Roger H. L. Chiang

Roger H. L. Chiang
University of Cincinnati | UC

About

78
Publications
123,683
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,862
Citations
Introduction

Publications

Publications (78)
Article
Full-text available
Data science has been described as the fourth paradigm for scientific discovery. The latest wave of data science research on machine learning and artificial intelligence (AI) is growing exponentially and garnering millions of annual citations. However, this growth has been accompanied by a diminishing emphasis on social good challenges analysis rev...
Article
Full-text available
Although the terms “data”, “knowledge”, and “information” are frequently used when referring to information systems, there is neither a clear distinction amongst them, nor a clear way to apply them in the development of database and knowledge-based systems. The objective of this paper is to analyze the current literature on data, knowledge and info...
Article
Full-text available
Systems Analysis and Design (SAND) is undoubtedly a pillar in the field of Information Systems (IS). Some researchers have even claimed that SAND is the field that defines the Information Systems discipline and is the core of information systems. The past decades have seen the development of Structured SAND methodologies and Object-Oriented Methodo...
Article
Despite the publicity regarding big data and analytics (BDA), the success rate of these projects and strategic value created from them are unclear. Most literature on BDA focuses on how it can be used to enhance tactical organizational capabilities, but very few studies examine its impact on organizational value. Further, we see limited framing of...
Article
Full-text available
Bitcoin’s emergence has the potential to pave the way for a technological revolution in financial markets. What determines its valuation is an important open question with far-reaching business and policy implications. Building on information systems and finance literature, we examine the dynamic interactions between social media and the monetary v...
Article
Full-text available
Big data has received considerable attention from the information systems (IS) discipline over the past few years, with several recent commentaries, editorials, and special issue introductions on the topic appearing in leading IS outlets. These papers present varying perspectives on promising big data research topics and highlight some of the chall...
Article
Market structure analysis (MSA) offers important insights for new product innovation and marketing strategy. Classic approaches using survey, panel, or commercially supplied data exhibit limitations in viewpoint, accuracy, speed, automaticity, cost and periodicity. We propose a product attribute embedding model that uses the deep learning approach...
Article
Full-text available
Full terms and conditions of use: http://pubsonline.informs.org/page/terms-and-conditions Please scroll down for article—it is on subsequent pages INFORMS is the largest professional society in the world for professionals in the fields of operations research, management science, and analytics. For more information on INFORMS, its publications, memb...
Article
Full-text available
Full terms and conditions of use: http://pubsonline.informs.org/page/terms-and-conditions Please scroll down for article—it is on subsequent pages INFORMS is the largest professional society in the world for professionals in the fields of operations research, management science, and analytics. For more information on INFORMS, its publications, memb...
Article
Knowledge engineering research has focused on proposing knowledge acquisition techniques, developing and evaluating knowledge representation schemes and engineering tools, and testing and debugging knowledge-based systems. Few formal studies have been conducted on understanding the behaviors and roles of knowledge engineers. Applying the theory of...
Article
Full-text available
Business intelligence and analytics (BI&A) has emerged as an important area of study for both practitioners and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations. This introduction to the MIS Quarterly Special Issue on Business Intelligence Research first provides a framewo...
Article
Full-text available
“Big Data,” huge volumes of data in both structured and unstructured forms generated by the Internet, social media, and computerized transactions, is straining our technical capacity to manage it. More importantly, the new challenge is to develop the capability to understand and interpret the burgeoning volume of data to take advantage of the oppor...
Article
Substantial work in knowledge engineering has focused on eliciting knowledge and representing it in a computational form. However, before elicited knowledge can be represented, it must be integrated and transformed so the knowledge engineer can understand it. This research identifies the need to separate knowledge representation into human comprehe...
Article
Full-text available
Search engines are essential, ubiquitous tools for seeking information from the Internet. Prior research has also demonstrated that combining features of separate search engines often improves retrieval performance. However, such feature combination is often difficult, because developers don’t consider other developers when building their software....
Chapter
Search engines are ubiquitous tools for seeking information from the Internet and, as such, have become an integral part of our information society. New search engines that combine ideas from separate search engines generally outperform the search engines from which they took ideas. Designers, however, may not be aware of the work of other search e...
