


default search action
ACM Transactions on Management Information Systems, Volume 12
Volume 12, Number 1, March 2021
Special Issue on Analytics for Cybersecurity and Privacy, Part 2
- Sagar Samtani

, Murat Kantarcioglu, Hsinchun Chen:
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems. 1:1-1:18 - Razieh Nokhbeh Zaeem

, K. Suzanne Barber:
The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. 2:1-2:20 - Tanuja Sudhakar

, Marina L. Gavrilova
:
Deep Learning for Multi-instance Biometric Privacy. 3:1-3:23 - Gökhan Kul

, Shambhu J. Upadhyaya, Andrew Hughes:
An Analysis of Complexity of Insider Attacks to Databases. 4:1-4:18 - Dinesha Ranathunga, Matthew Roughan

, Hung X. Nguyen
:
Mathematical Reconciliation of Medical Privacy Policies. 5:1-5:18 - Arindam Roy, Shamik Sural

, Arun Kumar Majumdar, Jaideep Vaidya
, Vijayalakshmi Atluri:
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control. 6:1-6:24 - Oluwafemi Akanfe, Rohit Valecha, H. Raghav Rao:

Design of an Inclusive Financial Privacy Index (INF-PIE): A Financial Privacy and Digital Financial Inclusion Perspective. 7:1-7:21
- Sarah A. Alkhodair

, Benjamin C. M. Fung
, Steven H. H. Ding, William K. Cheung, Shih-Chia Huang:
Detecting High-Engaging Breaking News Rumors in Social Media. 8:1-8:16 - Francesco Benedetto

, Loretta Mastroeni
, Pierluigi Vellucci:
Extraction of Information Content Exchange in Financial Markets by an Entropy Analysis. 9:1-9:16
Volume 12, Number 2, June 2021
- Ka Chung Ng

, Mike K. P. So
, Kar Yan Tam:
A Latent Space Modeling Approach to Interfirm Relationship Analysis. 10:1-10:44 - Aristotle Onumo, Irfan-Ullah Awan, Andrea J. Cullen:

Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures. 11:1-11:29 - Asma Belhadi, Youcef Djenouri

, Djamel Djenouri, Tomasz P. Michalak, Jerry Chun-Wei Lin
:
Machine Learning for Identifying Group Trajectory Outliers. 12:1-12:25 - Almas Abdibayev, Dongkai Chen

, Haipeng Chen
, Deepti Poluru, V. S. Subrahmanian:
Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents. 13:1-13:22 - Xingsi Xue, Xiaojing Wu, Junfeng Chen:

Optimizing Ontology Alignment Through an Interactive Compact Genetic Algorithm. 14:1-14:17 - Youcef Djenouri

, Jerry Chun-Wei Lin
, Kjetil Nørvåg
, Heri Ramampiaro, Philip S. Yu:
Exploring Decomposition for Solving Pattern Mining Problems. 15:1-15:36 - Mingfei Teng, Hengshu Zhu

, Chuanren Liu
, Hui Xiong:
Exploiting Network Fusion for Organizational Turnover Prediction. 16:1-16:18 - Ranjan Pal

, Ziyuan Huang, Sergey V. Lototsky, Xinlong Yin, Mingyan Liu, Jon Crowcroft, Nishanth Sastry
, Swades De, Bodhibrata Nag
:
Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes. 17:1-17:36
Volume 12, Number 3, July 2021
- Makiya Nakashima, Alex Sim

, Youngsoo Kim
, Jonghyun Kim, Jinoh Kim
:
Automated Feature Selection for Anomaly Detection in Network Traffic Data. 18:1-18:28 - Lin Qiu, Sruthi Gorantla, Vaibhav Rajan, Bernard C. Y. Tan:

Multi-disease Predictive Analytics: A Clinical Knowledge-aware Approach. 19:1-19:34 - Yan Leng, Jinhua Zhao, Haris N. Koutsopoulos:

Leveraging Individual and Collective Regularity to Profile and Segment User Locations from Mobile Phone Data. 20:1-20:22 - Xi Wang

