Information Systems Concentration

Student Publications

The School of Information Systems and Management actively encourages doctoral students to collaborate with faculty on research projects from day one. Below are some of the recent publications co-authored by PhD students (name highlighted) while they were in the Doctoral Program.

  • Machine learning for psychiatric patient triaging: an investigation of cascading classifiers
    VK Singh, U Shrivastava, L Bouayad, B Padmanabhan, A Ialynytchev.
  • Is There Evidence that BCG Vaccination Has Non-Specific Protective Effects for COVID-19 Infections or Is It An Illusion Created by Lack of Testing?, S Shivendu, S Chakraborty, A Onuchowska, A Patidar, A Srivastava, 2020.
  • Using agent-based modeling to assess the implications of changing liquidity conditions
    DJ Berndt, D Boogers, S Chakraborty, C Cabre, Proceedings of the 2019 Summer Simulation Conference, 29, 2019.
  • Using agent-based modeling to assess liquidity mismatch in open-end bond funds
    DJ Berndt, D Boogers, S Chakraborty, J McCart, Summer of Simulation, 219-245, 3 2019.
  • Detection and classification of attacks on IoT networks, A Onuchowska, S Chakraborty, W Jank, U Shrivastava,1, 2018.
  • Blockchain based Resource Management System, S Chakraborty, K Dutta, D Berndt, Available at SSRN 3104351, 4 2017.
  • An Analysis of Stability of Inter-bank Loan Network: A Simulated Network Approach, S Chakraborty, J Gaeta, K Dutta, D Berndt.
  • Proceedings of the 50th Hawaii International Conference on System Sciences, 1, 2017 Data Visualization and Sonification for Financial Agent-Based Models, D Berndt, D Boogers, S Chakraborty, R Dalvi, 2017.
  • Electronic health records in IS research: Quality issues, essential thresholds and remedial actions, G Jetley, H Zhang, Decision Support Systems 126, 113137, 5, 2019.
  • Q&As and Reviews: Substitutes or Complements?, G Jetley, S Shivendu, 2018.
  • Is There Evidence that BCG Vaccination Has Non-Specific Protective Effects for COVID-19 Infections or Is It An Illusion Created by Lack of Testing?, S Shivendu, S Chakraborty, A Onuchowska, A Patidar, A Srivastava, Available at SSRN 3579847, 3, 2020.
  • Using Agent-Based Modelling to Address Malicious Behavior on Social Media, A Onuchowska, DJ Berndt, 2019.
  • Towards Understanding Malicious Actions on Twitter, A Onuchowska, DJ Berndt, 2019.
  • ROCKET SHIP OR BLIMP?鈥揑MPLICATIONS OF MALICIOUS ACCOUNTS REMOVAL ON TWITTER, A Onuchowska, DJ Berndt, S Samtani, 1, 2019.
  • Detection and Classification of Attacks on IoT Networks, A Onuchowska, S Chakraborty, W Jank, U Shrivastava, 1, 2018.
  • Disruption and Deception in Crowdsourcing: Towards a Crowdsourcing Risk Framework, A Onuchowska, GJ de Vreede, 1, 2018.
  • Disruption and Deception in Crowdsourcing, A Onuchowska, GJ de Vreede, International Journal of e-Collaboration (IJeC) 13 (4), 23-41 2017.
  • A content engagement score for online learning platforms, V Singh, B Padmanabhan, T de Vreede, GJ de Vreede, S Andel, ...Proceedings of the Fifth Annual ACM Conference on Learning at Scale, 25, 3, 2018.
  • Proactive threat prediction using LSTM in cloud computing KDBP, Vivek Singh, Conference on Data Science for Business and Economics, Purdue University, 2018.
  • SCARF: A Secured Cloud Filesystem, V Singh, Kaushik Dutta, DESRIST 2018, India, 2018.
  • Predicting Security Events in Cloud Computing, V Singh, K Dutta, 1, 2018.
  • Detecting Clickbait Using User Emotions and Behaviors on Social Media, A Kadian, V Singh, A Bhattacherjee, 1, 2018.
  • The Development of a Multidimensional Engagement Measure, S Andel, T de Vreede, GJ de Vreede, B Padmanabhan, V Singh, ...2018.
  • The Effect of Image Choice on Airbnb Reservations: A Combination of Deep Learning and Econometric Analysis V Singh, A Bhattacherjee, J Kalapatapu, U Srivastava, S Fu, 2018.
