COLLEGE DIRECTORY       :      VISIT ELLER      :      LOG IN 
The University of Arizona | Eller College of Management The University of Arizona Eller College of Management
Eller College Home > Department of MIS > Faculty > Publications
Management Information Systems

Faculty Publications for 2008

Faculty Contributing to the Field

The following reflects the MIS Departments faculty and student publications for the calendar year 2008. MIS faculty members are in bold text:

View 2007 publications here.


Journal Publications

Venkatesh, V., Brown, S.A., Maruping, L., and Bala, H. “Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation,” Vol. 32, No. 3, MIS Quarterly, September 2008, pp. 483-502

Fadel, K.J., Brown, S.A., and Tanniru, M. “A Theoretical Framework for Knowledge Transfer in Process Redesign,” Vol. 39, No. 3, The Database for Advances in Information Systems, 2008, pp. 21-40

Brown, S.A., “Household Technology Adoption, Use, and Impacts: Past, Present, and Future,” Vol. 10, No. 4, Information Systems Frontiers, 2008, pp. 397-402

Brown, S.A., Venkatesh, V., Massey, A., and Kuruzovich, J. “Expectation Confirmation:  An Examination of Three Competing Models,” Vol. 105, No. 1, Organizational Behavior and Human Decision Processes, 2008, pp. 52-66

Chau, M. and Chen, H., “A Machine Learning Approach to Web Page Filtering using Web Content and Web Structure Analysis,” Decision Support Systems, Volume 44, Number 2, Pages 482-494,  2008

Chung, W., Lai, G., Bonillas, A., Xi, W., and Chen, H., “Organizing Domain-specific information on the Web: An Experiment on the Spanish Business Web Directory,” International Journal of Human-Computer Studies, Volume 66, Number 2, Pages 51-66, 2008

Schumaker, H. and Chen, H., “Evaluating a News-Aware Quantitative Trader: The Effect of Momentum and Contrarian Stock Selection Strategies,” Journal of the American Society for Information Science and Technology, Volume 59, Number 2, Pages 247-255,  2008

Li, J., Li, X., Zhang, Z., and Chen, H. “Kernel-based Learning for Biomedical Relation Extraction,” Journal of the American Society for Information Science and Technology, Volume 59, Number 5, Pages 756-769, 2008

Chen, H., Roco, M., Li, X., and Lin, Y., “Trends in Nanotechnology Patents,” Nature Nanotechnology, Volume 3, Pages 123-125, March, 2008

Abbasi, A., and Chen, H., “Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, Volume 26, Number 2, Pages 7:1-7:29, 2008

Abbasi, A., Chen, H., and Salem, A., “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems, Volume 26, Number 3, Pages 12:1-12:34, 2008

Fu, T.J., Abbasi, A., and Chen, H., “A Hybrid Approach to Web Forum Interactional Coherence Analysis,” Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1195-1209, 2008

Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., and Weinmann, G., “Uncovering the Dark Web: A Case Study of Jihad on the Web,” Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1347-1359, 2008

Zhou, Y., Huang, F., and Chen, H., “Combining Probability Models and Web Mining Models: A Framework for Proper Name Transliteration,” Information Technology and Management, Volume 9, Issue 2, Pages 91-103, 2008

Abbasi, A., Chen, H., and Nunamaker, J.F., “Stylometric Identification in Electronic Markets: Scalability and Robustness,” Journal of Management Information Systems, Volume 25, Number 1, Pages 49-78, 2008

Chau, M., Qin, J., Zhou, Y., Tseng, C., and Chen, H., “SpiderRUs: Creating Specialized Search Engines in Multiple Languages,” Decision Support Systems, Volume 45, Number 3, Pages 621-640, June 2008

Abbasi, A. Chen, H., Thoms, S., and Fu, T.J., “Affect Analysis of Web Forums and Blogs using Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 9, Pages 1168-1180, September 2008

Xu, J., and Chen, H., “The Topology of Dark Networks,” Communications of the ACM, Volume 51, Number 10, Pages 58-65, 2008

Schumaker, R., and Chen, H., “Textual Analysis of Stock Market Prediction Using Breaking Financial News: The AZFinText System,” ACM Transactions on Information Systems, Volume 27, Number 2, April 2009

Li, X., Chen, H., Dang,Y., Lin, Y., Larson, C.A., and Roco, M.C., “A Longitudinal Analysis of Nanotechnology Literature: 1976-2004,” Journal of Nanoparticle Research, Volume 10, Pages 3-22, 2008

Marshall, B., Kaza, S., and Chen, H., “Using Importance Flooding to Identify Interesting Networks of Criminal Activity,” Journal of the American Society for Information Science and Technology, Volume 59, Number 13, Pages 2099-2114, 2008

