Search (42 results, page 1 of 3)

  • × author_ss:"Chen, H."
  1. Benjamin, V.; Chen, H.; Zimbra, D.: Bridging the virtual and real : the relationship between web content, linkage, and geographical proximity of social movements (2014) 0.10
    0.0966072 = product of:
      0.161012 = sum of:
        0.022488397 = weight(_text_:technology in 1527) [ClassicSimilarity], result of:
          0.022488397 = score(doc=1527,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 1527, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1527)
        0.08062036 = weight(_text_:social in 1527) [ClassicSimilarity], result of:
          0.08062036 = score(doc=1527,freq=8.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.44056937 = fieldWeight in 1527, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.0390625 = fieldNorm(doc=1527)
        0.057903234 = product of:
          0.11580647 = sum of:
            0.11580647 = weight(_text_:aspects in 1527) [ClassicSimilarity], result of:
              0.11580647 = score(doc=1527,freq=10.0), product of:
                0.20741826 = queryWeight, product of:
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.04589033 = queryNorm
                0.5583234 = fieldWeight in 1527, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1527)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Abstract
    As the Internet becomes ubiquitous, it has advanced to more closely represent aspects of the real world. Due to this trend, researchers in various disciplines have become interested in studying relationships between real-world phenomena and their virtual representations. One such area of emerging research seeks to study relationships between real-world and virtual activism of social movement organization (SMOs). In particular, SMOs holding extreme social perspectives are often studied due to their tendency to have robust virtual presences to circumvent real-world social barriers preventing information dissemination. However, many previous studies have been limited in scope because they utilize manual data-collection and analysis methods. They also often have failed to consider the real-world aspects of groups that partake in virtual activism. We utilize automated data-collection and analysis methods to identify significant relationships between aspects of SMO virtual communities and their respective real-world locations and ideological perspectives. Our results also demonstrate that the interconnectedness of SMO virtual communities is affected specifically by aspects of the real world. These observations provide insight into the behaviors of SMOs within virtual environments, suggesting that the virtual communities of SMOs are strongly affected by aspects of the real world.
    Source
    Journal of the Association for Information Science and Technology. 65(2014) no.11, S.2210-2222
  2. Hu, D.; Kaza, S.; Chen, H.: Identifying significant facilitators of dark network evolution (2009) 0.08
    0.0769011 = product of:
      0.1281685 = sum of:
        0.022488397 = weight(_text_:technology in 2753) [ClassicSimilarity], result of:
          0.022488397 = score(doc=2753,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 2753, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2753)
        0.09013632 = weight(_text_:social in 2753) [ClassicSimilarity], result of:
          0.09013632 = score(doc=2753,freq=10.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.49257156 = fieldWeight in 2753, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2753)
        0.015543767 = product of:
          0.031087535 = sum of:
            0.031087535 = weight(_text_:22 in 2753) [ClassicSimilarity], result of:
              0.031087535 = score(doc=2753,freq=2.0), product of:
                0.16070013 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04589033 = queryNorm
                0.19345059 = fieldWeight in 2753, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=2753)
          0.5 = coord(1/2)
      0.6 = coord(3/5)
    
    Abstract
    Social networks evolve over time with the addition and removal of nodes and links to survive and thrive in their environments. Previous studies have shown that the link-formation process in such networks is influenced by a set of facilitators. However, there have been few empirical evaluations to determine the important facilitators. In a research partnership with law enforcement agencies, we used dynamic social-network analysis methods to examine several plausible facilitators of co-offending relationships in a large-scale narcotics network consisting of individuals and vehicles. Multivariate Cox regression and a two-proportion z-test on cyclic and focal closures of the network showed that mutual acquaintance and vehicle affiliations were significant facilitators for the network under study. We also found that homophily with respect to age, race, and gender were not good predictors of future link formation in these networks. Moreover, we examined the social causes and policy implications for the significance and insignificance of various facilitators including common jails on future co-offending. These findings provide important insights into the link-formation processes and the resilience of social networks. In addition, they can be used to aid in the prediction of future links. The methods described can also help in understanding the driving forces behind the formation and evolution of social networks facilitated by mobile and Web technologies.
    Date
    22. 3.2009 18:50:30
    Source
    Journal of the American Society for Information Science and Technology. 60(2009) no.4, S.655-665
  3. Yang, M.; Kiang, M.; Chen, H.; Li, Y.: Artificial immune system for illicit content identification in social media (2012) 0.05
    0.045049887 = product of:
      0.11262472 = sum of:
        0.022488397 = weight(_text_:technology in 4980) [ClassicSimilarity], result of:
          0.022488397 = score(doc=4980,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 4980, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4980)
        0.09013632 = weight(_text_:social in 4980) [ClassicSimilarity], result of:
          0.09013632 = score(doc=4980,freq=10.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.49257156 = fieldWeight in 4980, product of:
              3.1622777 = tf(freq=10.0), with freq of:
                10.0 = termFreq=10.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4980)
      0.4 = coord(2/5)
    
