| Home | CV | Research | Publications | Teaching | Contact me |

 

Publications

Journal Articles

1.    M. Chau & J. Xu, " Business Intelligence in Blogs: Understanding Consumer Interactions and Communities," MIS Quarterly, 36(4), pp.1189-1216, 2012.

2.    S. Kaza, J. Xu, B. Marshall, & H. Chen, "Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security," IEEE Transactions on Intelligent Transportation Systems, 10(1), pp.83-91, 2009.

3.    J. Xu, D. Hu, & H. Chen, "Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad," Journal of Homeland Security and Emergency Management, 6(1), Article 27, 2009.

4.    M. Chau, J. Xu, J. Cao, P. Lam, & B. Shiu, "Blog Mining: A Framework and Example Applications," IEEE IT Professional, 11(1), pp. 36-41, 2009.

5.    J. Xu & H. Chen, "The Topology of Dark Networks," Communications of the ACM, 51(10), pp. 58-65, 2008.

6.    J. Xu, G.A. Wang, J. Li, & M. Chau, "Complex Problem Solving: Identity Matching Based on Social Contextual Information," Journal of Association for Information Systems, 8(10), pp. 525-545, 2007.

7.    G. Leroy, J. Xu, W. Chung, S. Eggers, & H. Chen, "An End User Evaluation of Query Formulation and Result Review Tool in Three Medical Meta-search Engines," International Journal of Medical Informatics, 76(11-12), pp. 780-789, 2007.

8.    M. Chau & J. Xu, "Mining Communities and Their Relationships in Blogs: A Study of Hate Groups," International Journal of Human-Computer Studies, 65, pp. 57-70, 2007.

9.    J. Schroeder, J. Xu, H. Chen, & M. Chau, "Automated Criminal Link Analysis Based on Domain Knowledge," Journal of the American Society for Information Science and Technology, 58(6), pp. 842-855, 2007.

10. H. Chen & J. Xu, "Intelligence and Security Informatics," Annual Review of Information Science and Technology (ARIST), 40, pp.229-289, 2006.

11. Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, & W-H. Chen, "Expertise Visualization: An Implementation and Study Based on Cognitive Fit Theory," Decision Support Systems (DSS), 42(3), pp. 1539-1557, 2006.

12. G. Wang, H. Chen, J. Xu, H. Atabakhsh, "Automatically Detecting Criminal Identity Deception: An Adaptive Detection Algorithm," IEEE Transactions on Systems, Man and Cybernetics, 36(5), pp. 988-999, 2006.

13. J. Xu & H. Chen, "Criminal Network Analysis and Visualization: A Data Mining Perspective," Communications of the ACM (CACM), 48(6), pp. 101-107, 2005.

14. J. Xu & H. Chen, "CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery,"  ACM Transactions on Information Systems (TOIS), 23(2), pp. 201-226, 2005.

15. J. Xu, & H. Chen, "Fighting Organized Crimes: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks," Decision Support Systems (DSS),(38)3,pp.473-487, 2004.

16. H. Chen, W. Chung,J. Xu, G. Wang, M. Chau, & Y. Qin, "Crime Data Mining: A General Framework and Some Examples," IEEE Computer, 37(4), pp.50-56, 2004.

 

Book Chapters

1.    N. Memon, J. Xu, D.L. Hicks, & H. Chen, "Social Network Data Mining: Research Questions, Techniques, and Applications," in N. Memon, J. Xu, D.L. Hicks, & H. Chen (Eds), Data Mining for Social Network Data, Springer, New York, pp. 1-7, 2010.

  1. D. Yates & J. Xu, "Sensor Field Resource Management for Sensor Network Data Mining," in A. Cuzzocrea (Ed.), Intelligent Techniques for Warehousing and Mining Sensor Network, IGI Global, Hershey, PA, pp. 280-304, 2010.

3.    M. Chau & J. Xu, "Using Web Mining and Social Network Analysis to Study the Emergence of Cyber Communities in Blogs," in H. Chen, E. Reid, J. Sinai, A. Silke, & B. Ganor (Eds), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security, Springer, pp. 473-494, 2008.

4.    J. Xu & H. Chen, "Understanding the Nexus of Terrorist Web Sites," in H. Chen & C. Yang (Eds), Intelligence and Security Informatics: Techniques and Applications, pp. 65-78, 2008.

5.    E. Reid, H. Chen, & J. Xu, "Social Network Analysis for Terrorism Research," in H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, & D. Zeng (Eds), National Security: Handbooks in Information Systems, Vol. 2, pp. 243-270, 2007.

6.    D. M. McDonald, H. Su, J. Xu, C.-J. Tseng, H. Chen, & G. Leroy, "Gene Pathway Text Mining and Visualization," in H. Chen, S. Fuller, & A. McCray (Eds.). Medical Informatics: Advances in Knowledge Management and Data Mining in Biomedicine, Springer, pp. 519-546, 2005.