Article
Introduction What qualities make a successful it professional? Certainty strong technical skills are sine qua non. As a result, the technology geek remains the stereotype of an information technology (IT) professional. Indeed, when companies hire IT professionals, their focus is often on the "hard" skills needed to perform the work, such as years o...
Article
Full-text available
Introduction What qualities make a successful it professional? Certainty strong technical skills are sine qua non. As a result, the technology geek remains the stereotype of an information technology (IT) professional. Indeed, when companies hire IT professionals, their focus is often on the "hard" skills needed to perform the work, such as years o...
Article
Full-text available
Search engines are essential, ubiquitous tools for seeking information from the Internet. Prior research has also demonstrated that combining features of separate search engines often improves retrieval performance. However, such feature combination is often difficult, because developers don't consider other developers when building their software....
Article
Full-text available
The power of information technology to support strategic management at the executive level may currently be underutilised. A recently developed strategic management system incorporating extensive domain knowledge can be integrated with advanced data utilisation technology to form a comprehensive strategic management architecture. Specifically, we p...
Conference Paper
Full-text available
ABSTRACT Community Question Answering (QA) portals contain ques- tions and answers contributed by hundreds of millions of users. These databases of questions and answers are of great value if they can be used directly to answer questions from any user. In this research, we address this collabo- rative QA task by drawing knowledge from the crowds in...
Conference Paper
Full-text available
Searching answers to complex questions is a challenging IR task. In this paper, we examine the use of query templates with semantic slots to formulate slot-based queries. These queries have query terms assigned to entity and relationship slots. We develop several query expansion methods for slot-based queries so as to improve their retrieval effect...
Article
Web pages from a Web site can often be associated with concepts in an ontology, and pairs of Web pages also can be associated with relationships between concepts. With such associations, the Web site can be searched, browsed, or even reorganized based on the concept and relationship labels of its Web pages. In this article, we study the link chain...
Article
As electronic commerce and knowledge economy environments proliferate, both individuals and organizations increasingly generate and consume large amounts of online information, typically available as textual documents. To manage this ever-increasing volume of documents, individuals and organizations frequently organize their documents into categori...
Article
Full-text available
The article discusses the importance of managing computer system changes that are made post-system deployment in a systematic manner The article discusses the importance of managing computer system changes that are made post-system deployment in a systematic manner. The authors feel that more research is needed in the area of managing post-system d...
Conference Paper
Welcome to the CoSS2006, Workshop on Conceptual modeling of Service-oriented software Systems, held in conjunction with the 25th International Conference on Conceptual Modeling ER2006. The workshop focuses on different facets of conceptual modeling and design of service-oriented systems, a recent development paradigm that has the potential to trans...
Conference Paper
Considerable research has gone into developing ontologies and applying them to a variety of applications. The extraction of domain knowledge for developing these ontologies is often performed on a manual basis. The World Wide Web contains a wealth of knowledge about an application domain; however it is embedded within web pages. This research prese...
Article
Several techniques have been recently proposed to automatically generate Web wrappers, i.e., programs that extract data from HTML pages, and transform them into a more structured format, typically in XML. These techniques automatically induce a wrapper ...
Article
Very little research in knowledge discovery has studied how to incorporate statistical methods to automate linear correlation discovery (LCD). We present an automatic LCD methodology that adopts statistical measurement functions to discover correlations from databases’ attributes. Our methodology automatically pairs attribute groups having potentia...
Conference Paper
Web pages from a web site can often be associated with some semantic concepts, and relationships can exist between pairs of web pages. By deriving these concepts and relationship instances, web pages can be searched, browsed or even reorganized based on their associated concepts and relationships. In this paper, we present a search and browsing too...
Article
A complete data integration solution can be viewed as an iterative process that consists of three phases, namely analysis, derivation and evolution. The entire process is similar to a software development process with the target application being the derivation rules for the integrated databases. In many cases, data integration requires several ite...
Article
A common problem faced when gathering information from the web is the use of different names to refer to the same entity. For example, the city in India referred to as Bombay in some documents may be referred to as Mumbai in others because its name officially ...
