",
  pages =        "8:1--8:15",
  month =        jul,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3386243",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jul 10 09:12:15 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3386243",
  abstract =     "In this article, we suggest a novel deep learning
                 recommendation framework that incorporates contextual
                 information into neural collaborative filtering
                 recommendation approaches. Since context is often
                 represented by dynamic and high-dimensional feature
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Dutta:2020:IWS,
  author =       "Kaushik Dutta and Xiao Fang and Zhengrui (Jeffrey)
                 Jiang",
  title =        "Introduction to {WITS 2018} Special Issue in {TMIS}",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "9:1--9:2",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3404392",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3404392",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Gopal:2020:RIU,
  author =       "Ram D. Gopal and Hooman Hidaji and Sule Nur Kutlu and
                 Raymond A. Patterson and Erik Rolland and Dmitry
                 Zhdanov",
  title =        "Real or Not?: Identifying Untrustworthy News Websites
                 Using Third-party Partnerships",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "10:1--10:20",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3382188",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3382188",
  abstract =     "Untrustworthy content such as fake news and clickbait
                 have become a pervasive problem on the Internet,
                 causing significant socio-political problems around the
                 world. Identifying untrustworthy content is a crucial
                 step in countering them. The current \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Tan:2020:CPC,
  author =       "Liling Tan and Maggie Yundi Li and Stanley Kok",
  title =        "E-Commerce Product Categorization via Machine
                 Translation",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "11:1--11:14",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3382189",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3382189",
  abstract =     "E-commerce platforms categorize their products into a
                 multi-level taxonomy tree with thousands of leaf
                 categories. Conventional methods for product
                 categorization are typically based on machine learning
                 classification algorithms. These algorithms take
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wang:2020:PUP,
  author =       "Xiangyu Wang and Kang Zhao and Xun Zhou and Nick
                 Street",
  title =        "Predicting User Posting Activities in Online Health
                 Communities with Deep Learning",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "12:1--12:15",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3383780",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3383780",
  abstract =     "Online health communities (OHCs) represent a great
                 source of social support for patients and their
                 caregivers. Better predictions of user activities in
                 OHCs can help improve user engagement and retention,
                 which are important to manage and sustain a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Tao:2020:WSW,
  author =       "Jie Tao and Lina Zhou",
  title =        "A Weakly Supervised {WordNet-Guided} Deep Learning
                 Approach to Extracting Aspect Terms from Online
                 Reviews",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "13:1--13:22",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3399630",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3399630",
  abstract =     "The unstructured nature of online reviews makes it
                 inefficient and inconvenient for prospective consumers
                 to research and use in support of purchase decision
                 making. The aspects of products provide a fine-grained
                 meaningful perspective for understanding \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Gan:2020:UDM,
  author =       "Wensheng Gan and Jerry Chun-Wei Lin and Han-Chieh Chao
                 and Philippe Fournier-Viger and Xuan Wang and Philip S.
                 Yu",
  title =        "Utility-Driven Mining of Trend Information for
                 Intelligent System",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "14:1--14:28",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3391251",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3391251",
  abstract =     "Useful knowledge, embedded in a database, is likely to
                 change over time. Identifying the recent changes in
                 temporal data can provide valuable up-to-date
                 information to decision makers. Nevertheless,
                 techniques for mining high-utility patterns (HUPs)
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Sreenu:2020:CPP,
  author =       "Nenavath Sreenu",
  title =        "Cashless Payment Policy and Its Effects on Economic
                 Growth of {India}: an Exploratory Study",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "15:1--15:10",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3391402",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3391402",
  abstract =     "The present world has moved from cash transactions to
                 cashless transactions. This article examines the impact
                 of implementation of a cashless payment policy on
                 economic development and gradual transition to a
                 cashless economy in India. For this study, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Belhadi:2020:TOD,
  author =       "Asma Belhadi and Youcef Djenouri and Jerry Chun-Wei
                 Lin and Alberto Cano",
  title =        "Trajectory Outlier Detection: Algorithms, Taxonomies,
                 Evaluation, and Open Challenges",
  journal =      j-TMIS,
  volume =       "11",
  number =       "3",
  pages =        "16:1--16:29",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3399631",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 19 07:07:56 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3399631",
  abstract =     "Detecting abnormal trajectories is an important task
                 in research and industrial applications, which has
                 attracted considerable attention in recent decades.
                 This work studies the existing trajectory outlier
                 detection algorithms in different industrial \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Samtani:2020:TAI,
  author =       "Sagar Samtani and Murat Kantarcioglu and Hsinchun
                 Chen",
  title =        "Trailblazing the Artificial Intelligence for
                 Cybersecurity Discipline: a Multi-Disciplinary Research
                 Roadmap",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "17:1--17:19",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3430360",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3430360",
  abstract =     "Cybersecurity has rapidly emerged as a grand societal
                 challenge of the 21st century. Innovative solutions to
                 proactively tackle emerging cybersecurity challenges
                 are essential to ensuring a safe and secure society.
                 Artificial Intelligence (AI) has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Mudgerikar:2020:EBI,
  author =       "Anand Mudgerikar and Puneet Sharma and Elisa Bertino",
  title =        "Edge-Based Intrusion Detection for {IoT} devices",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "18:1--18:21",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3382159",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3382159",
  abstract =     "As the Internet of Things (IoT) is estimated to grow
                 to 25 billion by 2021, there is a need for an effective
                 and efficient Intrusion Detection System (IDS) for IoT
                 devices. Traditional network-based IDSs are unable to
                 efficiently detect IoT malware and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Husak:2020:PCS,
  author =       "Martin Hus{\'a}k and Tom{\'a}s Bajtos and Jaroslav
                 Kaspar and Elias Bou-Harb and Pavel Celeda",
  title =        "Predictive Cyber Situational Awareness and
                 Personalized Blacklisting: a Sequential Rule Mining
                 Approach",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "19:1--19:16",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3386250",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3386250",
  abstract =     "Cybersecurity adopts data mining for its ability to
                 extract concealed and indistinct patterns in the data,
                 such as for the needs of alert correlation. Inferring
                 common attack patterns and rules from the alerts helps
                 in understanding the threat landscape \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Alagheband:2020:TBG,
  author =       "Mahdi R. Alagheband and Atefeh Mashatan and Morteza
                 Zihayat",
  title =        "Time-based Gap Analysis of Cybersecurity Trends in
                 Academic and Digital Media",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "20:1--20:20",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3389684",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3389684",
  abstract =     "This study analyzes cybersecurity trends and proposes
                 a conceptual framework to identify cybersecurity topics
                 of social interest and emerging topics that need to be
                 addressed by researchers in the field. The insights
                 drawn from this framework allow for \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Mangino:2020:ISI,
  author =       "Antonio Mangino and Morteza Safaei Pour and Elias
                 Bou-Harb",
  title =        "{Internet}-scale Insecurity of Consumer {Internet of
                 Things}: an Empirical Measurements Perspective",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "21:1--21:24",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3394504",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3394504",
  abstract =     "The number of Internet-of-Things (IoT) devices
                 actively communicating across the Internet is
                 continually increasing, as these devices are deployed
                 across a variety of sectors, constantly transferring
                 private data across the Internet. Due to the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Sweet:2020:VVC,
  author =       "Christopher Sweet and Stephen Moskal and Shanchieh Jay
                 Yang",
  title =        "On the Variety and Veracity of Cyber Intrusion Alerts
                 Synthesized by Generative Adversarial Networks",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "22:1--22:21",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3394503",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3394503",
  abstract =     "Many cyber attack actions can be observed, but the
                 observables often exhibit intricate feature
                 dependencies, non-homogeneity, and potentially rare yet
                 critical samples. This work tests the ability to learn,
                 model, and synthesize cyber intrusion alerts \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Mehrotra:2020:PPD,
  author =       "Sharad Mehrotra and Shantanu Sharma and Jeffrey D.
                 Ullman and Dhrubajyoti Ghosh and Peeyush Gupta and
                 Anurag Mishra",
  title =        "{PANDA}: Partitioned Data Security on Outsourced
                 Sensitive and Non-sensitive Data",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "23:1--23:41",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3397521",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397521",
  abstract =     "Despite extensive research on cryptography, secure and
                 efficient query processing over outsourced data remains
                 an open challenge. This article continues along with
                 the emerging trend in secure data processing that
                 recognizes that the entire dataset may \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Shao:2020:EEA,
  author =       "Sicong Shao and Cihan Tunc and Amany Al-Shawi and
                 Salim Hariri",
  title =        "An Ensemble of Ensembles Approach to Author
                 Attribution for {Internet} Relay Chat Forensics",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "24:1--24:25",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3409455",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3409455",
  abstract =     "With the advances in Internet technologies and
                 services, social media has been gained extreme
                 popularity, especially because these technologies
                 provide potential anonymity, which in turn harbors
                 hacker discussion forums, underground markets, dark
                 web, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Kesan:2020:ACI,
  author =       "Jay P. Kesan and Linfeng Zhang",
  title =        "Analysis of Cyber Incident Categories Based on
                 Losses",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "25:1--25:28",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3418288",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3418288",
  abstract =     "The fact that ``cyber risk'' is indeed a collective
                 term for various distinct risks creates great
                 difficulty in communications. For example,
                 policyholders of ``cyber insurance'' contracts often
                 have a limited or inaccurate understanding about the
                 coverage \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Sainani:2020:IRS,
  author =       "Henanksha Sainani and Josephine M. Namayanja and
                 Guneeti Sharma and Vasundhara Misal and Vandana P.