Abbasi, A., and Chen, H., “CyberGate: A System and Design for Text Analysis of Computer Mediated Communications,” MIS Quarterly, Volume 32, Number 4, Pages 811-837, December 2008

Li, X., Hu, D., Dang, Y., Chen, H., Roco, M. C., Larson,C. A., and Chan, J., “Nano Mapper: An Internet Knowledge Mapping System for Nanotechnology Development,” Journal of Nanoparticle Research, Volume 10, 2008

Yan, P., Chen, H., and Zeng, D., “Syndromic Surveillance Systems: Public Health and Biodefence,” Annual Review of Information Science and Technology (ARIST), Vol. 42, 2008

Dror, M., Guardiola, L.A., Meca, A, and Puerto, J., “Realization Games in Newsvendor Inventory Centralization”, I.J. of Game Theory 37, 139-153, 2008

Burke, E.K., Dror, M., and Orlin, J.B., “A Note on Scheduling Malleable Tasks with Interdependent Processing Rates: Comments and Observations”, Discrete Applied Mathematics 156(5), 620-626, 2008

Thatcher M., Pingry D., “A Model of Optimal Software Patent Policy", Journal of Management Information Systems, August 2008

Cha, H., Pingry, D., and Thatcher, M., “Managing the Knowledge Supply Chain: An Organizational Learning Model of Information Technology Offshore Outsourcing”, Management Information Systems Quarterly, Volume 32, Number 2, June 2008, Pages 281-306

Curim, F., Ram, S., “Conceptually Modeling Windows and Bounds for Space and Time in Database Constraints”, Communications of the ACM, Vol 55, No. 11, pp. 125-129, Novembe2008

Ram, S., Wei, W., Zhang, K.P., “Linking Biological Databases Semantically for Knowledge Discovery”, Lecture Notes in Computer Science 5232 Springer 2008, pp. 22-32

Ram, S., and Zhao, H.,  “Entity Matching Across Heterogeneous Data Sources: An Approach Based on Constrained Cascade Generalization”, Data and Knowledge Engineering, Vol. 66, No. 3, September, 2008, pp. 368-381

Liu, J., and Ram., S., “A Semiotics Framework for Analyzing Data Provenance Research”, Journal of Computing Science and Engineering, Vol. 2, No. 3, September 2008, pp. 221-248

Zeng, D., Wang, F.-Y., Zheng, X., Yuan, Y., Chen, G., and Chen, J., “Intelligent Commerce Research in China,” IEEE Intelligent Systems, November – December, 2008

Chang, W., Zeng, D., and Chen, H., “A Spatio-Temporal Data Analysis Approach based on Prospective Support Vector Clustering,” Decision Support Systems, Vol. 45, No. 4, pp. 697–713, November 2008

Lu, H.-M., Zeng, D., Trujillo, L., Komatsu, K., and Chen, H., “Ontology-enhanced Automatic Chief Complaint Classification for Syndromic Surveillance,” Journal of Biomedical Informatics, Vol. 41, pp. 340–356, 2008

Wang, F.-Y., Lu, R., and Zeng, D., “AI Research in China,” IEEE Intelligent Systems, November –December, 2008

Lin, M. and Zhang, Z., "Question-Driven Segmentation of Lecture Speech Text: Towards Intelligent E-Learning Systems", Journal of the American Society for Information Science and Technology (JASIST), Volume 59, Issue 2 , pages 186- 200, January 2008

Li, J., Zhang, Z., Li, X., and Chen H., "Kernel-based Learning for Biomedical Relation Extraction". Journal of the American Society for Information Science and Technology (JASIST), Volume 59, Issue 5, pages 756-769, March 2008

Zhang, Z., "Mining Relational Data from Text: from Strictly-Supervised to Weakly-Supervised Learning", Information Systems, Volume 33, Issue 3, pages 300-314, May 2008

Zhang, Z., "Weighing Stars: Aggregating Online Product Reviews for Intelligence E-commerce Applications", IEEE Intelligent Systems, Volume 23, Issue 5, pages 42-49, October 2008

Return to Top

Books and Special Issues

Chen, H. and Roco, M. “Mapping Nanotechnology Innovations and Knowledge: Global and Longitudinal Patent and Literature Analysis,” Springer, 2009

Yang, X., Wei, C., and Chen, H., “Introduction Special Issue on Multilingual Knowledge Management,” Decision Support Systems, Volume 45, Number 3, Pages 551-553, June 2008

Chen, H. and Yang, C. (Eds.), “Intelligence and Security Informatics: Techniques and Applications,” Springer, 2008

Chen, H., Reid, E., Sinai, J., Silke, A., and Ganor, B., (Eds.), “Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security,” Springer, 2008

Zeng, D., Chen, H., Wang, F., and Kargupta, H., “Special Section on Intelligence and Security Informatics,” IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 8, Pages 1009-1012, 2008