  • Analyzing Big-Five Personality Traits of Indian Celebrities Using Online Social Media K Dutta, VK Singh, P Chakraborty, SK Sidhardhan, BS Krishna, C Dash, Psychological Studies, 62, (2), 113-124.
  • Dynamic price prediction for amazon spot instances, VK Singh, K Dutta, System Sciences (HICSS), 2015 48th Hawaii International Conference on, 1513-1520, 41, 2015.
  • Estimating the energy consumption of executing software processes, VK Singh, K Dutta, D VanderMeer, Green Computing and Communications (GreenCom), 2013 IEEE and Internet of 鈥10, 2013.
  • Estimating operating system process energy consumption in real time, K Dutta, VK Singh, D VanderMeer, International Conference on Design Science Research in Information Systems 鈥2013.
  • Finding evidence for effectual application development on digital platforms, O Malgonde, A Hevner, International Conference on Design Science Research in Information System 鈥2, 2017.
  • Planning a portfolio of controls for software development, O Malgonde, A Hevner, RW Collins, At the Vanguard of Design Science: First Impressions and Early Findings from 鈥2015.
  • Innovating using big data: A social capital perspective O Malgonde, A Bhattacherjee,18 2014.
  • Applying emergent outcome controls to mitigate time pressure in agile software, development, O Malgonde, R Collins, A Hevner, 6, 2014.
  • The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective, A Bhattacherjee, U Shrivastava, Government Information Quarterly, 35 (4), 703-712, 22, 2018.
  • Detection and classification of attacks on IoT networks, A Onuchowska, S Chakraborty, W Jank, U Shrivastava, 1, 2018.
  • ICT as a corruption deterrent: a research note, U Shrivastava, A Bhattacherjee, Proceedings of the Seventh International Conference on Information and 鈥6, 2015.
  • A data driven framework for early prediction of customer response to promotions, W Jank, U Shrivastava, 5, 2015.
  • ICT as a Corruption Deterrent: A Theoretical Perspective, A Bhattacherjee, U Shrivastava, 1, 2015.
  • ICT development and corruption: an empirical study, U Shrivastava, A Bhattacherjee, 8, 2014.
  • Persuading the acceptance of e-government web transactions, O Fan-Osuala, A Bhattacherjee, 2013.
  • Bouayad, L., Padmanabhan, B., Chari. K. (December 2014). Real-Time Recommendations under Time Pressure. Workshop on Technology and Systems, Auckland, New Zealand.
  • Bouayad, L., Padmanabhan, B., Chari. K. (March 2014). Reducing Waste and Abuse in Healthcare. Poster presented at Winter Conference on Business Intelligence, Salt Lake City, Utah.
  • Bouayad, L., Padmanabhan, B., Chari. K. (March 2014). Reducing Waste and Abuse in Healthcare.Poster presented at Winter Conference on Business Intelligence, Salt Lake City, Utah.
  • Bouayad, L., Padmanabhan, B., Chari. K. (December 2013). Medical Audit under the Sentinel Effect. Poster presented at Workshop on Technology and Systems, Milan, Italy.
  • Bouayad, L., Padmanabhan, B., Chari. K. (November 2013). Medical Audit under the Sentinel Effect. Paper presented at Workshop on Health IT and Economics, Washington DC.
  • Bouayad, L., Padmanabhan, B., Chari. K. (March 2013). Medical Audit under the Sentinel Effect. Poster presented at Winter Conference on Business Intelligence, Salt Lake City, Utah.
  • Green IT Adoption and Sustainable Value Creation, D Simmonds, A Bhattacherjee, AMCIS 2014 Proceedings. Poster, 8, 35, 2014.
  • The Role of IT in Sustainable Development: The Case of Digicel Group, D Simmonds, A Bhattacherjee Proceedings of SIGGRN 2013 Workshop Paper 6 4 2013
  • Environmental sustainability in organizations: The information technology role, D Simmonds, A Bhattacherjee AMCIS 2012 Proceedings. Paper 11 16 2012 25R.
  • eBPMN for Process Modeling: A design science/HIPS evaluation, D Simmonds, RW Collins CONF-IRM 2010 Proceedings. Paper, 39, 3, 2010.
  • Information technology continuance research: current state and future directions, A Bhattacherjee, A Barfar, Asia Pacific Journal of Information Systems 21 (2), 1-18 126, 2011.