                 Janeja",
  title =        "{IP} Reputation Scoring with Geo-Contextual Feature
                 Augmentation",
  journal =      j-TMIS,
  volume =       "11",
  number =       "4",
  pages =        "26:1--26:29",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3419373",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:57 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419373",
  abstract =     "The focus of this article is to present an effective
                 anomaly detection model for an encrypted network
                 session by developing a novel IP reputation scoring
                 model that labels the incoming session IP address based
                 on the most similar IP addresses in terms \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Samtani:2021:MDP,
  author =       "Sagar Samtani and Murat Kantarcioglu and Hsinchun
                 Chen",
  title =        "A Multi-Disciplinary Perspective for Conducting
                 Artificial Intelligence-enabled Privacy Analytics:
                 Connecting Data, Algorithms, and Systems",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "1:1--1:18",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3447507",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447507",
  abstract =     "Events such as Facebook-Cambridge Analytica scandal
                 and data aggregation efforts by technology providers
                 have illustrated how fragile modern society is to
                 privacy violations. Internationally recognized entities
                 such as the National Science Foundation \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zaeem:2021:EGP,
  author =       "Razieh Nokhbeh Zaeem and K. Suzanne Barber",
  title =        "The Effect of the {GDPR} on Privacy Policies: Recent
                 Progress and Future Promise",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "2:1--2:20",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3389685",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3389685",
  abstract =     "The General Data Protection Regulation (GDPR) is
                 considered by some to be the most important change in
                 data privacy regulation in 20 years. Effective May
                 2018, the European Union GDPR privacy law applies to
                 any organization that collects and processes \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Sudhakar:2021:DLM,
  author =       "Tanuja Sudhakar and Marina Gavrilova",
  title =        "Deep Learning for Multi-instance Biometric Privacy",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "3:1--3:23",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3389683",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3389683",
  abstract =     "The fundamental goal of a revocable biometric system
                 is to defend a user's biometrics from being
                 compromised. This research explores the application of
                 deep learning or Convolutional Neural Networks to
                 multi-instance biometrics. Modality features are
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Kul:2021:ACI,
  author =       "G{\"o}khan Kul and Shambhu Upadhyaya and Andrew
                 Hughes",
  title =        "An Analysis of Complexity of Insider Attacks to
                 Databases",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "4:1--4:18",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3391231",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3391231",
  abstract =     "Insider attacks are one of the most dangerous threats
                 to an organization. Unfortunately, they are very
                 difficult to foresee, detect, and defend against due to
                 the trust and responsibilities placed on the employees.
                 In this article, we first define the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ranathunga:2021:MRM,
  author =       "Dinesha Ranathunga and Matthew Roughan and Hung
                 Nguyen",
  title =        "Mathematical Reconciliation of Medical Privacy
                 Policies",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "5:1--5:18",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3397520",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3397520",
  abstract =     "Healthcare data are arguably the most private of
                 personal data. This very private information in the
                 wrong hands can lead to identity theft, prescription
                 fraud, insurance fraud, and an array of other crimes.
                 Electronic-health systems such as My Health Record in
                 Australia holds great promise in sharing medical data
                 and improving healthcare quality. But, a key privacy
                 issue in these systems is the misuse of healthcare data
                 by authorities. The recent General Data Protection
                 Regulation (GDPR) introduced in the EU aims to reduce
                 personal-data misuse. But, there are no tools currently
                 available to accurately reconcile a domestic E-health
                 policy against the GDPR to identify discrepancies.
                 Reconciling privacy policies is also non-trivial,
                 because policies are often written in free text, making
                 them subject to human interpretation.\par

                 In this article, we propose a tool that allows the
                 description of E-health privacy policies, represents
                 them using formal constructs making the policies
                 precise and explicit. Using this formal framework, our
                 tool can automatically reconcile a domestic E-health
                 policy against the GDPR to identify violations and
                 omissions. We use our prototype to illustrate several
                 critical flaws in Australia's My Health Record policy,
                 including a non-compliance with GDPR that allows
                 healthcare providers to access medical records by
                 default.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Roy:2021:OER,
  author =       "Arindam Roy and Shamik Sural and Arun Kumar Majumdar
                 and Jaideep Vaidya and Vijayalakshmi Atluri",
  title =        "Optimal Employee Recruitment in Organizations under
                 Attribute-Based Access Control",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "6:1--6:24",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3403950",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403950",
  abstract =     "For any successful business endeavor, recruitment of a
                 required number of appropriately qualified employees in
                 proper positions is a key requirement. For effective
                 utilization of human resources, reorganization of such
                 workforce assignment is also a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Akanfe:2021:DIF,
  author =       "Oluwafemi Akanfe and Rohit Valecha and H. Raghav Rao",
  title =        "Design of an Inclusive Financial Privacy Index
                 {(INF-PIE)}: a Financial Privacy and Digital Financial
                 Inclusion Perspective",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "7:1--7:21",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3403949",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3403949",
  abstract =     "Financial privacy is an important part of an
                 individual's privacy, but efforts to enhance financial
                 privacy have often not been given enough prominence by
                 some countries when advancing financial inclusion. This
                 impedes under-served communities from \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Alkhodair:2021:DHE,
  author =       "Sarah A. Alkhodair and Benjamin C. M. Fung and Steven
                 H. H. Ding and William K. Cheung and Shih-Chia Huang",
  title =        "Detecting High-Engaging Breaking News Rumors in Social
                 Media",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "8:1--8:16",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3416703",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3416703",
  abstract =     "Users from all over the world increasingly adopt
                 social media for newsgathering, especially during
                 breaking news. Breaking news is an unexpected event
                 that is currently developing. Early stages of breaking
                 news are usually associated with lots of \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Benedetto:2021:EIC,
  author =       "Francesco Benedetto and Loretta Mastroeni and
                 Pierluigi Vellucci",
  title =        "Extraction of Information Content Exchange in
                 Financial Markets by an Entropy Analysis",
  journal =      j-TMIS,
  volume =       "12",
  number =       "1",
  pages =        "9:1--9:16",
  month =        mar,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3419372",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sat Mar 20 18:13:58 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3419372",
  abstract =     "Recently, there has been an explosive interest in the
                 literature about modeling and forecasting volatility in
                 financial markets. Many researches have focused on
                 energy markets and oil volatility index (OVX). In this
                 article, we aim first at showing if \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ng:2021:LSM,
  author =       "Ka Chung Ng and Mike K. P. So and Kar Yan Tam",
  title =        "A Latent Space Modeling Approach to Interfirm
                 Relationship Analysis",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "10:1--10:44",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3424240",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3424240",
  abstract =     "Interfirm relationships are crucial to our
                 understanding of firms' collective and interactive
                 behavior. Many information systems-related phenomena,
                 including the diffusion of innovations, standard
                 alliances, technology collaboration, and outsourcing,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Onumo:2021:AME,
  author =       "Aristotle Onumo and Irfan Ullah-Awan and Andrea
                 Cullen",
  title =        "Assessing the Moderating Effect of Security
                 Technologies on Employees Compliance with Cybersecurity
                 Control Procedures",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "11:1--11:29",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3424282",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3424282",
  abstract =     "The increase in cybersecurity threats and the
                 challenges for organisations to protect their
                 information technology assets has made adherence to
                 organisational security control processes and
                 procedures a critical issue that needs to be adequately
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Belhadi:2021:MLI,
  author =       "Asma Belhadi and Youcef Djenouri and Djamel Djenouri
                 and Tomasz Michalak and Jerry Chun-Wei Lin",
  title =        "Machine Learning for Identifying Group Trajectory
                 Outliers",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "12:1--12:25",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3430195",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3430195",
  abstract =     "Prior works on the trajectory outlier detection
                 problem solely consider individual outliers. However,
                 in real-world scenarios, trajectory outliers can often
                 appear in groups, e.g., a group of bikes that deviates
                 to the usual trajectory due to the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Abdibayev:2021:UWE,
  author =       "Almas Abdibayev and Dongkai Chen and Haipeng Chen and
                 Deepti Poluru and V. S. Subrahmanian",
  title =        "Using Word Embeddings to Deter Intellectual Property
                 Theft through Automated Generation of Fake Documents",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "13:1--13:22",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3418289",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3418289",
  abstract =     "Theft of intellectual property is a growing
                 problem-one that is exacerbated by the fact that a
                 successful compromise of an enterprise might only
                 become known months after the hack. A recent solution
                 called FORGE addresses this problem by automatically
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Xue:2021:OOA,
  author =       "Xingsi Xue and Xiaojing Wu and Junfeng Chen",
  title =        "Optimizing Ontology Alignment Through an Interactive
                 Compact Genetic Algorithm",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "14:1--14:17",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3439772",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439772",
  abstract =     "Ontology provides a shared vocabulary of a domain by
                 formally representing the meaning of its concepts, the
                 properties they possess, and the relations among them,
                 which is the state-of-the-art knowledge modeling
                 technique. However, the ontologies in the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Djenouri:2021:EDS,
  author =       "Youcef Djenouri and Jerry Chun-Wei Lin and Kjetil
                 N{\o}rv{\aa}g and Heri Ramampiaro and Philip S. Yu",
  title =        "Exploring Decomposition for Solving Pattern Mining
                 Problems",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "15:1--15:36",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3439771",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439771",
  abstract =     "This article introduces a highly efficient pattern
                 mining technique called Clustering-based Pattern Mining
                 (CBPM). This technique discovers relevant patterns by
                 studying the correlation between transactions in the
                 transaction database based on \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Teng:2021:ENF,
  author =       "Mingfei Teng and Hengshu Zhu and Chuanren Liu and Hui
                 Xiong",
  title =        "Exploiting Network Fusion for Organizational Turnover
                 Prediction",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "16:1--16:18",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3439770",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3439770",
  abstract =     "As an emerging measure of proactive talent management,
                 talent turnover prediction is critically important for
                 companies to attract, engage, and retain talents in
                 order to prevent the loss of intellectual capital.
