|
Publications
Journal Articles
1. M.
Chau & J. Xu, " Business
Intelligence in Blogs: Understanding Consumer Interactions and
Communities," MIS Quarterly, 36(4), pp.1189-1216, 2012.
2. S.
Kaza, J. Xu, B. Marshall, & H. Chen,
"Topological Analysis of Criminal Activity Networks: Enhancing
Transportation Security," IEEE Transactions on Intelligent
Transportation Systems, 10(1), pp.83-91, 2009.
3. J.
Xu, D. Hu, & H. Chen, "Dynamics of Terrorist Networks:
Understanding the Survival Mechanisms of Global Salafi
Jihad," Journal of Homeland Security and Emergency Management,
6(1), Article 27, 2009.
4. M.
Chau, J. Xu, J. Cao, P. Lam, & B. Shiu, "Blog Mining: A Framework and Example
Applications," IEEE IT Professional, 11(1), pp. 36-41,
2009.
5. J.
Xu & H. Chen, "The Topology of Dark Networks," Communications
of the ACM, 51(10), pp. 58-65, 2008.
6. J.
Xu, G.A. Wang, J. Li, & M. Chau,
"Complex Problem Solving: Identity Matching Based on Social
Contextual Information," Journal of Association for Information
Systems, 8(10), pp. 525-545, 2007.
7. G.
Leroy, J. Xu, W. Chung, S. Eggers, & H. Chen, "An End User
Evaluation of Query Formulation and Result Review Tool in Three Medical
Meta-search Engines," International Journal of Medical
Informatics, 76(11-12), pp. 780-789, 2007.
8. M.
Chau & J. Xu, "Mining Communities
and Their Relationships in Blogs: A Study of Hate Groups," International
Journal of Human-Computer Studies, 65, pp. 57-70, 2007.
9. J.
Schroeder, J. Xu, H. Chen, & M. Chau,
"Automated Criminal Link Analysis Based on Domain Knowledge,"
Journal of the American Society for Information Science and
Technology, 58(6), pp. 842-855, 2007.
10. H.
Chen & J. Xu, "Intelligence and Security Informatics," Annual
Review of Information Science and Technology (ARIST), 40,
pp.229-289, 2006.
11. Z.
Huang, H. Chen, F. Guo, J. Xu, S. Wu, &
W-H. Chen, "Expertise Visualization: An Implementation and Study
Based on Cognitive Fit Theory," Decision Support Systems
(DSS), 42(3), pp. 1539-1557, 2006.
12. G.
Wang, H. Chen, J. Xu, H. Atabakhsh,
"Automatically Detecting Criminal Identity Deception: An Adaptive
Detection Algorithm," IEEE Transactions on Systems, Man and
Cybernetics, 36(5), pp. 988-999, 2006.
13. J.
Xu & H. Chen, "Criminal Network Analysis and Visualization: A
Data Mining Perspective," Communications of the ACM (CACM),
48(6), pp. 101-107, 2005.
14. J.
Xu & H. Chen, "CrimeNet Explorer: A
Framework for Criminal Network Knowledge Discovery," ACM Transactions on Information
Systems (TOIS), 23(2), pp. 201-226, 2005.
15. J.
Xu, & H. Chen, "Fighting Organized Crimes: Using Shortest-Path
Algorithms to Identify Associations in Criminal Networks," Decision
Support Systems (DSS),(38)3,pp.473-487,
2004.
16. H.
Chen, W. Chung,J. Xu,
G. Wang, M. Chau, & Y. Qin, "Crime
Data Mining: A General Framework and Some Examples," IEEE
Computer, 37(4), pp.50-56, 2004.
Book Chapters
1. N.
Memon, J. Xu, D.L. Hicks, & H. Chen,
"Social Network Data Mining: Research Questions, Techniques, and
Applications," in N. Memon, J. Xu, D.L.
Hicks, & H. Chen (Eds), Data Mining
for Social Network Data, Springer, New York, pp. 1-7, 2010.
- D. Yates & J. Xu,
"Sensor Field Resource Management for Sensor Network Data
Mining," in A. Cuzzocrea (Ed.), Intelligent
Techniques for Warehousing and Mining Sensor Network, IGI
Global, Hershey, PA, pp. 280-304, 2010.
3. M.
Chau & J. Xu, "Using Web Mining and
Social Network Analysis to Study the Emergence of Cyber Communities in
Blogs," in H. Chen, E. Reid, J. Sinai, A. Silke,
& B. Ganor (Eds),
Terrorism Informatics: Knowledge Management and Data Mining for
Homeland Security, Springer, pp. 473-494, 2008.
4. J.
Xu & H. Chen, "Understanding the Nexus of Terrorist Web
Sites," in H. Chen & C. Yang (Eds), Intelligence
and Security Informatics: Techniques and Applications, pp. 65-78,
2008.
5. E.
Reid, H. Chen, & J. Xu, "Social Network Analysis for Terrorism
Research," in H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, & D. Zeng (Eds), National Security: Handbooks in
Information Systems, Vol. 2, pp. 243-270, 2007.
6. D.
M. McDonald, H. Su, J. Xu, C.-J. Tseng, H. Chen, & G. Leroy,
"Gene Pathway Text Mining and Visualization," in H. Chen, S.
Fuller, & A. McCray (Eds.). Medical Informatics: Advances in
Knowledge Management and Data Mining in Biomedicine, Springer, pp.
519-546, 2005.
