{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:50Z","timestamp":1750220390033,"version":"3.41.0"},"reference-count":103,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T00:00:00Z","timestamp":1639180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p>Technology trend analysis uses data relevant to historical performance and extrapolates it to estimate and assess the future potential of technology. Such analysis is used to analyze emerging technologies or predict the growing markets that influence the resulting social or economic development to assist in effective decision-making. Traditional trend analysis methods are time-consuming and require considerable labor. Moreover, the implemented processes may largely rely on the specific knowledge of the domain experts. With the advancement in the areas of science and technology, emerging cross-domain trends have received growing attention for its considerable influence on society and the economy. Consequently, emerging cross-domain predictions that combine or complement various technologies or integrate with diverse disciplines may be more critical than other tools and applications in the same domain. This study uses a design science research methodology, a text mining technique, and social network analysis (SNA) to analyze the development trends concerning the presentation of the product or service information on a company's website. This study applies regulatory technology (RegTech) as a case to analyze and justify the emerging cross-disciplinary trend. Furthermore, an experimental study is conducted using the Google search engine to verify and validate the proposed research mechanism at the end of this study. The study results reveal that, compared with Google Trends and Google Correlate, the research mechanism proposed in this study is more illustrative, feasible, and promising because it reduces noise and avoids the additional time and effort required to perform a further in-depth exploration to obtain the information.<\/jats:p>","DOI":"10.1145\/3485187","type":"journal-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T19:44:15Z","timestamp":1639251855000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Intelligent Mechanism to Automatically Discover Emerging Technology Trends: Exploring Regulatory Technology"],"prefix":"10.1145","volume":"13","author":[{"given":"Shi Ming","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Accounting and Information Technology, National Chung Cheng University, Chiayi, Taiwan"}]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[{"name":"JHJ School of Business, Texas Southern University, TX"}]},{"given":"Ting Jyun","family":"Yan","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Chung Cheng University, Chiayi, Taiwan"}]},{"given":"Yi Ting","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Accounting and Information Technology, National Chung Cheng University, Chiayi, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"REGTECH100. 2019. REGTECH 100 Companies 2019. Retrieved May 20 2019 from https:\/\/fintech.global\/regtech100\/."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2018.8747043"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJIMA.2017.085644"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2018.1451954"},{"key":"e_1_3_1_6_2","unstructured":"T. Kounadis. 2016. IDC stacks up top object storage vendors. Retrieved May 20 2019 from https:\/\/www.ibm.com\/blogs\/cloud-computing\/2016\/12\/13\/idc-stacks-top-object-storage-vendors\/."},{"key":"e_1_3_1_7_2","first-page":"99","volume-title":"Workload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method","author":"Manupati V. K.","year":"2018","unstructured":"V. K. Manupati, M. A. Xavior, A. Chandra, and M. Ahsan. 2018. Workload Assessment for a Sustainable Manufacturing Paradigm Using Social Network Analysis Method. In Knowledge Computing and Its Applications Margret Anouncia S., Wiil U. (eds.). Singapore: Springer, 99\u2013108."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.5555\/268729"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1080\/09537321003647396"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/2187785"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.5555\/3504035.3504117"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.25046\/aj020115"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2700171.2791032"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2665970.2665985"},{"volume-title":"PACIS 2017 Proceedings","key":"e_1_3_1_15_2","unstructured":"H.-C. Huang, S.-Y. Hwang, S. Chang, and Y. Kang. 2017. Forecasting company revenue trend using financial news. PACIS 2017 Proceedings, 193."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192635"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.309"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2017.03.001"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326467.3326478"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529611"},{"key":"e_1_3_1_21_2","volume-title":"Advances in Human Factors, Business Management and Leadership","author":"Dos-Santos M. J. P. L.","year":"2019","unstructured":"M. J. P. L. Dos-Santos, M. Mota, M. F. Ferreiro, N. Ahmad, R. R. Ahmed, C. Machado-Santos, et al. 2019. Assessing the sustainability of crowdfunding in social media and Google Trends. In Advances in Human Factors, Business Management and Leadership. J. Kantola S. Nazir (eds.) AHFE 2019, Washington D.C., USA."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1234741.1234765"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/07350015.2020.1791133"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2016.11.009"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234757"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281233"},{"key":"e_1_3_1_27_2","unstructured":"CBInsights. 