                 While tremendous efforts have been made \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pal:2021:WCC,
  author =       "Ranjan Pal and Ziyuan Huang and Sergey Lototsky and
                 Xinlong Yin and Mingyan Liu and Jon Crowcroft and
                 Nishanth Sastry and Swades De and Bodhibrata Nag",
  title =        "Will Catastrophic Cyber-Risk Aggregation Thrive in the
                 {IoT} Age? {A} Cautionary Economics Tale for
                 (Re-)Insurers and Likes",
  journal =      j-TMIS,
  volume =       "12",
  number =       "2",
  pages =        "17:1--17:36",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3446635",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Sun Jun 27 07:39:07 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446635",
  abstract =     "Service liability interconnections among networked IT
                 and IoT-driven service organizations create potential
                 channels for cascading service disruptions due to
                 modern cybercrimes such as DDoS, APT, and ransomware
                 attacks. These attacks are known to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Nakashima:2021:AFS,
  author =       "Makiya Nakashima and Alex Sim and Youngsoo Kim and
                 Jonghyun Kim and Jinoh Kim",
  title =        "Automated Feature Selection for Anomaly Detection in
                 Network Traffic Data",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "18:1--18:28",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3446636",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3446636",
  abstract =     "Variable selection (also known as feature selection )
                 is essential to optimize the learning complexity by
                 prioritizing features, particularly for a massive,
                 high-dimensional dataset like network traffic data. In
                 reality, however, it is not an easy task to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Qiu:2021:MDP,
  author =       "Lin Qiu and Sruthi Gorantla and Vaibhav Rajan and
                 Bernard C. Y. Tan",
  title =        "Multi-disease Predictive Analytics: a Clinical
                 Knowledge-aware Approach",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "19:1--19:34",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3447942",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3447942",
  abstract =     "Multi-Disease Predictive Analytics (MDPA) models
                 simultaneously predict the risks of multiple diseases
                 in patients and are valuable in early diagnoses.
                 Patients tend to have multiple diseases simultaneously
                 or develop multiple complications over time, and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Leng:2021:LIC,
  author =       "Yan Leng and Jinhua Zhao and Haris Koutsopoulos",
  title =        "Leveraging Individual and Collective Regularity to
                 Profile and Segment User Locations from Mobile Phone
                 Data",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "20:1--20:22",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3449042",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3449042",
  abstract =     "The dynamic monitoring of home and workplace
                 distribution is a fundamental building block for
                 improving location-based service systems in
                 fast-developing cities worldwide. Inferring these
                 places is challenging; existing approaches rely on
                 labor-intensive \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wang:2021:GCN,
  author =       "Xi Wang and Yibo Chai and Hui Li and Wenbin Wang and
                 Weishan Sun",
  title =        "Graph Convolutional Network-based Model for
                 Incident-related Congestion Prediction: a Case Study of
                 {Shanghai} Expressways",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "21:1--21:22",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3451356",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3451356",
  abstract =     "Traffic congestion has become a significant obstacle
                 to the development of mega cities in China. Although
                 local governments have used many resources in
                 constructing road infrastructure, it is still
                 insufficient for the increasing traffic demands. As a
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Huang:2021:EEM,
  author =       "Peng Huang and Henry C. Lucas",
  title =        "Early Exploration of {MOOCs} in the {U.S}. Higher
                 Education: an Absorptive Capacity Perspective",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "22:1--22:28",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3456295",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456295",
  abstract =     "Advanced information technologies have enabled Massive
                 Open Online Courses (MOOCs), which have the potential
                 to transform higher education around the world. Why are
                 some institutions eager to embrace this
                 technology-enabled model of teaching, while others
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Parameshwarappa:2021:ADA,
  author =       "Pooja Parameshwarappa and Zhiyuan Chen and G{\"u}nes
                 Koru",
  title =        "Anonymization of Daily Activity Data by Using
                 $l$-diversity Privacy Model",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "23:1--23:21",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3456876",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3456876",
  abstract =     "In the age of IoT, collection of activity data has
                 become ubiquitous. Publishing activity data can be
                 quite useful for various purposes such as estimating
                 the level of assistance required by older adults and
                 facilitating early diagnosis and treatment of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Xie:2021:WLP,
  author =       "Jiaheng Xie and Bin Zhang and Susan Brown and Daniel
                 Zeng",
  title =        "Write Like a Pro or an Amateur? {Effect} of Medical
                 Language Formality",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "24:1--24:25",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3458752",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3458752",
  abstract =     "Past years have seen rising engagement among
                 caregivers in online health communities. Although
                 studies indicate that this caregiver-generated online
                 health information benefits patients, how such
                 information can be perceived easily and correctly
                 remains \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Edla:2021:EDL,
  author =       "Damodar Reddy Edla and Shubham Dodia and Annushree
                 Bablani and Venkatanareshbabu Kuppili",
  title =        "An Efficient Deep Learning Paradigm for Deceit
                 Identification Test on {EEG} Signals",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "25:1--25:20",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3458791",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3458791",
  abstract =     "Brain-Computer Interface is the collaboration of the
                 human brain and a device that controls the actions of a
                 human using brain signals. Applications of
                 brain-computer interface vary from the field of
                 entertainment to medical. In this article, a novel
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wang:2021:ABB,
  author =       "Qin Wang and Shiping Chen and Yang Xiang",
  title =        "Anonymous Blockchain-based System for Consortium",
  journal =      j-TMIS,
  volume =       "12",
  number =       "3",
  pages =        "26:1--26:25",
  month =        jul,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3459087",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jul 22 08:13:40 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3459087",
  abstract =     "Blockchain records transactions with various
                 protection techniques against tampering. To meet the
                 requirements on cooperation and anonymity of companies
                 and organizations, researchers have developed a few
                 solutions. Ring signature-based schemes allow multiple
                 participants cooperatively to manage while preserving
                 their individuals' privacy. However, the solutions
                 cannot work properly due to the increased computing
                 complexity along with the expanded group size. In this
                 article, we propose a Multi-center Anonymous
                 Blockchain-based (MAB) system, with joint management
                 for the consortium and privacy protection for the
                 participants. To achieve that, we formalize the syntax
                 used by the MAB system and present a general
                 construction based on a modular design. By applying
                 cryptographic primitives to each module, we instantiate
                 our scheme with anonymity and decentralization.
                 Furthermore, we carry out a comprehensive formal
                 analysis of our exemplified scheme. A proof of concept
                 simulation is provided to show the feasibility. The
                 results demonstrate security and efficiency from both
                 theoretical perspectives and practical perspectives.",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zhao:2021:ISS,
  author =       "Kang Zhao and Qingpeng Zhang and Sean H. Y. Yuan and
                 Kelvin Kam-Fai Tsoi",
  title =        "Introduction to the Special Section on Using {AI} and
                 Data Science to Handle Pandemics and Related
                 Disruptions",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "27:1--27:2",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3486969",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3486969",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Avetisian:2021:CSR,
  author =       "Manvel Avetisian and Ilya Burenko and Konstantin
                 Egorov and Vladimir Kokh and Aleksandr Nesterov and
                 Aleksandr Nikolaev and Alexander Ponomarchuk and Elena
                 Sokolova and Alex Tuzhilin and Dmitry Umerenkov",
  title =        "{CoRSAI}: a System for Robust Interpretation of {CT}
                 Scans of {COVID-19} Patients Using Deep Learning",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "28:1--28:16",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3467471",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3467471",
  abstract =     "Analysis of chest CT scans can be used in detecting
                 parts of lungs that are affected by infectious diseases
                 such as COVID-19. Determining the volume of lungs
                 affected by lesions is essential for formulating
                 treatment recommendations and prioritizing \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zokaeinikoo:2021:AIA,
  author =       "Maryam Zokaeinikoo and Pooyan Kazemian and Prasenjit
                 Mitra and Soundar Kumara",
  title =        "{AIDCOV}: an Interpretable Artificial Intelligence
                 Model for Detection of {COVID-19} from Chest
                 Radiography Images",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "29:1--29:20",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3466690",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466690",
  abstract =     "As the Coronavirus Disease 2019 (COVID-19) pandemic
                 continues to grow globally, testing to detect COVID-19
                 and isolating individuals who test positive remains the
                 primary strategy for preventing community spread of the
                 disease. Therefore, automatic and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Liang:2021:USM,
  author =       "Guanqing Liang and Jingxin Zhao and Helena Yan Ping
                 Lau and Cane Wing-Ki Leung",
  title =        "Using Social Media to Analyze Public Concerns and
                 Policy Responses to {COVID-19} in {Hong Kong}",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "30:1--30:20",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3460124",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460124",
  abstract =     "The outbreak of COVID-19 has caused huge economic and
                 societal disruptions. To fight against the coronavirus,
                 it is critical for policymakers to take swift and
                 effective actions. In this article, we take Hong Kong
                 as a case study, aiming to leverage \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "30",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Biester:2021:UIC,
  author =       "Laura Biester and Katie Matton and Janarthanan
                 Rajendran and Emily Mower Provost and Rada Mihalcea",
  title =        "Understanding the Impact of {COVID-19} on Online
                 Mental Health Forums",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "31:1--31:28",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3458770",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3458770",
  abstract =     "Like many of the disasters that have preceded it, the
                 COVID-19 pandemic is likely to have a profound impact
                 on people's mental health. Understanding its impact can
                 inform strategies for mitigating negative consequences.