  • Probabilistic news recommender systems with feedback, S Prawesh, B Padmanabhan, Proceedings of the sixth ACM conference on Recommender systems, 257-260 14, 2012.
  • Analysis of Probabilistic News Recommender Systems, S Prawesh, B Padmanabhan, 2012.
  • News Recommender Systems with Feedback, S Prawesh, B Padmanabhan, 2, 2012.
  • The" top N" news recommender: count distortion and manipulation resistance, S Prawesh, B Padmanabhan, Proceedings of the fifth ACM conference on Recommender systems, 237-244 8, 2011.
  • Berndt D, Finch D, Foulis P, Luther S., The Impact of Data and Target Quality in Text Mining Clinical Notes. In: AMIA Annual Symposium. Washnington DC: JBM; 2010.
  • McCart JA, Finch DK, Jarman J, Hickling E, Lind JD, Richardson MR, Berndt DJ, and Luther SL (2012). Using Ensemble Models to Classify the Sentiment Expressed in Suicide Notes. Biomedical Informatics Insights, 5(Suppl. 1), 77-85.
  • Dezon Finch and Donald Berndt, 鈥淯nderstanding Trader Heterogeneity in Information Markets,鈥 Journal of Systems and IT, A Comparison of Cyber-Crime Definitions in India and the United States.
  • H Maheshwari, HS Hyman, M Agrawal Cyber Security, Cyber Crime and Cyber Forensics: Applications and 鈥2 2011.
  • Jarman, J., McCart, J.A., Berndt, D., & Ligatti, J. (2008). A Dynamic Query-Rewriting Mechanism for Role-Based Access Control in Databases. AMCIS.
  • Jones, J., & Jarman, J. (2007). An Allocation Heuristic for Multi-Attribute Supply Chain Reverse Auctions. ICIS.
  • Jarman, Jay & McCart, James & Berndt, Donald & Ligatti, Jay. (2008). A Dynamic Query-Rewriting Mechanism for Role-Based Access Control in Databases.. 3. 134.
  • McCart, James & Berndt, Donald & Watkins, Alison. (2007). Using Genetic Algorithms for Software Testing: Performance Improvement Techniques.. Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. 2. 222.
  • Communication challenges in requirements elicitation and the use of the repertory grid technique, CJ Davis, RM Fuller, MC Tremblay, DJ Berndt, Journal of Computer Information Systems 46 (5), 78-86 88, 2006.
  • Feature selection for predicting surgical outcomes, MC Tremblay, DJ Berndt, J Studnicki Proceedings of the 39th annual Hawaii international conference on system 鈥8 2006.
  • Text mining techniques: utilizing the clinical record to categorize patients with injuries. P Foulis, M Tremblay, S Luther, D Berndt, D French, G Powell-Cope, Annals of Clinical & Laboratory Science, 35 (2), 211-212, 2005.
  • Utilizing text mining techniques to identify fall related injuries, M Chiarini-Tremblay, DJ Berndt, P Foulis, S Luther, AMCIS 2005 Proceedings, 109 11, 2005.
  • Alternative employment arrangements contribute to organizational citizenship and innovative work, or not: information technology professional's psychological contract will tell, SK Newton, SC Wingreen, JE Blanton, Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel 鈥2, 2005.
  • Assessing the IT training and development climate: an application of the Q-methodology, SC Wingreen, JE Blanton, SK Newton, M Domino, Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel 鈥11, 2005.
  • Exploring the systems analyst skill set: Perceptions, preferences, age, and gender, C Lerouge, S Newton, JE Blanton, Journal of Computer Information Systems 45 (3), 12-23, 86, 2005.
  • The impact of organizational ethical climate fit on information technology professional's job satisfaction and organizational commitment research in progress, SK Newton, SC Wingreen, JE Blanton, Proceedings of the 2004 SIGMIS conference on Computer personnel research 鈥1, 2004.
  • The systems developer skill set: exploring nature, gaps, and gender differences research in progress, S Newton, C LeRouge, JE Blanton, Proceedings of the 2003 SIGMIS conference on Computer personnel research 鈥3, 2003.
  • The Systems Developer Skill Set, S Newton, C LeRouge, JE Blanton Proceedings of the 2003 ACM SIGMIS CPR Conference, 2003.
  • Nature of work effects on motivation of information technology professionals, S Newton, T Schambach, JE Blanton, AMCIS 2002 Proceedings, 293 4, 2002.
  • A typology of data warehouse quality, C LeRouge, C Gjestland, AMCIS 2002 Proceedings, 6 3, 2002.
  • The maui project: Building multimodal affective user interfaces for everyone, CL Lisetti, C LeRouge, F Nasoz, Proceedings of the AAAI-02 Workshop 鈥淎utomation as Caregiver, 67-74 6, 2002.
  • Quality attributes in telemedicine video conferencing, C LeRouge, MJ Garfield, AR Hevner, Proceedings of the 35th Annual Hawaii International Conference on System ...76, 2002.
  • The Other Semi-Virtual Team: Using Collaborative Technologies To Facilitate Student Team Projects. C LeRouge, E Blanton, M Kittner, 4, 2002.
  • Introduction to the minitrack: data management in health care, DJ Berndt, J Studnicki, C LeRouge, Proceedings of the 35th Annual Hawaii International Conference on System鈥2002.
  • Information Market Based Approach for Decision Fusion, Perols J., Chari K., and Agrawal M., Management Science, Vol. 55, No. 5, May 2009, 827-842.
  • Using Bag of Words (BOW) and Standard Deviations to Represent Expected Structures for Document Retrieval: A Way of Thinking that Leads to Method Choices, Hyman, H. Text Retrieval Conference (TREC) 2010.
  • Economic Culture and Prediction Markets, K. Alhayyan, R. Collins, J. Jones, D Berndt. In The International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC), April 2010: 331-335.
  • Coordinating the Relationship between IT Services Providers and Clients: The Case of Cloud Computing, Simmonds, D., Collins, RW., Berndt, D. In Proceedings of ICIS SIGSVC Workshop, 2010.
  • Diffusion Theory and the Sustainability of IS Innovations: The Case of Cloud Computing, Simmonds D. M., Collins R. W, In Proceedings of ICIS SIGGreen Workshop, 2010.
  • Cross-Bidding in Simultaneous Online Auctions: Antecedents and Consequences, Kayhan, V.O., McCart, J.A., Bhattacherjee, A., Information & Management, (47), 2010, pp. 325-332.
  • An Empirical Study of Cross-Listing in Online Auctions, Journal of Computer Information Systems, Kayhan, V.O., McCart, J.A., Bhattacherjee, A., (49:3), 2009, pp.76-80.
  • Understanding trader heterogeneity in information markets, Finch, D and Berndt, DJ. In Journal of Systems and Information Technology, pp. 109-119, 2008,
  • Identifying Valuable Information Patches on Long Tail Sites: An Information Foraging Perspective, James McCart, Joni Jones, Balaji Padmanabhan and Don Berndt. In Proceedings of Workshop on Information Technology and Systems, 2008.
  • Usage of Online Knowledge Repositories: A Comparison of Two Governance Mechanisms, Kayhan, V.O., and Bhattacherjee, A., " Proceedings of the 18th European Conference on Information Systems, Pretoria, South Africa, 2010.
  • Managing Healthcare Knowledge: The Role of Governance, Kayhan, V.O., Hikmet, N., and Bhattacherjee, A., "Decision Sciences Institute (DSI), New Orleans, LA, November 14-17, 2009. (Received the distinguished paper award out of over 100 submissions).
  • Improving the Quality of Knowledge Assets: Governance of Knowledge Repositories, Kayhan, V.O. and Bhattacherjee, A., Americas Conference on Information Systems (AMCIS), San Francisco, CA, August 6-9, 2009.
  • Knowledge Reuse in Organizations: The Role of Governance Mechanisms, Kayhan, V.O. and Bhattacherjee, A. Americas Conference on Information Systems (AMCIS), San Francisco, CA, August 6-9, 2009.
  • Contributing Knowledge to Organizational Repositories: The Role of Governance Mechanisms, Kayhan, V.O. and Bhattacherjee, A. Americas Conference on Information Systems (AMCIS), San Francisco, CA, August 6-9, 2009.
  • Information Market Based Fusion. Perols, J., Chari, K., and Agrawal, M. Proceedings of the International Conference on Information Systems, Milwaukee 2006.
  • Data Warehousing for Bioterrorism Surveillance, D. Berndt, W. Fisher, J. Griffiths Craighead, A. Hevner, S. Luther and J. Studnicki. In Decision Support Systems, Special Issue on Cyber infrastructure for Homeland Security, 2007: 1383-1403.