Chapter
Many different kinds of algorithms have been developed to discover relationships between two attribute groups (e.g., association rule discovery algorithms, functional dependency discovery algorithms, and correlation tests). Of these algorithms, only the correlation tests discover relationships using the measurement scales of attribute groups. Measu...
Article
Full-text available
Most research on attribute identification in database integration has focused on integrating attributes using schema and summary information derived from the attribute values. No research has attempted to fully explore the use of attribute values to perform attribute identification. We propose an attribute identification method that employs schema...
Article
In today’s dynamic and changing environment, companies have a strong need to create or sustain their competitive advantages. In order to be competitive, companies need to be responsive and closer to the customers, and deliver value-added products and services as quickly as possible. Companies also need to be able to support organizational informati...
Article
While much research has been devoted to data modeling, little attention has been paid to developing constructs for modeling micro-objects. Most data models consider attributes as functions of macro-objects. This research proposes a Conceptual Micro-Object Model (CMoM), which considers the attribute as the foundation of data modeling. Other construc...
Article
Although it is widely accepted that research from data mining, knowledge discovery, and data warehousing should be synthesized, little research addresses the integration of existing data management and analysis software. We develop an intelligent middleware that facilitates linear correlation discovery, the discovery of associations between attribu...
Article
Full-text available
The third International Workshop on Web Information and Data Management (WIDM'2001) was held at Doubletree Hotel, Buckhead in Atlanta on November 9, 2001. The workshop was sponsored by ACM SIGIR, ACM SIGMIS and E-Book Systems. Like it predecessors, WIDM'2001 was held in conjunction with the International Conference on Information and Knowledge Mana...
Article
The efficient query and extraction of web data is often difficult, because web data does not conform to any data organization standard. In addition, the development of web search technology is still at a relatively early stage. Search engines provide only primitive data query capabilities, and require a detailed syntactic specification to retrieve...
Article
In the process of integrating legacy databases, one has to resolve inter-database conflicts at both the schema and instance levels. In this paper, we discuss relationship conflicts as a special type of conflicts to be resolved during the database integration. Relationships are properties that relate real world objects. So far, most inter-database r...
Conference Paper
Vast amounts of data are available on the World Wide Web. However, the extraction and use of this data is difficult, since web data does not conform to any data organization standard. Search engines provide only primitive data query capabilities, and require a detailed syntactic specification to retrieve relevant data. This research proposes a Smar...
Conference Paper
Full-text available
Many data analysts require tools which can integrate their database management packages (e.g. Microsoft Access) with their data analysis ones (e.g. SAS, SPSS), and provide guidance for the selection of appropriate mining algorithms. In addition, the analysts need to extract and validate statistical results to facilitate data mining. In this paper,...
Article
Full-text available
Database integration research has traditionally focused on understanding integration issues from the schema and instance perspectives. As a result, database integration approaches tend to rely on a direct comparison of schema and instance elements. However, when the integration of heterogeneous databases is performed without considering the domain...
Article
Full-text available
We introduce a multidatabase model to represent the information that derives from different local databases. This model, known as Tuple-Source (TS) relational model, accommodates tuples from different local databases by attaching them with their source information in the global relations which are also known as TS-relations. In other words, a sourc...
Article
Full-text available
Terms such as `data processing system', `management information system', `decision support system', `expert system' and `executive support system' are widely used. However, there appears to be no generally accepted way to distinguish among these classes of information systems due to the vagueness that has existed in traditional classification schem...
Article
In some integration projects, complete integration of database instances may not be necessary. It may also be too costly and impossible to do so due to poor local data quality and insufficient instance-level knowledge. In this research, we study how multidatabases with global schemas should be represented and manipulated when the data instances fro...
Conference Paper
Many different kinds of algorithms have been developed to discover relationships between two attribute groups (e.g., association rule discovery algorithms, functional dependency discovery algorithms, and correlation tests). Of these algorithms, only the correlation tests discover relationships using the measurement scales of attribute groups. Measu...
Conference Paper
Full-text available
