default search action
ACM Transactions on Management Information Systems, Volume 12
Volume 12, Number 1, March 2021
Special Issue on Analytics for Cybersecurity and Privacy, Part 2
- Sagar Samtani, Murat Kantarcioglu, Hsinchun Chen:
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems. 1:1-1:18 - Razieh Nokhbeh Zaeem, K. Suzanne Barber:
The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. 2:1-2:20 - Tanuja Sudhakar, Marina L. Gavrilova:
Deep Learning for Multi-instance Biometric Privacy. 3:1-3:23 - Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes:
An Analysis of Complexity of Insider Attacks to Databases. 4:1-4:18 - Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen:
Mathematical Reconciliation of Medical Privacy Policies. 5:1-5:18 - Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control. 6:1-6:24 - Oluwafemi Akanfe, Rohit Valecha, H. Raghav Rao:
Design of an Inclusive Financial Privacy Index (INF-PIE): A Financial Privacy and Digital Financial Inclusion Perspective. 7:1-7:21
- Sarah A. Alkhodair, Benjamin C. M. Fung, Steven H. H. Ding, William K. Cheung, Shih-Chia Huang:
Detecting High-Engaging Breaking News Rumors in Social Media. 8:1-8:16 - Francesco Benedetto, Loretta Mastroeni, Pierluigi Vellucci:
Extraction of Information Content Exchange in Financial Markets by an Entropy Analysis. 9:1-9:16
Volume 12, Number 2, June 2021
- Ka Chung Ng, Mike K. P. So, Kar Yan Tam:
A Latent Space Modeling Approach to Interfirm Relationship Analysis. 10:1-10:44 - Aristotle Onumo, Irfan-Ullah Awan, Andrea J. Cullen:
Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures. 11:1-11:29 - Asma Belhadi, Youcef Djenouri, Djamel Djenouri, Tomasz P. Michalak, Jerry Chun-Wei Lin:
Machine Learning for Identifying Group Trajectory Outliers. 12:1-12:25 - Almas Abdibayev, Dongkai Chen, Haipeng Chen, Deepti Poluru, V. S. Subrahmanian:
Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents. 13:1-13:22 - Xingsi Xue, Xiaojing Wu, Junfeng Chen:
Optimizing Ontology Alignment Through an Interactive Compact Genetic Algorithm. 14:1-14:17 - Youcef Djenouri, Jerry Chun-Wei Lin, Kjetil Nørvåg, Heri Ramampiaro, Philip S. Yu:
Exploring Decomposition for Solving Pattern Mining Problems. 15:1-15:36 - Mingfei Teng, Hengshu Zhu, Chuanren Liu, Hui Xiong:
Exploiting Network Fusion for Organizational Turnover Prediction. 16:1-16:18 - Ranjan Pal, Ziyuan Huang, Sergey V. Lototsky, Xinlong Yin, Mingyan Liu, Jon Crowcroft, Nishanth Sastry, Swades De, Bodhibrata Nag:
Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes. 17:1-17:36
Volume 12, Number 3, July 2021
- Makiya Nakashima, Alex Sim, Youngsoo Kim, Jonghyun Kim, Jinoh Kim:
Automated Feature Selection for Anomaly Detection in Network Traffic Data. 18:1-18:28 - Lin Qiu, Sruthi Gorantla, Vaibhav Rajan, Bernard C. Y. Tan:
Multi-disease Predictive Analytics: A Clinical Knowledge-aware Approach. 19:1-19:34 - Yan Leng, Jinhua Zhao, Haris N. Koutsopoulos:
Leveraging Individual and Collective Regularity to Profile and Segment User Locations from Mobile Phone Data. 20:1-20:22 - Xi Wang, Yibo Chai, Hui Li, Wenbin Wang, Weishan Sun:
Graph Convolutional Network-based Model for Incident-related Congestion Prediction: A Case Study of Shanghai Expressways. 21:1-21:22 - Peng Huang, Henry C. Lucas:
Early Exploration of MOOCs in the U.S. Higher Education: An Absorptive Capacity Perspective. 22:1-22:28 - Pooja Parameshwarappa, Zhiyuan Chen, Günes Koru:
Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model. 23:1-23:21 - Jiaheng Xie, Bin Zhang, Susan A. Brown, Daniel Zeng:
Write Like a Pro or an Amateur? Effect of Medical Language Formality. 24:1-24:25 - Damodar Reddy Edla, Shubham Dodia, Annushree Bablani, Venkatanareshbabu Kuppili:
An Efficient Deep Learning Paradigm for Deceit Identification Test on EEG Signals. 25:1-25:20 - Qin Wang, Shiping Chen, Yang Xiang:
Anonymous Blockchain-based System for Consortium. 26:1-26:25
Volume 12, Number 4, December 2021
- Kang Zhao, Qingpeng Zhang, Sean H. Y. Yuan, Kelvin Kam-fai Tsoi:
Introduction to the Special Section on Using AI and Data Science to Handle Pandemics and Related Disruptions. 27:1-27:2 - Manvel Avetisian, Ilya Burenko, Konstantin Egorov, Vladimir Kokh, Aleksandr Nesterov, Aleksandr Nikolaev, Alexander Ponomarchuk, Elena Sokolova, Alex Tuzhilin, Dmitry Umerenkov:
CoRSAI: A System for Robust Interpretation of CT Scans of COVID-19 Patients Using Deep Learning. 28:1-28:16 - Maryam Zokaeinikoo, Pooyan Kazemian, Prasenjit Mitra, Soundar R. T. Kumara:
AIDCOV: An Interpretable Artificial Intelligence Model for Detection of COVID-19 from Chest Radiography Images. 29:1-29:20 - Guanqing Liang, Jingxin Zhao, Helena Yan Ping Lau, Cane Wing-Ki Leung:
Using Social Media to Analyze Public Concerns and Policy Responses to COVID-19 in Hong Kong. 30:1-30:20 - Laura Biester, Katie Matton, Janarthanan Rajendran, Emily Mower Provost, Rada Mihalcea:
Understanding the Impact of COVID-19 on Online Mental Health Forums. 31:1-31:28 - Kang Gu, Soroush Vosoughi, Temiloluwa Prioleau:
SymptomID: A Framework for Rapid Symptom Identification in Pandemics Using News Reports. 32:1-32:17 - Shixiang Zhu, Alexander Bukharin, Liyan Xie, Mauricio Santillana, Shihao Yang, Yao Xie:
High-Resolution Spatio-Temporal Model for County-Level COVID-19 Activity in the U.S. 33:1-33:20 - Junye Li, Aryan Sharma, Deepak Mishra, Gustavo Batista, Aruna Seneviratne:
COVID-Safe Spatial Occupancy Monitoring Using OFDM-Based Features and Passive WiFi Samples. 34:1-34:24 - Himanshu Kharkwal, Dakota Olson, Jiali Huang, Abhiraj Mohan, Ankur Mani, Jaideep Srivastava:
University Operations During a Pandemic: A Flexible Decision Analysis Toolkit. 35:1-35:24
- Chun Ouyang, Michael Adams, Arthur H. M. ter Hofstede, Yang Yu:
Design and Realisation of Scalable Business Process Management Systems for Deployment in the Cloud. 36:1-36:26 - Saurav Chakraborty, Agnieszka Onuchowska, Sagar Samtani, Wolfgang Jank, Brandon Wolfram:
Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off. 37:1-37:28
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.