Table of contents for issues of ACM Transactions on Management Information Systems (TMIS)

Last update: Mon Mar 25 11:37:42 MDT 2024                Valid HTML 3.2!

Volume 1, Number 1, December, 2010
Volume 2, Number 1, March, 2011
Volume 2, Number 2, June, 2011
Volume 2, Number 3, October, 2011
Volume 2, Number 4, December, 2011
Volume 3, Number 1, April, 2012
Volume 3, Number 2, July, 2012
Volume 3, Number 3, October, 2012
Volume 3, Number 4, January, 2013
Volume 4, Number 1, April, 2013
Volume 4, Number 2, August, 2013
Volume 4, Number 3, October, 2013
Volume 4, Number 4, December, 2013
Volume 5, Number 1, April, 2014
Volume 5, Number 2, July, 2014
Volume 5, Number 3, January, 2015
Volume 5, Number 4, January, 2015
Volume 6, Number 1, February, 2015
Volume 6, Number 2, July, 2015
Volume 6, Number 3, October, 2015
Volume 6, Number 4, January, 2016
Volume 7, Number 1, March, 2016
Volume 7, Number 2, August, 2016
Volume 7, Number 3, October, 2016
Volume 7, Number 4, January, 2017
Volume 8, Number 1, May, 2017
Volume 8, Number 2--3, August, 2017
Volume 8, Number 4, September, 2017
Volume 9, Number 1, February, 2018
Volume 9, Number 2, September, 2018
Volume 9, Number 3, November, 2018
Volume 9, Number 4, March, 2019
Volume 10, Number 1, May, 2019
Volume 10, Number 2, August, 2019
Volume 10, Number 3, November, 2019
Volume 10, Number 4, December, 2019
Volume 11, Number 1, April, 2020
Volume 11, Number 2, July, 2020
Volume 11, Number 3, August, 2020
Volume 11, Number 4, December, 2020
Volume 12, Number 1, March, 2021
Volume 12, Number 2, June, 2021
Volume 12, Number 3, July, 2021
Volume 12, Number 4, December, 2021
Volume 13, Number 1, March, 2022
Volume 13, Number 2, June, 2022
Volume 13, Number 3, September, 2022
Volume 13, Number 4, December, 2022
Volume 14, Number 1, March, 2023
Volume 14, Number 2, June, 2023
Volume 14, Number 3, 2023
Volume 14, Number 4, December, 2023
Volume 15, Number 1, March, 2024


ACM Transactions on Management Information Systems (TMIS)
Volume 1, Number 1, December, 2010

                  Hsinchun Chen   Editorial: Welcome to the first issue of
                                  ACM TMIS . . . . . . . . . . . . . . . . 1:1--1:??
            Gordon B. Davis and   
                  Paul Gray and   
             Stuart Madnick and   
           Jay F. Nunamaker and   
              Ralph Sprague and   
                Andrew Whinston   Ideas for the future of the IS field . . 2:1--2:??
               Jingguo Wang and   
                   Nan Xiao and   
                  H. Raghav Rao   Drivers of information security search
                                  behavior: an investigation of network
                                  attacks and vulnerability disclosures    3:1--3:??
                   Sulin Ba and   
                     Dan Ke and   
              Jan Stallaert and   
                  Zhongju Zhang   Why give away something for nothing?
                                  Investigating virtual goods pricing and
                                  permission strategies  . . . . . . . . . 4:1--4:??
                    Lan Cao and   
     Balasubramaniam Ramesh and   
              Tarek Abdel-Hamid   Modeling dynamics in agile software
                                  development  . . . . . . . . . . . . . . 5:1--5:??
                 Ofer Arazy and   
                  Arie Croitoru   The sustainability of corporate wikis: a
                                  time-series analysis of activity
                                  patterns . . . . . . . . . . . . . . . . 6:1--6:??
                      Yu Fu and   
               Zhiyuan Chen and   
                 Gunes Koru and   
             Aryya Gangopadhyay   A privacy protection technique for
                                  publishing data mining models and
                                  research data  . . . . . . . . . . . . . 7:1--7:??


ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 1, March, 2011

                  Hsinchun Chen   Editorial: Design science, grand
                                  challenges, and societal impacts . . . . 1:1--1:??
                   Michael Chau   Visualizing Web search results using
                                  glyphs: Design and evaluation of a
                                  flower metaphor  . . . . . . . . . . . . 2:1--2:??
              Feng-Yang Kuo and   
                    Chun-Po Yin   A linguistic analysis of group support
                                  systems interactions for uncovering
                                  social realities of organizations  . . . 3:1--3:??
                 Gerald C. Kane   A multimethod study of information
                                  quality in wiki collaboration  . . . . . 4:1--4:??
          Gregory S. Dawson and   
              Richard T. Watson   Uncovering and testing archetypes of
                                  effective public sector CIOs . . . . . . 5:1--5:??
              Debabrata Dey and   
                   Ming Fan and   
                      Gang Peng   Computer use and wage returns: The
                                  complementary roles of IT-related human
                                  capital and nonroutine tasks . . . . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 2, June, 2011

            Paul Jen-Hwa Hu and   
                  Hsinchun Chen   Analyzing information systems
                                  researchers' productivity and impacts: a
                                  perspective on the $H$ index . . . . . . 7:1--7:??
        Sudip Bhattacharjee and   
               Ram D. Gopal and   
           James R. Marsden and   
        Ramesh Sankaranarayanan   Digital goods and markets: Emerging
                                  issues and challenges  . . . . . . . . . 8:1--8:??
                Matthias W. Uhl   Explaining U.S. consumer behavior with
                                  news sentiment . . . . . . . . . . . . . 9:1--9:??
                 Anna Ye Du and   
               Sanjukta Das and   
               Ram D. Gopal and   
                      R. Ramesh   Risk hedging in storage grid markets: Do
                                  options add value to forwards? . . . . . 10:1--10:??
                    Jun Liu and   
                      Sudha Ram   Who does what: Collaboration patterns in
                                  the Wikipedia and their impact on
                                  article quality  . . . . . . . . . . . . 11:1--11:??
       D. Harrison Mcknight and   
            Michelle Carter and   
     Jason Bennett Thatcher and   
                   Paul F. Clay   Trust in a specific technology: an
                                  investigation of its components and
                                  measures . . . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 3, October, 2011

             Alexander Tuzhilin   Knowledge management revisited: Old
                                  Dogs, New tricks . . . . . . . . . . . . 13:1--13:??
            Juliana Sutanto and   
         Atreyi Kankanhalli and   
         Bernard Cheng Yian Tan   Eliciting a sense of virtual community
                                  among knowledge contributors . . . . . . 14:1--14:??
                  Jing Peng and   
             Daniel D. Zeng and   
                      Zan Huang   Latent subject-centered modeling of
                                  collaborative tagging: an application in
                                  social search  . . . . . . . . . . . . . 15:1--15:??
          Mohammad M. Masud and   
      Tahseen M. Al-Khateeb and   
            Kevin W. Hamlen and   
                   Jing Gao and   
               Latifur Khan and   
                 Jiawei Han and   
          Bhavani Thuraisingham   Cloud-based malware detection for
                                  evolving data streams  . . . . . . . . . 16:1--16:??
      Susanne Schmidt-Rauch and   
                Gerhard Schwabe   From telesales to tele-advisory in
                                  travel agencies: Business problems,
                                  generic design goals and requirements    17:1--17:??
               Ke-Wei Huang and   
                     Zhuolun Li   A multilabel text classification
                                  algorithm for labeling risk factors in
                                  SEC form 10-K  . . . . . . . . . . . . . 18:1--18:??
              Ming-Chih Lin and   
          Anthony J. T. Lee and   
               Rung-Tai Kao and   
                   Kuo-Tay Chen   Stock price movement prediction using
                                  representative prototypes of financial
                                  reports  . . . . . . . . . . . . . . . . 19:1--19:??

ACM Transactions on Management Information Systems (TMIS)
Volume 2, Number 4, December, 2011

      Jay F. Nunamaker, Jr. and   
               Robert O. Briggs   Toward a broader vision for Information
                                  Systems  . . . . . . . . . . . . . . . . 20:1--20:??
         Balaji Padmanabhan and   
                Alan Hevner and   
             Michael Cuenco and   
                    Crystal Shi   From information to operations: Service
                                  quality and customer retention . . . . . 21:1--21:??
                 Huaxia Rui and   
                Andrew Whinston   Designing a social-broadcasting-based
                                  business intelligence system . . . . . . 22:1--22:??
                 Hina Arora and   
                T. S. Raghu and   
                     Ajay Vinze   Decision support for containing pandemic
                                  propagation  . . . . . . . . . . . . . . 23:1--23:??
                 Paulo Goes and   
                  Noyan Ilk and   
                 Wei T. Yue and   
                   J. Leon Zhao   Live-chat agent assignments to
                                  heterogeneous e-customers under
                                  imperfect classification . . . . . . . . 24:1--24:??
          Raymond Y. K. Lau and   
                 S. Y. Liao and   
           Ron Chi-Wai Kwok and   
                 Kaiquan Xu and   
                Yunqing Xia and   
                     Yuefeng Li   Text mining and probabilistic language
                                  modeling for online review spam
                                  detection  . . . . . . . . . . . . . . . 25:1--25:??
              Frederik Marx and   
         Jörg H. Mayer and   
                  Robert Winter   Six principles for redesigning executive
                                  information systems-findings of a survey
                                  and evaluation of a prototype  . . . . . 26:1--26:??


ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 1, April, 2012

             Fred Niederman and   
             Salvatore T. March   Design science and the accumulation of
                                  knowledge in the information systems
                                  discipline . . . . . . . . . . . . . . . 1:1--1:??
            K. Asli Basoglu and   
             Mark A. Fuller and   
             Joseph S. Valacich   Enhancement of recall within
                                  technology-mediated teams through the
                                  use of online visual artifacts . . . . . 2:1--2:??
      Gediminas Adomavicius and   
                 Jingjing Zhang   Impact of data characteristics on
                                  recommender systems performance  . . . . 3:1--3:??
        William N. Robinson and   
             Arash Akhlaghi and   
               Tianjie Deng and   
                  Ali Raza Syed   Discovery and diagnosis of behavioral
                                  transitions in patient event streams . . 4:1--4:??
                  Zhu Zhang and   
                     Xin Li and   
                      Yubo Chen   Deciphering word-of-mouth in social
                                  media: Text-based metrics of consumer
                                  reviews  . . . . . . . . . . . . . . . . 5:1--5:??
            Arvind Malhotra and   
                  Ann Majchrzak   How virtual teams use their virtual
                                  workspace to coordinate knowledge  . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 2, July, 2012

              Wil van der Aalst   Process Mining: Overview and
                                  Opportunities  . . . . . . . . . . . . . 7:1--7:??
                   Zhe Shan and   
                    Akhil Kumar   Optimal Adapter Creation for Process
                                  Composition in Synchronous vs.
                                  Asynchronous Communication . . . . . . . 8:1--8:??
                  Zan Huang and   
                Huimin Zhao and   
                        Dan Zhu   Two New Prediction-Driven Approaches to
                                  Discrete Choice Prediction . . . . . . . 9:1--9:??
           Thomas L. Ngo-Ye and   
                 Atish P. Sinha   Analyzing Online Review Helpfulness
                                  Using a Regressional ReliefF-Enhanced
                                  Text Mining Method . . . . . . . . . . . 10:1--10:??
         Philipp Nussbaumer and   
                 Inu Matter and   
                Gerhard Schwabe   ``Enforced'' vs. ``Casual'' Transparency
                                  --- Findings from IT-Supported Financial
                                  Advisory Encounters  . . . . . . . . . . 11:1--11:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 3, October, 2012

         Roger H. L. Chiang and   
                 Paulo Goes and   
                Edward A. Stohr   Business Intelligence and Analytics
                                  Education, and Program Development: a
                                  Unique Opportunity for the Information
                                  Systems Discipline . . . . . . . . . . . 12:1--12:??
      Palakorn Achananuparp and   
                Ee-Peng Lim and   
                 Jing Jiang and   
                 Tuan-Anh Hoang   Who is Retweeting the Tweeters?
                                  Modeling, Originating, and Promoting
                                  Behaviors in the Twitter Network . . . . 13:1--13:??
                Hsin-Min Lu and   
              Feng-Tse Tsai and   
              Hsinchun Chen and   
               Mao-Wei Hung and   
                   Shu-Hsing Li   Credit Rating Change Modeling Using News
                                  and Financial Ratios . . . . . . . . . . 14:1--14:??
                    Wei Wei and   
                      Sudha Ram   Using a Network Analysis Approach for
                                  Organizing Social Bookmarking Tags and
                                  Enabling Web Content Discovery . . . . . 15:1--15:??
                     Nan Hu and   
            Hasan Cavusoglu and   
                   Ling Liu and   
                     Chenkai Ni   Do Vendors' Pricing Decisions Fully
                                  Reflect Information in Online Reviews?   16:1--16:??

ACM Transactions on Management Information Systems (TMIS)
Volume 3, Number 4, January, 2013

                Ee-Peng Lim and   
              Hsinchun Chen and   
                   Guoqing Chen   Business Intelligence and Analytics:
                                  Research Directions  . . . . . . . . . . 17:1--17:??
                  Bin Zhang and   
           Andrew C. Thomas and   
            Patrick Doreian and   
           David Krackhardt and   
               Ramayya Krishnan   Contrasting Multiple Social Network
                                  Autocorrelations for Binary Outcomes,
                                  With Applications To Technology Adoption 18:1--18:??
              Nargis Pervin and   
                  Fang Fang and   
              Anindya Datta and   
              Kaushik Dutta and   
               Debra Vandermeer   Fast, Scalable, and Context-Sensitive
                                  Detection of Trending Topics in
                                  Microblog Post Streams . . . . . . . . . 19:1--19:??
                  Zhu Zhang and   
                Chenhui Guo and   
                     Paulo Goes   Product Comparison Networks for
                                  Competitive Analysis of Online
                                  Word-of-Mouth  . . . . . . . . . . . . . 20:1--20:??


ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 1, April, 2013

               Niam Yaraghi and   
                 Anna Ye Du and   
                Raj Sharman and   
               Ram D. Gopal and   
                      R. Ramesh   Network Effects in Health Information
                                  Exchange Growth  . . . . . . . . . . . . 1:1--1:??
              Rohit Valecha and   
                Raj Sharman and   
              H. Raghav Rao and   
              Shambhu Upadhyaya   A Dispatch-Mediated Communication Model
                                  for Emergency Response Systems . . . . . 2:1--2:??
                   Jae Choi and   
          Derek L. Nazareth and   
                 Hemant K. Jain   The Impact of SOA Implementation on
                                  IT-Business Alignment: a System Dynamics
                                  Approach . . . . . . . . . . . . . . . . 3:1--3:??
                Azmat Ullah and   
                    Richard Lai   A Systematic Review of Business and
                                  Information Technology Alignment . . . . 4:1--4:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 2, August, 2013

            T. Grandon Gill and   
                 Alan R. Hevner   A Fitness-Utility Model for Design
                                  Science Research . . . . . . . . . . . . 5:1--5:??
                  Jiming Wu and   
             Clyde W. Holsapple   Does Knowledge Management Matter? The
                                  Empirical Evidence from Market-Based
                                  Valuation  . . . . . . . . . . . . . . . 6:1--6:??
                Levent V. Orman   Bayesian Inference in Trust Networks . . 7:1--7:??
                  Zhu Zhang and   
             Daniel D. Zeng and   
               Ahmed Abbasi and   
                  Jing Peng and   
                 Xiaolong Zheng   A Random Walk Model for Item
                                  Recommendation in Social Tagging Systems 8:1--8:??
         Douglas C. Derrick and   
          Thomas O. Meservy and   
         Jeffrey L. Jenkins and   
           Judee K. Burgoon and   
          Jay F. Nunamaker, Jr.   Detecting Deceptive Chat-Based
                                  Communication Using Typing Behavior and
                                  Message Cues . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 3, October, 2013

           Suprateek Sarker and   
       Suranjan Chakraborty and   
  Patriya Silpakit Tansuhaj and   
                Mark Mulder and   
     Kivilcim Dogerlioglu-Demir   The ``Mail-Order-Bride'' (MOB)
                                  Phenomenon in the Cyberworld: an
                                  Interpretive Investigation . . . . . . . 10:1--10:??
              Narges Kasiri and   
                  Ramesh Sharda   Real Options and System Dynamics for
                                  Information Technology Investment
                                  Decisions: Application to RFID Adoption
                                  in Retail  . . . . . . . . . . . . . . . 11:1--11:??
              George Mathew and   
                Zoran Obradovic   Distributed Privacy-Preserving Decision
                                  Support System for Highly Imbalanced
                                  Clinical Data  . . . . . . . . . . . . . 12:1--12:??
              Masato Sakata and   
          Zeynep Yücel and   
         Kazuhiko Shinozawa and   
            Norihiro Hagita and   
               Michita Imai and   
           Michiko Furutani and   
                Rumiko Matsuoka   An Inference Engine for Estimating
                                  Outside States of Clinical Test Items    13:1--13:??
               Alex Edgcomb and   
                    Frank Vahid   Accurate and Efficient Algorithms that
                                  Adapt to Privacy-Enhanced Video for
                                  Improved Assistive Monitoring  . . . . . 14:1--14:??

ACM Transactions on Management Information Systems (TMIS)
Volume 4, Number 4, December, 2013

        Christopher C. Yang and   
                Gondy Leroy and   
               Sophia Ananiadou   Smart Health and Wellbeing . . . . . . . 15:1--15:??
                Zidong Wang and   
               Julie Eatock and   
              Sally McClean and   
                Dongmei Liu and   
                Xiaohui Liu and   
                    Terry Young   Modeling Throughput of Emergency
                                  Departments via Time Series: an
                                  Expectation Maximization Algorithm . . . 16:1--16:??
                   He Zhang and   
             Sanjay Mehotra and   
            David Liebovitz and   
             Carl A. Gunter and   
                  Bradley Malin   Mining Deviations from Patient Care
                                  Pathways via Electronic Medical Record
                                  System Audits  . . . . . . . . . . . . . 17:1--17:??
               Rajiv Khosla and   
                    Mei-Tai Chu   Embodying Care in Matilda: an Affective
                                  Communication Robot for Emotional
                                  Wellbeing of Older People in Australian
                                  Residential Care Facilities  . . . . . . 18:1--18:??
          Christine Lisetti and   
                 Reza Amini and   
               Ugan Yasavur and   
                 Naphtali Rishe   I Can Help You Change! An Empathic
                                  Virtual Agent Delivers Behavior Change
                                  Health Interventions . . . . . . . . . . 19:1--19:??
              Rajesh Mirani and   
                 Anju Harpalani   Business Benefits or Incentive
                                  Maximization? Impacts of the Medicare
                                  EHR Incentive Program at Acute Care
                                  Hospitals  . . . . . . . . . . . . . . . 20:1--20:??


ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 1, April, 2014

                Joyce C. Ho and   
               Cheng H. Lee and   
                  Joydeep Ghosh   Septic Shock Prediction for Patients
                                  with Missing Data  . . . . . . . . . . . 1:1--1:??
        Christopher C. Yang and   
               Haodong Yang and   
                     Ling Jiang   Postmarketing Drug Safety Surveillance
                                  Using Publicly Available
                                  Health-Consumer-Contributed Content in
                                  Social Media . . . . . . . . . . . . . . 2:1--2:??
              Salah Bouktif and   
            Houari Sahraoui and   
                   Faheem Ahmed   Predicting Stability of Open-Source
                                  Software Systems Using Combination of
                                  Bayesian Classifiers . . . . . . . . . . 3:1--3:??
                Lihua Huang and   
                   Sulin Ba and   
                    Xianghua Lu   Building Online Trust in a Culture of
                                  Confucianism: The Impact of Process
                                  Flexibility and Perceived Control  . . . 4:1--4:??
                M. Lisa Yeo and   
               Erik Rolland and   
          Jackie Rees Ulmer and   
           Raymond A. Patterson   Risk Mitigation Decisions for IT
                                  Security . . . . . . . . . . . . . . . . 5:1--5:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 2, July, 2014

                  S. E. Goodman   Building the Nation's Cyber Security
                                  Workforce: Contributions from the CAE
                                  Colleges and Universities  . . . . . . . 6:1--6:??
            Suruchi Deodhar and   
            Keith R. Bisset and   
             Jiangzhuo Chen and   
                   Yifei Ma and   
              Madhav V. Marathe   An Interactive, Web-Based High
                                  Performance Modeling Environment for
                                  Computational Epidemiology . . . . . . . 7:1--7:??
             Patty Kostkova and   
            Martin Szomszor and   
                Connie St. Luis   #swineflu: The Use of Twitter as an
                                  Early Warning and Risk Communication
                                  Tool in the 2009 Swine Flu Pandemic  . . 8:1--8:??
             Chih-Fong Tsai and   
                    Zen-Yu Quan   Stock Prediction by Searching for
                                  Similarities in Candlestick Charts . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 3, January, 2015

             Matthias Jarke and   
                 Kalle Lyytinen   Editorial: ``Complexity of Systems
                                  Evolution: Requirements Engineering
                                  Perspective''  . . . . . . . . . . . . . 11:1--11:??
            Gilbert Fridgen and   
                Julia Klier and   
               Martina Beer and   
                    Thomas Wolf   Improving Business Value Assurance in
                                  Large-Scale IT Projects --- a
                                  Quantitative Method Based on Founded
                                  Requirements Assessment  . . . . . . . . 12:1--12:??
           John Leslie King and   
                  Carl P. Simon   Complications with Complexity in
                                  Requirements . . . . . . . . . . . . . . 13:1--13:??
       Suranjan Chakraborty and   
       Christoph Rosenkranz and   
                 Josh Dehlinger   Getting to the Shalls: Facilitating
                                  Sensemaking in Requirements Engineering  14:1--14:??
         Md Rashed I. Nekvi and   
              Nazim H. Madhavji   Impediments to Regulatory Compliance of
                                  Requirements in Contractual Systems
                                  Engineering Projects: a Case Study . . . 15:1--15:??
               Radhika Jain and   
                    Lan Cao and   
               Kannan Mohan and   
         Balasubramaniam Ramesh   Situated Boundary Spanning: an Empirical
                                  Investigation of Requirements
                                  Engineering Practices in Product Family
                                  Development  . . . . . . . . . . . . . . 16:1--16:??
             Ivan J. Jureta and   
          Alexander Borgida and   
              Neil A. Ernst and   
                John Mylopoulos   The Requirements Problem for Adaptive
                                  Systems  . . . . . . . . . . . . . . . . 17:1--17:??