To completely address database integration problems in the context of multidatabase [10] and data warehousing systems, one has to examine various integration and query requirements. Due to various reasons such as poor data quality in local databases, ongoing local database updates, and instance heterogeneities, some instance differences have to be...
Article
Full-text available
Automated database design systems embody knowledge about the database design process. However, their lack of knowledge about the domains for which databases are being developed significantly limits their usefulness. A methodology for acquiring and using general world knowledge about business for database design has been developed and implemented in...
Article
It is often difficult to obtain a good conceptual understanding of a legacy database, especially when there is a lack of documentation. Database reverse engineering attempts to provide solutions for this problem. It is the part of system maintenance work that produces a sufficient understanding of a legacy database and its application domain to all...
Conference Paper
Database reverse engineering is the part of system maintenance work that produces a sufficient understanding of an existing database and its application domain to allow appropriate changes to be made. It is often difficult to obtain a good conceptual understanding of an old and ill-designed database, especially when there is a lack of documentation...
Article
A knowledge-based system, called the Knowledge Extraction System (KES), is presented which performs the process of reverse engineering of relational databases. KES generates an extended entity-relationship (EER) model from a relational database. Within its extraction procedure, domain semantics are obtained by analyzing the data schema and data ins...
Article
Although the terms “data†, “knowledge†, and “information†are frequently used when referring to information systems, there is neither a clear distinction amongst them, nor a clear way to apply them in the development of database and knowledge-based systems. The objective of this paper is to analyze the current literature on data, knowled...
Article
A methodology for extracting an extended Entity-Relationship (EER) model from a relational database is presented. Through a combination of data schema and data instance analysis, an EER model is derived which is semantically richer and more comprehensible for maintenance and design purposes than the original database. Classification schemes for rel...
Conference Paper
Full-text available
Our research investigates how domain semantics are discovered from a relational database at a high level of automation. The discoveries are then represented as the extended Entity- Relationship schema (2) (i.e., conceptual schema) and integrity constraints of the database, which can support and drive the subsequent knowledge discovery in this datab...
Conference Paper
A process for reverse engineering a relational database into an extended Entity-Relationship (EER) schema at a high level of automation is presented. We focus on two essential performance evaluation criteria of the reverse engineering process: 1) which of the reverse engineering operations can be fully automated, and 2) whether these operations can...
Conference Paper
Various expert systems have been developed that attempt to automate the database design process. Although these systems may have a high degree of expertise in the design task, their lack of knowledge about the application domain that the database serves reduces their value as design aids. They often have to ask questions that appear unnecessary or...
Article
Full-text available
Although the terms "data", "knowledge", and "information" are frequently used when referring to information systems, there is neither a clear distinction amongst them, nor a clear way to apply them in the development of database and knowledge-based systems. The objective of this paper is to analyze the current literature on data, knowledge and info...
Article
Many data analysts require tools which can integrate their database management packages (e.g. Microsoft Access) with their data analysis ones (e.g. SAS, SPSS), and provide guidance for the selection of appropriate mining algorithms. In addition, the analysts need to extract and validate statistical results to facilitate data mining. In this paper,...
Article
Full-text available
As electronic commerce and knowledge economy environments proliferate, both individuals and organizations increasingly generate and consume large amounts of online information, typically available as textual documents. To manage this ever-increasing volume of documents, such individuals and organizations frequently organize their documents into cat...
Article
Full-text available
Business Intelligence (BI), a term coined in 1989, has gained much traction in the IT practitioner community and academia over the past two decades. According to Wikipedia, BI refers to the "skills, technologies, applications, and practices used to help a business acquire a better understanding of its commercial context." Based on a survey of 1,400...
Article
Traditionally, data integration research has focused primarily on understanding integration issues from the data instance and schema perspectives. However, when the integration of heterogeneous databases is performed without considering the semantics of local databases, an incorrectly integrated database may result. Moreover, most integration tasks...
Article
Typescript (photocopy). Thesis (Ph. D.)--University of Rochester. William E. Simon Graduate School of Business Administration, 1993. Includes vita and abstract. Includes bibliographical references (leaves 130-134).

Network

Cited By