Export 271 results:
Filters: Keyword is BIS  [Clear All Filters]
N. Ilk and Fan, S., Combining Textual Cues with Social Clues: Utilizing Social Features to Improve Sentiment Analysis in Social Media, Decision Sciences, 2020.
J. Chen, Shao, R., Fan, S., and Li, J., Impact of Team Size on Technological Contributions: Unpacking Disruption and Development, AOM Annual Meeting. Vancouver CA, 2020.
R. Reitsma, Hoglund, B., Marks, A., Chaker, D., and Marks, A., K-12 Engineering and the Next Generation Science Standards (NGSS): A Network Visualization and Analysis, in American Society for Engineering Education (ASEE), 2020.
F. Shadbad, Baham, C., and Biros, D., A Qualitative Approach to Understand Unintentional Information Security Misbehaviors, in Americas Conference on Information Systems, 2020.
V. T. Raja, Lewis, S., and Tolan, J., Teaching and maintaining campus community during a pandemic, Higher Ed Community of Practice - Deloitte Faculty Panel. Portland (Zoom), 2020.
F. Shadbad and Biros, D., Technostress and its Influence on Employee Information Security Policy Compliance, Information Technology and People, 2020.
S. Fan and Ilk, N., A text analytics framework for automated communication pattern analysis, Information & Management, vol. 57, no. 4, 2020.
F. Shadbad and Biros, D., Developing an Unintentional Information Security Misbehavior Scale (UISMS), presented at the 2019, 2019.
R. Reitsma and Marks, A., The Future of Data: Too Much Visualization — Too Little Understanding?, Dialectic, vol. 2, no. 2, 2019.
D. Pan, J. Zhao, L., and Fan, S., Impacts of Consensus Algorithms in Cryptocurrency: A Theoretical Analysis of PoW versus PoS in Ethereum, no. 1. pp. 16-22, 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider’s Weak Password Behavior, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
J. Chen, Shen, J., and Fan, S., Knowledge Networks, Collaboration Networks, and Innovation: A Replication and Extension, Academy of Management Annual Meeting. Boston, 2019.
N. Ilk and Fan, S., A Process Mining Framework for Communication Pattern Analysis in Online Contact Centers, Winter Conference On Business Analytics. Salt lake city, 2019.
B. Hammer, Zhang, T., and Shadbad, F., Psychological Contract Violation and Sharing Intention on Facebook, presented at the 2019, 2019.
N. Ilk, Shang, G., and Fan, S., A Supply and Demand Model for Bitcoin’s Data Space Marketplace, Workshop on Information Technologies and Systems. Munich, 2019.
L. J. Zhao, Fan, S., and Zheng, E., Blockchain-Enabled Trust: The Case of Inter-Firm Dataflow, Americas Conference on Information Systems (AMCIS). New Orleans, 2018.
J. Wu, Fan, S., and J. Zhao, L., Community Engagement and Online Word of Mouth: An Empirical Investigation, Information & Management, vol. 55, no. 2, pp. 258-270, 2018.
J. Chen, Shao, R., and Fan, S., Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation, Academy of Management Annual Conference. Chicago, IL, 2018.
K. Zhang, Fan, S., and Wang, H., An Efficient Recommender System Using Locality Sensitive Hashing, Proceedings of the 51st Hawaii International Conference on System Sciences. Hawaii, 2018.
M. Curry, Marshall, B., Crossler, R., and Correia, J., Fear Appeals Versus Priming in Ransomware Training, in Pre-ICIS Workshop on Information Security and Privacy (WISP 2018), 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
N. Ilk, Fan, S., and Shang, G., Investigating the Fee-Delay Relationship in Cryptocurrency Transactions: Evidence from the Bitcoin Network, Workshop on Information Technologies and Systems. Santa Clara, 2018.
J. Li, Wu, Z., Zhu, B., and Xu, K., Making Sense of Organization Dynamics Using Text Analysis., Expert Systems with Applications, 2018.
R. Reitsma and Krueger, K., A Tale of Two Systems. A Review of the architecting and re-architecting of a long-lived website. 2018.
F. Shadbad, Work Overload and Insiders’ Risk Taking Behaviors as Threats to Cybersecurity, presented at the 2018, 2018.
S. Fan, Li, X., and J. Zhao, L., Collaboration Process Pattern Approach to Improving Teamwork Performance: A Data Mining-Based Methodology, INFORMS Journal on Computing, vol. 29, no. 3, pp. 438-456, 2017.
K. Zun, Zhu, B., and Zuo, M., The Different Behaviors between Product Searchers and Website Searchers, presented at the 2017, 2017.
Z. Liu, Fan, S., Wang, H., and J. Zhao, L., Enabling effective workflow model reuse: A data-centric approach, Decision Support Systems, vol. 93, pp. 11-25, 2017.
S. Fan, Xiao, J. I., Xie, K., and J. Zhao, L., Introduction to the special issue of ECR on E-business innovation with big data, Electronic Commerce Research, 2017.
M. Curry, Marshall, B., and Kawalek, P., A Normative Model for Assessing SME IT Effectiveness, Communications of the IIMA, vol. 15, no. 1, 2017.
B. Marshall, Curry, M., Correia, J., and Crossler, R., Personal Motivation Measures for Personal IT Security Behavior. 2017.
V. Arora and Khazanchi, D., Sense of Virtual Place (SOVP): Conceptual Exploration and Initial Empirical Validation, in AMCIS2017 - Boston, MA, August 10-12, 2017, Boston, MA, 2017.
M. Curry, Marshall, B., Raja, V. T., Reitsma, R., and Wydner, K., BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough. p. 25, 2016.
J. Wang, Yan, X., and Zhu, B., BEHAVIOR THEORY ENABLED GENDER CLASSIFICATION METHOD, in the Fifteeth workshop on e-Business (WeB 2016) in Dublin, 2016.
C. Wang, Zhu, B., and Zuo, M., Differences between Younger and Senior Information Providers in Senior Online Communities, in the Fifteeth workshop on e-Business (WeB 2016) in Dublin, 2016.
D. Khazanchi and Arora, V., Evaluating IT Integration Risk Prior to Mergers and Acquisitions, ISACA Journal, vol. 1, 2016.
C. Wang, Zhu, B., and Zuo, M., Helping Senior Participants Acquire the Right Type of Social Support in Online Communities, in The 10th China Summer Workshop on Information Management (CSWIM 2016), 2016.
M. Curry, Marshall, B., and Crossler, R., Hope for change in individual security behavior assessments, in 2016 Pre-ICIS Workshop on Accounting Information Systems, 2016.
R. Reitsma, Hsieh, P. - H., Diekema, A., Robson, R., and Zarsky, M., Map‑ or List‑based Recommender Agents? Does the Map Metaphor Fulfill its Promise?, Information Visualization, vol. 16, pp. 291-308, 2016.
L. J. Zhao, Fan, S., and Yan, J., Overview of business innovations and research opportunities in blockchain and introduction to the special issue, Financial Innovation, vol. 2, 2016.
S. Fan, Hua, Z., Storey, V., and Zhao, J. L., A Process Ontology Based Approach to Easing Semantic Ambiguity in Business Process Modeling, Data and Knowledge Engineering, vol. 102, 2016.
B. Marshall, (See proceeding paper above) Hope for change in individual security behavior assessments, 2016 Pre-ICIS Workshop on Accounting Information Systems. Dublin, Ireland, 2016.
B. Marshall, Reitsma, R., and Samson, C., Unraveling K-12 Standard Alignment; Report on a New Attempt, in Joint Conference on Digital Libraries, 2016.