Hsinchun Chen

Hsinchun Chen

Professor, Management Information Systems
Regents Professor
Member of the Graduate Faculty
Professor, BIO5 Institute
Primary Department
Contact
(520) 621-4153

Research Interest

Dr Chen's areas of expertise include:Security informatics, security big data; smart and connected health, health analytics; data, text, web mining.Digital library, intelligent information retrieval, automatic categorization and classification, machine learning for IR, large-scale information analysis and visualization.Internet resource discovery, digital libraries, IR for large-scale scientific and business databases, customized IR, multilingual IR.Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning, neural networks computing, genetic algorithms, simulated annealing.Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process.

Publications

Hu, P. J., Lin, C., & Chen, H. (2003). Examining technology acceptance by individual law enforcement officers: An exploratory study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2665, 209-222.

Abstract:

Management of technology implementation has been a critical challenge to organizations, public or private. In particular, user acceptance is paramount to the ultimate success of a newly implemented technology in adopting organizations. This study examined acceptance of COPLINK, a suite of IT applications designed to support law enforcement officers' analyses of criminal activities. We developed a factor model that explains or predicts individual officers' acceptance decision-making and empirically tested this model using a survey study that involved more than 280 police officers. Overall, our model shows a reasonably good fit to officers' acceptance assessments and exhibits satisfactory explanatory power. Our analysis suggests a prominent core influence path from efficiency gain to perceived usefulness and then to intention to accept. Subjective norm also appears to have a significant effect on user acceptance through the mediation of perceived usefulness. Several managerial implications derived from our study findings are also discussed. © Springer-Verlag Berlin Heidelberg 2003.

Schumaker, R. P., & Chen, H. (2010). Interaction analysis of the ALICE chatterbot: A two-study investigation of dialog and domain questioning. IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans, 40(1), 40-51.

Abstract:

This paper analyzes and compares the data gathered from two previously conducted Artificial Linguistic Internet Chat Entity (ALICE) chatterbot studies that were focused on response accuracy and user satisfaction measures for six chatterbots. These chatterbots were further loaded with varying degrees of conversational, telecommunications, and terrorism knowledge. From our prior experiments using 347 participants, we obtained 33 446 human/chatterbot interactions. It was found that asking the ALICE chatterbots "are" and "where" questions resulted in higher response satisfaction levels, as compared to other interrogative-style inputs because of their acceptability to vague,binary, or clichéd chatterbot responses. We also found a relationship between the length of a query and the users perceived satisfaction of the chatterbot response, where shorter queries led to more satisfying responses. © 2009 IEEE.

Chen, H., Chung, Y., Ramsey, M., Yang, C. C., Ma, P., & Yen, J. (1997). Intelligent spider for Internet searching. Proceedings of the Hawaii International Conference on System Sciences, 4, 178-188.

Abstract:

As the World-Wide Web (WWW) based Internet services become more popular, information overload also becomes a pressing research problem. Difficulties with searching on Internet get worse as the amount of information that available on the Internet increases. A scalable approach to support Internet search is critical to the success of Internet services and other current or future National Information Infrastructure (NII) applications. A new approach to build intelligent personal spider (agent), which is based on automatic textual analysis of Internet documents, is proposed in this paper. Best first search and genetic algorithm have been tested to develop the intelligent spider. These personal spiders are able to dynamically and intelligently analyze the contents of the users selected homepages as the starting point to search for the most relevant homepages based on the links and indexing. An intelligent spider must have the capability to make adjustments according to progress of searching in order to be an intelligent agent. However, the current searching engines do not have the communication between the users and the robots. The spider presented in this paper use Java to develop the user interface such that the users can adjust the control parameters according to the progress and observe the intermediate results. The performances of the genetic algorithm based and best first search based spiders are also reported.

Kaza, S., & Chen, H. (2008). Suspect vehicle identification for border safety. Studies in Computational Intelligence, 135, 305-318.

Abstract:

Border safety is a critical part of national and international security. The U.S. Department of Homeland Security searches vehicles entering the country at land borders for drugs and other contraband. Customs and Border Protection (CBP) agents believe that such vehicles operate in groups and if the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify vehicles that may be involved in criminal activity. CBP agents also suggest that criminal vehicles may cross at certain times or ports to try and evade inspection. In a partnership with border-area law enforcement agencies and CBP, we include these heuristics in the MI formulation and identify suspect vehicles using large-scale, real-world data collections. Statistical tests and selected cases judged by domain experts show that the heuristic-enhanced MI performs significantly better than classical MI in identifying pairs of potentially criminal vehicles. The techniques described can be used to assist CBP agents perform their functions both efficiently and effectively. © 2008 Springer-Verlag Berlin Heidelberg.

Zhang, Y., Zeng, S., Huang, C., Fan, L., Ximing, Y. u., Dang, Y., Larson, C. A., Denning, D., Roberts, N., & Chen, H. (2010). Developing a Dark Web collection and infrastructure for computational and social sciences. ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, 59-64.

Abstract:

In recent years, there have been numerous studies from a variety of perspectives analyzing the Internet presence of hate and extremist groups. Yet the websites and forums of extremist and terrorist groups have long remained an underutilized resource for terrorism researchers due to their ephemeral nature and access and analysis problems. The purpose of the Dark Web archive is to provide a research infrastructure for use by social scientists, computer and information scientists, policy and security analysts, and others studying a wide range of social and organizational phenomena and computational problems. The Dark Web Forum Portal provides web enabled access to critical international jihadist and other extremist web forums. The focus of this paper is on the significant extensions to previous work including: increasing the scope of data collection, adding an incremental spidering component for regular data updates; enhancing the searching and browsing functions; enhancing multilingual machine-translation for Arabic, French, German and Russian; and advanced Social Network Analysis. A case study on identifying active participants is shown at the end. © 2010 IEEE.