ACM Transactions on Management Information Systems (TMIS)
Volume 5, Number 4, January, 2015

               G. Alan Wang and   
         Harry Jiannan Wang and   
                  Jiexun Li and   
           Alan S. Abrahams and   
                     Weiguo Fan   An Analytical Framework for
                                  Understanding Knowledge-Sharing
                                  Processes in Online Q&A Communities . . . 18:1--18:??
          Andrew Partington and   
                   Moe Wynn and   
            Suriadi Suriadi and   
                Chun Ouyang and   
                Jonathan Karnon   Process Mining for Clinical Processes: a
                                  Comparative Analysis of Four Australian
                                  Hospitals  . . . . . . . . . . . . . . . 19:1--19:??
                  Jiaqi Yan and   
                  Daning Hu and   
            Stephen S. Liao and   
                  Huaiqing Wang   Mining Agents' Goals in Agent-Oriented
                                  Business Processes . . . . . . . . . . . 20:1--20:??
             Thushari Silva and   
                    Ma Jian and   
                      Yang Chen   Process Analytics Approach for R&D
                                  Project Selection  . . . . . . . . . . . 21:1--21:??
                 Xitong Guo and   
              Sherry X. Sun and   
                     Doug Vogel   A Dataflow Perspective for Business
                                  Process Integration  . . . . . . . . . . 22:1--22:??
                  Jie Jiang and   
            Huib Aldewereld and   
            Virginia Dignum and   
                    Yao-Hua Tan   Compliance Checking of Organizational
                                  Interactions . . . . . . . . . . . . . . 23:1--23:??
          Claudio Di Ciccio and   
                Massimo Mecella   On the Discovery of Declarative Control
                                  Flows for Artful Processes . . . . . . . 24:1--24:??
             Thorben Keller and   
Frédéric Thiesse and   
                  Elgar Fleisch   Classification Models for RFID-Based
                                  Real-Time Detection of Process Events in
                                  the Supply Chain: an Empirical Study . . 25:1--25:??


ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 1, February, 2015

           Donald J. Berndt and   
            James A. McCart and   
             Dezon K. Finch and   
              Stephen L. Luther   A Case Study of Data Quality in Text
                                  Mining Clinical Progress Notes . . . . . 1:1--1:??
               David Zimbra and   
              Hsinchun Chen and   
                Robert F. Lusch   Stakeholder Analyses of Firm-Related Web
                                  Forums: Applications in Stock Return
                                  Prediction . . . . . . . . . . . . . . . 2:1--2:??
               Shing-Han Li and   
               Yu-Cheng Kao and   
           Zong-Cyuan Zhang and   
           Ying-Ping Chuang and   
                   David C. Yen   A Network Behavior-Based Botnet
                                  Detection Mechanism Using PSO and
                                  $K$-means  . . . . . . . . . . . . . . . 3:1--3:??
              Yen-Hsien Lee and   
            Paul Jen-Hwa Hu and   
                    Ching-Yi Tu   Ontology-Based Mapping for Automated
                                  Document Management: a Concept-Based
                                  Technique for Word Mismatch and
                                  Ambiguity Problems in Document
                                  Clustering . . . . . . . . . . . . . . . 4:1--4:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 2, July, 2015

            Juliana Sutanto and   
         Atreyi Kankanhalli and   
         Bernard Cheng Yian Tan   Investigating Task Coordination in
                                  Globally Dispersed Teams: a Structural
                                  Contingency Perspective  . . . . . . . . 5:1--5:??
            Rahul C. Basole and   
          Martha G. Russell and   
       Jukka Huhtamäki and   
                Neil Rubens and   
                Kaisa Still and   
                   Hyunwoo Park   Understanding Business Ecosystem
                                  Dynamics: a Data-Driven Approach . . . . 6:1--6:??
               Xiaohui Zhao and   
               Chengfei Liu and   
           Sira Yongchareon and   
         Marek Kowalkiewicz and   
                    Wasim Sadiq   Role-Based Process View Derivation and
                                  Composition  . . . . . . . . . . . . . . 7:1--7:??
                Dengpan Liu and   
               Sumit Sarkar and   
        Chelliah Sriskandarajah   Who's Next? Scheduling Personalization
                                  Services with Variable Service Times . . 8:1--8:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 3, October, 2015

                    Xue Bai and   
           James R. Marsden and   
       William T. Ross, Jr. and   
                      Gang Wang   Relationships Among Minimum
                                  Requirements, Facebook Likes, and
                                  Groupon Deal Outcomes  . . . . . . . . . 9:1--9:??
             Tanmay Bhowmik and   
                    Nan Niu and   
           Prachi Singhania and   
                    Wentao Wang   On the Role of Structural Holes in
                                  Requirements Identification: an
                                  Exploratory Study on Open-Source
                                  Software Development . . . . . . . . . . 10:1--10:??
     Devipsita Bhattacharya and   
                      Sudha Ram   RT @News: an Analysis of News Agency Ego
                                  Networks in a Microblogging Environment  11:1--11:??
                Arindam Roy and   
               Shamik Sural and   
        Arun Kumar Majumdar and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   Minimizing Organizational User
                                  Requirement while Meeting Security
                                  Constraints  . . . . . . . . . . . . . . 12:1--12:??

ACM Transactions on Management Information Systems (TMIS)
Volume 6, Number 4, January, 2016

      Carlos A. Gomez-Uribe and   
                      Neil Hunt   The Netflix Recommender System:
                                  Algorithms, Business Value, and
                                  Innovation . . . . . . . . . . . . . . . 13:1--13:??
        Rajiv Krishnamurthy and   
             Varghese Jacob and   
       Suresh Radhakrishnan and   
                   Kutsal Dogan   Peripheral Developer Participation in
                                  Open Source Projects: an Empirical
                                  Analysis . . . . . . . . . . . . . . . . 14:1--14:??
           Christos Liaskos and   
           Ageliki Tsioliaridou   Service Ratio-Optimal, Content
                                  Coherence-Aware Data Push Systems  . . . 15:1--15:??


ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 1, March, 2016

                Xianghua Lu and   
                   Xia Zhao and   
                       Ling Xue   Is Combining Contextual and Behavioral
                                  Targeting Strategies Effective in Online
                                  Advertising? . . . . . . . . . . . . . . 1:1--1:??
                Tsz-Wai Lui and   
               Gabriele Piccoli   The Effect of a Multichannel Customer
                                  Service System on Customer Service and
                                  Financial Performance  . . . . . . . . . 2:1--2:??
                 Yutian Sun and   
                 Jianwen Su and   
                      Jian Yang   Universal Artifacts: a New Approach to
                                  Business Process Management (BPM)
                                  Systems  . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 2, August, 2016

               Shing-Han Li and   
               David C. Yen and   
               Ying-Ping Chuang   A Real-Time Audit Mechanism Based on the
                                  Compression Technique  . . . . . . . . . 4:1--4:??
             Khayyam Hashmi and   
                 Zaki Malik and   
                Erfan Najmi and   
              Amal Alhosban and   
                Brahim Medjahed   A Web Service Negotiation Management and
                                  QoS Dependency Modeling Framework  . . . 5:1--5:??
                 Agam Gupta and   
             Biswatosh Saha and   
                Uttam K. Sarkar   Systemic Concentration in Sponsored
                                  Search Markets: The Role of Time Window
                                  in Click-Through-Rate Computation  . . . 6:1--6:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 3, October, 2016

             Ming-Feng Tsai and   
              Chuan-Ju Wang and   
                 Po-Chuan Chien   Discovering Finance Keywords via
                                  Continuous-Space Language Models . . . . 7:1--7:??
                Corentin Burnay   Are Stakeholders the Only Source of
                                  Information for Requirements Engineers?
                                  Toward a Taxonomy of Elicitation
                                  Information Sources  . . . . . . . . . . 8:1--8:??
                  Jiajie Xu and   
               Chengfei Liu and   
               Xiaohui Zhao and   
           Sira Yongchareon and   
                   Zhiming Ding   Resource Management for Business Process
                                  Scheduling in the Presence of
                                  Availability Constraints . . . . . . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 7, Number 4, January, 2017

                Arindam Roy and   
               Shamik Sural and   
        Arun Kumar Majumdar and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   On Optimal Employee Assignment in
                                  Constrained Role-Based Access Control
                                  Systems  . . . . . . . . . . . . . . . . 10:1--10:??
                   Hao Chen and   
                  Keli Xiao and   
                 Jinwen Sun and   
                        Song Wu   A Double-Layer Neural Network Framework
                                  for High-Frequency Forecasting . . . . . 11:1--11:??
                     Yan Lu and   
               Michael Chau and   
             Patrick Y. K. Chau   Are Sponsored Links Effective?
                                  Investigating the Impact of Trust in
                                  Search Engine Advertising  . . . . . . . 12:1--12:??


ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 1, May, 2017

            Anastasiia Pika and   
              Michael Leyer and   
                Moe T. Wynn and   
             Colin J. Fidge and   
  Arthur H. M. Ter Hofstede and   
        Wil M. P. Van Der Aalst   Mining Resource Profiles from Event Logs 1:1--1:??
           Saeede Eftekhari and   
               Niam Yaraghi and   
               Ranjit Singh and   
               Ram D. Gopal and   
                      R. Ramesh   Do Health Information Exchanges Deter
                                  Repetition of Medical Services?  . . . . 2:1--2:??
             Adarsh Kumar Kakar   Investigating the Relationships Between
                                  the Use Contexts, User Perceived Values,
                                  and Loyalty to a Software Product  . . . 3:1--3:??

ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 2--3, August, 2017

        Sudip Bhattacharjee and   
             Varghese Jacob and   
   Zhengrui (Jeffrey) Jiang and   
                  Subodha Kumar   Introduction to WITS 2015 Special Issue
                                  in TMIS  . . . . . . . . . . . . . . . . 4:1--4:??
               Shuyuan Deng and   
             Atish P. Sinha and   
                    Huimin Zhao   Resolving Ambiguity in Sentiment
                                  Classification: The Role of Dependency
                                  Features . . . . . . . . . . . . . . . . 4:1--4:??
      Mohammad A. Al-Ramahi and   
                    Jun Liu and   
               Omar F. El-Gayar   Discovering Design Principles for Health
                                  Behavioral Change Support Systems: a
                                  Text Mining Approach . . . . . . . . . . 5:1--5:??
                    Can Sun and   
                 Yonghua Ji and   
                Bora Kolfal and   
                  Ray Patterson   Business-to-Consumer Platform Strategy:
                                  How Vendor Certification Changes
                                  Platform and Seller Incentives . . . . . 6:1--6:??
          Konstantin Bauman and   
         Alexander Tuzhilin and   
                 Ryan Zaczynski   Using Social Sensors for Detecting
                                  Emergency Events: a Case of Power
                                  Outages in the Electrical Utility
                                  Industry . . . . . . . . . . . . . . . . 7:1--7:??
            Michael Mannino and   
           Joel Fredrickson and   
    Farnoush Banaei-Kashani and   
                 Iris Linck and   
        Raghda Alqurashi Raghda   Development and Evaluation of a
                                  Similarity Measure for Medical Event
                                  Sequences  . . . . . . . . . . . . . . . 8:1--8:??
             Atefeh Taghavi and   
                     Carson Woo   The Role Clarity Framework to Improve
                                  Requirements Gathering . . . . . . . . . 9:1--9:??
             Anik Mukherjee and   
            R. P. Sundarraj and   
                  Kaushik Dutta   Apriori Rule-Based In-App Ad Selection
                                  Online Algorithm for Improving
                                  Supply-Side Platform Revenues  . . . . . 10:1--10:??

ACM Transactions on Management Information Systems (TMIS)
Volume 8, Number 4, September, 2017

               Tuan Minh Ha and   
            Masaki Samejima and   
                Norihisa Komoda   Power and Performance Estimation for
                                  Fine-Grained Server Power Capping via
                                  Controlling Heterogeneous Applications   11:1--11:??
            Rahul C. Basole and   
              Timothy Major and   
               Arjun Srinivasan   Understanding Alliance Portfolios Using
                                  Visual Analytics . . . . . . . . . . . . 12:1--12:??
              Joseph Cazier and   
              Benjamin Shao and   
               Robert St. Louis   Value Congruence, Trust, and Their
                                  Effects on Purchase Intention and
                                  Reservation Price  . . . . . . . . . . . 13:1--13:??
           Roman Lukyanenko and   
                Binny M. Samuel   Are All Classes Created Equal?
                                  Increasing Precision of Conceptual
                                  Modeling Grammars  . . . . . . . . . . . 14:1--14:??


ACM Transactions on Management Information Systems (TMIS)
Volume 9, Number 1, February, 2018

        Zhepeng (Lionel) Li and   
                  Xiao Fang and   
            Olivia R. Liu Sheng   A Survey of Link Recommendation for
                                  Social Networks: Methods, Theoretical
                                  Foundations, and Future Research
                                  Directions . . . . . . . . . . . . . . . 1:1--1:??
                  Keli Xiao and   
                     Qi Liu and   
               Chuanren Liu and   
                      Hui Xiong   Price Shock Detection With an
                                  Influence-Based Model of Social
                                  Attention  . . . . . . . . . . . . . . . 2:1--2:??
           Suppawong Tuarob and   
                 Ray Strong and   
               Anca Chandra and   
               Conrad S. Tucker   Discovering Discontinuity in Big
                                  Financial Transaction Data . . . . . . . 3:1--3:??
               Jan Mendling and   
                 Ingo Weber and   
          Wil Van Der Aalst and   
             Jan Vom Brocke and   
        Cristina Cabanillas and   
             Florian Daniel and   
        Sòren Debois and   
          Claudio Di Ciccio and   
               Marlon Dumas and   
           Schahram Dustdar and   
                Avigdor Gal and   
Luciano García-Bañuelos and   
          Guido Governatori and   
               Richard Hull and   
           Marcello La Rosa and   
             Henrik Leopold and   
              Frank Leymann and   
                 Jan Recker and   
           Manfred Reichert and   
            Hajo A. Reijers and   
       Stefanie Rinderle-Ma and   
              Andreas Solti and   
           Michael Rosemann and   
             Stefan Schulte and   
          Munindar P. Singh and   
                Tijs Slaats and   
               Mark Staples and   
              Barbara Weber and   
          Matthias Weidlich and   
              Mathias Weske and   
                   Xiwei Xu and   
                     Liming Zhu   Blockchains for Business Process
                                  Management --- Challenges and
                                  Opportunities  . . . . . . . . . . . . . 4:1--4:??

ACM Transactions on Management Information Systems (TMIS)
Volume 9, Number 2, September, 2018

               David Zimbra and   
               Ahmed Abbasi and   
                Daniel Zeng and   
                  Hsinchun Chen   The State-of-the-Art in Twitter
                                  Sentiment Analysis: a Review and
                                  Benchmark Evaluation . . . . . . . . . . 5:1--5:??
            Rahul C. Basole and   
           Arjun Srinivasan and   
               Hyunwoo Park and   
                     Shiv Patel   ecoxight: Discovery, Exploration, and
                                  Analysis of Business Ecosystems Using
                                  Interactive Visualization  . . . . . . . 6:1--6:??
                Xiangyu Fan and   
                         Xi Niu   Implementing and Evaluating Serendipity
                                  in Delivering Personalized Health
                                  Information  . . . . . . . . . . . . . . 7:1--7:??
              Sandeep Purao and   
          Narasimha Bolloju and   
                  Chuan-Hoo Tan   A Modeling Language for Conceptual
                                  Design of Systems Integration Solutions  8:1--8:??
           Maria De-Arteaga and   
           William Herlands and   
            Daniel B. Neill and   
                Artur Dubrawski   Machine Learning for the Developing
                                  World  . . . . . . . . . . . . . . . . . 9:1--9:??

ACM Transactions on Management Information Systems (TMIS)
Volume 9, Number 3, November, 2018

            Wolfgang Ketter and   
               John Collins and   
     Maytal Saar-Tsechansky and   
                      Ori Marom   Information Systems for a Smart
                                  Electricity Grid: Emerging Challenges
                                  and Opportunities  . . . . . . . . . . . 10:1--10:??
               Daniel Russo and   
           Paolo Ciancarini and   
          Tommaso Falasconi and   
                 Massimo Tomasi   A Meta-Model for Information Systems
                                  Quality: a Mixed Study of the Financial
                                  Sector . . . . . . . . . . . . . . . . . 11:1--11:??
                   Chen Zhu and   
                Hengshu Zhu and   
                  Hui Xiong and   
                    Chao Ma and   
                   Fang Xie and   
             Pengliang Ding and   
                         Pan Li   Person-Job Fit: Adapting the Right
                                  Talent for the Right Job with Joint
                                  Representation Learning  . . . . . . . . 12:1--12:??
             John D. Delano and   
             Hemant K. Jain and   
                 Atish P. Sinha   System Design through the Exploration of
                                  Contemporary Web Services  . . . . . . . 13:1--13:??

ACM Transactions on Management Information Systems (TMIS)
Volume 9, Number 4, March, 2019

                 Kar Kei Lo and   
                   Michael Chau   A Penny Is Worth a Thousand?
                                  Investigating the Relationship Between
                                  Social Media and Penny Stocks  . . . . . 14:1--14:??
         Bernhard Kratzwald and   
             Stefan Feuerriegel   Putting Question-Answering Systems into
                                  Practice: Transfer Learning for
                                  Efficient Domain Customization . . . . . 15:1--15:??
                    Shuo Yu and   
                 Hongyi Zhu and   
                 Shan Jiang and   
                 Yong Zhang and   
              Chunxiao Xing and   
                  Hsinchun Chen   Emoticon Analysis for Chinese Social
                                  Media and E-commerce: The AZEmo System   16:1--16:??


ACM Transactions on Management Information Systems (TMIS)
Volume 10, Number 1, May, 2019

             Edward Hartono and   
             Clyde W. Holsapple   Website Visual Design Qualities: a
                                  Threefold Framework  . . . . . . . . . . 1:1--1:??
                   Hu Xiong and   
                    Yi Wang and   
                 Wenchao Li and   
                Chien-Ming Chen   Flexible, Efficient, and Secure Access
                                  Delegation in Cloud Computing  . . . . . 2:1--2:??
            Majid Mohammadi and   
                Wout Hofman and   
                    Yao-Hua Tan   Simulated Annealing-based Ontology
                                  Matching . . . . . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Management Information Systems (TMIS)
Volume 10, Number 2, August, 2019

                   Hojjat Emami   A Graph-based Approach to Person Name
                                  Disambiguation in Web  . . . . . . . . . 4:1--4:??
             Jian-Min Jiang and   
                 Zhong Hong and   
                  Yangyang Chen   Modeling and Analyzing Incremental
                                  Natures of Developing Software . . . . . 5:1--5:??
                Hemant Jain and   
                T. S. Raghu and   
              Victoria Yoon and   
                   Wei Thoo Yue   Introduction to Special Section Based on
                                  Papers Presented at the Workshop on
                                  Information Technology and Systems, 2017 6:1--6:??
              Paul Sutterer and   
            Stefan Waldherr and   
                 Martin Bichler   Are Truthful Bidders Paying too Much?
                                  Efficiency and Revenue in Display Ad
                                  Auctions . . . . . . . . . . . . . . . . 6:1--6:??
                     Xu Han and   
               Niam Yaraghi and   
                      Ram Gopal   Catching Them Red-Handed: Optimizing the
                                  Nursing Homes' Rating System . . . . . . 7:1--7:??
            Hasan B. Kartal and   
               Xiaoping Liu and   
                    Xiao-Bai Li   Differential Privacy for the Vast
                                  Majority . . . . . . . . . . . . . . . . 8:1--8:??

ACM Transactions on Management Information Systems (TMIS)
Volume 10, Number 3, November, 2019

                 Ranjan Pal and   
            Leana Golubchik and   
       Konstantions Psounis and   
        Tathagata Bandyopadhyay   On Robust Estimates of Correlated Risk
                                  in Cyber-Insured IT Firms: a First Look
                                  at Optimal AI-Based Estimates under
                                  ``Small'' Data . . . . . . . . . . . . . 9:1--9:??
                Hangjung Zo and   
          Derek L. Nazareth and   
                 Hemant K. Jain   Service-oriented Application Composition
                                  with Evolutionary Heuristics and
                                  Multiple Criteria  . . . . . . . . . . . 10:1--10:??
                Jianwei Lai and   
             Dongsong Zhang and   
                   Sen Wang and   
      Isil Doga Yakut Kilic and   
                      Lina Zhou   ThumbStroke: a Virtual Keyboard in
                                  Support of Sight-Free and One-Handed
                                  Text Entry on Touchscreen Mobile Devices 11:1--11:??
                   Yin Kang and   
                      Lina Zhou   Helpfulness Assessment of Online
                                  Reviews: The Role of Semantic Hierarchy
                                  of Product Features  . . . . . . . . . . 12:1--12:??

