Jennifer Jie Xu

Associate Professor

Computer Information Systems

Bentley University

Waltham, MA 02452

Tel: (781) 891-2711     Fax: (781) 891-2949

Email: jxu at Bentley dot edu

 

 

 

 

Biographical Sketch

Jennifer J. Xu is an Associate Professor of Computer Information Systems at Bentley University. She received her PhD in Management Information Systems from the University of Arizona in 2005. Her research interests include business intelligence and analytics, data science, FinTech, social network analysis, human-computer interaction, and enterprise systems. She has published more than 60 articles in Information Systems journals, books, and conference proceedings. She is currently serving on the editorial boards of Journal of the Association for Information Systems (JAIS), Communications of the AIS (CAIS), and Journal of Security Informatics.

Curriculum Vitae >>

Selected Publications

·         M. Chau, M.H. Li, P.W.C. Wong, J. Xu, P.S.F. Yip, & H. Chen (forthcoming), "Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification," MIS Quarterly.

·         J. Xu, J. Fedorowicz, & C.B. Williams, “Effects of Symbol Sets and Needs Gratifications on Audience Engagement: Contextualizing Police Social Media CommunicationJournal of Association for Information Systems, 20(5), pp. 536-569, 2019.

·         M. Frydenberg & J. Xu, “Easy as Py: A First Course in Python with a Taste of Data Analytics,” Information Systems Education Journal, 17(4), pp. 4-15, 2019.

·         C.B. Williams, J. Fedorowicz, A. Kavanaugh, K. Mentzer, J.B. Thatcher, & J. Xu, "Leveraging Social Media: The community Policing Case," Government Information Quarterly, 35 (2), 210-222, 2018.

·         J. Xu & M. Chau, "Cheap Talk? The Impact of Lender-Borrower Communication on P2P Lending Outcomes," Journal of Management Information Systems, 35(1), pp. 53-85, 2018.

·         T. Babaian, J. Xu, & W. Lucas, "ERP Prototype with Built-in Task and Process Support," European Journal of Information Systems, 27(2), pp. 189-206, 2018.

·         J. Xu & H. Topi, "A Conceptual Model for User-System Collaboration: Enhancing Usability of Complex Information Systems," Communications of the AIS, 41, Article 31, 2017.

·         K. Liu, J. Yu, J. Zhao, Y. Zhou, N. Xiong, J. Xu, T, Wang, R. L. Bell, H. Qing, & Z. Lin, “AZI23’UTR Is a New SLC6A3 Downregulator Associated with an Epistatic Protection Against Substance Use DisordersMolecular Neurobiology, October 2017, pp. 1-12, 2017.

·         J. Xu, "Are Blockchains Immune to All Malicious Attacks?" Financial Innovation, 2, Article 25, 2016.

·         J. Xu, M. Chau, & B. Tan, "The Development of Social Capital in the Collaboration Network of IS Scholars," Journal of the Association for Information Systems, 15(2), pp.835-859, 2014.

·         M. Chau & J. Xu, "Business Intelligence in Blogs: Understanding Consumer Interactions and Communities," MIS Quarterly, 36(4), pp.1189-1216, 2012.

·         S. Kaza, J. Xu, B. Marshall, & H. Chen, “Topological Analysis of Criminal Activity Networks: Enhancing Transportation SecurityIEEE Transactions on Intelligent Transportation Systems, 10(1), pp. 83-91, 2009.

·         J. Xu, D. Hu, & H. Chen, “Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi JihadJournal of Homeland Security and Emergency Management, 6(1), Article 27, 2009.

·         M. Chau, J. Xu, J. Cao, P. Lam, & B. Shiu, “Blog Mining: A Framework and Example ApplicationsIEEE IT Professional, 11(1), pp. 36-41, 2009, 2009.

·         J. Xu & H. Chen, “The Topology of Dark NetworksCommunications of the ACM, 51(10), pp. 58-65, 2008.

·         J. Xu, G. A. Wang, J. Li, & M. Chau, “Complex Problem Solving: Identity Matching Based on Social Contextual InformationJournal of the Association for Information Systems, 8(10), pp. 525-545, 2007.

·         G. Leroy, J. Xu, W. Chung, S. Eggers, & H. Chen, “An End User Evaluation of Query Formulation and Result Review Tool in Three Medical Meta-search Engines,” International Journal of Medical Informatics, 76(11-12), pp. 780-789, 2007.

·         M. Chau & J. Xu, “Mining Communities and Their Relationships in Blogs: A Study of Hate GroupsInternational Journal of Human-Computer Studies, 65(1), pp. 57-70, 2007.

·         J. Schroeder, J. Xu, H. Chen, & M. Chau, “Automated Criminal Link Analysis Based on Domain KnowledgeJournal of the American Society for Information Science and Technology, 58(6), pp. 842-855, 2007.

·         H. Chen & J. Xu, “Intelligence and Security InformaticsAnnual Review of Information Science and Technology, 40, pp. 229-289, 2006.

·         Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, & W-H. Chen, “Expertise Visualization: An Implementation and Study Based on Cognitive Fit TheoryDecision Support Systems, 42(3), pp. 1539-1557, 2006.

·         G. Wang, H. Chen, J. Xu, & H. Atabakhsh, “Automatically Detecting Criminal Identity Deception: An Adaptive Detection AlgorithmIEEE Transactions on Systems, Man and Cybernetics, 36(5), pp. 988-999, 2006.

·         J. Xu & H. Chen, “CrimeNet Explorer: A Framework for Criminal Network Knowledge DiscoveryACM Transactions on Information Systems, 23(2), pp. 201-226, 2005.

·         J. Xu & H. Chen, “Criminal Network Analysis and Visualization: A Data Mining PerspectiveCommunications of the ACM, 48(6), pp. 101-107, 2005.

·         J. Xu & H. Chen, “Fighting Organized Crimes: Using Shortest-Path Algorithms to Identify Associations in Criminal NetworksDecision Support Systems, 38(3), pp.473-487, 2004.

·         H. Chen, W. Chung, J. Xu, G. Wang, M. Chau, & Y. Qin, “Crime Data Mining: A General Framework and Some ExamplesIEEE Computer, 37(4), pp.50-56, 2004.