Jennifer Jie Xu

According to our database1, Jennifer Jie Xu authored at least 48 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Does Appearance Matter? Exploring the Role of Facial Features for Judging Borrowers' Credibility in Online P2P Lending Markets.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Competition Within and Between Communities in Social Networks.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Cheap Talk? The Impact of Lender-Borrower Communication on Peer-to-Peer Lending Outcomes.
J. Manag. Inf. Syst., 2018

2016
Identifying features for detecting fraudulent loan requests on P2P platforms.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
P2P Lending Fraud Detection: A Big Data Approach.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2015

The Effects of Lender-Borrower Communication on P2P Lending Outcomes.
Proceedings of the International Conference on Information Systems, 2015

2014
Competition Within and Between Communities Within and Across Social Networks.
Encyclopedia of Social Network Analysis and Mining, 2014

The Development of Social Capital in the Collaboration Network of Information Systems Scholars.
J. Assoc. Inf. Syst., 2014

Knowledge Discovery and Data Mining.
Proceedings of the Computing Handbook, 2014

2012
Business Intelligence in Blogs: Understanding Consumer Interactions and Communities.
MIS Q., 2012

2010
Social Network Data Mining: Research Questions, Techniques, and Applications.
Proceedings of the Data Mining for Social Network Data, 2010

2009
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security.
IEEE Trans. Intell. Transp. Syst., 2009

A Blog Mining Framework.
IT Prof., 2009

Word of Mouth Marketing through Online Social Networks.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Understanding the Nexus of Terrorist Web Sites.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

The topology of dark networks.
Commun. ACM, 2008

2007
Automated criminal link analysis based on domain knowledge.
J. Assoc. Inf. Sci. Technol., 2007

Complex Problem Solving: Identity Matching Based on Social Contextual Information.
J. Assoc. Inf. Syst., 2007

Mining communities and their relationships in blogs: A study of online hate groups.
Int. J. Hum. Comput. Stud., 2007

An end user evaluation of query formulation and results review tools in three medical meta-search engines.
Int. J. Medical Informatics, 2007

2006
Expertise visualization: An implementation and study based on cognitive fit theory.
Decis. Support Syst., 2006

Intelligence and security informatics.
Annu. Rev. Inf. Sci. Technol., 2006

A Framework for Locating and Analyzing Hate Groups in Blogs.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

On the Topology of the Dark Web of Terrorist Groups.
Proceedings of the Intelligence and Security Informatics, 2006

The Social Identity of IS: Analyzing the Collaboration Network of the ICIS Conferences (1980-2005).
Proceedings of the International Conference on Information Systems, 2006

Mining Communities of Bloggers: A Case Study on Cyber-Hate.
Proceedings of the International Conference on Information Systems, 2006

Using Social Contextual Information to Match Criminal Identities.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Mining Static and Dynamic Structural Patterns in Networks for Knowledge Management: a Computational Framework and Case studies.
PhD thesis, 2005

CrimeNet explorer: a framework for criminal network knowledge discovery.
ACM Trans. Inf. Syst., 2005

Criminal network analysis and visualization.
Commun. ACM, 2005

Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.
Proceedings of the Intelligence and Security Informatics, 2005

BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
Proceedings of the Intelligence and Security Informatics, 2005

Topological analysis of criminal activity networks in multiple jurisdictions.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

BorderSafe: cross-jurisdictional information sharing, analysis, and visualization.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Studying the Structure of Terrorist Networks: A Web Structural Mining Approach.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks.
Decis. Support Syst., 2004

Crime Data Mining: A General Framework and Some Examples.
Computer, 2004

Analyzing and Visualizing Criminal Network Dynamics: A Case Study.
Proceedings of the Intelligence and Security Informatics, 2004

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.
Proceedings of the Intelligence and Security Informatics, 2004

Visualizing the Expertise Space.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Cross-Jurisdictional Activity Networks to Support Criminal Investigations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Genescene: Biomedical Text And Data Mining.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

Untangling Criminal Networks: A Case Study.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Crime Data Mining: An Overview and Case Studies.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

2002
Using Shortest Path Algorithms to Identify Criminal Associations.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Extracting Meaningful Entities from Police Narrative Reports.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002


  Loading...