Journal Articles
S. Vega Gutierrez, He, Y., Cao, Y., Stone, D., Walsh, Z., Malhotra, R., Chen, H. - L., Chang, C. - H., and Robinson, S.,
“Feasibility and Surface Evaluation of the Pigment from Scytalidium cuboideum for Ink-jet Printing on Textiles”,
Coatings, vol. 9, no. 4, p. 266, 2019.
S. Vega Gutierrez, He, Y., Cao, Y., Stone, D., Walsh, Z., Malhotra, R., Chen, H. - L., Chang, C. - H., and Robinson, S.,
“Feasibility and Surface Evaluation of the Pigment from Scytalidium cuboideum for Ink-jet Printing on Textiles”,
Coatings, vol. 9, no. 4, p. 266, 2019.
C. Brown and Coakley, J.,
“Financial neural Network applications: 1998-1999 update”,
New Review of Applied Expert Systems and Emerging Technologies, vol. 7, pp. 167-182, 2001.
R. Zheng, Li, J., Chen, H., Huang, Z., and Qin, Y.,
“A framework of authorship identification for online messages: Writing style features and classification techniques”,
Journal of the Association for Information Science and Technology, vol. 57, no. 3, pp. 378-393, 2006.
J. Li, Li, X., Su, H., Chen, H., and Galbraith, D. W.,
“A framework of integrating gene functional relations from heterogeneous data sources: An experiment on Arabidopsis thaliana”,
Bioinformatics, vol. 22, no. 16, pp. 2037-2043, 2006.
T. Carroll and Karim, S.,
“A framework of organisations as dynamic structures”,
International Journal of Strategic Change Management, vol. 3, no. 3, pp. 230-246, 2011.
J. Li, Zheng, R., and Chen, H.,
“From fingerprint to writeprint”,
Communications of the ACM, vol. 49, no. 4, pp. 76-82, 2006.
R. M. O'Keefe, Cole, M., Chau, P., Massey, A. P., Montoya, M., and Perry, M.,
“From the User Interface to the Customer Interface: Results from a Global Experiment”,
International Journal of Human-Computer Studies, vol. 53, no. 4, pp. 611-628, 2000.
R. M. O'Keefe, Cole, M., Chau, P., Massey, A. P., Montoya, M., and Perry, M.,
“From the User Interface to the Customer Interface: Results from a Global Experiment”,
International Journal of Human-Computer Studies, vol. 53, no. 4, pp. 611-628, 2000.
J. Michel, Lyons, B., and Cho, J.,
“Is the Full-Range Model of Leadership Really a Full-Range Model of Effective Leader Behavior?”,
Journal of Leadership and Organizational Studies, vol. 18, no. 4, pp. 493-507, 2011.
E. Chang, Burns, L., and Francis, S. K.,
“Gender Differences in the Dimensional Structure of Apparel Shopping Satisfaction Among Korean Consumers: The Role of Hedonic Shopping Value”,
Clothing and Textiles Research Journal, vol. 22, no. 4, pp. 185-199, 2004.
X. Li, Chen, H., Li, J., and Zhang, Z.,
“Gene function prediction with gene interaction networks: a context graph kernel approach”,
IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1, pp. 119-128, 2010.
H. Chen, Lally, A. M., Zhu, B., and Chau, M.,
“HelpfulMed: Intelligent Searching for Medical Information over the Internet”,
Journal of the Association for Information Science and Technology, vol. 54, no. 7, pp. 683-694, 2003.
H. Chen, Lally, A. M., Zhu, B., and Chau, M.,
“HelpfulMed: Intelligent Searching for Medical Information over the Internet”,
Journal of the Association for Information Science and Technology, vol. 54, no. 7, pp. 683-694, 2003.
J. Cho, Schilpzand, P., and Paterson, T.,
“How and When Humble Leadership Facilitates Employee Job Performance: The Roles of Feeling Trusted and Job Autonomy”,
Journal of Leadership and Organizational Studies, vol. 28, no. 2, pp. 169-184, 2020.
V. Gerasymenko, Arthurs, J., and Cho, S. Yul,
“How and When Investment Horizons Determine Venture Capital Firms' Attention Breadth to Portfolio Companies.”,
Entrepreneurship, Theory and Practice, vol. 44, no. 3, pp. 475-503, 2020.
J. Cho, Park, I., and Michel, J.,
“How Does Leadership Affect Information Systems Success? A Role of Transformational Leadership”,
Information & Management, vol. 48, no. 7, pp. 270-277, 2011.
J. Li, Wang, A. Gang, and Chen, H.,
“Identity matching using personal and social identity features”,
Information Systems Frontiers, vol. 13, no. 1, pp. 101-113, 2011.
Y. Ling, Baldridge, D., and Craig, J.,
“The impact of family structure on issue selling by successor generation members in family firms”,
Journal of Family Business Strategy, vol. 3, no. 4, pp. 220–227, 2012.
H. H. Chuang, Lu, G., Peng, D., and Heim, G.,
“Impact of value-added service features in e-Retailing processes: an econometric analysis of website functions”,
Decision Sciences, vol. 45, no. 6, pp. 1159-1186, 2014.
J. Chen, Reilly, R. R., and Lynn, G. S.,
“The Impacts of Speed-to-Market on New Product Success: The Moderating Effects of Uncertainty”,
IEEE Transactions on Engineering Management, vol. 52, no. 2, pp. 199-213, 2005.
A. H. Huffman, Howes, S., Payne, S. C., and Castro, C. A.,
“The importance of construct breadth when examining interrole conflict”,
Educational and Psychological Measurement, vol. 68, pp. 515-530, 2008.
J. Cordiero, Neubaum, D., and Veliyath, R.,
“Incentives for Monitors: Director Stock-based Compensation and Firm Performance”,
Journal of Applied Business Research, vol. 21, no. 2, pp. 81-90, 2005.
L. Steele, Campbell, J., Chen, H., Dhaliwal, D., and Lu, H. -min,
“The information content of mandatory risk factor disclosures in corporate filings”,
Review of Accounting Studies, vol. 19, no. 1, pp. 396-455, 2014.
L. Steele, Campbell, J., Chen, H., Dhaliwal, D., and Lu, H. -min,
“The information content of mandatory risk factor disclosures in corporate filings”,
Review of Accounting Studies, vol. 19, no. 1, pp. 396-455, 2014.
B. Zhu and Chen, H.,
“Information Visualization”,
Annual Review of Information Science and Technology, vol. 39, 2005.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E.,
“InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior”,
Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E.,
“InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior”,
Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.