Hsinchun Chen

Hsinchun Chen is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the University of Arizona and the Director and founder of the Artificial Intelligence Lab (AI Lab). He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015.[2] He received a B.S. degree from National Chiao Tung University in Taiwan, an MBA from SUNY Buffalo and an M.S. and Ph.D. in Information Systems from New York University.

Hsinchun Chen
Hsinchun Chen, 2013
Academic background
Alma materNational Chiao Tung University
Academic work
InstitutionsUniversity of Arizona
Chinese name
Traditional Chinese陳炘鈞[1]
Simplified Chinese陈炘钧
Hanyu PinyinChén Xīnjūn

Research

Chen's research primarily focuses on data/web/text mining and knowledge management techniques. He has applied his work in the fields of web computing, search engines, digital libraries, health informatics, security informatics, biomedical informatics and business intelligence. His most notable contributions are in management information systems, digital libraries, health informatics, and security informatics.

He was the founding Editor-in-Chief (EIC) of the ACM Transactions on Management Information Systems (ACM TMIS), 2009–2014, and is also founding editor-in-chief of the Springer journal Security Informatics. He serves or has served on ten editorial boards including:

  • IEEE Intelligent Systems
  • ACM Transactions on Information Systems
  • IEEE Transactions on Systems, Man, and Cybernetics
  • Journal of the American Society for Information Science and Technology
  • Decision Support Systems
  • International Journal on Digital Library

Chen has also served as a Scientific Counselor/Advisor to the United States National Library of Medicine (NLM), Academia Sinica in Taiwan, and the National Library of China.[3]

Productivity

In 2005, Chen was ranked #8 in publication productivity in Information Systems (CAIS 2005),[4] #1 in Digital Library research (IP&M 2005),[5] and #9 in a list of the "Top 32" most productive information systems researchers (EJIS 2007)[6] in three bibliometric studies. In 2008, Chen was recognized as one of the top-ranked authors in the Management Information Systems field.[7] His "H-index" score from Google Scholar is 90 (as of December 2017).

Chen has authored or edited more than 40 books and conference proceedings, 30 book chapters, 280 SCI journal articles, and 180 refereed conference articles. His books include: Dark Web (2012; ISBN 978-1-4614-1556-5), Infectious Disease Informatics (2010; ISBN 978-1-4419-1277-0), Sports Data Mining (2010; ISBN 978-1-4419-6729-9), Mapping Nanotechnology Innovations and Knowledge (2009; ISBN 978-0-387-71619-0), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008, ISBN 978-0-387-71612-1), Digital Government: E-Government Research, Case Studies, and Implementation (2008; ISBN 978-0-387-71610-7); Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (2006; ISBN 978-0-387-24379-5); and Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005; ISBN 978-0-387-24381-8), all published by Springer.

He spearheaded the development of the International Conference of Asian Digital Library (ICADL) and the IEEE International Conference on Intelligence and Security Informatics (ISI).

In 1997, Chen began development of the COPLINK software,[8] which supports information sharing, analysis, and visualization of law enforcement data. He founded Knowledge Computing Corporation (KCC) to commercialize COPLINK,[9] which then entered the market in 2002[10] and is now used in thousands of law enforcement agencies across the United States.[11] COPLINK's functions have been described in numerous local, regional, and national sources including the New York Times,[12] the Boston Globe,[13] and the Denver Post.[14] In 2003, COPLINK was named a finalist for the IACP/Motorola Webber Seavey Award: Quality in Law Enforcement.[15] In July 2009, KCC merged with i2 Inc.,[16] a market leader in security analytics. In September 2011, the KCC/i2 firm was acquired by IBM for $500 million.[17] In October 2017, IBM sold Coplink to Forensic Logic.[18]

The "Dark Web" Project

Chen is also the director of the Artificial Intelligence Lab's project, "Dark Web Terrorism Research," the goal of which is to develop and use automated tools to systematically collect and analyze terrorist content from the Internet.[19] One software program developed as part of the project, "Writeprint," aims to support authorship identification of online postings and other writings.[20] The Dark Web project is supported by grants from the National Science Foundation[21][22] and other federal agencies, and has been recognized in the national press including Science News, Wired Magazine, Discover Magazine, and the Toronto Star.[23][24][25][26]

The "Hacker Web" Project and AZSecure Program

Chen was awarded a grant of $1.2M from the National Science Foundation (NSF) for “Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics” (NSF SES #1314631).[27] Co-PIs are Dr. Salim Hariri (UA; ECE); Dr. Ronald Breiger (UA; Sociology); and Dr. Tom Holt (MSU; Criminology). The Hacker Web project aims to investigate questions regarding hacker behavior, markets, and community structure, among other things. The intended result is a computational framework including algorithms, software, and tools for access and use by other researchers to examine how cyber attacker groups form, develop, and spread their ideas. The project is funded through August 2016.

