%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.48", %%% date = "17 March 2026", %%% time = "15:09:58 MDT", %%% filename = "tmis.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "11351 14328 71658 689369", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "ACM Transactions on Management Information %%% Systems (TMIS); bibliography; TMIS", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE BibTeX bibliography for %%% ACM Transactions on Management Information %%% Systems (TMIS) (CODEN none, ISSN 2158-656X %%% (print), 2158-6578 (electronic)), covering %%% all journal issues from 2010 -- date. %%% %%% At version 1.48, the COMPLETE journal %%% coverage looked like this: %%% %%% 2010 ( 7) 2016 ( 12) 2022 ( 47) %%% 2011 ( 26) 2017 ( 18) 2023 ( 32) %%% 2012 ( 16) 2018 ( 13) 2024 ( 17) %%% 2013 ( 24) 2019 ( 20) 2025 ( 34) %%% 2014 ( 9) 2020 ( 26) 2026 ( 6) %%% 2015 ( 27) 2021 ( 37) %%% %%% Article: 371 %%% %%% Total entries: 371 %%% %%% The journal Web page can be found at: %%% %%% http://www.acm.org/pubs/tmis.html %%% %%% The journal table of contents page is at: %%% %%% http://www.acm.org/tmis/ %%% http://portal.acm.org/browse_dl.cfm?idx=J1320 %%% %%% Qualified subscribers can retrieve the full %%% text of recent articles in PDF form. %%% %%% The initial draft was extracted from the ACM %%% Web pages. %%% %%% ACM copyrights explicitly permit abstracting %%% with credit, so article abstracts, keywords, %%% and subject classifications have been %%% included in this bibliography wherever %%% available. Article reviews have been %%% omitted, until their copyright status has %%% been clarified. %%% %%% bibsource keys in the bibliography entries %%% below indicate the entry originally came %%% from the computer science bibliography %%% archive, even though it has likely since %%% been corrected and updated. %%% %%% URL keys in the bibliography point to %%% World Wide Web locations of additional %%% information about the entry. %%% %%% BibTeX citation tags are uniformly chosen %%% as name:year:abbrev, where name is the %%% family name of the first author or editor, %%% year is a 4-digit number, and abbrev is a %%% 3-letter condensation of important title %%% words. Citation tags were automatically %%% generated by software developed for the %%% BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, using ``bibsort -byvolume.'' %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility." %%% } %%% ==================================================================== @Preamble{"\input bibnames.sty" # "\def \TM {${}^{\sc TM}$}" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-TMIS = "ACM Transactions on Management Information Systems (TMIS)"} %%% ==================================================================== %%% Bibliography entries: @Article{Chen:2010:EWF, author = "Hsinchun Chen", title = "Editorial: {Welcome} to the first issue of {ACM TMIS}", journal = j-TMIS, volume = "1", number = "1", pages = "1:1--1:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877726", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Davis:2010:IFF, author = "Gordon B. Davis and Paul Gray and Stuart Madnick and Jay F. Nunamaker and Ralph Sprague and Andrew Whinston", title = "Ideas for the future of the {IS} field", journal = j-TMIS, volume = "1", number = "1", pages = "2:1--2:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877727", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Wang:2010:DIS, author = "Jingguo Wang and Nan Xiao and H. Raghav Rao", title = "Drivers of information security search behavior: an investigation of network attacks and vulnerability disclosures", journal = j-TMIS, volume = "1", number = "1", pages = "3:1--3:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877728", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ba:2010:WGS, author = "Sulin Ba and Dan Ke and Jan Stallaert and Zhongju Zhang", title = "Why give away something for nothing? {Investigating} virtual goods pricing and permission strategies", journal = j-TMIS, volume = "1", number = "1", pages = "4:1--4:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877729", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Cao:2010:MDA, author = "Lan Cao and Balasubramaniam Ramesh and Tarek Abdel-Hamid", title = "Modeling dynamics in agile software development", journal = j-TMIS, volume = "1", number = "1", pages = "5:1--5:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877730", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Arazy:2010:SCW, author = "Ofer Arazy and Arie Croitoru", title = "The sustainability of corporate wikis: a time-series analysis of activity patterns", journal = j-TMIS, volume = "1", number = "1", pages = "6:1--6:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877731", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Fu:2010:PPT, author = "Yu Fu and Zhiyuan Chen and Gunes Koru and Aryya Gangopadhyay", title = "A privacy protection technique for publishing data mining models and research data", journal = j-TMIS, volume = "1", number = "1", pages = "7:1--7:??", month = dec, year = "2010", CODEN = "????", DOI = "https://doi.org/10.1145/1877725.1877732", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:24 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chen:2011:EDS, author = "Hsinchun Chen", title = "Editorial: {Design} science, grand challenges, and societal impacts", journal = j-TMIS, volume = "2", number = "1", pages = "1:1--1:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929917", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chau:2011:VWS, author = "Michael Chau", title = "Visualizing {Web} search results using glyphs: {Design} and evaluation of a flower metaphor", journal = j-TMIS, volume = "2", number = "1", pages = "2:1--2:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929918", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kuo:2011:LAG, author = "Feng-Yang Kuo and Chun-Po Yin", title = "A linguistic analysis of group support systems interactions for uncovering social realities of organizations", journal = j-TMIS, volume = "2", number = "1", pages = "3:1--3:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929919", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kane:2011:MSI, author = "Gerald C. Kane", title = "A multimethod study of information quality in wiki collaboration", journal = j-TMIS, volume = "2", number = "1", pages = "4:1--4:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929920", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Dawson:2011:UTA, author = "Gregory S. Dawson and Richard T. Watson", title = "Uncovering and testing archetypes of effective public sector {CIOs}", journal = j-TMIS, volume = "2", number = "1", pages = "5:1--5:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929921", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Dey:2011:CUW, author = "Debabrata Dey and Ming Fan and Gang Peng", title = "Computer use and wage returns: {The} complementary roles of {IT}-related human capital and nonroutine tasks", journal = j-TMIS, volume = "2", number = "1", pages = "6:1--6:??", month = mar, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1929916.1929922", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 28 11:02:25 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Hu:2011:AIS, author = "Paul Jen-Hwa Hu and Hsinchun Chen", title = "Analyzing information systems researchers' productivity and impacts: a perspective on the {$H$} index", journal = j-TMIS, volume = "2", number = "2", pages = "7:1--7:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985348", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bhattacharjee:2011:DGM, author = "Sudip Bhattacharjee and Ram D. Gopal and James R. Marsden and Ramesh Sankaranarayanan", title = "Digital goods and markets: {Emerging} issues and challenges", journal = j-TMIS, volume = "2", number = "2", pages = "8:1--8:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985349", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Uhl:2011:EUC, author = "Matthias W. Uhl", title = "Explaining {U.S.} consumer behavior with news sentiment", journal = j-TMIS, volume = "2", number = "2", pages = "9:1--9:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985350", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Du:2011:RHS, author = "Anna Ye Du and Sanjukta Das and Ram D. Gopal and R. Ramesh", title = "Risk hedging in storage grid markets: {Do} options add value to forwards?", journal = j-TMIS, volume = "2", number = "2", pages = "10:1--10:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985351", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Liu:2011:WDW, author = "Jun Liu and Sudha Ram", title = "Who does what: {Collaboration} patterns in the {Wikipedia} and their impact on article quality", journal = j-TMIS, volume = "2", number = "2", pages = "11:1--11:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985352", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mcknight:2011:TST, author = "D. Harrison Mcknight and Michelle Carter and Jason Bennett Thatcher and Paul F. Clay", title = "Trust in a specific technology: an investigation of its components and measures", journal = j-TMIS, volume = "2", number = "2", pages = "12:1--12:??", month = jun, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/1985347.1985353", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 22 08:37:49 MDT 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Tuzhilin:2011:KMR, author = "Alexander Tuzhilin", title = "Knowledge management revisited: {Old Dogs}, {New} tricks", journal = j-TMIS, volume = "2", number = "3", pages = "13:1--13:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019619", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sutanto:2011:ESV, author = "Juliana Sutanto and Atreyi Kankanhalli and Bernard Cheng Yian Tan", title = "Eliciting a sense of virtual community among knowledge contributors", journal = j-TMIS, volume = "2", number = "3", pages = "14:1--14:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019620", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Peng:2011:LSC, author = "Jing Peng and Daniel D. Zeng and Zan Huang", title = "Latent subject-centered modeling of collaborative tagging: an application in social search", journal = j-TMIS, volume = "2", number = "3", pages = "15:1--15:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019621", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Masud:2011:CBM, author = "Mohammad M. Masud and Tahseen M. Al-Khateeb and Kevin W. Hamlen and Jing Gao and Latifur Khan and Jiawei Han and Bhavani Thuraisingham", title = "Cloud-based malware detection for evolving data streams", journal = j-TMIS, volume = "2", number = "3", pages = "16:1--16:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019622", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Schmidt-Rauch:2011:TTA, author = "Susanne Schmidt-Rauch and Gerhard Schwabe", title = "From telesales to tele-advisory in travel agencies: {Business} problems, generic design goals and requirements", journal = j-TMIS, volume = "2", number = "3", pages = "17:1--17:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019623", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Huang:2011:MTC, author = "Ke-Wei Huang and Zhuolun Li", title = "A multilabel text classification algorithm for labeling risk factors in {SEC} form {10-K}", journal = j-TMIS, volume = "2", number = "3", pages = "18:1--18:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019624", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lin:2011:SPM, author = "Ming-Chih Lin and Anthony J. T. Lee and Rung-Tai Kao and Kuo-Tay Chen", title = "Stock price movement prediction using representative prototypes of financial reports", journal = j-TMIS, volume = "2", number = "3", pages = "19:1--19:??", month = oct, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2019618.2019625", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Nov 6 07:18:27 MST 2011", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Nunamaker:2011:TBV, author = "Jay F. {Nunamaker, Jr.} and Robert O. Briggs", title = "Toward a broader vision for {Information Systems}", journal = j-TMIS, volume = "2", number = "4", pages = "20:1--20:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070711", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In December of 2009, several founders of the Information Systems (IS) academic discipline gathered for a panel discussion at the International Conference on Information Systems to present their visions for the future of the field, and their comments were summarized in the inaugural issue of TMIS [Davis et al., 2010; J. F. J. Nunamaker et al., 1991]. To assure a robust future, they argued, IS journals, conferences, reviewers, promotion committees, teachers, researchers, and curriculum developers must broaden the scope of IS. This article explores the need for a broader vision to drive future development of the IS discipline.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Padmanabhan:2011:IOS, author = "Balaji Padmanabhan and Alan Hevner and Michael Cuenco and Crystal Shi", title = "From information to operations: {Service} quality and customer retention", journal = j-TMIS, volume = "2", number = "4", pages = "21:1--21:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070712", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In business, information is abundant. Yet, effective use of that information to inform and drive business operations is a challenge. Our industry-university collaborative project draws from a rich dataset of commercial demographics, transaction history, product features, and Service Quality Index (SQI) factors on shipping transactions at FedEx. We apply inductive methods to understand and predict customer churn in a noncontractual setting. Results identify several SQI variables as important determinants of churn across a variety of analytic approaches. Building on this we propose the design of a Business Intelligence (BI) dashboard as an innovative approach for increasing customer retention by identifying potential churners based on combinations of predictor variables such as demographics and SQI factors. This empirical study contributes to BI research and practice by demonstrating the application of data analytics to the fundamental business operations problem of customer churn.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Rui:2011:DSB, author = "Huaxia Rui and Andrew Whinston", title = "Designing a social-broadcasting-based business intelligence system", journal = j-TMIS, volume = "2", number = "4", pages = "22:1--22:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070713", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The rise of social media has fundamentally changed the way information is produced, disseminated, and consumed in the digital age, which has profound economic and business effects. Among many different types of social media, social broadcasting networks such as Twitter in the U.S. and `Weibo' in China are particularly interesting from a business perspective. In the case of Twitter, the huge amounts of real-time data with extremely rich text, along with valuable structural information, makes Twitter a great platform to build Business Intelligence (BI) systems. We propose a framework of social-broadcasting-based BI systems that utilizes real-time information extracted from these data with text mining techniques. To demonstrate this framework, we designed and implemented a Twitter-based BI system that forecasts movie box office revenues during the opening weekend and forecasts daily revenue after 4 weeks. We found that incorporating information from Twitter could reduce the Mean Absolute Percentage Error (MAPE) by 44\% for the opening weekend and by 36\% for total revenue. For daily revenue forecasting, including Twitter information into a baseline model could reduce forecasting errors by 17.5\% on average. On the basis of these results, we conclude that social-broadcasting-based BI systems have great potential and should be explored by both researchers and practitioners.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Arora:2011:DSC, author = "Hina Arora and T. S. Raghu and Ajay Vinze", title = "Decision support for containing pandemic propagation", journal = j-TMIS, volume = "2", number = "4", pages = "23:1--23:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070714", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This research addresses complexities inherent in dynamic decision making settings represented by global disasters such as influenza pandemics. By coupling a theoretically grounded Equation-Based Modeling (EBM) approach with more practically nuanced Agent-Based Modeling (ABM) approach we address the inherent heterogeneity of the `influenza pandemic' decision space more effectively. In addition to modeling contributions, results and findings of this study have three important policy implications for pandemic containment; first, an effective way of checking the progression of a pandemic is a multipronged approach that includes a combination of pharmaceutical and non-pharmaceutical interventions. Second, mutual aid is effective only when regions that have been affected by the pandemic are sufficiently isolated from other regions through non-pharmaceutical interventions. When regions are not sufficiently isolated, mutual aid can in fact be detrimental. Finally, intraregion non-pharmaceutical interventions such as school closures are more effective than interregion nonpharmaceutical interventions such as border closures.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Goes:2011:LCA, author = "Paulo Goes and Noyan Ilk and Wei T. Yue and J. Leon Zhao", title = "Live-chat agent assignments to heterogeneous e-customers under imperfect classification", journal = j-TMIS, volume = "2", number = "4", pages = "24:1--24:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070715", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Many e-commerce firms provide live-chat capability on their Web sites to promote product sales and to offer customer support. With increasing traffic on e-commerce Web sites, providing such live-chat services requires a good allocation of service resources to serve the customers. When resources are limited, firms may consider employing priority-processing and reserving resources for high-value customers. In this article, we model a reserve-based priority-processing policy for e-commerce systems that have imperfect customer classification. Two policy decisions considered in the model are: (1) the number of agents exclusively reserved for high-value customers, and (2) the configuration of the classification system. We derive explicit expressions for average waiting times of high-value and low-value customer classes and define a total waiting cost function. Through numerical analysis, we study the impact of these two policy decisions on average waiting times and total waiting costs. Our analysis finds that reserving agents for high-value customers may have negative consequences for such customers under imperfect classification. Further, we study the interaction between the two policy decisions and discuss how one decision should be modified with respect to a change in the other one in order to keep the waiting costs minimized.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lau:2011:TMP, author = "Raymond Y. K. Lau and S. Y. Liao and Ron Chi-Wai Kwok and Kaiquan Xu and Yunqing Xia and Yuefeng Li", title = "Text mining and probabilistic language modeling for online review spam detection", journal = j-TMIS, volume = "2", number = "4", pages = "25:1--25:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070716", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Marx:2011:SPR, author = "Frederik Marx and J{\"o}rg H. Mayer and Robert Winter", title = "Six principles for redesigning executive information systems-findings of a survey and evaluation of a prototype", journal = j-TMIS, volume = "2", number = "4", pages = "26:1--26:??", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1145/2070710.2070717", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 16 15:06:39 MDT 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Information Systems (IS) meant to help senior managers are known as Executive Information Systems (EIS). Despite a five-decade tradition of such IS, many executives still complain that they bear little relevance to managing a company and, even more, fail to accommodate their working style. The increasing acceptance of IS among today's executives and technological advances of the Internet era make the present moment favorable for redesigning EIS. Following the design science paradigm in IS research, this article provides six principles for such a redesign. To do so, we survey executives regarding their requirements and the IS they currently use. We then derive principles for a redesign to fill the gaps. They address diverse areas: a comprehensive information model, functions to better analyze and process information, easy-to-use IS handling, a more flexible IS architecture and data model, a proper information management, and fast prototype implementation. Finally a field test demonstrates and evaluates the utility of our proposal by means of a prototype.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Niederman:2012:DSA, author = "Fred Niederman and Salvatore T. March", title = "Design science and the accumulation of knowledge in the information systems discipline", journal = j-TMIS, volume = "3", number = "1", pages = "1:1--1:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151164", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Design science has emerged as an important research paradigm in the information systems (IS) discipline, and much has been written on how it should be conducted and evaluated (e.g., Hevner et al. [2004]; Walls et al. [1992]; Vaishnavi and Kuechler [2007]; Kuechler and Vaishnavi [2008]; Peffers et al. [2007]; Iivari [2010]; Pigneur [2011]). We contend that, as a socio-technical discipline, IS research must address the interaction between design and behavior. We begin with a background discussion of what we mean by IS research and the nature of the relationship between design and behavioral approaches to IS research. We discuss the nature of design, design science, and IT artifacts within information systems research and describe the importance of linking design and behavioral perspectives. We illustrate several key points using selected articles recently published in ACM Transactions on Management Information Systems [Schmidt-Rauch and Schwabe 2011; Lau et al. 2011]. We conclude with a vision of IS research in which the capabilities and affordances of IT artifacts are incorporated into behavioral studies; the results of behavioral studies are utilized in the development and evaluation of IT artifacts; and both behavioral and design perspectives are used to address the important problems of our constituent community.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Basoglu:2012:ERW, author = "K. Asli Basoglu and Mark A. Fuller and Joseph S. Valacich", title = "Enhancement of recall within technology-mediated teams through the use of online visual artifacts", journal = j-TMIS, volume = "3", number = "1", pages = "2:1--2:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151165", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Given the distributed nature of modern organizations, the use of technology-mediated teams is a critical aspect of their success. These teams use various media that are arguably less personal than face-to-face communication. One factor influencing the success of these teams is their ability to develop an understanding of who knows what during the initial team development stage. However, this development of understanding within dispersed teams may be impeded because of the limitations of technology-enabled communication environments. Past research has found that a limited understanding of team member capabilities hinders team performance. As such, this article investigates mechanisms for improving the recall of individuals within dispersed teams. Utilizing the input-process-output model to conceptualize the group interaction process, three input factors-visual artifacts (i.e., a computer-generated image of each team member), team size, and work interruptions-are manipulated to assess their influence on a person's ability to recall important characteristics of their virtual team members. Results show that visual artifacts significantly increase the recall of individuals' information. However, high-urgency interruptions significantly deteriorate the recall of individuals, regardless of the visual artifact or team size. These findings provide theoretical and practical implications on knowledge acquisition and project success within technology-mediated teams.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Adomavicius:2012:IDC, author = "Gediminas Adomavicius and Jingjing Zhang", title = "Impact of data characteristics on recommender systems performance", journal = j-TMIS, volume = "3", number = "1", pages = "3:1--3:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151166", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This article investigates the impact of rating data characteristics on the performance of several popular recommendation algorithms, including user-based and item-based collaborative filtering, as well as matrix factorization. We focus on three groups of data characteristics: rating space, rating frequency distribution, and rating value distribution. A sampling procedure was employed to obtain different rating data subsamples with varying characteristics; recommendation algorithms were used to estimate the predictive accuracy for each sample; and linear regression-based models were used to uncover the relationships between data characteristics and recommendation accuracy. Experimental results on multiple rating datasets show the consistent and significant effects of several data characteristics on recommendation accuracy.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Robinson:2012:DDB, author = "William N. Robinson and Arash Akhlaghi and Tianjie Deng and Ali Raza Syed", title = "Discovery and diagnosis of behavioral transitions in patient event streams", journal = j-TMIS, volume = "3", number = "1", pages = "4:1--4:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151167", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Users with cognitive impairments use assistive technology (AT) as part of a clinical treatment plan. As the AT interface is manipulated, data stream mining techniques are used to monitor user goals. In this context, real-time data mining aids clinicians in tracking user behaviors as they attempt to achieve their goals. Quality metrics over stream-mined models identify potential changes in user goal attainment, as the user learns his or her personalized emailing system. When the quality of some data-mined models varies significantly from nearby models-as defined by quality metrics-the user's behavior is then flagged as a significant behavioral change. The specific changes in user behavior are then characterized by differencing the data-mined decision tree models. This article describes how model quality monitoring and decision tree differencing can aid in recognition and diagnoses of behavioral changes in a case study of cognitive rehabilitation via emailing. The technique may be more widely applicable to other real-time data-intensive analysis problems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhang:2012:DWM, author = "Zhu Zhang and Xin Li and Yubo Chen", title = "Deciphering word-of-mouth in social media: Text-based metrics of consumer reviews", journal = j-TMIS, volume = "3", number = "1", pages = "5:1--5:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151168", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Enabled by Web 2.0 technologies, social media provide an unparalleled platform for consumers to share their product experiences and opinions through word-of-mouth (WOM) or consumer reviews. It has become increasingly important to understand how WOM content and metrics influence consumer purchases and product sales. By integrating marketing theories with text mining techniques, we propose a set of novel measures that focus on sentiment divergence in consumer product reviews. To test the validity of these metrics, we conduct an empirical study based on data from Amazon.com and BN.com (Barnes {\&} Noble). The results demonstrate significant effects of our proposed measures on product sales. This effect is not fully captured by nontextual review measures such as numerical ratings. Furthermore, in capturing the sales effect of review content, our divergence metrics are shown to be superior to and more appropriate than some commonly used textual measures the literature. The findings provide important insights into the business impact of social media and user-generated content, an emerging problem in business intelligence research. From a managerial perspective, our results suggest that firms should pay special attention to textual content information when managing social media and, more importantly, focus on the right measures.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Malhotra:2012:HVT, author = "Arvind Malhotra and Ann Majchrzak", title = "How virtual teams use their virtual workspace to coordinate knowledge", journal = j-TMIS, volume = "3", number = "1", pages = "6:1--6:??", month = apr, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2151163.2151169", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:08 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Virtual team members increasingly rely on virtual workspace tools to coordinate knowledge that each individual brings to the team. How the use of these tools affects knowledge coordination within virtual teams is not well understood. We distinguish between tools as features and the use of the virtual workspace as providing affordances for behaviors. Using situational awareness theory, we hypothesized two affordances of virtual workspaces that facilitate knowledge coordination. Using trading zone theory, we hypothesized two forms of trading zones created by features of virtual workspaces and the impact of these trading zones on the creation of affordances for team members. Members of 54 teams were asked about the affordances of the virtual workspace, and team leaders were asked about specific tools provided to the team. Our hypothesized model was supported: the different forms of trading zones were differentially related to the different affordances and on affordances were related to knowledge coordination satisfaction. Theoretical implications focus on the distinction between features and affordances and on the identification of specific features that affect specific affordances. Practical implications for managers and engineers supporting virtual teams include the utility of becoming knowledgeable about different forms of trading zones that virtual workspaces can provide and understanding the relationship between trading zones and different affordances.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{vanderAalst:2012:PMO, author = "Wil van der Aalst", title = "Process Mining: Overview and Opportunities", journal = j-TMIS, volume = "3", number = "2", pages = "7:1--7:??", month = jul, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2229156.2229157", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:09 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Over the last decade, process mining emerged as a new research field that focuses on the analysis of processes using event data. Classical data mining techniques such as classification, clustering, regression, association rule learning, and sequence/episode mining do not focus on business process models and are often only used to analyze a specific step in the overall process. Process mining focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process models are used for analysis (e.g., simulation and verification) and enactment by BPM/WFM systems. Previously, process models were typically made by hand without using event data. However, activities executed by people, machines, and software leave trails in so-called event logs. Process mining techniques use such logs to discover, analyze, and improve business processes. Recently, the Task Force on Process Mining released the Process Mining Manifesto. This manifesto is supported by 53 organizations and 77 process mining experts contributed to it. The active involvement of end-users, tool vendors, consultants, analysts, and researchers illustrates the growing significance of process mining as a bridge between data mining and business process modeling. The practical relevance of process mining and the interesting scientific challenges make process mining one of the ``hot'' topics in Business Process Management (BPM). This article introduces process mining as a new research field and summarizes the guiding principles and challenges described in the manifesto.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Shan:2012:OAC, author = "Zhe Shan and Akhil Kumar", title = "Optimal Adapter Creation for Process Composition in Synchronous vs. Asynchronous Communication", journal = j-TMIS, volume = "3", number = "2", pages = "8:1--8:??", month = jul, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2229156.2229160", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:09 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "A key issue in process-aware e-commerce collaboration is to orchestrate business processes of multiple business partners throughout a supply chain network in an automated and seamless way. Since each partner has its own internal processes with different control flow structures and message interfaces, the real challenge lies in verifying the correctness of process collaboration, and reconciling conflicts in an automated manner to make collaboration successful. The purpose of business process adaptation is to mediate the communication between independent processes to overcome their mismatches and incompatibilities. The goal of this article is to develop and compare efficient approaches of optimal adapter (i.e. one that minimizes the number of messages to be adapted) creation for multiple interacting processes under both synchronous and asynchronous communication. We start with an analysis of interactions of each message pair, and show how to identify incompatible cases and their adaptation elements for both types of communication. Then, we show how to extend this analysis into more general cases involving M messages and N processes ( M, N {$>$} 2). Further, we present optimal adapter creation algorithms for both scenarios based on our analysis technique. The algorithms were implemented in a Java-based prototype system, and results of two experiments are reported. We compare and discuss the insights gained about adapter creation in these two scenarios.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Huang:2012:TNP, author = "Zan Huang and Huimin Zhao and Dan Zhu", title = "Two New Prediction-Driven Approaches to Discrete Choice Prediction", journal = j-TMIS, volume = "3", number = "2", pages = "9:1--9:??", month = jul, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2229156.2229159", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:09 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The ability to predict consumer choices is essential in understanding the demand structure of products and services. Typical discrete choice models that are targeted at providing an understanding of the behavioral process leading to choice outcomes are developed around two main assumptions: the existence of a utility function that represents the preferences over a choice set and the relatively simple and interpretable functional form for the utility function with respect to attributes of alternatives and decision makers. These assumptions lead to models that can be easily interpreted to provide insights into the effects of individual variables, such as price and promotion, on consumer choices. However, these restrictive assumptions might impede the ability of such theory-driven models to deliver accurate predictions and forecasts. In this article, we develop novel approaches targeted at providing more accurate choice predictions. Specifically, we propose two prediction-driven approaches: pairwise preference learning using classification techniques and ranking function learning using evolutionary computation. We compare our proposed approaches with a multiclass classification approach, as well as a standard discrete choice model. Our empirical results show that the proposed approaches achieved significantly higher choice prediction accuracy.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ngo-Ye:2012:AOR, author = "Thomas L. Ngo-Ye and Atish P. Sinha", title = "Analyzing Online Review Helpfulness Using a Regressional {ReliefF}-Enhanced Text Mining Method", journal = j-TMIS, volume = "3", number = "2", pages = "10:1--10:??", month = jul, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2229156.2229158", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:09 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Within the emerging context of Web 2.0 social media, online customer reviews are playing an increasingly important role in disseminating information, facilitating trust, and promoting commerce in the e-marketplace. The sheer volume of customer reviews on the web produces information overload for readers. Developing a system that can automatically identify the most helpful reviews would be valuable to businesses that are interested in gathering informative and meaningful customer feedback. Because the target variable---review helpfulness---is continuous, common feature selection techniques from text classification cannot be applied. In this article, we propose and investigate a text mining model, enhanced using the Regressional ReliefF (RReliefF) feature selection method, for predicting the helpfulness of online reviews from Amazon.com. We find that RReliefF significantly outperforms two popular dimension reduction methods. This study is the first to investigate and compare different dimension reduction techniques in the context of applying text regression for predicting online review helpfulness. Another contribution is that our analysis of the keywords selected by RReliefF reveals meaningful feature groupings.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Nussbaumer:2012:EVC, author = "Philipp Nussbaumer and Inu Matter and Gerhard Schwabe", title = "``Enforced'' vs. ``Casual'' Transparency --- Findings from {IT}-Supported Financial Advisory Encounters", journal = j-TMIS, volume = "3", number = "2", pages = "11:1--11:??", month = jul, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2229156.2229161", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:09 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In sales-oriented service encounters like financial advice, the client may perceive information and interest asymmetries as a lack of transparency regarding the advisor's activities. In this article, we will discuss two design iterations of a supportive tabletop application that we built to increase process and information transparency as compared to the traditional pen and paper encounters. While the first iteration's design was ``enforcing'' transparency and therefore proved to be a failure [Nussbaumer et al. 2011], we built the second iteration on design rationales enabling more ``casual'' transparency. Experimental evaluations show that the redesigned system significantly increases the client's perceived transparency, her perceived control of the encounter and improves her perceived trustworthiness of and satisfaction with the encounter. With these findings, we contribute to (1) insight into the role of transparency advisory encounter design; (2) design solutions for establishing particular facets of transparency and their potential instantiations in tabletop systems; and (3) insight into the process of designing for transparency with socio-technical artifacts that are emergent as a result of design activities.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chiang:2012:BIA, author = "Roger H. L. Chiang and Paulo Goes and Edward A. Stohr", title = "Business Intelligence and Analytics Education, and Program Development: a Unique Opportunity for the Information Systems Discipline", journal = j-TMIS, volume = "3", number = "3", pages = "12:1--12:??", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2361256.2361257", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:10 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "``Big Data,'' huge volumes of data in both structured and unstructured forms generated by the Internet, social media, and computerized transactions, is straining our technical capacity to manage it. More importantly, the new challenge is to develop the capability to understand and interpret the burgeoning volume of data to take advantage of the opportunities it provides in many human endeavors, ranging from science to business. Data Science, and in business schools, Business Intelligence and Analytics (BI{\&}A) are emerging disciplines that seek to address the demands of this new era. Big Data and BI{\&}A present unique challenges and opportunities not only for the research community, but also for Information Systems (IS) programs at business schools. In this essay, we provide a brief overview of BI{\&}A, speculate on the role of BI{\&}A education in business schools, present the challenges facing IS departments, and discuss the role of IS curricula and program development, in delivering BI{\&}A education. We contend that a new vision for the IS discipline should address these challenges.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Achananuparp:2012:WRT, author = "Palakorn Achananuparp and Ee-Peng Lim and Jing Jiang and Tuan-Anh Hoang", title = "Who is Retweeting the Tweeters? {Modeling}, Originating, and Promoting Behaviors in the {Twitter} Network", journal = j-TMIS, volume = "3", number = "3", pages = "13:1--13:??", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2361256.2361258", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:10 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Real-time microblogging systems such as Twitter offer users an easy and lightweight means to exchange information. Instead of writing formal and lengthy messages, microbloggers prefer to frequently broadcast several short messages to be read by other users. Only when messages are interesting, are they propagated further by the readers. In this article, we examine user behavior relevant to information propagation through microblogging. We specifically use retweeting activities among Twitter users to define and model originating and promoting behavior. We propose a basic model for measuring the two behaviors, a mutual dependency model, which considers the mutual relationships between the two behaviors, and a range-based model, which considers the depth and reach of users' original tweets. Next, we compare the three behavior models and contrast them with the existing work on modeling influential Twitter users. Last, to demonstrate their applicability, we further employ the behavior models to detect interesting events from sudden changes in aggregated information propagation behavior of Twitter users. The results will show that the proposed behavior models can be effectively applied to detect interesting events in the Twitter stream, compared to the baseline tweet-based approaches.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lu:2012:CRC, author = "Hsin-Min Lu and Feng-Tse Tsai and Hsinchun Chen and Mao-Wei Hung and Shu-Hsing Li", title = "Credit Rating Change Modeling Using News and Financial Ratios", journal = j-TMIS, volume = "3", number = "3", pages = "14:1--14:??", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2361256.2361259", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:10 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Credit ratings convey credit risk information to participants in financial markets, including investors, issuers, intermediaries, and regulators. Accurate credit rating information plays a crucial role in supporting sound financial decision-making processes. Most previous studies on credit rating modeling are based on accounting and market information. Text data are largely ignored despite the potential benefit of conveying timely information regarding a firm's outlook. To leverage the additional information in news full-text for credit rating prediction, we designed and implemented a news full-text analysis system that provides firm-level coverage, topic, and sentiment variables. The novel topic-specific sentiment variables contain a large fraction of missing values because of uneven news coverage. The missing value problem creates a new challenge for credit rating prediction approaches. We address this issue by developing a missing-tolerant multinomial probit (MT-MNP) model, which imputes missing values based on the Bayesian theoretical framework. Our experiments using seven and a half years of real-world credit ratings and news full-text data show that (1) the overall news coverage can explain future credit rating changes while the aggregated news sentiment cannot; (2) topic-specific news coverage and sentiment have statistically significant impact on future credit rating changes; (3) topic-specific negative sentiment has a more salient impact on future credit rating changes compared to topic-specific positive sentiment; (4) MT-MNP performs better in predicting future credit rating changes compared to support vector machines (SVM). The performance gap as measured by macroaveraging F-measure is small but consistent.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Wei:2012:UNA, author = "Wei Wei and Sudha Ram", title = "Using a Network Analysis Approach for Organizing Social Bookmarking Tags and Enabling {Web} Content Discovery", journal = j-TMIS, volume = "3", number = "3", pages = "15:1--15:??", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2361256.2361260", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:10 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This article describes an innovative approach to reorganizing the tag space generated by social bookmarking services. The objective of this work is to enable effective search and discovery of Web content using social bookmarking tags. Tags are metadata generated by users for Web content annotation. Their potential as effective Web search and discovery tool is hindered by challenges such as, the tag space being untidy due to ambiguity, and hidden or implicit semantics. Using a novel analytics approach, we conducted network analyses on tags and discovered that tags are generated for different purposes and that there are inherent relationships among tags. Our approach can be used to extract the purposes of tags and relationships among the tags and this information can be used as facets to add structure and hierarchy to reorganize the flat tag space. The semantics of relationships and hierarchy in our proposed faceted model of tags enable searches on annotated Web content in an effective manner. We describe the implementation of a prototype system called FASTS to demonstrate feasibility and effectiveness of our approach.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Hu:2012:DVP, author = "Nan Hu and Hasan Cavusoglu and Ling Liu and Chenkai Ni", title = "Do Vendors' Pricing Decisions Fully Reflect Information in Online Reviews?", journal = j-TMIS, volume = "3", number = "3", pages = "16:1--16:??", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1145/2361256.2361261", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Nov 6 19:02:10 MST 2012", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "By using online retail data collected from Amazon, Barnes {\&} Nobel, and Pricegrabber, this paper investigates whether online vendors' pricing decisions fully reflect the information contained in various components of customers' online reviews. The findings suggest that there is inefficiency in vendors' pricing decisions. Specifically, vendors do not appear to fully understand the incremental predictive power of online reviews in forecasting future sales when they adjust their prices. However, they do understand demand persistence. Interestingly, vendors reduce price if the actual demand is higher than the expected demand (positive demand shock). This phenomenon is attributed to the advertising effect suggested in previous literature and the intense competitiveness of e-Commerce. Finally, we document that vendors do not change their prices directly in response to online reviews; their response to online reviews is through forecasting consumer's future demand.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lim:2013:BIA, author = "Ee-Peng Lim and Hsinchun Chen and Guoqing Chen", title = "Business Intelligence and Analytics: Research Directions", journal = j-TMIS, volume = "3", number = "4", pages = "17:1--17:??", month = jan, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2407740.2407741", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:39 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business intelligence and analytics (BIA) is about the development of technologies, systems, practices, and applications to analyze critical business data so as to gain new insights about business and markets. The new insights can be used for improving products and services, achieving better operational efficiency, and fostering customer relationships. In this article, we will categorize BIA research activities into three broad research directions: (a) big data analytics, (b) text analytics, and (c) network analytics. The article aims to review the state-of-the-art techniques and models and to summarize their use in BIA applications. For each research direction, we will also determine a few important questions to be addressed in future research.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhang:2013:CMS, author = "Bin Zhang and Andrew C. Thomas and Patrick Doreian and David Krackhardt and Ramayya Krishnan", title = "Contrasting Multiple Social Network Autocorrelations for Binary Outcomes, With Applications To Technology Adoption", journal = j-TMIS, volume = "3", number = "4", pages = "18:1--18:??", month = jan, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2407740.2407742", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:39 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The rise of socially targeted marketing suggests that decisions made by consumers can be predicted not only from their personal tastes and characteristics, but also from the decisions of people who are close to them in their networks. One obstacle to consider is that there may be several different measures for closeness that are appropriate, either through different types of friendships, or different functions of distance on one kind of friendship, where only a subset of these networks may actually be relevant. Another is that these decisions are often binary and more difficult to model with conventional approaches, both conceptually and computationally. To address these issues, we present a hierarchical auto-probit model for individual binary outcomes that uses and extends the machinery of the auto-probit method for binary data. We demonstrate the behavior of the parameters estimated by the multiple network-regime auto-probit model (m-NAP) under various sensitivity conditions, such as the impact of the prior distribution and the nature of the structure of the network. We also demonstrate several examples of correlated binary data outcomes in networks of interest to information systems, including the adoption of caller ring-back tones, whose use is governed by direct connection but explained by additional network topologies.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Pervin:2013:FSC, author = "Nargis Pervin and Fang Fang and Anindya Datta and Kaushik Dutta and Debra Vandermeer", title = "Fast, Scalable, and Context-Sensitive Detection of Trending Topics in Microblog Post Streams", journal = j-TMIS, volume = "3", number = "4", pages = "19:1--19:??", month = jan, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2407740.2407743", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:39 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Social networks, such as Twitter, can quickly and broadly disseminate news and memes across both real-world events and cultural trends. Such networks are often the best sources of up-to-the-minute information, and are therefore of considerable commercial and consumer interest. The trending topics that appear first on these networks represent an answer to the age-old query ``what are people talking about?'' Given the incredible volume of posts (on the order of 45,000 or more per minute), and the vast number of stories about which users are posting at any given time, it is a formidable problem to extract trending stories in real time. In this article, we describe a method and implementation for extracting trending topics from a high-velocity real-time stream of microblog posts. We describe our approach and implementation, and a set of experimental results that show that our system can accurately find ``hot'' stories from high-rate Twitter-scale text streams.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhang:2013:PCN, author = "Zhu Zhang and Chenhui Guo and Paulo Goes", title = "Product Comparison Networks for Competitive Analysis of Online Word-of-Mouth", journal = j-TMIS, volume = "3", number = "4", pages = "20:1--20:??", month = jan, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2407740.2407744", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:39 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Enabled by Web 2.0 technologies social media provide an unparalleled platform for consumers to share their product experiences and opinions---through word-of-mouth (WOM) or consumer reviews. It has become increasingly important to understand how WOM content and metrics thereof are related to consumer purchases and product sales. By integrating network analysis with text sentiment mining techniques, we propose product comparison networks as a novel construct, computed from consumer product reviews. To test the validity of these product ranking measures, we conduct an empirical study based on a digital camera dataset from Amazon.com. The results demonstrate significant linkage between network-based measures and product sales, which is not fully captured by existing review measures such as numerical ratings. The findings provide important insights into the business impact of social media and user-generated content, an emerging problem in business intelligence research. From a managerial perspective, our results suggest that WOM in social media also constitutes a competitive landscape for firms to understand and manipulate.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yaraghi:2013:NEH, author = "Niam Yaraghi and Anna Ye Du and Raj Sharman and Ram D. Gopal and R. Ramesh", title = "Network Effects in Health Information Exchange Growth", journal = j-TMIS, volume = "4", number = "1", pages = "1:1--1:??", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2445560.2445561", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:41 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The importance of the Healthcare Information Exchange (HIE) in increasing healthcare quality and reducing risks and costs has led to greater interest in identifying factors that enhance adoption and meaningful use of HIE by healthcare providers. In this research we study the interlinked network effects between two different groups of physicians --- primary care physicians and specialists --- as significant factors in increasing the growth of each group in an exchange. An analytical model of interlinked and intragroup influences on adoption is developed using the Bass diffusion model as a basis. Adoption data on 1,060 different primary and secondary care physicians over 32 consecutive months was used to test the model. The results indicate not only the presence of interlinked effects, but also that their influence is stronger than that of the intragroup. Further, the influence of primary care physicians on specialists is stronger than that of specialists on primary care physicians. We also provide statistical evidence that the new model performs better than the conventional Bass model, and the assumptions of diffusion symmetry in the market are statistically valid. Together, the findings provide important guidelines on triggers that enhance the overall growth of HIE and potential marketing strategies for HIE services.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Valecha:2013:DMC, author = "Rohit Valecha and Raj Sharman and H. Raghav Rao and Shambhu Upadhyaya", title = "A Dispatch-Mediated Communication Model for Emergency Response Systems", journal = j-TMIS, volume = "4", number = "1", pages = "2:1--2:??", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2445560.2445562", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:41 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The current state of emergency communication is dispatch-mediated (the messages from the scene are directed towards the responders and agencies through the dispatch agency). These messages are logged in electronic documents called incident reports, which are useful in monitoring the incident, off-site supervision, resource allocation, and post-incident analysis. However, these messages do not adhere to any particular structure, and there is no set format. The lack of standards creates a problem for sharing information among systems and responders and has a detrimental impact on systems interoperability. In this article, we develop a National Information Exchange Model (NIEM) and Universal Core (UCORE) compliant messaging model, considering message structures and formats, to foster message standardization.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Choi:2013:ISI, author = "Jae Choi and Derek L. Nazareth and Hemant K. Jain", title = "The Impact of {SOA} Implementation on {IT}-Business Alignment: a System Dynamics Approach", journal = j-TMIS, volume = "4", number = "1", pages = "3:1--3:??", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2445560.2445563", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:41 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "With firms facing intense rivalry, globalization, and time-to-market pressures, the need for organizational agility assumes greater importance. One of the primary vehicles for achieving organizational agility is the use of agile information systems [IS] and the close alignment of information technologies [IT] with business. However, IS is often viewed as an impediment to organization agility. Recently, service-oriented architecture [SOA] has emerged as a prominent IS agility-enhancing technology. The fundamental question of how SOA can enhance organization agility and foster closer alignment between IT and business has not been adequately addressed. The dynamic interaction among external business environmental factors, organizational agility, and IS architecture makes the process of keeping IT and business aligned more complex. This study uses a design science approach to build a system dynamics model to examine the effect of employing alternative SOA implementation strategies in various organizational and external business environments on the IT business alignment and IS cost. The results provide insights into the shaping of IT-business alignment. Additionally, the system dynamics model serves as a tool for supporting managerial decisions related to SOA implementation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ullah:2013:SRB, author = "Azmat Ullah and Richard Lai", title = "A Systematic Review of Business and Information Technology Alignment", journal = j-TMIS, volume = "4", number = "1", pages = "4:1--4:??", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2445560.2445564", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 30 18:40:41 MDT 2013", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business organizations have become heavily dependent on information technology (IT) services. The process of alignment is defined as the mutual synchronization of business goals and IT services. However, achieving mature alignment between business and IT is difficult due to the rapid changes in the business and IT environments. This article provides a systematic review of studies on the alignment of business and IT. The research articles reviewed are based on topics of alignment, the definition of alignment, history, alignment challenges, phases of alignment, alignment measurement approaches, the importance of alignment in business industries, how software engineering helps in better alignment, and the role of the business environment in aligning business with IT. It aims to present a thorough understanding of business-IT alignment and to provide a list of future research directions regarding alignment. To perform the systematic review, we used the guidelines developed by Kitchenham for reviewing the available research papers relevant to our topic.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Gill:2013:FUM, author = "T. Grandon Gill and Alan R. Hevner", title = "A Fitness-Utility Model for Design Science Research", journal = j-TMIS, volume = "4", number = "2", pages = "5:1--5:??", month = aug, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2499962.2499963", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:56 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Current thinking in design science research (DSR) defines the usefulness of the design artifact in a relevant problem environment as the primary research goal. Here we propose a complementary evaluation model for DSR. Drawing from evolutionary economics, we define a fitness-utility model that better captures the evolutionary nature of design improvements and the essential DSR nature of searching for a satisfactory design across a fitness landscape. Our goal is to move DSR to more meaningful evaluations of design artifacts for sustainable impacts. A key premise of this new thinking is that the evolutionary fitness of a design artifact is more valuable than its immediate usefulness. We conclude with a discussion of the strengths and challenges of the fitness-utility model for the performance of rigorous and relevant DSR.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Wu:2013:DKM, author = "Jiming Wu and Clyde W. Holsapple", title = "Does Knowledge Management Matter? {The} Empirical Evidence from Market-Based Valuation", journal = j-TMIS, volume = "4", number = "2", pages = "6:1--6:??", month = aug, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2500750", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:56 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Information technology is inseparable from contemporary knowledge management (KM). Although anecdotal evidence and individual case studies suggest that effective knowledge management initiatives contribute to superior firm performance, other kinds of empirical investigations are scarce, and more to the point, most of them are based on perceptions of survey participants embedded in the firms being studied. Moreover, studies analyzing the question of whether superior KM performance can predict superior market-based valuation appear to be virtually nonexistent. Findings of such studies would be of value to those who champion and direct a firm's KM efforts, and to the firm's strategists, planners, and operational managers. Here, we empirically examine the relationship between KM performance and firm valuation; the former is assessed by international panels of independent KM experts and the latter is evaluated in terms of market-based measures. Based on data spanning eight years, the results show that superior KM performance has a statistically significant positive association with firm valuation in terms of Tobin's q, price-to-book ratio, and price-to-sales ratio. This study contributes to the management literature by using independent expert judges and archival data to substantiate the notion that KM competencies are an important ingredient in a firm's performance as indicated by market-based valuation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Orman:2013:BIT, author = "Levent V. Orman", title = "{Bayesian} Inference in Trust Networks", journal = j-TMIS, volume = "4", number = "2", pages = "7:1--7:??", month = aug, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2489790", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:56 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Trust has emerged as a major impediment to the success of electronic markets and communities where interaction with the strangers is the norm. Social Networks and Online Communities enable interaction with complete strangers, and open up new commercial, political, and social possibilities. But those promises are rarely achieved because it is difficult to trust the online contacts. A common approach to remedy this problem is to compute trust values for the new contacts from the existing trust values in the network. There are two main methods: aggregation and transitivity. Yet, neither method provides satisfactory results because trust networks are sparse and transitivity may not hold. This article develops a Bayesian formulation of the problem, where trust is defined as a conditional probability, and a Bayesian Network analysis is employed to compute the unknown trust values in terms of the known trust values. The algorithms used to propagate conditional probabilities through the network are theoretically sound and based on a long-standing literature on probability propagation in Bayesian networks. Moreover, the context information that is typically ignored in trust literature is included here as a major factor in computing new trust values. These changes have led to significant improvements over existing approaches in the accuracy of computed trust, and with some modifications to the algorithm, in its reach. Real data acquired from Advogato network is used to do extensive testing, and the results confirm the practical value of a theoretically sound Bayesian approach.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhang:2013:RWM, author = "Zhu Zhang and Daniel D. Zeng and Ahmed Abbasi and Jing Peng and Xiaolong Zheng", title = "A Random Walk Model for Item Recommendation in Social Tagging Systems", journal = j-TMIS, volume = "4", number = "2", pages = "8:1--8:??", month = aug, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2490860", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:56 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Social tagging, as a novel approach to information organization and discovery, has been widely adopted in many Web 2.0 applications. Tags contributed by users to annotate a variety of Web resources or items provide a new type of information that can be exploited by recommender systems. Nevertheless, the sparsity of the ternary interaction data among users, items, and tags limits the performance of tag-based recommendation algorithms. In this article, we propose to deal with the sparsity problem in social tagging by applying random walks on ternary interaction graphs to explore transitive associations between users and items. The transitive associations in this article refer to the path of the link between any two nodes whose length is greater than one. Taking advantage of these transitive associations can allow more accurate measurement of the relevance between two entities (e.g., user-item, user-user, and item-item). A PageRank-like algorithm has been developed to explore these transitive associations by spreading users' preferences on an item similarity graph and spreading items' influences on a user similarity graph. Empirical evaluation on three real-world datasets demonstrates that our approach can effectively alleviate the sparsity problem and improve the quality of item recommendation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Derrick:2013:DDC, author = "Douglas C. Derrick and Thomas O. Meservy and Jeffrey L. Jenkins and Judee K. Burgoon and Jay F. {Nunamaker, Jr.}", title = "Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues", journal = j-TMIS, volume = "4", number = "2", pages = "9:1--9:??", month = aug, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2499962.2499967", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:56 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chat-based environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that deception influences response time, word count, lexical diversity, and the number of times a chat message is edited. Using a custom chatbot to conduct interviews in an experiment, we collected 1,572 deceitful and 1,590 truthful chat-based responses. The results of the experiment confirm that deception is positively correlated with response time and the number of edits and negatively correlated to word count. Contrary to our prediction, we found that deception is not significantly correlated with lexical diversity. Furthermore, the age of the participant moderates the influence of deception on response time. Our results have implications for understanding deceit in chat-based communication and building deception-detection decision aids in chat-based systems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sarker:2013:MOB, author = "Suprateek Sarker and Suranjan Chakraborty and Patriya Silpakit Tansuhaj and Mark Mulder and Kivilcim Dogerlioglu-Demir", title = "The {``Mail-Order-Bride'' (MOB)} Phenomenon in the Cyberworld: an Interpretive Investigation", journal = j-TMIS, volume = "4", number = "3", pages = "10:1--10:??", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2524263", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:58 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Information technology (IT) is often an enabler in bringing people together. In the context of this study, IT helps connect matchmaking service providers with those looking for love, particularly when a male seeks to meet and possibly marry a female from another country: a process which results in over 16,500 such `mail-order-bride' (MOB) marriages a year in the United States alone. Past research in business disciplines has been largely silent about the way in which this process unfolds, the perspectives of the participants at different points of time, and the role of IT underlying the MOB matchmaking service. Adopting an interpretivist stance, and utilizing some of the methodological guidelines associated with the Grounded Theory Methodology (GTM), we develop a process model which highlights: (a) the key states of the process through which the relationship between the MOB seeker (the man) and the MOB (the woman) unfolds, (b) the transitions between states, and (c) the triggering conditions for the transitions from one state to another. This study also highlights key motivations of the individuals participating in the MOB process, the effect of power and the role it plays in the dynamics of the relationships, the status of women and how their status evolves during the MOB process, and the unique affordance provided by IT as the relationships evolve.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kasiri:2013:ROS, author = "Narges Kasiri and Ramesh Sharda", title = "Real Options and System Dynamics for Information Technology Investment Decisions: Application to {RFID} Adoption in Retail", journal = j-TMIS, volume = "4", number = "3", pages = "11:1--11:??", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2517309", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:58 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We propose a unique combination of system dynamics and real options into a robust and innovative model for analyzing return on investments in IT. Real options modeling allows a cost benefit analysis to take into account managerial flexibilities when there is uncertainty in the investment, while system dynamics can build a predictive model, in which one can simulate different real-life and hypothetical scenarios in order to provide measurements that can be used in the real options model. Our return on the investment model combines these long-established quantitative techniques in a novel manner. This study applies this robust hybrid model to a challenging IT investment problem: adoption of RFID in retail. Item-level RFID is the next generation of identification technology in the retail sector. Our method can help managers to overcome the complexity and uncertainties in the investment timing of this technology. We analyze the RFID considerations in retail decision-making using real data compiled from a Delphi study. Our model demonstrates how the cost and benefits of such an investment change over time. The results highlight the variable cost of RFID tags as the key factor in the decision process concerning whether to immediately adopt or postpone the use of RFID in retail. Our exploratory work suggests that it is possible to combine merchandising and pricing issues in addition to the traditional supply chain management issues in studying any multifaceted problem in retail.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mathew:2013:DPP, author = "George Mathew and Zoran Obradovic", title = "Distributed Privacy-Preserving Decision Support System for Highly Imbalanced Clinical Data", journal = j-TMIS, volume = "4", number = "3", pages = "12:1--12:??", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2517310", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:58 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "When a medical practitioner encounters a patient with rare symptoms that translates to rare occurrences in the local database, it is quite valuable to draw conclusions collectively from such occurrences in other hospitals. However, for such rare conditions, there will be a huge imbalance in classes among the relevant base population. Due to regulations and privacy concerns, collecting data from other hospitals will be problematic. Consequently, distributed decision support systems that can use just the statistics of data from multiple hospitals are valuable. We present a system that can collectively build a distributed classification model dynamically without the need of patient data from each site in the case of imbalanced data. The system uses a voting ensemble of experts for the decision model. The imbalance condition and number of experts can be determined by the system. Since only statistics of the data and no raw data are required by the system, patient privacy issues are addressed. We demonstrate the outlined principles using the Nationwide Inpatient Sample (NIS) database. Results of experiments conducted on 7,810,762 patients from 1050 hospitals show improvement of 13.68\% to 24.46\% in balanced prediction accuracy using our model over the baseline model, illustrating the effectiveness of the proposed methodology.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sakata:2013:IEE, author = "Masato Sakata and Zeynep Y{\"u}cel and Kazuhiko Shinozawa and Norihiro Hagita and Michita Imai and Michiko Furutani and Rumiko Matsuoka", title = "An Inference Engine for Estimating Outside States of Clinical Test Items", journal = j-TMIS, volume = "4", number = "3", pages = "13:1--13:??", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2517084", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:58 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Common periodical health check-ups include several clinical test items with affordable cost. However, these standard tests do not directly indicate signs of most lifestyle diseases. In order to detect such diseases, a number of additional specific clinical tests are required, which increase the cost of the health check-up. This study aims to enrich our understanding of the common health check-ups and proposes a way to estimate the signs of several lifestyle diseases based on the standard tests in common examinations without performing any additional specific tests. In this manner, we enable a diagnostic process, where the physician may prefer to perform or avoid a costly test according to the estimation carried out through a set of common affordable tests. To that end, the relation between standard and specific test results is modeled with a multivariate kernel density estimate. The condition of the patient regarding a specific test is assessed following a Bayesian framework. Our results indicate that the proposed method achieves an overall estimation accuracy of 84\%. In addition, an outstanding estimation accuracy is achieved for a subset of high-cost tests. Moreover, comparison with standard artificial intelligence methods suggests that our algorithm outperforms the conventional methods. Our contributions are as follows: (i) promotion of affordable health check-ups, (ii) high estimation accuracy in certain tests, (iii) generalization capability due to ease of implementation on different platforms and institutions, (iv) flexibility to apply to various tests and potential to improve early detection rates.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Edgcomb:2013:AEA, author = "Alex Edgcomb and Frank Vahid", title = "Accurate and Efficient Algorithms that Adapt to Privacy-Enhanced Video for Improved Assistive Monitoring", journal = j-TMIS, volume = "4", number = "3", pages = "14:1--14:??", month = oct, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2523025.2523026", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:58 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Automated monitoring algorithms operating on live video streamed from a home can effectively aid in several assistive monitoring goals, such as detecting falls or estimating daily energy expenditure. Use of video raises obvious privacy concerns. Several privacy enhancements have been proposed such as modifying a person in video by introducing blur, silhouette, or bounding-box. Person extraction is fundamental in video-based assistive monitoring and degraded in the presence of privacy enhancements; however, privacy enhancements have characteristics that can opportunistically be adapted to. We propose two adaptive algorithms for improving assistive monitoring goal performance with privacy-enhanced video: specific-color hunter and edge-void filler. A nonadaptive algorithm, foregrounding, is used as the default algorithm for the adaptive algorithms. We compare nonadaptive and adaptive algorithms with 5 common privacy enhancements on the effectiveness of 8 automated monitoring goals. The nonadaptive algorithm performance on privacy-enhanced video is degraded from raw video. However, adaptive algorithms can compensate for the degradation. Energy estimation accuracy in our tests degraded from 90.9\% to 83.9\%, but the adaptive algorithms significantly compensated by bringing the accuracy up to 87.1\%. Similarly, fall detection accuracy degraded from 1.0 sensitivity to 0.86 and from 1.0 specificity to 0.79, but the adaptive algorithms compensated accuracy back to 0.92 sensitivity and 0.90 specificity. Additionally, the adaptive algorithms were computationally more efficient than the nonadaptive algorithm, averaging 1.7\% more frames processed per second.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yang:2013:SHW, author = "Christopher C. Yang and Gondy Leroy and Sophia Ananiadou", title = "Smart Health and Wellbeing", journal = j-TMIS, volume = "4", number = "4", pages = "15:1--15:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2555810.2555811", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Healthcare informatics has drawn substantial attention in recent years. Current work on healthcare informatics is highly interdisciplinary involving methodologies from computing, engineering, information science, behavior science, management science, social science, as well as many different areas in medicine and public health. Three major tracks, (i) systems, (ii) analytics, and (iii) human factors, can be identified. The systems track focuses on healthcare system architecture, framework, design, engineering, and application; the analytics track emphasizes data/information processing, retrieval, mining, analytics, as well as knowledge discovery; the human factors track targets the understanding of users or context, interface design, and user studies of healthcare applications. In this article, we discuss some of the latest development and introduce several articles selected for this special issue. We envision that the development of computing-oriented healthcare informatics research will continue to grow rapidly. The integration of different disciplines to advance the healthcare and wellbeing of our society will also be accelerated.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Wang:2013:MTE, author = "Zidong Wang and Julie Eatock and Sally McClean and Dongmei Liu and Xiaohui Liu and Terry Young", title = "Modeling Throughput of Emergency Departments via Time Series: an Expectation Maximization Algorithm", journal = j-TMIS, volume = "4", number = "4", pages = "16:1--16:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2544105", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In this article, the expectation maximization (EM) algorithm is applied for modeling the throughput of emergency departments via available time-series data. The dynamics of emergency department throughput is developed and evaluated, for the first time, as a stochastic dynamic model that consists of the noisy measurement and first-order autoregressive (AR) stochastic dynamic process. By using the EM algorithm, the model parameters, the actual throughput, as well as the noise intensity, can be identified simultaneously. Four real-world time series collected from an emergency department in West London are employed to demonstrate the effectiveness of the introduced algorithm. Several quantitative indices are proposed to evaluate the inferred models. The simulation shows that the identified model fits the data very well.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhang:2013:MDP, author = "He Zhang and Sanjay Mehotra and David Liebovitz and Carl A. Gunter and Bradley Malin", title = "Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits", journal = j-TMIS, volume = "4", number = "4", pages = "17:1--17:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2544102", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In electronic medical record (EMR) systems, administrators often provide EMR users with broad access privileges, which may leave the system vulnerable to misuse and abuse. Given that patient care is based on a coordinated workflow, we hypothesize that care pathways can be represented as the progression of a patient through a system and introduce a strategy to model the patient's flow as a sequence of accesses defined over a graph. Elements in the sequence correspond to features associated with the access transaction (e.g., reason for access). Based on this motivation, we model patterns of patient record usage, which may indicate deviations from care workflows. We evaluate our approach using several months of data from a large academic medical center. Empirical results show that this framework finds a small portion of accesses constitute outliers from such flows. We also observe that the violation patterns deviate for different types of medical services. Analysis of our results suggests greater deviation from normal access patterns by nonclinical users. We simulate anomalies in the context of real accesses to illustrate the efficiency of the proposed method for different medical services. As an illustration of the capabilities of our method, it was observed that the area under the receiver operating characteristic (ROC) curve for the Pediatrics service was found to be 0.9166. The results suggest that our approach is competitive with, and often better than, the existing state-of-the-art in its outlier detection performance. At the same time, our method is more efficient, by orders of magnitude, than previous approaches, allowing for detection of thousands of accesses in seconds.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Khosla:2013:ECM, author = "Rajiv Khosla and Mei-Tai Chu", title = "Embodying Care in {Matilda}: an Affective Communication Robot for Emotional Wellbeing of Older People in {Australian} Residential Care Facilities", journal = j-TMIS, volume = "4", number = "4", pages = "18:1--18:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2544104", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Ageing population is at the center of the looming healthcare crisis in most parts of the developed and developing world. Australia, like most of the western world, is bracing up for the looming ageing population crisis, spiraling healthcare costs, and expected serious shortage of healthcare workers. Assistive service and companion (social) robots are being seen as one of the ways for supporting aged care facilities to meet this challenge and improve the quality of care of older people including mental and physical health outcomes, as well as to support healthcare workers in personalizing care. In this article, the authors report on the design and implementation of first-ever field trials of Matilda, a human-like assistive communication (service and companion) robot for improving the emotional well-being of older people in three residential care facilities in Australia involving 70 participants. The research makes several unique contributions including Matilda's ability to break technology barriers, positively engage older people in group and one-to-one activities, making these older people productive and useful, helping them become resilient and cope better through personalization of care, and finally providing them sensory enrichment through Matilda's multimodal communication capabilities.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lisetti:2013:CHY, author = "Christine Lisetti and Reza Amini and Ugan Yasavur and Naphtali Rishe", title = "{I} Can Help You Change! {An} Empathic Virtual Agent Delivers Behavior Change Health Interventions", journal = j-TMIS, volume = "4", number = "4", pages = "19:1--19:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2544103", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We discuss our approach to developing a novel modality for the computer-delivery of Brief Motivational Interventions (BMIs) for behavior change in the form of a personalized On-Demand VIrtual Counselor (ODVIC), accessed over the internet. ODVIC is a multimodal Embodied Conversational Agent (ECA) that empathically delivers an evidence-based behavior change intervention by adapting, in real-time, its verbal and nonverbal communication messages to those of the user's during their interaction. We currently focus our work on excessive alcohol consumption as a target behavior, and our approach is adaptable to other target behaviors (e.g., overeating, lack of exercise, narcotic drug use, non-adherence to treatment). We based our current approach on a successful existing patient-centered brief motivational intervention for behavior change---the Drinker's Check-Up (DCU)---whose computer-delivery with a text-only interface has been found effective in reducing alcohol consumption in problem drinkers. We discuss the results of users' evaluation of the computer-based DCU intervention delivered with a text-only interface compared to the same intervention delivered with two different ECAs (a neutral one and one with some empathic abilities). Users rate the three systems in terms of acceptance, perceived enjoyment, and intention to use the system, among other dimensions. We conclude with a discussion of how our positive results encourage our long-term goals of on-demand conversations, anytime, anywhere, with virtual agents as personal health and well-being helpers.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mirani:2013:BBI, author = "Rajesh Mirani and Anju Harpalani", title = "Business Benefits or Incentive Maximization? {Impacts} of the {Medicare} {EHR} Incentive Program at Acute Care Hospitals", journal = j-TMIS, volume = "4", number = "4", pages = "20:1--20:??", month = dec, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1145/2543900", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 13 06:54:59 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This study investigates the influence of the Medicare EHR Incentive Program on EHR adoption at acute care hospitals and the impact of EHR adoption on operational and financial efficiency/effectiveness. It finds that even before joining the incentive program, adopter hospitals had more efficient and effective Medicare operations than those of non-adopters. Adopters were also financially more efficient. After joining the program, adopter hospitals treated significantly more Medicare patients by shortening their stay durations, relative to their own non-Medicare patients and also to patients at non-adopter hospitals, even as their overall capacity utilization remained relatively unchanged. The study concludes that many of these hospitals had implemented EHR even before the initiation of the incentive program. It further infers that they joined this program with opportunistic intentions of tapping into incentive payouts which they maximized by taking on more Medicare patients. These findings give credence to critics of the program who have questioned its utility and alleged that it serves only to reward existing users of EHR technologies.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ho:2014:SSP, author = "Joyce C. Ho and Cheng H. Lee and Joydeep Ghosh", title = "Septic Shock Prediction for Patients with Missing Data", journal = j-TMIS, volume = "5", number = "1", pages = "1:1--1:??", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2591676", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 15 17:44:19 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Sepsis and septic shock are common and potentially fatal conditions that often occur in intensive care unit (ICU) patients. Early prediction of patients at risk for septic shock is therefore crucial to minimizing the effects of these complications. Potential indications for septic shock risk span a wide range of measurements, including physiological data gathered at different temporal resolutions and gene expression levels, leading to a nontrivial prediction problem. Previous works on septic shock prediction have used small, carefully curated datasets or clinical measurements that may not be available for many ICU patients. The recent availability of a large, rich ICU dataset called MIMIC-II has provided the opportunity for more extensive modeling of this problem. However, such a large clinical dataset inevitably contains a substantial amount of missing data. We investigate how different imputation selection criteria and methods can overcome the missing data problem. Our results show that imputation methods in conjunction with predictive modeling can lead to accurate septic shock prediction, even if the features are restricted primarily to noninvasive measurements. Our models provide a generalized approach for predicting septic shock in any ICU patient.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yang:2014:PDS, author = "Christopher C. Yang and Haodong Yang and Ling Jiang", title = "Postmarketing Drug Safety Surveillance Using Publicly Available Health-Consumer-Contributed Content in Social Media", journal = j-TMIS, volume = "5", number = "1", pages = "2:1--2:??", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2576233", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 15 17:44:19 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Postmarketing drug safety surveillance is important because many potential adverse drug reactions cannot be identified in the premarketing review process. It is reported that about 5\% of hospital admissions are attributed to adverse drug reactions and many deaths are eventually caused, which is a serious concern in public health. Currently, drug safety detection relies heavily on voluntarily reporting system, electronic health records, or relevant databases. There is often a time delay before the reports are filed and only a small portion of adverse drug reactions experienced by health consumers are reported. Given the popularity of social media, many health social media sites are now available for health consumers to discuss any health-related issues, including adverse drug reactions they encounter. There is a large volume of health-consumer-contributed content available, but little effort has been made to harness this information for postmarketing drug safety surveillance to supplement the traditional approach. In this work, we propose the association rule mining approach to identify the association between a drug and an adverse drug reaction. We use the alerts posted by Food and Drug Administration as the gold standard to evaluate the effectiveness of our approach. The result shows that the performance of harnessing health-related social media content to detect adverse drug reaction is good and promising.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bouktif:2014:PSO, author = "Salah Bouktif and Houari Sahraoui and Faheem Ahmed", title = "Predicting Stability of Open-Source Software Systems Using Combination of {Bayesian} Classifiers", journal = j-TMIS, volume = "5", number = "1", pages = "3:1--3:??", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2555596", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 15 17:44:19 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/gnu.bib; https://www.math.utah.edu/pub/tex/bib/java2010.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The use of free and Open-Source Software (OSS) systems is gaining momentum. Organizations are also now adopting OSS, despite some reservations, particularly about the quality issues. Stability of software is one of the main features in software quality management that needs to be understood and accurately predicted. It deals with the impact resulting from software changes and argues that stable components lead to a cost-effective software evolution. Changes are most common phenomena present in OSS in comparison to proprietary software. This makes OSS system evolution a rich context to study and predict stability. Our objective in this work is to build stability prediction models that are not only accurate but also interpretable, that is, able to explain the link between the architectural aspects of a software component and its stability behavior in the context of OSS. Therefore, we propose a new approach based on classifiers combination capable of preserving prediction interpretability. Our approach is classifier-structure dependent. Therefore, we propose a particular solution for combining Bayesian classifiers in order to derive a more accurate composite classifier that preserves interpretability. This solution is implemented using a genetic algorithm and applied in the context of an OSS large-scale system, namely the standard Java API. The empirical results show that our approach outperforms state-of-the-art approaches from both machine learning and software engineering.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Huang:2014:BOT, author = "Lihua Huang and Sulin Ba and Xianghua Lu", title = "Building Online Trust in a Culture of {Confucianism}: The Impact of Process Flexibility and Perceived Control", journal = j-TMIS, volume = "5", number = "1", pages = "4:1--4:??", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2576756", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 15 17:44:19 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The success of e-commerce companies in a Confucian cultural context takes more than advanced IT and process design that have proven successful in Western countries. The example of eBay's failure in China indicates that earning the trust of Chinese consumers is essential to success, yet the process of building that trust requires something different from that in the Western culture. This article attempts to build a theoretical model to explore the relationship between the Confucian culture and online trust. We introduce two new constructs, namely process flexibility and perceived control, as particularly important factors in online trust formation in the Chinese cultural context. A survey was conducted to test the proposed theoretical model. This study offers a new explanation for online trust formation in the Confucian context. The findings of this article can provide guidance for companies hoping to successfully navigate the Chinese online market in the future.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yeo:2014:RMD, author = "M. Lisa Yeo and Erik Rolland and Jackie Rees Ulmer and Raymond A. Patterson", title = "Risk Mitigation Decisions for {IT} Security", journal = j-TMIS, volume = "5", number = "1", pages = "5:1--5:??", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2576757", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 15 17:44:19 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Enterprises must manage their information risk as part of their larger operational risk management program. Managers must choose how to control for such information risk. This article defines the flow risk reduction problem and presents a formal model using a workflow framework. Three different control placement methods are introduced to solve the problem, and a comparative analysis is presented using a robust test set of 162 simulations. One year of simulated attacks is used to validate the quality of the solutions. We find that the math programming control placement method yields substantial improvements in terms of risk reduction and risk reduction on investment when compared to heuristics that would typically be used by managers to solve the problem. The contribution of this research is to provide managers with methods to substantially reduce information and security risks, while obtaining significantly better returns on their security investments. By using a workflow approach to control placement, which guides the manager to examine the entire infrastructure in a holistic manner, this research is unique in that it enables information risk to be examined strategically.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Goodman:2014:BNC, author = "S. E. Goodman", title = "Building the Nation's Cyber Security Workforce: Contributions from the {CAE} Colleges and Universities", journal = j-TMIS, volume = "5", number = "2", pages = "6:1--6:??", month = jul, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2629636", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 8 11:44:01 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This article presents a view of the necessary size and composition of the US national cyber security workforce, and considers some of the contributions that the government-designated Centers of Academic Excellence (CAE) might make to it. Over the last dozen years about 200 million taxpayer dollars have gone into funding many of these CAEs, with millions explicitly targeted to help them build capacity. The most visible intended output has been in the form of around 125 Scholarship for Service (SFS) students per year going mostly into the workforce of the federal government. Surely the output capacity of these 181 colleges and universities is greater than that, and should be helping to protect the rest of US citizens and taxpayers. We take a need-based look at what the nation's workforce should look like, and then consider some possibilities of what the CAE schools could be doing to help to close the gaps between that perceived need and the supply and demand.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Deodhar:2014:IWB, author = "Suruchi Deodhar and Keith R. Bisset and Jiangzhuo Chen and Yifei Ma and Madhav V. Marathe", title = "An Interactive, {Web}-Based High Performance Modeling Environment for Computational Epidemiology", journal = j-TMIS, volume = "5", number = "2", pages = "7:1--7:??", month = jul, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2629692", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 8 11:44:01 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We present an integrated interactive modeling environment to support public health epidemiology. The environment combines a high resolution individual-based model with a user-friendly Web-based interface that allows analysts to access the models and the analytics backend remotely from a desktop or a mobile device. The environment is based on a loosely coupled service-oriented-architecture that allows analysts to explore various counterfactual scenarios. As the modeling tools for public health epidemiology are getting more sophisticated, it is becoming increasingly difficult for noncomputational scientists to effectively use the systems that incorporate such models. Thus an important design consideration for an integrated modeling environment is to improve ease of use such that experimental simulations can be driven by the users. This is achieved by designing intuitive and user-friendly interfaces that allow users to design and analyze a computational experiment and steer the experiment based on the state of the system. A key feature of a system that supports this design goal is the ability to start, stop, pause, and roll back the disease propagation and intervention application process interactively. An analyst can access the state of the system at any point in time and formulate dynamic interventions based on additional information obtained through state assessment. In addition, the environment provides automated services for experiment set-up and management, thus reducing the overall time for conducting end-to-end experimental studies. We illustrate the applicability of the system by describing computational experiments based on realistic pandemic planning scenarios. The experiments are designed to demonstrate the system's capability and enhanced user productivity.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kostkova:2014:SUT, author = "Patty Kostkova and Martin Szomszor and Connie {St. Luis}", title = "\#swineflu: The Use of {Twitter} as an Early Warning and Risk Communication Tool in the 2009 Swine Flu Pandemic", journal = j-TMIS, volume = "5", number = "2", pages = "8:1--8:??", month = jul, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2597892", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 8 11:44:01 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The need to improve population monitoring and enhance surveillance of infectious diseases has never been more pressing. Factors such as air travel act as a catalyst in the spread of new and existing viruses. The unprecedented user-generated activity on social networks over the last few years has created real-time streams of personal data that provide an invaluable tool for monitoring and sampling large populations. Epidemic intelligence relies on constant monitoring of online media sources for early warning, detection, and rapid response; however, the real-time information available in social networks provides a new paradigm for the early warning function. The communication of risk in any public health emergency is a complex task for governments and healthcare agencies. This task is made more challenging in the current situation when the public has access to a wide range of online resources, ranging from traditional news channels to information posted on blogs and social networks. Twitter's strength is its two-way communication nature --- both as an information source but also as a central hub for publishing, disseminating and discovering online media. This study addresses these two challenges by investigating the role of Twitter during the 2009 swine flu pandemic by analysing data collected from the SN, and by Twitter using the opposite way for dissemination information through the network. First, we demonstrate the role of the social network for early warning by detecting an upcoming spike in an epidemic before the official surveillance systems by up to two weeks in the U.K. and up to two to three weeks in the U.S. Second, we illustrate how online resources are propagated through Twitter at the time of the WHO's declaration of the swine flu ``pandemic''. Our findings indicate that Twitter does favour reputable t bogus information can still leak into the network.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Tsai:2014:SPS, author = "Chih-Fong Tsai and Zen-Yu Quan", title = "Stock Prediction by Searching for Similarities in Candlestick Charts", journal = j-TMIS, volume = "5", number = "2", pages = "9:1--9:??", month = jul, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1145/2591672", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 8 11:44:01 MDT 2014", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The aim of stock prediction is to effectively predict future stock market trends (or stock prices), which can lead to increased profit. One major stock analysis method is the use of candlestick charts. However, candlestick chart analysis has usually been based on the utilization of numerical formulas. There has been no work taking advantage of an image processing technique to directly analyze the visual content of the candlestick charts for stock prediction. Therefore, in this study we apply the concept of image retrieval to extract seven different wavelet-based texture features from candlestick charts. Then, similar historical candlestick charts are retrieved based on different texture features related to the query chart, and the ``future'' stock movements of the retrieved charts are used for stock prediction. To assess the applicability of this approach to stock prediction, two datasets are used, containing 5-year and 10-year training and testing sets, collected from the Dow Jones Industrial Average Index (INDU) for the period between 1990 and 2009. Moreover, two datasets (2010 and 2011) are used to further validate the proposed approach. The experimental results show that visual content extraction and similarity matching of candlestick charts is a new and useful analytical method for stock prediction. More specifically, we found that the extracted feature vectors of 30, 90, and 120, the number of textual features extracted from the candlestick charts in the BMP format, are more suitable for predicting stock movements, while the 90 feature vector offers the best performance for predicting short- and medium-term stock movements. That is, using the 90 feature vector provides the lowest MAPE (3.031\%) and Theil's U (1.988\%) rates in the twenty-year dataset, and the best MAPE (2.625\%, 2.945\%) and Theil's U (1.622\%, 1.972\%) rates in the two validation datasets (2010 and 2011).", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jarke:2015:ECS, author = "Matthias Jarke and Kalle Lyytinen", title = "Editorial: {``Complexity of Systems Evolution: Requirements Engineering Perspective''}", journal = j-TMIS, volume = "5", number = "3", pages = "11:1--11:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629597", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Walking on water, and programming according to specifications is easy-as long as both of them are frozen. --Robert Glass This introduction discusses the changing nature of complexity associated with requirements engineering (RE) tasks and how it has shifted from managing internal complexity to adapting and leveraging upon external and dynamic complexity. We note several significant drivers in the requirements knowledge that have resulted in this change and discuss in light of complexity theory how the RE research community can respond to this. We observe several research challenges associated with ``new complexity'' and highlight how the articles included in the special issue advance the field by defining complexity more accurately, observing more vigilantly new sources of complexity, and suggesting new ways to manage complexity in terms of economic assessments, knowledge flows, and modeling for adaptability.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Fridgen:2015:IBV, author = "Gilbert Fridgen and Julia Klier and Martina Beer and Thomas Wolf", title = "Improving Business Value Assurance in Large-Scale {IT} Projects --- a Quantitative Method Based on Founded Requirements Assessment", journal = j-TMIS, volume = "5", number = "3", pages = "12:1--12:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2638544", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The probability of IT project failures can be mitigated more successfully when discovered early. To support a more insightful management of IT projects, which may also facilitate an early detection of IT project failures, transparency regarding a project's cash flows shall be increased. Therefore, an appropriate analysis of a project's benefits, costs, requirements, their respective risks and interdependencies is inevitable. However, to date, in requirements engineering only few methods exist that appropriately consider these factors when estimating the ex ante project business case. Furthermore, empirical studies reveal that a lot of risk factors emerge during the runtime of projects why the ex ante valuation of IT projects even with respect to requirements seems insufficient. Therefore, using the Action Design Research approach, we design, apply, and evaluate a practicable method for value-based continuous IT project steering especially for large-scale IT projects.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{King:2015:CCR, author = "John Leslie King and Carl P. Simon", title = "Complications with Complexity in Requirements", journal = j-TMIS, volume = "5", number = "3", pages = "13:1--13:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629375", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Requirements engineering must recognize the difference between complicated and complex problems. The former can lead to successful solutions. The latter should be avoided because they often lead to failure. As a starting point for distinguishing between complicated and complex, this article offers six characteristics of complex problems, with examples from economics, logistics, forecasting, among others. These characteristics make it easier and more systematic to recognize complexity during requirements elicitation and formulation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chakraborty:2015:GSF, author = "Suranjan Chakraborty and Christoph Rosenkranz and Josh Dehlinger", title = "Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering", journal = j-TMIS, volume = "5", number = "3", pages = "14:1--14:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629351", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Sensemaking in Requirements Engineering (RE) relies on knowledge transfer, communication, and negotiation of project stakeholders. It is a critical and challenging aspect of Information Systems (IS) development. One of the most fundamental aspects of RE is the specification of traceable, unambiguous, and operationalizable functional and nonfunctional requirements. This remains a nontrivial task in the face of the complexity inherent in RE due to the lack of well-documented, systematic procedures that facilitate a structured analysis of the qualitative data from stakeholder interviews, observations, and documents that are typically the input to this activity. This research develops a systematic and traceable procedure, for non-functional requirements the Grounded and Linguistic-Based Requirements Analysis Procedure (GLAP), which can fill this gap by incorporating perspectives from Grounded Theory Method, linguistic analysis of language quality, Volere typology, and the Nonfunctional Requirements Framework without significantly deviating from existing practice. The application of GLAP is described along with empirical illustrations using RE data from a redesign initiative of a library website of a public university in the United States. An outlook is given on further work and necessary evaluation steps.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Nekvi:2015:IRC, author = "Md Rashed I. Nekvi and Nazim H. Madhavji", title = "Impediments to Regulatory Compliance of Requirements in Contractual Systems Engineering Projects: a Case Study", journal = j-TMIS, volume = "5", number = "3", pages = "15:1--15:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629432", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Large-scale contractual systems engineering projects often need to comply with myriad government regulations and standards as part of contractual obligations. A key activity in the requirements engineering (RE) process for such a project is to demonstrate that all relevant requirements have been elicited from the regulatory documents and have been traced to the contract as well as to the target system components. That is, the requirements have met regulatory compliance. However, there are impediments to achieving this level of compliance due to such complexity factors as voluminous contract, large number of regulatory documents, and multiple domains of the system. Little empirical research has been conducted in the scientific community on identifying these impediments. Knowing these impediments is a driver for change in the solutions domain (i.e., creating improved or new methods, tools, processes, etc.) to deal with such impediments. Through a case study of an industrial RE project, we have identified a number of key impediments to achieving regulatory compliance in a large-scale, complex, systems engineering project. This project is an upgrade of a rail infrastructure system. The key contribution of the article is a number of hitherto uncovered impediments described in qualitative and quantitative terms. The article also describes an artefact model, depicting key artefacts and relationships involved in such a compliance project. This model was created from data gathered and observations made in this compliance project. In addition, the article describes emergent metrics on regulatory compliance of requirements that can possibly be used for estimating the effort needed to achieve regulatory compliance of system requirements.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jain:2015:SBS, author = "Radhika Jain and Lan Cao and Kannan Mohan and Balasubramaniam Ramesh", title = "Situated Boundary Spanning: an Empirical Investigation of Requirements Engineering Practices in Product Family Development", journal = j-TMIS, volume = "5", number = "3", pages = "16:1--16:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629395", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Requirements Engineering (RE) faces considerable challenges that are often related to boundaries between various stakeholders involved in the software development process. These challenges may be addressed by boundary spanning practices. We examine how boundary spanning can be adapted to address RE challenges in Product Family Development (PFD), a context that involves complex RE. We study two different development approaches, namely, conventional and agile PFD, because these present considerably different challenges. Our findings from a multisite case study present boundary spanning as a solution to improve the quality of RE processes and highlight interesting differences in how boundary spanner roles and boundary objects are adapted in conventional and agile PFD.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jureta:2015:RPA, author = "Ivan J. Jureta and Alexander Borgida and Neil A. Ernst and John Mylopoulos", title = "The Requirements Problem for Adaptive Systems", journal = j-TMIS, volume = "5", number = "3", pages = "17:1--17:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629376", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Requirements Engineering (RE) focuses on eliciting, modeling, and analyzing the requirements and environment of a system-to-be in order to design its specification. The design of the specification, known as the Requirements Problem (RP), is a complex problem-solving task because it involves, for each new system, the discovery and exploration of, and decision making in a new problem space. A system is adaptive if it can detect deviations between its runtime behavior and its requirements, specifically situations where its behavior violates one or more of its requirements. Given such a deviation, an Adaptive System uses feedback mechanisms to analyze these changes and decide, with or without human intervention, how to adjust its behavior as a result. We are interested in defining the Requirements Problem for Adaptive Systems (RPAS). In our case, we are looking for a configurable specification such that whenever requirements fail to be fulfilled, the system can go through a series of adaptations that change its configuration and eventually restore fulfilment of the requirements. From a theoretical perspective, this article formally shows the fundamental differences between standard RE (notably Zave and Jackson [1997]) and RE for Adaptive Systems (see the seminal work by Fickas and Feather [1995], to Letier and van Lamsweerde [2004], and up to Whittle et al. [2010]). The main contribution of this article is to introduce the RPAS as a new RP class that is specific to Adaptive Systems. We relate the RPAS to RE research on the relaxation of requirements, the evaluation of their partial satisfaction, and the monitoring and control of requirements, all topics of particular interest in research on adaptive systems [de Lemos et al. 2013]. From an engineering perspective, we define a proto-framework for solving RPAS, which illustrates features needed in future frameworks for adaptive software systems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Wang:2015:AFU, author = "G. Alan Wang and Harry Jiannan Wang and Jiexun Li and Alan S. Abrahams and Weiguo Fan", title = "An Analytical Framework for Understanding Knowledge-Sharing Processes in Online {Q\&A} Communities", journal = j-TMIS, volume = "5", number = "4", pages = "18:1--18:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629445", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Online communities have become popular knowledge sources for both individuals and organizations. Computer-mediated communication research shows that communication patterns play an important role in the collaborative efforts of online knowledge-sharing activities. Existing research is mainly focused on either user egocentric positions in communication networks or communication patterns at the community level. Very few studies examine thread-level communication and process patterns and their impacts on the effectiveness of knowledge sharing. In this study, we fill this research gap by proposing an innovative analytical framework for understanding thread-level knowledge sharing in online Q{\&}A communities based on dialogue act theory, network analysis, and process mining. More specifically, we assign a dialogue act tag for each post in a discussion thread to capture its conversation purpose and then apply graph and process mining algorithms to examine knowledge-sharing processes. Our results, which are based on a real support forum dataset, show that the proposed analytical framework is effective in identifying important communication, conversation, and process patterns that lead to helpful knowledge sharing in online Q{\&}A communities.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Partington:2015:PMC, author = "Andrew Partington and Moe Wynn and Suriadi Suriadi and Chun Ouyang and Jonathan Karnon", title = "Process Mining for Clinical Processes: a Comparative Analysis of Four {Australian} Hospitals", journal = j-TMIS, volume = "5", number = "4", pages = "19:1--19:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629446", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business process analysis and process mining, particularly within the health care domain, remain under-utilized. Applied research that employs such techniques to routinely collected health care data enables stakeholders to empirically investigate care as it is delivered by different health providers. However, cross-organizational mining and the comparative analysis of processes present a set of unique challenges in terms of ensuring population and activity comparability, visualizing the mined models, and interpreting the results. Without addressing these issues, health providers will find it difficult to use process mining insights, and the potential benefits of evidence-based process improvement within health will remain unrealized. In this article, we present a brief introduction on the nature of health care processes, a review of process mining in health literature, and a case study conducted to explore and learn how health care data and cross-organizational comparisons with process-mining techniques may be approached. The case study applies process-mining techniques to administrative and clinical data for patients who present with chest pain symptoms at one of four public hospitals in South Australia. We demonstrate an approach that provides detailed insights into clinical (quality of patient health) and fiscal (hospital budget) pressures in the delivery of health care. We conclude by discussing the key lessons learned from our experience in conducting business process analysis and process mining based on the data from four different hospitals.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yan:2015:MAG, author = "Jiaqi Yan and Daning Hu and Stephen S. Liao and Huaiqing Wang", title = "Mining Agents' Goals in Agent-Oriented Business Processes", journal = j-TMIS, volume = "5", number = "4", pages = "20:1--20:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629448", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "When designing a business process, individual agents are assigned to perform tasks based on certain goals (i.e., designed process goals). However, based on their own interests, real-world agents often have different goals (i.e., agents' goals) and thus may behave differently than designed, often resulting in reduced effectiveness or efficiencies of the executed process. Moreover, existing business process research lacks effective methods for discovering agents' goals in the actual execution of the designed business processes. To address this problem, we propose an agent-oriented goal mining approach to modeling, discovering, and analyzing agents' goals in executed business processes using historical event logs and domain data. To the best of our knowledge, our research is the first to adopt the agents' goal perspective to study inconsistencies between the design and execution of business processes. Moreover, it also provides a useful tool for stakeholders to discover real-world agents' actual goals and thus provides insights for improving the task assignment mechanism or business process design in general.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Silva:2015:PAA, author = "Thushari Silva and Ma Jian and Yang Chen", title = "Process Analytics Approach for {R\&D} Project Selection", journal = j-TMIS, volume = "5", number = "4", pages = "21:1--21:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629436", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "R{\&}D project selection plays an important role in government funding agencies, as allocation of billions of dollars among the proposals deemed highly influential and contributive solely depend on it. Efficacious assignment of reviewers is one of the most critical processes that controls the quality of the entire project selection and also has a serious implication on business profit. Current methods that focus on workflow automation are more efficient than manual assignment; however, they are not effective, as they fail to consider the real insight of core tasks. Other decision models that analyze core tasks are effective but inefficient when handling large amounts of submissions, and they suffer from irrelevant assignment. Furthermore, they largely ignore real deep insight of back-end data such as quality of the reviewers (e.g., quality and citation impact of their produced research) and the effect of social relationships in project selection processes that are essential for identifying reviewers for interdisciplinary proposal evaluation. In light of these deficiencies, this research proposes a novel hybrid process analytics approach to decompose the complex reviewer assignment process into manageable subprocesses and applies data-driven decision models cum process analytics systematically from a triangular perspective via the research analytics framework to achieve high operational efficiencies and high-quality assignment. It also analyzes big data from scientific databases and generates visualized decision-ready information to support effective decision making. The proposed approach has been implemented to aid the project selection process of the largest funding agency in China and has been tested. The test results show that the proposed approach has the potential to add great benefits, including cost saving, improved effectiveness, and increased business value.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Guo:2015:DPB, author = "Xitong Guo and Sherry X. Sun and Doug Vogel", title = "A Dataflow Perspective for Business Process Integration", journal = j-TMIS, volume = "5", number = "4", pages = "22:1--22:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629450", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business process integration has become prevalent as business increasingly crosses organizational boundaries. To address the issue of protecting organizations' competitive knowledge and private information while also enabling business-to-business (B2B) collaboration, past research has focused mainly on customized public and private process design, as well as structural correctness of the integrated workflow. However, a dataflow perspective is important for business process integration. This article presents a data-flow perspective using workflow management and mathematical techniques to address data exchange problems in independent multistakeholder business process integration in dynamic circumstances. The research is conducted following a design science paradigm. We build artifacts that include interorganizational workflow concepts, a workflow model, and a public dataset calculation method. The use of the proposed artifacts is illustrated by applying them to a real-world case in the Shenzhen (Chaiwan) port. The utility of the artifacts is evaluated through interviews with practitioners in industry. We conclude that this research complements the control-flow perspective in the interorganizational workflow management area and also contributes to B2B information-sharing literature; further, the dataflow formalism can help practitioners to formally provide the right data at the right time in dynamic circumstances.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jiang:2015:CCO, author = "Jie Jiang and Huib Aldewereld and Virginia Dignum and Yao-Hua Tan", title = "Compliance Checking of Organizational Interactions", journal = j-TMIS, volume = "5", number = "4", pages = "23:1--23:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629630", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In business environments, different sorts of regulations are imposed to restrict the behavior of both public and private organizations, ranging from legal regulations to internal policies. Regulatory compliance is important for the safety of individual actors as well as the overall business environment. However, complexity derives from not only the contents of the regulations but also their interdependencies. As such, the verification of whether actors are able to comply with the combined regulations cannot be done by checking each regulation separately. To these ends, we introduce a normative structure Norm Nets (NNs) for modeling sets of interrelated regulations and setting a basis for compliance checking of organizational interactions against interrelated regulations. NNs support a modular design by providing the constructs to represent regulations and the relationships between them. Additionally, we propose a computational mechanism to reason about regulatory compliance by mapping NNs to Colored Petri Nets (CPNs). We show that compliance checking of both individual actors' behavior and the collective behavior of the business environment can be achieved automatically using state space analysis techniques of CPNs. The approach is illustrated with a case study from the domain of international trade.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ciccio:2015:DDC, author = "Claudio {Di Ciccio} and Massimo Mecella", title = "On the Discovery of Declarative Control Flows for Artful Processes", journal = j-TMIS, volume = "5", number = "4", pages = "24:1--24:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629447", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Artful processes are those processes in which the experience, intuition, and knowledge of the actors are the key factors in determining the decision making. They are typically carried out by the ``knowledge workers,'' such as professors, managers, and researchers. They are often scarcely formalized or completely unknown a priori. Throughout this article, we discuss how we addressed the challenge of discovering declarative control flows in the context of artful processes. To this extent, we devised and implemented a two-phase algorithm, named MINERful. The first phase builds a knowledge base, where statistical information extracted from logs is represented. During the second phase, queries are evaluated on that knowledge base, in order to infer the constraints that constitute the discovered process. After outlining the overall approach and offering insight on the adopted process modeling language, we describe in detail our discovery technique. Thereupon, we analyze its performances, both from a theoretical and an experimental perspective. A user-driven evaluation of the quality of results is also reported on the basis of a real case study. Finally, a study on the fitness of discovered models with respect to synthetic and real logs is presented.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Keller:2015:CMR, author = "Thorben Keller and Fr{\'e}d{\'e}ric Thiesse and Elgar Fleisch", title = "Classification Models for {RFID}-Based Real-Time Detection of Process Events in the Supply Chain: an Empirical Study", journal = j-TMIS, volume = "5", number = "4", pages = "25:1--25:??", month = jan, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2629449", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Feb 11 13:49:27 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "RFID technology allows the collecting of fine-grained real-time information on physical processes in the supply chain that often cannot be monitored using conventional approaches. However, because of the phenomenon of false-positive reads, RFID data streams resemble noisy analog measurements rather than the desired recordings of activities within a business process. The present study investigates the use of data mining techniques for filtering and aggregating raw RFID data. We consider classifiers based on logistic regression, decision trees, and artificial neural networks using attributes derived from low-level reader data. In addition, we present a custom-made algorithm for generating decision rules using artificial attributes and an iterative training procedure. We evaluate the classifiers using a massive set of data on pallet movements collected under real-world conditions at one of the largest retailers worldwide. The results clearly indicate high classification performance of the classification models, with the rule-based classifier outperforming all others. Moreover, we show that utilizing the full spectrum of data generated by the reader hardware leads to superior performance compared with the approaches based on timestamp and antenna information proposed in prior research.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Berndt:2015:CSD, author = "Donald J. Berndt and James A. McCart and Dezon K. Finch and Stephen L. Luther", title = "A Case Study of Data Quality in Text Mining Clinical Progress Notes", journal = j-TMIS, volume = "6", number = "1", pages = "1:1--1:??", month = feb, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2669368", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Apr 3 16:18:04 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Text analytic methods are often aimed at extracting useful information from the vast array of unstructured, free format text documents that are created by almost all organizational processes. The success of any text mining application rests on the quality of the underlying data being analyzed, including both predictive features and outcome labels. In this case study, some focused experiments regarding data quality are used to assess the robustness of Statistical Text Mining (STM) algorithms when applied to clinical progress notes. In particular, the experiments consider the impacts of task complexity (by removing signals), training set size, and target outcome quality. While this research is conducted using a dataset drawn from the medical domain, the data quality issues explored are of more general interest.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zimbra:2015:SAF, author = "David Zimbra and Hsinchun Chen and Robert F. Lusch", title = "Stakeholder Analyses of Firm-Related {Web} Forums: Applications in Stock Return Prediction", journal = j-TMIS, volume = "6", number = "1", pages = "2:1--2:??", month = feb, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2675693", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Apr 3 16:18:04 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In this study, we present stakeholder analyses of firm-related web forums. Prior analyses of firm-related forums have considered all participants in the aggregate, failing to recognize the potential for diversity within the populations. However, distinctive groups of forum participants may represent various interests and stakes in a firm worthy of consideration. To perform the stakeholder analyses, the Stakeholder Analyzer system for firm-related web forums is developed following the design science paradigm of information systems research. The design of the system and its approach to stakeholder analysis is guided by two kernel theories, the stakeholder theory of the firm and the systemic functional linguistic theory. A stakeholder analysis identifies distinctive groups of forum participants with shared characteristics expressed in discussion and evaluates their specific opinions and interests in the firm. Stakeholder analyses are performed in six major firm-related forums hosted on Yahoo Finance over a 3-month period. The relationships between measures extracted from the forums and subsequent daily firm stock returns are examined using multiple linear regression models, revealing statistically significant indicators of firm stock returns in the discussions of the stakeholder groups of each firm with stakeholder-model-adjusted R$^2$ values reaching 0.83. Daily stock return prediction is also performed for 31 trading days, and stakeholder models correctly predicted the direction of return on 67\% of trading days and generated an impressive 17\% return in simulated trading of the six firm stocks. These evaluations demonstrate that the stakeholder analyses provided more refined assessments of the firm-related forums, yielding measures at the stakeholder group level that better explain and predict daily firm stock returns than aggregate forum-level information.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Li:2015:NBB, author = "Shing-Han Li and Yu-Cheng Kao and Zong-Cyuan Zhang and Ying-Ping Chuang and David C. Yen", title = "A Network Behavior-Based {Botnet} Detection Mechanism Using {PSO} and {$K$}-means", journal = j-TMIS, volume = "6", number = "1", pages = "3:1--3:??", month = feb, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2676869", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Apr 3 16:18:04 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ ``phishing'' attacks to steal sensitive information (such as users' accounts and passwords), send bulk email advertising, and/or conduct click fraud. Even though detection technology has been much improved and some solutions to Internet security have been proposed and improved, the threat of Botnet still exists. Most of the past studies dealing with this issue used either packet contents or traffic flow characteristics to identify the invasion of Botnet. However, there still exist many problems in the areas of packet encryption and data privacy, simply because Botnet can easily change the packet contents and flow characteristics to circumvent the Intrusion Detection System (IDS). This study combines Particle Swarm Optimization (PSO) and $K$-means algorithms to provide a solution to remedy those problems and develop, step by step, a mechanism for Botnet detection. First, three important network behaviors are identified: long active communication behavior (ActBehavior), connection failure behavior (FailBehavior), and network scanning behavior (ScanBehavior). These behaviors are defined according to the relevant prior studies and used to analyze the communication activities among the infected computers. Second, the features of network behaviors are extracted from the flow traces in the network layer and transport layer of the network equipment. Third, PSO and $K$-means techniques are used to uncover the host members of Botnet in the organizational network. This study mainly utilizes the flow traces of a campus network as an experiment. The experimental findings show that this proposed approach can be employed to detect the suspicious Botnet members earlier than the detection application systems. In addition, this proposed approach is easy to implement and can be further used and extended in the campus dormitory network, home networks, and the mobile 3G network.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lee:2015:OBM, author = "Yen-Hsien Lee and Paul Jen-Hwa Hu and Ching-Yi Tu", title = "Ontology-Based Mapping for Automated Document Management: a Concept-Based Technique for Word Mismatch and Ambiguity Problems in Document Clustering", journal = j-TMIS, volume = "6", number = "1", pages = "4:1--4:??", month = mar, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2688488", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 5 07:57:33 MST 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Document clustering is crucial to automated document management, especially for the fast-growing volume of textual documents available digitally. Traditional lexicon-based approaches depend on document content analysis and measure overlap of the feature vectors representing different documents, which cannot effectively address word mismatch or ambiguity problems. Alternative query expansion and local context discovery approaches are developed but suffer from limited efficiency and effectiveness, because the large number of expanded terms create noise and increase the dimensionality and complexity of the overall feature space. Several techniques extend lexicon-based analysis by incorporating latent semantic indexing but produce less comprehensible clustering results and questionable performance. We instead propose a concept-based document representation and clustering (CDRC) technique and empirically examine its effectiveness using 433 articles concerning information systems and technology, randomly selected from a popular digital library. Our evaluation includes two widely used benchmark techniques and shows that CDRC outperforms them. Overall, our results reveal that clustering documents at an ontology-based, concept-based level is more effective than techniques using lexicon-based document features and can generate more comprehensible clustering results.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sutanto:2015:ITC, author = "Juliana Sutanto and Atreyi Kankanhalli and Bernard Cheng Yian Tan", title = "Investigating Task Coordination in Globally Dispersed Teams: a Structural Contingency Perspective", journal = j-TMIS, volume = "6", number = "2", pages = "5:1--5:??", month = jul, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2688489", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 7 09:26:12 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Task coordination poses significant challenges for globally dispersed teams (GDTs). Although various task coordination mechanisms have been proposed for such teams, there is a lack of systematic examination of the appropriate coordination mechanisms for different teams based on the nature of their task and the context under which they operate. Prior studies on collocated teams suggest matching their levels of task dependence to specific task coordination mechanisms for effective coordination. This research goes beyond the earlier work by also considering additional contextual factors of GDT (i.e., temporal dispersion and time constraints) in deriving their optimal IT-mediated task coordination mechanisms. Adopting the structural contingency theory, we propose optimal IT-mediated task coordination portfolios to fit the different levels of task dependence, temporal dispersion, and perceived time constraint of GDTs. The proposed fit is tested through a survey and profile analysis of 95 globally dispersed software development teams in a large financial organization. We find, as hypothesized, that the extent of fit between the actual IT-mediated task coordination portfolios used by the surveyed teams and their optimal portfolios proposed here is positively related to their task coordination effectiveness that in turn impacts the team's efficiency and effectiveness. The implications for theory and practice are discussed.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Basole:2015:UBE, author = "Rahul C. Basole and Martha G. Russell and Jukka Huhtam{\"a}ki and Neil Rubens and Kaisa Still and Hyunwoo Park", title = "Understanding Business Ecosystem Dynamics: a Data-Driven Approach", journal = j-TMIS, volume = "6", number = "2", pages = "6:1--6:??", month = jul, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2724730", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 7 09:26:12 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business ecosystems consist of a heterogeneous and continuously evolving set of entities that are interconnected through a complex, global network of relationships. However, there is no well-established methodology to study the dynamics of this network. Traditional approaches have primarily utilized a single source of data of relatively established firms; however, these approaches ignore the vast number of relevant activities that often occur at the individual and entrepreneurial levels. We argue that a data-driven visualization approach, using both institutionally and socially curated datasets, can provide important complementary, triangulated explanatory insights into the dynamics of interorganizational networks in general and business ecosystems in particular. We develop novel visualization layouts to help decision makers systemically identify and compare ecosystems. Using traditionally disconnected data sources on deals and alliance relationships (DARs), executive and funding relationships (EFRs), and public opinion and discourse (POD), we empirically illustrate our data-driven method of data triangulation and visualization techniques through three cases in the mobile industry Google's acquisition of Motorola Mobility, the coopetitive relation between Apple and Samsung, and the strategic partnership between Nokia and Microsoft. The article concludes with implications and future research opportunities.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhao:2015:RBP, author = "Xiaohui Zhao and Chengfei Liu and Sira Yongchareon and Marek Kowalkiewicz and Wasim Sadiq", title = "Role-Based Process View Derivation and Composition", journal = j-TMIS, volume = "6", number = "2", pages = "7:1--7:??", month = jul, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2744207", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 7 09:26:12 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The process view concept deploys a partial and temporal representation to adjust the visible view of a business process according to various perception constraints of users. Process view technology is of practical use for privacy protection and authorization control in process-oriented business management. Owing to complex organizational structure, it is challenging for large companies to accurately specify the diverse perception of different users over business processes. Aiming to tackle this issue, this article presents a role-based process view model to incorporate role dependencies into process view derivation. Compared to existing process view approaches, ours particularly supports runtime updates to the process view perceivable to a user with specific view merging operations, thereby enabling the dynamic tracing of process perception. A series of rules and theorems are established to guarantee the structural consistency and validity of process view transformation. A hypothetical case is conducted to illustrate the feasibility of our approach, and a prototype is developed for the proof-of-concept purpose.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Liu:2015:WNS, author = "Dengpan Liu and Sumit Sarkar and Chelliah Sriskandarajah", title = "Who's Next? {Scheduling} Personalization Services with Variable Service Times", journal = j-TMIS, volume = "6", number = "2", pages = "8:1--8:??", month = jul, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2764920", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Aug 7 09:26:12 MDT 2015", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Online personalization has become quite prevalent in recent years, with firms able to derive additional profits from such services. As the adoption of such services grows, firms implementing such practices face some operational challenges. One important challenge lies in the complexity associated with the personalization process and how to deploy available resources to handle such complexity. The complexity is exacerbated when a site faces a large volume of requests in a short amount of time, as is often the case for e-commerce and content delivery sites. In such situations, it is generally not possible for a site to provide perfectly personalized service to all requests. Instead, a firm can provide differentiated service to requests based on the amount of profiling information available about the visitor. We consider a scenario where the revenue function is concave, capturing the diminishing returns from personalization effort. Using a batching approach, we determine the optimal scheduling policy (i.e., time allocation and sequence of service) for a batch that accounts for the externality cost incurred when a request is provided service before other waiting requests. The batching approach leads to sunk costs incurred when visitors wait for the next batch to begin. An optimal admission control policy is developed to prescreen new request arrivals. We show how the policy can be implemented efficiently when the revenue function is complex and there are a large number of requests that can be served in a batch. Numerical experiments show that the proposed approach leads to substantial improvements over a linear approximation of the concave revenue function. Interestingly, we find that the improvements in firm profits are not only (or primarily) due to the different service times that are obtained when using the nonlinear personalization function-there is a ripple effect on the admission control policy that incorporates these optimized service times, which contributes even more to the additional profits than the service time optimization by itself.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bai:2015:RAM, author = "Xue Bai and James R. Marsden and William T. {Ross, Jr.} and Gang Wang", title = "Relationships Among Minimum Requirements, {Facebook} Likes, and {Groupon} Deal Outcomes", journal = j-TMIS, volume = "6", number = "3", pages = "9:1--9:??", month = oct, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2764919", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:47 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Daily deal coupons have gained a prominent foothold on the web. The earliest and largest player is Groupon. Originally, Groupon deals were a mix of deals with a minimum requirement (MR) of coupon sales before a deal became effective and of deals without a minimum requirement (NMR). Eventually, Groupon stopped using MR deals. For Groupon and its retailer customers, might this decision have actually resulted in negative impacts for both parties (fewer coupons sold and lower revenue)? The structure of Groupon deals (including a ``Facebook like'' option) together with electronic access to the necessary data offered the opportunity to empirically investigate these questions. We analyzed relationships among MR, Facebook likes (FL), quantity of coupons sold, and total revenue, performing the analysis across the four largest retail categories. Using timestamped empirical data, we completed a propensity score analysis of causal effects. We find that the presence of MR increases Facebook likes, quantity of coupons sold, and total revenue at the time point when the MR is met and at subsequent 2-hour intervals over the horizon of deals. A key finding is that the initial differences observed when MR is met not only continue but also actually increase over the life of the deals.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bhowmik:2015:RSH, author = "Tanmay Bhowmik and Nan Niu and Prachi Singhania and Wentao Wang", title = "On the Role of Structural Holes in Requirements Identification: an Exploratory Study on Open-Source Software Development", journal = j-TMIS, volume = "6", number = "3", pages = "10:1--10:??", month = oct, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2795235", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:47 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/gnu.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Requirements identification is a human-centric activity that involves interaction among multiple stakeholders. Traditional requirements engineering (RE) techniques addressing stakeholders' social interaction are mainly part of a centralized process intertwined with a specific phase of software development. However, in open-source software (OSS) development, stakeholders' social interactions are often decentralized, iterative, and dynamic. Little is known about new requirements identification in OSS and the stakeholders' organizational arrangements supporting such an activity. In this article, we investigate the theory of structural hole from the context of contributing new requirements in OSS projects. Structural hole theory suggests that stakeholders positioned in the structural holes in their social network are able to produce new ideas. In this study, we find that structural hole positions emerge in stakeholders' social network and these positions are positively related to contributing a higher number of new requirements. We find that along with structural hole positions, stakeholders' role is also an important part in identifying new requirements. We further observe that structural hole positions evolve over time, thereby identifying requirements to realize enriched features. Our work advances the fundamental understanding of the RE process in a decentralized environment and opens avenues for improved techniques supporting this process.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bhattacharya:2015:RNA, author = "Devipsita Bhattacharya and Sudha Ram", title = "{RT @News}: an Analysis of News Agency Ego Networks in a Microblogging Environment", journal = j-TMIS, volume = "6", number = "3", pages = "11:1--11:??", month = oct, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2811270", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:47 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "News agencies regularly use Twitter to publicize and increase readership of their articles. Although substantial research on the spread of news on Twitter exists, there hasn't been much focus on the study of the spread of news articles. In this study, we present an innovative methodology involving weighted ego networks to understand how news agencies propagate news articles using their Twitter handle. We propose a set of measures to compare the propagation process of different news agencies by studying important aspects such as volume, extent of spread, conversion rate, multiplier effect, lifespan, hourly response, and audience participation. Using a dataset of tweets collected over a period of 6 months, we apply our methodology and suggest a framework to help news agencies gauge their performance on social media and also provide critical insights into the phenomenon of news article propagation on Twitter.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Roy:2015:MOU, author = "Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri", title = "Minimizing Organizational User Requirement while Meeting Security Constraints", journal = j-TMIS, volume = "6", number = "3", pages = "12:1--12:??", month = oct, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1145/2811269", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:47 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Large systems are complex and typically need automatic configuration to be managed effectively. In any organization, numerous tasks have to be carried out by employees. However, due to security needs, it is not feasible to directly assign any existing task to the first available employee. In order to meet many additional security requirements, constraints such as separation of duty, cardinality and binding have to be taken into consideration. Meeting these requirements imposes extra burden on organizations, which, however, is unavoidable in order to ensure security. While a trivial way of ensuring security is to assign each user to a single task, business organizations would typically like to minimize their costs and keep staffing requirements to a minimum. To meet these contradictory goals, we define the problem of Cardinality Constrained-Mutually Exclusive Task Minimum User Problem (CMUP), which aims to find the minimum users that can carry out a set of tasks while satisfying the given security constraints. We show that the CMUP problem is equivalent to a constrained version of the weak chromatic number problem in hypergraphs, which is NP-hard. We, therefore, propose a greedy solution. Our experimental evaluation shows that the proposed algorithm is both efficient and effective.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Gomez-Uribe:2016:NRS, author = "Carlos A. Gomez-Uribe and Neil Hunt", title = "The {Netflix} Recommender System: Algorithms, Business Value, and Innovation", journal = j-TMIS, volume = "6", number = "4", pages = "13:1--13:??", month = jan, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2843948", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:48 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This article discusses the various algorithms that make up the Netflix recommender system, and describes its business purpose. We also describe the role of search and related algorithms, which for us turns into a recommendations problem as well. We explain the motivations behind and review the approach that we use to improve the recommendation algorithms, combining A/B testing focused on improving member retention and medium term engagement, as well as offline experimentation using historical member engagement data. We discuss some of the issues in designing and interpreting A/B tests. Finally, we describe some current areas of focused innovation, which include making our recommender system global and language aware.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Krishnamurthy:2016:PDP, author = "Rajiv Krishnamurthy and Varghese Jacob and Suresh Radhakrishnan and Kutsal Dogan", title = "Peripheral Developer Participation in Open Source Projects: an Empirical Analysis", journal = j-TMIS, volume = "6", number = "4", pages = "14:1--14:??", month = jan, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2820618", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:48 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/gnu.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The success of the Open Source model of software development depends on the voluntary participation of external developers (the peripheral developers), a group that can have distinct motivations from that of project founders (the core developers). In this study, we examine peripheral developer participation by empirically examining approximately 2,600 open source projects. In particular, we hypothesize that peripheral developer participation is higher when the potential for building reputation by gaining recognition from project stakeholders is higher. We consider recognition by internal stakeholders (such as core developers) and external stakeholders (such as end-users and peers). We find a positive association between peripheral developer participation and the potential of stakeholder recognition after controlling for bug reports, feature requests, and other key factors. Our findings provide important insights for OSS founders and corporate managers for open sourcing or OSS adoption decisions.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Liaskos:2016:SRO, author = "Christos Liaskos and Ageliki Tsioliaridou", title = "Service Ratio-Optimal, Content Coherence-Aware Data Push Systems", journal = j-TMIS, volume = "6", number = "4", pages = "15:1--15:??", month = jan, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2850423", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 25 07:36:48 MST 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Advertising new information to users via push is the trigger of operation for many contemporary information systems. Furthermore, passive optical networks are expected to extend the reachability of high-quality push services to thousands of clients. The efficiency of a push service is the ratio of successfully informed users. However, pushing only data of high popularity can degrade the thematic coherency of the content. The present work offers a novel, analysis-derived, tunable way for selecting data for push services. The proposed scheme can maximize the service ratio of a push system with regard to data coherence constraints. Extensive simulations demonstrate the efficiency of the scheme compared to alternative solutions. The proposed scheme is the first to tackle the problem of data coherence-aware, service ratio optimization of push services.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lu:2016:CCB, author = "Xianghua Lu and Xia Zhao and Ling Xue", title = "Is Combining Contextual and Behavioral Targeting Strategies Effective in Online Advertising?", journal = j-TMIS, volume = "7", number = "1", pages = "1:1--1:??", month = mar, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2883816", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jun 20 11:28:19 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Online targeting has been increasingly used to deliver ads to consumers. But discovering how to target the most valuable web visitors and generate a high response rate is still a challenge for advertising intermediaries and advertisers. The purpose of this study is to examine how behavioral targeting (BT) impacts users' responses to online ads and particularly whether BT works better in combination with contextual targeting (CT). Using a large, individual-level clickstream data set of an automobile advertising campaign from an Internet advertising intermediary, this study examines the impact of BT and CT strategies on users' click behavior. The results show that (1) targeting a user with behavioral characteristics that are closely related to ads does not necessarily increase the click through rates (CTRs); whereas, targeting a user with behavioral characteristics that are loosely related to ads leads to a higher CTR, and (2) BT and CT work better in combination. Our study contributes to online advertising design literature and provides important managerial implications for advertising intermediaries and advertisers on targeting individual users.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lui:2016:EMC, author = "Tsz-Wai Lui and Gabriele Piccoli", title = "The Effect of a Multichannel Customer Service System on Customer Service and Financial Performance", journal = j-TMIS, volume = "7", number = "1", pages = "2:1--2:??", month = mar, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2875444", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jun 20 11:28:19 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Customer service is an important competitive lever for the modern firm. At the same time, the continuous evolution and performance improvements in information technology (IT) capabilities have enabled the utilization of multichannel service delivery strategies. Our research focuses on IT-enabled customer service systems (CSS) and their effect on firm performance. Previous studies have failed to find a consensus on the effect of a new self-service channel on the firm's performance. We argue that the embedded assumptions underpinning the previous research are responsible for these mixed findings. Consequently, using archival data from 169 hotels affiliated with a hotel chain, we designed a longitudinal multichannel study to resolve some of these inconsistencies. Our results illustrate that when firms implement an IT-enabled self-service channel to complement their existing customer service infrastructure, they experience an early negative effect on financial performance due to the disruption of the service processes. Thus, the multichannel CSS generates a positive effect only when the new process becomes a stable part of the organizational procedures. Our findings suggest that researchers evaluate the effect of a technological initiative after the new business process has been stabilized and consider that an additional IT-enabled self-service channel rarely operates in isolation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sun:2016:UAN, author = "Yutian Sun and Jianwen Su and Jian Yang", title = "Universal Artifacts: a New Approach to Business Process Management {(BPM)} Systems", journal = j-TMIS, volume = "7", number = "1", pages = "3:1--3:??", month = mar, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2886104", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jun 20 11:28:19 MDT 2016", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In most BPM systems (a.k.a. workflow systems), the data for process execution is scattered across databases for enterprise, auxiliary local data stores within the BPM systems, and even file systems (e.g., specification of process models). The interleaving nature of data management and BP execution and the lack of a coherent conceptual data model for all data needed for execution make it hard for (1) providing Business-Process-as-a-Service (BPaaS) and (2) effective support for collaboration between business processes. The primary reason is that an enormous effort is required for maintaining both the engines and the data for the client applications. In particular, different modeling languages and different BPM systems make process interoperation one of the toughest challenges. In this article, we formulate a concept of a ``universal artifact,'' which extends artifact-centric models by capturing all needed data for a process instance throughout its execution. A framework called SeGA based on universal artifacts is developed to support separation of data and BP execution, a key principle for BPM systems. We demonstrate in this article that SeGA is versatile enough to fully facilitate not only executions of individual processes (to support BPaaS) but also various collaboration models. Moreover, SeGA reduces the complexity in runtime management including runtime querying, constraints enforcement, and dynamic modification upon collaboration across possibly different BPM systems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Li:2016:RTA, author = "Shing-Han Li and David C. Yen and Ying-Ping Chuang", title = "A Real-Time Audit Mechanism Based on the Compression Technique", journal = j-TMIS, volume = "7", number = "2", pages = "4:1--4:??", month = aug, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2629569", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:29 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/datacompression.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Log management and log auditing have become increasingly crucial for enterprises in this era of information and technology explosion. The log analysis technique is useful for discovering possible problems in business processes and preventing illegal-intrusion attempts and data-tampering attacks. Because of the complexity of the dynamically changing environment, auditing a tremendous number of data is a challenging issue. We provide a real-time audit mechanism to improve the aforementioned problems in log auditing. This mechanism was developed based on the Lempel--Ziv--Welch (LZW) compression technique to facilitate effective compression and provide reliable auditing log entries. The mechanism can be used to predict unusual activities when compressing the log data according to pre-defined auditing rules. Auditors using real-time and continuous monitoring can perceive instantly the most likely anomalies or exceptions that could cause problems. We also designed a user interface that allows auditors to define the various compression and audit parameters, using real log cases in the experiment to verify the feasibility and effectiveness of this proposed audit mechanism. In summary, this mechanism changes the log access method and improves the efficiency of log analysis. This mechanism greatly simplifies auditing so that auditors must only trace the sources and causes of the problems related to the detected anomalies. This greatly reduces the processing time of analytical audit procedures and the manual checking time, and improves the log audit efficiency.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Hashmi:2016:WSN, author = "Khayyam Hashmi and Zaki Malik and Erfan Najmi and Amal Alhosban and Brahim Medjahed", title = "A {Web} Service Negotiation Management and {QoS} Dependency Modeling Framework", journal = j-TMIS, volume = "7", number = "2", pages = "5:1--5:??", month = aug, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2893187", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:29 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Information Management Systems that outsource part of the functionality to other (likely unknown) services need an effective way to communicate with these services, so that a mutually beneficial solution can be generated. This includes bargaining for their optimal customizations and the discovery of overlooked potential solutions. In this article, we present an automated negotiation framework for information systems (denoted as WebNeg ) that can be used by both the parties for conducting negotiations. WebNeg uses a Genetic Algorithm (GA)-based approach for finding acceptable solutions in multiparty and multiobjective scenarios. The GA is enhanced using a new operator called Norm, which represents the cumulative knowledge of all the parties involved in the negotiation process. Norm incorporates the dependencies of different quality attributes of independently developed component services for the system composition. This enables WebNeg to find a better solution in the context of the current requirements. Experiment results indicate the applicability and improved performance of WebNeg (in comparison with existing similar works) in facilitating the negotiation management involved in a web service-based information composition process.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Gupta:2016:SCS, author = "Agam Gupta and Biswatosh Saha and Uttam K. Sarkar", title = "Systemic Concentration in Sponsored Search Markets: The Role of Time Window in Click-Through-Rate Computation", journal = j-TMIS, volume = "7", number = "2", pages = "6:1--6:??", month = aug, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2934695", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:29 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Keyword-based search engine advertising markets on the Internet, referred to as Sponsored Search Markets (SSMs), have reduced entry barriers to advertising for niche players. Known empirical research, though scant and emerging, suggests that while these markets provided niche firms with greater access, they do exhibit high levels of concentration-a phenomenon that warrants further study. This research, using agent-based simulation of SSM, investigates the role of ``market rules'' and ``advertiser practices'' in generating emergent click share heterogeneity among advertisers in an industry. SSMs often rank ads based on the click-through rate (CTR) that gives rise to reinforcing dynamics at an individual keyword level. In the presence of spillovers arising from advertisers' practice of managing keyword bids with a cost cap operating on the keyword portfolio, these reinforcing dynamics can endogenously generate industry-level concentration. Analysis of counterfactual markets with different window sizes used to compute CTR reveals that industry-level concentration bears an inverted-``U'' relationship with window size.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Tsai:2016:DFK, author = "Ming-Feng Tsai and Chuan-Ju Wang and Po-Chuan Chien", title = "Discovering Finance Keywords via Continuous-Space Language Models", journal = j-TMIS, volume = "7", number = "3", pages = "7:1--7:??", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2948072", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The growing amount of public financial data makes it increasingly important to learn how to discover valuable information for financial decision making. This article proposes an approach to discovering financial keywords from a large number of financial reports. In particular, we apply the continuous bag-of-words (CBOW) model, a well-known continuous-space language model, to the textual information in 10-K financial reports to discover new finance keywords. In order to capture word meanings to better locate financial terms, we also present a novel technique to incorporate syntactic information into the CBOW model. Experimental results on four prediction tasks using the discovered keywords demonstrate that our approach is effective for discovering predictability keywords for post-event volatility, stock volatility, abnormal trading volume, and excess return predictions. We also analyze the discovered keywords that attest to the ability of the proposed method to capture both syntactic and contextual information between words. This shows the success of this method when applied to the field of finance.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Burnay:2016:SOS, author = "Corentin Burnay", title = "Are Stakeholders the Only Source of Information for Requirements Engineers? {Toward} a Taxonomy of Elicitation Information Sources", journal = j-TMIS, volume = "7", number = "3", pages = "8:1--8:??", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2965085", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Requirements elicitation consists in collecting and documenting information about the requirements from a system-to-be and about the environment of that system. Elicitation forms a critical step in the design of any information system, subject to many challenges like information incompleteness, variability, or ambiguity. To deal with these challenges, requirements engineers heavily rely on stakeholders, who turn out to be one of the most significant provider of information during elicitation. Sometimes, this comes at the cost of less attention being paid by engineers to other sources of information accessible in a business. In this article, we try to deal with this issue by studying the different sources of information that can be used by engineers when designing a system. We propose TELIS (a Taxonomy of Elicitation Sources), which can be used during elicitation to review more systematically the sources of information about a system-to-be. TELIS was produced through a series of empirical studies and was partially validated through a real-world case study. Our objective in this article is to increase the awareness of engineers about the other information providers within a business. Ultimately, we believe our taxonomy may help in better dealing with classical elicitation challenges and increase the chances of successful information systems design.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Xu:2016:RMB, author = "Jiajie Xu and Chengfei Liu and Xiaohui Zhao and Sira Yongchareon and Zhiming Ding", title = "Resource Management for Business Process Scheduling in the Presence of Availability Constraints", journal = j-TMIS, volume = "7", number = "3", pages = "9:1--9:??", month = oct, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1145/2990197", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In the context of business process management, the resources required by business processes, such as workshop staff, manufacturing machines, etc., tend to follow certain availability patterns, due to maintenance cycles, work shifts and other factors. Such availability patterns heavily influence the efficiency and effectiveness of enterprise resource management. Most existing process scheduling and resource management approaches tend to tune the process structure to seek better resource utilisation, yet neglect the constraints on resource availability. In this article, we investigate the scheduling of business process instances in accordance with resource availability patterns, to find out how enterprise resources can be rationally and sufficiently used. Three heuristic-based planning strategies are proposed to maximise the process instance throughput together with another strategy based on a genetic algorithm. The performance of these strategies has been evaluated by conducting experiments of different settings and analysing the strategy characteristics.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Roy:2017:OEA, author = "Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri", title = "On Optimal Employee Assignment in Constrained Role-Based Access Control Systems", journal = j-TMIS, volume = "7", number = "4", pages = "10:1--10:??", month = jan, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/2996470", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Since any organizational environment is typically resource constrained, especially in terms of human capital, organization managers would like to maximize the utilization of available human resources. However, tasks cannot simply be assigned to arbitrary employees since the employee needs to have the necessary capabilities for executing a task. Furthermore, security policies constrain the assignment of tasks to employees, especially given the other tasks assigned to the same employee. Since role-based access control (RBAC) is the most commonly used access control model for commercial information systems, we limit our attention to consider constraints in RBAC. In this article, we define the Employee Assignment Problem (EAP), which aims to identify an employee to role assignment such that it permits the maximal flexibility in assigning tasks to employees while ensuring that the required security constraints are met. We prove that finding an optimal solution is NP-complete and therefore provide a greedy solution. Experimental evaluation of the proposed approach shows that it is both efficient and effective.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chen:2017:DLN, author = "Hao Chen and Keli Xiao and Jinwen Sun and Song Wu", title = "A Double-Layer Neural Network Framework for High-Frequency Forecasting", journal = j-TMIS, volume = "7", number = "4", pages = "11:1--11:??", month = jan, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3021380", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Nowadays, machine trading contributes significantly to activities in the equity market, and forecasting market movement under high-frequency scenario has become an important topic in finance. A key challenge in high-frequency market forecasting is modeling the dependency structure among stocks and business sectors, with their high dimensionality and the requirement of computational efficiency. As a group of powerful models, neural networks (NNs) have been used to capture the complex structure in many studies. However, most existing applications of NNs only focus on forecasting with daily or monthly data, not with minute-level data that usually contains more noises. In this article, we propose a novel double-layer neural (DNN) network for high-frequency forecasting, with links specially designed to capture dependence structures among stock returns within different business sectors. Various important technical indicators are also included at different layers of the DNN framework. Our model framework allows update over time to achieve the best goodness-of-fit with the most recent data. The model performance is tested based on 100 stocks with the largest capitals from the S8P 500. The results show that the proposed framework outperforms benchmark methods in terms of the prediction accuracy and returns. Our method will help in financial analysis and trading strategy designs.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lu:2017:SLE, author = "Yan Lu and Michael Chau and Patrick Y. K. Chau", title = "Are Sponsored Links Effective? {Investigating} the Impact of Trust in Search Engine Advertising", journal = j-TMIS, volume = "7", number = "4", pages = "12:1--12:??", month = jan, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3023365", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 16 15:48:30 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "As information on the Internet grows exponentially, online users primarily rely on search engines (SEs) to locate e-commerce sites for online shopping. To generate revenue while providing free service to users, SE companies offer sponsored link (SL) placements to e-commerce sites that want to appear in the first SE results page. However, the lack of users' trust in SE advertising indicates that SEs should utilize strategies to project trustworthiness on this mechanism. Despite these insights, the role of users' trust in the operation of SE advertising is still an unexplored territory. To address this issue, a theoretical model was synthesized from the social psychology literature, the marketing literature, and the trust literature to investigate the factors that may pose impacts on the effectiveness of SE advertising by influencing users' perception of both cognitive and emotional trust. A laboratory experiment was conducted. The findings document the importance of incorporating emotional components of trust in the study of online communication by showing that emotional dimension of trust is different from and complementary to cognitive trust in facilitating online communication. The findings also provide valuable implications for practitioners to design and provide more effective SLs that can benefit all parties involved.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Pika:2017:MRP, author = "Anastasiia Pika and Michael Leyer and Moe T. Wynn and Colin J. Fidge and Arthur H. M. Ter Hofstede and Wil M. P. {Van Der Aalst}", title = "Mining Resource Profiles from Event Logs", journal = j-TMIS, volume = "8", number = "1", pages = "1:1--1:??", month = may, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3041218", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:32 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In most business processes, several activities need to be executed by human resources and cannot be fully automated. To evaluate resource performance and identify best practices as well as opportunities for improvement, managers need objective information about resource behaviors. Companies often use information systems to support their processes, and these systems record information about process execution in event logs. We present a framework for analyzing and evaluating resource behavior through mining such event logs. The framework provides (1) a method for extracting descriptive information about resource skills, utilization, preferences, productivity, and collaboration patterns; (2) a method for analyzing relationships between different resource behaviors and outcomes; and (3) a method for evaluating the overall resource productivity, tracking its changes over time, and comparing it to the productivity of other resources. To demonstrate the applicability of our framework, we apply it to analyze employee behavior in an Australian company and evaluate its usefulness by a survey among industry managers.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Eftekhari:2017:DHI, author = "Saeede Eftekhari and Niam Yaraghi and Ranjit Singh and Ram D. Gopal and R. Ramesh", title = "Do Health Information Exchanges Deter Repetition of Medical Services?", journal = j-TMIS, volume = "8", number = "1", pages = "2:1--2:??", month = may, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3057272", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:32 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Repetition of medical services by providers is one of the major sources of healthcare costs. The lack of access to previous medical information on a patient at the point of care often leads a physician to perform medical procedures that have already been done. Multiple healthcare initiatives and legislation at both the federal and state levels have mandated Health Information Exchange (HIE) systems to address this problem. This study aims to assess the extent to which HIE could reduce these repetitions, using data from Centers for Medicare 8 Medicaid Services and a regional HIE organization. A 2-Stage Least Square model is developed to predict the impact of HIE on repetitions of two classes of procedures: diagnostic and therapeutic. The first stage is a predictive analytic model that estimates the duration of tenure of each HIE member-practice. Based on these estimates, the second stage predicts the effect of providers' HIE tenure on their repetition of medical services. The model incorporates moderating effects of a federal quality assurance program and the complexity of medical procedures with a set of control variables. Our analyses show that a practice's tenure with HIE significantly lowers the repetition of therapeutic medical procedures, while diagnostic procedures are not impacted. The medical reasons for the effects observed in each class of procedures are discussed. The results will inform healthcare policymakers and provide insights on the business models of HIE platforms.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kakar:2017:IRB, author = "Adarsh Kumar Kakar", title = "Investigating the Relationships Between the Use Contexts, User Perceived Values, and Loyalty to a Software Product", journal = j-TMIS, volume = "8", number = "1", pages = "3:1--3:??", month = may, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3057271", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:32 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In this study, we propose that software products provide three types of value-utilitarian, hedonic, and social-that impact user loyalty. Although the Technology Acceptance Model (TAM) has focused on the user impacts of utilitarian and hedonic values provided by utilitarian and hedonic software products on system use, the impact of social value provided by the software products in general have been largely ignored. The results of a longitudinal study with actual users of three types of software products show that all three types of software products-utilitarian (Producteev), hedonic (Kerbal), and social (Facebook)-provide significant but varying degrees of all three types of values. Further, the value derived by the users' primary use context moderated the impact of the secondary values provided by the software product to the users on their loyalty for the product.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bhattacharjee:2017:IWS, author = "Sudip Bhattacharjee and Varghese Jacob and Zhengrui (Jeffrey) Jiang and Subodha Kumar", title = "Introduction to {WITS 2015} Special Issue in {TMIS}", journal = j-TMIS, volume = "8", number = "2--3", pages = "4:1--4:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3108899", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4e", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Deng:2017:RAS, author = "Shuyuan Deng and Atish P. Sinha and Huimin Zhao", title = "Resolving Ambiguity in Sentiment Classification: The Role of Dependency Features", journal = j-TMIS, volume = "8", number = "2--3", pages = "4:1--4:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3046684", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Sentiment analysis has become popular in business intelligence and analytics applications due to the great need for learning insights from the vast amounts of user generated content on the Internet. One major challenge of sentiment analysis, like most text classification tasks, is finding structures from unstructured texts. Existing sentiment analysis techniques employ the supervised learning approach and the lexicon scoring approach, both of which largely rely on the representation of a document as a collection of words and phrases. The semantic ambiguity (i.e., polysemy) of single words and the sparsity of phrases negatively affect the robustness of sentiment analysis, especially in the context of short social media texts. In this study, we propose to represent texts using dependency features. We test the effectiveness of dependency features in supervised sentiment classification. We compare our method with the current standard practice using a labeled data set containing 170,874 microblogging messages. The combination of unigram features and dependency features significantly outperformed other popular types of features.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Al-Ramahi:2017:DDP, author = "Mohammad A. Al-Ramahi and Jun Liu and Omar F. El-Gayar", title = "Discovering Design Principles for Health Behavioral Change Support Systems: a Text Mining Approach", journal = j-TMIS, volume = "8", number = "2--3", pages = "5:1--5:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3055534", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Behavioral Change Support Systems (BCSSs) aim to change users' behavior and lifestyle. These systems have been gaining popularity with the proliferation of wearable devices and recent advances in mobile technologies. In this article, we extend the existing literature by discovering design principles for health BCSSs based on a systematic analysis of users' feedback. Using mobile diabetes applications as an example of Health BCSSs, we use topic modeling to discover design principles from online user reviews. We demonstrate the importance of the design principles through analyzing their existence in users' complaints. Overall, the results highlight the necessity of going beyond the techno-centric approach used in current practice and incorporating the social and organizational features into persuasive systems design, as well as integrating with medical devices and other systems in their usage context.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sun:2017:BCP, author = "Can Sun and Yonghua Ji and Bora Kolfal and Ray Patterson", title = "Business-to-Consumer Platform Strategy: How Vendor Certification Changes Platform and Seller Incentives", journal = j-TMIS, volume = "8", number = "2--3", pages = "6:1--6:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3057273", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We build an economic model to study the problem of offering a new, high-certainty channel on an existing business-to-consumer platform such as Taobao and eBay. On this new channel, the platform owner exerts effort to reduce the uncertainty of service quality. Sellers can either sell through the existing low-certainty channel or go through additional screening to sell on this new channel. We model the problem as a Bertrand competition game where sellers compete on price and exert effort to provide better service to consumers. In this game, we consider a reputation spillover effect that refers to the impact of the high-certainty channel on the perceived service quality in the low-certainty channel. Counter-intuitively, we find that low-certainty channel demand will decrease as the reputation spillover effect increases, in the case of low inter-channel competition. Also, low-certainty channel demand increases as the quality uncertainty increases, in the case of intense inter-channel competition. Furthermore, the platform owner should offer a new high-certainty channel when (i) the perceived quality for this channel is sufficiently high, (ii) sellers in this channel are able to efficiently provide quality service, (iii) consumers in this channel are not so sensitive to the quality uncertainty, or (iv) the reputation spillover effect is high. In the one-channel case, the incentives of the platform owner and sellers are aligned for all model parameters. However, this is not the case for the two-channel solution, and our model reveals where tensions will arise between parties.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Bauman:2017:USS, author = "Konstantin Bauman and Alexander Tuzhilin and Ryan Zaczynski", title = "Using Social Sensors for Detecting Emergency Events: a Case of Power Outages in the Electrical Utility Industry", journal = j-TMIS, volume = "8", number = "2--3", pages = "7:1--7:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3052931", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This article presents a novel approach to detecting emergency events, such as power outages, that utilizes social media users as ``social sensors'' for virtual detection of such events. The proposed new method is based on the analysis of the Twitter data that leads to the detection of Twitter discussions about these emergency events. The method described in the article was implemented and deployed by one of the vendors in the context of detecting power outages as a part of their comprehensive social engagement platform. It was also field tested on Twitter users in an industrial setting and performed well during these tests.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mannino:2017:DES, author = "Michael Mannino and Joel Fredrickson and Farnoush Banaei-Kashani and Iris Linck and Raghda Alqurashi Raghda", title = "Development and Evaluation of a Similarity Measure for Medical Event Sequences", journal = j-TMIS, volume = "8", number = "2--3", pages = "8:1--8:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3070684", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We develop a similarity measure for medical event sequences (MESs) and empirically evaluate it using U.S. Medicare claims data. Existing similarity measures do not use unique characteristics of MESs and have never been evaluated on real MESs. Our similarity measure, the Optimal Temporal Common Subsequence for Medical Event Sequences (OTCS-MES), provides a matching component that integrates event prevalence, event duplication, and hierarchical coding, important elements of MESs. The OTCS-MES also uses normalization to mitigate the impact of heavy positive skew of matching events and compact distribution of event prevalence. We empirically evaluate the OTCS-MES measure against two other measures specifically designed for MESs, the original OTCS and Artemis, a measure incorporating event alignment. Our evaluation uses two substantial data sets of Medicare claims data containing inpatient and outpatient sequences with different medical event coding. We find a small overlap in nearest neighbors among the three similarity measures, demonstrating the superior design of the OTCS-MES with its emphasis on unique aspects of MESs. The evaluation also provides evidence about the impact of component weights, neighborhood size, and sequence length.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Taghavi:2017:RCF, author = "Atefeh Taghavi and Carson Woo", title = "The Role Clarity Framework to Improve Requirements Gathering", journal = j-TMIS, volume = "8", number = "2--3", pages = "9:1--9:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3083726", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Incorrect and incomplete requirements have been reported as two of the top reasons for information systems (IS) project failures. In order to address these concerns, several IS analysis and design studies have focused on understanding the business needs and organizational factors prior to specifying the requirements. In this research, we add to the existing incremental solutions, such as the work system method and goal-oriented requirements engineering, by proposing the Role Clarity Framework drawn from the theories of ``role dynamics'' and ``goal setting and task performance'' in organization studies. The Role Clarity Framework consists of three main concepts related to any organizational role: expectations, activities, and consequences. Based on the interactions among different roles, this framework demonstrates how the business goals and activities of each role, as played out by IS users, are formed and/or changed in the organization. Finally, the Role Clarity Framework helps IS analysts to improve their communication with users and anticipate changes in their requirements, thus improving the gathering of requirements for IS design.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mukherjee:2017:ARB, author = "Anik Mukherjee and R. P. Sundarraj and Kaushik Dutta", title = "Apriori Rule-Based In-App Ad Selection Online Algorithm for Improving Supply-Side Platform Revenues", journal = j-TMIS, volume = "8", number = "2--3", pages = "10:1--10:??", month = aug, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3086188", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 16 11:43:33 MDT 2017", bibsource = "http://www.acm.org/pubs/contents/journals/tmis/; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Today, smartphone-based in-app advertisement forms a substantial portion of the online advertising market. In-app publishers go through ad-space aggregators known as Supply-Side Platforms (SSPs), who, in turn, act as intermediaries for ad-agency aggregators known as demand-side platforms. The SSPs face the twin issue of making ad placement decisions within an order of milliseconds, even though their revenue streams can be optimized only by a careful selection of ads that elicit appropriate user responses regarding impressions, clicks, and conversions. This article considers the SSP's perspective and presents an online algorithm that balances these two issues. Our experimental results indicate that the decision-making time generally ranges between 20 ms and 50 ms and accuracy from 1\% to 10\%. Further, we conduct statistical analysis comparing the theoretical complexity of the online algorithm with its empirical performance. Empirically, we observe that the time is directly proportional to the number of incoming ads and the number of online rules.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ha:2017:PPE, author = "Tuan Minh Ha and Masaki Samejima and Norihisa Komoda", title = "Power and Performance Estimation for Fine-Grained Server Power Capping via Controlling Heterogeneous Applications", journal = j-TMIS, volume = "8", number = "4", pages = "11:1--11:??", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3086449", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 22 17:26:40 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "Power capping is a method to save power consumption of servers by limiting performance of the servers. Although users frequently run applications on different virtual machines (VMs) for keeping their performance and having them isolated from the other applications, power capping may degrade performance of all the applications running on the server. We present fine-grained power capping by limiting performance of each application individually. For keeping performance defined in Quality of Service (QoS) requirements, it is important to estimate applications' performance and power consumption after the fine-grained power capping is applied. We propose the estimation method of physical CPU usage when limiting virtual CPU usage of applications on VMs. On servers where multiple VMs run, VM's usage of physical CPU is interrupted by the other VMs, and a hypervisor uses physical CPU to control VMs. These VMs' and hypervisor's behaviors make it difficult to estimate performance and power consumption by straightforward methods, such as linear regression and polynomial regression. The proposed method uses Piecewise Linear Regression to estimate physical CPU usage by assuming that VM's access to physical CPU is not interrupted by the other VMs. Then we estimate how much physical CPU usage is reduced by the interruption. Because physical CPU usage is not stable soon after limiting CPU usage, the proposed method estimates a convergence value of CPU usage after many interruptions are repeated.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Basole:2017:UAP, author = "Rahul C. Basole and Timothy Major and Arjun Srinivasan", title = "Understanding Alliance Portfolios Using Visual Analytics", journal = j-TMIS, volume = "8", number = "4", pages = "12:1--12:??", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3086308", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 22 17:26:40 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In an increasingly global and competitive business landscape, firms must collaborate and partner with others to ensure survival, growth, and innovation. Understanding the evolutionary composition of a firm's relationship portfolio and the underlying formation strategy is a difficult task given the multidimensional, temporal, and geospatial nature of the data. In collaboration with senior executives, we iteratively determine core design requirements and then design and implement an interactive visualization system that enables decision makers to gain both systemic (macro) and detailed (micro) insights into a firm's alliance activities and discover patterns of multidimensional relationship formation. Our system provides both sequential and temporal representation modes, a rich set of additive cross-linked filters, the ability to stack multiple alliance portfolios, and a dynamically updated activity state model visualization to inform decision makers of past and likely future relationship moves. We illustrate our tool with examples of alliance activities of firms listed on the S8P 500. A controlled experiment and real-world evaluation with practitioners and researchers reveals significant evidence of the value of our visual analytic tool. Our design study contributes to design science by addressing a known problem (i.e., alliance portfolio analysis) with a novel solution (interactive, pixel-based multivariate visualization) and to the rapidly emerging area of data-driven visual decision support in corporate strategy contexts. We conclude with implications and future research opportunities.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Cazier:2017:VCT, author = "Joseph Cazier and Benjamin Shao and Robert {St. Louis}", title = "Value Congruence, Trust, and Their Effects on Purchase Intention and Reservation Price", journal = j-TMIS, volume = "8", number = "4", pages = "13:1--13:??", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3110939", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 22 17:26:40 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "We study the roles of value congruence and trust in increasing online shoppers' intention to purchase goods and their reservation prices for these goods. Hypotheses are developed and a controlled experiment is conducted to measure subjects' value congruence with and their trust in online sellers with disparate values, along with their purchase intention and willingness to pay price premiums. Using social exchange theory, we find that, for business-to-consumer (B2C) e-commerce, value congruence increases consumer online trust, and both value congruence and online trust have direct effects on purchase intention and reservation prices. In particular, in the positive value congruence vs. value neutral case, trust has a greater effect than value congruence on purchase intention, but value congruence has a greater effect than trust on reservation price. These findings suggest that trust is essential to a consumer's intention to purchase online but value congruence can induce price premiums from potential buyers for online sellers. This implies that trust is essential to B2C e-commerce, but value congruence can be a more effective instrument for online sellers to achieve competitive advantage through value-based differentiation in the virtual marketplace.