About
158
Publications
243,742
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,942
Citations
Additional affiliations
August 2011 - present
Publications
Publications (158)
Purpose
Despite rapid growth in blockchains, there was limited discussion about non-technical and technical factors on blockchain governance in the extant literature. This study aims to contribute new knowledge to the literature on potential factors affecting the adoption, governance and scale-up of blockchain technologies in the health-care and e...
Despite rapid growth in blockchains, there was limited discussion about non-technical and technical factors on the governance of blockchain in organizations. This paper contributes to the literature by proposing a framework of factors affecting the adoption, governance, and scale-up of blockchain technologies. The factors we identified can be eithe...
This paper comparatively studies people’s opinions on AI privacy between the US and China. Based on data collected from Twitter and Weibo, we perform text clustering and content analysis to classify opinion types and analyze the symptoms of opinion polarization and drivers by regression analysis. Results show that US people express more concerns ab...
The COVID-19 pandemic has heightened the necessity for pervasive data and system interoperability to manage healthcare information and knowledge. There is an urgent need to better understand the role of interoperability in improving the societal responses to the pandemic. This paper explores data and system interoperability, a very specific area th...
Guided by the Uses and Gratification theory and Impression Management theory, this study aims to find out whether there are predictable types of COVID-19 fake news that are easier to spread or there are predictable types of people that are more likely to spread COVID-19 fake news. We recently performed a survey study on social media users’ sharing...
Purpose
Risks resulted from asymmetric information have become crucial barriers for commercial banks to implement supply chain finance (SCF) – mainly the inventory pledge financing (IPF). At the same time, online financial service providers (OFSPs) are emerging as strong competitors in the SCF market. As a result, commercial banks need to update th...
The Internet of Things (IoT) technology has been increasingly used in industries. However, studies on IoT in knowledge management (KM) are still very limited. This research contributes to understanding the role of IoT-based technologies in KM, specifically acting as a knowledge creation mediator. By investigating a case study in the automobile insu...
Some studies have discussed the potential and challenges related to the use of artificial intelligence (AI) in government. However, there are few empirical studies that have examined factors that influence the use of AI in government. By collecting policy documents and empirical data from the government, IT enterprises, and the public in China, we...
The coronavirus disease of 2019 (COVID-19) pandemic has required many educators to redesign how they deliver their courses. In this study, we develop innovative procedures and pedagogy to teach pair programming via Zoom breakout rooms in a cloud environment. We report six fundamental innovative teaching mechanisms and procedures: 1) strategically p...
Purpose: Employees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However, many cybersecurity awareness training (CSAT) programs fall short due to their misaligned training focuses.
Design/methodology/approach: To help organizations de...
Businesses have been using social media to promote products and services to increase sales. This paper aims to study the impact of Facebook on real estate sales. First, we examine how realtors’ activities on Facebook business pages are associated with real estate sales. Then, we include time lags in analysis because a time lag can be expected betwe...
Various technology innovations and applications have been developed to fight the coronavirus pandemic. The pandemic also has implications for the design, development, and use of technologies. There is an urgent need for a greater understanding of what roles information systems and technology researchers can play in this global pandemic. This paper...
Due to the COVID-19 pandemic, many educational institutions have transitioned to online instruction. As a result, instructors need to investigate online small group learning opportunities to bond with their students who feel isolated from their peers because of social distancing guidelines. In this article, we discussed three key issues in online h...
Purpose
The relationship between online reviews and purchase intention has been studied in previous research. However, there was little knowledge about the effect of information quality and the social presence of online reviews on purchase intention based on the stimulus-organism-response ( S - O - R ) framework. The purpose of this study is to exp...
Purpose
Online reviews presented in the format of multimedia information, such as pictures and videos, continue to emerge, but whether the richness of multimedia information can enforce the quality of online reviews has remained uncertain. The purpose of this paper is to examine the differences in the perceived information quality of online reviews...
With the increased popularity of mobile learning, there is a growing demand on the understanding of how the scalable technology, such as mobile devices, influences individual learning behaviours as well as their learning outcome. A theoretical model was built based on the adaptive structuration theory (AST) and the knowledge spiral theory. Using th...
Purpose
An organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To prevent more data breaches to intellectual capital, organizations must provide regular cybersecurity awareness training for all personnel. The purpose of this paper is...
Purpose
Research on how to use social media data to measure and evaluate service quality is still limited. To fill the research gap in the literature, the purpose of this paper is to open a new avenue for future work to measure the service quality in the service industry by developing a new analytical approach of using social media analytics to eva...
Based on the Elaboration Likelihood Model (ELM), this study identifies the differences between perceived privacy risks and privacy concern. Furthermore, the study analyses how perceived privacy risks and privacy concerns affect the disclosure intention and the actual information disclosure behavior of Internet users. In addition, the study discusse...
