- Complex Network Analysis Techniques
- Digital Marketing and Social Media
- Terrorism, Counterterrorism, and Political Violence
- Opinion Dynamics and Social Influence
- Technology Adoption and User Behaviour
- Data Quality and Management
- Biomedical Text Mining and Ontologies
- Data-Driven Disease Surveillance
- Cybercrime and Law Enforcement Studies
- Spam and Phishing Detection
- Topic Modeling
- Social Media and Politics
- E-Government and Public Services
- Crime Patterns and Interventions
- Advanced Text Analysis Techniques
- Knowledge Management and Sharing
- Privacy, Security, and Data Protection
- Data Visualization and Analytics
- Web Data Mining and Analysis
- Stock Market Forecasting Methods
- Sentiment Analysis and Opinion Mining
- Financial Markets and Investment Strategies
- Bioinformatics and Genomic Networks
- Crime, Illicit Activities, and Governance
- Electronic Health Records Systems
Nanjing University of Aeronautics and Astronautics
2025
London School of Economics and Political Science
2025
Renmin University of China
2024
University of Nevada, Las Vegas
2013-2023
University of Arizona
2012-2021
Entrepreneurial Ecosystems
2021
Yanshan University
2019-2020
Tsinghua University
2015-2017
University of Nevada, Reno
2016
National University of Defense Technology
2016
In a broad sense, social media refers to conversational, distributed mode of content generation, dissemination, and communication among communities. Different from broadcast-based traditional industrial media, has torn down the boundaries between authorship readership, while information consumption dissemination process is becoming intrinsically intertwined with generating sharing information. This special issue samples state art in analytics intelligence research that direct relevance AI...
One of the problems often associated with online anonymity is that it hinders social accountability, as substantiated by high levels cybercrime. Although identity cues are scarce in cyberspace, individuals leave behind textual traces. In this study we proposed use stylometric analysis techniques to help identify based on writing style. We incorporated a rich set stylistic features, including lexical, syntactic, structural, content-specific, and idiosyncratic attributes. also developed...
In finance, it is believed that market information, namely, fundamentals and news affects stock movements. Such media-aware movements essentially comprise a multimodal problem. Two unique challenges arise in processing these data. First, information from one data mode will interact with other modes. A common strategy to concatenate various modes into compound vector; however, this ignores the interactions among different The second challenge heterogeneity of terms sampling time....
A new generation of data mining tools and applications work to unearth hidden patterns in large volumes crime data.
Business intelligence and analytics (BIA) is about the development of technologies, systems, practices, applications to analyze critical business data so as gain new insights markets. The can be used for improving products services, achieving better operational efficiency, fostering customer relationships. In this article, we will categorize BIA research activities into three broad directions: (a) big analytics, (b) text (c) network analytics. article aims review state-of-the-art techniques...
In response to the September 11 terrorist attacks, major government efforts modernize federal law enforcement authorities' intelligence collection and processing capabilities have been initiated. At state local levels, crime police report data is rapidly migrating from paper records automated management systems in recent years, making them increasingly accessible.
The Internet of Things (IoT) continues to grow as uniquely identifiable objects are added the internet. addition these devices, and their remote connectivity, has brought a new level efficiency into our lives. However, security devices come question. While many may be secure, sheer number creates an environment where even small percentage insecure create significant vulnerabilities. This paper evaluates some emerging vulnerabilities that exist puts figures scale threat.
Stock market volatility is influenced by information release, dissemination, and public acceptance. With the increasing volume speed of social media, effects Web on stock markets are becoming increasingly salient. However, studies media lack both depth breadth due to challenges in automatically acquiring analyzing massive amounts relevant information. In this study, we systematically reviewed 229 research articles quantifying interplay between from fields Finance, Management Information...
The 2009 Health Information Technology for Economic and Clinical (HITECH) Act is landmark legislation that places electronic health record (EHR) technologies at the center of system reform in United States. This study leverages meaningful use (MU) provisions HITECH to quantify different degrees EHR a large heterogeneous set hospitals investigates impact on quality care. results provide evidence EHRs’ positive effects reconcile earlier mixed findings evaluation literature by showing their...
There have been mixed findings of clinicians' perceptions Electronic Health Record (EHR). This study aims to explore the lived experiences clinicians, assess role EHR in improving quality and safety healthcare.A qualitative design was used. We collected opinions from different groups clinicians (physicians, hospitalists, nurse practitioners, nurses, patient officers) using semi-structured interviews. Organizations represented were trauma hospitals, academic medical centers, clinics, home...
Affects play an important role in influencing people's perceptions and decision making. Affect analysis is useful for measuring the presence of hate, violence, resulting propaganda dissemination across extremist groups. In this study we performed affect U.S. Middle Eastern group forum postings. We constructed lexicon using a probabilistic disambiguation technique to measure usage violence hate affects. These techniques facilitate depth multilingual content. The proposed approach was...
The criminal mind is no match for some of the latest technology designed to determine fact from fiction in suspect identities.
Nanotechnology patent applications published during 1991–2008 have been examined using the "title–abstract" keyword search on esp@cenet "worldwide" database. The longitudinal evolution of number applications, their topics, and respective families evaluated for 15 national offices covering 98% total global activity. United States (USA), People's Republic China (PRC), Japan, South Korea largest nanotechnology experienced significant but different growth rates after 2000. In most repositories,...
As social media has become more prevalent, its influence on business, politics, and society significant. Due to easy access interaction between large numbers of users, information diffuses in an epidemic style the web. Understanding mechanisms diffusion through these new publication methods is important for political marketing purposes. Among media, web forums, where people online communities disseminate receive information, provide a good environment examining diffusion. In this paper, we...
Navigation structure and user familiarity are critical for satisfaction, yet the mediating mechanisms by which they affect satisfaction remain unclear, especially from a cognitive perspective. To extend understanding of drivers satisfact