    Abstract
    Social media is frequently used as a platform for the exchange of information and opinions as well as propaganda dissemination. But online content can be misused for the distribution of illicit information, such as violent postings in web forums. Illicit content is highly distributed in social media, while non-illicit content is unspecific and topically diverse. It is costly and time consuming to label a large amount of illicit content (positive examples) and non-illicit content (negative examples) to train classification systems. Nevertheless, it is relatively easy to obtain large volumes of unlabeled content in social media. In this article, an artificial immune system-based technique is presented to address the difficulties in the illicit content identification in social media. Inspired by the positive selection principle in the immune system, we designed a novel labeling heuristic based on partially supervised learning to extract high-quality positive and negative examples from unlabeled datasets. The empirical evaluation results from two large hate group web forums suggest that our proposed approach generally outperforms the benchmark techniques and exhibits more stable performance.
    Source
    Journal of the American Society for Information Science and Technology. 63(2012) no.2, S.256-269
  4. Chen, H.; Beaudoin, C.E.; Hong, H.: Teen online information disclosure : empirical testing of a protection motivation and social capital model (2016) 0.04
    0.04430769 = product of:
      0.11076923 = sum of:
        0.026986076 = weight(_text_:technology in 3203) [ClassicSimilarity], result of:
          0.026986076 = score(doc=3203,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.19744103 = fieldWeight in 3203, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=3203)
        0.08378315 = weight(_text_:social in 3203) [ClassicSimilarity], result of:
          0.08378315 = score(doc=3203,freq=6.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.45785317 = fieldWeight in 3203, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046875 = fieldNorm(doc=3203)
      0.4 = coord(2/5)
    
    Abstract
    With bases in protection motivation theory and social capital theory, this study investigates teen and parental factors that determine teens' online privacy concerns, online privacy protection behaviors, and subsequent online information disclosure on social network sites. With secondary data from a 2012 survey (N?=?622), the final well-fitting structural equation model revealed that teen online privacy concerns were primarily influenced by parental interpersonal trust and parental concerns about teens' online privacy, whereas teen privacy protection behaviors were primarily predicted by teen cost-benefit appraisal of online interactions. In turn, teen online privacy concerns predicted increased privacy protection behaviors and lower teen information disclosure. Finally, restrictive and instructive parental mediation exerted differential influences on teens' privacy protection behaviors and online information disclosure.
    Source
    Journal of the Association for Information Science and Technology. 67(2016) no.12, S.2871-2881
  5. Ku, Y.; Chiu, C.; Zhang, Y.; Chen, H.; Su, H.: Text mining self-disclosing health information for public health service (2014) 0.04
    0.03815789 = product of:
      0.09539472 = sum of:
        0.026986076 = weight(_text_:technology in 1262) [ClassicSimilarity], result of:
          0.026986076 = score(doc=1262,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.19744103 = fieldWeight in 1262, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=1262)
        0.068408646 = weight(_text_:social in 1262) [ClassicSimilarity], result of:
          0.068408646 = score(doc=1262,freq=4.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.3738355 = fieldWeight in 1262, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046875 = fieldNorm(doc=1262)
      0.4 = coord(2/5)
    
    Abstract
    Understanding specific patterns or knowledge of self-disclosing health information could support public health surveillance and healthcare. This study aimed to develop an analytical framework to identify self-disclosing health information with unusual messages on web forums by leveraging advanced text-mining techniques. To demonstrate the performance of the proposed analytical framework, we conducted an experimental study on 2 major human immunodeficiency virus (HIV)/acquired immune deficiency syndrome (AIDS) forums in Taiwan. The experimental results show that the classification accuracy increased significantly (up to 83.83%) when using features selected by the information gain technique. The results also show the importance of adopting domain-specific features in analyzing unusual messages on web forums. This study has practical implications for the prevention and support of HIV/AIDS healthcare. For example, public health agencies can re-allocate resources and deliver services to people who need help via social media sites. In addition, individuals can also join a social media site to get better suggestions and support from each other.
    Source
    Journal of the Association for Information Science and Technology. 65(2014) no.5, S.928-947
  6. Huang, C.; Fu, T.; Chen, H.: Text-based video content classification for online video-sharing sites (2010) 0.03
    0.031798244 = product of:
      0.07949561 = sum of:
        0.022488397 = weight(_text_:technology in 3452) [ClassicSimilarity], result of:
          0.022488397 = score(doc=3452,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 3452, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3452)
        0.057007212 = weight(_text_:social in 3452) [ClassicSimilarity], result of:
          0.057007212 = score(doc=3452,freq=4.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.3115296 = fieldWeight in 3452, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3452)
      0.4 = coord(2/5)
    