This paper reports how a commercial bank in Asia uses big data analytic as a tool to explore the internal B2B data to improve supply chain finance and the efficiency of marketing tactics and campaigns. A case study was conducted by analyzing two types of supply chain relationships: (1) supply chain relationships in the credit reports; (2) e-wiring...
Deal-seeking behavior is booming over the last decade. This article aims to identify online deal-seeking resources, understand the current status of online deal-seeking and identify key insights and trends for understanding online deal seeker's behaviors. The authors first conducted an in-depth review of the relevant literature including white pape...
Purpose Few academic studies specifically investigate how businesses can use social media to innovate customer loyalty programs. The purpose of this paper is to present an in-depth case study of the Shop Your Way (SYW) program, which is regarded as one of the most successful customer loyalty programs with social media. Design/methodology/approach T...
To help employees recognize and change their computing security behavior, organizations need to invest in cybersecurity training and awareness programs to encourage their employees’ active engagement in complying with their security policies. However, many organizations’ cybersecurity training and awareness programs fail to achieve their goals as e...
As development and operation of the massive open online courses (MOOCs) involve multiple stakeholders to work in cooperation, this paper inquired two key stakeholders in the MOOC development, teaching, and operation: administrators and faculty in 50 higher education institutions in China. We sought the experiences and expectations from MOOC adminis...
More and more businesses are using social media to promote services and increase sales. This paper explores the impact of Facebook on real estate sales. First, we examine how Facebook activities are associated with real estate sales. Then, we include time lags in our analysis, because a time lag can be expected between the activates on Facebook and...
Purpose
Few academic studies specifically investigate how businesses can use social media to innovate customer loyalty programs. The purpose of this paper is to present an in-depth case study of the Shop Your Way (SYW) program, which is regarded as one of the most successful customer loyalty programs with social media.
Design/methodology/approach...
As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on cybersecurity by theoretically defining the conceptual domains of employees’ securit...
The European Union’s General Data Protection Regulation (GDPR) demands significant data protection safeguards and poses both new challenges and potential opportunities to organizations around the world. Most organizations are not yet adequately prepared for compliance with the GDPR. To minimize liability under the GDPR, organizations around the wor...
As a new IT paradigm for users, cloud computing has the potential to transform the way that IT resources are utilized and consumed. Many multinational enterprises (MNEs) are interested in cloud computing but do not know how to adopt and implement cloud computing in their enterprise settings. In an effort to help MNEs understand cloud computing and...
Purpose
Customer knowledge from social media can become an important organizational asset. The purpose of this paper is to identify useful customer knowledge including knowledge for customer, knowledge about customers and knowledge from customers from social media data and facilitate social media-based customer knowledge management.
Design/methodo...
This paper proposes a framework of using social media analytics to help study service quality. A case study was conducted to collect and analyze a data set which included nearly half million tweets related to two of the largest supermarkets in the United States: Walmart and Kmart. The results illustrate how businesses can leverage external open dat...
Processing, mining, and learning complex data refer to an advanced study area of data mining and knowledge discovery concerning the development and analysis of approaches for discovering patterns and learning models from data with a complex structure (e.g., multirelational data, XML data, text data, image data, time series, sequences, graphs, strea...
Social media provides a flexible platform for self-presentation, which is one of the prominent functions used by young people. Young people post profile pictures, status updates, images and videos about their lives. However, the truthfulness of self-presentation may range from selected presentation, ideal self, self-promotion, to twisted, false sel...
The workshop is with the ACM/IEEE Joint Conference on Digital Libraries in 2018 (JCDL 2018) which will be held in Fort Worth, Texas, USA on June 3 - 7, 2018. The Joint Conference on Digital Libraries (JCDL) is a major international forum focusing on digital libraries and associated technical, practical, and social issues.
Online consumer reviews have been extensively studied. However, existing literature analyzing online consumer review data mostly relies on a single data source, resulting in potentially biased analytics conclusions. Many websites encourage consumers to post reviews of their purchased products, so that new consumers can evaluate these reviews for th...
Purpose
Online customer reviews could shed light into their experience, opinions, feelings, and concerns. To gain valuable knowledge about customers, it becomes increasingly important for businesses to collect, monitor, analyze, summarize, and visualize online customer reviews posted on social media platforms such as online forums. However, analyz...
Purpose
American police departments are beginning to implement social media as a strategy to engage the surrounding communities through various methods, including Facebook and Twitter. The purpose of this paper is to examine the varieties in the use of Facebook and Twitter by local police departments.
Design/methodology/approach
This study collect...
In recent years, the Internet of Things (IoT) has been introduced to offer promising solutions in many areas. A big challenge faced by the IoT is to integrate heterogeneous information sources and process information effectively. As an important element in information integration, temporal reasoning is highly related to the dynamic, sequential aspe...