                 This work seeks to better \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "31",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Gu:2021:SFR,
  author =       "Kang Gu and Soroush Vosoughi and Temiloluwa Prioleau",
  title =        "{SymptomID}: a Framework for Rapid Symptom
                 Identification in Pandemics Using News Reports",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "32:1--32:17",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3462441",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462441",
  abstract =     "The ability to quickly learn fundamentals about a new
                 infectious disease, such as how it is transmitted, the
                 incubation period, and related symptoms, is crucial in
                 any novel pandemic. For instance, rapid identification
                 of symptoms can enable interventions \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "32",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zhu:2021:HRS,
  author =       "Shixiang Zhu and Alexander Bukharin and Liyan Xie and
                 Mauricio Santillana and Shihao Yang and Yao Xie",
  title =        "High-Resolution Spatio-Temporal Model for County-Level
                 {COVID-19} Activity in the {U.S}.",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "33:1--33:20",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3468876",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3468876",
  abstract =     "We present an interpretable high-resolution
                 spatio-temporal model to estimate COVID-19 deaths
                 together with confirmed cases 1 week ahead of the
                 current time, at the county level and weekly
                 aggregated, in the United States. A notable feature of
                 our spatio-. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "33",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Li:2021:CSS,
  author =       "Junye Li and Aryan Sharma and Deepak Mishra and
                 Gustavo Batista and Aruna Seneviratne",
  title =        "{COVID}-Safe Spatial Occupancy Monitoring Using
                 {OFDM}-Based Features and Passive {WiFi} Samples",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "34:1--34:24",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3472668",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3472668",
  abstract =     "During the COVID-19 pandemic, authorities have been
                 asking for social distancing to prevent transmission of
                 the virus. However, enforcing such distancing has been
                 challenging in tight spaces such as elevators and
                 unmonitored commercial settings such as \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "34",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Kharkwal:2021:UOD,
  author =       "Himanshu Kharkwal and Dakota Olson and Jiali Huang and
                 Abhiraj Mohan and Ankur Mani and Jaideep Srivastava",
  title =        "University Operations During a Pandemic: a Flexible
                 Decision Analysis Toolkit",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "35:1--35:24",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3460125",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460125",
  abstract =     "Modeling infection spread during pandemics is not new,
                 with models using past data to tune simulation
                 parameters for predictions. These help in understanding
                 of the healthcare burden posed by a pandemic and
                 responding accordingly. However, the problem of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "35",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ouyang:2021:DRS,
  author =       "Chun Ouyang and Michael Adams and Arthur H. M. Ter
                 Hofstede and Yang Yu",
  title =        "Design and Realisation of Scalable Business Process
                 Management Systems for Deployment in the Cloud",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "36:1--36:26",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3460123",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460123",
  abstract =     "Business Process Management Systems (BPMSs) provide
                 automated support for the execution of business
                 processes in modern organisations. With the emergence
                 of cloud computing, BPMS deployment considerations are
                 shifting from traditional on-premise models to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "36",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chakraborty:2021:MLA,
  author =       "Saurav Chakraborty and Agnieszka Onuchowska and Sagar
                 Samtani and Wolfgang Jank and Brandon Wolfram",
  title =        "Machine Learning for Automated Industrial {IoT} Attack
                 Detection: an Efficiency-Complexity Trade-off",
  journal =      j-TMIS,
  volume =       "12",
  number =       "4",
  pages =        "37:1--37:28",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3460822",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Oct 27 15:36:00 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460822",
  abstract =     "Critical city infrastructures that depend on smart
                 Industrial Internet of Things (IoT) devices have been
                 increasingly becoming a target of cyberterrorist or
                 hacker attacks. Although this has led to multiple
                 studies in the recent past, there exists a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "37",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Cwei:2022:ISI,
  author =       "Lin Jerry Cwei and Nachiketa Sahoo and Gautam
                 Srivastava and Weiping Ding",
  title =        "Introduction to the Special Issue on Pattern-Driven
                 Mining, Analytics, and Prediction for Decision Making,
                 {Part 1}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "1:1--1:3",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3486960",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3486960",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wang:2022:DDS,
  author =       "Shui-Hua Wang and Xin Zhang and Yu-Dong Zhang",
  title =        "{DSSAE}: Deep Stacked Sparse Autoencoder Analytical
                 Model for {COVID-19} Diagnosis by Fractional {Fourier}
                 Entropy",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "2:1--2:20",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3451357",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3451357",
  abstract =     "(Aim) COVID-19 has caused more than 2.28 million
                 deaths till 4/Feb/2021 while it is still spreading
                 across the world. This study proposed a novel
                 artificial intelligence model to diagnose COVID-19
                 based on chest CT images. (Methods) First, the two-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2022:TDT,
  author =       "Fan Chen and Jiaoxiong Xia and Honghao Gao and Huahu
                 Xu and Wei Wei",
  title =        "{TRG-DAtt}: The Target Relational Graph and Double
                 Attention Network Based Sentiment Analysis and
                 Prediction for Supporting Decision Making",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "3:1--3:25",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3462442",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462442",
  abstract =     "The management of public opinion and the use of big
                 data monitoring to accurately judge and verify all
                 kinds of information are valuable aspects in the
                 enterprise management decision-making process. The
                 sentiment analysis of reviews is a key decision-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Nawaz:2022:MHU,
  author =       "M. Saqib Nawaz and Philippe Fournier-Viger and Unil
                 Yun and Youxi Wu and Wei Song",
  title =        "Mining High Utility Itemsets with {Hill} Climbing and
                 Simulated Annealing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "4:1--4:22",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3462636",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3462636",
  abstract =     "High utility itemset mining (HUIM) is the task of
                 finding all items set, purchased together, that
                 generate a high profit in a transaction database. In
                 the past, several algorithms have been developed to
                 mine high utility itemsets (HUIs). However, most of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Niu:2022:CMT,
  author =       "Shuteng Niu and Yushan Jiang and Bowen Chen and Jian
                 Wang and Yongxin Liu and Houbing Song",
  title =        "Cross-Modality Transfer Learning for Image-Text
                 Information Management",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "5:1--5:14",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3464324",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464324",
  abstract =     "In the past decades, information from all kinds of
                 data has been on a rapid increase. With
                 state-of-the-art performance, machine learning
                 algorithms have been beneficial for information
                 management. However, insufficient supervised training
                 data is still \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2022:ABV,
  author =       "Mu-Yen Chen and Min-Hsuan Fan and Li-Xiang Huang",
  title =        "{AI}-Based Vehicular Network toward {6G} and {IoT}:
                 Deep Learning Approaches",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "6:1--6:12",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3466691",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466691",
  abstract =     "In recent years, vehicular networks have become
                 increasingly large, heterogeneous, and dynamic, making
                 it difficult to meet strict requirements of ultralow
                 latency, high reliability, high security, and massive
                 connections for next generation (6G) \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lv:2022:NML,
  author =       "Zhihan Lv and Ranran Lou and Hailin Feng and Dongliang
                 Chen and Haibin Lv",
  title =        "Novel Machine Learning for Big Data Analytics in
                 Intelligent Support Information Management Systems",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "7:1--7:21",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3469890",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469890",
  abstract =     "Two-dimensional$^1$ arrays of bi-component structures
                 made of cobalt and permalloy elliptical dots with
                 thickness of 25 nm, length 1 mm and width of 225 nm,
                 have been prepared by a self-aligned shadow deposition
                 technique. Brillouin light scattering has been
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Kumar:2022:DBP,
  author =       "Ankit Kumar and Abhishek Kumar and Ali Kashif Bashir
                 and Mamoon Rashid and V. D. Ambeth Kumar and Rupak
                 Kharel",
  title =        "Distance Based Pattern Driven Mining for Outlier
                 Detection in High Dimensional Big Dataset",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "8:1--8:17",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3469891",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3469891",
  abstract =     "Detection of outliers or anomalies is one of the vital
                 issues in pattern-driven data mining. Outlier detection
                 detects the inconsistent behavior of individual
                 objects. It is an important sector in the data mining
                 field with several different applications \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chowdhury:2022:NAM,
  author =       "Mohammad Ehsan Shahmi Chowdhury and Chowdhury Farhan
                 Ahmed and Carson K. Leung",
  title =        "A New Approach for Mining Correlated Frequent
                 Subgraphs",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "9:1--9:28",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3473042",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3473042",
  abstract =     "Nowadays graphical datasets are having a vast amount
                 of applications. As a result, graph mining-mining graph
                 datasets to extract frequent subgraphs-has proven to be
                 crucial in numerous aspects. It is important to perform
                 correlation analysis among the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wen:2022:KFA,
  author =       "Bo Wen and Paul Jen-Hwa Hu and Mohammadreza Ebrahimi
                 and Hsinchun Chen",
  title =        "Key Factors Affecting User Adoption of Open-Access
                 Data Repositories in Intelligence and Security
                 Informatics: an Affordance Perspective",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "10:1--10:24",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3460823",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3460823",
  abstract =     "Rich, diverse cybersecurity data are critical for
                 efforts by the intelligence and security informatics
                 (ISI) community. Although open-access data repositories
                 (OADRs) provide tremendous benefits for ISI researchers
                 and practitioners, determinants of their \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Elkoumy:2022:PCP,
  author =       "Gamal Elkoumy and Stephan A. Fahrenkrog-Petersen and
                 Mohammadreza Fani Sani and Agnes Koschmider and Felix
                 Mannhardt and Saskia Nu{\~n}ez Von Voigt and Majid
                 Rafiei and Leopold {Von Waldthausen}",
  title =        "Privacy and Confidentiality in Process Mining: Threats
                 and Research Challenges",
  journal =      j-TMIS,
  volume =       "13",
  number =       "1",
  pages =        "11:1--11:17",
  month =        mar,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3468877",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Jan 7 07:41:54 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3468877",
  abstract =     "Privacy and confidentiality are very important
                 prerequisites for applying process mining to comply
                 with regulations and keep company secrets. This article
                 provides a foundation for future research on
                 privacy-preserving and confidential process mining
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Sun:2022:DAM,
  author =       "Bo Sun and Takeshi Takahashi and Tao Ban and Daisuke
                 Inoue",
  title =        "Detecting {Android} Malware and Classifying Its
                 Families in Large-scale Datasets",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "12:1--12:21",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3464323",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3464323",
  abstract =     "To relieve the burden of security analysts, Android
                 malware detection and its family classification need to
                 be automated. There are many previous works focusing on
                 using machine (or deep) learning technology to tackle
                 these two important issues, but as \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Marshall:2022:MLS,
  author =       "Byron Marshall and Michael Curry and Robert E.
                 Crossler and John Correia",
  title =        "Machine Learning and Survey-based Predictors of
                 {InfoSec} Non-Compliance",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "13:1--13:20",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3466689",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3466689",
  abstract =     "Survey items developed in behavioral Information
                 Security (InfoSec) research should be practically
                 useful in identifying individuals who are likely to
                 create risk by failing to comply with InfoSec guidance.