    Abstract
    With the emergence of Web 2.0, sharing personal content, communicating ideas, and interacting with other online users in Web 2.0 communities have become daily routines for online users. User-generated data from Web 2.0 sites provide rich personal information (e.g., personal preferences and interests) and can be utilized to obtain insight about cyber communities and their social networks. Many studies have focused on leveraging user-generated information to analyze blogs and forums, but few studies have applied this approach to video-sharing Web sites. In this study, we propose a text-based framework for video content classification of online-video sharing Web sites. Different types of user-generated data (e.g., titles, descriptions, and comments) were used as proxies for online videos, and three types of text features (lexical, syntactic, and content-specific features) were extracted. Three feature-based classification techniques (C4.5, Naïve Bayes, and Support Vector Machine) were used to classify videos. To evaluate the proposed framework, user-generated data from candidate videos, which were identified by searching user-given keywords on YouTube, were first collected. Then, a subset of the collected data was randomly selected and manually tagged by users as our experiment data. The experimental results showed that the proposed approach was able to classify online videos based on users' interests with accuracy rates up to 87.2%, and all three types of text features contributed to discriminating videos. Support Vector Machine outperformed C4.5 and Naïve Bayes techniques in our experiments. In addition, our case study further demonstrated that accurate video-classification results are very useful for identifying implicit cyber communities on video-sharing Web sites.
    Source
    Journal of the American Society for Information Science and Technology. 61(2010) no.5, S.891-906
    Theme
    Social tagging
  7. Liu, X.; Kaza, S.; Zhang, P.; Chen, H.: Determining inventor status and its effect on knowledge diffusion : a study on nanotechnology literature from China, Russia, and India (2011) 0.03
    0.031704493 = product of:
      0.07926123 = sum of:
        0.03895105 = weight(_text_:technology in 4468) [ClassicSimilarity], result of:
          0.03895105 = score(doc=4468,freq=6.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.2849816 = fieldWeight in 4468, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4468)
        0.04031018 = weight(_text_:social in 4468) [ClassicSimilarity], result of:
          0.04031018 = score(doc=4468,freq=2.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.22028469 = fieldWeight in 4468, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.0390625 = fieldNorm(doc=4468)
      0.4 = coord(2/5)
    
    Abstract
    In an increasingly global research landscape, it is important to identify the most prolific researchers in various institutions and their influence on the diffusion of knowledge. Knowledge diffusion within institutions is influenced by not just the status of individual researchers but also the collaborative culture that determines status. There are various methods to measure individual status, but few studies have compared them or explored the possible effects of different cultures on the status measures. In this article, we examine knowledge diffusion within science and technology-oriented research organizations. Using social network analysis metrics to measure individual status in large-scale coauthorship networks, we studied an individual's impact on the recombination of knowledge to produce innovation in nanotechnology. Data from the most productive and high-impact institutions in China (Chinese Academy of Sciences), Russia (Russian Academy of Sciences), and India (Indian Institutes of Technology) were used. We found that boundary-spanning individuals influenced knowledge diffusion in all countries. However, our results also indicate that cultural and institutional differences may influence knowledge diffusion.
    Source
    Journal of the American Society for Information Science and Technology. 62(2011) no.6, S.1166-1176
  8. Fu, T.; Abbasi, A.; Chen, H.: ¬A hybrid approach to Web forum interactional coherence analysis (2008) 0.03
    0.030143319 = product of:
      0.075358294 = sum of:
        0.026986076 = weight(_text_:technology in 1872) [ClassicSimilarity], result of:
          0.026986076 = score(doc=1872,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.19744103 = fieldWeight in 1872, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=1872)
        0.04837222 = weight(_text_:social in 1872) [ClassicSimilarity], result of:
          0.04837222 = score(doc=1872,freq=2.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.26434162 = fieldWeight in 1872, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.046875 = fieldNorm(doc=1872)
      0.4 = coord(2/5)
    