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lukyanenko:2017:ACC, author = "Roman Lukyanenko and Binny M. Samuel", title = "Are All Classes Created Equal? {Increasing} Precision of Conceptual Modeling Grammars", journal = j-TMIS, volume = "8", number = "4", pages = "14:1--14:??", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1145/3131780", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Jan 22 17:26:40 MST 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Recent decade has seen a dramatic change in the information systems landscape that alters the ways we design and interact with information technologies, including such developments as the rise of business analytics, user-generated content, and NoSQL databases, to name just a few. These changes challenge conceptual modeling research to offer innovative solutions tailored to these environments. Conceptual models typically represent classes (categories, kinds) of objects rather than concrete specific objects, making the class construct a critical medium for capturing domain semantics. While representation of classes may differ between grammars, a common design assumption is what we term different semantics same syntax (D3S). Under D3S, all classes are depicted using the same syntactic symbols. Following recent findings in psychology, we introduce a novel assumption semantics-contingent syntax (SCS) whereby syntactic representations of classes in conceptual models may differ based on their semantic meaning. We propose a core SCS design principle and five guidelines pertinent for conceptual modeling. We believe SCS carries profound implications for theory and practice of conceptual modeling as it seeks to better support modern information environments.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Li:2018:SLR, author = "Zhepeng (Lionel) Li and Xiao Fang and Olivia R. Liu Sheng", title = "A Survey of Link Recommendation for Social Networks: Methods, Theoretical Foundations, and Future Research Directions", journal = j-TMIS, volume = "9", number = "1", pages = "1:1--1:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3131782", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Link recommendation has attracted significant attention from both industry practitioners and academic researchers. In industry, link recommendation has become a standard and most important feature in online social networks, prominent examples of which include ``People You May Know'' on LinkedIn and ``You May Know'' on Google+. In academia, link recommendation has been and remains a highly active research area. This article surveys state-of-the-art link recommendation methods, which can be broadly categorized into learning-based methods and proximity-based methods. We further identify social and economic theories, such as social interaction theory, that underlie these methods and explain from a theoretical perspective why a link recommendation method works. Finally, we propose to extend link recommendation research in several directions that include utility-based link recommendation, diversity of link recommendation, link recommendation from incomplete data, and experimental study of link recommendation.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Xiao:2018:PSD, author = "Keli Xiao and Qi Liu and Chuanren Liu and Hui Xiong", title = "Price Shock Detection With an Influence-Based Model of Social Attention", journal = j-TMIS, volume = "9", number = "1", pages = "2:1--2:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3131781", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "There has been increasing interest in exploring the impact of human behavior on financial market dynamics. One of the important related questions is whether attention from society can lead to significant stock price movements or even abnormal returns. To answer the question, we develop a new measurement of social attention, named periodic cumulative degree of social attention, by simultaneously considering the individual influence and the information propagation in social networks. Based on the vast social network data, we evaluate the new attention measurement by testing its significance in explaining future abnormal returns. In addition, we test the forecasting ability of social attention for stock price shocks, defined by the cumulative abnormal returns. Our results provide significant evidence to support the intercorrelated relationship between the social attention and future abnormal returns. The outperformance of the new approach in predicting price shocks is also confirmed by comparison with several benchmark methods.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Tuarob:2018:DDB, author = "Suppawong Tuarob and Ray Strong and Anca Chandra and Conrad S. Tucker", title = "Discovering Discontinuity in Big Financial Transaction Data", journal = j-TMIS, volume = "9", number = "1", pages = "3:1--3:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3159445", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Business transactions are typically recorded in the company ledger. The primary purpose of such financial information is to accompany a monthly or quarterly report for executives to make sound business decisions and strategies for the next business period. These business strategies often result in transitions that cause underlying infrastructures and components to change, including alteration in the nomenclature system of the business components. As a result, a transaction stream of an affected component would be replaced by another stream with a different component name, resulting in discontinuity of a financial stream of the same component. Recently, advancement in large-scale data mining technologies has enabled a set of critical applications to utilize knowledge extracted from a vast amount of existing data that would otherwise have been unused or underutilized. In financial and services computing domains, recent studies have illustrated that historical financial data could be used to predict future revenues and profits, optimizing costs, among other potential applications. These prediction models rely on long-term availability of the historical data that traces back for multiple years. However, the discontinuity of the financial transaction stream associated with a business component has limited the learning capability of the prediction models. In this article, we propose a set of machine learning-based algorithms to automatically discover component name replacements, using information available in general ledger databases. The algorithms are designed to be scalable for handling massive data points, especially in large companies. Furthermore, the proposed algorithms are generalizable to other domains whose data is time series and shares the same nature as the financial data available in business ledgers. A case study of real-world IBM service delivery retrieved from four different geographical regions is used to validate the efficacy of the proposed methodology.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mendling:2018:BBP, author = "Jan Mendling and Ingo Weber and Wil {Van Der Aalst} and Jan {Vom Brocke and} Cristina Cabanillas and Florian Daniel and S{\o}ren Debois and Claudio {Di Ciccio} and Marlon Dumas and Schahram Dustdar and Avigdor Gal and Luciano Garc{\'\i}a-Ba{\~n}uelos and Guido Governatori and Richard Hull and Marcello {La Rosa} and Henrik Leopold and Frank Leymann and Jan Recker and Manfred Reichert and Hajo A. Reijers and Stefanie Rinderle-Ma and Andreas Solti and Michael Rosemann and Stefan Schulte and Munindar P. Singh and Tijs Slaats and Mark Staples and Barbara Weber and Matthias Weidlich and Mathias Weske and Xiwei Xu and Liming Zhu", title = "Blockchains for Business Process Management --- Challenges and Opportunities", journal = j-TMIS, volume = "9", number = "1", pages = "4:1--4:??", month = feb, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3183367", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Blockchain technology offers a sizable promise to rethink the way interorganizational business processes are managed because of its potential to realize execution without a central party serving as a single point of trust (and failure). To stimulate research on this promise and the limits thereof, in this article, we outline the challenges and opportunities of blockchain for business process management (BPM). We first reflect how blockchains could be used in the context of the established BPM lifecycle and second how they might become relevant beyond. We conclude our discourse with a summary of seven research directions for investigating the application of blockchain technology in the context of BPM.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zimbra:2018:SAT, author = "David Zimbra and Ahmed Abbasi and Daniel Zeng and Hsinchun Chen", title = "The State-of-the-Art in {Twitter} Sentiment Analysis: a Review and Benchmark Evaluation", journal = j-TMIS, volume = "9", number = "2", pages = "5:1--5:??", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3185045", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Twitter has emerged as a major social media platform and generated great interest from sentiment analysis researchers. Despite this attention, state-of-the-art Twitter sentiment analysis approaches perform relatively poorly with reported classification accuracies often below 70\%, adversely impacting applications of the derived sentiment information. In this research, we investigate the unique challenges presented by Twitter sentiment analysis and review the literature to determine how the devised approaches have addressed these challenges. To assess the state-of-the-art in Twitter sentiment analysis, we conduct a benchmark evaluation of 28 top academic and commercial systems in tweet sentiment classification across five distinctive data sets. We perform an error analysis to uncover the causes of commonly occurring classification errors. To further the evaluation, we apply select systems in an event detection case study. Finally, we summarize the key trends and takeaways from the review and benchmark evaluation and provide suggestions to guide the design of the next generation of approaches.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Basole:2018:EDE, author = "Rahul C. Basole and Arjun Srinivasan and Hyunwoo Park and Shiv Patel", title = "{\tt ecoxight}: Discovery, Exploration, and Analysis of Business Ecosystems Using Interactive Visualization", journal = j-TMIS, volume = "9", number = "2", pages = "6:1--6:??", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3185047", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The term ecosystem is used pervasively in industry, government, and academia to describe the complex, dynamic, hyperconnected nature of many social, economic, and technical systems that exist today. Ecosystems are characterized by a large, dynamic, and heterogeneous set of geospatially distributed entities that are interconnected through various types of relationships. This study describes the design and development of ecoxight, a Web-based visualization platform that provides multiple coordinated views of multipartite, multiattribute, dynamic, and geospatial ecosystem data with novel and rich interaction capabilities to augment decision makers ecosystem intelligence. The design of ecoxight was informed by an extensive multiphase field study of executives. The ecoxight platform not only provides capabilities to interactively explore and make sense of ecosystems but also provides rich visual construction capabilities to help decision makers align their mental model. We demonstrate the usability, utility, and value of our system using multiple evaluation studies with practitioners using socially curated data on the emerging application programming interface ecosystem. We report on our findings and conclude with research implications. Collectively, our study contributes to design science research at the intersection of information systems and strategy and the rapidly emerging field of visual enterprise analytics.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Fan:2018:IES, author = "Xiangyu Fan and Xi Niu", title = "Implementing and Evaluating Serendipity in Delivering Personalized Health Information", journal = j-TMIS, volume = "9", number = "2", pages = "7:1--7:??", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3205849", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Serendipity has been recognized to have the potential of enhancing unexpected information discovery. This study shows that decomposing the concept of serendipity into unexpectedness and interest is a useful way for implementing this concept. Experts' domain knowledge helps in providing serendipitous recommendation, which can be further improved by adaptively incorporating users' real-time feedback. This research also conducts an empirical user-study to analyze the influence of serendipity in a health news delivery context. A personalized filtering system named MedSDFilter was developed, on top of which serendipitous recommendation was implemented using three approaches: random, static-knowledge-based, and adaptive-knowledge-based models. The three different models were compared. The results indicate that the adaptive-knowledge-based method has the highest ability in helping people discover unexpected and interesting contents. The insights of the research will make researchers and practitioners rethink the way in which search engines and recommender systems operate to address the challenges of discovering unexpected and interesting information. The outcome will have implications for empowering ordinary people with more chances of bumping into beneficial information.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Purao:2018:MLC, author = "Sandeep Purao and Narasimha Bolloju and Chuan-Hoo Tan", title = "A Modeling Language for Conceptual Design of Systems Integration Solutions", journal = j-TMIS, volume = "9", number = "2", pages = "8:1--8:??", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3185046", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Systems integration-connecting software systems for cross-functional work-is a significant concern in many large organizations, which continue to maintain hundreds, if not thousands, of independently evolving software systems. Current approaches in this space remain ad hoc, and closely tied to technology platforms. Following a design science approach, and via multiple design-evaluate cycles, we develop Systems Integration Requirements Engineering Modeling Language (SIRE-ML) to address this problem. SIRE-ML builds on the foundation of coordination theory, and incorporates important semantic information about the systems integration domain. The article develops constructs in SIRE-ML, and a merge algorithm that allows both functional managers and integration professionals to contribute to building a systems integration solution. Integration models built with SIRE-ML provide benefits such as ensuring coverage and minimizing ambiguity, and can be used to drive implementation with different platforms such as middleware, services, and distributed objects. We evaluate SIRE-ML for ontological expressiveness and report findings about applicability check with an expert panel. The article discusses implications for future research such as tool building and empirical evaluation, as well as implications for practice.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{De-Arteaga:2018:MLD, author = "Maria De-Arteaga and William Herlands and Daniel B. Neill and Artur Dubrawski", title = "Machine Learning for the Developing World", journal = j-TMIS, volume = "9", number = "2", pages = "9:1--9:??", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3210548", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:48 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Researchers from across the social and computer sciences are increasingly using machine learning to study and address global development challenges. This article examines the burgeoning field of machine learning for the developing world (ML4D). First, we present a review of prominent literature. Next, we suggest best practices drawn from the literature for ensuring that ML4D projects are relevant to the advancement of development objectives. Finally, we discuss how developing world challenges can motivate the design of novel machine learning methodologies. This article provides insights into systematic differences between ML4D and more traditional machine learning applications. It also discusses how technical complications of ML4D can be treated as novel research questions, how ML4D can motivate new research directions, and where machine learning can be most useful.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Ketter:2018:ISS, author = "Wolfgang Ketter and John Collins and Maytal Saar-Tsechansky and Ori Marom", title = "Information Systems for a Smart Electricity Grid: Emerging Challenges and Opportunities", journal = j-TMIS, volume = "9", number = "3", pages = "10:1--10:??", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3230712", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3230712", abstract = "The drive for sustainability as evidenced by the Paris Accords is forcing a radical re-examination of the way electricity is produced, managed, and consumed. Research on sustainable smart electricity markets is facilitating the emergence of sustainable energy systems and a revolution in the efficiency and reliability of electricity consumption, production, and distribution. Traditional electricity grids and markets are being disrupted by a range of forces, including the rise of weather-dependent and distributed renewable sources, growing consumer involvement in managing their power consumption and production, and the electrification of transport. These changes will likely bring about complex and dynamic smart electricity markets that rely on analysis of information to inform stakeholders, and on effective integration of stakeholders' actions. We outline a research agenda on how advances in information-intensive processes are fundamental for facilitating these transformations, describe the roles that such processes will play, and discuss Information Systems research challenges necessary to achieve these goals. These challenges span public policy, privacy, and security; market mechanisms; and data-driven decision support. The diverse challenges we outline also underscore that the diverse IS research perspective is instrumental for addressing the complexity and interdisciplinary nature of this research.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Russo:2018:MMI, author = "Daniel Russo and Paolo Ciancarini and Tommaso Falasconi and Massimo Tomasi", title = "A Meta-Model for Information Systems Quality: a Mixed Study of the Financial Sector", journal = j-TMIS, volume = "9", number = "3", pages = "11:1--11:??", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3230713", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3230713", abstract = "Information Systems Quality (ISQ) is a critical source of competitive advantages for organizations. In a scenario of increasing competition on digital services, ISQ is a competitive differentiation asset. In this regard, managing, maintaining, and evolving IT infrastructures have become a primary concern of organizations. Thus, a technical perspective on ISQ provides useful guidance to meet current challenges. The financial sector is paradigmatic, since it is a traditional business, with highly complex business-critical legacy systems, facing a tremendous change due to market and regulation drivers. We carried out a Mixed-Methods study, performing a Delphi-like study on the financial sector. We developed a specific research framework to pursue this vertical study. Data were collected in four phases starting with a high-level randomly stratified panel of 13 senior managers and then a target panel of 124 carefully selected and well-informed domain experts. We have identified and dealt with several quality factors; they were discussed in a comprehensive model inspired by the ISO 25010, 42010, and 12207 standards, corresponding to software quality, software architecture, and software process, respectively. Our results suggest that the relationship among quality, architecture, and process is a valuable technical perspective to explain the quality of an information system. Thus, we introduce and illustrate a novel meta-model, named SQuAP (Software Quality, Architecture, Process), which is intended to give a comprehensive picture of ISQ by abstracting and connecting detailed individual ISO models.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zhu:2018:PJF, author = "Chen Zhu and Hengshu Zhu and Hui Xiong and Chao Ma and Fang Xie and Pengliang Ding and Pan Li", title = "Person-Job Fit: Adapting the Right Talent for the Right Job with Joint Representation Learning", journal = j-TMIS, volume = "9", number = "3", pages = "12:1--12:??", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3234465", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3234465", abstract = "Person-Job Fit is the process of matching the right talent for the right job by identifying talent competencies that are required for the job. While many qualitative efforts have been made in related fields, it still lacks quantitative ways of measuring talent competencies as well as the job's talent requirements. To this end, in this article, we propose a novel end-to-end data-driven model based on a Convolutional Neural Network (CNN), namely, the Person-Job Fit Neural Network (PJFNN), for matching a talent qualification to the requirements of a job. To be specific, PJFNN is a bipartite neural network that can effectively learn the joint representation of Person-Job fitness from historical job applications. In particular, due to the design of a hierarchical representation structure, PJFNN can not only estimate whether a candidate fits a job but also identify which specific requirement items in the job posting are satisfied by the candidate by measuring the distances between corresponding latent representations. Finally, the extensive experiments on a large-scale real-world dataset clearly validate the performance of PJFNN in terms of Person-Job Fit prediction. Also, we provide effective data visualization to show some job and talent benchmark insights obtained by PJFNN.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Delano:2018:SDT, author = "John D. Delano and Hemant K. Jain and Atish P. Sinha", title = "System Design through the Exploration of Contemporary {Web} Services", journal = j-TMIS, volume = "9", number = "3", pages = "13:1--13:??", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1145/3273932", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3273932", abstract = "In this article, we develop a Contemporary Web Service (CWS) repository of system designs, which are encoded as metadata of contemporary web services. We examine if this CWS repository serves as an effective design tool for initial CWS design and as an effective support tool for business users and analysts working together on system design. The CWS repository reduces the cognitive load of both the analyst and the business user as they jointly explore the CWS repository of system designs. It supports an evolutionary approach to system design through rapid selection of appropriate CWS metadata. To accomplish that, we introduce several new design characteristics for the CWS repository. The evaluation results demonstrate that the CWS repository is an effective tool for supporting designers during initial service design, as well as for supporting business users and analysts during system design.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lo:2019:PWT, author = "Kar Kei Lo and Michael Chau", title = "A Penny Is Worth a Thousand? {Investigating} the Relationship Between Social Media and Penny Stocks", journal = j-TMIS, volume = "9", number = "4", pages = "14:1--14:??", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3309704", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3309704", abstract = "Increasingly more investors are seeking information from social media to help make investment decisions. Considering that information on penny stocks is often less reported in traditional media, investors may rely more on social media to obtain such information for investment advice. Although previous research has shown that stock opinions in traditional media is a possible predictor of stock returns, no previous research has considered the effect of the stock opinions in social media on these stocks in terms of future stock performance and the moderation effect of penny stocks. In this research, we studied the relationship between social media and the financial performance of penny stocks. We used the net proportion of positive words in stock articles in social media to help predict the future stock performance for penny stocks. The moderation effect of penny stocks on the net fraction of positive words was found to be significant in short terms, revealing a stronger relationship between social media and stock performance at lower price and market capitalization (MC) levels. Based on the findings, we proposed simple strategies utilizing social media and our measure. The results of our applications will be of interest to individual and institutional investors, shareholders, and regulators.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kratzwald:2019:PQA, author = "Bernhard Kratzwald and Stefan Feuerriegel", title = "Putting Question-Answering Systems into Practice: Transfer Learning for Efficient Domain Customization", journal = j-TMIS, volume = "9", number = "4", pages = "15:1--15:??", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3309706", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3309706", abstract = "Traditional information retrieval (such as that offered by web search engines) impedes users with information overload from extensive result pages and the need to manually locate the desired information therein. Conversely, question-answering systems change how humans interact with information systems: users can now ask specific questions and obtain a tailored answer-both conveniently in natural language. Despite obvious benefits, their use is often limited to an academic context, largely because of expensive domain customizations, which means that the performance in domain-specific applications often fails to meet expectations. This article proposes cost-efficient remedies: (i) we leverage metadata through a filtering mechanism, which increases the precision of document retrieval, and (ii) we develop a novel fuse-and-oversample approach for transfer learning to improve the performance of answer extraction. Here, knowledge is inductively transferred from related, yet different, tasks to the domain-specific application, while accounting for potential differences in the sample sizes across both tasks. The resulting performance is demonstrated with actual use cases from a finance company and the film industry, where fewer than 400 question-answer pairs had to be annotated to yield significant performance gains. As a direct implication to management, this presents a promising path to better leveraging of knowledge stored in information systems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Yu:2019:EAC, author = "Shuo Yu and Hongyi Zhu and Shan Jiang and Yong Zhang and Chunxiao Xing and Hsinchun Chen", title = "Emoticon Analysis for {Chinese} Social Media and E-commerce: The {AZEmo} System", journal = j-TMIS, volume = "9", number = "4", pages = "16:1--16:??", month = mar, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3309707", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 12 16:04:49 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3309707", abstract = "This article presents a novel system, AZEmo, which extracts and classifies emoticons from the ever-growing critical Chinese social media and E-commerce. An emoticon is a meta-communicative pictorial representation of facial expressions, which helps to describe the sender's emotional state. To complement non-verbal communication, emoticons are frequently used in social media websites. However, limited research has been done to effectively analyze the affects of emoticons in a Chinese context. In this study, we developed an emoticon analysis system to extract emoticons from Chinese text and classify them into one of seven affect categories. The system is based on a kinesics model that divides emoticons into semantic areas (eyes, mouths, etc.), with improvements for adaptation in the Chinese context. Machine-learning methods were developed based on feature vector extraction of emoticons. Empirical tests were conducted to evaluate the effectiveness of the proposed system in extracting and classifying emoticons, based on corpora from a video sharing website and an E-commerce website. Results showed the effectiveness of the system in detecting and extracting emoticons from text and in interpreting the affects conveyed by emoticons.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Hartono:2019:WVD, author = "Edward Hartono and Clyde W. Holsapple", title = "{Website} Visual Design Qualities: a Threefold Framework", journal = j-TMIS, volume = "10", number = "1", pages = "1:1--1:??", month = may, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3309708", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:31:35 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3309708", abstract = "The present study aims to contribute to the information systems (IS) literature by developing a new theoretical perspective that integrates three dimensions of artifact visual design quality-namely aesthetic, functional, and symbolic dimensions-in the investigation of website visual design qualities that influence visitors' attitudes and behaviors. Results suggest that website aesthetic, functional, and symbolic qualities positively influence intention to use the website and positive word of mouth and that website aesthetic quality positively influences website functional and symbolic qualities. Results also demonstrate that functional and symbolic qualities mediate the relationships between aesthetic quality and intention to use and positive word of mouth.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Xiong:2019:FES, author = "Hu Xiong and Yi Wang and Wenchao Li and Chien-Ming Chen", title = "Flexible, Efficient, and Secure Access Delegation in Cloud Computing", journal = j-TMIS, volume = "10", number = "1", pages = "2:1--2:??", month = may, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3318212", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:31:35 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3318212", abstract = "The convenience of the cloud-assisted Internet of Things has led to the need for improved protections for the large volumes of data collected from devices around the world and stored on cloud-based servers. Proxy re-encryption (PRE) has been presented as a suitable mechanism for secure transmission and sharing of files within the cloud. However, existing PRE schemes do not support unidirectional data transformation, fine-grained controls, multiple hops, and identity-based encryption simultaneously. To solve these problems, we propose a unidirectional multi-hop identity based-conditional PRE scheme that meets all of the above requirements. Our proposal has the additional benefits of a constant ciphertext size, non-interactivity, and collusion resistance. We also prove that our scheme is secure against adaptive identity chosen-ciphertext attacks in the standard model.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Mohammadi:2019:SAB, author = "Majid Mohammadi and Wout Hofman and Yao-Hua Tan", title = "Simulated Annealing-based Ontology Matching", journal = j-TMIS, volume = "10", number = "1", pages = "3:1--3:??", month = may, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3314948", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:31:35 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3314948", abstract = "Ontology alignment is a fundamental task to reconcile the heterogeneity among various information systems using distinct information sources. The evolutionary algorithms (EAs) have been already considered as the primary strategy to develop an ontology alignment system. However, such systems have two significant drawbacks: they either need a ground truth that is often unavailable, or they utilize the population-based EAs in a way that they require massive computation and memory. This article presents a new ontology alignment system, called SANOM, which uses the well-known simulated annealing as the principal technique to find the mappings between two given ontologies while no ground truth is available. In contrast to population-based EAs, the simulated annealing need not generate populations, which makes it significantly swift and memory-efficient for the ontology alignment problem. This article models the ontology alignment problem as optimizing the fitness of a state whose optimum is obtained by using the simulated annealing. A complex fitness function is developed that takes advantage of various similarity metrics including string, linguistic, and structural similarities. A randomized warm initialization is specially tailored for the simulated annealing to expedite its convergence. The experiments illustrate that SANOM is competitive with the state-of-the-art and is significantly superior to other EA-based systems.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Emami:2019:GBA, author = "Hojjat Emami", title = "A Graph-based Approach to Person Name Disambiguation in {Web}", journal = j-TMIS, volume = "10", number = "2", pages = "4:1--4:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3314949", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3314949", abstract = "This article presents a name disambiguation approach to resolve ambiguities between person names and group web pages according to the individuals they refer to. The proposed approach exploits two important sources of entity-centric semantic information extracted from web pages, including personal attributes and social relationships. It takes as input the web pages that are results for a person name search. The web pages are analyzed to extract personal attributes and social relationships. The personal attributes and social relationships are mapped into an undirected weighted graph, called attribute-relationship graph. A graph-based clustering algorithm is proposed to group the nodes representing the web pages, each of which refers to a person entity. The outcome is a set of clusters such that the web pages within each cluster refer to the same person. We show the effectiveness of our approach by evaluating it on large-scale datasets WePS-1, WePS-2, and WePS-3. Experimental results are encouraging and show that the proposed method clearly outperforms several baseline methods and also its counterparts.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jiang:2019:MAI, author = "Jian-Min Jiang and Zhong Hong and Yangyang Chen", title = "Modeling and Analyzing Incremental Natures of Developing Software", journal = j-TMIS, volume = "10", number = "2", pages = "5:1--5:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3333535", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3333535", abstract = "The basic premise of iterative and evolutionary project management is that a project is divided into early, frequent, and short duration delivery steps. Each step attempts to deliver some real value to stakeholders. The increment size and iteration length usually depend on profitability, finance, deadline, and so on, rather than the functionality of a developing system. It is difficult to guarantee the correctness in every iteration step. In this article, we propose a method of ensuring the correctness of iterative design in terms of deadlock-freedom of the behavior of software. The method first obtains the correct (deadlock-free) atomic subsystems of a system using a decomposition approach. In the iterative development process, the method then requires that one atomic subsystem or the composition of multiple atomic subsystems should be regarded as one increment. Every increment is naturally correct and can be completely independently developed, independently deployed, and independently maintained. The currently released system in each iteration step is naturally guaranteed to be correct. It is not necessary for developers to consider the composition of the increment and the previously released system may cause flaws and errors. We also discuss the approach for ensuring correctness when design modifications are made in an iteration step. Finally, we explore the automatic decomposition of a system into multiple atomic subsystems and present the corresponding algorithm. A case demonstrates these results.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jain:2019:ISS, author = "Hemant Jain and T. S. Raghu and Victoria Yoon and Wei Thoo Yue", title = "Introduction to Special Section Based on Papers Presented at the {Workshop on Information Technology and Systems, 2017}", journal = j-TMIS, volume = "10", number = "2", pages = "6:1--6:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3342557", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3342557", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6e", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Sutterer:2019:TBP, author = "Paul Sutterer and Stefan Waldherr and Martin Bichler", title = "Are Truthful Bidders Paying too Much? {Efficiency} and Revenue in Display Ad Auctions", journal = j-TMIS, volume = "10", number = "2", pages = "6:1--6:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3325523", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3325523", abstract = "Display ad auctions have become the predominant means to allocate user impressions on a website to advertisers. These auctions are conducted in milliseconds online, whenever a user visits a website. The impressions are typically priced via a simple second-price rule. For single-item auctions, this Vickrey payment rule is known to be incentive-compatible. However, it is unclear whether bidders should still bid truthful in an online auction where impressions (or items) arrive dynamically over time and their valuations are not separable, as is the case with campaign targets or budgets. The allocation process might not maximize welfare and the payments can differ substantially from those paid in an offline auction with a Vickrey-Clarke-Groves (VCG) payment rule or also competitive equilibrium prices. We study the properties of the offline problem and model it as a mathematical program. In numerical experiments, we find that the welfare achieved in the online auction process with truthful bidders is high compared to the theoretical worst-case efficiency, but that the bidders pay significantly more on average compared to what they would need to pay in a corresponding offline auction in thin markets with up to four bidders. However, incentives for bid shading in these second-price auctions decrease quickly with additional competition and bidders risk losing.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Han:2019:CTR, author = "Xu Han and Niam Yaraghi and Ram Gopal", title = "Catching Them Red-Handed: Optimizing the Nursing Homes' Rating System", journal = j-TMIS, volume = "10", number = "2", pages = "7:1--7:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3325522", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3325522", abstract = "The Centers for Medicare 8 Medicaid Services (CMS) launched its nursing home rating system in 2008, which has been widely used among patients, doctors, and insurance companies since then. The system rates nursing homes based on a combination of CMS's inspection results and nursing homes' self-reported measures. Prior research has shown that the rating system is subject to inflation in the self-reporting procedure, leading to biased overall ratings. Given the limited resources CMS has, it is important to optimize the inspection process and develop an effective audit process to detect and deter inflation. We first examine if the domain that CMS currently inspects is the best choice in terms of minimizing the population of nursing homes that can inflate and minimizing the difficulty of detecting such inflators. To do this, we formulate the problem mathematically and test the model by using publicly available CMS data on nursing home ratings. We show that CMS's current choice of inspection domain is not optimal if it intends to minimize the number of nursing homes that can inflate their reports, and CMS will be better off if it inspects the staffing domain instead. We also show that CMS's current choice of inspection domain is only optimal had there been an audit system in place to complement it. We then design an audit system for CMS which will be coupled with its current inspection strategy to either minimize the initial budget required to conduct the audits or to maximize the efficiency of the audit process. To design the audit system, we consider nursing homes' reactions to different audit policies, and conduct a detailed simulation study on the optimal audit parameter settings. Our result suggests that CMS should use a moderate audit policy in order to carefully balance the tradeoff between audit net budget and audit efficiency.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kartal:2019:DPV, author = "Hasan B. Kartal and Xiaoping Liu and Xiao-Bai Li", title = "Differential Privacy for the Vast Majority", journal = j-TMIS, volume = "10", number = "2", pages = "8:1--8:??", month = aug, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3329717", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:32:09 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3329717", abstract = "Differential privacy has become one of the widely used mechanisms for protecting sensitive information in databases and information systems. Although differential privacy provides a clear measure of privacy guarantee, it implicitly assumes that each individual corresponds to a single record in the result of a database query. This assumption may not hold in many database query applications. When an individual has multiple records, strict implementation of differential privacy may cause significant information loss. In this study, we extend the differential privacy principle to situations where multiple records in a database are associated with the same individual. We propose a new privacy principle that integrates differential privacy with the Pareto principle in analyzing privacy risk and data utility. When applied to the situations with multiple records per person, the proposed approach can significantly reduce the information loss in the released query results with a relatively small relaxation in the differential privacy guarantee. The effectiveness of the proposed approach is evaluated using three real-world databases.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Pal:2019:REC, author = "Ranjan Pal and Leana Golubchik and Konstantions Psounis and Tathagata Bandyopadhyay", title = "On Robust Estimates of Correlated Risk in Cyber-Insured {IT} Firms: a First Look at Optimal {AI}-Based Estimates under ``Small'' Data", journal = j-TMIS, volume = "10", number = "3", pages = "9:1--9:??", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3351158", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:28:37 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3351158", abstract = "In this article, we comment on the drawbacks of the existing AI-based Bayesian network (BN) cyber-vulnerability analysis (C-VA) model proposed in Mukhopadhyay et al. (2013) to assess cyber-risk in IT firms, where this quantity is usually a joint distribution of multiple risk (random) variables (e.g., quality of antivirus, frequency of monitoring, etc.) coming from heterogeneous distribution families. As a major modeling drawback, Mukhopadhyay et al. (2013) assume that any pair of random variables in the BN are linearly correlated with each other. This simplistic assumption might not always hold true for general IT organizational environments. Thus, the use of the C-VA model in general will result in loose estimates of correlated IT risk and will subsequently affect cyber-insurance companies in framing profitable coverage policies for IT organizations. To this end, we propose methods to (1) find a closed-form expression for the maximal correlation arising between pairs of discrete random variables, whose value finds importance in getting robust estimates of copula-induced computations of organizational cyber-risk, and (2) arrive at a computationally effective mechanism to compute nonlinear correlations among pairs of discrete random variables in the correlation matrix of the CBBN model (Mukhopadhyay et al. 2013). We also prove that an empirical computation of MC using our method converges rapidly, that is, exponentially fast, to the true correlation value in the number of samples. Our proposed method contributes to a tighter estimate of IT cyber-risk under environments of low-risk data availability and will enable insurers to better assess organizational risks and subsequently underwrite profitable cyber-insurance policies.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Zo:2019:SOA, author = "Hangjung Zo and Derek L. Nazareth and Hemant K. Jain", title = "Service-oriented Application Composition with Evolutionary Heuristics and Multiple Criteria", journal = j-TMIS, volume = "10", number = "3", pages = "10:1--10:??", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3354288", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:28:37 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3354288", abstract = "The need to create and deploy business application systems rapidly has sparked interest in using web services to compose them. When creating mission-critical business applications through web service compositions, in addition to ensuring that functional requirements are met, designers need to consider the end-to-end reliability, security, performance, and overall cost of the application. As the number of available coarse-grain business services grows, the problem of selecting appropriate services quickly becomes combinatorially explosive for realistic-sized business applications. This article develops a business-process-driven approach for composing service-oriented applications. We use a combination of weights to explore the entire QoS criteria landscape through the use of a multi-criteria genetic algorithm (GA) to identify a Pareto-optimal multidimensional frontier that permits managers to trade off conflicting objectives when selecting a set of services. We illustrate the effectiveness of the approach by applying it to a real-world drop-ship business application and compare its performance to another GA-based approach for service composition.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Lai:2019:TVK, author = "Jianwei Lai and Dongsong Zhang and Sen Wang and Isil Doga Yakut Kilic and Lina Zhou", title = "{ThumbStroke}: a Virtual Keyboard in Support of Sight-Free and One-Handed Text Entry on Touchscreen Mobile Devices", journal = j-TMIS, volume = "10", number = "3", pages = "11:1--11:??", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3343858", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:28:37 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3343858", abstract = "The QWERTY keyboard on mobile devices usually requires users' full visual attention and both hands, which is not always possible. We propose a thumb-stroke-based keyboard, ThumbStroke, to support both sight-free and one-handed text entry. Text entry via ThumbStroke completely relies on the directions of thumb strokes at any place on the screen of a mobile device. It does not require physical press on any specific keys, thus eliminating the need for visual attention and reducing errors due to tiny key size, fat thumbs, limited thumb reachability, and visual occlusion. We empirically evaluated ThumbStroke through a 20-session longitudinal controlled lab experiment. ThumbStroke shows advantages in typing accuracy and user perceptions in comparison to the Escape and QWERTY keyboards and results in faster typing speed than QWERTY in sight-free and one-handed text entry. This study provides novel research contributions to mobile HCI, advancing the design of soft keyboards for one-handed interaction with mobile devices and mobile accessibility.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Kang:2019:HAO, author = "Yin Kang and Lina Zhou", title = "Helpfulness Assessment of Online Reviews: The Role of Semantic Hierarchy of Product Features", journal = j-TMIS, volume = "10", number = "3", pages = "12:1--12:??", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3365538", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 29 07:28:37 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3365538", abstract = "Effective use of online consumer reviews is hampered by uncertainty about their helpfulness. Despite a growing body of knowledge on indicators of review helpfulness, previous studies have overlooked rich semantic information embedded in review content. Following design science principles, this study introduces a semantic hierarchy of product features by probing the review text. Using the hierarchical framework as a guide, we develop a research model of review helpfulness assessment. In the model, we propose and conceptualize three new factors-breadth, depth, and redundancy, by building on and/or extending product uncertainty, information quality, signaling, and encoding variability theories. The model-testing results lend strong support to the proposed effects of those factors on review helpfulness. They also reveal interesting differences in the effects of redundancy and readability between different types of products. This study embodies knowledge moments of multiple genres of inquiry in design science research, which have multifold research and practical implications.