College of Information Sciences and Technology

  • United States

Research Output 1976 2020

Filter
Chapter

A bridge from the use-mention distinction to natural language processing

Wilson, S., 2017, Perspectives in Pragmatics, Philosophy and Psychology. Springer International Publishing, p. 79-96 18 p. (Perspectives in Pragmatics, Philosophy and Psychology; vol. 15).

Research output: Chapter in Book/Report/Conference proceedingChapter

A case study of crisis management readiness in cross-national contexts: Applying team cognition theories to crisis response teams

Endsley, T. C., Forster, P. K. & Reep, III, J. A., Jan 1 2017, Cognitive Systems Engineering: An Integrative Living Laboratory Framework. CRC Press, p. 131-159 29 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

A cognitive-systems approach to understanding natural gas exploration supply chains a purview and research agenda

McNeese, M. D. & Reep, III, J. A., Jan 1 2017, Cognitive Systems Engineering: An Integrative Living Laboratory Framework. CRC Press, p. 81-102 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cognitive systems
Supply chains
Natural gas
Natural gas fields
Gas supply
1 Citation (Scopus)

A fine-grained authentication method for inter-domain EPCglobal network

Liu, B. & Chu, C. H., Jan 1 2011, Radio Frequency Identification System Security. RFIDsec'11 Asia Workshop Proceedings. IOS Press, p. 21-34 14 p. (Cryptology and Information Security Series; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingChapter

Radio frequency identification (RFID)
Authentication
Supply chain management
Security of data
Supply chains

African American youth tumbling toward mental health support-seeking and positive academic outcomes

Yarger, L. M. & Payton, F. C., Jan 1 2018, Diversifying Digital Learning: Online Literacy and Educational Opportunity. Johns Hopkins University Press, p. 151-171 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

mental health
American
3 Citations (Scopus)

Aggregate estimations over location based services

Liu, W., Rahman, M. F., Thirumuruganathan, S., Zhang, N. & Das, G., Jan 1 2015, Proceedings of the VLDB Endowment. 12 ed. Association for Computing Machinery, p. 1334-1345 12 p. (Proceedings of the VLDB Endowment; vol. 8, no. 12).

Research output: Chapter in Book/Report/Conference proceedingChapter

Location based services
Experiments
Testing
1 Citation (Scopus)

Alignment in web-based dialogue: Who aligns, and how automatic is it? Studies in big-data computational psycholinguistics

Reitter, D., Jan 1 2016, Big Data in Cognitive Science. Taylor and Francis, p. 246-269 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Psycholinguistics
Linguistics
Language
Survivors
Processing
2 Citations (Scopus)

American discourses of the digital divide and economic development: A sisyphean order to catch up?

Tu, L. & Kvasny, L., Oct 5 2006, Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference. Trauth, E., Howcroft, D., Butler, T., Butler, T. & DeGross, J. (eds.). p. 51-65 15 p. (IFIP International Federation for Information Processing; vol. 208).

Research output: Chapter in Book/Report/Conference proceedingChapter

Economic development
Catch-up
Digital divide
Discourse
Information and communication technology
10 Citations (Scopus)

A review of methodologies for analyzing websites

Booth, D. & Jansen, B. J., Dec 1 2008, Handbook of Research on Web Log Analysis. IGI Global, p. 143-164 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Websites
Customer satisfaction
World Wide Web
Industry

Articulating collaborative contributions to activity awareness

Carroll, J. M., Borge, M., Ganoe, C. H. & Rosson, M. B., Jan 1 2013, Theories of Team Cognition: Cross-Disciplinary Perspectives. Taylor and Francis, p. 209-242 34 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Artificial intelligence and the body: Dreyfus, bickhard, and the future of AI

Susser, D., Jan 1 2013, Studies in Applied Philosophy, Epistemology and Rational Ethics. Springer International Publishing, p. 277-287 11 p. (Studies in Applied Philosophy, Epistemology and Rational Ethics; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingChapter

Artificial Intelligence
Nonhuman
Artificial
Question Answering
Fundamental

Automated Analysis of Privacy Requirements for Mobile Apps

Zimmeck, S., Wang, Z., Zou, L., Iyengar, R., Liu, B., Schaub, F., Wilson, S., Sadeh, N., Bellovin, S. M. & Reidenberg, J., 2017, Proceedings 2017 Network and Distributed System Security Symposium. Reston, VA: Korea Society of Internet Information, (Proceedings 2017 Network and Distributed System Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingChapter

Application programs
Learning systems
Positive ions

A Web of Fitness "Things": An Exploration of Social Impacts & Vulnerable Populations

Booth, K. M., Eikey, E. V. & Trauth, E. M., Feb 8 2017, Managing the Web of Things: Linking the Real World to the Web. Elsevier Inc., p. 425-447 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Health
Nutrition
Internet of things

Black female voices: Designing an HIV health information artifact

Payton, F. C., Tondo, J. K. & Yarger, L. M., Jan 1 2012, Advances in the Human Side of Service Engineering. CRC Press, p. 307-315 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Health
Information technology
Students
Disease control
Communication
8 Citations (Scopus)

Building classifier ensembles for B-cell epitope prediction

El-Manzalawy, Y. & Honavar, V., 2014, Immunoinformatics. Humana Press Inc., p. 285-294 10 p. (Methods in Molecular Biology; vol. 1184).

Research output: Chapter in Book/Report/Conference proceedingChapter

B-Lymphocyte Epitopes
Antigens
Epitopes
Antibody Formation
Amino Acid Sequence

Call to Order: How Sequence Effects in Humans and Artificial Systems Illuminate Each Other

Ritter, F. E. & Nerb, J., Apr 1 2010, In Order to Learn: How the sequence of topics influences learning. Oxford University Press

Research output: Chapter in Book/Report/Conference proceedingChapter

8 Citations (Scopus)

CAT - A practical graph & SDL based toolkit for vulnerability assessment of 3G networks

Kotapati, K., Liu, P. & Laporta, T. F., Dec 21 2006, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden. Fischer-Hubner, S., Lindskog, S., Lassous, G. & Yngstrom, L. (eds.). p. 158-170 13 p. (IFIP International Federation for Information Processing; vol. 201).

Research output: Chapter in Book/Report/Conference proceedingChapter

Attack
Vulnerability
Graph
Toolkit
Graph model

Cellular network security

Liu, P., LaPorta, T. F. & Kotapati, K., Dec 1 2009, Computer and Information Security Handbook. Elsevier Inc., p. 183-203 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Network security
Outages
HIgh speed networks
Communication
Finance

Cellular Network Security

Liu, P., LaPorta, T. F. & Kotapati, K., Sep 1 2013, Network and System Security: Second Edition. Elsevier Inc., p. 319-351 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Network security
Taxonomies
Outages
Communication

Cellular Network Security

Liu, P., LaPorta, T. F. & Kotapati, K., Aug 29 2013, Computer and Information Security Handbook. Elsevier Inc., p. 323-343 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Network security
Taxonomies
Outages
Communication
12 Citations (Scopus)

Choosing critical IS research

Howcroft, D. & Trauth, E. M., Dec 1 2005, Handbook of Critical Information Systems Research: Theory and Application. Edward Elgar Publishing Ltd., p. 1-15 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Circadian computing: Sensing, modeling, and maintaining biological rhythms

Abdullah, S., Murnane, E. L., Matthews, M. & Choudhury, T., Jul 12 2017, Mobile Health: Sensors, Analytic Methods, and Applications. Springer International Publishing, p. 35-58 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Periodicity
Mental Health
Technology
Biological Phenomena
Physiology
12 Citations (Scopus)

Collaborative information behavior: Exploring collaboration and coordination during information seeking and retrieval activities

Reddy, M. C., Jansen, B. J. & Spence, P. R., Dec 1 2010, Collaborative Information Behavior: User Engagement and Communication Sharing. IGI Global, p. 73-88 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

behavior model
field of study
present
learning
4 Citations (Scopus)

Community networks: Infrastructure and models for therapeutic support

Carroll, J. M. & Rosson, M. B., Dec 1 2013, Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services. IGI Global, p. 187-207 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Community Networks
Health
Therapeutics

Complete Fault Analysis for Long Transmission Line Using Synchronized Sampling

Zhang, N. & Kezunovic, M., Dec 1 2007, Power Plants and Power Systems Control 2006. Elsevier Ltd, p. 137-142 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Electric lines
Sampling
Electric fault location
Electric fault currents
Fault detection