    Abstract
    Despite the rapid growth of text-based computer-mediated communication (CMC), its limitations have rendered the media highly incoherent. This poses problems for content analysis of online discourse archives. Interactional coherence analysis (ICA) attempts to accurately identify and construct CMC interaction networks. In this study, we propose the Hybrid Interactional Coherence (HIC) algorithm for identification of web forum interaction. HIC utilizes a bevy of system and linguistic features, including message header information, quotations, direct address, and lexical relations. Furthermore, several similarity-based methods including a Lexical Match Algorithm (LMA) and a sliding window method are utilized to account for interactional idiosyncrasies. Experiments results on two web forums revealed that the proposed HIC algorithm significantly outperformed comparison techniques in terms of precision, recall, and F-measure at both the forum and thread levels. Additionally, an example was used to illustrate how the improved ICA results can facilitate enhanced social network and role analysis capabilities.
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.8, S.1195-1209
  9. Chen, H.: Intelligence and security informatics : Introduction to the special topic issue (2005) 0.03
    0.026710678 = product of:
      0.06677669 = sum of:
        0.038559567 = weight(_text_:technology in 3232) [ClassicSimilarity], result of:
          0.038559567 = score(doc=3232,freq=12.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.28211737 = fieldWeight in 3232, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.02734375 = fieldNorm(doc=3232)
        0.028217128 = weight(_text_:social in 3232) [ClassicSimilarity], result of:
          0.028217128 = score(doc=3232,freq=2.0), product of:
            0.18299131 = queryWeight, product of:
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.04589033 = queryNorm
            0.15419927 = fieldWeight in 3232, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.9875789 = idf(docFreq=2228, maxDocs=44218)
              0.02734375 = fieldNorm(doc=3232)
      0.4 = coord(2/5)
    
