31. ​Kitchens, B., Dobolyi, D., Li, J., and Abbasi, A. “Advanced Customer Analytics: Strategic Value through Integration of Relationship-Oriented Big Data,” Journal of Management Information Systems, forthcoming.


30. ​Abbasi, A. Zhou, Y., Deng, S., and Zhang, P. “Text Analytics to Support Sense-making in Social Media: A Language-Action Perspective,” MIS Quarterly, 42(2), 2018, pp. 427-464. PDFAppendices


29. ​Zimbra, D., Abbasi, A., Zeng, D., and Chen, H. “The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation,” ACM Transactions on Management Information Systems, forthcoming. PDF


28. ​Deng, S., Zhang, P., Zhou, Y., and Abbasi, A. “Using Discussion Logic in Analyzing Online Group Discussions: A Text Mining Approach,” Information and Management, conditionally accepted.


27. ​Abbasi, A., Sarker, S., and Chiang, R. H. L. “Big Data Research in Information Systems: Toward an Inclusive Research Agenda,” Journal of the Association for Information Systems, 17(2), no. 3, 2016. PDF


26. ​Zahedi, F. M., Abbasi, A., and Chen, Y. “Fake-Website Detection Tools: Identifying Design Elements that Promote Individuals’ Use and Enhance their Performance,” Journal of the Association for Information Systems, 16(6), 2015, pp. 448-484. PDF


25. Abbasi, A., Zahedi, F. M., Zeng, D., Chen, Y., Chen, H., and Nunamaker Jr., J. F. “Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information,” Journal of Management Information Systems, 31(4), 2015, pp. 109-157. PDF


24. Abbasi, A., Lau, R. Y. K., and Brown, D. E. “Predicting Behavior,” IEEE Intelligent Systems, 30(3), 2015, pp. 35-43. PDF


23. Brown, D. E., Abbasi, A., and Lau, R. Y. K., “Predictive Analytics: Predictive Modeling at the Micro Level,” IEEE Intelligent Systems, 30(3), 2015, pp. 6-8, guest editors' introduction to special issue. PDF


22. Brown, D. E., Abbasi, A., and Lau, R. Y. K., “Predictive Analytics,” IEEE Intelligent Systems, 30(2), 2015, pp. 6-8, guest editors' introduction to special issue. PDF


​​21.Abbasi, A. and Adjeroh, D. "Social Media Analytics for Smart Health," IEEE Intelligent Systems, 29(2), 2014, pp. 60-64. PDF

 

20. Adjeroh, D., Beal, R., Abbasi, A., Zheng, W., Abate, M., and Ross, A. "Signal Fusion for Social Media Analysis of Adverse Drug Events," IEEE Intelligent Systems, 29(2), 2014, pp. 74-80. PDF


19. Zhang, Z., Zeng, D., Abbasi, A., Peng, J., and Zheng, X. “A Random Walk Model for Item Recommendation in Social Tagging Systems,” ACM Transactions on Management Information Systems, 4(2), 2013, no. 8. PDF


18. Abbasi, A., Albrecht, C. C., Vance, A., and Hansen, J. V. “MetaFraud: A Meta-learning Framework for Detecting Financial Fraud,” MIS Quarterly, 36(4), 2012, pp. 1293-1397. PDF Appendices


17. Fu, T., Abbasi, A., Zeng, D., and Chen, H. “Sentimental Spiders: Leveraging Opinion Information in Focused Crawlers,” ACM Transactions on Information Systems, 30(4), 2012, no. 24. PDF


16. Abbasi, A., Zahedi, F. M., and Kaza, S. “Detecting Fake Medical Websites using Recursive Trust Labeling,” ACM Transactions on Information Systems, 30(4), 2012, no. 22. PDF


15. Abbasi, A., France, S. L., Zhang, Z., and Chen, H. “Selecting Attributes for Sentiment Classification using Feature Relation Networks,” IEEE Transactions on Knowledge and Data Engineering, 23(3), 2011, pp. 447-462. PDF


14. Zimbra, D., Abbasi, A., and Chen, H. “A Cyber-Archaeology Approach to Social Movement Research: Framework and Case Study,” Journal of Computer-Mediated Communication, 16, 2010, pp. 48-70. PDF


13. Abbasi, A. “Intelligent Feature Selection for Opinion Classification,” IEEE Intelligent Systems, 25(4), 2010, pp. 75-79. PDF


12. Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., and Nunamaker Jr., J. F. “Detecting Fake Websites: The Contribution of Statistical Learning Theory,” MIS Quarterly, 34(3), 2010, pp. 435-461 (MISQ Best Paper Award for 2010). PDF


11. Fu, T., Abbasi, A., and Chen, H. “A Focused Crawler for Dark Web Forums,” Journal of the American Society for Information Science and Technology, 61(6), 2010, pp. 1213-1231. PDF


10. Chen, Y. Abbasi, A., and Chen, H. “Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement,” Annals of Information Systems, 9, 2010, pp. 1-24. PDF


9. Abbasi, A. and Chen, H. “A Comparison of Tools for Detecting Fake Websites,” IEEE Computer, 42(10), 2009, pp. 78-86. PDF


8. Abbasi, A. and Chen, H. “A Comparison of Fraud Cues and Classification Methods for Fake Escrow Website Detection,” Information Technology and Management, 10(2), 2009, pp. 83-101. PDF


7. Abbasi, A., and Chen, H. “CyberGate: A Design Framework and System for Text Analysis of Computer Mediated Communication,” MIS Quarterly, 32(4), 2008, pp. 811-837. PDF


6. Abbasi, A., Chen, H., Thoms, S., and Fu, T. “Affect Analysis of Web Forums and Blogs using Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, 20(9), 2008, pp. 1168-1180. PDF


5. Abbasi, A., Chen, H., and Nunamaker Jr., J. F. “Stylometric Identification in Electronic Markets: Scalability and Robustness,” Journal of Management Information Systems, 25(1), 2008, pp. 49-78. PDF


4. Abbasi, A., Chen, H., and Salem, A. “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems, 26(3), 2008, no. 12. PDF


3. Fu, T., Abbasi, A., and Chen, H. “A Hybrid Approach to Web Forum Interactional Coherence Analysis,” Journal of the American Society for Information Science and Technology, 59(8), 2008, pp. 1195-1209. PDF


2. Abbasi, A., and Chen, H. “Writeprints: A Stylometric Approach to Identity-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, 26(2), 2008, no. 7. PDF


1. Abbasi, A., and Chen, H. “Applying Authorship Analysis to Extremist-Group Web Forum Messages,” IEEE Intelligent Systems, 20(5), 2005, pp. 67-75. PDF


Conference Papers

Journal Publications

Ahmed Abbasi

41. Adjeroh, D., Allaga, M., Tun, J., Lin, J., Jiang, Y., Abbasi, A., and Zhou, X. “Feature-Based and String-Based Models for Predicting RNA-Protein Interaction,” Molecules, forthcoming, 2018.


40. Dobolyi, D., Abbasi, A., Zahedi, M. Z., and Vance, T. “The Phishing Funnel Model for Predicting User Susceptibility to Phishing Websites,” In the INFORMS Workshop on Data Science, Houston, TX, October 21, 2017.


39. Li, J., Larsen, K., and Abbasi, A. “Unlocking our Behavioral Knowledge Inheritance through Ontology Learning: A Design Framework, an Instantiation, and a Randomized Experiment,” In the INFORMS Workshop on Data Science, Houston, TX, October 21, 2017.


38. Adjeroh, D., Allaga, M., Tun, J., Lin, J., Jiang, Y., Abbasi, A., and Zhou, X. “String-Based Models for Predicting RNA-Protein Interaction,” In the ACM Conference on Bioinformatics, Computational Biology and Health Informatics, Boston, MA, August 20-23, 2017. PDF


37. Abbasi, A., Dobolyi, D., Zahedi, M. Z., and Vance, T. “The Phishing Funnel Model: Predicting User Susceptibility to Phishing Attacks,” In the 13th Annual Winter Conference on Business Analytics, Salt Lake City, UT, March 2-4, 2017.

36. Li, J., Abbasi, A., Cheema, A., and Abraham, L. “Path to Purpose? Impact of Online Purchases’ Hedonic and Utilitarian Characteristics on the Customer Journey,” In the 26th Annual Workshop on Information Technologies and Systems, Dublin, Ireland, December 15-16, 2016.

35. Li, J., Larsen, K., and Abbasi, A. “Unlocking Knowledge Inheritance of Behavioral Research through Ontology Learning: An Ontology-Based Search Engine,” In the 26th Annual Workshop on Information Technologies and Systems, Dublin, Ireland, December 15-16, 2016 (Best Prototype Award).   

