Export 368 results:
Filters: Keyword is BIS  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
J. Xu, Wang, A. G., Li, J., and Chau, M., Complex problem solving: A case study on identity matching based on social contextual information, Journal of the Association for Information Systems: Special Issue Enid Mumford's Contribution to Information Systems Theory and Theoretical Thinking, vol. 8, no. 10, p. Article 31, 2007.
S. Fan and Wanchun, D., Complex Problem Solving based on Complex Problem Definition Model, Application Research of Computers, vol. 25, no. 3, 2008.
D. Sullivan, Nielson, N., and Brown, C., Computer-Mediated Peer Review of Student Papers, The Journal of Education for Business, vol. 74, no. 2, pp. 117-121, 1998.
N. Roberts and Thatcher, J., Conceptualizing and Testing Formative Constructs: Tutorial and Annotated Example, 2009.
G. Polites, Roberts, N., and Thatcher, J., Conceptualizing Models Using Multidimensional Constructs: A Review and Guidelines for their Use, 2012.
C. Brown, Coakley, J., and Eining, M. M., Conference Report: The Fourth International Symposium on Intelligent Systems in Accounting, Finance and Management, International Journal of Intelligent Systems in Accounting Finance and Management, vol. 3, no. 3, pp. 223-235, 1994.
A. Chen and Roberts, N., Connecting Personality Traits to Social Networking Site Addiction: The Mediating Role of Motives, 2019.
N. Roberts and Gerow, J., Connecting the Role of the Information Technology Function to its Contribution to the Organization, 2020.
V. Arora and Semken, S., Connecting to Place - Virtually. 2020.
R. Reitsma, Sautins, A., and Wehrend, S., Construction Kit for Visual Programming of River-Basin Models, Journal of Computing in Civil Engineering, vol. 8, pp. 378-384, 1994.
D. Wanchun, Chen, J., Fan, S., and Cheung, S. C., A context- and role-driven scientific workflow development pattern, Concurrency and Computation: Practice and Experience, vol. 20, no. 15, pp. 1741-1757, 2008.
S. Fan, Wanchun, D., and Xiping, L., Context-aware Resource Access Control in Scientific Workflows, Computer Engineering and Design, vol. 29, no. 2, 2008.
Mellott, Roberts, N., and Thatcher, J., Control Mechanisms and Deployed Electronic Medical Record Policy Compliance: A Principal-Agent Perspective, presented at the 2011, 2011.
M. Mellott, Thatcher, J., and Roberts, N., Control Mechanisms and Electronic Medical Record Compliance in a Combat Environment: An Empirical Investigation, presented at the 2012, 2012.
B. Zhu, Ramsey, M., Chen, H., Hauck, R. V., Ng, T. D., and Schatz, B., Creating a Large Scale Digital Library for Geo-Referenced Information, Digital Library‘99, the 4th ACM Conference on Digital Libraries. 1999.
B. Zhu, Ramsey, M., and Chen, H., Creating a Large-Scale Content-Based Air Photo Image Digital Library, IEEE Transactions on Image Processing, vol. 9, no. 1, pp. 163-167, 2000.
Y. Bian, Fan, S., Ye, R. Liying, and J. Zhao, L., Credit Risk Assessment of POS-Loans in the Big Data Era, Workshop on Internet and BigData Finance (WIBF). Hongkong, China, 2014.
J. Li and G. Wang, A., Criminal identity resolution using social behavior and relationship attributes, IEEE International Conference on Intelligence and Security Informatics (ISI 2011). Beijing, China, 2011.
D
G. Shankaranarayanan and Zhu, B., Data Quality Metadata and Decision Making, in 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings,, Grand Wailea, Maui, HI, USA, 2012, pp. 1434-1443.
B. Zhu and Olson, M., Data/Knowledge Management for LIDAR Data Users/Researchers, NSF I/UCRC Center for e-Design Strategic Planning Meeting. Oregon State University, 2013.
G. Shankaranarayanan, Zhu, B., and Cai, Y., Decision support with data quality metadata, International Conference on Information Quality 2008. Boston, MA, 2008.
B. Marshall, Mortenson, K., Bourne, A., Price, K., and Marshall, A., Delivering Value Beyond Efficiency with Visualized XBRL, in International Conference on Information Systems (ICIS 2009), Phoenix, AZ, 2009.
S. Fan, Lau, R., and Zhao, J. L., Demystifying big data analytics through the lens of marketing mix, Big Data Research, vol. 2, no. 1, pp. 28-32, 2015.