                 The literature shows that attitudes, beliefs,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Xie:2022:RPP,
  author =       "Jiaheng Xie and Bin Zhang and Jian Ma and Daniel Zeng
                 and Jenny Lo-Ciganic",
  title =        "Readmission Prediction for Patients with Heterogeneous
                 Medical History: a Trajectory-Based Deep Learning
                 Approach",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "14:1--14:27",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3468780",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3468780",
  abstract =     "Hospital readmission refers to the situation where a
                 patient is re-hospitalized with the same primary
                 diagnosis within a specific time interval after
                 discharge. Hospital readmission causes \$26 billion
                 preventable expenses to the U.S. health systems
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{He:2022:MAC,
  author =       "Luo He and Hongyan Liu and Yinghui Yang and Bei Wang",
  title =        "A Multi-attention Collaborative Deep Learning Approach
                 for Blood Pressure Prediction",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "15:1--15:20",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3471571",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3471571",
  abstract =     "We develop a deep learning model based on Long
                 Short-term Memory (LSTM) to predict blood pressure
                 based on a unique data set collected from physical
                 examination centers capturing comprehensive multi-year
                 physical examination and lab results. In the Multi-.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Tang:2022:QLW,
  author =       "Yan Tang and Weilong Cui and Jianwen Su",
  title =        "A Query Language for Workflow Logs",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "16:1--16:28",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3482968",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3482968",
  abstract =     "A business process (workflow) is an assembly of tasks
                 to accomplish a business goal. Real-world workflow
                 models often demanded to change due to new laws and
                 policies, changes in the environment, and so on. To
                 understand the inner workings of a business \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Huang:2022:IMA,
  author =       "Shi Ming Huang and David C. Yen and Ting Jyun Yan and
                 Yi Ting Yang",
  title =        "An Intelligent Mechanism to Automatically Discover
                 Emerging Technology Trends: Exploring Regulatory
                 Technology",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "17:1--17:29",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3485187",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3485187",
  abstract =     "Technology trend analysis uses data relevant to
                 historical performance and extrapolates it to estimate
                 and assess the future potential of technology. Such
                 analysis is used to analyze emerging technologies or
                 predict the growing markets that influence the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Miksa:2022:ARD,
  author =       "Tomasz Miksa and Simon Oblasser and Andreas Rauber",
  title =        "Automating Research Data Management Using
                 Machine-Actionable Data Management Plans",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "18:1--18:22",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3490396",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490396",
  abstract =     "Many research funders mandate researchers to create
                 and maintain data management plans (DMPs) for research
                 projects that describe how research data is managed to
                 ensure its reusability. A DMP, being a static textual
                 document, is difficult to act upon and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Li:2022:IBS,
  author =       "Guangrui (Kayla) Li and Mike K. P. So and Kar Yan
                 Tam",
  title =        "Identifying the Big Shots --- a Quantile-Matching Way
                 in the Big Data Context",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "19:1--19:30",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3490395",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490395",
  abstract =     "The prevalence of big data has raised significant
                 epistemological concerns in information systems
                 research. This study addresses two of them-the deflated
                 p -value problem and the role of explanation and
                 prediction. To address the deflated p -value problem,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wu:2022:EST,
  author =       "Xindong Wu and Xingquan Zhu and Minghui Wu",
  title =        "The Evolution of Search: Three Computing Paradigms",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "20:1--20:20",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3495214",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3495214",
  abstract =     "Search is probably the most common activity that
                 humans conduct all the time. A search target can be a
                 concrete item (with a yes or no answer and location
                 information), an abstract concept (such as the most
                 important information on the Web about Xindong
                 \ldots{}).",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zhang:2022:CDW,
  author =       "Ning Zhang and Mohammadreza Ebrahimi and Weifeng Li
                 and Hsinchun Chen",
  title =        "Counteracting Dark {Web} Text-Based {CAPTCHA} with
                 Generative Adversarial Learning for Proactive Cyber
                 Threat Intelligence",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "21:1--21:21",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3505226",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505226",
  abstract =     "Automated monitoring of dark web (DW) platforms on a
                 large scale is the first step toward developing
                 proactive Cyber Threat Intelligence (CTI). While there
                 are efficient methods for collecting data from the
                 surface web, large-scale dark web data \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Werder:2022:EDP,
  author =       "Karl Werder and Balasubramaniam Ramesh and Rongen
                 (Sophia) Zhang",
  title =        "Establishing Data Provenance for Responsible
                 Artificial Intelligence Systems",
  journal =      j-TMIS,
  volume =       "13",
  number =       "2",
  pages =        "22:1--22:23",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3503488",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Fri Mar 25 07:15:03 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3503488",
  abstract =     "Data provenance, a record that describes the origins
                 and processing of data, offers new promises in the
                 increasingly important role of artificial intelligence
                 (AI)-based systems in guiding human decision making. To
                 avoid disastrous outcomes that can \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lin:2022:ISI,
  author =       "Jerry Chun-Wei Lin and Nachiketa Sahoo and Gautam
                 Srivastava and Weiping Ding",
  title =        "Introduction to the Special Issue on Pattern-Driven
                 Mining, Analytics, and Prediction for Decision Making,
                 {Part II}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "23:1--23:3",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3512468",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3512468",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ebrahimi:2022:QCS,
  author =       "Maryam Ebrahimi and Mohammad Hesam Tadayon and
                 Mohammad Sayad Haghighi and Alireza Jolfaei",
  title =        "A Quantitative Comparative Study of Data-oriented
                 Trust Management Schemes in {Internet of Things}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "24:1--24:30",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3476248",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3476248",
  abstract =     "In the Internet of Things (IoT) paradigm, all entities
                 in the IoT network, whether home users or industrial
                 things, receive data from other things to make
                 decisions. However, in the decentralized,
                 heterogeneous, and rapidly changing IoT network with
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Wu:2022:OMS,
  author =       "Youxi Wu and Xiaohui Wang and Yan Li and Lei Guo and
                 Zhao Li and Ji Zhang and Xindong Wu",
  title =        "{OWSP-Miner}: Self-adaptive One-off Weak-gap Strong
                 Pattern Mining",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "25:1--25:23",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3476247",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3476247",
  abstract =     "Gap constraint sequential pattern mining (SPM), as a
                 kind of repetitive SPM, can avoid mining too many
                 useless patterns. However, this method is difficult for
                 users to set a suitable gap without prior knowledge and
                 each character is considered to have the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Gao:2022:FEH,
  author =       "Yuan Gao and Laurence T. Yang and Yaliang Zhao and
                 Jing Yang",
  title =        "Feature Extraction of High-dimensional Data Based on
                 {J-HOSVD} for Cyber-Physical-Social Systems",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "26:1--26:21",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3483448",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3483448",
  abstract =     "With the further integration of Cyber-Physical-Social
                 systems (CPSSs), there is explosive growth of the data
                 in CPSSs. How to discover effective information or
                 knowledge from CPSSs big data and provide support for
                 subsequent learning tasks has become a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Hsieh:2022:DFR,
  author =       "Hsun-Ping Hsieh and Fandel Lin and Nai-Yu Chen and
                 Tzu-Hsin Yang",
  title =        "A Decision Framework to Recommend Cruising Locations
                 for Taxi Drivers under the Constraint of Booking
                 Information",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "27:1--27:30",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3490687",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490687",
  abstract =     "As the demand for taxi reservation services has
                 increased, increasing the income of taxi drivers with
                 advanced services has attracted attention. In this
                 article, we propose a path decision framework that
                 considers real-time spatial-temporal predictions
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pika:2022:CBP,
  author =       "Anastasiia Pika and Chun Ouyang and Arthur H. M. ter
                 Hofstede",
  title =        "Configurable Batch-Processing Discovery from Event
                 Logs",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "28:1--28:25",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3490394",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3490394",
  abstract =     "Batch processing is used in many production and
                 service processes and can help achieve efficiencies of
                 scale; however, it can also increase inventories and
                 introduce process delays. Before organizations can
                 develop good understanding about the effects of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Rashid:2022:ADC,
  author =       "A. N. M. Bazlur Rashid and Mohiuddin Ahmed and Leslie
                 F. Sikos and Paul Haskell-Dowland",
  title =        "Anomaly Detection in Cybersecurity Datasets via
                 Cooperative Co-evolution-based Feature Selection",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "29:1--29:39",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3495165",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3495165",
  abstract =     "Anomaly detection from Big Cybersecurity Datasets is
                 very important; however, this is a very challenging and
                 computationally expensive task. Feature selection (FS)
                 is an approach to remove irrelevant and redundant
                 features and select a subset of features, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Liu:2022:EFP,
  author =       "Xin Liu and Liang Zheng and Weishan Zhang and Jiehan
                 Zhou and Shuai Cao and Shaowen Yu",
  title =        "An Evolutive Frequent Pattern Tree-based Incremental
                 Knowledge Discovery Algorithm",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "30:1--30:20",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3495213",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3495213",
  abstract =     "To understand current situation in specific scenarios,
                 valuable knowledge should be mined from both historical
                 data and emerging new data. However, most existing
                 algorithms take the historical data and the emerging
                 data as a whole and periodically repeat \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "30",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Corradini:2022:ETA,
  author =       "Flavio Corradini and Alessandro Marcelletti and Andrea
                 Morichetta and Andrea Polini and Barbara Re and
                 Francesco Tiezzi",
  title =        "Engineering Trustable and Auditable Choreography-based
                 Systems Using Blockchain",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "31:1--31:53",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3505225",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505225",
  abstract =     "A key challenge in engineering distributed systems
                 consists in the integration into their development of a
                 decentralised infrastructure allowing the system
                 participants to trust each other. In this article, we
                 face such a challenge by proposing a model-. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "31",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Yeo:2022:HCD,
  author =       "M. Lisa Yeo and Erik Rolland and Jacquelyn Rees Ulmer
                 and Raymond A. Patterson",
  title =        "How Customer Demand Reactions Impact Technology
                 Innovation and Security",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "32:1--32:17",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3505227",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505227",
  abstract =     "Innovation is a very important concern for both
                 managers and governmental policy makers. There is an
                 important interplay between security and technology
                 innovation that is largely unrecognized in the
                 literature. This research considers the case where
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "32",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ma:2022:SME,
  author =       "Wanlun Ma and Xiangyu Hu and Chao Chen and Sheng Wen
                 and Kkwang Raymond Choo and Yang Xiang",
  title =        "Social Media Event Prediction using {DNN} with
                 Feedback Mechanism",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "33:1--33:24",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3522759",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3522759",
  abstract =     "Online social networks (OSNs) are a rich source of
                 information, and the data (including user-generated
                 content) can be mined to facilitate real-world event
                 prediction. However, the dynamic nature of OSNs and the
                 fast-pace nature of social events or hot \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "33",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Adomavicius:2022:IBE,
  author =       "Gediminas Adomavicius and Mochen Yang",
  title =        "Integrating Behavioral, Economic, and Technical
                 Insights to Understand and Address Algorithmic Bias: a
                 Human-Centric Perspective",
  journal =      j-TMIS,
  volume =       "13",
  number =       "3",
  pages =        "34:1--34:27",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3519420",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Jun 2 07:44:18 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519420",
  abstract =     "Many important decisions are increasingly being made
                 with the help of information systems that use
                 artificial intelligence and machine learning models.