Zeng, D, Chen, H., Wang, F.Y., and Kargupta, H., Guest Editors Introduction: Special Issue on Intelligence and Security Informatics,” IEEE Transactions on Knowledge and Data Engineering, Vo. 20, No. 8, pp. 1–4, August 2008

Weisband, S. (Ed.), "Leadership at a distance: Research in Technologically-supported Work", Mahwah, NJ: Lawrence Erlbaum Associates, 2008

Weisband, S., "Research Challenges for Studying Leadership at a Distance", Leadership at a distance: Research in technologically-supported work (pp. 3-11), Mahwah, NJ: Lawrence Erlbaum Associates, 2008

 

Return to Top

Refereed Conference Publications and Book Chapters

Zumpe, S. and Brown, S.A. “Conceptualizing the IT Artifact for MIS Research,” International Conference for Information Systems (ICIS) 2008

Yang, C., Chen, H., et al., “Intelligence and Security Informatics,” IEEE Intelligence and Security Informatics (ISI) 2008 International Workshops: PAISI, PACCF, and SOCO, Taipei, Taiwan, June 2008, Proceedings, Lecture Notes in Computer Science (LNCS 5075), Springer-Verlag, 2008.

Xu and Chen, H., “Understanding the Nexus of Terrorist Web Sites,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 65-78, 2008.

Wang, J., Fu, T., Lin, H., and Chen, H., “Exploring Gray Web Forums: Analysis and Investigation of Forum-based Communities in Taiwan,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 121-134, 2008.

Kaza, S., and Chen, H., “Suspect Vehicle Identification for Border Safety,” Editors: H. Chen and C. Yang, in Intelligence and Security Informatics: Techniques and Applications, 305-318, 2008.

Chen, H., "Nuclear Threat Detection via the Nuclear Web and Dark Web: Framework and Preliminary Study,” Proceedings of the First European Conference on Intelligence and Security Informatics (EuroISI) 2008

Mielke, C., and Chen, H., “Mapping Dark Web Geolocation,” Proceedings of the First European Conference on Intelligence and Security Informatics (EuroISI) 2008

Mielke, C., and Chen, H., “Botnets, and the CyberCriminal Underground,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Fu, T., and Chen, H., “Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 200

Chen,Y., Abbasi, A., and Chen, H., “Developing Ideological Networks Using Social Network Analysis and Writeprints: A Case Study of the International Falun Gong Movement,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Chen, H., “Discovery of Improvised Explosive Device Content in the Dark Web,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Chen, H., “IEDs in the Dark Web: Genre Classification of Improvised Explosive Device Web Pages,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Chen, H., “Cyber Terrorism in Web 2.0: An Exploratory Study of International Jihadist Groups,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Chen, H., “Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the Internet,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Li, J., Wang, A., and Chen, H., “PRM-Based Identity Matching using Social Context,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Dang, Y., Zhang, Y., Suyakkaphong, N., Larson, C., and Chen, H., “An Integrated Approach to Mapping Worldwide Bioterrorism Research Capabilities,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Yang, C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K., Mao, W., and Zhan, J. (editors), “Intelligence and Security Informatics Workshops, PAISI, PACCF and SOCO 2008,” Springer, Lecture Notes in Computer Science, No. 5075, 2008

Velasquez, N., Durcikova A., Sabherwal, R, “Studying Knowledge Management System Success in System Administration”, Hawaii International Conference on System Sciences (HICCS) 2009

Velasquez N. and Durcikova A, “Sysadmins and the Need for Verification Information,” Computer Human Interaction for Management of IT (CHIMIT) 2008

Fadel, K., Durcikova, A. and Cha H., “Elaboration Likelihood in Knowledge Management: A Model and Experimental Test,” Hawaii International Conference on System Sciences (HICCS) 2008

Wei, W,  Zhang, KP, and Ram, S., “BioSem: Biological Data Integration”, Proceedings of the Conceptual Modelling for Life Sciences Applications (CMLSA) workshop, 2008

Currim, F, and Ram, S., "RFID Tagging at the Aggregate level: Implications for Using Groupings", Special Interest Group on Systems Analysis & Design (SIGSAND) proceedings, 2008

Velasquez, N. and Weisband, S., “Work Practices of System Administrators: Implications for Tool Design.” Computer Human Interaction for the Management of Information Technology (CHIMIT), 2008

Lu, H., Zeng, D., and Chen, H., “Markov Switching-based Outbreak Detection,” in Biosurveillance and Infectious Disease Informatics, Springer, 2009

Hu, P., Zeng, D., and Chen, H., “Biosurveillance System Evaluation: A Case Study,” in Biosurveillance and Infectious Disease Informatics, Springer, 2009

Zeng, D., Ma, J., Chang, W., and Chen, H., “Spatial-Temporal Data Analysis and Its Applications in Infectious Disease Informatics,” in Handbooks in Information Systems: Business Computing, Elsevier, 2008

