Follow
Wei Thoo Yue
Wei Thoo Yue
Verified email at cityu.edu.hk
Title
Cited by
Cited by
Year
Decision-theoretic and game-theoretic approaches to IT security investment
H Cavusoglu, S Raghunathan, WT Yue
Journal of Management Information Systems 25 (2), 281-304, 2008
3132008
When hackers talk: Managing information security under variable attack rates and knowledge dissemination
V Mookerjee, R Mookerjee, A Bensoussan, WT Yue
Information Systems Research 22 (3), 606-623, 2011
1012011
Information security outsourcing with system interdependency and mandatory security requirement
KL Hui, W Hui, WT Yue
Journal of Management Information Systems 29 (3), 117-156, 2012
902012
Firm bankruptcy prediction: experimental comparison of isotonic separation and other classification approaches
YU Ryu, WT Yue
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2005
872005
The classification of hackers by knowledge exchange behaviors
X Zhang, A Tsang, WT Yue, M Chau
Information Systems Frontiers 17, 1239-1251, 2015
822015
Big data analytics for security and criminal investigations
MI Pramanik, RYK Lau, WT Yue, Y Ye, C Li
Wiley interdisciplinary reviews: data mining and knowledge discovery 7 (4 …, 2017
792017
Network externalities, layered protection and IT security risk management
WT Yue, M Çakanyıldırım, YU Ryu, D Liu
Decision Support Systems 44 (1), 1-16, 2007
792007
See no evil, hear no evil? Dissecting the impact of online hacker forums
WT Yue, QH Wang, KL Hui
Mis Quarterly 43 (1), 73, 2019
752019
Intrusion prevention in information systems: Reactive and proactive responses
WT Yue, M Cakanyildirim
Journal of Management Information Systems 24 (1), 329-353, 2007
752007
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
672023
Could gamification designs enhance online learning through personalization? Lessons from a field experiment
ACM Leung, R Santhanam, RCW Kwok, WT Yue
Information Systems Research 34 (1), 27-49, 2023
592023
Bilateral liability-based contracts in information security outsourcing
KL Hui, PF Ke, Y Yao, WT Yue
Information Systems Research 30 (2), 411-429, 2019
412019
A cost-based analysis of intrusion detection system configuration under active or passive response
WT Yue, M Çakanyıldırım
Decision Support Systems 50 (1), 21-31, 2010
282010
Agent-based simulation approach to information warfare in the SEAS environment
AR Chaturvedi, M Gupta, SR Mehta, WT Yue
Proceedings of the 33rd annual Hawaii international conference on system …, 2000
272000
Integration of on-premises and cloud-based software: the product bundling perspective
X Zhang, WT Yue
Journal of the Association for Information Systems 21 (6), 6, 2020
252020
The management of intrusion detection: Configuration, inspection, and investment
M Çakanyıldırım, WT Yue, YU Ryu
European Journal of Operational Research 195 (1), 186-204, 2009
232009
Maintaining diagnostic knowledge-based systems: a control-theoretic approach
A Bensoussan, R Mookerjee, V Mookerjee, WT Yue
Management Science 55 (2), 294-310, 2009
222009
Live-chat agent assignments to heterogeneous e-customers under imperfect classification
P Goes, N Ilk, WT Yue, JL Zhao
ACM Transactions on Management Information Systems (TMIS) 2 (4), 1-15, 2012
212012
How to monetize data: An economic analysis of data monetization strategies under competition
X Zhang, WT Yue, Y Yu, X Zhang
Decision Support Systems 173, 114012, 2023
202023
Servitization for the Environment? The Impact of Data-Centric Product-Service Models
X Zhang, X Guo, WT Yue, Y Yu
Journal of Management Information Systems 39 (4), 1146-1183, 2022
192022
The system can't perform the operation now. Try again later.
Articles 1–20