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Park:2019:ECR, author = "Jiyong Park and Daegon Cho and Jae Kyu Lee and Byungtae Lee", title = "The Economics of Cybercrime: The Role of Broadband and Socioeconomic Status", journal = j-TMIS, volume = "10", number = "4", pages = "13:1--13:??", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3351159", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Dec 20 07:16:04 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3351159", abstract = "Under what conditions is the Internet more likely to be used maliciously for criminal activity? This study examines the conditions under which the Internet is associated with cybercriminal offenses. Using comprehensive state-level data in the United States during 2004--2010, our findings show that there is no clear empirical evidence that the Internet penetration rate is related to the number of Internet crime perpetrators; however, cybercriminal activities are contingent upon socioeconomic factors and connection speed. Specifically, a higher income, more education, a lower poverty rate, and a higher inequality are likely to make the Internet penetration be more positively related with cybercrime perpetrators, which are indeed different from the conditions of terrestrial crime in the real world. In addition, as opposed to narrowband, the broadband connections are significantly and positively associated with the number of Internet crime perpetrators, and it amplifies the aforementioned moderating effects of socioeconomic status on Internet crime offenses. Taken together, cybercrime requires more than just a skilled perpetrator, and it requires an infrastructure to facilitate profiteering from the act.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chung:2019:IMD, author = "Wingyan Chung and Bingbing Rao and Liqiang Wang", title = "Interaction Models for Detecting Nodal Activities in Temporal Social Media Networks", journal = j-TMIS, volume = "10", number = "4", pages = "14:1--14:??", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3365537", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Dec 20 07:16:04 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3365537", abstract = "Detecting nodal activities in dynamic social networks has strategic importance in many applications, such as online marketing campaigns and homeland security surveillance. How peer-to-peer exchanges in social media can facilitate nodal activity detection is not well explored. Existing models assume network nodes to be static in time and do not adequately consider features from social theories. This research developed and validated two theory-based models, Random Interaction Model (RIM) and Preferential Interaction Model (PIM), to characterize temporal nodal activities in social media networks of human agents. The models capture the network characteristics of randomness and preferential interaction due to community size, human bias, declining connection cost, and rising reachability. The models were compared against three benchmark models (abbreviated as EAM, TAM, and DBMM) using a social media community consisting of 790,462 users who posted over 3,286,473 tweets and formed more than 3,055,797 links during 2013-2015. The experimental results show that both RIM and PIM outperformed EAM and TAM significantly in accuracy across different dates and time windows. Both PIM and RIM scored significantly smaller errors than DBMM did. Structural properties of social networks were found to provide a simple and yet accurate approach to predicting model performances. These results indicate the models' strong capability of accounting for user interactions in real-world social media networks and temporal activity detection. The research should provide new approaches for temporal network activity detection, develop relevant new measures, and report new findings from large social media datasets.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Chen:2019:ESC, author = "Jiawei Chen and Hongyan Liu and Yinghui (Catherine) Yang and Jun He", title = "Effective Selection of a Compact and High-Quality Review Set with Information Preservation", journal = j-TMIS, volume = "10", number = "4", pages = "15:1--15:??", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3369395", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Dec 20 07:16:04 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3369395", abstract = "Consumers increasingly make informed buying decisions based on reading online reviews for products and services. Due to the large volume of available online reviews, consumers hardly have the time and patience to read them all. This article aims to select a compact set of high-quality reviews that can cover a specific set of product features and related consumer sentiments. Selecting such a subset of reviews can significantly save the time spent on reading reviews while preserving the information needed. A unique review selection problem is defined and modeled as a bi-objective combinatorial optimization problem, which is then transformed into a minimum-cost set cover problem that is NP-complete. Several approximation algorithms are then designed, which can sustain performance guarantees in polynomial time. Our effective selection algorithms can also be upgraded to handle dynamic situations. Comprehensive experiments conducted on twelve real datasets demonstrate that the proposed algorithms significantly outperform benchmark methods by generating a more compact review set with much lower computational cost. The number of reviews selected is much smaller compared to the quantity of all available reviews, and the selection efficiency is deeply increased by accelerating strategies, making it very practical to adopt the methods in real-world online applications.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Jannach:2019:MBV, author = "Dietmar Jannach and Michael Jugovac", title = "Measuring the Business Value of Recommender Systems", journal = j-TMIS, volume = "10", number = "4", pages = "16:1--16:??", month = dec, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1145/3370082", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Dec 20 07:16:04 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/ft_gateway.cfm?id=3370082", abstract = "Recommender Systems are nowadays successfully used by all major web sites-from e-commerce to social media-to filter content and make suggestions in a personalized way. Academic research largely focuses on the value of recommenders for consumers, e.g., in terms of reduced information overload. To what extent and in which ways recommender systems create business value is, however, much less clear, and the literature on the topic is scattered. In this research commentary, we review existing publications on field tests of recommender systems and report which business-related performance measures were used in such real-world deployments. We summarize common challenges of measuring the business value in practice and critically discuss the value of algorithmic improvements and offline experiments as commonly done in academic environments. Overall, our review indicates that various open questions remain both regarding the realistic quantification of the business effects of recommenders and the performance assessment of recommendation algorithms in academia.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J1320", } @Article{Li:2020:IIE, author = "Hongfei Li and Ramesh Shankar and Jan Stallaert", title = "Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities", journal = j-TMIS, volume = "11", number = "1", pages = "1:1--1:26", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3371388", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 21 08:19:23 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3371388", abstract = "Online communities that curate knowledge critically depend on high-quality contributions from anonymous expert users. Understanding users' motivation to contribute knowledge helps practitioners design such websites for optimal user contribution and user \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Rezvani:2020:RRS, author = "Mohsen Rezvani and Mojtaba Rezvani", title = "A Randomized Reputation System in the Presence of Unfair Ratings", journal = j-TMIS, volume = "11", number = "1", pages = "2:1--2:16", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3384472", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 21 08:19:23 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3384472", abstract = "With the increasing popularity of online shopping markets, a significant number of consumers rely on these venues to meet their demands while choosing different products based on the ratings provided by others. Simultaneously, consumers feel confident \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ni:2020:MLD, author = "Li Ni and Wenjian Luo and Nannan Lu and Wenjie Zhu", title = "Mining the Local Dependency Itemset in a Products Network", journal = j-TMIS, volume = "11", number = "1", pages = "3:1--3:31", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3384473", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 21 08:19:23 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3384473", abstract = "Many studies have been conducted on market basket analysis such as association rules and dependent patterns. These studies mainly focus on mining all significant patterns or patterns directly associated with a given item in a dataset. The problem that \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pierazzi:2020:DDC, author = "Fabio Pierazzi and Ghita Mezzour and Qian Han and Michele Colajanni and V. S. Subrahmanian", title = "A Data-driven Characterization of Modern {Android} Spyware", journal = j-TMIS, volume = "11", number = "1", pages = "4:1--4:38", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3382158", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Apr 21 08:19:23 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3382158", abstract = "According to Nokia's 2017 Threat Intelligence Report, 68.5\% of malware targets the Android platform; Windows is second with 28\%, followed by iOS and other platforms with 3.5\%. The Android spyware family UAPUSH was responsible for the most infections, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pal:2020:WCB, author = "Ranjan Pal and Konstantinos Psounis and Jon Crowcroft and Frank Kelly and Pan Hui and Sasu Tarkoma and Abhishek Kumar and John Kelly and Aritra Chatterjee and Leana Golubchik and Nishanth Sastry and Bodhibrata Nag", title = "When Are Cyber Blackouts in Modern Service Networks Likely?: a Network Oblivious Theory on Cyber (Re)Insurance Feasibility", journal = j-TMIS, volume = "11", number = "2", pages = "5:1--5:38", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3386159", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 10 09:12:15 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3386159", abstract = "Service liability interconnections among globally networked IT- and IoT-driven service organizations create potential channels for cascading service disruptions worth billions of dollars, due to modern cyber-crimes such as DDoS, APT, and ransomware \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ermakova:2020:SPR, author = "Tatiana Ermakova and Benjamin Fabian and Marta Kornacka and Scott Thiebes and Ali Sunyaev", title = "Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective", journal = j-TMIS, volume = "11", number = "2", pages = "6:1--6:29", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3386160", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 10 09:12:15 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3386160", abstract = "Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients' concerns for security and privacy of their sensitive medical records. These \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lu:2020:AAW, author = "Haibing Lu and Xi Chen and Junmin Shi and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong and Wei Huang", title = "Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization", journal = j-TMIS, volume = "11", number = "2", pages = "7:1--7:33", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3386599", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 10 09:12:15 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3386599", abstract = "Many applications use data that are better represented in the binary matrix form, such as click-stream data, market basket data, document-term data, user-permission data in access control, and others. Matrix factorization methods have been widely used \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Unger:2020:CAR, author = "Moshe Unger and Alexander Tuzhilin and Amit Livne", title = "Context-Aware Recommendations Based on Deep Learning Frameworks", journal = j-TMIS, volume = "11", number = "2", pages = "8:1--8:15", month = jul, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3386243", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jul 10 09:12:15 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/abs/10.1145/3386243", abstract = "In this article, we suggest a novel deep learning recommendation framework that incorporates contextual information into neural collaborative filtering recommendation approaches. Since context is often represented by dynamic and high-dimensional feature \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Dutta:2020:IWS, author = "Kaushik Dutta and Xiao Fang and Zhengrui (Jeffrey) Jiang", title = "Introduction to {WITS 2018} Special Issue in {TMIS}", journal = j-TMIS, volume = "11", number = "3", pages = "9:1--9:2", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3404392", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3404392", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Gopal:2020:RIU, author = "Ram D. Gopal and Hooman Hidaji and Sule Nur Kutlu and Raymond A. Patterson and Erik Rolland and Dmitry Zhdanov", title = "Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships", journal = j-TMIS, volume = "11", number = "3", pages = "10:1--10:20", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3382188", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3382188", abstract = "Untrustworthy content such as fake news and clickbait have become a pervasive problem on the Internet, causing significant socio-political problems around the world. Identifying untrustworthy content is a crucial step in countering them. The current \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Tan:2020:CPC, author = "Liling Tan and Maggie Yundi Li and Stanley Kok", title = "E-Commerce Product Categorization via Machine Translation", journal = j-TMIS, volume = "11", number = "3", pages = "11:1--11:14", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3382189", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3382189", abstract = "E-commerce platforms categorize their products into a multi-level taxonomy tree with thousands of leaf categories. Conventional methods for product categorization are typically based on machine learning classification algorithms. These algorithms take \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wang:2020:PUP, author = "Xiangyu Wang and Kang Zhao and Xun Zhou and Nick Street", title = "Predicting User Posting Activities in Online Health Communities with Deep Learning", journal = j-TMIS, volume = "11", number = "3", pages = "12:1--12:15", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3383780", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3383780", abstract = "Online health communities (OHCs) represent a great source of social support for patients and their caregivers. Better predictions of user activities in OHCs can help improve user engagement and retention, which are important to manage and sustain a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Tao:2020:WSW, author = "Jie Tao and Lina Zhou", title = "A Weakly Supervised {WordNet-Guided} Deep Learning Approach to Extracting Aspect Terms from Online Reviews", journal = j-TMIS, volume = "11", number = "3", pages = "13:1--13:22", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3399630", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3399630", abstract = "The unstructured nature of online reviews makes it inefficient and inconvenient for prospective consumers to research and use in support of purchase decision making. The aspects of products provide a fine-grained meaningful perspective for understanding \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Gan:2020:UDM, author = "Wensheng Gan and Jerry Chun-Wei Lin and Han-Chieh Chao and Philippe Fournier-Viger and Xuan Wang and Philip S. Yu", title = "Utility-Driven Mining of Trend Information for Intelligent System", journal = j-TMIS, volume = "11", number = "3", pages = "14:1--14:28", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3391251", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3391251", abstract = "Useful knowledge, embedded in a database, is likely to change over time. Identifying the recent changes in temporal data can provide valuable up-to-date information to decision makers. Nevertheless, techniques for mining high-utility patterns (HUPs) \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sreenu:2020:CPP, author = "Nenavath Sreenu", title = "Cashless Payment Policy and Its Effects on Economic Growth of {India}: an Exploratory Study", journal = j-TMIS, volume = "11", number = "3", pages = "15:1--15:10", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3391402", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3391402", abstract = "The present world has moved from cash transactions to cashless transactions. This article examines the impact of implementation of a cashless payment policy on economic development and gradual transition to a cashless economy in India. For this study, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Belhadi:2020:TOD, author = "Asma Belhadi and Youcef Djenouri and Jerry Chun-Wei Lin and Alberto Cano", title = "Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges", journal = j-TMIS, volume = "11", number = "3", pages = "16:1--16:29", month = aug, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3399631", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 19 07:07:56 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3399631", abstract = "Detecting abnormal trajectories is an important task in research and industrial applications, which has attracted considerable attention in recent decades. This work studies the existing trajectory outlier detection algorithms in different industrial \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Samtani:2020:TAI, author = "Sagar Samtani and Murat Kantarcioglu and Hsinchun Chen", title = "Trailblazing the Artificial Intelligence for Cybersecurity Discipline: a Multi-Disciplinary Research Roadmap", journal = j-TMIS, volume = "11", number = "4", pages = "17:1--17:19", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3430360", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3430360", abstract = "Cybersecurity has rapidly emerged as a grand societal challenge of the 21st century. Innovative solutions to proactively tackle emerging cybersecurity challenges are essential to ensuring a safe and secure society. Artificial Intelligence (AI) has \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Mudgerikar:2020:EBI, author = "Anand Mudgerikar and Puneet Sharma and Elisa Bertino", title = "Edge-Based Intrusion Detection for {IoT} devices", journal = j-TMIS, volume = "11", number = "4", pages = "18:1--18:21", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3382159", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3382159", abstract = "As the Internet of Things (IoT) is estimated to grow to 25 billion by 2021, there is a need for an effective and efficient Intrusion Detection System (IDS) for IoT devices. Traditional network-based IDSs are unable to efficiently detect IoT malware and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Husak:2020:PCS, author = "Martin Hus{\'a}k and Tom{\'a}s Bajtos and Jaroslav Kaspar and Elias Bou-Harb and Pavel Celeda", title = "Predictive Cyber Situational Awareness and Personalized Blacklisting: a Sequential Rule Mining Approach", journal = j-TMIS, volume = "11", number = "4", pages = "19:1--19:16", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3386250", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3386250", abstract = "Cybersecurity adopts data mining for its ability to extract concealed and indistinct patterns in the data, such as for the needs of alert correlation. Inferring common attack patterns and rules from the alerts helps in understanding the threat landscape \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Alagheband:2020:TBG, author = "Mahdi R. Alagheband and Atefeh Mashatan and Morteza Zihayat", title = "Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media", journal = j-TMIS, volume = "11", number = "4", pages = "20:1--20:20", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3389684", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3389684", abstract = "This study analyzes cybersecurity trends and proposes a conceptual framework to identify cybersecurity topics of social interest and emerging topics that need to be addressed by researchers in the field. The insights drawn from this framework allow for \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Mangino:2020:ISI, author = "Antonio Mangino and Morteza Safaei Pour and Elias Bou-Harb", title = "{Internet}-scale Insecurity of Consumer {Internet of Things}: an Empirical Measurements Perspective", journal = j-TMIS, volume = "11", number = "4", pages = "21:1--21:24", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3394504", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3394504", abstract = "The number of Internet-of-Things (IoT) devices actively communicating across the Internet is continually increasing, as these devices are deployed across a variety of sectors, constantly transferring private data across the Internet. Due to the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sweet:2020:VVC, author = "Christopher Sweet and Stephen Moskal and Shanchieh Jay Yang", title = "On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks", journal = j-TMIS, volume = "11", number = "4", pages = "22:1--22:21", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3394503", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3394503", abstract = "Many cyber attack actions can be observed, but the observables often exhibit intricate feature dependencies, non-homogeneity, and potentially rare yet critical samples. This work tests the ability to learn, model, and synthesize cyber intrusion alerts \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Mehrotra:2020:PPD, author = "Sharad Mehrotra and Shantanu Sharma and Jeffrey D. Ullman and Dhrubajyoti Ghosh and Peeyush Gupta and Anurag Mishra", title = "{PANDA}: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data", journal = j-TMIS, volume = "11", number = "4", pages = "23:1--23:41", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3397521", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3397521", abstract = "Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This article continues along with the emerging trend in secure data processing that recognizes that the entire dataset may \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Shao:2020:EEA, author = "Sicong Shao and Cihan Tunc and Amany Al-Shawi and Salim Hariri", title = "An Ensemble of Ensembles Approach to Author Attribution for {Internet} Relay Chat Forensics", journal = j-TMIS, volume = "11", number = "4", pages = "24:1--24:25", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3409455", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3409455", abstract = "With the advances in Internet technologies and services, social media has been gained extreme popularity, especially because these technologies provide potential anonymity, which in turn harbors hacker discussion forums, underground markets, dark web, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kesan:2020:ACI, author = "Jay P. Kesan and Linfeng Zhang", title = "Analysis of Cyber Incident Categories Based on Losses", journal = j-TMIS, volume = "11", number = "4", pages = "25:1--25:28", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3418288", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3418288", abstract = "The fact that ``cyber risk'' is indeed a collective term for various distinct risks creates great difficulty in communications. For example, policyholders of ``cyber insurance'' contracts often have a limited or inaccurate understanding about the coverage \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sainani:2020:IRS, author = "Henanksha Sainani and Josephine M. Namayanja and Guneeti Sharma and Vasundhara Misal and Vandana P. Janeja", title = "{IP} Reputation Scoring with Geo-Contextual Feature Augmentation", journal = j-TMIS, volume = "11", number = "4", pages = "26:1--26:29", month = dec, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1145/3419373", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:57 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3419373", abstract = "The focus of this article is to present an effective anomaly detection model for an encrypted network session by developing a novel IP reputation scoring model that labels the incoming session IP address based on the most similar IP addresses in terms \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Samtani:2021:MDP, author = "Sagar Samtani and Murat Kantarcioglu and Hsinchun Chen", title = "A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems", journal = j-TMIS, volume = "12", number = "1", pages = "1:1--1:18", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3447507", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3447507", abstract = "Events such as Facebook-Cambridge Analytica scandal and data aggregation efforts by technology providers have illustrated how fragile modern society is to privacy violations. Internationally recognized entities such as the National Science Foundation \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zaeem:2021:EGP, author = "Razieh Nokhbeh Zaeem and K. Suzanne Barber", title = "The Effect of the {GDPR} on Privacy Policies: Recent Progress and Future Promise", journal = j-TMIS, volume = "12", number = "1", pages = "2:1--2:20", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3389685", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3389685", abstract = "The General Data Protection Regulation (GDPR) is considered by some to be the most important change in data privacy regulation in 20 years. Effective May 2018, the European Union GDPR privacy law applies to any organization that collects and processes \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sudhakar:2021:DLM, author = "Tanuja Sudhakar and Marina Gavrilova", title = "Deep Learning for Multi-instance Biometric Privacy", journal = j-TMIS, volume = "12", number = "1", pages = "3:1--3:23", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3389683", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3389683", abstract = "The fundamental goal of a revocable biometric system is to defend a user's biometrics from being compromised. This research explores the application of deep learning or Convolutional Neural Networks to multi-instance biometrics. Modality features are \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kul:2021:ACI, author = "G{\"o}khan Kul and Shambhu Upadhyaya and Andrew Hughes", title = "An Analysis of Complexity of Insider Attacks to Databases", journal = j-TMIS, volume = "12", number = "1", pages = "4:1--4:18", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3391231", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3391231", abstract = "Insider attacks are one of the most dangerous threats to an organization. Unfortunately, they are very difficult to foresee, detect, and defend against due to the trust and responsibilities placed on the employees. In this article, we first define the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ranathunga:2021:MRM, author = "Dinesha Ranathunga and Matthew Roughan and Hung Nguyen", title = "Mathematical Reconciliation of Medical Privacy Policies", journal = j-TMIS, volume = "12", number = "1", pages = "5:1--5:18", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3397520", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3397520", abstract = "Healthcare data are arguably the most private of personal data. This very private information in the wrong hands can lead to identity theft, prescription fraud, insurance fraud, and an array of other crimes. Electronic-health systems such as My Health Record in Australia holds great promise in sharing medical data and improving healthcare quality. But, a key privacy issue in these systems is the misuse of healthcare data by authorities. The recent General Data Protection Regulation (GDPR) introduced in the EU aims to reduce personal-data misuse. But, there are no tools currently available to accurately reconcile a domestic E-health policy against the GDPR to identify discrepancies. Reconciling privacy policies is also non-trivial, because policies are often written in free text, making them subject to human interpretation.\par In this article, we propose a tool that allows the description of E-health privacy policies, represents them using formal constructs making the policies precise and explicit. Using this formal framework, our tool can automatically reconcile a domestic E-health policy against the GDPR to identify violations and omissions. We use our prototype to illustrate several critical flaws in Australia's My Health Record policy, including a non-compliance with GDPR that allows healthcare providers to access medical records by default.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Roy:2021:OER, author = "Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri", title = "Optimal Employee Recruitment in Organizations under Attribute-Based Access Control", journal = j-TMIS, volume = "12", number = "1", pages = "6:1--6:24", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3403950", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3403950", abstract = "For any successful business endeavor, recruitment of a required number of appropriately qualified employees in proper positions is a key requirement. For effective utilization of human resources, reorganization of such workforce assignment is also a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Akanfe:2021:DIF, author = "Oluwafemi Akanfe and Rohit Valecha and H. Raghav Rao", title = "Design of an Inclusive Financial Privacy Index {(INF-PIE)}: a Financial Privacy and Digital Financial Inclusion Perspective", journal = j-TMIS, volume = "12", number = "1", pages = "7:1--7:21", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3403949", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3403949", abstract = "Financial privacy is an important part of an individual's privacy, but efforts to enhance financial privacy have often not been given enough prominence by some countries when advancing financial inclusion. This impedes under-served communities from \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Alkhodair:2021:DHE, author = "Sarah A. Alkhodair and Benjamin C. M. Fung and Steven H. H. Ding and William K. Cheung and Shih-Chia Huang", title = "Detecting High-Engaging Breaking News Rumors in Social Media", journal = j-TMIS, volume = "12", number = "1", pages = "8:1--8:16", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3416703", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3416703", abstract = "Users from all over the world increasingly adopt social media for newsgathering, especially during breaking news. Breaking news is an unexpected event that is currently developing. Early stages of breaking news are usually associated with lots of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Benedetto:2021:EIC, author = "Francesco Benedetto and Loretta Mastroeni and Pierluigi Vellucci", title = "Extraction of Information Content Exchange in Financial Markets by an Entropy Analysis", journal = j-TMIS, volume = "12", number = "1", pages = "9:1--9:16", month = mar, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3419372", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Mar 20 18:13:58 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3419372", abstract = "Recently, there has been an explosive interest in the literature about modeling and forecasting volatility in financial markets. Many researches have focused on energy markets and oil volatility index (OVX). In this article, we aim first at showing if \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ng:2021:LSM, author = "Ka Chung Ng and Mike K. P. So and Kar Yan Tam", title = "A Latent Space Modeling Approach to Interfirm Relationship Analysis", journal = j-TMIS, volume = "12", number = "2", pages = "10:1--10:44", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3424240", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3424240", abstract = "Interfirm relationships are crucial to our understanding of firms' collective and interactive behavior. Many information systems-related phenomena, including the diffusion of innovations, standard alliances, technology collaboration, and outsourcing, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Onumo:2021:AME, author = "Aristotle Onumo and Irfan Ullah-Awan and Andrea Cullen", title = "Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures", journal = j-TMIS, volume = "12", number = "2", pages = "11:1--11:29", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3424282", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3424282", abstract = "The increase in cybersecurity threats and the challenges for organisations to protect their information technology assets has made adherence to organisational security control processes and procedures a critical issue that needs to be adequately \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Belhadi:2021:MLI, author = "Asma Belhadi and Youcef Djenouri and Djamel Djenouri and Tomasz Michalak and Jerry Chun-Wei Lin", title = "Machine Learning for Identifying Group Trajectory Outliers", journal = j-TMIS, volume = "12", number = "2", pages = "12:1--12:25", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3430195", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3430195", abstract = "Prior works on the trajectory outlier detection problem solely consider individual outliers. However, in real-world scenarios, trajectory outliers can often appear in groups, e.g., a group of bikes that deviates to the usual trajectory due to the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Abdibayev:2021:UWE, author = "Almas Abdibayev and Dongkai Chen and Haipeng Chen and Deepti Poluru and V. S. Subrahmanian", title = "Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents", journal = j-TMIS, volume = "12", number = "2", pages = "13:1--13:22", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3418289", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3418289", abstract = "Theft of intellectual property is a growing problem-one that is exacerbated by the fact that a successful compromise of an enterprise might only become known months after the hack. A recent solution called FORGE addresses this problem by automatically \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Xue:2021:OOA, author = "Xingsi Xue and Xiaojing Wu and Junfeng Chen", title = "Optimizing Ontology Alignment Through an Interactive Compact Genetic Algorithm", journal = j-TMIS, volume = "12", number = "2", pages = "14:1--14:17", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3439772", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3439772", abstract = "Ontology provides a shared vocabulary of a domain by formally representing the meaning of its concepts, the properties they possess, and the relations among them, which is the state-of-the-art knowledge modeling technique. However, the ontologies in the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Djenouri:2021:EDS, author = "Youcef Djenouri and Jerry Chun-Wei Lin and Kjetil N{\o}rv{\aa}g and Heri Ramampiaro and Philip S. Yu", title = "Exploring Decomposition for Solving Pattern Mining Problems", journal = j-TMIS, volume = "12", number = "2", pages = "15:1--15:36", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3439771", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3439771", abstract = "This article introduces a highly efficient pattern mining technique called Clustering-based Pattern Mining (CBPM). This technique discovers relevant patterns by studying the correlation between transactions in the transaction database based on \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Teng:2021:ENF, author = "Mingfei Teng and Hengshu Zhu and Chuanren Liu and Hui Xiong", title = "Exploiting Network Fusion for Organizational Turnover Prediction", journal = j-TMIS, volume = "12", number = "2", pages = "16:1--16:18", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3439770", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3439770", abstract = "As an emerging measure of proactive talent management, talent turnover prediction is critically important for companies to attract, engage, and retain talents in order to prevent the loss of intellectual capital. While tremendous efforts have been made \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pal:2021:WCC, author = "Ranjan Pal and Ziyuan Huang and Sergey Lototsky and Xinlong Yin and Mingyan Liu and Jon Crowcroft and Nishanth Sastry and Swades De and Bodhibrata Nag", title = "Will Catastrophic Cyber-Risk Aggregation Thrive in the {IoT} Age? {A} Cautionary Economics Tale for (Re-)Insurers and Likes", journal = j-TMIS, volume = "12", number = "2", pages = "17:1--17:36", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3446635", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sun Jun 27 07:39:07 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3446635", abstract = "Service liability interconnections among networked IT and IoT-driven service organizations create potential channels for cascading service disruptions due to modern cybercrimes such as DDoS, APT, and ransomware attacks. These attacks are known to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Nakashima:2021:AFS, author = "Makiya Nakashima and Alex Sim and Youngsoo Kim and Jonghyun Kim and Jinoh Kim", title = "Automated Feature Selection for Anomaly Detection in Network Traffic Data", journal = j-TMIS, volume = "12", number = "3", pages = "18:1--18:28", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3446636", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3446636", abstract = "Variable selection (also known as feature selection ) is essential to optimize the learning complexity by prioritizing features, particularly for a massive, high-dimensional dataset like network traffic data. In reality, however, it is not an easy task to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Qiu:2021:MDP, author = "Lin Qiu and Sruthi Gorantla and Vaibhav Rajan and Bernard C. Y. Tan", title = "Multi-disease Predictive Analytics: a Clinical Knowledge-aware Approach", journal = j-TMIS, volume = "12", number = "3", pages = "19:1--19:34", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3447942", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3447942", abstract = "Multi-Disease Predictive Analytics (MDPA) models simultaneously predict the risks of multiple diseases in patients and are valuable in early diagnoses. Patients tend to have multiple diseases simultaneously or develop multiple complications over time, and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Leng:2021:LIC, author = "Yan Leng and Jinhua Zhao and Haris Koutsopoulos", title = "Leveraging Individual and Collective Regularity to Profile and Segment User Locations from Mobile Phone Data", journal = j-TMIS, volume = "12", number = "3", pages = "20:1--20:22", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3449042", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3449042", abstract = "The dynamic monitoring of home and workplace distribution is a fundamental building block for improving location-based service systems in fast-developing cities worldwide. Inferring these places is challenging; existing approaches rely on labor-intensive \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wang:2021:GCN, author = "Xi Wang and Yibo Chai and Hui Li and Wenbin Wang and Weishan Sun", title = "Graph Convolutional Network-based Model for Incident-related Congestion Prediction: a Case Study of {Shanghai} Expressways", journal = j-TMIS, volume = "12", number = "3", pages = "21:1--21:22", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3451356", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3451356", abstract = "Traffic congestion has become a significant obstacle to the development of mega cities in China. Although local governments have used many resources in constructing road infrastructure, it is still insufficient for the increasing traffic demands. As a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Huang:2021:EEM, author = "Peng Huang and Henry C. Lucas", title = "Early Exploration of {MOOCs} in the {U.S}. Higher Education: an Absorptive Capacity Perspective", journal = j-TMIS, volume = "12", number = "3", pages = "22:1--22:28", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3456295", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3456295", abstract = "Advanced information technologies have enabled Massive Open Online Courses (MOOCs), which have the potential to transform higher education around the world. Why are some institutions eager to embrace this technology-enabled model of teaching, while others \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Parameshwarappa:2021:ADA, author = "Pooja Parameshwarappa and Zhiyuan Chen and G{\"u}nes Koru", title = "Anonymization of Daily Activity Data by Using $l$-diversity Privacy Model", journal = j-TMIS, volume = "12", number = "3", pages = "23:1--23:21", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3456876", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3456876", abstract = "In the age of IoT, collection of activity data has become ubiquitous. Publishing activity data can be quite useful for various purposes such as estimating the level of assistance required by older adults and facilitating early diagnosis and treatment of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Xie:2021:WLP, author = "Jiaheng Xie and Bin Zhang and Susan Brown and Daniel Zeng", title = "Write Like a Pro or an Amateur? {Effect} of Medical Language Formality", journal = j-TMIS, volume = "12", number = "3", pages = "24:1--24:25", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3458752", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3458752", abstract = "Past years have seen rising engagement among caregivers in online health communities. Although studies indicate that this caregiver-generated online health information benefits patients, how such information can be perceived easily and correctly remains \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Edla:2021:EDL, author = "Damodar Reddy Edla and Shubham Dodia and Annushree Bablani and Venkatanareshbabu Kuppili", title = "An Efficient Deep Learning Paradigm for Deceit Identification Test on {EEG} Signals", journal = j-TMIS, volume = "12", number = "3", pages = "25:1--25:20", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3458791", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3458791", abstract = "Brain-Computer Interface is the collaboration of the human brain and a device that controls the actions of a human using brain signals. Applications of brain-computer interface vary from the field of entertainment to medical. In this article, a novel \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wang:2021:ABB, author = "Qin Wang and Shiping Chen and Yang Xiang", title = "Anonymous Blockchain-based System for Consortium", journal = j-TMIS, volume = "12", number = "3", pages = "26:1--26:25", month = jul, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3459087", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jul 22 08:13:40 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3459087", abstract = "Blockchain records transactions with various protection techniques against tampering. To meet the requirements on cooperation and anonymity of companies and organizations, researchers have developed a few solutions. Ring signature-based schemes allow multiple participants cooperatively to manage while preserving their individuals' privacy. However, the solutions cannot work properly due to the increased computing complexity along with the expanded group size. In this article, we propose a Multi-center Anonymous Blockchain-based (MAB) system, with joint management for the consortium and privacy protection for the participants. To achieve that, we formalize the syntax used by the MAB system and present a general construction based on a modular design. By applying cryptographic primitives to each module, we instantiate our scheme with anonymity and decentralization. Furthermore, we carry out a comprehensive formal analysis of our exemplified scheme. A proof of concept simulation is provided to show the feasibility. The results demonstrate security and efficiency from both theoretical perspectives and practical perspectives.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhao:2021:ISS, author = "Kang Zhao and Qingpeng Zhang and Sean H. Y. Yuan and Kelvin Kam-Fai Tsoi", title = "Introduction to the Special Section on Using {AI} and Data Science to Handle Pandemics and Related Disruptions", journal = j-TMIS, volume = "12", number = "4", pages = "27:1--27:2", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3486969", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3486969", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "27", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Avetisian:2021:CSR, author = "Manvel Avetisian and Ilya Burenko and Konstantin Egorov and Vladimir Kokh and Aleksandr Nesterov and Aleksandr Nikolaev and Alexander Ponomarchuk and Elena Sokolova and Alex Tuzhilin and Dmitry Umerenkov", title = "{CoRSAI}: a System for Robust Interpretation of {CT} Scans of {COVID-19} Patients Using Deep Learning", journal = j-TMIS, volume = "12", number = "4", pages = "28:1--28:16", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3467471", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3467471", abstract = "Analysis of chest CT scans can be used in detecting parts of lungs that are affected by infectious diseases such as COVID-19. Determining the volume of lungs affected by lesions is essential for formulating treatment recommendations and prioritizing \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "28", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zokaeinikoo:2021:AIA, author = "Maryam Zokaeinikoo and Pooyan Kazemian and Prasenjit Mitra and Soundar Kumara", title = "{AIDCOV}: an Interpretable Artificial Intelligence Model for Detection of {COVID-19} from Chest Radiography Images", journal = j-TMIS, volume = "12", number = "4", pages = "29:1--29:20", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3466690", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3466690", abstract = "As the Coronavirus Disease 2019 (COVID-19) pandemic continues to grow globally, testing to detect COVID-19 and isolating individuals who test positive remains the primary strategy for preventing community spread of the disease. Therefore, automatic and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "29", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Liang:2021:USM, author = "Guanqing Liang and Jingxin Zhao and Helena Yan Ping Lau and Cane Wing-Ki Leung", title = "Using Social Media to Analyze Public Concerns and Policy Responses to {COVID-19} in {Hong Kong}", journal = j-TMIS, volume = "12", number = "4", pages = "30:1--30:20", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3460124", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3460124", abstract = "The outbreak of COVID-19 has caused huge economic and societal disruptions. To fight against the coronavirus, it is critical for policymakers to take swift and effective actions. In this article, we take Hong Kong as a case study, aiming to leverage \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "30", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Biester:2021:UIC, author = "Laura Biester and Katie Matton and Janarthanan Rajendran and Emily Mower Provost and Rada Mihalcea", title = "Understanding the Impact of {COVID-19} on Online Mental Health Forums", journal = j-TMIS, volume = "12", number = "4", pages = "31:1--31:28", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3458770", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3458770", abstract = "Like many of the disasters that have preceded it, the COVID-19 pandemic is likely to have a profound impact on people's mental health. Understanding its impact can inform strategies for mitigating negative consequences. This work seeks to better \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "31", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Gu:2021:SFR, author = "Kang Gu and Soroush Vosoughi and Temiloluwa Prioleau", title = "{SymptomID}: a Framework for Rapid Symptom Identification in Pandemics Using News Reports", journal = j-TMIS, volume = "12", number = "4", pages = "32:1--32:17", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3462441", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3462441", abstract = "The ability to quickly learn fundamentals about a new infectious disease, such as how it is transmitted, the incubation period, and related symptoms, is crucial in any novel pandemic. For instance, rapid identification of symptoms can enable interventions \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "32", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhu:2021:HRS, author = "Shixiang Zhu and Alexander Bukharin and Liyan Xie and Mauricio Santillana and Shihao Yang and Yao Xie", title = "High-Resolution Spatio-Temporal Model for County-Level {COVID-19} Activity in the {U.S}.", journal = j-TMIS, volume = "12", number = "4", pages = "33:1--33:20", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3468876", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3468876", abstract = "We present an interpretable high-resolution spatio-temporal model to estimate COVID-19 deaths together with confirmed cases 1 week ahead of the current time, at the county level and weekly aggregated, in the United States. A notable feature of our spatio-. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "33", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2021:CSS, author = "Junye Li and Aryan Sharma and Deepak Mishra and Gustavo Batista and Aruna Seneviratne", title = "{COVID}-Safe Spatial Occupancy Monitoring Using {OFDM}-Based Features and Passive {WiFi} Samples", journal = j-TMIS, volume = "12", number = "4", pages = "34:1--34:24", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3472668", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3472668", abstract = "During the COVID-19 pandemic, authorities have been asking for social distancing to prevent transmission of the virus. However, enforcing such distancing has been challenging in tight spaces such as elevators and unmonitored commercial settings such as \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "34", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kharkwal:2021:UOD, author = "Himanshu Kharkwal and Dakota Olson and Jiali Huang and Abhiraj Mohan and Ankur Mani and Jaideep Srivastava", title = "University Operations During a Pandemic: a Flexible Decision Analysis Toolkit", journal = j-TMIS, volume = "12", number = "4", pages = "35:1--35:24", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3460125", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3460125", abstract = "Modeling infection spread during pandemics is not new, with models using past data to tune simulation parameters for predictions. These help in understanding of the healthcare burden posed by a pandemic and responding accordingly. However, the problem of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "35", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ouyang:2021:DRS, author = "Chun Ouyang and Michael Adams and Arthur H. M. Ter Hofstede and Yang Yu", title = "Design and Realisation of Scalable Business Process Management Systems for Deployment in the Cloud", journal = j-TMIS, volume = "12", number = "4", pages = "36:1--36:26", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3460123", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3460123", abstract = "Business Process Management Systems (BPMSs) provide automated support for the execution of business processes in modern organisations. With the emergence of cloud computing, BPMS deployment considerations are shifting from traditional on-premise models to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "36", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chakraborty:2021:MLA, author = "Saurav Chakraborty and Agnieszka Onuchowska and Sagar Samtani and Wolfgang Jank and Brandon Wolfram", title = "Machine Learning for Automated Industrial {IoT} Attack Detection: an Efficiency-Complexity Trade-off", journal = j-TMIS, volume = "12", number = "4", pages = "37:1--37:28", month = dec, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1145/3460822", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Oct 27 15:36:00 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3460822", abstract = "Critical city infrastructures that depend on smart Industrial Internet of Things (IoT) devices have been increasingly becoming a target of cyberterrorist or hacker attacks. Although this has led to multiple studies in the recent past, there exists a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "37", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Cwei:2022:ISI, author = "Lin Jerry Cwei and Nachiketa Sahoo and Gautam Srivastava and Weiping Ding", title = "Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, {Part 1}", journal = j-TMIS, volume = "13", number = "1", pages = "1:1--1:3", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3486960", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3486960", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wang:2022:DDS, author = "Shui-Hua Wang and Xin Zhang and Yu-Dong Zhang", title = "{DSSAE}: Deep Stacked Sparse Autoencoder Analytical Model for {COVID-19} Diagnosis by Fractional {Fourier} Entropy", journal = j-TMIS, volume = "13", number = "1", pages = "2:1--2:20", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3451357", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3451357", abstract = "(Aim) COVID-19 has caused more than 2.28 million deaths till 4/Feb/2021 while it is still spreading across the world. This study proposed a novel artificial intelligence model to diagnose COVID-19 based on chest CT images. (Methods) First, the two-. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2022:TDT, author = "Fan Chen and Jiaoxiong Xia and Honghao Gao and Huahu Xu and Wei Wei", title = "{TRG-DAtt}: The Target Relational Graph and Double Attention Network Based Sentiment Analysis and Prediction for Supporting Decision Making", journal = j-TMIS, volume = "13", number = "1", pages = "3:1--3:25", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3462442", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3462442", abstract = "The management of public opinion and the use of big data monitoring to accurately judge and verify all kinds of information are valuable aspects in the enterprise management decision-making process. The sentiment analysis of reviews is a key decision-. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Nawaz:2022:MHU, author = "M. Saqib Nawaz and Philippe Fournier-Viger and Unil Yun and Youxi Wu and Wei Song", title = "Mining High Utility Itemsets with {Hill} Climbing and Simulated Annealing", journal = j-TMIS, volume = "13", number = "1", pages = "4:1--4:22", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3462636", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3462636", abstract = "High utility itemset mining (HUIM) is the task of finding all items set, purchased together, that generate a high profit in a transaction database. In the past, several algorithms have been developed to mine high utility itemsets (HUIs). However, most of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Niu:2022:CMT, author = "Shuteng Niu and Yushan Jiang and Bowen Chen and Jian Wang and Yongxin Liu and Houbing Song", title = "Cross-Modality Transfer Learning for Image-Text Information Management", journal = j-TMIS, volume = "13", number = "1", pages = "5:1--5:14", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3464324", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3464324", abstract = "In the past decades, information from all kinds of data has been on a rapid increase. With state-of-the-art performance, machine learning algorithms have been beneficial for information management. However, insufficient supervised training data is still \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2022:ABV, author = "Mu-Yen Chen and Min-Hsuan Fan and Li-Xiang Huang", title = "{AI}-Based Vehicular Network toward {6G} and {IoT}: Deep Learning Approaches", journal = j-TMIS, volume = "13", number = "1", pages = "6:1--6:12", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3466691", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3466691", abstract = "In recent years, vehicular networks have become increasingly large, heterogeneous, and dynamic, making it difficult to meet strict requirements of ultralow latency, high reliability, high security, and massive connections for next generation (6G) \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lv:2022:NML, author = "Zhihan Lv and Ranran Lou and Hailin Feng and Dongliang Chen and Haibin Lv", title = "Novel Machine Learning for Big Data Analytics in Intelligent Support Information Management Systems", journal = j-TMIS, volume = "13", number = "1", pages = "7:1--7:21", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3469890", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3469890", abstract = "Two-dimensional$^1$ arrays of bi-component structures made of cobalt and permalloy elliptical dots with thickness of 25 nm, length 1 mm and width of 225 nm, have been prepared by a self-aligned shadow deposition technique. Brillouin light scattering has been \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kumar:2022:DBP, author = "Ankit Kumar and Abhishek Kumar and Ali Kashif Bashir and Mamoon Rashid and V. D. Ambeth Kumar and Rupak Kharel", title = "Distance Based Pattern Driven Mining for Outlier Detection in High Dimensional Big Dataset", journal = j-TMIS, volume = "13", number = "1", pages = "8:1--8:17", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3469891", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3469891", abstract = "Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chowdhury:2022:NAM, author = "Mohammad Ehsan Shahmi Chowdhury and Chowdhury Farhan Ahmed and Carson K. Leung", title = "A New Approach for Mining Correlated Frequent Subgraphs", journal = j-TMIS, volume = "13", number = "1", pages = "9:1--9:28", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3473042", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3473042", abstract = "Nowadays graphical datasets are having a vast amount of applications. As a result, graph mining-mining graph datasets to extract frequent subgraphs-has proven to be crucial in numerous aspects. It is important to perform correlation analysis among the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wen:2022:KFA, author = "Bo Wen and Paul Jen-Hwa Hu and Mohammadreza Ebrahimi and Hsinchun Chen", title = "Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: an Affordance Perspective", journal = j-TMIS, volume = "13", number = "1", pages = "10:1--10:24", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3460823", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3460823", abstract = "Rich, diverse cybersecurity data are critical for efforts by the intelligence and security informatics (ISI) community. Although open-access data repositories (OADRs) provide tremendous benefits for ISI researchers and practitioners, determinants of their \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Elkoumy:2022:PCP, author = "Gamal Elkoumy and Stephan A. Fahrenkrog-Petersen and Mohammadreza Fani Sani and Agnes Koschmider and Felix Mannhardt and Saskia Nu{\~n}ez Von Voigt and Majid Rafiei and Leopold {Von Waldthausen}", title = "Privacy and Confidentiality in Process Mining: Threats and Research Challenges", journal = j-TMIS, volume = "13", number = "1", pages = "11:1--11:17", month = mar, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3468877", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Jan 7 07:41:54 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3468877", abstract = "Privacy and confidentiality are very important prerequisites for applying process mining to comply with regulations and keep company secrets. This article provides a foundation for future research on privacy-preserving and confidential process mining \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sun:2022:DAM, author = "Bo Sun and Takeshi Takahashi and Tao Ban and Daisuke Inoue", title = "Detecting {Android} Malware and Classifying Its Families in Large-scale Datasets", journal = j-TMIS, volume = "13", number = "2", pages = "12:1--12:21", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3464323", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3464323", abstract = "To relieve the burden of security analysts, Android malware detection and its family classification need to be automated. There are many previous works focusing on using machine (or deep) learning technology to tackle these two important issues, but as \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Marshall:2022:MLS, author = "Byron Marshall and Michael Curry and Robert E. Crossler and John Correia", title = "Machine Learning and Survey-based Predictors of {InfoSec} Non-Compliance", journal = j-TMIS, volume = "13", number = "2", pages = "13:1--13:20", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3466689", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3466689", abstract = "Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Xie:2022:RPP, author = "Jiaheng Xie and Bin Zhang and Jian Ma and Daniel Zeng and Jenny Lo-Ciganic", title = "Readmission Prediction for Patients with Heterogeneous Medical History: a Trajectory-Based Deep Learning Approach", journal = j-TMIS, volume = "13", number = "2", pages = "14:1--14:27", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3468780", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3468780", abstract = "Hospital readmission refers to the situation where a patient is re-hospitalized with the same primary diagnosis within a specific time interval after discharge. Hospital readmission causes \$26 billion preventable expenses to the U.S. health systems \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{He:2022:MAC, author = "Luo He and Hongyan Liu and Yinghui Yang and Bei Wang", title = "A Multi-attention Collaborative Deep Learning Approach for Blood Pressure Prediction", journal = j-TMIS, volume = "13", number = "2", pages = "15:1--15:20", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3471571", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3471571", abstract = "We develop a deep learning model based on Long Short-term Memory (LSTM) to predict blood pressure based on a unique data set collected from physical examination centers capturing comprehensive multi-year physical examination and lab results. In the Multi-. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Tang:2022:QLW, author = "Yan Tang and Weilong Cui and Jianwen Su", title = "A Query Language for Workflow Logs", journal = j-TMIS, volume = "13", number = "2", pages = "16:1--16:28", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3482968", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3482968", abstract = "A business process (workflow) is an assembly of tasks to accomplish a business goal. Real-world workflow models often demanded to change due to new laws and policies, changes in the environment, and so on. To understand the inner workings of a business \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Huang:2022:IMA, author = "Shi Ming Huang and David C. Yen and Ting Jyun Yan and Yi Ting Yang", title = "An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology", journal = j-TMIS, volume = "13", number = "2", pages = "17:1--17:29", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3485187", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3485187", abstract = "Technology trend analysis uses data relevant to historical performance and extrapolates it to estimate and assess the future potential of technology. Such analysis is used to analyze emerging technologies or predict the growing markets that influence the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Miksa:2022:ARD, author = "Tomasz Miksa and Simon Oblasser and Andreas Rauber", title = "Automating Research Data Management Using Machine-Actionable Data Management Plans", journal = j-TMIS, volume = "13", number = "2", pages = "18:1--18:22", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3490396", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3490396", abstract = "Many research funders mandate researchers to create and maintain data management plans (DMPs) for research projects that describe how research data is managed to ensure its reusability. A DMP, being a static textual document, is difficult to act upon and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2022:IBS, author = "Guangrui (Kayla) Li and Mike K. P. So and Kar Yan Tam", title = "Identifying the Big Shots --- a Quantile-Matching Way in the Big Data Context", journal = j-TMIS, volume = "13", number = "2", pages = "19:1--19:30", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3490395", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3490395", abstract = "The prevalence of big data has raised significant epistemological concerns in information systems research. This study addresses two of them-the deflated p -value problem and the role of explanation and prediction. To address the deflated p -value problem, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wu:2022:EST, author = "Xindong Wu and Xingquan Zhu and Minghui Wu", title = "The Evolution of Search: Three Computing Paradigms", journal = j-TMIS, volume = "13", number = "2", pages = "20:1--20:20", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3495214", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3495214", abstract = "Search is probably the most common activity that humans conduct all the time. A search target can be a concrete item (with a yes or no answer and location information), an abstract concept (such as the most important information on the Web about Xindong \ldots{}).", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhang:2022:CDW, author = "Ning Zhang and Mohammadreza Ebrahimi and Weifeng Li and Hsinchun Chen", title = "Counteracting Dark {Web} Text-Based {CAPTCHA} with Generative Adversarial Learning for Proactive Cyber Threat Intelligence", journal = j-TMIS, volume = "13", number = "2", pages = "21:1--21:21", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3505226", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3505226", abstract = "Automated monitoring of dark web (DW) platforms on a large scale is the first step toward developing proactive Cyber Threat Intelligence (CTI). While there are efficient methods for collecting data from the surface web, large-scale dark web data \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Werder:2022:EDP, author = "Karl Werder and Balasubramaniam Ramesh and Rongen (Sophia) Zhang", title = "Establishing Data Provenance for Responsible Artificial Intelligence Systems", journal = j-TMIS, volume = "13", number = "2", pages = "22:1--22:23", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3503488", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Mar 25 07:15:03 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3503488", abstract = "Data provenance, a record that describes the origins and processing of data, offers new promises in the increasingly important role of artificial intelligence (AI)-based systems in guiding human decision making. To avoid disastrous outcomes that can \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lin:2022:ISI, author = "Jerry Chun-Wei Lin and Nachiketa Sahoo and Gautam Srivastava and Weiping Ding", title = "Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, {Part II}", journal = j-TMIS, volume = "13", number = "3", pages = "23:1--23:3", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3512468", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3512468", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ebrahimi:2022:QCS, author = "Maryam Ebrahimi and Mohammad Hesam Tadayon and Mohammad Sayad Haghighi and Alireza Jolfaei", title = "A Quantitative Comparative Study of Data-oriented Trust Management Schemes in {Internet of Things}", journal = j-TMIS, volume = "13", number = "3", pages = "24:1--24:30", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3476248", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3476248", abstract = "In the Internet of Things (IoT) paradigm, all entities in the IoT network, whether home users or industrial things, receive data from other things to make decisions. However, in the decentralized, heterogeneous, and rapidly changing IoT network with \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wu:2022:OMS, author = "Youxi Wu and Xiaohui Wang and Yan Li and Lei Guo and Zhao Li and Ji Zhang and Xindong Wu", title = "{OWSP-Miner}: Self-adaptive One-off Weak-gap Strong Pattern Mining", journal = j-TMIS, volume = "13", number = "3", pages = "25:1--25:23", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3476247", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3476247", abstract = "Gap constraint sequential pattern mining (SPM), as a kind of repetitive SPM, can avoid mining too many useless patterns. However, this method is difficult for users to set a suitable gap without prior knowledge and each character is considered to have the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Gao:2022:FEH, author = "Yuan Gao and Laurence T. Yang and Yaliang Zhao and Jing Yang", title = "Feature Extraction of High-dimensional Data Based on {J-HOSVD} for Cyber-Physical-Social Systems", journal = j-TMIS, volume = "13", number = "3", pages = "26:1--26:21", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3483448", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3483448", abstract = "With the further integration of Cyber-Physical-Social systems (CPSSs), there is explosive growth of the data in CPSSs. How to discover effective information or knowledge from CPSSs big data and provide support for subsequent learning tasks has become a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Hsieh:2022:DFR, author = "Hsun-Ping Hsieh and Fandel Lin and Nai-Yu Chen and Tzu-Hsin Yang", title = "A Decision Framework to Recommend Cruising Locations for Taxi Drivers under the Constraint of Booking Information", journal = j-TMIS, volume = "13", number = "3", pages = "27:1--27:30", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3490687", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3490687", abstract = "As the demand for taxi reservation services has increased, increasing the income of taxi drivers with advanced services has attracted attention. In this article, we propose a path decision framework that considers real-time spatial-temporal predictions \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "27", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pika:2022:CBP, author = "Anastasiia Pika and Chun Ouyang and Arthur H. M. ter Hofstede", title = "Configurable Batch-Processing Discovery from Event Logs", journal = j-TMIS, volume = "13", number = "3", pages = "28:1--28:25", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3490394", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3490394", abstract = "Batch processing is used in many production and service processes and can help achieve efficiencies of scale; however, it can also increase inventories and introduce process delays. Before organizations can develop good understanding about the effects of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "28", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Rashid:2022:ADC, author = "A. N. M. Bazlur Rashid and Mohiuddin Ahmed and Leslie F. Sikos and Paul Haskell-Dowland", title = "Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection", journal = j-TMIS, volume = "13", number = "3", pages = "29:1--29:39", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3495165", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3495165", abstract = "Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challenging and computationally expensive task. Feature selection (FS) is an approach to remove irrelevant and redundant features and select a subset of features, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "29", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Liu:2022:EFP, author = "Xin Liu and Liang Zheng and Weishan Zhang and Jiehan Zhou and Shuai Cao and Shaowen Yu", title = "An Evolutive Frequent Pattern Tree-based Incremental Knowledge Discovery Algorithm", journal = j-TMIS, volume = "13", number = "3", pages = "30:1--30:20", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3495213", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3495213", abstract = "To understand current situation in specific scenarios, valuable knowledge should be mined from both historical data and emerging new data. However, most existing algorithms take the historical data and the emerging data as a whole and periodically repeat \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "30", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Corradini:2022:ETA, author = "Flavio Corradini and Alessandro Marcelletti and Andrea Morichetta and Andrea Polini and Barbara Re and Francesco Tiezzi", title = "Engineering Trustable and Auditable Choreography-based Systems Using Blockchain", journal = j-TMIS, volume = "13", number = "3", pages = "31:1--31:53", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3505225", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3505225", abstract = "A key challenge in engineering distributed systems consists in the integration into their development of a decentralised infrastructure allowing the system participants to trust each other. In this article, we face such a challenge by proposing a model-. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "31", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Yeo:2022:HCD, author = "M. Lisa Yeo and Erik Rolland and Jacquelyn Rees Ulmer and Raymond A. Patterson", title = "How Customer Demand Reactions Impact Technology Innovation and Security", journal = j-TMIS, volume = "13", number = "3", pages = "32:1--32:17", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3505227", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3505227", abstract = "Innovation is a very important concern for both managers and governmental policy makers. There is an important interplay between security and technology innovation that is largely unrecognized in the literature. This research considers the case where \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "32", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ma:2022:SME, author = "Wanlun Ma and Xiangyu Hu and Chao Chen and Sheng Wen and Kkwang Raymond Choo and Yang Xiang", title = "Social Media Event Prediction using {DNN} with Feedback Mechanism", journal = j-TMIS, volume = "13", number = "3", pages = "33:1--33:24", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3522759", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3522759", abstract = "Online social networks (OSNs) are a rich source of information, and the data (including user-generated content) can be mined to facilitate real-world event prediction. However, the dynamic nature of OSNs and the fast-pace nature of social events or hot \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "33", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Adomavicius:2022:IBE, author = "Gediminas Adomavicius and Mochen Yang", title = "Integrating Behavioral, Economic, and Technical Insights to Understand and Address Algorithmic Bias: a Human-Centric Perspective", journal = j-TMIS, volume = "13", number = "3", pages = "34:1--34:27", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3519420", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Jun 2 07:44:18 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3519420", abstract = "Many important decisions are increasingly being made with the help of information systems that use artificial intelligence and machine learning models. These computational models are designed to discover useful patterns from large amounts of data, which \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "34", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2022:ISI, author = "Mu-Yen Chen and Bhavani Thuraisingham and Erol Egrioglu and Jose {De Jesus Rubio}", title = "Introduction to the Special Issue on Smart Systems for {Industry 4.0} and {IoT}", journal = j-TMIS, volume = "13", number = "4", pages = "35:1--35:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3583985", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3583985", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "35", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Romero:2022:IDP, author = "Esteban Elias Romero and Carlos David Camacho and Carlos Enrique Montenegro and {\'O}scar Esneider Acosta and Rub{\'e}n Gonz{\'a}lez Crespo and Elvis Eduardo Gaona and Marcelo Herrera Mart{\'\i}nez", title = "Integration of {DevOps} Practices on a Noise Monitor System with {CircleCI} and {Terraform}", journal = j-TMIS, volume = "13", number = "4", pages = "36:1--36:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3505228", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3505228", abstract = "Lowering pollution levels is one of the main principles of Sustainable Development goals dictated by the United Nations. Consequently, developments on noise monitoring contribute in great manner to this purpose, since they give the opportunity to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "36", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ren:2022:AMD, author = "Bin Ren and Yuquiang Chen and Fujie Wang", title = "Application Massive Data Processing Platform for Smart Manufacturing Based on Optimization of Data Storage", journal = j-TMIS, volume = "13", number = "4", pages = "37:1--37:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3508395", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3508395", abstract = "The aim of smart manufacturing is to reduce manpower requirements of the production line by applying technology of huge amounts of data to the manufacturing industry. Smart manufacturing is also called Industry 4.0, and the platform for processing huge \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "37", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Liu:2022:PDX, author = "Genggeng Liu and Yuhan Zhu and Saijuan Xu and Hao Tang and Yeh-Cheng Chen", title = "Performance-Driven {X}-Architecture Routing Algorithm for Artificial Intelligence Chip Design in Smart Manufacturing", journal = j-TMIS, volume = "13", number = "4", pages = "38:1--38:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3519422", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3519422", abstract = "The new 7-nm Artificial Intelligence (AI) chip is an important milestone recently announced by the IBM research team, with a very important optimization goal of performance. This chip technology can be extended to various business scenarios in the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "38", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lv:2022:CIS, author = "Zhihan Lv and Dongliang Chen and Hailin Feng and Amit Kumar Singh and Wei Wei and Haibin Lv", title = "Computational Intelligence in Security of Digital Twins Big Graphic Data in Cyber-physical Systems of Smart Cities", journal = j-TMIS, volume = "13", number = "4", pages = "39:1--39:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3522760", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3522760", abstract = "This investigation focuses on the application of computational intelligence to the security of Digital Twins (DTs) graphic data of the Cyber-physical System (CPS). The intricate and diverse physical space of CPS in the smart city is mapped in virtual \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "39", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2022:CIM, author = "Rongli Chen and Xiaozhong Chen and Lei Wang and Jianxin Li", title = "The Core Industry Manufacturing Process of Electronics Assembly Based on Smart Manufacturing", journal = j-TMIS, volume = "13", number = "4", pages = "40:1--40:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3529098", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3529098", abstract = "This research takes a case study approach to show the development of a diverse adoption and product strategy distinct from the core manufacturing industry process. It explains the development status in all aspects of smart manufacturing, via the example \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "40", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Liu:2022:TSC, author = "Genggeng Liu and Ruping Zhou and Saijuan Xu and Yuhan Zhu and Wenzhong Guo and Yeh-Cheng Chen and Guolong Chen", title = "Two-Stage Competitive Particle Swarm Optimization Based Timing-Driven {X}-Routing for {IC} Design Under Smart Manufacturing", journal = j-TMIS, volume = "13", number = "4", pages = "41:1--41:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3531328", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3531328", abstract = "As timing delay becomes a critical issue in chip performance, there is a burning desire for IC design under smart manufacturing to optimize the delay. As the best connection model for multi-terminal nets, the wirelength and the maximum source-to-sink \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "41", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Du:2022:SWI, author = "Xin Du and Songtao Tang and Zhihui Lu and Keke Gai and Jie Wu and Patrick C. K. Hung", title = "Scientific Workflows in {IoT} Environments: a Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing", journal = j-TMIS, volume = "13", number = "4", pages = "42:1--42:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3531327", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3531327", abstract = "In Industry 4.0 and Internet of Things (IoT) environments, the heterogeneous edge-cloud computing paradigm can provide a more proper solution to deploy scientific workflows compared to cloud computing or other traditional distributed computing. Owing to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "42", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lin:2022:SSJ, author = "Qi Lin and Wensheng Gan and Yongdong Wu and Jiahui Chen and Chien-Ming Chen", title = "Smart System: Joint Utility and Frequency for Pattern Classification", journal = j-TMIS, volume = "13", number = "4", pages = "43:1--43:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3531480", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3531480", abstract = "Nowadays, the environments of smart systems for Industry 4.0 and Internet of Things are experiencing fast industrial upgrading. Big data technologies such as design making, event detection, and classification are developed to help manufacturing \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "43", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Parameswarath:2022:UEP, author = "Rohini Poolat Parameswarath and Prosanta Gope and Biplab Sikdar", title = "User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential", journal = j-TMIS, volume = "13", number = "4", pages = "44:1--44:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3532869", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3532869", abstract = "The use of Electric Vehicles (EVs) has been gaining traction in recent years due to various reasons. While charging their EVs, users expose their identity and personal details, and an adversary being able to identify and track where users charge their EVs \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "44", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Nong:2022:ARC, author = "Mengxin Nong and Lingfeng Huang and Mingtao Liu", title = "Allocation of Resources for Cloud Survivability in Smart Manufacturing", journal = j-TMIS, volume = "13", number = "4", pages = "45:1--45:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3533701", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3533701", abstract = "With the development of virtualization technology, cloud computing has emerged as a powerful and flexible platform for various services such as online trading. However, there are concerns about the survivability of cloud services in smart manufacturing. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "45", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ahmed:2022:HEA, author = "Usman Ahmed and Jerry Chun-Wei Lin and Gautam Srivastava", title = "Heterogeneous Energy-aware Load Balancing for {Industry 4.0} and {IoT} Environments", journal = j-TMIS, volume = "13", number = "4", pages = "46:1--46:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3543859", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3543859", abstract = "With the improvement of global infrastructure, Cyber-Physical Systems (CPS) have become an important component of Industry 4.0. Both the application as well as the machine work together to improve the task of interdependencies. Machine learning methods in \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "46", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2022:RUB, author = "Yu-Chia Chen and Sin-Ye Jhong and Chih-Hsien Hsia", title = "Roadside Unit-based Unknown Object Detection in Adverse Weather Conditions for Smart {Internet of Vehicles}", journal = j-TMIS, volume = "13", number = "4", pages = "47:1--47:??", month = dec, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1145/3554923", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:44 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3554923", abstract = "For Internet of Vehicles applications, reliable autonomous driving systems usually perform the majority of their computations on the cloud due to the limited computing power of edge devices. The communication delay between cloud platforms and edge devices,. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "47", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Janiesch:2023:AUP, author = "Christian Janiesch and Marcus Fischer and Florian Imgrund and Adrian Hofmann and Axel Winkelmann", title = "An Architecture Using Payment Channel Networks for Blockchain-based {Wi-Fi} Sharing", journal = j-TMIS, volume = "14", number = "1", pages = "1:1--1:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3529097", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3529097", abstract = "Enabling Internet access while taking load of mobile networks, the concept of Wi-Fi sharing holds much potential. While trust-based concepts require a trusted intermediary and cannot prevent malicious behavior, for example, conducted through fake profiles,. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Morid:2023:TSP, author = "Mohammad Amin Morid and Olivia R. Liu Sheng and Joseph Dunbar", title = "Time Series Prediction Using Deep Learning Methods in Healthcare", journal = j-TMIS, volume = "14", number = "1", pages = "2:1--2:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3531326", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3531326", abstract = "Traditional machine learning methods face unique challenges when applied to healthcare predictive analytics. The high-dimensional nature of healthcare data necessitates labor-intensive and time-consuming processes when selecting an appropriate set of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhai:2023:RNB, author = "Shuang (Sophie) Zhai and Zhu (Drew) Zhang", title = "Read the News, Not the Books: Forecasting Firms' Long-term Financial Performance via Deep Text Mining", journal = j-TMIS, volume = "14", number = "1", pages = "3:1--3:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3533018", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3533018", abstract = "In this paper, we show textual data from firm-related events in news articles can effectively predict various firm financial ratios, with or without historical financial ratios. We exploit state-of-the-art neural architectures, including pseudo-event \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ameri:2023:DNI, author = "Kimia Ameri and Michael Hempel and Hamid Sharif and Juan Lopez and Kalyan Perumalla", title = "Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems", journal = j-TMIS, volume = "14", number = "1", pages = "4:1--4:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3546580", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3546580", abstract = "There is an urgent need in many critical infrastructure sectors, including the energy sector, for attaining detailed insights into cybersecurity features and compliance with cybersecurity requirements related to their Operational Technology (OT) \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Joshi:2023:LNL, author = "Amogh Manoj Joshi and Deepak Ranjan Nayak and Dibyasundar Das and Yudong Zhang", title = "{LiMS-Net}: a Lightweight Multi-Scale {CNN} for {COVID-19} Detection from Chest {CT} Scans", journal = j-TMIS, volume = "14", number = "1", pages = "5:1--5:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3551647", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3551647", abstract = "Recent years have witnessed a rise in employing deep learning methods, especially convolutional neural networks (CNNs) for detection of COVID-19 cases using chest CT scans. Most of the state-of-the-art models demand a huge amount of parameters which often \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kucklick:2023:TAI, author = "Jan-Peter Kucklick and Oliver M{\"u}ller", title = "Tackling the Accuracy-Interpretability Trade-off: Interpretable Deep Learning Models for Satellite Image-based Real Estate Appraisal", journal = j-TMIS, volume = "14", number = "1", pages = "6:1--6:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3567430", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3567430", abstract = "Deep learning models fuel many modern decision support systems, because they typically provide high predictive performance. Among other domains, deep learning is used in real-estate appraisal, where it allows extending the analysis from hard facts only \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Akello:2023:BUC, author = "Patricia Akello and Naga Vemprala and Nicole Lang Beebe and Kim-Kwang Raymond Choo", title = "Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence", journal = j-TMIS, volume = "14", number = "1", pages = "7:1--7:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3571290", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3571290", abstract = "In the United States and around the world, gun violence has become a long-standing public safety concern and a security threat, due to violent gun-related crimes, injuries, and fatalities. Although legislators and lawmakers have attempted to mitigate its \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2023:ODD, author = "Xue Chen and Cheng Wang and Qing Yang and Teng Hu and Changjun Jiang", title = "The Opportunity in Difficulty: a Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection", journal = j-TMIS, volume = "14", number = "1", pages = "8:1--8:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3569944", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3569944", abstract = "Data collection under local differential privacy (LDP) has been gradually on the stage. Compared with the implementation of LDP on the single attribute data collection, that on multi-dimensional data faces great challenges as follows: (1) Communication \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Hu:2023:RAH, author = "Yixiang Hu and Xiaoheng Deng and Congxu Zhu and Xuechen Chen and Laixin Chi", title = "Resource Allocation for Heterogeneous Computing Tasks in Wirelessly Powered {MEC}-enabled {IIOT} Systems", journal = j-TMIS, volume = "14", number = "1", pages = "9:1--9:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3571291", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3571291", abstract = "Integrating wireless power transfer with mobile edge computing (MEC) has become a powerful solution for increasingly complicated and dynamic industrial Internet of Things (IIOT) systems. However, the traditional approaches overlooked the heterogeneity of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Hevner:2023:RCD, author = "Alan Hevner and Veda Storey", title = "Research Challenges for the Design of Human-Artificial Intelligence Systems ({HAIS})", journal = j-TMIS, volume = "14", number = "1", pages = "10:1--10:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3549547", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3549547", abstract = "Artificial intelligence (AI) capabilities are increasingly common components of all socio-technical information systems that integrate human and machine actions. The impacts of AI components on the design and use of application systems are evolving \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Dumas:2023:AAB, author = "Marlon Dumas and Fabiana Fournier and Lior Limonad and Andrea Marrella and Marco Montali and Jana-Rebecca Rehse and Rafael Accorsi and Diego Calvanese and Giuseppe {De Giacomo} and Dirk Fahland and Avigdor Gal and Marcello {La Rosa} and Hagen V{\"o}lzer and Ingo Weber", title = "{AI}-augmented Business Process Management Systems: a Research Manifesto", journal = j-TMIS, volume = "14", number = "1", pages = "11:1--11:??", month = mar, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3576047", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Mar 9 08:04:45 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3576047", abstract = "AI-augmented Business Process Management Systems (ABPMSs) are an emerging class of process-aware information systems, empowered by trustworthy AI technology. An ABPMS enhances the execution of business processes with the aim of making these processes more \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Leroy:2023:ISI, author = "Gondy Leroy and Bengisu Tulu and Xiao Liu", title = "Introduction to the Special Issue on Design and Data Science Research in Healthcare", journal = j-TMIS, volume = "14", number = "2", pages = "12:1--12:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3579646", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3579646", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Baucum:2023:OSU, author = "Matt Baucum and Anahita Khojandi and Carole Myers and Larry Kessler", title = "Optimizing Substance Use Treatment Selection Using Reinforcement Learning", journal = j-TMIS, volume = "14", number = "2", pages = "13:1--13:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3563778", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3563778", abstract = "Substance use disorder (SUD) exacts a substantial economic and social cost in the United States, and it is crucial for SUD treatment providers to match patients with feasible, effective, and affordable treatment plans. The availability of large SUD \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Bartenschlager:2023:CML, author = "Christina C. Bartenschlager and Stefanie S. Ebel and Sebastian Kling and Janne Vehreschild and Lutz T. Zabel and Christoph D. Spinner and Andreas Schuler and Axel R. Heller and Stefan Borgmann and Reinhard Hoffmann and Siegbert Rieg and Helmut Messmann and Martin Hower and Jens O. Brunner and Frank Hanses and Christoph R{\"o}mmele", title = "{COVIDAL}: a Machine Learning Classifier for Digital {COVID-19} Diagnosis in {German} Hospitals", journal = j-TMIS, volume = "14", number = "2", pages = "14:1--14:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3567431", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3567431", abstract = "For the fight against the COVID-19 pandemic, it is particularly important to map the course of infection, in terms of patients who have currently tested SARS-CoV-2 positive, as accurately as possible. In hospitals, this is even more important because \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{vanderLinden:2023:MVD, author = "Sanne van der Linden and Rita Sevastjanova and Mathias Funk and Mennatallah El-Assady", title = "{MediCoSpace}: Visual Decision-Support for Doctor-Patient Consultations using Medical Concept Spaces from {EHRs}", journal = j-TMIS, volume = "14", number = "2", pages = "15:1--15:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3564275", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3564275", abstract = "Healthcare systems are under pressure from an aging population, rising costs, and increasingly complex conditions and treatments. Although data are determined to play a bigger role in how doctors diagnose and prescribe treatments, they struggle due to a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Fechner:2023:NIS, author = "Pascal Fechner and Fabian K{\"o}nig and Wolfgang Kratsch and Jannik Lockl and Maximilian R{\"o}glinger", title = "Near-Infrared Spectroscopy for Bladder Monitoring: a Machine Learning Approach", journal = j-TMIS, volume = "14", number = "2", pages = "16:1--16:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3563779", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3563779", abstract = "Patients living with neurogenic bladder dysfunction can lose the sensation of their bladder filling. To avoid over-distension of the urinary bladder and prevent long-term damage to the urinary tract, the gold standard treatment is clean intermittent \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Srinivasan:2023:EDM, author = "Karthik Srinivasan and Jinhang Jiang", title = "Examining Disease Multimorbidity in {U.S.