ACM Transactions on Management Information Systems (TMIS)
Volume 10, Number 4, December, 2019

                Jiyong Park and   
                 Daegon Cho and   
                Jae Kyu Lee and   
                   Byungtae Lee   The Economics of Cybercrime: The Role of
                                  Broadband and Socioeconomic Status . . . 13:1--13:??
              Wingyan Chung and   
               Bingbing Rao and   
                   Liqiang Wang   Interaction Models for Detecting Nodal
                                  Activities in Temporal Social Media
                                  Networks . . . . . . . . . . . . . . . . 14:1--14:??
                Jiawei Chen and   
                Hongyan Liu and   
   Yinghui (Catherine) Yang and   
                         Jun He   Effective Selection of a Compact and
                                  High-Quality Review Set with Information
                                  Preservation . . . . . . . . . . . . . . 15:1--15:??
            Dietmar Jannach and   
                Michael Jugovac   Measuring the Business Value of
                                  Recommender Systems  . . . . . . . . . . 16:1--16:??


ACM Transactions on Management Information Systems (TMIS)
Volume 11, Number 1, April, 2020

                 Hongfei Li and   
             Ramesh Shankar and   
                  Jan Stallaert   Invested or Indebted: Ex-ante and
                                  Ex-post Reciprocity in Online Knowledge
                                  Sharing Communities  . . . . . . . . . . 1:1--1:26
             Mohsen Rezvani and   
                Mojtaba Rezvani   A Randomized Reputation System in the
                                  Presence of Unfair Ratings . . . . . . . 2:1--2:16
                      Li Ni and   
                Wenjian Luo and   
                  Nannan Lu and   
                     Wenjie Zhu   Mining the Local Dependency Itemset in a
                                  Products Network . . . . . . . . . . . . 3:1--3:31
             Fabio Pierazzi and   
              Ghita Mezzour and   
                   Qian Han and   
          Michele Colajanni and   
             V. S. Subrahmanian   A Data-driven Characterization of Modern
                                  Android Spyware  . . . . . . . . . . . . 4:1--4:38

ACM Transactions on Management Information Systems (TMIS)
Volume 11, Number 2, July, 2020

                 Ranjan Pal and   
       Konstantinos Psounis and   
              Jon Crowcroft and   
                Frank Kelly and   
                    Pan Hui and   
               Sasu Tarkoma and   
             Abhishek Kumar and   
                 John Kelly and   
          Aritra Chatterjee and   
            Leana Golubchik and   
            Nishanth Sastry and   
                 Bodhibrata Nag   When Are Cyber Blackouts in Modern
                                  Service Networks Likely?: a Network
                                  Oblivious Theory on Cyber (Re)Insurance
                                  Feasibility  . . . . . . . . . . . . . . 5:1--5:38
           Tatiana Ermakova and   
            Benjamin Fabian and   
             Marta Kornacka and   
              Scott Thiebes and   
                    Ali Sunyaev   Security and Privacy Requirements for
                                  Cloud Computing in Healthcare:
                                  Elicitation and Prioritization from a
                                  Patient Perspective  . . . . . . . . . . 6:1--6:29
                 Haibing Lu and   
                    Xi Chen and   
                 Junmin Shi and   
             Jaideep Vaidya and   
       Vijayalakshmi Atluri and   
                  Yuan Hong and   
                      Wei Huang   Algorithms and Applications to Weighted
                                  Rank-one Binary Matrix Factorization . . 7:1--7:33
                Moshe Unger and   
         Alexander Tuzhilin and   
                     Amit Livne   Context-Aware Recommendations Based on
                                  Deep Learning Frameworks . . . . . . . . 8:1--8:15

ACM Transactions on Management Information Systems (TMIS)
Volume 11, Number 3, August, 2020

              Kaushik Dutta and   
                  Xiao Fang and   
       Zhengrui (Jeffrey) Jiang   Introduction to WITS 2018 Special Issue
                                  in TMIS  . . . . . . . . . . . . . . . . 9:1--9:2
               Ram D. Gopal and   
              Hooman Hidaji and   
             Sule Nur Kutlu and   
       Raymond A. Patterson and   
               Erik Rolland and   
                 Dmitry Zhdanov   Real or Not?: Identifying Untrustworthy
                                  News Websites Using Third-party
                                  Partnerships . . . . . . . . . . . . . . 10:1--10:20
                 Liling Tan and   
            Maggie Yundi Li and   
                    Stanley Kok   E-Commerce Product Categorization via
                                  Machine Translation  . . . . . . . . . . 11:1--11:14
               Xiangyu Wang and   
                  Kang Zhao and   
                   Xun Zhou and   
                    Nick Street   Predicting User Posting Activities in
                                  Online Health Communities with Deep
                                  Learning . . . . . . . . . . . . . . . . 12:1--12:15
                    Jie Tao and   
                      Lina Zhou   A Weakly Supervised WordNet-Guided Deep
                                  Learning Approach to Extracting Aspect
                                  Terms from Online Reviews  . . . . . . . 13:1--13:22
               Wensheng Gan and   
         Jerry Chun-Wei Lin and   
             Han-Chieh Chao and   
    Philippe Fournier-Viger and   
                  Xuan Wang and   
                   Philip S. Yu   Utility-Driven Mining of Trend
                                  Information for Intelligent System . . . 14:1--14:28
                Nenavath Sreenu   Cashless Payment Policy and Its Effects
                                  on Economic Growth of India: an
                                  Exploratory Study  . . . . . . . . . . . 15:1--15:10
               Asma Belhadi and   
            Youcef Djenouri and   
         Jerry Chun-Wei Lin and   
                   Alberto Cano   Trajectory Outlier Detection:
                                  Algorithms, Taxonomies, Evaluation, and
                                  Open Challenges  . . . . . . . . . . . . 16:1--16:29

ACM Transactions on Management Information Systems (TMIS)
Volume 11, Number 4, December, 2020

              Sagar Samtani and   
         Murat Kantarcioglu and   
                  Hsinchun Chen   Trailblazing the Artificial Intelligence
                                  for Cybersecurity Discipline: a
                                  Multi-Disciplinary Research Roadmap  . . 17:1--17:19
           Anand Mudgerikar and   
              Puneet Sharma and   
                  Elisa Bertino   Edge-Based Intrusion Detection for IoT
                                  devices  . . . . . . . . . . . . . . . . 18:1--18:21
        Martin Husák and   
        Tomás Bajtos and   
            Jaroslav Kaspar and   
             Elias Bou-Harb and   
                   Pavel Celeda   Predictive Cyber Situational Awareness
                                  and Personalized Blacklisting: a
                                  Sequential Rule Mining Approach  . . . . 19:1--19:16
        Mahdi R. Alagheband and   
            Atefeh Mashatan and   
                Morteza Zihayat   Time-based Gap Analysis of Cybersecurity
                                  Trends in Academic and Digital Media . . 20:1--20:20
            Antonio Mangino and   
        Morteza Safaei Pour and   
                 Elias Bou-Harb   Internet-scale Insecurity of Consumer
                                  Internet of Things: an Empirical
                                  Measurements Perspective . . . . . . . . 21:1--21:24
          Christopher Sweet and   
             Stephen Moskal and   
             Shanchieh Jay Yang   On the Variety and Veracity of Cyber
                                  Intrusion Alerts Synthesized by
                                  Generative Adversarial Networks  . . . . 22:1--22:21
            Sharad Mehrotra and   
            Shantanu Sharma and   
          Jeffrey D. Ullman and   
          Dhrubajyoti Ghosh and   
              Peeyush Gupta and   
                  Anurag Mishra   PANDA: Partitioned Data Security on
                                  Outsourced Sensitive and Non-sensitive
                                  Data . . . . . . . . . . . . . . . . . . 23:1--23:41
                Sicong Shao and   
                 Cihan Tunc and   
             Amany Al-Shawi and   
                   Salim Hariri   An Ensemble of Ensembles Approach to
                                  Author Attribution for Internet Relay
                                  Chat Forensics . . . . . . . . . . . . . 24:1--24:25
               Jay P. Kesan and   
                  Linfeng Zhang   Analysis of Cyber Incident Categories
                                  Based on Losses  . . . . . . . . . . . . 25:1--25:28
          Henanksha Sainani and   
     Josephine M. Namayanja and   
             Guneeti Sharma and   
           Vasundhara Misal and   
              Vandana P. Janeja   IP Reputation Scoring with
                                  Geo-Contextual Feature Augmentation  . . 26:1--26:29


ACM Transactions on Management Information Systems (TMIS)
Volume 12, Number 1, March, 2021

              Sagar Samtani and   
         Murat Kantarcioglu and   
                  Hsinchun Chen   A Multi-Disciplinary Perspective for
                                  Conducting Artificial
                                  Intelligence-enabled Privacy Analytics:
                                  Connecting Data, Algorithms, and Systems 1:1--1:18
       Razieh Nokhbeh Zaeem and   
              K. Suzanne Barber   The Effect of the GDPR on Privacy
                                  Policies: Recent Progress and Future
                                  Promise  . . . . . . . . . . . . . . . . 2:1--2:20
            Tanuja Sudhakar and   
               Marina Gavrilova   Deep Learning for Multi-instance
                                  Biometric Privacy  . . . . . . . . . . . 3:1--3:23
            Gökhan Kul and   
          Shambhu Upadhyaya and   
                  Andrew Hughes   An Analysis of Complexity of Insider
                                  Attacks to Databases . . . . . . . . . . 4:1--4:18
         Dinesha Ranathunga and   
            Matthew Roughan and   
                    Hung Nguyen   Mathematical Reconciliation of Medical
                                  Privacy Policies . . . . . . . . . . . . 5:1--5:18
                Arindam Roy and   
               Shamik Sural and   
        Arun Kumar Majumdar and   
             Jaideep Vaidya and   
           Vijayalakshmi Atluri   Optimal Employee Recruitment in
                                  Organizations under Attribute-Based
                                  Access Control . . . . . . . . . . . . . 6:1--6:24
           Oluwafemi Akanfe and   
              Rohit Valecha and   
                  H. Raghav Rao   Design of an Inclusive Financial Privacy
                                  Index (INF-PIE): a Financial Privacy and
                                  Digital Financial Inclusion Perspective  7:1--7:21
         Sarah A. Alkhodair and   
        Benjamin C. M. Fung and   
          Steven H. H. Ding and   
          William K. Cheung and   
                Shih-Chia Huang   Detecting High-Engaging Breaking News
                                  Rumors in Social Media . . . . . . . . . 8:1--8:16
        Francesco Benedetto and   
          Loretta Mastroeni and   
             Pierluigi Vellucci   Extraction of Information Content
                                  Exchange in Financial Markets by an
                                  Entropy Analysis . . . . . . . . . . . . 9:1--9:16

ACM Transactions on Management Information Systems (TMIS)
Volume 12, Number 2, June, 2021