Large-scale and high-resolution perception is easy to achieve for the physical world, if satellite technology was used in Internet of Things (IoT) in the future. Remote sensing satellite is superior to original method for ground target detection and environmental perception, which could be completed through onboard perception sensors. In the proces...
Purpose
Emotion plays a significant role in both institutional and individual investors’ decision-making process. Emotions affect the perception of risk and the assessment of monetary value. However, there is a lack of empirical evidence available that addresses how investors’ emotions affect commodity market returns. The purpose of this paper is t...
With the high demand of the nation for next generation cybersecurity experts, it is important to design and provide hands-on labs for students at the K-12 level in order to increase their interest in cybersecurity and enhance their confidence in learning cybersecurity skills at the young age. This poster reports some preliminary analysis results fr...
Purpose
This paper aims to propose a knowledge management (KM) framework for leveraging big social media data to help interested organizations integrate Big Data technology, social media and KM systems to store, share and leverage their social media data. Specifically, this research focuses on extracting valuable knowledge on social media by contex...
This poster presents our NSF collaborative project "Enhancing Cybersecurity Education Using POGIL". Although the POGIL (Process Oriented Guided Inquiry Learning) instructional approach has been used and evaluated in science and engineering disciplines, the use of POGIL in cybersecurity education is not in place due to the lack of POGIL materials in...
Purpose
Current knowledge management (KM) systems cannot be used effectively for decision-making because of the lack of real-time data. This study aims to discuss how KM can benefit by embedding Internet of Things (IoT).
Design/methodology/approach
The paper discusses how IoT can help KM to capture data and convert data into knowledge to improve t...
This article reports on a longitudinal analysis of query logs of a web-based case library system during an 8-year period (from 2005 to 2012). The analysis studies 3 different information-seeking approaches: keyword searching, browsing, and case-based reasoning (CBR) searching provided by the system by examining the query logs that stretch over 8 ye...
Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An...
This paper proposes a model that extends the Protection Motivation Theory to validate the relationships among peer behavior, cue to action, and employees’ action experience of cyber security, threat perception, response perception, and employee’s cyber security behavior. The findings of the study suggest that the influence from peer behavior and em...
The design and implementation of case-based reasoning (CBR) applications is time-consuming. To facilitate the development of CBR applications in various problem domains, the CBR community has created a number of CBR shells and software frameworks in the past twenty years. This paper provides a review of the state-of-the-art of CBR shells and softwa...
Cybersecurity behaviors of employees are major contributors of cyber attacks in organizations. It is important to investigate an employee's cybersecurity posture within an organization. Using our cybersecurity behavior model, we surveyed employees from different organizations on their perceptions on various cybersecurity-related psychological varia...
Emotion plays a significant role in consumer decision making. We recently conducted a study to explore how media-based information of aggregated market emotion influences consumers' expected demand of commodities, and how businesses can use media-based emotion indices to predict commodities' price. We implemented time series econometrics by analyzi...
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are
relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the
major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary
evaluation results of the...
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the...
As mobile malware and virus are rapidly increasing in frequency and sophistication, there is an increasing concern for mobile device security and a strong need to address mobile device security in the higher education IT curriculum. College students need to be educated to understand how to securely manage their mobile devices before they enter the...
Online customer reviews could shed light into their experience, opinions, feelings, and concerns. To gain valuable knowledge about customers, it becomes increasingly important for businesses to collect, monitor, analyze, summarize, and visualize online customer reviews posted on social media platforms such as online forums. In this paper, we presen...
In the semantic web, content is tagged with "meaning" or "semantics" to facilitate machine processing and web searching. In general, question answering systems that are built on top of reasoning and inference face a number of difficult issues. In this paper, we analyze scalability issues faced by a question answering system used by a knowledge base...
Purpose
– The purpose of this paper is to present a new tool, business network information ecological chain (BNIEC) aiming to solve the current information problems in business network, make more profits to business websites and to maintain the sustainable development of the business network environment in Internet of Things (IoT) era.
Design/meth...
A large amount of user-generated content is now freely available on social media sites. To increase their competitive advantage, companies need to monitor and analyze not only the customer-generated content on their own social media sites, but also the content on their competitors’ social media sites. In this article, we describe a framework to int...
Social media-based forecasting has received significant attention from academia and industries in recent years. With a focus on Twitter, this paper investigates whether sentiments of the tweets regarding the 7 largest US financial service companies in U.S. dollars are related to the stock price changes of these companies. The authors' findings indi...
Prior research on electronic word-of-mouth (eWOM) has focused on the predictive utility of star ratings. Extending these studies conceptually and methodologically, this paper employed Automatic Text Analysis to investigate the predictive utility of evaluative textual information contained in online reviews. Based on a real-world dataset that matche...
