Export 214 results:
Filters: Keyword is BIS  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L. Carlson, Reitsma, R., Brandemuehl, M., Hertzberg, J., Sullivan, J., and Gabbard, S., Exploiting Engineering as a Unique Distance Learning Tool 19, 379-388, International Journal of Engineering Education, vol. 19, pp. 379-388, 2003.
W. Chai, Zuo, M., Zhu, B., and Tian, X., PREDICTING HABITUAL CONTINUING SOCIAL NETWORKING SITES USE OF THE ELDERLY, in Workshop on Doing IS Research in China, The 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, 2015.
G. Chen, Li, J., Yan, P., and Kerre, E. E., Discovering association rules with degrees of support and implication (ARsi), Computational Intelligent Systems for Applied Research: Proceedings of the 5th International Flins Conference. Gent, Belgium, 2002.
H. Chen, Lally, A. M., Zhu, B., and Chau, M., HelpfulMed: Intelligent Searching for Medical Information over the Internet, Journal of the Association for Information Science and Technology, vol. 54, no. 7, pp. 683-694, 2003.
J. Chen, Shao, R., and Fan, S., Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation, Academy of Management Annual Conference. Chicago, IL, 2018.
M. Curry, Lightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy., Natural Areas Association 2009 Conference. Vancouver, WA, 2009.
M. Curry, Marshall, B., and Kawalek, P., Improving IT Assessment with IT Artifact Affordance Perception Priming, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.
M. Curry and Marshall, B., Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices, in 2015 Pre-ICIS Workshop on Accounting Information Systems, 2015.
M. Curry, IT Effectiveness Norms and Organizational Success: a Literature Review, Doctoral Symposium. Manchester, UK, 2012.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Raja, V. T., Reitsma, R., and Wydner, K., BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough. p. 25, 2016.
M. Curry and Marshall, B., Disentangling IT Artifact Bias, 4th Annual Pre-ICIS Workshop on Accounting Information Systems. Orlando, Florida, 2012.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider’s Weak Password Behavior, Journal of Information Systems.
M. Curry, eConsulting to improve the client's bottom line., CONFAB: the Next Generation Consultant. Reno, NV, 2007.
M. Curry, Marshall, B., and Crossler, R., Hope for change in individual security behavior assessments, in 2016 Pre-ICIS Workshop on Accounting Information Systems, 2016.
M. Curry, Marshall, B., and Kawalek, P., IT Artifact Bias: How exogenous predilections influence organizational information system paradigms, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.
M. Curry, Internet Marketing: How to Use SEO and Social Networking to Reach Clients, Monthly IMC PDX Meeting. Portland, OR, 2009.
M. Curry, Marshall, B., and Kawalek, P., A Normative Model for Assessing SME IT Effectiveness, Communications of the IIMA, vol. 15, no. 1, 2017.
S. Fan, Li, X., and J. Zhao, L., Collaboration Process Pattern Approach to Improving Teamwork Performance: A Data Mining-Based Methodology, INFORMS Journal on Computing, 2017.
S. Fan and Wanchun, D., Complex Problem Solving based on Complex Problem Definition Model, Application Research of Computers, vol. 25, no. 3, 2008.
S. Fan, Zhao, J. L., Liu, M., and Dou, W., A Framework for the Transformation from Conceptual to Logical Workflow Models, Decision Support Systems, vol. 55, no. 1, 2012.
S. Fan, Hua, Z., Storey, V., and Zhao, J. L., A Process Ontology Based Approach to Easing Semantic Ambiguity in Business Process Modeling, Data and Knowledge Engineering, vol. 102, 2016.
S. Fan, Lau, R., and Zhao, J. L., Demystifying big data analytics through the lens of marketing mix, Big Data Research, vol. 2, no. 1, 2015.
S. Fan, Xiao, J. I., Xie, K., and J. Zhao, L., Introduction to the special issue of ECR on E-business innovation with big data, Electronic Commerce Research, 2017.
S. Fan, Kang, L., and Zhao, J. L., Workflow-Aware Attention Tracking to Enhance Collaboration Management, Information Systems Frontiers, vol. 17, no. 6, 2015.
S. Fan, Wanchun, D., and Xiping, L., Context-aware Resource Access Control in Scientific Workflows, Computer Engineering and Design, vol. 29, no. 2, 2008.
J. Feng, Yao, Z., Zhu, B., and Marshall, B., Weather Factors and Online Product/Service Reviews, in 'Doing IS Research in China' Workshop of the Pacific Asia Conference on Information Systems (PACIS 2015), 2015.
B. T. Han and Raja, V. T., A GRASP Heuristic for Solving an Extended Capacitated Concentrator Location Problem, International Journal of Information Technology and Decision Making, vol. 2, no. 4, pp. 597-618, 2003.
N. Handly, Thompson, D. A., Li, J., Chuirazzi, D. M., and Venkat, A., Evaluation of a hospital admission prediction model adding coded chief complaint data using neural network methodology, European journal of emergency medicine : official journal of the European Society for Emergency Medicine, 2014.
N. Handly, Li, J., Thompson, D. A., Venkat, A., and Chuirazzi, D. M., Derivation of hospital admission prediction models based on coded chief complaint, demographic, patient acuity and emergency department (ED) operational data available at ED triage, 2011 Society for Academic Emergency Medicine (SAEM) Annual Meeting. Boston, MA, USA, 2011.
D. Hu, Li, J., Yang, X., and Yan, J., Identifying hidden community elites in online social networks, China Summer Workshop on Information Management (CSWIM 2013). Tianjin, China, 2013.
Z. Huang, Li, J., Su, H., Watts, G. S., and Chen, H., Large-scale regulatory network analysis from microarray data: Modified Bayesian network learning and association rule mining, Decision Support Systems, vol. 43, pp. 1207-1225, 2007.
L. Jiang, Yang, C. C., and Li, J., Discovering Consumer Health Expressions from Consumer-Contributed Content, 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013). Washington DC, USA, 2013.
G. Leroy, Chen, H., Martinez, J., Eggers, S., Falsey, R., Kislin, K., Huang, Z., Li, J., Xu, J., McDonald, D., and Ng, G., Genescene: Biomedical text and data mining, ACM/IEEE Joint Conference on Digital Libraries (JCDL 2003). Houston, TX, USA, 2003.
J. Li and G. Wang, A., Criminal identity resolution using social behavior and relationship attributes, IEEE International Conference on Intelligence and Security Informatics (ISI 2011). Beijing, China, 2011.
J. Li, Xia, L., and Zhou, X., Theme creation for digital collections, International Dublin Core and Metadata Applications (DC 2008). Berlin, Germany, 2008.
J. Li, Su, H., and Chen, H., Optimal search based gene selection for cancer prognosis, Americas Conference on Information Systems (AMCIS’05). Omaha, NE, 2005.
J. Li, Wang, H. Jianan, Zhang, Z., and J Zhao, L., A policy-based process mining framework: Mining business policy texts for discovering process models, Information Systems and e-Business Management, vol. 8, pp. 169-188, 2010.
J. Li, Zheng, R., and Chen, H., From fingerprint to writeprint, Communications of the ACM, vol. 49, no. 4, pp. 76-82, 2006.