                Ka Chung Ng and   
              Mike K. P. So and   
                    Kar Yan Tam   A Latent Space Modeling Approach to
                                  Interfirm Relationship Analysis  . . . . 10:1--10:44
            Aristotle Onumo and   
           Irfan Ullah-Awan and   
                  Andrea Cullen   Assessing the Moderating Effect of
                                  Security Technologies on Employees
                                  Compliance with Cybersecurity Control
                                  Procedures . . . . . . . . . . . . . . . 11:1--11:29
               Asma Belhadi and   
            Youcef Djenouri and   
            Djamel Djenouri and   
            Tomasz Michalak and   
             Jerry Chun-Wei Lin   Machine Learning for Identifying Group
                                  Trajectory Outliers  . . . . . . . . . . 12:1--12:25
            Almas Abdibayev and   
               Dongkai Chen and   
               Haipeng Chen and   
              Deepti Poluru and   
             V. S. Subrahmanian   Using Word Embeddings to Deter
                                  Intellectual Property Theft through
                                  Automated Generation of Fake Documents   13:1--13:22
                 Xingsi Xue and   
                Xiaojing Wu and   
                   Junfeng Chen   Optimizing Ontology Alignment Through an
                                  Interactive Compact Genetic Algorithm    14:1--14:17
            Youcef Djenouri and   
         Jerry Chun-Wei Lin and   
 Kjetil Nòrvåg and   
            Heri Ramampiaro and   
                   Philip S. Yu   Exploring Decomposition for Solving
                                  Pattern Mining Problems  . . . . . . . . 15:1--15:36
               Mingfei Teng and   
                Hengshu Zhu and   
               Chuanren Liu and   
                      Hui Xiong   Exploiting Network Fusion for
                                  Organizational Turnover Prediction . . . 16:1--16:18
                 Ranjan Pal and   
               Ziyuan Huang and   
            Sergey Lototsky and   
                Xinlong Yin and   
                Mingyan Liu and   
              Jon Crowcroft and   
            Nishanth Sastry and   
                  Swades De and   
                 Bodhibrata Nag   Will Catastrophic Cyber-Risk Aggregation
                                  Thrive in the IoT Age? A Cautionary
                                  Economics Tale for (Re-)Insurers and
                                  Likes  . . . . . . . . . . . . . . . . . 17:1--17:36

ACM Transactions on Management Information Systems (TMIS)
Volume 12, Number 3, July, 2021

           Makiya Nakashima and   
                   Alex Sim and   
               Youngsoo Kim and   
               Jonghyun Kim and   
                      Jinoh Kim   Automated Feature Selection for Anomaly
                                  Detection in Network Traffic Data  . . . 18:1--18:28
                    Lin Qiu and   
            Sruthi Gorantla and   
              Vaibhav Rajan and   
              Bernard C. Y. Tan   Multi-disease Predictive Analytics: a
                                  Clinical Knowledge-aware Approach  . . . 19:1--19:34
                   Yan Leng and   
                Jinhua Zhao and   
             Haris Koutsopoulos   Leveraging Individual and Collective
                                  Regularity to Profile and Segment User
                                  Locations from Mobile Phone Data . . . . 20:1--20:22
                    Xi Wang and   
                  Yibo Chai and   
                     Hui Li and   
                Wenbin Wang and   
                    Weishan Sun   Graph Convolutional Network-based Model
                                  for Incident-related Congestion
                                  Prediction: a Case Study of Shanghai
                                  Expressways  . . . . . . . . . . . . . . 21:1--21:22
                 Peng Huang and   
                 Henry C. Lucas   Early Exploration of MOOCs in the U.S.
                                  Higher Education: an Absorptive Capacity
                                  Perspective  . . . . . . . . . . . . . . 22:1--22:28
      Pooja Parameshwarappa and   
               Zhiyuan Chen and   
                Günes Koru   Anonymization of Daily Activity Data by
                                  Using $l$-diversity Privacy Model  . . . 23:1--23:21
                Jiaheng Xie and   
                  Bin Zhang and   
                Susan Brown and   
                    Daniel Zeng   Write Like a Pro or an Amateur? Effect
                                  of Medical Language Formality  . . . . . 24:1--24:25
         Damodar Reddy Edla and   
              Shubham Dodia and   
          Annushree Bablani and   
      Venkatanareshbabu Kuppili   An Efficient Deep Learning Paradigm for
                                  Deceit Identification Test on EEG
                                  Signals  . . . . . . . . . . . . . . . . 25:1--25:20
                   Qin Wang and   
               Shiping Chen and   
                     Yang Xiang   Anonymous Blockchain-based System for
                                  Consortium . . . . . . . . . . . . . . . 26:1--26:25

ACM Transactions on Management Information Systems (TMIS)
Volume 12, Number 4, December, 2021

                  Kang Zhao and   
             Qingpeng Zhang and   
            Sean H. Y. Yuan and   
            Kelvin Kam-Fai Tsoi   Introduction to the Special Section on
                                  Using AI and Data Science to Handle
                                  Pandemics and Related Disruptions  . . . 27:1--27:2
           Manvel Avetisian and   
               Ilya Burenko and   
          Konstantin Egorov and   
              Vladimir Kokh and   
         Aleksandr Nesterov and   
         Aleksandr Nikolaev and   
      Alexander Ponomarchuk and   
             Elena Sokolova and   
              Alex Tuzhilin and   
               Dmitry Umerenkov   CoRSAI: a System for Robust
                                  Interpretation of CT Scans of COVID-19
                                  Patients Using Deep Learning . . . . . . 28:1--28:16
         Maryam Zokaeinikoo and   
            Pooyan Kazemian and   
            Prasenjit Mitra and   
                 Soundar Kumara   AIDCOV: an Interpretable Artificial
                                  Intelligence Model for Detection of
                                  COVID-19 from Chest Radiography Images   29:1--29:20
             Guanqing Liang and   
               Jingxin Zhao and   
        Helena Yan Ping Lau and   
             Cane Wing-Ki Leung   Using Social Media to Analyze Public
                                  Concerns and Policy Responses to
                                  COVID-19 in Hong Kong  . . . . . . . . . 30:1--30:20
              Laura Biester and   
               Katie Matton and   
      Janarthanan Rajendran and   
        Emily Mower Provost and   
                  Rada Mihalcea   Understanding the Impact of COVID-19 on
                                  Online Mental Health Forums  . . . . . . 31:1--31:28
                    Kang Gu and   
           Soroush Vosoughi and   
            Temiloluwa Prioleau   SymptomID: a Framework for Rapid Symptom
                                  Identification in Pandemics Using News
                                  Reports  . . . . . . . . . . . . . . . . 32:1--32:17
               Shixiang Zhu and   
         Alexander Bukharin and   
                  Liyan Xie and   
        Mauricio Santillana and   
                Shihao Yang and   
                        Yao Xie   High-Resolution Spatio-Temporal Model
                                  for County-Level COVID-19 Activity in
                                  the U.S. . . . . . . . . . . . . . . . . 33:1--33:20
                   Junye Li and   
               Aryan Sharma and   
              Deepak Mishra and   
            Gustavo Batista and   
              Aruna Seneviratne   COVID-Safe Spatial Occupancy Monitoring
                                  Using OFDM-Based Features and Passive
                                  WiFi Samples . . . . . . . . . . . . . . 34:1--34:24
          Himanshu Kharkwal and   
               Dakota Olson and   
                Jiali Huang and   
              Abhiraj Mohan and   
                 Ankur Mani and   
             Jaideep Srivastava   University Operations During a Pandemic:
                                  a Flexible Decision Analysis Toolkit . . 35:1--35:24
                Chun Ouyang and   
              Michael Adams and   
  Arthur H. M. Ter Hofstede and   
                        Yang Yu   Design and Realisation of Scalable
                                  Business Process Management Systems for
                                  Deployment in the Cloud  . . . . . . . . 36:1--36:26
         Saurav Chakraborty and   
       Agnieszka Onuchowska and   
              Sagar Samtani and   
              Wolfgang Jank and   
                Brandon Wolfram   Machine Learning for Automated
                                  Industrial IoT Attack Detection: an
                                  Efficiency-Complexity Trade-off  . . . . 37:1--37:28


ACM Transactions on Management Information Systems (TMIS)
Volume 13, Number 1, March, 2022

             Lin Jerry Cwei and   
            Nachiketa Sahoo and   
          Gautam Srivastava and   
                   Weiping Ding   Introduction to the Special Issue on
                                  Pattern-Driven Mining, Analytics, and
                                  Prediction for Decision Making, Part 1   1:1--1:3
              Shui-Hua Wang and   
                  Xin Zhang and   
                  Yu-Dong Zhang   DSSAE: Deep Stacked Sparse Autoencoder
                                  Analytical Model for COVID-19 Diagnosis
                                  by Fractional Fourier Entropy  . . . . . 2:1--2:20
                   Fan Chen and   
              Jiaoxiong Xia and   
                Honghao Gao and   
                   Huahu Xu and   
                        Wei Wei   TRG-DAtt: The Target Relational Graph
                                  and Double Attention Network Based
                                  Sentiment Analysis and Prediction for
                                  Supporting Decision Making . . . . . . . 3:1--3:25
             M. Saqib Nawaz and   
    Philippe Fournier-Viger and   
                   Unil Yun and   
                   Youxi Wu and   
                       Wei Song   Mining High Utility Itemsets with Hill
                                  Climbing and Simulated Annealing . . . . 4:1--4:22
                Shuteng Niu and   
               Yushan Jiang and   
                 Bowen Chen and   
                  Jian Wang and   
                Yongxin Liu and   
                   Houbing Song   Cross-Modality Transfer Learning for
                                  Image-Text Information Management  . . . 5:1--5:14
                Mu-Yen Chen and   
              Min-Hsuan Fan and   
                 Li-Xiang Huang   AI-Based Vehicular Network toward 6G and
                                  IoT: Deep Learning Approaches  . . . . . 6:1--6:12
                  Zhihan Lv and   
                 Ranran Lou and   
                Hailin Feng and   
             Dongliang Chen and   
                      Haibin Lv   Novel Machine Learning for Big Data
                                  Analytics in Intelligent Support
                                  Information Management Systems . . . . . 7:1--7:21
                Ankit Kumar and   
             Abhishek Kumar and   
          Ali Kashif Bashir and   
              Mamoon Rashid and   
         V. D. Ambeth Kumar and   
                   Rupak Kharel   Distance Based Pattern Driven Mining for
                                  Outlier Detection in High Dimensional
                                  Big Dataset  . . . . . . . . . . . . . . 8:1--8:17
Mohammad Ehsan Shahmi Chowdhury and   
     Chowdhury Farhan Ahmed and   
                Carson K. Leung   A New Approach for Mining Correlated
                                  Frequent Subgraphs . . . . . . . . . . . 9:1--9:28
                     Bo Wen and   
            Paul Jen-Hwa Hu and   
      Mohammadreza Ebrahimi and   
                  Hsinchun Chen   Key Factors Affecting User Adoption of
                                  Open-Access Data Repositories in
                                  Intelligence and Security Informatics:
                                  an Affordance Perspective  . . . . . . . 10:1--10:24
              Gamal Elkoumy and   
Stephan A. Fahrenkrog-Petersen and   
     Mohammadreza Fani Sani and   
           Agnes Koschmider and   
            Felix Mannhardt and   
Saskia Nuñez Von Voigt and   
               Majid Rafiei and   
        Leopold Von Waldthausen   Privacy and Confidentiality in Process
                                  Mining: Threats and Research Challenges  11:1--11:17