    Abstract
    Making the Nation Safer: The Role of Science and Technology in Countering Terrorism The commitment of the scientific, engineering, and health communities to helping the United States and the world respond to security challenges became evident after September 11, 2001. The U.S. National Research Council's report an "Making the Nation Safer: The Role of Science and Technology in Countering Terrorism," (National Research Council, 2002, p. 1) explains the context of such a new commitment: Terrorism is a serious threat to the Security of the United States and indeed the world. The vulnerability of societies to terrorist attacks results in part from the proliferation of chemical, biological, and nuclear weapons of mass destruction, but it also is a consequence of the highly efficient and interconnected systems that we rely an for key services such as transportation, information, energy, and health care. The efficient functioning of these systems reflects great technological achievements of the past century, but interconnectedness within and across systems also means that infrastructures are vulnerable to local disruptions, which could lead to widespread or catastrophic failures. As terrorists seek to exploit these vulnerabilities, it is fitting that we harness the nation's exceptional scientific and technological capabilities to Counter terrorist threats. A committee of 24 of the leading scientific, engineering, medical, and policy experts in the United States conducted the study described in the report. Eight panels were separately appointed and asked to provide input to the committee. The panels included: (a) biological sciences, (b) chemical issues, (c) nuclear and radiological issues, (d) information technology, (e) transportation, (f) energy facilities, Cities, and fixed infrastructure, (g) behavioral, social, and institutional issues, and (h) systems analysis and systems engineering. The focus of the committee's work was to make the nation safer from emerging terrorist threats that sought to inflict catastrophic damage an the nation's people, its infrastructure, or its economy. The committee considered nine areas, each of which is discussed in a separate chapter in the report: nuclear and radiological materials, human and agricultural health systems, toxic chemicals and explosive materials, information technology, energy systems, transportation systems, Cities and fixed infrastructure, the response of people to terrorism, and complex and interdependent systems. The chapter an information technology (IT) is particularly relevant to this special issue. The report recommends that "a strategic long-term research and development agenda should be established to address three primary counterterrorismrelated areas in IT: information and network security, the IT needs of emergency responders, and information fusion and management" (National Research Council, 2002, pp. 11 -12). The MD in information and network security should include approaches and architectures for prevention, identification, and containment of cyber-intrusions and recovery from them. The R&D to address IT needs of emergency responders should include ensuring interoperability, maintaining and expanding communications capability during an emergency, communicating with the public during an emergency, and providing support for decision makers. The R&D in information fusion and management for the intelligence, law enforcement, and emergency response communities should include data mining, data integration, language technologies, and processing of image and audio data. Much of the research reported in this special issue is related to information fusion and management for homeland security.
    Source
    Journal of the American Society for Information Science and Technology. 56(2005) no.3, S.217-220
  10. Qu, B.; Cong, G.; Li, C.; Sun, A.; Chen, H.: ¬An evaluation of classification models for question topic categorization (2012) 0.02
    0.019353405 = product of:
      0.04838351 = sum of:
        0.022488397 = weight(_text_:technology in 237) [ClassicSimilarity], result of:
          0.022488397 = score(doc=237,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 237, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=237)
        0.025895113 = product of:
          0.051790226 = sum of:
            0.051790226 = weight(_text_:aspects in 237) [ClassicSimilarity], result of:
              0.051790226 = score(doc=237,freq=2.0), product of:
                0.20741826 = queryWeight, product of:
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.04589033 = queryNorm
                0.2496898 = fieldWeight in 237, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=237)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    We study the problem of question topic classification using a very large real-world Community Question Answering (CQA) dataset from Yahoo! Answers. The dataset comprises 3.9 million questions and these questions are organized into more than 1,000 categories in a hierarchy. To the best knowledge, this is the first systematic evaluation of the performance of different classification methods on question topic classification as well as short texts. Specifically, we empirically evaluate the following in classifying questions into CQA categories: (a) the usefulness of n-gram features and bag-of-word features; (b) the performance of three standard classification algorithms (naive Bayes, maximum entropy, and support vector machines); (c) the performance of the state-of-the-art hierarchical classification algorithms; (d) the effect of training data size on performance; and (e) the effectiveness of the different components of CQA data, including subject, content, asker, and the best answer. The experimental results show what aspects are important for question topic classification in terms of both effectiveness and efficiency. We believe that the experimental findings from this study will be useful in real-world classification problems.
    Source
    Journal of the American Society for Information Science and Technology. 63(2012) no.5, S.889-903
  11. Chung, W.; Chen, H.: Browsing the underdeveloped Web : an experiment on the Arabic Medical Web Directory (2009) 0.02
    0.018255439 = product of:
      0.045638595 = sum of:
        0.026986076 = weight(_text_:technology in 2733) [ClassicSimilarity], result of:
          0.026986076 = score(doc=2733,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.19744103 = fieldWeight in 2733, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=2733)
        0.01865252 = product of:
          0.03730504 = sum of:
            0.03730504 = weight(_text_:22 in 2733) [ClassicSimilarity], result of:
              0.03730504 = score(doc=2733,freq=2.0), product of:
                0.16070013 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04589033 = queryNorm
                0.23214069 = fieldWeight in 2733, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046875 = fieldNorm(doc=2733)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Date
    22. 3.2009 17:57:50
    Source
    Journal of the American Society for Information Science and Technology. 60(2009) no.3, S.595-607
  12. Zhu, B.; Chen, H.: Information visualization (2004) 0.02
    0.018156925 = product of:
      0.045392312 = sum of:
        0.027265735 = weight(_text_:technology in 4276) [ClassicSimilarity], result of:
          0.027265735 = score(doc=4276,freq=6.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.19948712 = fieldWeight in 4276, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.02734375 = fieldNorm(doc=4276)
        0.018126579 = product of:
          0.036253158 = sum of:
            0.036253158 = weight(_text_:aspects in 4276) [ClassicSimilarity], result of:
              0.036253158 = score(doc=4276,freq=2.0), product of:
                0.20741826 = queryWeight, product of:
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.04589033 = queryNorm
                0.17478286 = fieldWeight in 4276, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.5198684 = idf(docFreq=1308, maxDocs=44218)
                  0.02734375 = fieldNorm(doc=4276)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Abstract
    Advanced technology has resulted in the generation of about one million terabytes of information every year. Ninety-reine percent of this is available in digital format (Keim, 2001). More information will be generated in the next three years than was created during all of previous human history (Keim, 2001). Collecting information is no longer a problem, but extracting value from information collections has become progressively more difficult. Various search engines have been developed to make it easier to locate information of interest, but these work well only for a person who has a specific goal and who understands what and how information is stored. This usually is not the Gase. Visualization was commonly thought of in terms of representing human mental processes (MacEachren, 1991; Miller, 1984). The concept is now associated with the amplification of these mental processes (Card, Mackinlay, & Shneiderman, 1999). Human eyes can process visual cues rapidly, whereas advanced information analysis techniques transform the computer into a powerful means of managing digitized information. Visualization offers a link between these two potent systems, the human eye and the computer (Gershon, Eick, & Card, 1998), helping to identify patterns and to extract insights from large amounts of information. The identification of patterns is important because it may lead to a scientific discovery, an interpretation of clues to solve a crime, the prediction of catastrophic weather, a successful financial investment, or a better understanding of human behavior in a computermediated environment. Visualization technology shows considerable promise for increasing the value of large-scale collections of information, as evidenced by several commercial applications of TreeMap (e.g., http://www.smartmoney.com) and Hyperbolic tree (e.g., http://www.inxight.com) to visualize large-scale hierarchical structures. Although the proliferation of visualization technologies dates from the 1990s where sophisticated hardware and software made increasingly faster generation of graphical objects possible, the role of visual aids in facilitating the construction of mental images has a long history. Visualization has been used to communicate ideas, to monitor trends implicit in data, and to explore large volumes of data for hypothesis generation. Imagine traveling to a strange place without a map, having to memorize physical and chemical properties of an element without Mendeleyev's periodic table, trying to understand the stock market without statistical diagrams, or browsing a collection of documents without interactive visual aids. A collection of information can lose its value simply because of the effort required for exhaustive exploration. Such frustrations can be overcome by visualization.
    Visualization can be classified as scientific visualization, software visualization, or information visualization. Although the data differ, the underlying techniques have much in common. They use the same elements (visual cues) and follow the same rules of combining visual cues to deliver patterns. They all involve understanding human perception (Encarnacao, Foley, Bryson, & Feiner, 1994) and require domain knowledge (Tufte, 1990). Because most decisions are based an unstructured information, such as text documents, Web pages, or e-mail messages, this chapter focuses an the visualization of unstructured textual documents. The chapter reviews information visualization techniques developed over the last decade and examines how they have been applied in different domains. The first section provides the background by describing visualization history and giving overviews of scientific, software, and information visualization as well as the perceptual aspects of visualization. The next section assesses important visualization techniques that convert abstract information into visual objects and facilitate navigation through displays an a computer screen. It also explores information analysis algorithms that can be applied to identify or extract salient visualizable structures from collections of information. Information visualization systems that integrate different types of technologies to address problems in different domains are then surveyed; and we move an to a survey and critique of visualization system evaluation studies. The chapter concludes with a summary and identification of future research directions.
    Source
    Annual review of information science and technology. 39(2005), S.139-177
  13. Leroy, G.; Chen, H.: Genescene: an ontology-enhanced integration of linguistic and co-occurrence based relations in biomedical texts (2005) 0.02
    0.015212866 = product of:
      0.038032163 = sum of:
        0.022488397 = weight(_text_:technology in 5259) [ClassicSimilarity], result of:
          0.022488397 = score(doc=5259,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 5259, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5259)
        0.015543767 = product of:
          0.031087535 = sum of:
            0.031087535 = weight(_text_:22 in 5259) [ClassicSimilarity], result of:
              0.031087535 = score(doc=5259,freq=2.0), product of:
                0.16070013 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04589033 = queryNorm
                0.19345059 = fieldWeight in 5259, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5259)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Date
    22. 7.2006 14:26:01
    Source
    Journal of the American Society for Information Science and Technology. 56(2005) no.5, S.457-468
  14. Zheng, R.; Li, J.; Chen, H.; Huang, Z.: ¬A framework for authorship identification of online messages : writing-style features and classification techniques (2006) 0.02
    0.015212866 = product of:
      0.038032163 = sum of:
        0.022488397 = weight(_text_:technology in 5276) [ClassicSimilarity], result of:
          0.022488397 = score(doc=5276,freq=2.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.16453418 = fieldWeight in 5276, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5276)
        0.015543767 = product of:
          0.031087535 = sum of:
            0.031087535 = weight(_text_:22 in 5276) [ClassicSimilarity], result of:
              0.031087535 = score(doc=5276,freq=2.0), product of:
                0.16070013 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.04589033 = queryNorm
                0.19345059 = fieldWeight in 5276, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5276)
          0.5 = coord(1/2)
      0.4 = coord(2/5)
    