                 These computational models are designed to discover
                 useful patterns from large amounts of data, which
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "34",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2022:ISI,
  author =       "Mu-Yen Chen and Bhavani Thuraisingham and Erol
                 Egrioglu and Jose {De Jesus Rubio}",
  title =        "Introduction to the Special Issue on Smart Systems for
                 {Industry 4.0} and {IoT}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "35:1--35:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3583985",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583985",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "35",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Romero:2022:IDP,
  author =       "Esteban Elias Romero and Carlos David Camacho and
                 Carlos Enrique Montenegro and {\'O}scar Esneider Acosta
                 and Rub{\'e}n Gonz{\'a}lez Crespo and Elvis Eduardo
                 Gaona and Marcelo Herrera Mart{\'\i}nez",
  title =        "Integration of {DevOps} Practices on a Noise Monitor
                 System with {CircleCI} and {Terraform}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "36:1--36:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3505228",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3505228",
  abstract =     "Lowering pollution levels is one of the main
                 principles of Sustainable Development goals dictated by
                 the United Nations. Consequently, developments on noise
                 monitoring contribute in great manner to this purpose,
                 since they give the opportunity to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "36",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ren:2022:AMD,
  author =       "Bin Ren and Yuquiang Chen and Fujie Wang",
  title =        "Application Massive Data Processing Platform for Smart
                 Manufacturing Based on Optimization of Data Storage",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "37:1--37:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3508395",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3508395",
  abstract =     "The aim of smart manufacturing is to reduce manpower
                 requirements of the production line by applying
                 technology of huge amounts of data to the manufacturing
                 industry. Smart manufacturing is also called Industry
                 4.0, and the platform for processing huge \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "37",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Liu:2022:PDX,
  author =       "Genggeng Liu and Yuhan Zhu and Saijuan Xu and Hao Tang
                 and Yeh-Cheng Chen",
  title =        "Performance-Driven {X}-Architecture Routing Algorithm
                 for Artificial Intelligence Chip Design in Smart
                 Manufacturing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "38:1--38:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3519422",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3519422",
  abstract =     "The new 7-nm Artificial Intelligence (AI) chip is an
                 important milestone recently announced by the IBM
                 research team, with a very important optimization goal
                 of performance. This chip technology can be extended to
                 various business scenarios in the \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "38",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lv:2022:CIS,
  author =       "Zhihan Lv and Dongliang Chen and Hailin Feng and Amit
                 Kumar Singh and Wei Wei and Haibin Lv",
  title =        "Computational Intelligence in Security of Digital
                 Twins Big Graphic Data in Cyber-physical Systems of
                 Smart Cities",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "39:1--39:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3522760",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3522760",
  abstract =     "This investigation focuses on the application of
                 computational intelligence to the security of Digital
                 Twins (DTs) graphic data of the Cyber-physical System
                 (CPS). The intricate and diverse physical space of CPS
                 in the smart city is mapped in virtual \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "39",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2022:CIM,
  author =       "Rongli Chen and Xiaozhong Chen and Lei Wang and
                 Jianxin Li",
  title =        "The Core Industry Manufacturing Process of Electronics
                 Assembly Based on Smart Manufacturing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "40:1--40:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3529098",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529098",
  abstract =     "This research takes a case study approach to show the
                 development of a diverse adoption and product strategy
                 distinct from the core manufacturing industry process.
                 It explains the development status in all aspects of
                 smart manufacturing, via the example \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "40",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Liu:2022:TSC,
  author =       "Genggeng Liu and Ruping Zhou and Saijuan Xu and Yuhan
                 Zhu and Wenzhong Guo and Yeh-Cheng Chen and Guolong
                 Chen",
  title =        "Two-Stage Competitive Particle Swarm Optimization
                 Based Timing-Driven {X}-Routing for {IC} Design Under
                 Smart Manufacturing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "41:1--41:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3531328",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3531328",
  abstract =     "As timing delay becomes a critical issue in chip
                 performance, there is a burning desire for IC design
                 under smart manufacturing to optimize the delay. As the
                 best connection model for multi-terminal nets, the
                 wirelength and the maximum source-to-sink \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "41",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Du:2022:SWI,
  author =       "Xin Du and Songtao Tang and Zhihui Lu and Keke Gai and
                 Jie Wu and Patrick C. K. Hung",
  title =        "Scientific Workflows in {IoT} Environments: a Data
                 Placement Strategy Based on Heterogeneous Edge-Cloud
                 Computing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "42:1--42:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3531327",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3531327",
  abstract =     "In Industry 4.0 and Internet of Things (IoT)
                 environments, the heterogeneous edge-cloud computing
                 paradigm can provide a more proper solution to deploy
                 scientific workflows compared to cloud computing or
                 other traditional distributed computing. Owing to
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "42",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lin:2022:SSJ,
  author =       "Qi Lin and Wensheng Gan and Yongdong Wu and Jiahui
                 Chen and Chien-Ming Chen",
  title =        "Smart System: Joint Utility and Frequency for Pattern
                 Classification",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "43:1--43:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3531480",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3531480",
  abstract =     "Nowadays, the environments of smart systems for
                 Industry 4.0 and Internet of Things are experiencing
                 fast industrial upgrading. Big data technologies such
                 as design making, event detection, and classification
                 are developed to help manufacturing \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "43",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Parameswarath:2022:UEP,
  author =       "Rohini Poolat Parameswarath and Prosanta Gope and
                 Biplab Sikdar",
  title =        "User-empowered Privacy-preserving Authentication
                 Protocol for Electric Vehicle Charging Based on
                 Decentralized Identity and Verifiable Credential",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "44:1--44:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3532869",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3532869",
  abstract =     "The use of Electric Vehicles (EVs) has been gaining
                 traction in recent years due to various reasons. While
                 charging their EVs, users expose their identity and
                 personal details, and an adversary being able to
                 identify and track where users charge their EVs
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "44",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Nong:2022:ARC,
  author =       "Mengxin Nong and Lingfeng Huang and Mingtao Liu",
  title =        "Allocation of Resources for Cloud Survivability in
                 Smart Manufacturing",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "45:1--45:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3533701",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533701",
  abstract =     "With the development of virtualization technology,
                 cloud computing has emerged as a powerful and flexible
                 platform for various services such as online trading.
                 However, there are concerns about the survivability of
                 cloud services in smart manufacturing. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "45",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ahmed:2022:HEA,
  author =       "Usman Ahmed and Jerry Chun-Wei Lin and Gautam
                 Srivastava",
  title =        "Heterogeneous Energy-aware Load Balancing for
                 {Industry 4.0} and {IoT} Environments",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "46:1--46:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3543859",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3543859",
  abstract =     "With the improvement of global infrastructure,
                 Cyber-Physical Systems (CPS) have become an important
                 component of Industry 4.0. Both the application as well
                 as the machine work together to improve the task of
                 interdependencies. Machine learning methods in
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "46",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2022:RUB,
  author =       "Yu-Chia Chen and Sin-Ye Jhong and Chih-Hsien Hsia",
  title =        "Roadside Unit-based Unknown Object Detection in
                 Adverse Weather Conditions for Smart {Internet of
                 Vehicles}",
  journal =      j-TMIS,
  volume =       "13",
  number =       "4",
  pages =        "47:1--47:??",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3554923",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:44 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3554923",
  abstract =     "For Internet of Vehicles applications, reliable
                 autonomous driving systems usually perform the majority
                 of their computations on the cloud due to the limited
                 computing power of edge devices. The communication
                 delay between cloud platforms and edge devices,.