Chen was also awarded $4.2M from NSF (with UA co-PIs Drs. Salim Hariri, Mark Patton, and Paulo Goes) for the AZSecure Cybersecurity Scholarship-for-Service program at The University of Arizona (NSF DUE #1303362).[28] Project funds provide scholarships for undergraduate, graduate, and doctoral students studying cyber security, in exchange for government service. Students are recruited from across Arizona, including from military bases, community college, and tribal colleges. The program asserts a special emphasis on minority recruitment and retention. Program components are described as including student mentoring and development, independent study and research, internship and post-graduation placement assistance, and program assessment and evaluation. The program is aimed at helping to fill expected federal vacancies in cyber security and related positions over the next 5 years.[29]

The Smart Health Project

Chen has developed the "Smart Health" project in his Lab, which lists the following research objectives: (1) developing technical approaches to support cyber-enabled patient empowerment; (2) developing personalized healthcare and community mapping techniques; and (3) conducting theory-driven assessment and evaluation research.[30] DiabeticLink research includes information extraction, sentiment analysis, and social network analysis to be integrated into the DiabeticLink portal. SilverLink is being developed in the U.S., China, and Taiwan to support senior citizens living independently. SilverLink's capabilities include a home-health system that monitors fall detection, daily health status, and activity levels, and can alert caregivers in the event of anomalous situations.[31] Chen also founded Caduceus Intelligence Corporation (CIC), a UA spinoff company working in the area of healthcare information systems.[32] CIC lists web analytics, smart health, patient support, and knowledge discovery as its areas of expertise.[33]

Data Infrastructure Building Blocks for Intelligence and Security Informatics

As part of ongoing work in intelligence and security informatics, Chen was awarded over $1.4M from NSF for a three-year pilot demonstration project to make available data and analysis tools to serve information and cyber security researchers.[34] The funds are to support the creation of an archive of open source and other data, such as network data, data from honeypots, hacker forums, phishing data, and security-related tweets, in numerous languages including English, Arabic, French, Russian, and more. The project is also intended to provide tools and support for social network analysis and data visualization.[35][36] The project is intended to serve individuals working in "academia, government, and industry to share data, information, and expertise relevant to research in intelligence and security informatics."[37]

Awards

He is a Fellow of ACM, IEEE and AAAS, and received the IEEE Computer Society Technical Achievement Award in 2006 and the INFORMS Design Science Award in 2008. A paper for which he was co-author was given the MISQ Best Paper Award for 2010 ("Detecting Fake Websites: The Contribution of Statistical Learning Theory", by Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, and Jay F. Nunamaker Jr., published in volume 34, issue 3 of MIS Quarterly).[38] Also in 2010, he was recognized as "Distinguished Alumnus" of the National Chiao Tung University in Taiwan [39] and named a Distinguished University Chair Professor of National Taiwan University. In 2011, he received the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics and was a finalist for the AZ Tech Council's Governor's Innovation of the Year Award. The Arizona Daily Star recognized his accomplishments as a top scientist in its 2012 series, "Centennial Salute to Science".[40] In March 2013 he was named the Thomas R. Brown Chair in Management and Technology at the UA, as well as the UA's 2013 Innovator of the Year. In May he was inducted as a University of Arizona Regents' Professor.[32] He was elected as a China National 1000-Elite Chair Professor with the Tsinghua University in 2013. In 2015 he was named a fellow of the Association for Computing Machinery "for contributions to the research and development of security informatics and health informatics systems."[41]