N. Handly, Li, J., Thompson, D. A., Venkat, A., and Chuirazzi, D. M., Derivation of hospital admission prediction models based on coded chief complaint, demographic, patient acuity and emergency department (ED) operational data available at ED triage, 2011 Society for Academic Emergency Medicine (SAEM) Annual Meeting. Boston, MA, USA, 2011.
B. Zhu and Iyer, B., The Design for an Effective Knowledge Repository System, Minnesota Symposium on Knowledge Management. Minneapolis, MN, 2003.
L. Kang, Fan, S., and J. Zhao, L., The Design of IdeaWorks: Applying Social Learning Networks to Support Tertiary Education, 2015 International Conference on HCI in Business. 2015.
X. Liu, Wanchun, D., Chen, J., Fan, S., Cheung, S. C., and Cai, S., On Design, Verification, and Dynamic Modification of the Problem-Based Scientific Workflow Model, Simulation Modeling Practice and Theory, vol. 15, no. 9, 2007.
J. Chen, Shao, R., and Fan, S., Destabilization and Consolidation: Conceptualizing, Measuring, and Validating the Dual Characteristics of Technology, Research Policy, vol. 50, no. 1, pp. 104-115, 2021.
F. Shadbad and Biros, D., Developing an Unintentional Information Security Misbehavior Scale (UISMS), in Proceeding of Midwest Association for Information Systems, 2019.
J. Chen, Shao, R., and Fan, S., Development of Context-based Indices for Measuring Dynamic and Dualistic Nature of Innovation, Academy of Management Annual Conference. Chicago, IL, 2018.
C. Wang, Zhu, B., and Zuo, M., Differences between Younger and Senior Information Providers in Senior Online Communities, in the Fifteeth workshop on e-Business (WeB 2016) in Dublin, 2016.
K. Zun, Zhu, B., and Zuo, M., The Different Behaviors between Product Searchers and Website Searchers, presented at the 2017, 2017.
J. Gerow, Grover, V., Roberts, N., and Thatcher, J., The Diffusion of Second Generation Statistical Techniques in Information Systems Research from 1990-2008, 2010.
N. Roberts and Kim, I., Digital Platform Life Cycles in Nascent Markets, Front Range Information Systems Research Seminar. 2019.
B. Marshall, Reitsma, R., and Zarske, M., Dimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum, in Proceedings of the Joint Conference on Digital Libraries (JCDL'09), Austin, TX, 2009.
E. V. Poole, Li, J., and Park, J. - R., Discourse Analysis of the Question-Answering Service of the Internet Public Library, Annual Conference of Association for Library and Information Science Education (ALISE 2010). Boston, MA, USA, 2010.
G. Chen, Li, J., Yan, P., and Kerre, E. E., Discovering association rules with degrees of support and implication (ARsi), Computational Intelligent Systems for Applied Research: Proceedings of the 5th International Flins Conference. Gent, Belgium, 2002.
L. Jiang, Yang, C. C., and Li, J., Discovering Consumer Health Expressions from Consumer-Contributed Content, 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013). Washington DC, USA, 2013.
K. Xu, Guo, X., Li, J., Lau, R. Y. K., and Liao, S. Shaoyi, Discovering target groups in social networking sites: An effective method for maximizing joint influential power, Electronic Commerce Research and Applications, vol. 11, no. 4, pp. 318-334, 2012.
M. Curry and Marshall, B., Disentangling IT Artifact Bias, 4th Annual Pre-ICIS Workshop on Accounting Information Systems. Orlando, Florida, 2012.
D. Pan, J. Zhao, L., Fan, S., and Zhang, Z., Dividend or No Dividend in Delegated Blockchain Governance: A Game Theoretic Analysis, Journal of Systems Science and Systems Engineering, pp. 1-19, 2021.
R. Klein and Roberts, N., Do As Others Do: Modeling IT Adoption Intentions through Institutional and Social Contagion Theories, presented at the 2007, 2007.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
N. Roberts, Kim, I., Iyengar, K., and Gerow, J., Does Platform Control Matter? A Meta-Analysis, Front Range Information Systems Research Seminar. 2022.
F. Shadbad and Biros, D., Does Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions, 2021.
B. Marshall, Curry, M., and Reitsma, R., Does Using CobiT Improve IT Solution Proposals?, in AAA Annual Meeting, IS Section, 2010.

Pages