, Yibo Chai, Hui Li, Wenbin Wang, Weishan Sun:
Graph Convolutional Network-based Model for Incident-related Congestion Prediction: A Case Study of Shanghai Expressways. 21:1-21:22 - Peng Huang

, Henry C. Lucas:
Early Exploration of MOOCs in the U.S. Higher Education: An Absorptive Capacity Perspective. 22:1-22:28 - Pooja Parameshwarappa, Zhiyuan Chen, Günes Koru:

Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model. 23:1-23:21 - Jiaheng Xie

, Bin Zhang, Susan A. Brown
, Daniel Zeng:
Write Like a Pro or an Amateur? Effect of Medical Language Formality. 24:1-24:25 - Damodar Reddy Edla

, Shubham Dodia
, Annushree Bablani, Venkatanareshbabu Kuppili:
An Efficient Deep Learning Paradigm for Deceit Identification Test on EEG Signals. 25:1-25:20 - Qin Wang

, Shiping Chen, Yang Xiang
:
Anonymous Blockchain-based System for Consortium. 26:1-26:25
Volume 12, Number 4, December 2021
- Kang Zhao, Qingpeng Zhang

, Sean H. Y. Yuan, Kelvin Kam-fai Tsoi:
Introduction to the Special Section on Using AI and Data Science to Handle Pandemics and Related Disruptions. 27:1-27:2 - Manvel Avetisian, Ilya Burenko, Konstantin Egorov

, Vladimir Kokh, Aleksandr Nesterov, Aleksandr Nikolaev, Alexander Ponomarchuk
, Elena Sokolova, Alex Tuzhilin, Dmitry Umerenkov:
CoRSAI: A System for Robust Interpretation of CT Scans of COVID-19 Patients Using Deep Learning. 28:1-28:16 - Maryam Zokaeinikoo, Pooyan Kazemian

, Prasenjit Mitra, Soundar R. T. Kumara:
AIDCOV: An Interpretable Artificial Intelligence Model for Detection of COVID-19 from Chest Radiography Images. 29:1-29:20 - Guanqing Liang, Jingxin Zhao, Helena Yan Ping Lau, Cane Wing-Ki Leung:

Using Social Media to Analyze Public Concerns and Policy Responses to COVID-19 in Hong Kong. 30:1-30:20 - Laura Biester

, Katie Matton, Janarthanan Rajendran, Emily Mower Provost, Rada Mihalcea:
Understanding the Impact of COVID-19 on Online Mental Health Forums. 31:1-31:28 - Kang Gu, Soroush Vosoughi, Temiloluwa Prioleau

:
SymptomID: A Framework for Rapid Symptom Identification in Pandemics Using News Reports. 32:1-32:17 - Shixiang Zhu

, Alexander Bukharin, Liyan Xie, Mauricio Santillana, Shihao Yang, Yao Xie
:
High-Resolution Spatio-Temporal Model for County-Level COVID-19 Activity in the U.S. 33:1-33:20 - Junye Li

, Aryan Sharma, Deepak Mishra
, Gustavo Batista, Aruna Seneviratne:
COVID-Safe Spatial Occupancy Monitoring Using OFDM-Based Features and Passive WiFi Samples. 34:1-34:24 - Himanshu Kharkwal

, Dakota Olson, Jiali Huang, Abhiraj Mohan, Ankur Mani, Jaideep Srivastava:
University Operations During a Pandemic: A Flexible Decision Analysis Toolkit. 35:1-35:24
- Chun Ouyang

, Michael Adams, Arthur H. M. ter Hofstede, Yang Yu:
Design and Realisation of Scalable Business Process Management Systems for Deployment in the Cloud. 36:1-36:26 - Saurav Chakraborty, Agnieszka Onuchowska, Sagar Samtani

, Wolfgang Jank, Brandon Wolfram:
Machine Learning for Automated Industrial IoT Attack Detection: An Efficiency-Complexity Trade-off. 37:1-37:28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