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "47",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Janiesch:2023:AUP,
  author =       "Christian Janiesch and Marcus Fischer and Florian
                 Imgrund and Adrian Hofmann and Axel Winkelmann",
  title =        "An Architecture Using Payment Channel Networks for
                 Blockchain-based {Wi-Fi} Sharing",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3529097",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3529097",
  abstract =     "Enabling Internet access while taking load of mobile
                 networks, the concept of Wi-Fi sharing holds much
                 potential. While trust-based concepts require a trusted
                 intermediary and cannot prevent malicious behavior, for
                 example, conducted through fake profiles,. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Morid:2023:TSP,
  author =       "Mohammad Amin Morid and Olivia R. Liu Sheng and Joseph
                 Dunbar",
  title =        "Time Series Prediction Using Deep Learning Methods in
                 Healthcare",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3531326",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3531326",
  abstract =     "Traditional machine learning methods face unique
                 challenges when applied to healthcare predictive
                 analytics. The high-dimensional nature of healthcare
                 data necessitates labor-intensive and time-consuming
                 processes when selecting an appropriate set of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zhai:2023:RNB,
  author =       "Shuang (Sophie) Zhai and Zhu (Drew) Zhang",
  title =        "Read the News, Not the Books: Forecasting Firms'
                 Long-term Financial Performance via Deep Text Mining",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3533018",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3533018",
  abstract =     "In this paper, we show textual data from firm-related
                 events in news articles can effectively predict various
                 firm financial ratios, with or without historical
                 financial ratios. We exploit state-of-the-art neural
                 architectures, including pseudo-event \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ameri:2023:DNI,
  author =       "Kimia Ameri and Michael Hempel and Hamid Sharif and
                 Juan Lopez and Kalyan Perumalla",
  title =        "Design of a Novel Information System for
                 Semi-automated Management of Cybersecurity in
                 Industrial Control Systems",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3546580",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3546580",
  abstract =     "There is an urgent need in many critical
                 infrastructure sectors, including the energy sector,
                 for attaining detailed insights into cybersecurity
                 features and compliance with cybersecurity requirements
                 related to their Operational Technology (OT) \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Joshi:2023:LNL,
  author =       "Amogh Manoj Joshi and Deepak Ranjan Nayak and
                 Dibyasundar Das and Yudong Zhang",
  title =        "{LiMS-Net}: a Lightweight Multi-Scale {CNN} for
                 {COVID-19} Detection from Chest {CT} Scans",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3551647",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3551647",
  abstract =     "Recent years have witnessed a rise in employing deep
                 learning methods, especially convolutional neural
                 networks (CNNs) for detection of COVID-19 cases using
                 chest CT scans. Most of the state-of-the-art models
                 demand a huge amount of parameters which often
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Kucklick:2023:TAI,
  author =       "Jan-Peter Kucklick and Oliver M{\"u}ller",
  title =        "Tackling the Accuracy-Interpretability Trade-off:
                 Interpretable Deep Learning Models for Satellite
                 Image-based Real Estate Appraisal",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3567430",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567430",
  abstract =     "Deep learning models fuel many modern decision support
                 systems, because they typically provide high predictive
                 performance. Among other domains, deep learning is used
                 in real-estate appraisal, where it allows extending the
                 analysis from hard facts only \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Akello:2023:BUC,
  author =       "Patricia Akello and Naga Vemprala and Nicole Lang
                 Beebe and Kim-Kwang Raymond Choo",
  title =        "Blockchain Use Case in Ballistics and Crime Gun
                 Tracing and Intelligence: Toward Overcoming Gun
                 Violence",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "7:1--7:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3571290",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571290",
  abstract =     "In the United States and around the world, gun
                 violence has become a long-standing public safety
                 concern and a security threat, due to violent
                 gun-related crimes, injuries, and fatalities. Although
                 legislators and lawmakers have attempted to mitigate
                 its \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "7",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chen:2023:ODD,
  author =       "Xue Chen and Cheng Wang and Qing Yang and Teng Hu and
                 Changjun Jiang",
  title =        "The Opportunity in Difficulty: a Dynamic Privacy
                 Budget Allocation Mechanism for Privacy-Preserving
                 Multi-dimensional Data Collection",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "8:1--8:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3569944",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3569944",
  abstract =     "Data collection under local differential privacy (LDP)
                 has been gradually on the stage. Compared with the
                 implementation of LDP on the single attribute data
                 collection, that on multi-dimensional data faces great
                 challenges as follows: (1) Communication \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "8",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Hu:2023:RAH,
  author =       "Yixiang Hu and Xiaoheng Deng and Congxu Zhu and
                 Xuechen Chen and Laixin Chi",
  title =        "Resource Allocation for Heterogeneous Computing Tasks
                 in Wirelessly Powered {MEC}-enabled {IIOT} Systems",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3571291",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3571291",
  abstract =     "Integrating wireless power transfer with mobile edge
                 computing (MEC) has become a powerful solution for
                 increasingly complicated and dynamic industrial
                 Internet of Things (IIOT) systems. However, the
                 traditional approaches overlooked the heterogeneity of
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "9",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Hevner:2023:RCD,
  author =       "Alan Hevner and Veda Storey",
  title =        "Research Challenges for the Design of Human-Artificial
                 Intelligence Systems ({HAIS})",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3549547",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3549547",
  abstract =     "Artificial intelligence (AI) capabilities are
                 increasingly common components of all socio-technical
                 information systems that integrate human and machine
                 actions. The impacts of AI components on the design and
                 use of application systems are evolving \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "10",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Dumas:2023:AAB,
  author =       "Marlon Dumas and Fabiana Fournier and Lior Limonad and
                 Andrea Marrella and Marco Montali and Jana-Rebecca
                 Rehse and Rafael Accorsi and Diego Calvanese and
                 Giuseppe {De Giacomo} and Dirk Fahland and Avigdor Gal
                 and Marcello {La Rosa} and Hagen V{\"o}lzer and Ingo
                 Weber",
  title =        "{AI}-augmented Business Process Management Systems: a
                 Research Manifesto",
  journal =      j-TMIS,
  volume =       "14",
  number =       "1",
  pages =        "11:1--11:??",
  month =        mar,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3576047",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Thu Mar 9 08:04:45 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3576047",
  abstract =     "AI-augmented Business Process Management Systems
                 (ABPMSs) are an emerging class of process-aware
                 information systems, empowered by trustworthy AI
                 technology. An ABPMS enhances the execution of business
                 processes with the aim of making these processes more
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "11",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Leroy:2023:ISI,
  author =       "Gondy Leroy and Bengisu Tulu and Xiao Liu",
  title =        "Introduction to the Special Issue on Design and Data
                 Science Research in Healthcare",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "12:1--12:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3579646",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3579646",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "12",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Baucum:2023:OSU,
  author =       "Matt Baucum and Anahita Khojandi and Carole Myers and
                 Larry Kessler",
  title =        "Optimizing Substance Use Treatment Selection Using
                 Reinforcement Learning",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "13:1--13:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3563778",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3563778",
  abstract =     "Substance use disorder (SUD) exacts a substantial
                 economic and social cost in the United States, and it
                 is crucial for SUD treatment providers to match
                 patients with feasible, effective, and affordable
                 treatment plans. The availability of large SUD
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "13",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Bartenschlager:2023:CML,
  author =       "Christina C. Bartenschlager and Stefanie S. Ebel and
                 Sebastian Kling and Janne Vehreschild and Lutz T. Zabel
                 and Christoph D. Spinner and Andreas Schuler and Axel
                 R. Heller and Stefan Borgmann and Reinhard Hoffmann and
                 Siegbert Rieg and Helmut Messmann and Martin Hower and
                 Jens O. Brunner and Frank Hanses and Christoph
                 R{\"o}mmele",
  title =        "{COVIDAL}: a Machine Learning Classifier for Digital
                 {COVID-19} Diagnosis in {German} Hospitals",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "14:1--14:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3567431",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3567431",
  abstract =     "For the fight against the COVID-19 pandemic, it is
                 particularly important to map the course of infection,
                 in terms of patients who have currently tested
                 SARS-CoV-2 positive, as accurately as possible. In
                 hospitals, this is even more important because
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "14",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{vanderLinden:2023:MVD,
  author =       "Sanne van der Linden and Rita Sevastjanova and Mathias
                 Funk and Mennatallah El-Assady",
  title =        "{MediCoSpace}: Visual Decision-Support for
                 Doctor-Patient Consultations using Medical Concept
                 Spaces from {EHRs}",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "15:1--15:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3564275",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564275",
  abstract =     "Healthcare systems are under pressure from an aging
                 population, rising costs, and increasingly complex
                 conditions and treatments. Although data are determined
                 to play a bigger role in how doctors diagnose and
                 prescribe treatments, they struggle due to a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "15",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Fechner:2023:NIS,
  author =       "Pascal Fechner and Fabian K{\"o}nig and Wolfgang
                 Kratsch and Jannik Lockl and Maximilian R{\"o}glinger",
  title =        "Near-Infrared Spectroscopy for Bladder Monitoring: a
                 Machine Learning Approach",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "16:1--16:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3563779",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3563779",
  abstract =     "Patients living with neurogenic bladder dysfunction
                 can lose the sensation of their bladder filling. To
                 avoid over-distension of the urinary bladder and
                 prevent long-term damage to the urinary tract, the gold
                 standard treatment is clean intermittent \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "16",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Srinivasan:2023:EDM,
  author =       "Karthik Srinivasan and Jinhang Jiang",
  title =        "Examining Disease Multimorbidity in {U.S.} Hospital
                 Visits Before and During {COVID-19} Pandemic: a Graph
                 Analytics Approach",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "17:1--17:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3564274",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564274",
  abstract =     "Enduring effects of the COVID-19 pandemic on
                 healthcare systems can be preempted by identifying
                 patterns in diseases recorded in hospital visits over
                 time. Disease multimorbidity or simultaneous occurrence
                 of multiple diseases is a growing global public
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "17",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Srinivasan:2023:HLS,
  author =       "Karthik Srinivasan and Faiz Currim and Sudha Ram",
  title =        "A Human-in-the-Loop Segmented Mixed-Effects Modeling
                 Method for Analyzing Wearables Data",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "18:1--18:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3564276",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3564276",
  abstract =     "Wearables are an important source of big data, as they
                 provide real-time high-resolution data logs of health
                 indicators of individuals. Higher-order associations
                 between pairs of variables is common in wearables data.