This study provides an overview of the international strategic management literature from 2000 through 2013. By drawing from a sample of 736 articles, we employ bibliometric and text mining analyses in identifying 10 distinct subfields of international strategic management research. Our study serves as a resource for future research by shedding lig...
With the help of cloud computing, Mobile Cloud Learning (MCL) can overcome many of the obstacles related to mobile learning. It holds considerable promise when it is developed and delivered in the business and education sectors. However, the discussion of MCL is disparate, fragmented, and distributed among different outlets. Systematic, extensively...
This paper provides a review of the security aspect of mobile banking applications. We employed blog mining as a research method to analyze blog discussion on security of mobile banking applications. Furthermore, we used the workflow technology to simulate real-life scenarios related to attacks on mobile banking applications. Insights are summarize...
As a new IT paradigm for users, cloud computing has the potential to transform the way that IT resources are utilized and consumed. Many multinational enterprises (MNEs) are interested in cloud computing but do not know how to adopt and implement cloud computing in their enterprise settings. In an effort to help MNEs understand cloud computing and...
Purpose
– Social media analytics uses data mining platforms, tools and analytics techniques to collect, monitor and analyze massive amounts of social media data to extract useful patterns, gain insight into market requirements and enhance business intelligence. The purpose of this paper is to propose a framework for social media competitive intelli...
The needs for life-long learning and the rapid development of information technologies promote the development of various types of online Community of Practices (CoPs). In online CoPs, bounded rationality and metacognition are two major issues, especially when learners face information overload and there is no knowledge authority within the learnin...
Social media has become an online platform for businesses to market products/services and to manage customer relationships. While more and more small businesses have jumped on the bandwagon of social media in recent years, we found that only a limited number of published articles are currently available regarding the decision-making factors for soc...
Although many organizations have deployed social media tools to support business activities such as marketing or customer relationship management in the past several years, academic research on using social media for supporting innovation process is very limited. Many organizations find it challenging to effectively integrate social media into orga...
In this study, the authors used a mixed-method approach to analyze user-generated comments on social mobile learning from three leading news sites that report the latest development in higher education. Koole's mobile learning model was used to code comments made by the public on the three news sites. Results showed that social mobile learning has...
A new approach for face recognition, based on kernel principal component analysis (KPCA) and support vector machines (SVMs), is presented to improve the recognition performance of the method based on principal component analysis (PCA). This method can simultaneously be applied to solve both the over-fitting problem and the small sample problem. The...
Teaching information security courses is technically challenging. In an information security course, students and instructors often end up struggling in low-level and complicated software installation, system setup, service configuration, command operations, and data manipulation while losing concentration in learning the important information secu...
In recent years we have witnessed that e-commerce has become an international phenomenon in which sellers often need to do business with buyers who use different languages. As customers, including international customers, often make purchase decisions based on online reviews, comments and recommendations made by other customers, understanding the s...
As a new IT paradigm for users, cloud computing has the potential to transform the way that IT resources are utilized and consumed. Many multinational enterprises (MNEs) are interested in cloud computing but do not know how to adopt and implement cloud computing in their enterprise settings. In an effort to help MNEs understand cloud computing and...
This paper provides an in-depth review of the security aspect of mobile banking applications. The authors employed blog mining as a research method to analyze blog discussion on security of mobile banking applications. Security risks, protection strategy/best practices and future security trends are summarized to help banks and consumers mitigate t...
the purpose of this study is to identify at-risk online students earlier, more often, and with greater accuracy using time-series clustering. The case study showed that the proposed approach could generate models with higher accuracy and feasibility than traditional frequency aggregation approaches. The best performing model can start to capture at...
The first main contribution of this chapter is to take a non-trivial step towards providing a robust and scalable solution to privacy protection in vehicular networks. To promote scalability and robustness the authors employ two strategies. First, they view vehicular networks as consisting of non-overlapping subnetworks, each local to a geographic...
There is a lack of consistent use of measurements for factors related to people's information security behavior. Specifically, a conceptually relaxed utilization of the variable 'self-efficacy' makes it difficult for researchers to perform meaningful cross-study comparisons in behavioral information security research. This study examines how self-e...
Mashups are web applications that combine content from different sources in a new way, generating valuable information, useful new applications or services. As more and more enterprises are engaged in mashup initiatives, developing secure mashup applications becomes necessary to ensure that enterprises can receive the maximum benefits from their ma...
In this pilot study, we have (i) examined the relative importance of ten factors that can be used for developing new training methods and materials to improve employees' awareness and skills to defend against cyber risks, and (ii) investigated the relationship between an explicit security policy at the organizational level and individual employee's...