34. Dobolyi, D. and Abbasi, A. “PhishMonger: A Free and Open Source Public Archive of Real-World Phishing Websites,” In the 14th IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, Sept. 27-30, 2016. PDF

33. Abbasi, A., and Zahedi, F. M. “Phishing Susceptibility: The Good, the Bad, and the Ugly,” In the 14th IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, Sept. 27-30, 2016.

32. Abbasi, A., Zhao, K., and Abraham, B. “A Prototype System for Collecting and Analyzing Credible Online Medical Content,” In the 11th International Conference on Design Science Research in Information Systems and Technology, St. John’s, Canada, May 23-24, 2016.

31. Li, J., Larsen, K., and Abbasi, A. “TheoryOn: Designing a Construct-based Search Engine to Reduce Information Overload for Behavioral Science Research,” In the 11th International Conference on Design Science Research in Information Systems and Technology, St. John’s, Canada, May 23-24, 2016.

30. Abbasi, A., Li, J., Abbasi, S., Adjeroh, D., Abate, M., Zheng, W. “Don’t Mention It? Analyzing User-generated Content Signals for Early Adverse Drug Event Warnings,” In the 25th Annual Workshop on Information Technologies and Systems, Dallas, Texas, December 12-13, 2015 (Best Paper Award).

29. Sharif, H., Ismail, S., Farooqi, S., Khan, M. T., Gulzar, M. A., Lakhani, H., Zaffar, F. and Abbasi, A. “A Classification Based Framework to Predict Viral Threads,” In the 19th Pacific Asia Conference on Information Systems, Singapore, July 5-9, 2015.

28. Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A., and Chen, H. “Evaluating Text Visualization for Authorship Analysis,” Security Informatics, 3(10), 2014. PDF


27. Abbasi, A., Li, W, Benjamin, V., Hu, S., and Chen, H. “Descriptive Analytics: Examining Expert Hackers in Web Forums,” In the IEEE Joint Intelligence and Security Informatics Conference, The Hague, Netherlands, September 24-26, 2014. PDF


​26. Sharif, H., Abbasi, A., Zaffar, F., and Zimbra, D. “Detecting Adverse Drug Reactions using a Sentiment Classification Framework,” In the 6th ASE International Conference on Social Computing, Stanford, May 27-31, 2014. PDF


25. Li, W., Abbasi, A., Hu, S., Benjamin, V., and Chen, H. “Modeling Interactions in Web Forums,” In the 6th ASE International Conference on Social Computing, Stanford, May 27-31, 2014. PDF


24. Abbasi, A., Hassan, A., and Dhar, M. “Benchmarking Twitter Sentiment Analysis Tools,” In the 9th Language Resources and Evaluation Conference, Reykjavik, Iceland May 26-31, 2014. PDF


23. Abbasi, A., Fu, T., Zeng, D., and Adjeroh, D. “Crawling Credible Online Medical Sentiments for Social Intelligence,” In the ASE/IEEE International Conference on Social Computing, Washington D.C., September 8-14, 2013. PDF


22. Hassan, A., Abbasi, A., and Zeng, D. “Twitter Sentiment Analysis: A Bootstrap Ensemble Framework,” In the ASE/IEEE International Conference on Social Computing, Washington D.C., September 8-14, 2013. PDF


21. Beal, R., Adjeroh, D., and Abbasi, A. “The Forward Stem Matrix,” In the ACM Conference on Bioinformatics, Computational Biology and Biomedical Informatics, Washington D.C., September 22-25, 2013. PDF


20. Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C., and Chen, H. “Evaluating Text Visualization: An Experiment in Authorship Analysis,” In the 11th IEEE International Conference on Intelligence and Security Informatics, Seattle, Washington, June 4-7, 2013 (Best Paper Nominee). PDF


19. Abbasi, A., Zahedi, F. M., and Chen, Y. “Impact of Anti-Phishing Tool Performance on Attack Success Rates,” In the 10th IEEE International Conference on Intelligence and Security Informatics, Washington D.C., June 11-14, 2012.