    Date
    22. 7.2006 16:14:37
    Source
    Journal of the American Society for Information Science and Technology. 57(2006) no.3, S.378-393
  15. Hu, P.J.-H.; Lin, C.; Chen, H.: User acceptance of intelligence and security informatics technology : a study of COPLINK (2005) 0.01
    0.014279692 = product of:
      0.07139846 = sum of:
        0.07139846 = weight(_text_:technology in 3233) [ClassicSimilarity], result of:
          0.07139846 = score(doc=3233,freq=14.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.52237993 = fieldWeight in 3233, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=3233)
      0.2 = coord(1/5)
    
    Abstract
    The importance of Intelligence and Security Informatics (ISI) has significantly increased with the rapid and largescale migration of local/national security information from physical media to electronic platforms, including the Internet and information systems. Motivated by the significance of ISI in law enforcement (particularly in the digital government context) and the limited investigations of officers' technology-acceptance decisionmaking, we developed and empirically tested a factor model for explaining law-enforcement officers' technology acceptance. Specifically, our empirical examination targeted the COPLINK technology and involved more than 280 police officers. Overall, our model shows a good fit to the data collected and exhibits satisfactory Power for explaining law-enforcement officers' technology acceptance decisions. Our findings have several implications for research and technology management practices in law enforcement, which are also discussed.
    Source
    Journal of the American Society for Information Science and Technology. 56(2005) no.3, S.235-244
  16. Vishwanath, A.; Chen, H.: Technology clusters : using multidimensional scaling to evaluate and structure technology clusters (2006) 0.01
    0.013493039 = product of:
      0.06746519 = sum of:
        0.06746519 = weight(_text_:technology in 6006) [ClassicSimilarity], result of:
          0.06746519 = score(doc=6006,freq=18.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.49360257 = fieldWeight in 6006, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=6006)
      0.2 = coord(1/5)
    
    Abstract
    Empirical evidence suggests that the ownership of related products that form a technology cluster is signifIcantly better than the attributes of an innovation at predicting adoption. The treatment of technology clusters, however, has been ad hoc and study specific: Researchers often make a priori assumptions about the relationships between technologies and measure ownership using lists of functionally related technology, without any systematic reasoning. Hence, the authors set out to examine empirically the composition of technology clusters and the differences, if any, in clusters of technologies formed by adopters and nonadopters. Using the Galileo system of multidimensional scaling and the associational diffusion framework, the dissimilarities between 30 technology concepts were scored by adopters and nonadopters. Results indicate clear differences in conceptualization of clusters: Adopters tend to relate technologies based an their functional similarity; here, innovations are perceived to be complementary, and hence, adoption of one technology spurs the adoption of related technologies. On the other hand, nonadopters tend to relate technologies using a stricter ascendancy of association where the adoption of an innovation makes subsequent innovations redundant. The results question the measurement approaches and present an alternative methodology.
    Source
    Journal of the American Society for Information Science and Technology. 57(2006) no.11, S.1451-1460
  17. Vishwanath, A.; Chen, H.: Personal communication technologies as an extension of the self : a cross-cultural comparison of people's associations with technology and their symbolic proximity with others (2008) 0.01
    0.01079443 = product of:
      0.05397215 = sum of:
        0.05397215 = weight(_text_:technology in 2355) [ClassicSimilarity], result of:
          0.05397215 = score(doc=2355,freq=8.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.39488205 = fieldWeight in 2355, product of:
              2.828427 = tf(freq=8.0), with freq of:
                8.0 = termFreq=8.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=2355)
      0.2 = coord(1/5)
    
    Abstract
    Increasingly, individuals use communication technologies such as e-mail, IMs, blogs, and cell phones to locate, learn about, and communicate with one another. Not much, however, is known about how individuals relate to various personal technologies, their preferences for each, or their extensional associations with them. Even less is known about the cultural differences in these preferences. The current study used the Galileo system of multidimensional scaling to systematically map the extensional associations with nine personal communication technologies across three cultures: U.S., Germany, and Singapore. Across the three cultures, the technologies closest to the self were similar, suggesting a universality of associations with certain technologies. In contrast, the technologies farther from the self were significantly different across cultures. Moreover, the magnitude of associations with each technology differed based on the extensional association or distance from the self. Also, and more importantly, the antecedents to these associations differed significantly across cultures, suggesting a stronger influence of cultural norms on personal-technology choice.
    Source
    Journal of the American Society for Information Science and Technology. 59(2008) no.11, S.1761-1775
  18. Jiang, S.; Gao, Q.; Chen, H.; Roco, M.C.: ¬The roles of sharing, transfer, and public funding in nanotechnology knowledge-diffusion networks (2015) 0.01
    0.0076328157 = product of:
      0.03816408 = sum of:
        0.03816408 = weight(_text_:technology in 1823) [ClassicSimilarity], result of:
          0.03816408 = score(doc=1823,freq=4.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.2792238 = fieldWeight in 1823, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.046875 = fieldNorm(doc=1823)
      0.2 = coord(1/5)
    