} Hospital Visits Before and During {COVID-19} Pandemic: a Graph Analytics Approach", journal = j-TMIS, volume = "14", number = "2", pages = "17:1--17:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3564274", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3564274", abstract = "Enduring effects of the COVID-19 pandemic on healthcare systems can be preempted by identifying patterns in diseases recorded in hospital visits over time. Disease multimorbidity or simultaneous occurrence of multiple diseases is a growing global public \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Srinivasan:2023:HLS, author = "Karthik Srinivasan and Faiz Currim and Sudha Ram", title = "A Human-in-the-Loop Segmented Mixed-Effects Modeling Method for Analyzing Wearables Data", journal = j-TMIS, volume = "14", number = "2", pages = "18:1--18:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3564276", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3564276", abstract = "Wearables are an important source of big data, as they provide real-time high-resolution data logs of health indicators of individuals. Higher-order associations between pairs of variables is common in wearables data. Representing higher-order association \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chai:2023:MLC, author = "Yidong Chai and Hongyan Liu and Jie Xu and Sagar Samtani and Yuanchun Jiang and Haoxin Liu", title = "A Multi-Label Classification with an Adversarial-Based Denoising Autoencoder for Medical Image Annotation", journal = j-TMIS, volume = "14", number = "2", pages = "19:1--19:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3561653", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3561653", abstract = "Medical image annotation aims to automatically describe the content of medical images. It helps doctors to understand the content of medical images and make better informed decisions like diagnoses. Existing methods mainly follow the approach for natural \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Unger:2023:DNA, author = "Moshe Unger and Pan Li and Sahana (Shahana) Sen and Alexander Tuzhilin", title = "Don't Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings", journal = j-TMIS, volume = "14", number = "2", pages = "20:1--20:??", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3578710", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 27 07:09:25 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3578710", abstract = "Although building a 360-degree comprehensive view of a customer has been a long-standing goal in marketing, this challenge has not been successfully addressed in many marketing applications because fractured customer data stored across different ``silos'' \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Mishra:2023:EED, author = "Rahul Mishra and Dharavath Ramesh and Salil S. Kanhere and Damodar Reddy Edla", title = "Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: a Redactable Blockchain Approach", journal = j-TMIS, volume = "14", number = "3", pages = "21:1--21:??", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3578555", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 30 12:00:07 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3578555", abstract = "Public auditing and data deduplication are integral considerations in providing efficient and secure cloud storage services. Nevertheless, the traditional data deduplication models \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Rubin:2023:UTA, author = "Eran Rubin and Izak Benbasat", title = "Using {Toulmin}'s Argumentation Model to Enhance Trust in Analytics-Based Advice Giving Systems", journal = j-TMIS, volume = "14", number = "3", pages = "22:1--22:??", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3580479", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 30 12:00:07 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3580479", abstract = "Ecommerce websites increasingly provide predictive analytics-based advice (PAA), such as advice about future potential price reductions. Establishing consumer-trust in these \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Du:2023:IMK, author = "Kelvin Du and Frank Xing and Erik Cambria", title = "Incorporating Multiple Knowledge Sources for Targeted Aspect-based Financial Sentiment Analysis", journal = j-TMIS, volume = "14", number = "3", pages = "23:1--23:??", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3580480", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 30 12:00:07 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3580480", abstract = "Combining symbolic and subsymbolic methods has become a promising strategy as research tasks in AI grow increasingly complicated and require higher levels of understanding. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chua:2023:SFD, author = "Cecil Eng Huang Chua and Fred Niederman", title = "Situational Factor Determinants of the Allocation of Decision Rights to Edge Computers", journal = j-TMIS, volume = "14", number = "3", pages = "24:1--24:??", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3582081", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 30 12:00:07 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3582081", abstract = "Internet of Things (IoT) designers frequently must determine whether action-oriented decisions should be made by edge computers or whether they should be made only by \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Siering:2023:PPP, author = "Michael Siering", title = "Peer-to-Peer {(P2P)} Lending Risk Management: Assessing Credit Risk on Social Lending Platforms Using Textual Factors", journal = j-TMIS, volume = "14", number = "3", pages = "25:1--25:??", year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3589003", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Aug 30 12:00:07 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3589003", abstract = "Peer-to-peer (P2P) lending platforms offer Internet users the possibility to borrow money from peers without the intervention of traditional financial institutions. Due to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Shen:2023:ECA, author = "Dazhong Shen and Hengshu Zhu and Keli Xiao and Xi Zhang and Hui Xiong", title = "Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint {Bayesian} Learning", journal = j-TMIS, volume = "14", number = "3", pages = "26:1--26:??", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3607875", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Sep 19 06:58:51 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3607875", abstract = "Personality has been considered as a driving factor for work engagement, which significantly affects people's role performance at work. Although existing research has \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ang:2023:PER, author = "Gary Ang and Zhiling Guo and Ee-Peng Lim", title = "On Predicting {ESG} Ratings Using Dynamic Company Networks", journal = j-TMIS, volume = "14", number = "3", pages = "27:1--27:??", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3607874", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Sep 19 06:58:51 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3607874", abstract = "Environmental, social and governance (ESG) considerations play an increasingly important role due to the growing focus on sustainability globally. Entities, such as banks and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "27", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2023:ISI, author = "Xin Li and Juhee Kwon and Balaji Padmanabhan and Pengzhu Zhang", title = "Introduction to the Special Issue on {IT}-enabled Business Management and Decision Making in the (Post) {Covid-19} Era", journal = j-TMIS, volume = "14", number = "4", pages = "28:1--28:??", month = dec, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3627995", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Dec 13 11:34:23 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3627995", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "28", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Guo:2023:SDH, author = "Tianjian Guo and Indranil Bardhan and Anjum Khurshid", title = "Social Determinants of Health and {ER} Utilization: Role of Information Integration during {COVID-19}", journal = j-TMIS, volume = "14", number = "4", pages = "29:1--29:??", month = dec, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3583077", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Dec 13 11:34:23 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3583077", abstract = "Emergency room (ER) admissions are the front door for the utilization of a community's health resources and serve as a valuable proxy for a community health system's capacity. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "29", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Killoran:2023:IIC, author = "Jayson Andrew Killoran and Tracy A. Jenkin and Jasmin Manseau", title = "{ICT} Interactions and {COVID-19} --- a Theorization Across Two Pandemic Waves", journal = j-TMIS, volume = "14", number = "4", pages = "30:1--30:??", month = dec, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3597938", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Dec 13 11:34:23 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3597938", abstract = "The COVID-19 pandemic instigated the rapid shift to remote work and virtual interactions, constituting a new normal of professional interaction over information and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "30", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pilato:2023:MSS, author = "Giovanni Pilato and Fabio Persia and Mouzhi Ge and Theodoros Chondrogiannis and Daniela D'Auria", title = "A Modular Social Sensing System for Personalized Orienteering in the {COVID-19} Era", journal = j-TMIS, volume = "14", number = "4", pages = "31:1--31:??", month = dec, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3615359", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Dec 13 11:34:23 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3615359", abstract = "Orienteering or itinerary planning algorithms in tourism are used to optimize travel routes by considering user preference and other constraints, such as time budget or \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "31", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zeng:2023:DAO, author = "Xiao Zeng and David Ji and Dimple R. Thadani and Boying Li and Xiaodie Pu and Zhao Cai and Patrick Y. K. Chau", title = "Disentangling Affordances of Online Collaboration Tools for Mutual Aid in Emergencies: Insights from the {COVID-19} Lockdown", journal = j-TMIS, volume = "14", number = "4", pages = "32:1--32:??", month = dec, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1145/3593056", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Dec 13 11:34:23 MST 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3593056", abstract = "With the uncertain trajectory of COVID-19 conditions worldwide, there lies the potential for emergencies to arise, abruptly yielding mass social and economic disruption. Gaining \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "32", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Lo:2024:NMG, author = "Pei-Chi Lo and Ee-Peng Lim", title = "Non-monotonic Generation of Knowledge Paths for Context Understanding", journal = j-TMIS, volume = "15", number = "1", pages = "1:1--1:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3627994", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3627994", abstract = "Knowledge graphs can be used to enhance text search and access by augmenting textual content with relevant background knowledge. While many large knowledge graphs are available, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Aouachria:2024:PMM, author = "Moufida Aouachria and Abderrahmane Leshob and Abdessamed R{\'e}da Ghomari and Mustapha Aouache", title = "A Process Mining Method for Inter-organizational Business Process Integration", journal = j-TMIS, volume = "15", number = "1", pages = "2:1--2:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3638062", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3638062", abstract = "Business process integration (BPI) allows organizations to connect and automate their business processes in order to deliver the right economic resources at the right time, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Pytel:2024:DDT, author = "Norman Pytel and Christian Ziegler and Axel Winkelmann", title = "From Dissonance to Dialogue: a Token-Based Approach to Bridge the Gap Between Manufacturers and Customers", journal = j-TMIS, volume = "15", number = "1", pages = "3:1--3:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3639058", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3639058", abstract = "This article presents a novel token-based recall communication system, which integrates Enterprise Resource Planning (ERP) systems and blockchain technology to enhance \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Storey:2024:DSI, author = "Veda C. Storey and Richard Baskerville", title = "Design with {Simon}'s Inner and Outer Environments: Theoretical Foundations for Design Science Research Methods for Digital Science", journal = j-TMIS, volume = "15", number = "1", pages = "4:1--4:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3640819", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3640819", abstract = "Design science research has traditionally been applied to complex real-world problems to produce an artifact to address such problems. Although design science research \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Fernandez:2024:ABM, author = "Joaquin Delgado Fernandez and Tom Barbereau and Orestis Papageorgiou", title = "Agent-Based Model of Initial Token Allocations: Simulating Distributions post Fair Launch", journal = j-TMIS, volume = "15", number = "1", pages = "5:1--5:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3649318", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3649318", abstract = "With advancements in distributed ledger technologies and smart contracts, tokenized voting rights gained prominence within decentralized finance (DeFi). Voting \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Quattrocchi:2024:DPS, author = "Giovanni Quattrocchi and Willem-Jan van den Heuvel and Damian Andrew Tamburri", title = "The Data Product-service Composition Frontier: a Hybrid Learning Approach", journal = j-TMIS, volume = "15", number = "1", pages = "6:1--6:??", month = mar, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3649319", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Mon Mar 25 11:34:33 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3649319", abstract = "The service dominant logic is a base concept behind modern economies and software products, with service composition being a well-known practice for companies to gain a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Denisenko:2024:PIM, author = "Natalia Denisenko and Youzhi Zhang and Chiara Pulice and Shohini Bhattasali and Sushil Jajodia and Philip Resnik and V. S. Subrahmanian", title = "A Psycholinguistics-inspired Method to Counter {IP} Theft Using Fake Documents", journal = j-TMIS, volume = "15", number = "2", pages = "7:1--7:??", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3651313", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Jun 26 11:03:57 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3651313", abstract = "Intellectual property (IP) theft is a growing problem. We build on prior work to deter IP theft by generating n fake versions of a technical document so a thief has to expend time", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2024:EFF, author = "Pei-Xuan Li and Yu-En Chang and Ming-Chun Wei and Hsun-Ping Hsieh", title = "Estimating Future Financial Development of Urban Areas for Deploying Bank Branches: a Local-Regional Interpretable Model", journal = j-TMIS, volume = "15", number = "2", pages = "8:1--8:??", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3656479", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Jun 26 11:03:57 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3656479", abstract = "Financial forecasting is an important task for urban development. In this article, we propose a novel deep learning framework to predict the future financial potential of urban \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wu:2024:COO, author = "Youxi Wu and Zhen Wang and Yan Li and Yingchun Guo and He Jiang and Xingquan Zhu and Xindong Wu", title = "Co-occurrence Order-preserving Pattern Mining with Keypoint Alignment for Time Series", journal = j-TMIS, volume = "15", number = "2", pages = "9:1--9:??", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3658450", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Jun 26 11:03:57 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3658450", abstract = "Recently, order-preserving pattern (OPP) mining has been proposed to discover some patterns, which can be seen as trend changes in time series. Although existing OPP mining \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Sheng:2024:MMT, author = "Jessica Qiuhua Sheng and Da Xu and Paul Jen-Hwa Hu and Liang Li and Ting-Shuo Huang", title = "Mining Multimorbidity Trajectories and Co-Medication Effects from Patient Data to Predict Post-Hip Fracture Outcomes", journal = j-TMIS, volume = "15", number = "2", pages = "10:1--10:??", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3665250", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed Jun 26 11:03:57 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3665250", abstract = "Hip fractures have profound impacts on patients' conditions and quality of life, even when they receive therapeutic treatments. Many patients face the risk of poor prognosis, physical \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2024:EHU, author = "Yijun Chen and Reuben Kirkham", title = "Exploring How {UK} Public Authorities Use Redaction to Protect Personal Information", journal = j-TMIS, volume = "15", number = "3", pages = "11:1--11:??", month = sep, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3651989", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 21 06:01:20 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3651989", abstract = "Document redaction has become increasingly important for individuals and organizations. This article investigates public-sector information redaction practices in order to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Suttaket:2024:IPM, author = "Thiti Suttaket and Stanley Kok", title = "Interpretable Predictive Models for Healthcare via Rational Multi-Layer Perceptrons", journal = j-TMIS, volume = "15", number = "3", pages = "12:1--12:??", month = sep, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3671150", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 21 06:01:20 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3671150", abstract = "The healthcare sector has recently experienced an unprecedented surge in digital data accumulation, especially in the form of electronic health records (EHRs). These records \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Degha:2024:ICI, author = "Houssem Eddine Degha and Fatima Zohra Laallam", title = "{ICA-CRMAS}: Intelligent Context-Awareness Approach for Citation Recommendation based on Multi-Agent System", journal = j-TMIS, volume = "15", number = "3", pages = "13:1--13:??", month = sep, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3680287", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 21 06:01:20 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3680287", abstract = "Navigating the ever-expanding sea of scientific literature presents a daunting challenge for researchers seeking relevant and up-to-date information. Traditional citation \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhang:2024:MIF, author = "Chenglong Zhang and Varghese S. Jacob and Young U. Ryu", title = "Modeling Individual Fairness Beliefs and Its Applications", journal = j-TMIS, volume = "15", number = "3", pages = "14:1--14:??", month = sep, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3682070", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Sat Sep 21 06:01:20 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3682070", abstract = "One of the criticisms made about data and algorithm-driven intelligent systems is that their results are viewed as being unfair or inequitable by individuals who believe in fairness \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Esmaeili:2024:EIO, author = "Moe Esmaeili and Moez Farokhnia Hamedani and Daniel Zantedeschi and Calvin Sorush Khalesi", title = "Election Interference and Online Propaganda Campaigns: Dynamic Interdependencies on {Facebook}, {Google Trends}, and the {New York Times}", journal = j-TMIS, volume = "15", number = "4", pages = "15:1--15:??", month = dec, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3690828", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Dec 17 10:44:07 MST 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3690828", abstract = "The relationship between propaganda campaigns, news outlets, and search patterns is of significant interest to political authorities and academic scholars from various \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Benjamin:2024:CSS, author = "Victor Benjamin", title = "Considering Socially Scalable Human--Robot Interfaces", journal = j-TMIS, volume = "15", number = "4", pages = "16:1--16:??", month = dec, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3688852", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Dec 17 10:44:07 MST 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3688852", abstract = "Collaborative robots are becoming increasingly present in everyday life, with applications ranging food and parcel delivery, security, and more. They can offer great value \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Guo:2024:APC, author = "Yutong Guo and Chao Ban and Jiang Yang and Khim-Yong Goh and Xiao Liu and Xixian Peng and Xiaobo Li", title = "Analyzing and Predicting Consumer Response to Short Videos in E-Commerce", journal = j-TMIS, volume = "15", number = "4", pages = "17:1--17:??", month = dec, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1145/3690393", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Dec 17 10:44:07 MST 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", URL = "https://dl.acm.org/doi/10.1145/3690393", abstract = "This study analyzes the drivers of and predicts the outcome of consumer response to e-commerce short videos (ESVs) in terms of viewing duration. We first construct a \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chau:2025:RAL, author = "Michael Chau and Jennifer Xu", title = "An {IS} Research Agenda on Large Language Models: Development, Applications, and Impacts on Business and Management", journal = j-TMIS, volume = "16", number = "1", pages = "1:1--1:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3713032", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Large language models have been advancing very rapidly and are making substantial impacts on all areas of business and management. We review the development of large language models and their applications in business and management, and identify the major \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ampel:2025:LLM, author = "Benjamin Ampel and Chi-Heng Yang and James Hu and Hsinchun Chen", title = "Large Language Models for Conducting Advanced Text Analytics Information Systems Research", journal = j-TMIS, volume = "16", number = "1", pages = "2:1--2:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3682069", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The exponential growth of digital content has generated massive textual datasets, necessitating the use of advanced analytical approaches. Large Language Models (LLMs) have emerged as tools that are capable of processing and extracting insights from \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Yuan:2025:IWW, author = "Aijia Yuan and Edlin Garcia Colato and Bernice Pescosolido and Hyunju Song and Sagar Samtani", title = "Improving Workplace Well-being in Modern Organizations: a Review of Large Language Model-based Mental Health Chatbots", journal = j-TMIS, volume = "16", number = "1", pages = "3:1--3:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3701041", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The global rise in mental disorders, particularly in workplaces, necessitated innovative and scalable solutions for delivering therapy. Large Language Model (LLM)-based mental health chatbots have rapidly emerged as a promising tool for overcoming the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{George:2025:UIC, author = "Amrita George and Veda Catherine Storey and Shuguang Hong", title = "Unraveling the Impact of {ChatGPT} as a Knowledge Anchor in Business Education", journal = j-TMIS, volume = "16", number = "1", pages = "4:1--4:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3705734", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The emergence of Large Language Models (LLM), such as ChatGPT, is considered a productivity revolution in many areas of business and society. For a classroom setting, especially, it would be useful to understand whether, and how, to incorporate ChatGPT, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Xing:2025:DHL, author = "Frank Xing", title = "Designing Heterogeneous {LLM} Agents for Financial Sentiment Analysis", journal = j-TMIS, volume = "16", number = "1", pages = "5:1--5:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3688399", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Large language models (LLMs) have drastically changed the possible ways to design intelligent systems, shifting the focus from massive data acquisition and new model training to human alignment and strategic elicitation of the full potential of existing \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Fatemi:2025:CAI, author = "Sorouralsadat Fatemi and Yuheng Hu and Maryam Mousavi", title = "A Comparative Analysis of Instruction Fine-Tuning Large Language Models for Financial Text Classification", journal = j-TMIS, volume = "16", number = "1", pages = "6:1--6:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3706119", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Large Language Models (LLMs) have demonstrated impressive capabilities across diverse Natural Language Processing (NLP) tasks, including language understanding, reasoning, and generation. However, general-domain LLMs often struggle with financial tasks \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "6", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chow:2025:LLL, author = "Rudolf Chow and King Yiu Suen and Albert Y. S. Lam", title = "On Leveraging Large Language Models for Multilingual Intent Discovery", journal = j-TMIS, volume = "16", number = "1", pages = "7:1--7:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3688400", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Intent discovery is vital for any real-world dialogue systems such as chatbot. Since the intents of users naturally change over time, models only trained on a static training set of intents will inevitably fail to detect new intents. While this topic has \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "7", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Le:2025:MBD, author = "Linh Le and Dung Tran", title = "A Metric-Based Detection System for Large Language Model Texts", journal = j-TMIS, volume = "16", number = "1", pages = "8:1--8:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3704739", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "More efforts are being put into improving the capabilities of Large Language Models (LLM) than into dealing with their implications. Current LLMs are able to generate high-quality texts seemingly indistinguishable from those written by human experts. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "8", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ke:2025:HAS, author = "Ping Fan Ke and Ka Chung Ng", title = "Human--{AI} Synergy in Survey Development: Implications from Large Language Models in Business and Research", journal = j-TMIS, volume = "16", number = "1", pages = "9:1--9:??", month = mar, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3700597", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:26:32 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This study examines the novel integration of Large Language Models (LLMs) into the survey development process in business and research through the development and evaluation of the Behavioral Research Assistant (BRASS) Bot. We first analyzed the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "9", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Mao:2025:LTA, author = "Wenji Mao and Xipeng Qiu and Ahmed Abbasi", title = "{LLMs} and Their Applications in Medical Artificial Intelligence", journal = j-TMIS, volume = "16", number = "2", pages = "10:1--10:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3711837", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Medical artificial intelligence (AI) is a cross-disciplinary field focused on developing advanced computing and AI technologies to benefit medicine and healthcare. Globally, medical AI has tremendous potential to support the United Nations' sustainable \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "10", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Liu:2025:DPL, author = "Xiao-Yang Liu and Rongyi Zhu and Daochen Zha and Jiechao Gao and Shan Zhong and Matt White and Meikang Qiu", title = "Differentially Private Low-Rank Adaptation of Large Language Model Using Federated Learning", journal = j-TMIS, volume = "16", number = "2", pages = "11:1--11:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3682068", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The surge in interest and application of large language models (LLMs) has sparked a drive to fine-tune these models to suit specific applications, such as finance and medical science. However, concerns regarding data privacy have emerged, especially when \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "11", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Qin:2025:LMO, author = "Ruiyang Qin and Kai Yang and Ahmed Abbasi and David Dobolyi and Salman Seyedi and Emily Griner and Hyeokhyen Kwon and Robert Cotes and Zifan Jiang and Gari Clifford and Ryan A. Cook", title = "Language Models for Online Depression Detection: a Review and Benchmark Analysis on Remote Interviews", journal = j-TMIS, volume = "16", number = "2", pages = "12:1--12:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3673906", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The use of machine learning (ML) to detect depression in online settings has emerged as an important health and wellness use case. In particular, the use of deep learning methods for depression detection from textual content posted on social media has \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "12", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Dai:2025:MMF, author = "Junqi Dai and Qin Zhu and Jun Zhan and Bo Wang and Xipeng Qiu", title = "{MOSS-MED}: a Family of Multimodal Models Serving Medical Image Analysis", journal = j-TMIS, volume = "16", number = "2", pages = "13:1--13:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3688005", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The remarkable advancements in large language models (LLMs) and large-scale visual encoders have laid a solid foundation for enhancing the capabilities of artificial intelligence (AI) in various application scenarios. In this study, we introduce MOSS-MED, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "13", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wu:2025:ZSC, author = "Ling-I Wu and Yuxin Su and Guoqiang Li", title = "Zero-Shot Construction of {Chinese} Medical Knowledge Graph with {GPT-3.5-turbo} and {GPT-4}", journal = j-TMIS, volume = "16", number = "2", pages = "14:1--14:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3657305", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Knowledge graphs have revolutionized the organization and retrieval of real-world knowledge, prompting interest in automatic natural language processing approaches for extracting medical knowledge from texts. However, the availability of high-quality \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "14", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Dou:2025:SLB, author = "Yutao Dou and Yuwei Huang and Xiongjun Zhao and Haitao Zou and Jiandong Shang and Ying Lu and Xiaolin Yang and Jian Xiao and Shaoliang Peng", title = "{ShennongMGS}: an {LLM}-based {Chinese} Medication Guidance System", journal = j-TMIS, volume = "16", number = "2", pages = "15:1--15:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3658451", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The rapidly evolving field of Large Language Models (LLMs) holds immense promise for healthcare, particularly in medication guidance and adverse drug reaction prediction. Despite their potential, existing LLMs face challenges in dealing with complex \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "15", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhong:2025:UIC, author = "Hao Zhong and Chuanren Liu and Chaojiang Wu", title = "Uncovering {IT} Career Path Patterns with Job Embedding-based Sequence Clustering", journal = j-TMIS, volume = "16", number = "2", pages = "16:1--16:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3712705", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Extracting typical career paths from large-scale and unstructured talent profiles has recently attracted increasing research attention. However, various challenges arise in effectively analyzing self-reported career records. Inspired by recent \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "16", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Qin:2025:CEJ, author = "Chuan Qin and Chuyu Fang and Kaichun Yao and Xi Chen and Fuzhen Zhuang and Hengshu Zhu", title = "{COTR}: Efficient Job Task Recognition for Occupational Information Systems with Class-Incremental Learning", journal = j-TMIS, volume = "16", number = "2", pages = "17:1--17:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3712306", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Occupation-specific job tasks (OSTs) refer to the duties, responsibilities, and activities associated with a particular occupation, which define the core functions and performance expectations for those engaged in that profession. Efficient recognition \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "17", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Ma:2025:JAA, author = "Haiping Ma and Manwei Li and Chuan Qin and Dazhong Shen and Hengshu Zhu and Xingyi Zhang and Hui Xiong", title = "Joint Ability Assessment for Talent Recruitment: a Neural Cognitive Diagnosis Approach", journal = j-TMIS, volume = "16", number = "2", pages = "18:1--18:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3714414", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Ability assessment is a critical task in talent recruitment that aims at identifying the most suitable job candidates by evaluating the alignment of their skills with job requirements. Indeed, traditional ability assessment involves multiple staffing \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "18", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Bhargava:2025:EGA, author = "Hemant K. Bhargava and Susan Brown and Anindya Ghose and Alok Gupta and Dorothy Leidner and D. J. Wu", title = "Exploring Generative {AI}'s Impact on Research: Perspectives from Senior Scholars in Management Information Systems", journal = j-TMIS, volume = "16", number = "2", pages = "19:1--19:??", month = jun, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3721846", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Wed May 21 06:24:34 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "This commentary reflects on insights from a panel discussion at the 2024 Annual MIS Academic Leadership Conference, where six senior MIS scholars discussed the impact of Generative AI on scholarly research and peer review. The discussion underscored the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "19", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Bal:2025:CPD, author = "Pravas Ranjan Bal and Sandeep Kumar", title = "Cross Project Defect Prediction using Dropout Regularized Deep Learning and Unique Matched Metrics", journal = j-TMIS, volume = "16", number = "3", pages = "20:1--20:32", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3698109", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The primary goal of software defect prediction (SDP) is to predict the software defects for a specific software using historical data or data from past releases of software projects. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "20", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Yeo:2025:ISD, author = "M. Lisa Yeo and Hooman Hidaji and Erik Rolland and Raymond A. Patterson and Barrie R. Nault and Bora Kolfal", title = "{IT} Service Disruptions and Provider Choice", journal = j-TMIS, volume = "16", number = "3", pages = "21:1--21:37", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3701040", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Digital supply chains are increasingly interconnected and vulnerable to disruption, causing service interruptions impacting many firms and their customers. Combating \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "21", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Long:2025:DDR, author = "Yuan Long and Arun Rai", title = "Decoding Digital Risk From Corporate Disclosure: a Neural Network Approach", journal = j-TMIS, volume = "16", number = "3", pages = "22:1--22:44", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3728365", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Digital risk -or the likelihood of losses from key digital activities (i.e., information system [IS] sourcing, digital infrastructure, data management, IS applications, IS use, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "22", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zoubek:2025:CSA, author = "Filip Zoubek and Tomasz Miksa and Andreas Rauber", title = "Conceptual service architecture to synchronise research data management services using machine-actionable data management plans", journal = j-TMIS, volume = "16", number = "3", pages = "23:1--23:23", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3712014", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Researchers of all disciplines produce, share, and reuse data as part of everyday research. Most funders require them to manage and document their data using data management \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "23", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Wu:2025:EPM, author = "Han Wu and Le Zhang and Hengshu Zhu and Qi Liu and Enhong Chen and Hui Xiong", title = "Examination Process Modeling for Intelligent Patent Management: a Multi-aspect Neural Sequential Approach", journal = j-TMIS, volume = "16", number = "3", pages = "24:1--24:23", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3712309", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Recently, the booming growth of patent applications has brought an unprecedented challenge in performing efficient intellectual property management. Therefore, \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "24", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Konig:2025:UDP, author = "Fabian K{\"o}nig and Andreas Egger and Wolfgang Kratsch and Maximilian R{\"o}glinger and Niklas W{\"o}rdehoff", title = "Unstructured Data in Process Mining: a Systematic Literature Review", journal = j-TMIS, volume = "16", number = "3", pages = "25:1--25:34", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3727148", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "A large proportion of available data is in unstructured form such as text, image, and video data. As data analysis methods continue to improve, it becomes easier to tap into \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "25", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Storey:2025:KMW, author = "Veda Catherine Storey", title = "Knowledge Management in a World of Generative {AI}: Impact and Implications", journal = j-TMIS, volume = "16", number = "3", pages = "26:1--26:14", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3719209", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The management of organizational and worker knowledge is a critical part of any organization. Knowledge management recognizes the explicit knowledge that workers contribute to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "26", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Yin:2025:SVA, author = "Minglei Yin and Bin Liu and Neil Zhenqiang Gong and Xin Li", title = "Securing Visually-Aware Recommender Systems: an Adversarial Image Reconstruction and Detection Framework", journal = j-TMIS, volume = "16", number = "3", pages = "27:1--27:29", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3743681", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "With rich visual data, such as images, becoming readily associated with items, visually-aware recommendation systems (VARS) have been widely used in different applications. \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "27", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2025:SIE, author = "Wenchang Li and John P. Lalor and Yixing Chen and Vamsi K. Kanuri", title = "From Stars to Insights: Exploration and Implementation of Unified Sentiment Analysis with Distant Supervision", journal = j-TMIS, volume = "16", number = "3", pages = "28:1--28:21", month = sep, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3757747", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Thu Oct 2 12:08:21 MDT 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Sentiment analysis is integral to understanding the voice of the customer and informing businesses' strategic decisions. Conventional sentiment analysis involves three \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "28", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Jiang:2025:IOP, author = "Yiqun Jiang and Shaodong Wang and Qing Li and Wenli Zhang", title = "{ICU} Outcome Predictions Using Real-Time Signals with Wavelet-Transform-based Deep Learning Method", journal = j-TMIS, volume = "16", number = "4", pages = "29:1--29:29", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3727624", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Intensive care units (ICUs) serve patients with life-threatening conditions. However, the availability of ICU resources remains scarce worldwide. Therefore, it is critical to conduct ICU outcome predictions at an early stage and promote efficient use of \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "29", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{He:2025:CIM, author = "Haoran He and Zhao Wang and Hemant Jain and Cuiqing Jiang and Shanlin Yang and Jianfei Wang", title = "Capturing Invariance on Multi-Party Data for Decentralized Credit Scoring", journal = j-TMIS, volume = "16", number = "4", pages = "30:1--30:23", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3728366", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "With the rapid development of financial markets, diverse institutions can collaboratively develop credit scoring models. This collaboration can significantly increase the number of available observations for training the model, which can improve the \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "30", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2025:TTM, author = "Zefeng Chen and Wensheng Gan and Gengsen Huang and Zhenlian Qi and Yan Li and Philip S. Yu", title = "{TALENT}: Targeted Mining of Non-overlapping Sequential Patterns", journal = j-TMIS, volume = "16", number = "4", pages = "31:1--31:34", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3731250", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequences and some non-biological data. This \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "31", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Tao:2025:DMA, author = "Yuqi Tao and Bin Hu and Xiaomeng Ma", title = "Dynamically Measuring, Analyzing and Forecasting Sentiment Resilience in Online Communities", journal = j-TMIS, volume = "16", number = "4", pages = "32:1--32:28", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3744253", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "The sentiment resilience in online communities is an emerging and increasingly important concept. However, current methods for measuring sentiment resilience fail to account for the dynamic characteristics of resilience changes and are also unable to \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "32", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Chen:2025:DAS, author = "Yu-Chen Chen and Pei-Xuan Li and Hsun-Ping Hsieh and Chris Shei", title = "Dual Attention with Self-Adaptive Negative Sampling for Session-Based Recommendation", journal = j-TMIS, volume = "16", number = "4", pages = "33:1--33:21", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3744348", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "In the rapidly evolving landscape of online platforms and e-commerce websites, personalized recommendation plays a crucial role in optimizing user experience. Unlike traditional recommender systems that rely on users' historical records, session-based \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "33", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2025:ADI, author = "Jiaxin Li and Zhenhui Jiang and Yang Liu and Xiaoyu Miao", title = "{AI} Development and Innovation: a Comparison of Large Language Models from the {U.S.} and {China}", journal = j-TMIS, volume = "16", number = "4", pages = "34:1--34:18", month = dec, year = "2025", CODEN = "????", DOI = "https://doi.org/10.1145/3769086", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Fri Nov 21 11:52:02 MST 2025", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", note = "See erratum \cite{Li:2026:EAD}.", abstract = "The strategic significance of Large Language Models (LLMs) in economic expansion, innovation, societal development, and national security has been increasingly recognized since the advent of ChatGPT. This study provides a comprehensive comparative \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "34", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Cao:2026:PDT, author = "Mukun Cao and G. Alan Wang and Paul Benjamin Lowry", title = "Proposing a Design Theory for a Human-Learning-Guided Virtual Negotiator for Online Trading Platforms", journal = j-TMIS, volume = "17", number = "1", pages = "1:1--1:26", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3764663", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Negotiation-based transactional mechanisms provide flexibility and economic benefits to both sellers and buyers on online trading platforms. Although automated negotiation is a highly desired feature among online platform providers, the complexity and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Iyer:2026:UCC, author = "Deepa Iyer and Kalle Lyytinen and William Robinson", title = "The Uncertainty Challenge: To Centralize or Decentralize Requirements Engineering Decision-Making in Open Source Software Development?", journal = j-TMIS, volume = "17", number = "1", pages = "2:1--2:33", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3766893", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Open Source Software Development (OSSD) teams exhibit emergent diverse communication structures due to a continuously changing and largely voluntary membership. Requirements Engineering (RE) practices in OSSD are distributed, dynamic, and depend on how \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "2", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Zhao:2026:MAT, author = "Kai Zhao and Houping Xiao and Arun Rai and Jeongmin Kim", title = "Mobile Analytics Techniques: Survey, Evaluation, and Guidelines", journal = j-TMIS, volume = "17", number = "1", pages = "3:1--3:26", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3770860", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Human mobility prediction underpins diverse applications in marketing, transportation, healthcare, network management, and public safety. Accurately forecasting movement patterns requires capturing both sequential regularities-habitual commutes and \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "3", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Kubrak:2026:SAM, author = "Kateryna Kubrak and Fredrik Milani and Alexander Nolte and Lana Botchorishvili and Marlon Dumas and Mahmoud Shoush", title = "Supporting Analysts and Managers to Utilize Prescriptive Process Monitoring: a User Interface Design and Evaluation", journal = j-TMIS, volume = "17", number = "1", pages = "4:1--4:26", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3777376", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Prescriptive process monitoring techniques recommend actions in an ongoing case of a business process to maximize its success rate. Different techniques have been proposed that focus on the efficiency and precision of recommendations. In contrast, little \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "4", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Bao:2026:EMP, author = "Wei Bao and Ke Lu and Xianwen Fang and Xiwei Zhang", title = "Explainable Multi-perspective Business Process Anomaly Detection Method Based on Graph Neural Networks", journal = j-TMIS, volume = "17", number = "1", pages = "5:1--5:25", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3779301", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", abstract = "Anomalies in business processes can lead to significant losses, making timely detection and handling of these anomalies essential for business process management and optimization. Although current methods in business processes might uncover abnormal cases \ldots{}", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "5", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } @Article{Li:2026:EAD, author = "Jiaxin Li and Zhenhui Jiang and Yang Liu", title = "Erratum: {AI} Development and Innovation: a Comparison of Large Language Models from the {U.S.} and {China}", journal = j-TMIS, volume = "17", number = "1", pages = "1:1--1:??", month = mar, year = "2026", CODEN = "????", DOI = "https://doi.org/10.1145/3799224", ISSN = "2158-656X (print), 2158-6578 (electronic)", ISSN-L = "2158-656X", bibdate = "Tue Mar 17 15:00:50 MDT 2026", bibsource = "https://www.math.utah.edu/pub/tex/bib/tmis.bib", note = "See \cite{Li:2025:ADI}.", abstract = "This is an erratum for the article ``AI Development and Innovation: A Comparison of Large Language Models from the U.S. and China'' published in ACM Trans. Manag. Inform. Syst. 16, 4, Article 34 (November 2025), 18 pages.", acknowledgement = ack-nhfb, ajournal = "ACM Trans. Manag. Inf. Syst.", articleno = "C1", fjournal = "ACM Transactions on Management Information Systems (TMIS)", journal-URL = "https://dl.acm.org/loi/tmis", } %%% TO DO: [19-Sep-2023] Check for new papers in last recorded issue