  • Milestone Markets: Software Cost Estimation through Market Trading. Berndt, D. J., Jones, J. L., and Finch, D. 2006. In Proceedings of the 39th Annual Hawaii international Conference on System Sciences - Volume 09 (January 04 - 07, 2006).
  • Organizational Adoption of Open Source Software: Barriers and Remedies, Nagy, D., Yassin, A., and Bhattacherjee, A. Forthcoming in Communications of the ACM.
  • The Differential Performance Effects of Healthcare Information Technology Adoption, Bhattacherjee, A., Hikmet, N., Menachemi, N., Kayhan, V. O., and Brooks, R. G. (2007). Information Systems Management, (24:1), 2007, 7-16
  • Managing Real-Time Bioterrorism Surveillance Data. D.J. Berndt, A.R. Hevner, and J.L. Griffiths. Chapter in National Security, Edited by H. Chen, T.S., Raghu, R. Ramesh, A. Vinze, and D. Zheng, Handbooks in Information Systems Series, Elsevier, 2006.
  • Information Technology Continuance: A Theoretical Extension and Empirical Test. Bhattacherjee, A., Perols, J., and Sanford, C. Journal of Computer Information Systems (forthcoming Fall 2008).
  • Information Fusion and Information Markets in Multi-Agent Systems. Perols, J., and Agrawal, M in Proceedings of Workshop for Information Technologies and Systems, Las Vegas 2005 (invited for special submission to Decision Support Systems).
  • An AI-Based Approach for Procurement Fraud Detection, Chari, K., and Perols, J. In Proceedings of Workshop for Information Technologies and Systems, Las Vegas 2005.
  • A Self-Paced Introductory Programming Course, Gill, G. and Holton, C. (2006). Journal of Information Technology Education. 5. 95-105.
  • The Impact of Computer Mediated Communications Monitoring on Organizational Communications Content, Holton, C. In Proceedings of the AMCIS 2007 Conference, Boulder, Colorado.
  • Gilding the Lie: Using Brand Ambassadors to Capitalize on Negative Rumors about Their Organizations, An Initial Test of the Attitude Learning Model, Holton, C. and Edmondson, D. (2007). In Proceedings of the 2007 Academy of Marketing Science Annual Conference, Coral Gables, Florida.
  • Sophisticated Spreadsheet Features for Qualitative Data Analysis, Holton, C. (2006). In Proceedings of the ICIS 2006 International Symposium on Research Methods, Milwaukee, Wisconsin.
  • The Impact of Electronic Monitoring on Hazard Communications, Holton, C. and Fuller, R. (2006). In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Kauai, Hawaii.
  • From Salvation to Damnation: A Case Study on the Role of a System Sponsor in Strategic Downfall, Holton, C. and Gill, G. (2005). In Proceedings of the AMCIS 2005 Conference, Omaha, Nebraska. Won best paper award.
  • The role of organizational factors in the adoption of healthcare information technology in Florida hospitals, Hikmet, N., Bhattacherjee, A., Menachemi, N., Kayhan, V. O., and Brooks, R. G. In Health Care Management Science, (10:4), December 2007, Accepted - In press
  • The Societal and Academic Implications of Electronic Games Use, Decker, D. Kayhan, V., and Hikmet, N. (2007). In Proceedings of the Northeast Decision Sciences Institute Conference, Baltimore, Maryland.
  • An Implementation of Business Process Reengineering: Improved Healthcare Planning During Emergency Relief Operations, Hikmet, N. and Kayhan, O. V. (2006). In Northeast Decision Sciences Institute Conference, San Juan, Puerto Rico.
  • Farmers' Markets in Wales: making the 'Net work? D.G. Pickernell, M.J. Christie, P.A. Rowe, B.C. Thomas, L.G. Putterill and J.L. Griffiths The British Food Journal. 2004: 194-210.
  • Identifying Candidates for successful telecommuting outcomes, F B茅langer, RW Collins, Proc. Telecommuting, 96 12, 1996.
  • Transference of power: shifting expertise to expert system developers, F Belanger, MB Burns, RP Will, Proceedings the 11th Conference on Artificial Intelligence for Applications 鈥3, 1995.
  • Blanton, E., Watson, H, Moody, J., 鈥淭oward a Contingency Theory of Information Technology Organization" MIS Quarterly, December, 1992, pp. 531-555.
  • Forging the Link: Information Systems to Enable Business Strategy JE BLANTON, GS HUBONA, Journal of Information Technology Management 1 (2), 33, 1990.