Alan Wang 王刚
Alan Wang 王刚
Professor in Business Information Technology, Pamplin College of Business, Virginia Tech
Verified email at - Homepage
Cited by
Cited by
Crime data mining: a general framework and some examples
H Chen, W Chung, JJ Xu, G Wang, Y Qin, M Chau
Computer 37 (4), 50-56, 2004
Understanding the determinants of online review helpfulness: A meta-analytic investigation
H Hong, D Xu, GA Wang, W Fan
Decision Support Systems 102, 1-11, 2017
The impact of channel integration on consumer responses in omni-channel retailing: The mediating effect of consumer empowerment
M Zhang, C Ren, GA Wang, Z He
Electronic Commerce Research and Applications 28, 181-193, 2018
Automatic identification of different types of welding defects in radiographic images
G Wang, TW Liao
Ndt & E International 35 (8), 519-528, 2002
Vehicle defect discovery from social media
AS Abrahams, J Jiao, GA Wang, W Fan
Decision Support Systems, 2012
An integrated text analytic framework for product defect discovery
AS Abrahams, W Fan, GA Wang, ZJ Zhang, J Jiao
Production and Operations Management 24 (6), 975-990, 2015
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining …
H Chen, H Atabakhsh, JJ Xu, AG Wang, B Marshall, S Kaza, LC Tseng, ...
Proceedings of the 2005 national conference on Digital government research …, 2005
ExpertRank: A topic-aware expert finding algorithm for online knowledge communities
GA Wang, J Jiao, AS Abrahams, W Fan, Z Zhang
Decision Support Systems 54 (3), 1442-1451, 2013
Project description and crowdfunding success: an exploratory study
MJ Zhou, B Lu, WP Fan, GA Wang
Information Systems Frontiers 20 (2), 259-274, 2018
Automatically detecting deceptive criminal identities
G Wang, H Chen, H Atabakhsh
Communications of the ACM 47 (3), 70-76, 2004
Measuring Customer Agility from Online Reviews Using Big Data Text Analytics
S Zhou, Z Qiao, Q Du, GA Wang, W Fan, X Yan
Journal of Management Information Systems 35 (2), 510-539, 2018
Social media adoption and corporate disclosure
M Zhou, L Lei, J Wang, W Fan, AG Wang
Journal of Information Systems 29 (2), 23-50, 2015
What's buzzing in the blizzard of buzz? Automotive component isolation in social media postings
AS Abrahams, J Jiao, W Fan, GA Wang, Z Zhang
Decision Support Systems 55 (4), 871-882, 2013
Crime data mining: an overview and case studies
H Chen, W Chung, Y Qin, M Chau, JJ Xu, G Wang, R Zheng, H Atabakhsh
Proceedings of the 2003 annual national conference on Digital government …, 2003
Intelligence and security informatics
HCFY Wang, CCYD Zeng, MCK Chang
Intelligence and security informatics
M Wang, XZH Chen, DZW Mao
Pacific Asia Workshop (PAISI), 2011
Intelligence and Security Informatics
MCGA Wang, XZH Chen, DZW Mao
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012, Proceedings
M Chau, WT Yue, GA Wang, H Chen
Springer, 2012
Automatically detecting criminal identity deception: an adaptive detection algorithm
GA Wang, H Chen, JJ Xu, H Atabakhsh
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
M Chau, GA Wang, X Zheng, H Chen, D Zeng
Springer-Verlag, 2011
The system can't perform the operation now. Try again later.
Articles 1–20