 

Conference Proceedings

1.    J. Xu, W. Lucas, & T. Babaian, “Visualizing Business Processes for Providing ERP Task Support,” in Proceedings of the 7th Pre-ICIS Conference on Enterprise Systems in MIS, Orlando, FL, December 15, 2012

2.    H. Topi & J. Xu, “Developing an Instrument to Measure Enterprise System Users’ Perceptions of System-User Collaboration,” in Proceedings of the 16th Pacific Asia Conference on Information Systems (PACIS’12), Hochiminh City, Vietnam, July 11-15, 2012.

3.    T. Babaian, W. Lucas, J. Xu, & H. Topi, "Usability through System-User Collaboration: Deriving Design Principles for Greater ERP Usability," in Proceedings of the 5th International Conference on Design Science Research in Information Systems and Technology (DESRIST10), St. Gallen, Switzerland, June 4-5, 2010.

4.    Y. Zhang, J. Xu, & Q. Zhu, "Effectiveness of Electronic Word-of-Mouth: The Impact of Message Type, Tie Strength, and Message Delivery Method," in Proceedings of the 9th Workshop on e-Business (We-B10), St. Louis, MO, December 11, 2010.

5.    W. Lucas, T. Babaian, J. Cooprider, H. Topi, & J. Xu, "Applying Human-Computer Collaboration for Improving ERP Usability: Extended Abstract," in Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems (CTS10), pp. 396-397, Lombard, IL, 2010.

6.    J. Cooprider, H. Topi, J. Xu, M. Dias, T. Babaian, & W. Lucas, "A Collaboration Model for ERP User-System Interaction," in Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS 2010), Kauai, HI, January 5-8, 2010.

7.    J. Xu, "Identifying Cohesive Local Community Structure in Networks," in Proceedings of the 30th International Conference on Information Systems (ICIS 2009), Phoenix, AZ, December 15-18, 2009.

8.    J. Cao, T. Knotts, J. Xu, & M. Chau "Word of Mouth Marketing through Online Social Networks," in Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), San Francisco, CA, August 6-9, 2009.

9.    the 6th Workshop on e-Business (We-B 2007), Montreal, Quebec, Canada, December 9, 2007.

10. (ICIS 2006), Milwaukee, WI, December 10-13, 2006.

11. International Conference on Information Systems (ICIS 2006), Milwaukee, WI, December 10-13, 2006.

12. S. Weisband, S. M. B. Thatcher, & J. Xu, "Using Bibliometric Analysis to Evaluate Scientific Progress in Virtual Teams Research," in Proceedings of the 65th Academy of Management Annual Meeting, Honolulu, HW, August 5-10, 2005.

13. J. Qin, J.Xu, D. Hu, M. Sageman, & H. Chen, "Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network," in Proceedings of the 3rd NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’05), Atlanta, GA, May 19-20, 2005.

14. J. Xu, "Criminal Relation Exploration Tool for Law Enforcement Knowledge Management," in Proceedings of Americas Conference on Information Systems (AMCIS’04), New York, NY, August 6-8, 2004.

15. J. Xu, B. Marshall, S. Kaza, & H. Chen, "Analyzing and Visualizing Criminal Network Dynamics: A Case Study," in Proceedings of the 2nd NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’04), Tucson, AZ, June 10-11, 2004.

16. Z. Huang, H. Chen, F. Guo, J. Xu, S. Wu, & W-H. Chen, "Visualizing the Expertise Space," in Proceedings of the 37th Hawaii International Conference on System Science(HICSS’37), Big Island, Hawaii, January 5-8, 2004.

17. J. Xu & H. Chen, "Untangling Criminal Networks: A Case Study," in Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’03), Tucson, AZ, June 2-4, 2003.

18. J. Schroeder, J. Xu, & H. Chen, "CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis," in Proceedings of the 1st NSF/NIJ Symposium on Intelligence and Security Informatics (ISI’03), Tucson, AZ, June 2-4, 2003.

19. G. Leroy, H. Chen, J. Martinez, S. Eggers, R. Falsey, K. Kislin, Z. Huang, J. Li, J. Xu, D. McDonald, & G. Ng. "Genescene: Biomedical Text and Data Mining," in Proceedings of the 3rd ACM/IEEE Joint Conference on Digital Libraries (JCDL ’03), Houston, TX, May 27-31, 2003.

20. H. Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G. Wang, R. Zheng, & H. Atabakhsh, "Crime Data Mining: An Overview and Case Studies," in Proceedings of the 3rd National Conference for Digital Government Research (dg.o 2003), Boston, MA, May 18-21, 2003.

21. J. Xu & H. Chen, "Using Shortest Path Algorithms to Identify Criminal Associations," in Proceedings of the 2nd National Conference for Digital Government Research (dg.o), Los Angeles, CA, May 19-22, 2002.

22. M. Chau, J. Xu, & H. Chen, "Extracting Meaningful Entities from Police Narrative Reports," in Proceedings of the 2nd National Conference for Digital Government Research (dg.o 2002), Los Angeles, CA, May 19-22, 2002.

 

Copyright © 2012 Jennifer Xu. All Rights Reserved.