Decision-theoretic and game-theoretic approaches to IT security investment H Cavusoglu, S Raghunathan, WT Yue Journal of Management Information Systems 25 (2), 281-304, 2008 | 296 | 2008 |
When hackers talk: Managing information security under variable attack rates and knowledge dissemination V Mookerjee, R Mookerjee, A Bensoussan, WT Yue Information Systems Research 22 (3), 606-623, 2011 | 100 | 2011 |
Firm bankruptcy prediction: experimental comparison of isotonic separation and other classification approaches YU Ryu, WT Yue IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2005 | 84 | 2005 |
Information security outsourcing with system interdependency and mandatory security requirement KL Hui, W Hui, WT Yue Journal of Management Information Systems 29 (3), 117-156, 2012 | 81 | 2012 |
Network externalities, layered protection and IT security risk management WT Yue, M Çakanyıldırım, YU Ryu, D Liu Decision Support Systems 44 (1), 1-16, 2007 | 78 | 2007 |
The classification of hackers by knowledge exchange behaviors X Zhang, A Tsang, WT Yue, M Chau Information Systems Frontiers 17, 1239-1251, 2015 | 73 | 2015 |
Intrusion prevention in information systems: Reactive and proactive responses WT Yue, M Cakanyildirim Journal of Management Information Systems 24 (1), 329-353, 2007 | 70 | 2007 |
Big data analytics for security and criminal investigations MI Pramanik, RYK Lau, WT Yue, Y Ye, C Li Wiley interdisciplinary reviews: data mining and knowledge discovery 7 (4 …, 2017 | 68 | 2017 |
See no evil, hear no evil? Dissecting the impact of online hacker forums WT Yue, QH Wang, KL Hui Mis Quarterly 43 (1), 73, 2019 | 64 | 2019 |
Could gamification designs enhance online learning through personalization? Lessons from a field experiment ACM Leung, R Santhanam, RCW Kwok, WT Yue Information Systems Research 34 (1), 27-49, 2023 | 41 | 2023 |
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches WW Li, ACM Leung, WT Yue MIS Quarterly 47 (1), 317-342, 2023 | 35 | 2023 |
Bilateral liability-based contracts in information security outsourcing KL Hui, PF Ke, Y Yao, WT Yue Information Systems Research 30 (2), 411-429, 2019 | 30 | 2019 |
Agent-based simulation approach to information warfare in the SEAS environment AR Chaturvedi, M Gupta, SR Mehta, WT Yue Proceedings of the 33rd annual Hawaii international conference on system …, 2000 | 27 | 2000 |
A cost-based analysis of intrusion detection system configuration under active or passive response WT Yue, M Çakanyıldırım Decision Support Systems 50 (1), 21-31, 2010 | 26 | 2010 |
The management of intrusion detection: Configuration, inspection, and investment M Çakanyıldırım, WT Yue, YU Ryu European Journal of Operational Research 195 (1), 186-204, 2009 | 24 | 2009 |
Live-chat agent assignments to heterogeneous e-customers under imperfect classification P Goes, N Ilk, WT Yue, JL Zhao ACM Transactions on Management Information Systems (TMIS) 2 (4), 1-15, 2012 | 22 | 2012 |
Maintaining diagnostic knowledge-based systems: a control-theoretic approach A Bensoussan, R Mookerjee, V Mookerjee, WT Yue Management Science 55 (2), 294-310, 2009 | 22 | 2009 |
Integration of on-premises and cloud-based software: the product bundling perspective X Zhang, WT Yue Forthcoming in Journal of the Association for Information Systems, 2020 | 18 | 2020 |
Transformative value of the Internet of Things and pricing decisions X Zhang, WT Yue Electronic Commerce Research and Applications 34, 100825, 2019 | 16 | 2019 |
Managing information system security under continuous and abrupt deterioration A Bensoussan, V Mookerjee, WT Yue Production and Operations Management 29 (8), 1894-1917, 2020 | 14 | 2020 |