Conference Proceedings
1. J.
Xu, W. Lucas, & T. Babaian, “Visualizing Business Processes for
Providing ERP Task Support,” in Proceedings
of the 7th Pre-ICIS Conference on Enterprise Systems in MIS,
Orlando, FL, December 15, 2012
2. H.
Topi & J. Xu, “Developing an Instrument to Measure Enterprise System
Users’ Perceptions of System-User Collaboration,” in Proceedings of the 16th Pacific Asia
Conference on Information Systems (PACIS’12), Hochiminh City,
Vietnam, July 11-15, 2012.
3. T.
Babaian, W. Lucas, J. Xu, & H. Topi, "Usability through
System-User Collaboration: Deriving Design Principles for Greater ERP
Usability," in Proceedings of the 5th International
Conference on Design Science Research in Information Systems and
Technology (DESRIST10),
St. Gallen, Switzerland, June 4-5, 2010.
4. Y.
Zhang, J. Xu, & Q. Zhu, "Effectiveness of Electronic
Word-of-Mouth: The Impact of Message Type, Tie Strength, and Message
Delivery Method," in Proceedings of the 9th Workshop
on e-Business (We-B10),
St. Louis, MO, December 11, 2010.
5. W.
Lucas, T. Babaian, J. Cooprider, H. Topi, & J. Xu, "Applying
Human-Computer Collaboration for Improving ERP Usability: Extended
Abstract," in Proceedings of the 2010 International Symposium
on Collaborative Technologies and Systems (CTS10),
pp. 396-397, Lombard, IL, 2010.
6. J.
Cooprider, H. Topi, J. Xu, M. Dias, T. Babaian, & W. Lucas, "A
Collaboration Model for ERP User-System Interaction," in Proceedings
of the 43rd Hawaii International Conference on System
Sciences (HICSS 2010), Kauai, HI, January 5-8, 2010.
7. J.
Xu, "Identifying Cohesive Local Community Structure in
Networks," in Proceedings of the 30th International
Conference on Information Systems (ICIS 2009), Phoenix, AZ,
December 15-18, 2009.
8. J.
Cao, T. Knotts, J. Xu, & M. Chau "Word of Mouth Marketing through Online
Social Networks," in Proceedings of the 15th
Americas Conference on Information Systems (AMCIS 2009), San
Francisco, CA, August 6-9, 2009.
9. the 6th Workshop on
e-Business (We-B 2007), Montreal, Quebec, Canada, December 9, 2007.
10. (ICIS
2006), Milwaukee, WI, December 10-13, 2006.
11. International
Conference on Information Systems (ICIS 2006),
Milwaukee, WI, December 10-13, 2006.
12. S.
Weisband, S. M. B. Thatcher, & J. Xu,
"Using Bibliometric Analysis to Evaluate
Scientific Progress in Virtual Teams Research," in Proceedings
of the 65th Academy of Management Annual Meeting, Honolulu, HW,
August 5-10, 2005.
13. J.
Qin, J.Xu, D. Hu, M. Sageman,
& H. Chen, "Analyzing Terrorist Networks: A Case Study of the
Global Salafi Jihad Network," in Proceedings
of the 3rd NSF/NIJ Symposium on Intelligence and Security Informatics
(ISI’05), Atlanta, GA, May 19-20, 2005.
14. J.
Xu, "Criminal Relation Exploration Tool for Law Enforcement
Knowledge Management," in Proceedings of Americas Conference on
Information Systems (AMCIS’04), New York, NY, August 6-8, 2004.
15. J.
Xu, B. Marshall, S. Kaza, & H. Chen,
"Analyzing and Visualizing Criminal Network Dynamics: A Case
Study," in Proceedings of the 2nd NSF/NIJ Symposium on
Intelligence and Security Informatics (ISI’04), Tucson, AZ,
June 10-11, 2004.
16. Z.
Huang, H. Chen, F. Guo, J. Xu, S. Wu, &
W-H. Chen, "Visualizing the Expertise Space," in Proceedings
of the 37th Hawaii International Conference on System Science(HICSS’37),
Big Island, Hawaii, January 5-8, 2004.
17. J.
Xu & H. Chen, "Untangling Criminal Networks: A Case
Study," in Proceedings of the 1st NSF/NIJ Symposium on
Intelligence and Security Informatics (ISI’03), Tucson, AZ,
June 2-4, 2003.
18. J.
Schroeder, J. Xu, & H. Chen, "CrimeLink
Explorer: Using Domain Knowledge to Facilitate Automated Crime
Association Analysis," in Proceedings of the 1st NSF/NIJ
Symposium on Intelligence and Security Informatics (ISI’03),
Tucson, AZ, June 2-4, 2003.
19. G.
Leroy, H. Chen, J. Martinez, S. Eggers, R. Falsey,
K. Kislin, Z. Huang, J. Li, J. Xu, D.
McDonald, & G. Ng. "Genescene: Biomedical
Text and Data Mining," in Proceedings of the 3rd ACM/IEEE Joint
Conference on Digital Libraries (JCDL ’03), Houston, TX, May
27-31, 2003.
20. H.
Chen, W. Chung, Y. Qin, M. Chau, J. Xu, G.
Wang, R. Zheng, & H. Atabakhsh,
"Crime Data Mining: An Overview and Case Studies," in Proceedings
of the 3rd National Conference for Digital Government Research (dg.o 2003), Boston, MA, May 18-21,
2003.
21. J.
Xu & H. Chen, "Using Shortest Path Algorithms to Identify
Criminal Associations," in Proceedings of the 2nd National
Conference for Digital Government Research (dg.o),
Los Angeles, CA, May 19-22, 2002.
22. M.
Chau, J. Xu, & H. Chen, "Extracting
Meaningful Entities from Police Narrative Reports," in Proceedings
of the 2nd National Conference for Digital Government Research (dg.o 2002), Los Angeles, CA, May
19-22, 2002.
|