Managing Information System Security Under Continuous and Abrupt Deterioration
Bensoussan, Alain, Mookerjee, Vijay, Yue, Wei T.
Published in Production and operations management (01.08.2020)
Published in Production and operations management (01.08.2020)
Get full text
Journal Article
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment
Cavusoglu, Huseyin, Raghunathan, Srinivasan, Yue, Wei T.
Published in Journal of management information systems (01.09.2008)
Published in Journal of management information systems (01.09.2008)
Get full text
Journal Article
Bilateral Liability-Based Contracts in Information Security Outsourcing
Hui, Kai-Lung, Ke, Ping Fan, Yao, Yuxi, Yue, Wei T
Published in Information systems research (01.06.2019)
Published in Information systems research (01.06.2019)
Get full text
Journal Article
The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries
Zhang, Xiong, Zhang, Xin, Luo, Xuechen, Yue, Wei T.
Published in Information systems frontiers (01.12.2022)
Published in Information systems frontiers (01.12.2022)
Get full text
Journal Article
Software piracy and bundling in the cloud-based software era
Zhang, Xiong, Yue, Wei T, Hui, Wendy
Published in Information technology & people (West Linn, Or.) (23.09.2019)
Published in Information technology & people (West Linn, Or.) (23.09.2019)
Get full text
Journal Article
The classification of hackers by knowledge exchange behaviors
Zhang, Xiong, Tsang, Alex, Yue, Wei T., Chau, Michael
Published in Information systems frontiers (01.12.2015)
Published in Information systems frontiers (01.12.2015)
Get full text
Journal Article
Is smart the new green? The impact of consumer environmental awareness and data network effect
Yu, Yugang, Zhang, Xin, Zhang, Xiong, Yue, Wei T
Published in Information technology & people (West Linn, Or.) (01.04.2022)
Published in Information technology & people (West Linn, Or.) (01.04.2022)
Get full text
Journal Article
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Hui, Kai-Lung, Hui, Wendy, Yue, Wei T.
Published in Journal of management information systems (01.12.2012)
Published in Journal of management information systems (01.12.2012)
Get full text
Journal Article
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Yue, Wei T., Cakanyildirim, Metin
Published in Journal of management information systems (01.07.2007)
Published in Journal of management information systems (01.07.2007)
Get full text
Journal Article
Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach
Bensoussan, Alain, Mookerjee, Radha, Mookerjee, Vijay, Yue, Wei T
Published in Management science (01.02.2009)
Published in Management science (01.02.2009)
Get full text
Journal Article
Network externalities, layered protection and IT security risk management
Yue, Wei T., Çakanyıldırım, Metin, Ryu, Young U., Liu, Dengpan
Published in Decision Support Systems (01.11.2007)
Published in Decision Support Systems (01.11.2007)
Get full text
Journal Article
The management of intrusion detection: Configuration, inspection, and investment
Çakanyıldırım, Metin, Yue, Wei T., Ryu, Young U.
Published in European journal of operational research (16.05.2009)
Published in European journal of operational research (16.05.2009)
Get full text
Journal Article