{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:19:25Z","timestamp":1768007965005,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,2]]},"DOI":"10.1145\/3374135.3385281","type":"proceedings-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:12:43Z","timestamp":1590451963000},"page":"168-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Using HR Analytics to Support Managerial Decisions"],"prefix":"10.1145","author":[{"given":"Liyuan","family":"Liu","sequence":"first","affiliation":[{"name":"Analytics and Data Science Institute, Kennesaw State University, Kennesaw, Georgia, USA"}]},{"given":"Sanjoosh","family":"Akkineni","sequence":"additional","affiliation":[{"name":"Analytics and Data Science Institute, Kennesaw State University, Kennesaw, Georgia, USA"}]},{"given":"Paul","family":"Story","sequence":"additional","affiliation":[{"name":"Analytics and Data Science Institute, Kennesaw State University, Kennesaw, Georgia, USA"}]},{"given":"Clay","family":"Davis","sequence":"additional","affiliation":[{"name":"Novelis Inc., Atlanta, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1111\/1748-8583.12090"},{"key":"e_1_3_2_1_2_1","first-page":"14","article-title":"Raging Debates in HR Analytics","volume":"34","author":"Bassi L.","year":"2011","unstructured":"L. Bassi. 2011. Raging Debates in HR Analytics. People and Strategy 34, 2 (2011), 14.","journal-title":"People and Strategy"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ert.3910200307"},{"key":"e_1_3_2_1_4_1","volume-title":"Building Machine Learning and Deep Learning Models on Google Cloud Platform","author":"Bisong E.","unstructured":"E. Bisong. 2019. Google AutoML: Cloud Natural Language Processing. In Building Machine Learning and Deep Learning Models on Google Cloud Platform. Springer, 599--612."},{"key":"e_1_3_2_1_5_1","first-page":"906","article-title":"Human Resource Analytics Engine with Multiple Data Sources","volume":"14","author":"Cama K.","year":"2015","unstructured":"K. Cama, N. Herman, and D. Lambert. 2015. Human Resource Analytics Engine with Multiple Data Sources. US Patent App. 14\/159,906.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, 785--794","author":"Chen T.","unstructured":"T. Chen and C. Guestrin. 2016. Xgboost: A scalable Tree Boosting System. In Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, 785--794."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. International Conference on Internet and Web Applications and Services. Citeseer.","author":"Faliagka E.","unstructured":"E. Faliagka, K. Ramantas, A. Tsakalidis, and G. Tzimas. 2012. Application of Machine Learning Algorithms to An Online Recruitment System. In Proc. International Conference on Internet and Web Applications and Services. Citeseer."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"X. Gao J. Wen and C. Zhang. 2019. An Improved Random Forest Algorithm for Predicting Employee Turnover. Mathematical Problems in Engineering 2019 (2019).","DOI":"10.1155\/2019\/4140707"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1039\/b907946g"},{"key":"e_1_3_2_1_11_1","volume-title":"Towards Applying Data Mining Techniques for Talent Managements. In 2009 International Conference on Computer Engineering and Applications, IPCSIT","volume":"2","author":"Hamidah J.","unstructured":"J. Hamidah, H. AbdulRazak, and A. Zulaiha. 2011. Towards Applying Data Mining Techniques for Talent Managements. In 2009 International Conference on Computer Engineering and Applications, IPCSIT, Vol. 2."},{"key":"e_1_3_2_1_12_1","volume-title":"Borderline-SMOTE: A New Over-sampling Method in Imbalanced Data Sets Learning. In International conference on intelligent computing. Springer, 878--887","author":"Han H.","unstructured":"H. Han, W. Wang, and B. Mao. 2005. Borderline-SMOTE: A New Over-sampling Method in Imbalanced Data Sets Learning. In International conference on intelligent computing. Springer, 878--887."},{"key":"e_1_3_2_1_13_1","volume-title":"Defend the Clique-based Attack for Data Privacy. In International Conference on Combinatorial Optimization and Applications. Springer, 262--280","author":"Han M.","unstructured":"M. Han, D. Miao, J. Wang, and L. Liu. 2018. Defend the Clique-based Attack for Data Privacy. In International Conference on Combinatorial Optimization and Applications. Springer, 262--280."},{"key":"e_1_3_2_1_14_1","unstructured":"M. Han D. Miao J. Wang and L. Liu. 2020. A Balm: Defend the Clique-based Attack from A Fundamental Aspect. Journal of Combinatorial Optimization (2020) 1--22."},{"key":"e_1_3_2_1_15_1","volume-title":"ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. In 2008 IEEE International Joint Conference on Neural Networks","author":"He H.","year":"2008","unstructured":"H. He, Y. Bai, E. Garcia, and S. Li. 2008. ADASYN: Adaptive Synthetic Sampling Approach for Imbalanced Learning. In 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence). IEEE, 1322--1328."},{"key":"e_1_3_2_1_16_1","first-page":"10908","article-title":"The Rise (and Fall?) of HR Analytics: The Future Application, Value, Structure, and System Support. In Academy of Management Proceedings, Vol. 2016. Academy of Management Briarcliff Manor","volume":"10510","author":"Heuvel S.","year":"2016","unstructured":"S. Heuvel and T. Bondarouk. 2016. The Rise (and Fall?) of HR Analytics: The Future Application, Value, Structure, and System Support. In Academy of Management Proceedings, Vol. 2016. Academy of Management Briarcliff Manor, NY 10510, 10908.","journal-title":"NY"},{"key":"e_1_3_2_1_17_1","unstructured":"S. Kane and L. Marjorie. 2007. Predictive Models of Employee Voluntary Turnover in a North American Professional Sales Force using Data-mining Analysis. Texas A&M University."