Hsinchun Chen

Hsinchun Chen

Professor, Management Information Systems
Regents Professor
Member of the Graduate Faculty
Professor, BIO5 Institute
Primary Department
Contact
(520) 621-4153

Research Interest

Dr Chen's areas of expertise include:Security informatics, security big data; smart and connected health, health analytics; data, text, web mining.Digital library, intelligent information retrieval, automatic categorization and classification, machine learning for IR, large-scale information analysis and visualization.Internet resource discovery, digital libraries, IR for large-scale scientific and business databases, customized IR, multilingual IR.Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning, neural networks computing, genetic algorithms, simulated annealing.Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process.

Publications

Hu, P. J., Chen, H., Hu, H., Larson, C., & Butierez, C. (2011). Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLINK Mobile. Electronic Commerce Research and Applications, 10(1), 6-16.

Abstract:

Timely information access and knowledge support is critical for law enforcement, because officers require convenient and timely access to accurate data, relevant information, and integrated knowledge in their crime investigation and fighting activities. As an integrated system that provides such support, COPLINK can improve collaboration within and across agency boundaries. This study examines field officers' acceptance and actual use of COPLINK Mobile, a critical technology that offers COPLINK core query functionalities through a lightweight, handheld device or mobile applications running on a small bandwidth. We propose and empirically test a factor model explaining the focal technology acceptance with survey data collected from 40 field officers. The data support our model and most of the hypotheses, which can reasonably explain an officer's acceptance and actual use of COPLINK Mobile. Among the determinants investigated, perceived usefulness has the greatest impact and depends on both efficiency gain and social influence. Our findings have important implications for both research and practice. © 2010 Elsevier B.V. All rights reserved.

Chen, H., Schuffels, C., & Orwig, R. (1996). Internet Categorization and Search: A Self-Organizing Approach. Journal of Visual Communication and Image Representation, 7(1), 88-102.

Abstract:

The problems of information overload and vocabulary differences have become more pressing with the emergence of increasingly popular Internet services. The main information retrieval mechanisms provided by the prevailing Internet WWW software are based on either keyword search (e.g., the Lycos server at CMU, the Yahoo server at Stanford) or hypertext browsing (e.g., Mosaic and Netscape). This research aims to provide an alternative concept-based categorization and search capability for WWW servers based on selected machine learning algorithms. Our proposed approach, which is grounded on automatic textual analysis of Internet documents (homepages), attempts to address the Internet search problem by first categorizing the content of Internet documents. We report results of our recent testing of a multilayered neural network clustering algorithm employing the Kohonen self-organizing feature map to categorize (classify) Internet homepages according to their content. The category hierarchies created could serve to partition the vast Internet services into subject-specific categories and databases and improve Internet keyword searching and/or browsing. © 1996 Academic Press, Inc.

Chen, H. (2008). Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5376 LNCS, 85-96.

Abstract:

We believe the science of Intelligence and Security Informatics (ISI) can help with nuclear forensics and attribution. ISI research can help advance the intelligence collection, analytical techniques and instrumentation used in determining the origin, capability, intent, and transit route of nuclear materials by selected hostile countries and (terrorist) groups. We propose a research framework that aims to investigate the Capability, Accessibility, and Intent of critical high-risk countries, institutions, researchers, and extremist or terrorist groups. We propose to develop a knowledge base of the Nuclear Web that will collect, analyze, and pinpoint significant actors in the high-risk international nuclear physics and weapon community. We also identify potential extremist or terrorist groups from our Dark Web testbed who might pose WMD threats to the US and the international community. Selected knowledge mapping and focused web crawling techniques and findings from a preliminary study are presented in this paper. © 2008 Springer Berlin Heidelberg.

Salem, A., Reid, E., & Chen, H. (2006). Content analysis of Jiliadi extremist groups' videos. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3975 LNCS, 615-620.

Abstract:

This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' modus operandi, and production features. The videos convey messages powerful enough to mobilize members, sympathizers, and even new recruits to launch attacks that will once again be captured and disseminated via the Internet. The content collection and analysis of the groups' videos can help policy makers, intelligence analysts, and researchers better understand the groups' terror campaigns and modus operandi, and help suggest counter-intelligence strategies and tactics for troop training. © Springer-Verlag Berlin Heidelberg 2006.

Schumaker, R. P., Liu, Y., Ginsburg, M., & Chen, H. (2007). Evaluating the efficacy of a terrorism question/answer system. Communications of the ACM, 50(7), 74-80.

Abstract:

The TARA Project examined how a trio of modified chatterbots could be used to disseminate terrorism-related information to the general public. © 2007 ACM.