    Abstract
    Understanding the knowledge-diffusion networks of patent inventors can help governments and businesses effectively use their investment to stimulate commercial science and technology development. Such inventor networks are usually large and complex. This study proposes a multidimensional network analysis framework that utilizes Exponential Random Graph Models (ERGMs) to simultaneously model knowledge-sharing and knowledge-transfer processes, examine their interactions, and evaluate the impacts of network structures and public funding on knowledge-diffusion networks. Experiments are conducted on a longitudinal data set that covers 2 decades (1991-2010) of nanotechnology-related US Patent and Trademark Office (USPTO) patents. The results show that knowledge sharing and knowledge transfer are closely interrelated. High degree centrality or boundary inventors play significant roles in the network, and National Science Foundation (NSF) public funding positively affects knowledge sharing despite its small fraction in overall funding and upstream research topics.
    Source
    Journal of the Association for Information Science and Technology. 66(2015) no.5, S.1017-1029
  19. Chung, W.; Chen, H.; Reid, E.: Business stakeholder analyzer : an experiment of classifying stakeholders on the Web (2009) 0.01
    0.0063606794 = product of:
      0.031803396 = sum of:
        0.031803396 = weight(_text_:technology in 2699) [ClassicSimilarity], result of:
          0.031803396 = score(doc=2699,freq=4.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.23268649 = fieldWeight in 2699, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=2699)
      0.2 = coord(1/5)
    
    Abstract
    As the Web is used increasingly to share and disseminate information, business analysts and managers are challenged to understand stakeholder relationships. Traditional stakeholder theories and frameworks employ a manual approach to analysis and do not scale up to accommodate the rapid growth of the Web. Unfortunately, existing business intelligence (BI) tools lack analysis capability, and research on BI systems is sparse. This research proposes a framework for designing BI systems to identify and to classify stakeholders on the Web, incorporating human knowledge and machine-learned information from Web pages. Based on the framework, we have developed a prototype called Business Stakeholder Analyzer (BSA) that helps managers and analysts to identify and to classify their stakeholders on the Web. Results from our experiment involving algorithm comparison, feature comparison, and a user study showed that the system achieved better within-class accuracies in widespread stakeholder types such as partner/sponsor/supplier and media/reviewer, and was more efficient than human classification. The student and practitioner subjects in our user study strongly agreed that such a system would save analysts' time and help to identify and classify stakeholders. This research contributes to a better understanding of how to integrate information technology with stakeholder theory, and enriches the knowledge base of BI system design.
    Source
    Journal of the American Society for Information Science and Technology. 60(2009) no.1, S.59-74
  20. Chau, M.; Wong, C.H.; Zhou, Y.; Qin, J.; Chen, H.: Evaluating the use of search engine development tools in IT education (2010) 0.01
    0.0063606794 = product of:
      0.031803396 = sum of:
        0.031803396 = weight(_text_:technology in 3325) [ClassicSimilarity], result of:
          0.031803396 = score(doc=3325,freq=4.0), product of:
            0.13667917 = queryWeight, product of:
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.04589033 = queryNorm
            0.23268649 = fieldWeight in 3325, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              2.978387 = idf(docFreq=6114, maxDocs=44218)
              0.0390625 = fieldNorm(doc=3325)
      0.2 = coord(1/5)
    
    Abstract
    It is important for education in computer science and information systems to keep up to date with the latest development in technology. With the rapid development of the Internet and the Web, many schools have included Internet-related technologies, such as Web search engines and e-commerce, as part of their curricula. Previous research has shown that it is effective to use search engine development tools to facilitate students' learning. However, the effectiveness of these tools in the classroom has not been evaluated. In this article, we review the design of three search engine development tools, SpidersRUs, Greenstone, and Alkaline, followed by an evaluation study that compared the three tools in the classroom. In the study, 33 students were divided into 13 groups and each group used the three tools to develop three independent search engines in a class project. Our evaluation results showed that SpidersRUs performed better than the two other tools in overall satisfaction and the level of knowledge gained in their learning experience when using the tools for a class project on Internet applications development.
    Source
    Journal of the American Society for Information Science and Technology. 61(2010) no.2, S.288-299