18. Kopeke, J., Kaza, S., and Abbasi, A. “Identification of Malicious and Fake Websites: Using Information from the Transport and Internet Layers of the Network Stack,” In the 10thIEEE International Conference on Intelligence and Security Informatics, Washington D.C., June 11-14, 2012. PDF


17. France, S. and Abbasi, A. “Boosting Unsupervised Additive Clustering Using Cluster-Wise Optimization and Multi-Label Learning,” In the 11th IEEE International Conference on Data Mining Workshops, Vancouver, Canada, December 11, 2011. PDF


16. Zhang, Z., Zeng, D., Abbasi, A., and Peng, J. “A Random Walk Model for Item Recommendation in Folksonomies,” In the 21st Annual Workshop on Information Technologies and Systems, Shanghai, China, December 3-4, 2011. PDF


15. Zahedi, F. M., Abbasi, A., and Chen, Y. “Design Elements that Promote the use of Fake Website Detection Tools,” In the 10th Annual SIG-HCI Workshop, Shanghai, China, December 4, 2011. PDF


14. Zahedi, F. M., Abbasi, A., and Chen, Y. “Trust Calibration of Security IT Artifacts: The Case of Fake Website Detection Tools,” In the Workshop on Information Security and Privacy, Shanghai, China, December 4, 2011.


13. Chen, Y., Zahedi, F. M., and Abbasi, A. “Interface Design Elements for Anti-Phishing Systems,” In the 6th International Conference on Design Science Research in Information Systems and Technology, Milwaukee, Wisconsin, May 5-6, 2011 (Best Paper Nominee). PDF


12. Abbasi, A. “Leveraging Website Genre and Structure Information for Fake Website Detection,” In the 20th Annual Workshop on Information Technologies and Systems, St. Louis, Missouri, December 11-12, 2010 (Best Paper Award). PDF


11. Fu, T., Abbasi, A., Zeng, D., and Chen, H. “Evaluating the Usefulness of Sentiment Information for Focused Crawlers,” In the 20th Annual Workshop on Information Technologies and Systems, St. Louis, Missouri, December 11-12, 2010. PDF


10. Abbasi, A., Kaza, S., and Zahedi, F. M. “Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites,” In the 19th Annual Workshop on Information Technologies and Systems, Phoenix, Arizona, December 14-15, 2009. PDF


9. Abbasi, A., Zhang, Z., and Chen, H. “A Statistical Learning Based System for Fake Website Detection,” In the Workshop on Secure Knowledge Management, Dallas, Texas, November 3-4, 2008. PDF


8. Chen, Y., Abbasi, A., and Chen, H. “Developing Ideological Networks using Social Network Analysis and Writeprints: A Case Study of the International Falun Gong Movement,” In the 6th IEEE International Conference on Intelligence and Security Informatics, Taiwan, June 17-20, 2008, pp. 7-12. PDF


7. Abbasi, A. and Chen, H. “Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods,” In the 17th Annual Workshop on Information Technologies and Systems, Montreal, Canada, December 8-9, 2007, pp. 55-60. PDF


6. Abbasi, A. and Chen, H. “A Framework for Stylometric Similarity Detection in Online Settings,” In the 13th Americas Conference on Information Systems, Keystone, Colorado, August 9-12, 2007. PDF


5. Abbasi, A. and Chen, H. "Categorization and Analysis of Text in Computer Mediated Communication Archives using Visualization," In the ACM/IEEE Joint Conference on Digital Libraries, Vancouver, Canada, June 18-23, 2007, pp. 11-18. PDF


4. Abbasi, A. and Chen, H. "Affect Intensity Analysis of Dark Web Forums," In the 5thIEEE International Conference on Intelligence and Security Informatics, New Brunswick, New Jersey, May 23-24, 2007, pp. 282-288. PDF


3. Fu, T., Abbasi, A. and Chen, H. "Interaction Coherence Analysis for Dark Web Forums," In the 5th IEEE International Conference on Intelligence and Security Informatics, New Brunswick, New Jersey, May 23-24, 2007, pp. 342-349. PDF


2. Abbasi, A. and Chen, H. "Visualizing Authorship for Identification," In the 4th IEEE International Conference on Intelligence and Security Informatics, San Diego, California, May 23-24, 2006, pp. 60-71. PDF


1. Abbasi, A. and Chen, H. "Applying Authorship Analysis to Arabic Web Content," In the 3rd IEEE International Conference on Intelligence and Security Informatics, Atlanta, Georgia, May 18-19, 2005, pp. 183-197. PDF