2017. RegTech Market Map: The startups helping businesses mitigate risk and monitor compliance across industries. Retrieved May 20 2019 from https:\/\/www.cbinsights.com\/research\/regtech-regulation-compliance-market-map\/."},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.24840\/2183-0606_004.004_0004"},{"key":"e_1_3_1_29_2","article-title":"The era of digitalization: Is Manda between banks and Fintech firms the winning strategy for bank profitability? (Master dissertation, the University of North Carolina at Charlotte, NC 2020)","author":"Brambilla E.","year":"2020","unstructured":"E. Brambilla. 2020. The era of digitalization: Is Manda between banks and Fintech firms the winning strategy for bank profitability? (Master dissertation, the University of North Carolina at Charlotte, NC 2020). Masters Abstracts International, MAI 81\/11(E).","journal-title":"Masters Abstracts International"},{"key":"e_1_3_1_30_2","article-title":"On the role of ontology-based Regtech for managing risk and compliance reporting in the age of regulation","author":"Butler T.","year":"2017","unstructured":"T. Butler and R. Brooks. 2017. On the role of ontology-based Regtech for managing risk and compliance reporting in the age of regulation. Journal of Risk Management in Financial Institutions, Volume 11 \/Number 1 \/ Winter 2017-18, 19\u201333(15).","journal-title":"Journal of Risk Management in Financial Institutions"},{"key":"e_1_3_1_31_2","unstructured":"Thomson Reuters Corporation. 2018. Cost of Compliance 2018 Report: Your Biggest Challenges Revealed. Retrieved May 20 2019 from https:\/\/legal.thomsonreuters.com\/en\/insights\/articles\/cost-of-compliance-2018-report-your-biggest-challenges-revealed."},{"key":"e_1_3_1_32_2","unstructured":"CBInsights. 2017. Regtech 101: What It Is Why Now and Why It Matters. Retrieved May 20 2019 from https:\/\/www.cbinsights.com\/research\/regtech-trends-fintech\/."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-018-2902-8"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJBNN.2012.051223"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.07.012"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.09.007"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2009.03.001"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJHTM.2014.064247"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.02.008"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-020-03464-y"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.12.012"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJHTM.2012.050616"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2014.03.013"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-007-0311-5"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0614-4"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0591-7"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21509"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.5555\/1855210.1855222"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jengtecman.2019.11.003"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-012-0796-4"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.2307\/41166153"},{"key":"e_1_3_1_52_2","first-page":"1286","volume-title":"2012 Proceedings of PICMET\u201912: Technology Management for Emerging Technologies","author":"Alexander J.","year":"2012","unstructured":"J. Alexander, J. Chase, N. Newman, A. Porter, and J. Roessner. 2012. Emergence as a conceptual framework for understanding scientific and technological progress. In 2012 Proceedings of PICMET\u201912: Technology Management for Emerging Technologies, 1286\u20131292."},{"key":"e_1_3_1_53_2","first-page":"244","volume-title":"The Re-emergence of Emergence","author":"Chalmers D. J.","year":"2006","unstructured":"D. J. Chalmers. 2006. Strong and weak emergence. In The Re-emergence of Emergence, Clayton, P. and Davies, P., (eds.). Oxford University Press, Oxford, UK, 244\u2013256."},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.044"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/516935"},{"issue":"5","key":"e_1_3_1_56_2","first-page":"9","article-title":"A survey on text and knowledge mining for text processing and its different techniques","volume":"5","author":"Priyadharshini S.","year":"2018","unstructured":"S. Priyadharshini and M. Hemalatha. 2018. A survey on text and knowledge mining for text processing and its different techniques. International Journal for Research in Science Engineering and Technology 5, 5 (2018), 9\u201319.","journal-title":"International Journal for Research in Science Engineering and Technology"},{"issue":"1","key":"e_1_3_1_57_2","first-page":"7","article-title":"Preprocessing techniques for text mining - an overview","volume":"5","author":"Vijayarani S.","year":"2015","unstructured":"S. Vijayarani, M. J. Ilamathi, and M. Nithya. 2015. Preprocessing techniques for text mining - an overview. International Journal of Computer Science and Communication Networks 5, 1 (2015), 7\u201316.","journal-title":"International Journal of Computer Science and Communication Networks"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92279-9_57"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.5555\/1654641.1654642"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134271.3134288"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7231920"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326467.3326486"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3365109.3368765"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.07.003"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3436286.3436293"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340997.3341012"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.05.001"},{"key":"e_1_3_1_68_2","first-page":"188","volume-title":"PACIS 2016 Proceedings","author":"Wei Dong","year":"2016","unstructured":"Dong Wei, Liao Shaoyi, and Liang Liang. 