Notes and references

  1. "資管系特聘教授陳炘鈞博士演講" [Lecture by special professor Chen Hsinchun of the Faculty of Information Management]. National Taiwan University. 27 March 2018. Retrieved 29 May 2018.
  2. "AI Lab Director: Dr. Hsinchun Chen". University of Arizona Artificial Intelligence Lab. Archived from the original on 19 August 2016. Retrieved 19 July 2016.
  3. Archived 2010-07-08 at the Wayback Machine http://ai.arizona.edu/hchen/ Retrieved June 22, 2010.
  4. Huang, Hsieh-Hong; et al. (2005). "An Evaluation of Publication Productivity in Information Systems: 1999 to 2003". Communications of the Association for Information Systems. 15.
  5. Liu, Xiaoming; Bollen, J; Nelson, M; Vandesompel, H; et al. (2005). "Co-authorship Networks in the Digital Library Research Community". Information Processing and Management. 41 (6): 1462–1480. arXiv:cs/0502056. doi:10.1016/j.ipm.2005.03.012.
  6. Gallivan, Michael; et al. (2007). "Analyzing IS Research Productivity: An Inclusive Approach to Global IS Scholarship". European Journal of Information Systems. 16.
  7. Chua, Alton; Yang, Christopher C.; et al. (2008). "The shift towards multi-disciplinarity in information science". Journal of the American Society for Information Science and Technology. 59 (13): 2156–2170. doi:10.1002/asi.20929.
  8. Copenhaver, Larry (2002-10-23). "Tucson Cops, Local Software to Help in D.C. Sniper Probe". Tucson Citizen.
  9. O'Harrow Jr., Robert; et al. (2008-03-06). "National Dragnet Is a Click Away: Authorities to Gain Fast and Expansive Access to Records". Washington Post. Retrieved 2010-10-11.
  10. "i2 Company Management". Retrieved 2010-10-11.
  11. Sink, Mindy (2002-11-03). "An Electronic Copy That Plays Hunches". New York Times.
  12. Cook, Gareth; et al. (2004-07-24). "Software Helps Police Draw Crime Links". Boston Globe.
  13. Thornton, Susan (2008-03-06). "COPLINK helping catch more bad guys". Denver Post. Retrieved 2010-10-11.
  14. "IACP/Motorola Webber Seavey Award: Quality in Law Enforcement: 2003 Abstracts". 2003. Retrieved 2010-10-12.
  15. Darcy, Darlene (2009-07-02). "i2 Inc. acquires Knowledge Computing Corp". Washington Business Journal. Retrieved 2010-10-11.
  16. "Hsinchun Chen's Tech Spinoff Bought by IBM". Archived from the original on 2012-02-01. Retrieved 2012-03-16.
  17. Wichner, David. "IBM sells off police data-search software developed at the UA". Arizona Daily Star. Retrieved 2017-12-27.
  18. Groc, Isabelle (2008-02-27). "The Online Hunt for Terrorists: Researchers are using Web spiders to track down terrorists online". PC Magazine. Retrieved 2010-10-12.
  19. Rotstein, Arthur (2007-11-11). ""Dark Web" tool seeks online terrorists". Business Week.
  20. National Science Foundation (2007-08-07). "Award Abstract #0709338: CRI:CRD - Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences". Retrieved 2010-11-12.
  21. National Science Foundation (2007-07-18). "Award Abstract #0730908: EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis". Retrieved 2010-11-12.
  22. Rehmeyer, Julie (Jan 13, 1007). "Tiny Behavioral Differences Can Reveal Your Identity Online". Science News. 171 (2): 2. doi:10.1002/scin.2007.5591710210.
  23. "Global Jihad Online: Terrorist Networks Are More Wired Than Ever (Section: START: Infoporn)". Wired Magazine. 14: 12. December 1, 2006.
  24. "The Future of Terrorists". Discover Magazine. July 2006.
  25. "Trolling for Terrorists". Toronto Star. September 8, 2006.
  26. "NSF Award Abstract #1314631". Retrieved 2014-01-14.
  27. "NSF Award Abstract #1303362". Retrieved 2014-01-17.
  28. "AZSecure Cybersecurity Fellowship Program". Archived from the original on 2014-01-21. Retrieved 2014-01-17.
  29. "Smart Health and DiabeticLink Research". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  30. Chuang, Joshua; Maimoon, Lubaina; Yu, Shuo; Hongyi, Zhu; Nybroe, Casper; Hsiao, Owen; Li, Shu-Hsing; Lu, Hsinmin; Chen, Hsinchun (January 20, 2016). SilverLink: Smart Home Health Monitoring for Senior Care. Lecture Notes in Computer Science. 9545. pp. 3–14. doi:10.1007/978-3-319-29175-8_1. ISBN 978-3-319-29174-1.
  31. "Hsinchun Chen's Exciting Year - A Recap". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  32. "Caduceus Intel". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  33. "Data Infrastructure Buildings Blocks (DIBBs) for Intelligence + Security Informatics (ISI)". Artificial Intelligence Laboratory. Retrieved 2016-06-21.
  34. "NSF Award Search: Award#1443019 - CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community". nsf.gov. Retrieved 2016-06-21.
  35. "Data Science Testbed for Security Researchers". AZSecure - Data for Intelligence and Security Informatics. Retrieved 2016-06-21.
  36. "Intelligence and Security Informatics (ISI)". www.linkedin.com. Retrieved 2016-06-21.
  37. "MISQ Paper of the Year Recipients". Retrieved 2012-03-16.
  38. "Distinguished Alumni". Retrieved 2014-03-24.
  39. "100 Days of Science: UA professor, TPD Advanced Crime Analysis" (PDF). Archived from the original (PDF) on 2014-03-25. Retrieved 2012-08-17.
  40. ACM Fellows Named for Computing Innovations that Are Advancing Technology in the Digital Age, Association for Computing Machinery, 2015, archived from the original on 2015-12-09, retrieved 2015-12-09
gollark: I don't think it has enough memory to store it.
gollark: It might manage a few kH/s!
gollark: Ah yes, I will go mine Krist on there, good idea.
gollark: It's a really underpowered nRF51something-based single board computer the UK government gave loads of people for free some years ago, with a 5x5 LED matrix, a few GPIO pins, a USB port, and 2.4GHz radio.
gollark: I should really find something interesting to do with that micro:bit I have lying around.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.