关注
Wei Thoo Yue
Wei Thoo Yue
在 cityu.edu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Decision-theoretic and game-theoretic approaches to IT security investment
H Cavusoglu, S Raghunathan, WT Yue
Journal of Management Information Systems 25 (2), 281-304, 2008
2962008
When hackers talk: Managing information security under variable attack rates and knowledge dissemination
V Mookerjee, R Mookerjee, A Bensoussan, WT Yue
Information Systems Research 22 (3), 606-623, 2011
1002011
Firm bankruptcy prediction: experimental comparison of isotonic separation and other classification approaches
YU Ryu, WT Yue
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2005
842005
Information security outsourcing with system interdependency and mandatory security requirement
KL Hui, W Hui, WT Yue
Journal of Management Information Systems 29 (3), 117-156, 2012
812012
Network externalities, layered protection and IT security risk management
WT Yue, M Çakanyıldırım, YU Ryu, D Liu
Decision Support Systems 44 (1), 1-16, 2007
782007
The classification of hackers by knowledge exchange behaviors
X Zhang, A Tsang, WT Yue, M Chau
Information Systems Frontiers 17, 1239-1251, 2015
732015
Intrusion prevention in information systems: Reactive and proactive responses
WT Yue, M Cakanyildirim
Journal of Management Information Systems 24 (1), 329-353, 2007
702007
Big data analytics for security and criminal investigations
MI Pramanik, RYK Lau, WT Yue, Y Ye, C Li
Wiley interdisciplinary reviews: data mining and knowledge discovery 7 (4 …, 2017
682017
See no evil, hear no evil? Dissecting the impact of online hacker forums
WT Yue, QH Wang, KL Hui
Mis Quarterly 43 (1), 73, 2019
642019
Could gamification designs enhance online learning through personalization? Lessons from a field experiment
ACM Leung, R Santhanam, RCW Kwok, WT Yue
Information Systems Research 34 (1), 27-49, 2023
412023
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
352023
Bilateral liability-based contracts in information security outsourcing
KL Hui, PF Ke, Y Yao, WT Yue
Information Systems Research 30 (2), 411-429, 2019
302019
Agent-based simulation approach to information warfare in the SEAS environment
AR Chaturvedi, M Gupta, SR Mehta, WT Yue
Proceedings of the 33rd annual Hawaii international conference on system …, 2000
272000
A cost-based analysis of intrusion detection system configuration under active or passive response
WT Yue, M Çakanyıldırım
Decision Support Systems 50 (1), 21-31, 2010
262010
The management of intrusion detection: Configuration, inspection, and investment
M Çakanyıldırım, WT Yue, YU Ryu
European Journal of Operational Research 195 (1), 186-204, 2009
242009
Live-chat agent assignments to heterogeneous e-customers under imperfect classification
P Goes, N Ilk, WT Yue, JL Zhao
ACM Transactions on Management Information Systems (TMIS) 2 (4), 1-15, 2012
222012
Maintaining diagnostic knowledge-based systems: a control-theoretic approach
A Bensoussan, R Mookerjee, V Mookerjee, WT Yue
Management Science 55 (2), 294-310, 2009
222009
Integration of on-premises and cloud-based software: the product bundling perspective
X Zhang, WT Yue
Forthcoming in Journal of the Association for Information Systems, 2020
182020
Transformative value of the Internet of Things and pricing decisions
X Zhang, WT Yue
Electronic Commerce Research and Applications 34, 100825, 2019
162019
Managing information system security under continuous and abrupt deterioration
A Bensoussan, V Mookerjee, WT Yue
Production and Operations Management 29 (8), 1894-1917, 2020
142020
系统目前无法执行此操作,请稍后再试。
文章 1–20