                 Representing higher-order association \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "18",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chai:2023:MLC,
  author =       "Yidong Chai and Hongyan Liu and Jie Xu and Sagar
                 Samtani and Yuanchun Jiang and Haoxin Liu",
  title =        "A Multi-Label Classification with an Adversarial-Based
                 Denoising Autoencoder for Medical Image Annotation",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "19:1--19:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3561653",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3561653",
  abstract =     "Medical image annotation aims to automatically
                 describe the content of medical images. It helps
                 doctors to understand the content of medical images and
                 make better informed decisions like diagnoses. Existing
                 methods mainly follow the approach for natural
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "19",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Unger:2023:DNA,
  author =       "Moshe Unger and Pan Li and Sahana (Shahana) Sen and
                 Alexander Tuzhilin",
  title =        "Don't Need All Eggs in One Basket: Reconstructing
                 Composite Embeddings of Customers from
                 Individual-Domain Embeddings",
  journal =      j-TMIS,
  volume =       "14",
  number =       "2",
  pages =        "20:1--20:??",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3578710",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 27 07:09:25 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578710",
  abstract =     "Although building a 360-degree comprehensive view of a
                 customer has been a long-standing goal in marketing,
                 this challenge has not been successfully addressed in
                 many marketing applications because fractured customer
                 data stored across different ``silos'' \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "20",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Mishra:2023:EED,
  author =       "Rahul Mishra and Dharavath Ramesh and Salil S. Kanhere
                 and Damodar Reddy Edla",
  title =        "Enabling Efficient Deduplication and Secure
                 Decentralized Public Auditing for Cloud Storage: a
                 Redactable Blockchain Approach",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "21:1--21:??",
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3578555",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 30 12:00:07 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3578555",
  abstract =     "Public auditing and data deduplication are integral
                 considerations in providing efficient and secure cloud
                 storage services. Nevertheless, the traditional data
                 deduplication models \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "21",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Rubin:2023:UTA,
  author =       "Eran Rubin and Izak Benbasat",
  title =        "Using {Toulmin}'s Argumentation Model to Enhance Trust
                 in Analytics-Based Advice Giving Systems",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "22:1--22:??",
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3580479",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 30 12:00:07 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3580479",
  abstract =     "Ecommerce websites increasingly provide predictive
                 analytics-based advice (PAA), such as advice about
                 future potential price reductions. Establishing
                 consumer-trust in these \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "22",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Du:2023:IMK,
  author =       "Kelvin Du and Frank Xing and Erik Cambria",
  title =        "Incorporating Multiple Knowledge Sources for Targeted
                 Aspect-based Financial Sentiment Analysis",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "23:1--23:??",
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3580480",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 30 12:00:07 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3580480",
  abstract =     "Combining symbolic and subsymbolic methods has become
                 a promising strategy as research tasks in AI grow
                 increasingly complicated and require higher levels of
                 understanding. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "23",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Chua:2023:SFD,
  author =       "Cecil Eng Huang Chua and Fred Niederman",
  title =        "Situational Factor Determinants of the Allocation of
                 Decision Rights to Edge Computers",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "24:1--24:??",
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3582081",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 30 12:00:07 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3582081",
  abstract =     "Internet of Things (IoT) designers frequently must
                 determine whether action-oriented decisions should be
                 made by edge computers or whether they should be made
                 only by \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "24",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Siering:2023:PPP,
  author =       "Michael Siering",
  title =        "Peer-to-Peer {(P2P)} Lending Risk Management:
                 Assessing Credit Risk on Social Lending Platforms Using
                 Textual Factors",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "25:1--25:??",
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3589003",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Aug 30 12:00:07 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3589003",
  abstract =     "Peer-to-peer (P2P) lending platforms offer Internet
                 users the possibility to borrow money from peers
                 without the intervention of traditional financial
                 institutions. Due to \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "25",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Shen:2023:ECA,
  author =       "Dazhong Shen and Hengshu Zhu and Keli Xiao and Xi
                 Zhang and Hui Xiong",
  title =        "Exploiting Connections among Personality, Job
                 Position, and Work Behavior: Evidence from Joint
                 {Bayesian} Learning",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "26:1--26:??",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3607875",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Sep 19 06:58:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3607875",
  abstract =     "Personality has been considered as a driving factor
                 for work engagement, which significantly affects
                 people's role performance at work. Although existing
                 research has \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "26",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Ang:2023:PER,
  author =       "Gary Ang and Zhiling Guo and Ee-Peng Lim",
  title =        "On Predicting {ESG} Ratings Using Dynamic Company
                 Networks",
  journal =      j-TMIS,
  volume =       "14",
  number =       "3",
  pages =        "27:1--27:??",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3607874",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Tue Sep 19 06:58:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3607874",
  abstract =     "Environmental, social and governance (ESG)
                 considerations play an increasingly important role due
                 to the growing focus on sustainability globally.
                 Entities, such as banks and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "27",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Li:2023:ISI,
  author =       "Xin Li and Juhee Kwon and Balaji Padmanabhan and
                 Pengzhu Zhang",
  title =        "Introduction to the Special Issue on {IT}-enabled
                 Business Management and Decision Making in the (Post)
                 {Covid-19} Era",
  journal =      j-TMIS,
  volume =       "14",
  number =       "4",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3627995",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Dec 13 11:34:23 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627995",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "28",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Guo:2023:SDH,
  author =       "Tianjian Guo and Indranil Bardhan and Anjum Khurshid",
  title =        "Social Determinants of Health and {ER} Utilization:
                 Role of Information Integration during {COVID-19}",
  journal =      j-TMIS,
  volume =       "14",
  number =       "4",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3583077",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Dec 13 11:34:23 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3583077",
  abstract =     "Emergency room (ER) admissions are the front door for
                 the utilization of a community's health resources and
                 serve as a valuable proxy for a community health
                 system's capacity. \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "29",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Killoran:2023:IIC,
  author =       "Jayson Andrew Killoran and Tracy A. Jenkin and Jasmin
                 Manseau",
  title =        "{ICT} Interactions and {COVID-19} --- a Theorization
                 Across Two Pandemic Waves",
  journal =      j-TMIS,
  volume =       "14",
  number =       "4",
  pages =        "30:1--30:??",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3597938",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Dec 13 11:34:23 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3597938",
  abstract =     "The COVID-19 pandemic instigated the rapid shift to
                 remote work and virtual interactions, constituting a
                 new normal of professional interaction over information
                 and \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "30",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pilato:2023:MSS,
  author =       "Giovanni Pilato and Fabio Persia and Mouzhi Ge and
                 Theodoros Chondrogiannis and Daniela D'Auria",
  title =        "A Modular Social Sensing System for Personalized
                 Orienteering in the {COVID-19} Era",
  journal =      j-TMIS,
  volume =       "14",
  number =       "4",
  pages =        "31:1--31:??",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3615359",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Dec 13 11:34:23 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3615359",
  abstract =     "Orienteering or itinerary planning algorithms in
                 tourism are used to optimize travel routes by
                 considering user preference and other constraints, such
                 as time budget or \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "31",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Zeng:2023:DAO,
  author =       "Xiao Zeng and David Ji and Dimple R. Thadani and
                 Boying Li and Xiaodie Pu and Zhao Cai and Patrick Y. K.
                 Chau",
  title =        "Disentangling Affordances of Online Collaboration
                 Tools for Mutual Aid in Emergencies: Insights from the
                 {COVID-19} Lockdown",
  journal =      j-TMIS,
  volume =       "14",
  number =       "4",
  pages =        "32:1--32:??",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3593056",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Wed Dec 13 11:34:23 MST 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3593056",
  abstract =     "With the uncertain trajectory of COVID-19 conditions
                 worldwide, there lies the potential for emergencies to
                 arise, abruptly yielding mass social and economic
                 disruption. Gaining \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "32",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Lo:2024:NMG,
  author =       "Pei-Chi Lo and Ee-Peng Lim",
  title =        "Non-monotonic Generation of Knowledge Paths for
                 Context Understanding",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3627994",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3627994",
  abstract =     "Knowledge graphs can be used to enhance text search
                 and access by augmenting textual content with relevant
                 background knowledge. While many large knowledge graphs
                 are available, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "1",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Aouachria:2024:PMM,
  author =       "Moufida Aouachria and Abderrahmane Leshob and
                 Abdessamed R{\'e}da Ghomari and Mustapha Aouache",
  title =        "A Process Mining Method for Inter-organizational
                 Business Process Integration",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3638062",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3638062",
  abstract =     "Business process integration (BPI) allows
                 organizations to connect and automate their business
                 processes in order to deliver the right economic
                 resources at the right time, \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "2",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Pytel:2024:DDT,
  author =       "Norman Pytel and Christian Ziegler and Axel
                 Winkelmann",
  title =        "From Dissonance to Dialogue: a Token-Based Approach to
                 Bridge the Gap Between Manufacturers and Customers",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3639058",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3639058",
  abstract =     "This article presents a novel token-based recall
                 communication system, which integrates Enterprise
                 Resource Planning (ERP) systems and blockchain
                 technology to enhance \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "3",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Storey:2024:DSI,
  author =       "Veda C. Storey and Richard Baskerville",
  title =        "Design with {Simon}'s Inner and Outer Environments:
                 Theoretical Foundations for Design Science Research
                 Methods for Digital Science",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3640819",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3640819",
  abstract =     "Design science research has traditionally been applied
                 to complex real-world problems to produce an artifact
                 to address such problems. Although design science
                 research \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "4",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Fernandez:2024:ABM,
  author =       "Joaquin Delgado Fernandez and Tom Barbereau and
                 Orestis Papageorgiou",
  title =        "Agent-Based Model of Initial Token Allocations:
                 Simulating Distributions post Fair Launch",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "5:1--5:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3649318",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3649318",
  abstract =     "With advancements in distributed ledger technologies
                 and smart contracts, tokenized voting rights gained
                 prominence within decentralized finance (DeFi). Voting
                 \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "5",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

@Article{Quattrocchi:2024:DPS,
  author =       "Giovanni Quattrocchi and Willem-Jan van den Heuvel and
                 Damian Andrew Tamburri",
  title =        "The Data Product-service Composition Frontier: a
                 Hybrid Learning Approach",
  journal =      j-TMIS,
  volume =       "15",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3649319",
  ISSN =         "2158-656X (print), 2158-6578 (electronic)",
  ISSN-L =       "2158-656X",
  bibdate =      "Mon Mar 25 11:34:33 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/tmis.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3649319",
  abstract =     "The service dominant logic is a base concept behind
                 modern economies and software products, with service
                 composition being a well-known practice for companies
                 to gain a \ldots{}",
  acknowledgement = ack-nhfb,
  ajournal =     "ACM Trans. Manag. Inf. Syst.",
  articleno =    "6",
  fjournal =     "ACM Transactions on Management Information Systems
                 (TMIS)",
  journal-URL =  "https://dl.acm.org/loi/tmis",
}

%%% TO DO: [19-Sep-2023] Check for new papers in last recorded issue