Lu, H., Zeng, D., and Chen, H., “Bioterrorism Event Detection Based on the Markov Switching Model: A Simulated Anthrax Outbreak Study,” Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI) 2008

Zeng, D., Chen, H., Rolka, H., and Lober, B. (editors), “Intelligence and Security Informatics: Biosurveillance and Biosecurity,” NSF Biosurveillance and Biosecurity Workshop: Systems and Algorithms, Biosecurity 2008 Proceedings, Springer, Lecture Notes in Computer Science, No. 5354, 2008

Ortiz-Arroyo, D., Larsen, H., Zeng, D., Hicks, D., and Wagner, G. (editors), “Intelligence and Security Informatics: Proceedings of the First European Conference”, EuroISI 2008, Springer, Lecture Notes in Computer Science, 2008

Zheng, X, Zeng, D., Sun, A., Luo, Y., Wang, Q., and Wang, F.Y., “Networkbased Analysis of Beijing SARS Data,” in Biosurveillance and Biosecurity, edited by D. Zeng, H. Chen, H. Rolka, and B. Lober, Springer Lecture Notes in Computer Science, No. 5354, 2008

Sun, A. and Zeng, D., “Maximizing Influence Through a Network,” Proceedings of the Workshop on Information Technologies and Systems (WITS) 2008 (Best paper runner-up award)

Yan, P. and Zeng, D., “Clustering Customer Shopping Trips with Network Structure,” Proceedings of the International Conference on Information Systems (ICIS) 2008

Zeng, D., and Li, H., “How Useful Are Tags? — An Empirical Analysis of Collaborative Tagging forWeb Page Recommendation,” Proceedings of the International Workshop on Social Computing (ICSC) 2008

Sun, A., Zeng, D., Li, H., and Zheng, X., “Detecting Bursts in Social Tags,” Proceedings of the International Workshop on Social Computing (ICSC) 2008

Li, X.-R., Mao, W., Zeng, D., and Wang, F.Y., “Agent-Based Social Simulation and Modeling for Social Computing,” Proceedings of the International Workshop on Social Computing (ICSC) 2008

Li, X.-C., Zeng, D., Mao, W., and Wang, F.Y. (2008). “Online Communities: A Social Computing Perspective,” Proceedings of the International Workshop on Social Computing (ICSC) 2008

Zhang, C., Zeng, D., Xu, Q., Xin, X., Mao, W., and Wang, F.Y., “The Polarity Classification of Chinese Public Health Opinions,” Proceedings of the International Workshop on Social Computing (ICSC) 2008

Liu, X., Zhang, P., and Zeng, D., “Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering,” Proceedings of the Pacific Asia Workshop in Intelligence and Security Informatics (ISI) 2008

Zeng, D., Wei, D., Chau, M., and Wang, F.Y., “Chinese Word Segmentation for Terrorism-related Content,” Proceedings of the Pacific Asia Workshop in Intelligence and Security Informatics (ISI) 2008

Lu, H.-M., Zeng, D., and Chen, H., “Bioterrorism Event Detection based on the Markov Switching Model: A Simulated Anthrax Outbreak Study,” Procedings of the Sixth IEEE International Conference on Intelligence and Security Informatics (ICIS) 2008

Hsieh, C.L., Zhan, J., Zeng, D., and Wang, F.Y. “Preserving Privacy in Joining Recommender Systems,” Proceedings of the IEEE Conference on Information Security and Assurance (ISA) 2008

Zeng, D., Yan, P., and Li, S., “Spatial Regression-based Environmental Analysis in Infectious Disease Informatics ,” in Biosurveillance and Biosecurity, edited by D. Zeng, H. Chen, H. Rolka, and B. Lober, Springer Lecture Notes in Computer Science, No. 5354, 2008

Lu, H., Huang, W., Zhang, Z., and Chen T., “Identifying Firm-Specific Risk Statements in News Articles”, PAISI 2009

Li, J., Wang, H., Zhang, Z., and Zhao J. “Relation-Centric Task Identification for Policy-based Processing Mining”, International Conference for Information Systems (ICIS) 2008

Hu. D., Zhang, Z., and Zhao J. “Expert Recommendation in Social Networks: Development and Comparison of Three Approaches”, Workshop on Information Technologies and Systems (WITS) 2008

Li, J., Wang, H., Zhang, Z., and Zhao J., “Process Component Identification from Business Policy Documents”, China Summer Workshop on Information Management (CSWIM) 2008, (best paper awardee)

Liu, M., Zhao, L., and Zeng, D., “A Cooperative Analysis Framework for Investment Decisions in Community Source Partnerships,” Proceedings of the Americas Conference on Information Systems (AMCIS) 2008

Return to Top

For additional information, please contact us.