Complex network theory based web services composition benchmark toolkit

Oh, S. C. & Lee, D., Dec 1 2011, Innovations, Standards and Practices of Web Services: Emerging Research Topics. IGI Global, p. 1-22 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Circuit theory
Complex networks
Web services
Chemical analysis
WSDL
1 Citation (Scopus)

Computer-aided human centric cyber situation awareness

Albanese, M., Cooke, N., Coty, G., Hall, D., Healey, C., Jajodia, S., Liu, P., McNeese, M. D., Ning, P., Reeves, D., Subrahmanian, V. S., Wang, C. & Yen, J., Jan 1 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10030).

Research output: Chapter in Book/Report/Conference proceedingChapter

Situation Awareness
Situational Awareness
Human

Computer worms, detection, and defense

Cole, R. J. & Chu, C. H., Dec 1 2007, Encyclopedia of Information Ethics and Security. IGI Global, p. 89-95 7 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Computer worms
7 Citations (Scopus)

Conducting feminist gender research in the information systems field

Trauth, E. M., Kvasny, L. & Greenhill, A., Dec 1 2006, Issues and Trends in Technology and Human Interaction. IGI Global, p. 1-24 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

gender studies
information system
gender
legitimacy
reflexivity

Considerations from the development of a local spatial data infrastructure

Davis, C. A. & Fonseca, F. T., Jan 1 2011, Spatial Data Infrastructures in Context: North and South. CRC Press, p. 181-202 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

spatial data
infrastructure
SDI
Geographic information systems
Brazil
10 Citations (Scopus)

Cross-layer damage assessment for cyber situational awareness

Liu, P., Jia, X., Zhang, S., Xiong, X., Jhi, Y. C., Bai, K. & Li, J., Dec 1 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 155-176 22 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

Concretes
Industry
Virtual machine
17 Citations (Scopus)

Cultural diversity challenges: Issues for managing globally distributed knowledge workers in software development

Huang, H. & Trauth, E. M., Dec 1 2006, Managing IT Professionals in the Internet Age. IGI Global, p. 254-276 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Knowledge workers
Cultural diversity
Software development
Global software development
Workforce
2 Citations (Scopus)

Cultural diversity challenges: Issues for managing globally distributed knowledge workers in software development

Huang, H. & Trauth, E. M., Dec 1 2008, Selected Readings on Global Information Technology: Contemporary Applications. IGI Global, p. 420-436 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Software engineering
Information technology
73 Citations (Scopus)

Cyber SA: Situational awareness for cyber defense

Barford, P., Dacier, M., Dietterich, T. G., Fredrikson, M., Giffin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou, X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang, C. & Yen, J., Dec 1 2010, Cyber Situational Awareness: Issues and Research. Jajodia, S., Liu, P., Swarup, V. & Wang, C. (eds.). p. 3-13 11 p. (Advances in Information Security; vol. 46).

Research output: Chapter in Book/Report/Conference proceedingChapter

Damage quarantine and recovery in data processing systems

Liu, P., Jajodia, S. & Yu, M., Dec 1 2008, Handbook of Database Security: Applications and Trends. Springer US, p. 383-407 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Recovery
Fault tolerance
Interoperability
Industry
Information systems

Deeper into the Wild: Technology Co-creation Across Corporate Boundaries

Colombino, T., Willamowski, J., Grasso, A. & Hanrahan, B. V., Jan 1 2020, Studies in Applied Philosophy, Epistemology and Rational Ethics. Springer International Publishing, p. 55-71 17 p. (Studies in Applied Philosophy, Epistemology and Rational Ethics; vol. 48).