ACM Transactions on Management Information Systems (TMIS)
Volume 13, Number 2, June, 2022

                     Bo Sun and   
          Takeshi Takahashi and   
                    Tao Ban and   
                  Daisuke Inoue   Detecting Android Malware and
                                  Classifying Its Families in Large-scale
                                  Datasets . . . . . . . . . . . . . . . . 12:1--12:21
             Byron Marshall and   
              Michael Curry and   
         Robert E. Crossler and   
                   John Correia   Machine Learning and Survey-based
                                  Predictors of InfoSec Non-Compliance . . 13:1--13:20
                Jiaheng Xie and   
                  Bin Zhang and   
                    Jian Ma and   
                Daniel Zeng and   
               Jenny Lo-Ciganic   Readmission Prediction for Patients with
                                  Heterogeneous Medical History: a
                                  Trajectory-Based Deep Learning Approach  14:1--14:27
                     Luo He and   
                Hongyan Liu and   
               Yinghui Yang and   
                       Bei Wang   A Multi-attention Collaborative Deep
                                  Learning Approach for Blood Pressure
                                  Prediction . . . . . . . . . . . . . . . 15:1--15:20
                   Yan Tang and   
                Weilong Cui and   
                     Jianwen Su   A Query Language for Workflow Logs . . . 16:1--16:28
             Shi Ming Huang and   
               David C. Yen and   
              Ting Jyun Yan and   
                   Yi Ting Yang   An Intelligent Mechanism to
                                  Automatically Discover Emerging
                                  Technology Trends: Exploring Regulatory
                                  Technology . . . . . . . . . . . . . . . 17:1--17:29
               Tomasz Miksa and   
             Simon Oblasser and   
                 Andreas Rauber   Automating Research Data Management
                                  Using Machine-Actionable Data Management
                                  Plans  . . . . . . . . . . . . . . . . . 18:1--18:22
        Guangrui (Kayla) Li and   
              Mike K. P. So and   
                    Kar Yan Tam   Identifying the Big Shots --- a
                                  Quantile-Matching Way in the Big Data
                                  Context  . . . . . . . . . . . . . . . . 19:1--19:30
                 Xindong Wu and   
               Xingquan Zhu and   
                     Minghui Wu   The Evolution of Search: Three Computing
                                  Paradigms  . . . . . . . . . . . . . . . 20:1--20:20
                 Ning Zhang and   
      Mohammadreza Ebrahimi and   
                 Weifeng Li and   
                  Hsinchun Chen   Counteracting Dark Web Text-Based
                                  CAPTCHA with Generative Adversarial
                                  Learning for Proactive Cyber Threat
                                  Intelligence . . . . . . . . . . . . . . 21:1--21:21
                Karl Werder and   
     Balasubramaniam Ramesh and   
          Rongen (Sophia) Zhang   Establishing Data Provenance for
                                  Responsible Artificial Intelligence
                                  Systems  . . . . . . . . . . . . . . . . 22:1--22:23

ACM Transactions on Management Information Systems (TMIS)
Volume 13, Number 3, September, 2022

         Jerry Chun-Wei Lin and   
            Nachiketa Sahoo and   
          Gautam Srivastava and   
                   Weiping Ding   Introduction to the Special Issue on
                                  Pattern-Driven Mining, Analytics, and
                                  Prediction for Decision Making, Part II  23:1--23:3
            Maryam Ebrahimi and   
     Mohammad Hesam Tadayon and   
    Mohammad Sayad Haghighi and   
                Alireza Jolfaei   A Quantitative Comparative Study of
                                  Data-oriented Trust Management Schemes
                                  in Internet of Things  . . . . . . . . . 24:1--24:30
                   Youxi Wu and   
               Xiaohui Wang and   
                     Yan Li and   
                    Lei Guo and   
                    Zhao Li and   
                   Ji Zhang and   
                     Xindong Wu   OWSP-Miner: Self-adaptive One-off
                                  Weak-gap Strong Pattern Mining . . . . . 25:1--25:23
                   Yuan Gao and   
           Laurence T. Yang and   
               Yaliang Zhao and   
                      Jing Yang   Feature Extraction of High-dimensional
                                  Data Based on J-HOSVD for
                                  Cyber-Physical-Social Systems  . . . . . 26:1--26:21
            Hsun-Ping Hsieh and   
                 Fandel Lin and   
                Nai-Yu Chen and   
                  Tzu-Hsin Yang   A Decision Framework to Recommend
                                  Cruising Locations for Taxi Drivers
                                  under the Constraint of Booking
                                  Information  . . . . . . . . . . . . . . 27:1--27:30
            Anastasiia Pika and   
                Chun Ouyang and   
      Arthur H. M. ter Hofstede   Configurable Batch-Processing Discovery
                                  from Event Logs  . . . . . . . . . . . . 28:1--28:25
     A. N. M. Bazlur Rashid and   
            Mohiuddin Ahmed and   
            Leslie F. Sikos and   
           Paul Haskell-Dowland   Anomaly Detection in Cybersecurity
                                  Datasets via Cooperative
                                  Co-evolution-based Feature Selection . . 29:1--29:39
                    Xin Liu and   
                Liang Zheng and   
              Weishan Zhang and   
                Jiehan Zhou and   
                  Shuai Cao and   
                     Shaowen Yu   An Evolutive Frequent Pattern Tree-based
                                  Incremental Knowledge Discovery
                                  Algorithm  . . . . . . . . . . . . . . . 30:1--30:20
           Flavio Corradini and   
     Alessandro Marcelletti and   
          Andrea Morichetta and   
              Andrea Polini and   
                 Barbara Re and   
               Francesco Tiezzi   Engineering Trustable and Auditable
                                  Choreography-based Systems Using
                                  Blockchain . . . . . . . . . . . . . . . 31:1--31:53
                M. Lisa Yeo and   
               Erik Rolland and   
       Jacquelyn Rees Ulmer and   
           Raymond A. Patterson   How Customer Demand Reactions Impact
                                  Technology Innovation and Security . . . 32:1--32:17
                  Wanlun Ma and   
                 Xiangyu Hu and   
                  Chao Chen and   
                  Sheng Wen and   
        Kkwang Raymond Choo and   
                     Yang Xiang   Social Media Event Prediction using DNN
                                  with Feedback Mechanism  . . . . . . . . 33:1--33:24
      Gediminas Adomavicius and   
                    Mochen Yang   Integrating Behavioral, Economic, and
                                  Technical Insights to Understand and
                                  Address Algorithmic Bias: a
                                  Human-Centric Perspective  . . . . . . . 34:1--34:27

ACM Transactions on Management Information Systems (TMIS)
Volume 13, Number 4, December, 2022

                Mu-Yen Chen and   
      Bhavani Thuraisingham and   
              Erol Egrioglu and   
            Jose De Jesus Rubio   Introduction to the Special Issue on
                                  Smart Systems for Industry 4.0 and IoT   35:1--35:??
       Esteban Elias Romero and   
       Carlos David Camacho and   
  Carlos Enrique Montenegro and   
Óscar Esneider Acosta and   
Rubén González Crespo and   
        Elvis Eduardo Gaona and   
Marcelo Herrera Martínez   Integration of DevOps Practices on a
                                  Noise Monitor System with CircleCI and
                                  Terraform  . . . . . . . . . . . . . . . 36:1--36:??
                    Bin Ren and   
              Yuquiang Chen and   
                     Fujie Wang   Application Massive Data Processing
                                  Platform for Smart Manufacturing Based
                                  on Optimization of Data Storage  . . . . 37:1--37:??
               Genggeng Liu and   
                  Yuhan Zhu and   
                 Saijuan Xu and   
                   Hao Tang and   
                 Yeh-Cheng Chen   Performance-Driven X-Architecture
                                  Routing Algorithm for Artificial
                                  Intelligence Chip Design in Smart
                                  Manufacturing  . . . . . . . . . . . . . 38:1--38:??
                  Zhihan Lv and   
             Dongliang Chen and   
                Hailin Feng and   
           Amit Kumar Singh and   
                    Wei Wei and   
                      Haibin Lv   Computational Intelligence in Security
                                  of Digital Twins Big Graphic Data in
                                  Cyber-physical Systems of Smart Cities   39:1--39:??
                Rongli Chen and   
             Xiaozhong Chen and   
                   Lei Wang and   
                     Jianxin Li   The Core Industry Manufacturing Process
                                  of Electronics Assembly Based on Smart
                                  Manufacturing  . . . . . . . . . . . . . 40:1--40:??
               Genggeng Liu and   
                Ruping Zhou and   
                 Saijuan Xu and   
                  Yuhan Zhu and   
               Wenzhong Guo and   
             Yeh-Cheng Chen and   
                   Guolong Chen   Two-Stage Competitive Particle Swarm
                                  Optimization Based Timing-Driven
                                  X-Routing for IC Design Under Smart
                                  Manufacturing  . . . . . . . . . . . . . 41:1--41:??
                     Xin Du and   
               Songtao Tang and   
                  Zhihui Lu and   
                   Keke Gai and   
                     Jie Wu and   
             Patrick C. K. Hung   Scientific Workflows in IoT
                                  Environments: a Data Placement Strategy
                                  Based on Heterogeneous Edge-Cloud
                                  Computing  . . . . . . . . . . . . . . . 42:1--42:??
                     Qi Lin and   
               Wensheng Gan and   
                Yongdong Wu and   
                Jiahui Chen and   
                Chien-Ming Chen   Smart System: Joint Utility and
                                  Frequency for Pattern Classification . . 43:1--43:??
Rohini Poolat Parameswarath and   
              Prosanta Gope and   
                  Biplab Sikdar   User-empowered Privacy-preserving
                                  Authentication Protocol for Electric
                                  Vehicle Charging Based on Decentralized
                                  Identity and Verifiable Credential . . . 44:1--44:??
               Mengxin Nong and   
             Lingfeng Huang and   
                    Mingtao Liu   Allocation of Resources for Cloud
                                  Survivability in Smart Manufacturing . . 45:1--45:??
                Usman Ahmed and   
         Jerry Chun-Wei Lin and   
              Gautam Srivastava   Heterogeneous Energy-aware Load
                                  Balancing for Industry 4.0 and IoT
                                  Environments . . . . . . . . . . . . . . 46:1--46:??
               Yu-Chia Chen and   
               Sin-Ye Jhong and   
                Chih-Hsien Hsia   Roadside Unit-based Unknown Object
                                  Detection in Adverse Weather Conditions
                                  for Smart Internet of Vehicles . . . . . 47:1--47:??


ACM Transactions on Management Information Systems (TMIS)
Volume 14, Number 1, March, 2023

         Christian Janiesch and   
             Marcus Fischer and   
            Florian Imgrund and   
             Adrian Hofmann and   
                Axel Winkelmann   An Architecture Using Payment Channel
                                  Networks for Blockchain-based Wi-Fi
                                  Sharing  . . . . . . . . . . . . . . . . 1:1--1:??
        Mohammad Amin Morid and   
        Olivia R. Liu Sheng and   
                  Joseph Dunbar   Time Series Prediction Using Deep
                                  Learning Methods in Healthcare . . . . . 2:1--2:??
       Shuang (Sophie) Zhai and   
               Zhu (Drew) Zhang   Read the News, Not the Books:
                                  Forecasting Firms' Long-term Financial
                                  Performance via Deep Text Mining . . . . 3:1--3:??
                Kimia Ameri and   
             Michael Hempel and   
               Hamid Sharif and   
                 Juan Lopez and   
               Kalyan Perumalla   Design of a Novel Information System for
                                  Semi-automated Management of
                                  Cybersecurity in Industrial Control
                                  Systems  . . . . . . . . . . . . . . . . 4:1--4:??
          Amogh Manoj Joshi and   
        Deepak Ranjan Nayak and   
            Dibyasundar Das and   
                   Yudong Zhang   LiMS-Net: a Lightweight Multi-Scale CNN
                                  for COVID-19 Detection from Chest CT
                                  Scans  . . . . . . . . . . . . . . . . . 5:1--5:??
         Jan-Peter Kucklick and   
             Oliver Müller   Tackling the Accuracy-Interpretability
                                  Trade-off: Interpretable Deep Learning
                                  Models for Satellite Image-based Real
                                  Estate Appraisal . . . . . . . . . . . . 6:1--6:??
            Patricia Akello and   
              Naga Vemprala and   
          Nicole Lang Beebe and   
         Kim-Kwang Raymond Choo   Blockchain Use Case in Ballistics and
                                  Crime Gun Tracing and Intelligence:
                                  Toward Overcoming Gun Violence . . . . . 7:1--7:??
                   Xue Chen and   
                 Cheng Wang and   
                  Qing Yang and   
                    Teng Hu and   
                 Changjun Jiang   The Opportunity in Difficulty: a Dynamic
                                  Privacy Budget Allocation Mechanism for
                                  Privacy-Preserving Multi-dimensional
                                  Data Collection  . . . . . . . . . . . . 8:1--8:??
                 Yixiang Hu and   
              Xiaoheng Deng and   
                 Congxu Zhu and   
               Xuechen Chen and   
                     Laixin Chi   Resource Allocation for Heterogeneous
                                  Computing Tasks in Wirelessly Powered
                                  MEC-enabled IIOT Systems . . . . . . . . 9:1--9:??
                Alan Hevner and   
                    Veda Storey   Research Challenges for the Design of
                                  Human-Artificial Intelligence Systems
                                  (HAIS) . . . . . . . . . . . . . . . . . 10:1--10:??
               Marlon Dumas and   
           Fabiana Fournier and   
               Lior Limonad and   
            Andrea Marrella and   
              Marco Montali and   
         Jana-Rebecca Rehse and   
             Rafael Accorsi and   
            Diego Calvanese and   
        Giuseppe De Giacomo and   
               Dirk Fahland and   
                Avigdor Gal and   
           Marcello La Rosa and   
          Hagen Völzer and   
                     Ingo Weber   AI-augmented Business Process Management
                                  Systems: a Research Manifesto  . . . . . 11:1--11:??

ACM Transactions on Management Information Systems (TMIS)
Volume 14, Number 2, June, 2023

                Gondy Leroy and   
               Bengisu Tulu and   
                       Xiao Liu   Introduction to the Special Issue on
                                  Design and Data Science Research in
                                  Healthcare . . . . . . . . . . . . . . . 12:1--12:??
                Matt Baucum and   
           Anahita Khojandi and   
               Carole Myers and   
                  Larry Kessler   Optimizing Substance Use Treatment
                                  Selection Using Reinforcement Learning   13:1--13:??
Christina C. Bartenschlager and   
           Stefanie S. Ebel and   
            Sebastian Kling and   
          Janne Vehreschild and   
              Lutz T. Zabel and   
       Christoph D. Spinner and   
            Andreas Schuler and   
             Axel R. Heller and   
            Stefan Borgmann and   
          Reinhard Hoffmann and   
              Siegbert Rieg and   
            Helmut Messmann and   
               Martin Hower and   
            Jens O. Brunner and   
               Frank Hanses and   
         Christoph Römmele   COVIDAL: a Machine Learning Classifier
                                  for Digital COVID-19 Diagnosis in German
                                  Hospitals  . . . . . . . . . . . . . . . 14:1--14:??
       Sanne van der Linden and   
          Rita Sevastjanova and   
               Mathias Funk and   
          Mennatallah El-Assady   MediCoSpace: Visual Decision-Support for
                                  Doctor-Patient Consultations using
                                  Medical Concept Spaces from EHRs . . . . 15:1--15:??
             Pascal Fechner and   
          Fabian König and   
           Wolfgang Kratsch and   
               Jannik Lockl and   
      Maximilian Röglinger   Near-Infrared Spectroscopy for Bladder
                                  Monitoring: a Machine Learning Approach  16:1--16:??
         Karthik Srinivasan and   
                  Jinhang Jiang   Examining Disease Multimorbidity in U.S.
                                  Hospital Visits Before and During
                                  COVID-19 Pandemic: a Graph Analytics
                                  Approach . . . . . . . . . . . . . . . . 17:1--17:??
         Karthik Srinivasan and   
                Faiz Currim and   
                      Sudha Ram   A Human-in-the-Loop Segmented
                                  Mixed-Effects Modeling Method for
                                  Analyzing Wearables Data . . . . . . . . 18:1--18:??
                Yidong Chai and   
                Hongyan Liu and   
                     Jie Xu and   
              Sagar Samtani and   
             Yuanchun Jiang and   
                     Haoxin Liu   A Multi-Label Classification with an
                                  Adversarial-Based Denoising Autoencoder
                                  for Medical Image Annotation . . . . . . 19:1--19:??
                Moshe Unger and   
                     Pan Li and   
       Sahana (Shahana) Sen and   
             Alexander Tuzhilin   Don't Need All Eggs in One Basket:
                                  Reconstructing Composite Embeddings of
                                  Customers from Individual-Domain
                                  Embeddings . . . . . . . . . . . . . . . 20:1--20:??

ACM Transactions on Management Information Systems (TMIS)
Volume 14, Number 3, 2023

               Rahul Mishra and   
           Dharavath Ramesh and   
           Salil S. Kanhere and   
             Damodar Reddy Edla   Enabling Efficient Deduplication and
                                  Secure Decentralized Public Auditing for
                                  Cloud Storage: a Redactable Blockchain
                                  Approach . . . . . . . . . . . . . . . . 21:1--21:??
                 Eran Rubin and   
                  Izak Benbasat   Using Toulmin's Argumentation Model to
                                  Enhance Trust in Analytics-Based Advice
                                  Giving Systems . . . . . . . . . . . . . 22:1--22:??
                  Kelvin Du and   
                 Frank Xing and   
                   Erik Cambria   Incorporating Multiple Knowledge Sources
                                  for Targeted Aspect-based Financial
                                  Sentiment Analysis . . . . . . . . . . . 23:1--23:??
       Cecil Eng Huang Chua and   
                 Fred Niederman   Situational Factor Determinants of the
                                  Allocation of Decision Rights to Edge
                                  Computers  . . . . . . . . . . . . . . . 24:1--24:??
                Michael Siering   Peer-to-Peer (P2P) Lending Risk
                                  Management: Assessing Credit Risk on
                                  Social Lending Platforms Using Textual
                                  Factors  . . . . . . . . . . . . . . . . 25:1--25:??
               Dazhong Shen and   
                Hengshu Zhu and   
                  Keli Xiao and   
                   Xi Zhang and   
                      Hui Xiong   Exploiting Connections among
                                  Personality, Job Position, and Work
                                  Behavior: Evidence from Joint Bayesian
                                  Learning . . . . . . . . . . . . . . . . 26:1--26:??
                   Gary Ang and   
                Zhiling Guo and   
                    Ee-Peng Lim   On Predicting ESG Ratings Using Dynamic
                                  Company Networks . . . . . . . . . . . . 27:1--27:??

ACM Transactions on Management Information Systems (TMIS)
Volume 14, Number 4, December, 2023

                     Xin Li and   
                 Juhee Kwon and   
         Balaji Padmanabhan and   
                  Pengzhu Zhang   Introduction to the Special Issue on
                                  IT-enabled Business Management and
                                  Decision Making in the (Post) Covid-19
                                  Era  . . . . . . . . . . . . . . . . . . 28:1--28:??
               Tianjian Guo and   
           Indranil Bardhan and   
                 Anjum Khurshid   Social Determinants of Health and ER
                                  Utilization: Role of Information
                                  Integration during COVID-19  . . . . . . 29:1--29:??
     Jayson Andrew Killoran and   
            Tracy A. Jenkin and   
                 Jasmin Manseau   ICT Interactions and COVID-19 --- a
                                  Theorization Across Two Pandemic Waves   30:1--30:??
            Giovanni Pilato and   
               Fabio Persia and   
                  Mouzhi Ge and   
   Theodoros Chondrogiannis and   
                Daniela D'Auria   A Modular Social Sensing System for
                                  Personalized Orienteering in the
                                  COVID-19 Era . . . . . . . . . . . . . . 31:1--31:??
                  Xiao Zeng and   
                   David Ji and   
          Dimple R. Thadani and   
                  Boying Li and   
                 Xiaodie Pu and   
                   Zhao Cai and   
             Patrick Y. K. Chau   Disentangling Affordances of Online
                                  Collaboration Tools for Mutual Aid in
                                  Emergencies: Insights from the COVID-19
                                  Lockdown . . . . . . . . . . . . . . . . 32:1--32:??


ACM Transactions on Management Information Systems (TMIS)
Volume 15, Number 1, March, 2024

                 Pei-Chi Lo and   
                    Ee-Peng Lim   Non-monotonic Generation of Knowledge
                                  Paths for Context Understanding  . . . . 1:1--1:??
          Moufida Aouachria and   
        Abderrahmane Leshob and   
Abdessamed Réda Ghomari and   
               Mustapha Aouache   A Process Mining Method for
                                  Inter-organizational Business Process
                                  Integration  . . . . . . . . . . . . . . 2:1--2:??
               Norman Pytel and   
          Christian Ziegler and   
                Axel Winkelmann   From Dissonance to Dialogue: a
                                  Token-Based Approach to Bridge the Gap
                                  Between Manufacturers and Customers  . . 3:1--3:??
             Veda C. Storey and   
            Richard Baskerville   Design with Simon's Inner and Outer
                                  Environments: Theoretical Foundations
                                  for Design Science Research Methods for
                                  Digital Science  . . . . . . . . . . . . 4:1--4:??
  Joaquin Delgado Fernandez and   
              Tom Barbereau and   
           Orestis Papageorgiou   Agent-Based Model of Initial Token
                                  Allocations: Simulating Distributions
                                  post Fair Launch . . . . . . . . . . . . 5:1--5:??
       Giovanni Quattrocchi and   
  Willem-Jan van den Heuvel and   
         Damian Andrew Tamburri   The Data Product-service Composition
                                  Frontier: a Hybrid Learning Approach . . 6:1--6:??