},{"key":"e_1_3_2_1_18_1","first-page":"90","article-title":"Review on Determining Number of Cluster in K-Means Clustering","volume":"1","author":"Kodinariya T.","year":"2013","unstructured":"T. Kodinariya and P. Makwana. 2013. Review on Determining Number of Cluster in K-Means Clustering. International Journal 1, 6 (2013), 90--95.","journal-title":"International Journal"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551505055399"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"L. Liu and M. Han. 2019. Privacy and Security Issues in the 5G-Enabled Internet of Things. 5G-Enabled Internet of Things (2019) 241.","DOI":"10.1201\/9780429199820-12"},{"key":"e_1_3_2_1_21_1","volume-title":"2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 140--147","author":"Liu L.","unstructured":"L. Liu, M. Han, Y. Zhou, and R. Parizi. 2019. E2C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain. In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 140--147."},{"key":"e_1_3_2_1_22_1","volume-title":"LSTM Recurrent Neural Networks for Influenza Trends Prediction. In International Symposium on Bioinformatics Research and Applications. Springer, 259--264","author":"Liu L.","unstructured":"L. Liu, M. Han, Y. Zhou, and Y. Wang. 2018. LSTM Recurrent Neural Networks for Influenza Trends Prediction. In International Symposium on Bioinformatics Research and Applications. Springer, 259--264."},{"key":"e_1_3_2_1_23_1","volume-title":"2019 IEEE First International Conference on Cognitive Machine Intelligence","author":"Liu L.","unstructured":"L. Liu, J. Priestley, Y. Zhou, H. Ray, and M. Han. 2019. A2Text-Net: A Novel Deep Neural Network for Sarcasm Detection. In 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI). IEEE, 118--126."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"L. Liu B. Yu M. Han S. Yuan and N. Wang. 2019. Mild Cognitive Impairment Understanding: An Empirical Study by Data-driven Approach. BMC bioinformatics 20 15 (2019) 1--13.","DOI":"10.1186\/s12859-019-3057-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2012.09.001"},{"key":"e_1_3_2_1_26_1","volume-title":"How Google uses People Analytics to Create a Great Workplace. Retrieved May 6","author":"Maier S.","year":"2016","unstructured":"S. Maier. 2016. How Google uses People Analytics to Create a Great Workplace. Retrieved May 6 (2016), 2018."},{"key":"e_1_3_2_1_27_1","first-page":"33","article-title":"Human Resource Predictive Analytics (HRPA) for HR Management in Organizations","volume":"5","author":"Mishra S.","year":"2016","unstructured":"S. Mishra, D. Lama, and Y. Pal. 2016. Human Resource Predictive Analytics (HRPA) for HR Management in Organizations. International Journal of Scientific & Technology Research 5, 5 (2016), 33--35.","journal-title":"International Journal of Scientific & Technology Research"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the seventh international learning analytics & knowledge conference. ACM, 188--197","author":"Mitri D.","unstructured":"D. Mitri, M. Scheffel, H. Drachsler, D. B\u00f6rner, S. Ternier, and M. Specht. 2017. Learning Pulse: A Machine Learning Approach for Predicting Performance in Self-regulated Learning using Multimodal Data. In Proceedings of the seventh international learning analytics & knowledge conference. ACM, 188--197."},{"key":"e_1_3_2_1_29_1","first-page":"106","article-title":"A Data Mining Approach to Employee Turnover Prediction (Case Study: Arak Automotive Parts Manufacturing)","volume":"8","author":"Sikaroudi E.","year":"2015","unstructured":"E. Sikaroudi, A. Mohammad, R. Ghousi, and A. Sikaroudi. 2015. A Data Mining Approach to Employee Turnover Prediction (Case Study: Arak Automotive Parts Manufacturing). Journal of Industrial and Systems Engineering 8, 4 (2015), 106--121.","journal-title":"Journal of Industrial and Systems Engineering"},{"key":"e_1_3_2_1_30_1","volume-title":"2006 8th international Conference on Signal Processing","volume":"3","author":"Wang J.","unstructured":"J. Wang, M. Xu, H. Wang, and J. Zhang. 2006. Classification of Imbalanced Data by Using the SMOTE Algorithm and Locally Linear Embedding. In 2006 8th international Conference on Signal Processing, Vol. 3. IEEE."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1984.4767546"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of SAI intelligent systems conference. Springer, 737--758","author":"Zhao Y.","unstructured":"Y. Zhao, M. Hryniewicki, F. Cheng, B. Fu, and X. Zhu. 2018. Employee Turnover Prediction with Machine Learning: A Reliable Approach. In Proceedings of SAI intelligent systems conference. Springer, 737--758."},{"key":"e_1_3_2_1_33_1","volume-title":"Deep Learning Approach for Cyberattack Detection. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 262--267","author":"Zhou Y.","unstructured":"Y. Zhou, M. Han, L. Liu, J. He, and Y. Wang. 2018. Deep Learning Approach for Cyberattack Detection. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 262--267."}],"event":{"name":"ACM SE '20: 2020 ACM Southeast Conference","location":"Tampa FL USA","acronym":"ACM SE '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2020 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374135.3385281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:47Z","timestamp":1750200107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385281"}},"subtitle":["A Case Study"],"short-title":[],"issued":{"date-parts":[[2020,4,2]]},"references-count":33,"alternative-id":["10.1145\/3374135.3385281","10.1145\/3374135"],"URL":"https:\/\/doi.org\/10.1145\/3374135.3385281","relation":{},"subject":[],"published":{"date-parts":[[2020,4,2]]},"assertion":[{"value":"2020-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}