Research output: Chapter in Book/Report/Conference proceedingChapter

Telecommunications
Ethnographic Study
Research Projects
Co-creation
3 Citations (Scopus)

Denial of Service Attacks

Gu, Q. & Liu, P., Jan 4 2012, Handbook of Computer Networks. John Wiley and Sons, Vol. 3. p. 454-468 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Denial
World Wide Web
Attack
29 Citations (Scopus)

Design Rationale as Theory

Carroll, J. M. & Beth Rosson, M., Apr 2003, HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science. Elsevier Inc., p. 431-461 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Human computer interaction
5 Citations (Scopus)

Detecting remote exploits ising data mining

Masud, M., Khan, L., Thuraisingham, B., Wang, X., Liu, P. & Zhu, S., Sep 11 2008, Advances in Digital Forensics IV. Cuenca, P., Guerrero, C., Puigjaner, R. & Serra, B. (eds.). p. 177-189 13 p. (IFIP International Federation for Information Processing; vol. 285).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data mining
Firewall
Web services
Attack

Developing Television ratings in Canada and the United States: The Perils and promises of self-regulation

McDowell, S. D. & Maitland, C. F., Nov 26 2013, The V-chip Debate: Content Filtering From Television To the Internet. Taylor and Francis, p. 23-46 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

self-regulation
television
rating
Canada

EmErgency Management: Exploring hard and soft data fusion modeling with unmanned aerial systems and non-governmental human intelligence mediums

McMullen, S. A. H., McMullen, M. J., Forster, P. K., Ison, D. & Clark, P. J., Jan 1 2018, Lecture Notes in Networks and Systems. Springer, p. 502-520 19 p. (Lecture Notes in Networks and Systems; vol. 15).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data fusion
Antennas
Decision making
Sensors
Automation
1 Citation (Scopus)

Empowering the next-generation analyst

Hall, D., Cai, G. & Graham, J., Jan 1 2016, Fusion Methodologies in Crisis Management: Higher Level Fusion and Decision Making. Springer International Publishing, p. 231-244 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

National security
Mobile devices
Bandwidth
Monitoring
Sensors

Enhancing situation awareness with visual aids on cognitively-inspired agent systems

Kim, H. W., Oh, S., Minotra, D., McNeese, M., Yen, J., Hanratty, T., Strater, L., Cuevas, H. & Colombo, D., Apr 19 2016, Advances in Cognitive Ergonomics. CRC Press, p. 560-567 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Decision tables
Visualization
2 Citations (Scopus)

Enterprise-Level cyber situation awareness

Sun, X., Dai, J., Singhal, A. & Liu, P., Jan 1 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 66-109 44 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10030).

Research output: Chapter in Book/Report/Conference proceedingChapter

Situation Awareness
Operating Systems
Network security
Bayesian networks
Attack
1 Citation (Scopus)

Environmental sustainability: The role of geographic information science and spatial data infrastructures in the integration of people and nature

Davis, C. A., Fonseca, F. T. & Camara, G., Jan 1 2011, The SAGE Handbook of GIS and Society. SAGE Publications Inc., p. 123-137 15 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

information science
sustainability
infrastructure

Establishing trust in decision-aiding: The role of a visualization of agent decision-space in improving operator engagement with reduced cognitive load

Minotra, D., Oh, S., Kim, H. W., McNccse, M., Yen, J., Hanratt, T., Strater, L., Cucvas, H. & Colombo, D., Apr 19 2016, Advances in Cognitive Ergonomics. CRC Press, p. 568-575 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Visualization
Automation
Recommender systems
Transparency
Experiments
20 Citations (Scopus)

E-survey methodology

Jansen, K. J., Corley, K. G. & Jansen, B. J., Dec 1 2006, Handbook of Research on Electronic Surveys and Measurements. IGI Global, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

mail survey
methodology
e-mail
online survey
privacy
1 Citation (Scopus)

Ethics and privacy considerations for systems biology applications in predictive and personalized medicine

Chen, J. Y., Xu, H., Shi, P., Culbertson, A. & Meslin, E. M., Dec 1 2011, Handbook of Research on Computational and Systems Biology: Interdisciplinary Applications. IGI Global, p. 1-27 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Precision Medicine
Systems Biology
Privacy
ethics
Ethics
10 Citations (Scopus)

Ethics and privacy considerations for systems biology applications in predictive and personalized medicine

Chen, J. Y., Shi, P., Xu, H., Culbertson, A. & Meslin, E. M., Mar 31 2013, Bioinformatics: Concepts, Methodologies, Tools, and Applications. IGI Global, Vol. 3. p. 1378-1404 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Precision Medicine
Systems Biology
Privacy
Ethics
Medicine

Evolution of widely spreading worms and countermeasures: Epidemic theory and application

Yu, W., Zhang, N., Fu, X. & Rivera, B., Dec 1 2012, Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier Inc., p. 73-93 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter