default search action
Chih Hao Ku 0001
Person information
- affiliation: Cleveland State University, Cleveland, OH, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j7]Chih Hao Ku, Yung-Chun Chang, Yichuan Wang:
How to strategically respond to online hotel reviews: A strategy-aware deep learning approach. Inf. Manag. 61(5): 103970 (2024) - 2022
- [j6]Yung-Chun Chang, Chih Hao Ku, Duy-Duc Le Nguyen:
Predicting aspect-based sentiment using deep learning and information visualization: The impact of COVID-19 on the airline industry. Inf. Manag. 59(2): 103587 (2022) - [j5]Ta-Wei (Daniel) Kao, Shih-Hui Steven Hsiao, Hung-Chung Su, Chih-Hao (Justin) Ku:
Deriving Execution Effectiveness of Crowdfunding Projects from the Fundraiser Network. J. Manag. Inf. Syst. 39(1): 276-301 (2022) - 2019
- [j4]Yung-Chun Chang, Chih Hao Ku, Chun-Hung Chen:
Social media analytics: Extracting and visualizing Hilton hotel ratings and reviews from TripAdvisor. Int. J. Inf. Manag. 48: 263-279 (2019) - [j3]Chih Hao Ku, Maryam Firoozi:
The Use of Crowdsourcing and Social Media in Accounting Research. J. Inf. Syst. 33(1): 85-111 (2019) - 2014
- [j2]Chih Hao Ku, Gondy Leroy:
A decision support system: Automated crime report analysis and classification for e-government. Gov. Inf. Q. 31(4): 534-544 (2014) - 2011
- [j1]Chih Hao Ku, Gondy Leroy:
A crime reports analysis system to identify related crimes. J. Assoc. Inf. Sci. Technol. 62(8): 1533-1547 (2011)
Conference and Workshop Papers
- 2022
- [c7]Chien-Hung Chen, Yung-Chun Chang, Chih Hao Ku:
Deep Neural Network-based Question Answering System for Customer Relationship Management. PACIS 2022: 62 - 2019
- [c6]Chih Hao Ku, Yung-Chun Chang, Yichuan Wang, Chien-Hung Chen, Shih-Hui Hsiao:
Artificial Intelligence and Visual Analytics: A Deep-Learning Approach to Analyze Hotel Reviews & Responses. HICSS 2019: 1-10 - 2014
- [c5]Chih Hao Ku, Myungjae Kwak, Kirill M. Yurov, Yuliya V. Yurova:
A Study of the Influence of Gaming Behavior on Academic Performance of IT College Students. AMCIS 2014 - 2013
- [c4]Chih Hao Ku, Gondy Leroy:
Automated crime report analysis and classification for e-government and decision support. DG.O 2013: 18-27 - 2012
- [c3]Chih Hao Ku, James H. Nguyen, Gondy Leroy:
TASC - Crime report visualization for investigative analysis: A case study. IRI 2012: 466-473 - 2008
- [c2]Chih Hao Ku, Alicia Iriberri, Gondy Leroy:
Natural language processing and e-Government: crime information extraction from heterogeneous data sources. DG.O 2008: 162-170 - [c1]Alicia Iriberri, Chih Hao Ku, Gondy Leroy:
Enabling synergy between psychology and natural language processing for e-Government: crime reporting and investigative interview system. DG.O 2008: 399-400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-12 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint