关注
Wei Thoo Yue
Wei Thoo Yue
在 cityu.edu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Decision-theoretic and game-theoretic approaches to IT security investment
H Cavusoglu, S Raghunathan, WT Yue
Journal of Management Information Systems 25 (2), 281-304, 2008
3102008
When hackers talk: Managing information security under variable attack rates and knowledge dissemination
V Mookerjee, R Mookerjee, A Bensoussan, WT Yue
Information Systems Research 22 (3), 606-623, 2011
1022011
Information security outsourcing with system interdependency and mandatory security requirement
KL Hui, W Hui, WT Yue
Journal of Management Information Systems 29 (3), 117-156, 2012
882012
Firm bankruptcy prediction: experimental comparison of isotonic separation and other classification approaches
YU Ryu, WT Yue
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2005
852005
The classification of hackers by knowledge exchange behaviors
X Zhang, A Tsang, WT Yue, M Chau
Information Systems Frontiers 17, 1239-1251, 2015
812015
Network externalities, layered protection and IT security risk management
WT Yue, M Çakanyıldırım, YU Ryu, D Liu
Decision Support Systems 44 (1), 1-16, 2007
792007
Big data analytics for security and criminal investigations
MI Pramanik, RYK Lau, WT Yue, Y Ye, C Li
Wiley interdisciplinary reviews: data mining and knowledge discovery 7 (4 …, 2017
762017
Intrusion prevention in information systems: Reactive and proactive responses
WT Yue, M Cakanyildirim
Journal of Management Information Systems 24 (1), 329-353, 2007
712007
See no evil, hear no evil? Dissecting the impact of online hacker forums
WT Yue, QH Wang, KL Hui
Mis Quarterly 43 (1), 73, 2019
702019
Could gamification designs enhance online learning through personalization? Lessons from a field experiment
ACM Leung, R Santhanam, RCW Kwok, WT Yue
Information Systems Research 34 (1), 27-49, 2023
592023
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
532023
Bilateral liability-based contracts in information security outsourcing
KL Hui, PF Ke, Y Yao, WT Yue
Information Systems Research 30 (2), 411-429, 2019
402019
A cost-based analysis of intrusion detection system configuration under active or passive response
WT Yue, M Çakanyıldırım
Decision Support Systems 50 (1), 21-31, 2010
272010
Agent-based simulation approach to information warfare in the SEAS environment
AR Chaturvedi, M Gupta, SR Mehta, WT Yue
Proceedings of the 33rd annual Hawaii international conference on system …, 2000
272000
The management of intrusion detection: Configuration, inspection, and investment
M Çakanyıldırım, WT Yue, YU Ryu
European Journal of Operational Research 195 (1), 186-204, 2009
242009
Integration of on-premises and cloud-based software: the product bundling perspective
X Zhang, WT Yue
Journal of the Association for Information Systems 21 (6), 6, 2020
232020
Maintaining diagnostic knowledge-based systems: a control-theoretic approach
A Bensoussan, R Mookerjee, V Mookerjee, WT Yue
Management Science 55 (2), 294-310, 2009
232009
Live-chat agent assignments to heterogeneous e-customers under imperfect classification
P Goes, N Ilk, WT Yue, JL Zhao
ACM Transactions on Management Information Systems (TMIS) 2 (4), 1-15, 2012
222012
How to monetize data: An economic analysis of data monetization strategies under competition
X Zhang, WT Yue, Y Yu, X Zhang
Decision Support Systems 173, 114012, 2023
182023
Transformative value of the Internet of Things and pricing decisions
X Zhang, WT Yue
Electronic Commerce Research and Applications 34, 100825, 2019
182019
系统目前无法执行此操作,请稍后再试。
文章 1–20