2016. Financial statement fraud detection using text mining: A systemic functional linguistics theory perspective. PACIS 2016 Proceedings. 188."},{"issue":"12","key":"e_1_3_1_69_2","first-page":"189","article-title":"Financial statement fraud detection using text mining","volume":"3","author":"Gupta R.","year":"2012","unstructured":"R. Gupta and N. S. Gill. 2012. Financial statement fraud detection using text mining. (IJACSA) International Journal of Advanced Computer Science and Applications 3, 12 (2012), 189\u2013191.","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1080\/08897077.2017.1356795"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/2499788.2499809"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566476"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.5555\/576628"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1080\/01638539809545028"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.5555\/2073796.2073829"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"issue":"3","key":"e_1_3_1_78_2","first-page":"33","article-title":"Ontological engineering: A state of the art","volume":"2","author":"G\u00f3mez-P\u00e9rez A.","year":"1999","unstructured":"A. G\u00f3mez-P\u00e9rez. 1999. Ontological engineering: A state of the art. Expert Update: Knowledge Based Systems and Applied Artificial Intelligence 2, 3 (1999), 33\u201343.","journal-title":"Expert Update: Knowledge Based Systems and Applied Artificial Intelligence"},{"key":"e_1_3_1_79_2","volume-title":"Ontology development 101: A guide to creating your first ontology","author":"Noy N. F.","year":"2001","unstructured":"N. F. Noy and D. L. McGuinness. 2001. Ontology development 101: A guide to creating your first ontology. Technical Report KSL-01-05, Stanford Knowledge Systems Laboratory."},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900007797"},{"key":"e_1_3_1_81_2","volume-title":"Structural Analysis in the Social Sciences","author":"Wasserman S.","year":"1994","unstructured":"S. Wasserman and K. Faust. 1994. Social network analysis: Methods and applications. Structural Analysis in the Social Sciences. NY, United States: Cambridge University Press."},{"key":"e_1_3_1_82_2","first-page":"300","volume-title":"ICO 2018. Advances in Intelligent Systems and Computing","author":"Ahamed B. B.","year":"2019","unstructured":"B. B. Ahamed and D. Yuvaraj. 2019. Framework for faction of data in social network using link based mining process. In Intelligent Computing and Optimization. Vasant P., Zelinka I., Weber G. W. (eds.) ICO 2018. Advances in Intelligent Systems and Computing, Vol. 866. Cham: Springer, 300\u2013309."},{"key":"e_1_3_1_83_2","volume-title":"Introduction to Social Network Methods","author":"Hanneman R. A.","year":"2005","unstructured":"R. A. Hanneman and M. Riddle. 2005. Introduction to Social Network Methods. Riverside, CA: University of California, Riverside."},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.001"},{"key":"e_1_3_1_85_2","volume-title":"Social Network Analysis: A Handbook","author":"Scott J.","year":"2000","unstructured":"J. Scott. 2000. Social Network Analysis: A Handbook. LON: SAGE Publications."},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2013.6601370"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2005.07.003"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(96)00300-0"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30440-3_491"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0983-9_9"},{"key":"e_1_3_1_91_2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/9780470592663.ch24","article-title":"SWOT analysis","volume":"1","author":"Leigh D.","year":"2009","unstructured":"D. Leigh. 2009. SWOT analysis. In Handbook of Improving Performance in the Workplace K. H. Silber, W. R. Foshay, R. Watkins, D. Leigh, J. L. Moseley, and J. C. Dessinger, Editors, 1\u20133, 115\u2013140.","journal-title":"Handbook of Improving Performance in the Workplace"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.167"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.6007\/IJARAFMS\/v7-i3\/3286"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.5555\/1859261"},{"key":"e_1_3_1_95_2","volume-title":"Exploratory Data Analysis","author":"Tukey J. W.","year":"1977","unstructured":"J. W. Tukey. 1977. Exploratory Data Analysis. Reading: Massachusetts, Addison-Wesley."},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1177\/009365088015005001"},{"key":"e_1_3_1_97_2","unstructured":"REGTECH100. 2018. REGTECH 100 Companies 2018. Retrieved May 20 2019 from https:\/\/fintech.global\/regtech100\/regtech-100-2018\/."},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.healthpol.2019.01.001"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.11.009"},{"key":"e_1_3_1_100_2","unstructured":"Google Inc. 2021. Google Trends help. Retrieved May 13 2021 from https:\/\/support.google.com\/trends#topic=6248052."},{"key":"e_1_3_1_101_2","unstructured":"M. Mohebbi D. Vanderkam J. Kodysh R. Schonberger H. Choi and S. Kumar. 2011. Google correlate whitepaper. Retrieved May 13 2021 from http:\/\/www.google.com\/trends\/correlate\/whitepaper.pdf."},{"key":"e_1_3_1_102_2","unstructured":"QSearch. 2021. QSearch Trend. Retrieved January 20 2021 from https:\/\/www.qsearch.cc\/trend."},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx045"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1038\/509410a"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:35Z","timestamp":1750191515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,11]]},"references-count":103,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3485187"],"URL":"https:\/\/doi.org\/10.1145\/3485187","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"type":"print","value":"2158-656X"},{"type":"electronic","value":"2158-6578"}],"subject":[],"published":{"date-parts":[[2021,12,11]]},"assertion":[{"value":"2020-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}