default search action
Wei T. Yue
Person information
- affiliation: City University of Hong Kong, Department of Information Systems, Hong Kong
- affiliation: University of Texas at Dallas, Department of Information Systems and Operations Management, Richardson, TX, USA
- affiliation (PhD): Purdue University, West Lafayette, IN, USA
Other persons with the same name
- Wei Yue — disambiguation page
- Wei Yue 0001 — Dalian Maritime University, Dalian, China
- Wei Yue 0003 — University of Electronic Science and Technology of China, Chengdu, China
- Wei Yue 0004 — Beijing University of Posts and Telecommunications, School of Cyberspace Security, Beijing, China
- Wei Yue 0005 — Xi'an Polytechnic University, School of Science, Xi'an, China (and 1 more)
Other persons with a similar name
- Wei-Yu Chen
- Wei-Yu Chiu
- Yuwei Liu (aka: Yu-Wei Liu) — disambiguation page
- Chen-Yu Wei
- Hung-Yu Wei
- Yu Wei — disambiguation page
- Wei Yu — disambiguation page
- Wei Yu 0001 — University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (and 1 more)
- Wei Yu 0002 — Towson University, Department of Computer & Information Sciences (and 1 more)
- Yuwei Zhang (aka: Yu-Wei Zhang) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Xiaoxiao Wang, Wilson Weixun Li, Alvin Chung Man Leung, Wei Thoo Yue:
To alert or alleviate? A natural experiment on the effect of anti-phishing laws on corporate IT and security investments. Decis. Support Syst. 179: 114173 (2024) - [j34]Junmin Xu, Wei Thoo Yue, Alvin Chung Man Leung, Qin Su:
Focusing on the fundamentals? An investigation of the relationship between corporate social irresponsibility and data breach risk. Decis. Support Syst. 182: 114252 (2024) - [j33]Pratik Tarafdar, Alvin Chung Man Leung, Wei Thoo Yue, Indranil Bose:
Understanding the impact of augmented reality product presentation on diagnosticity, cognitive load, and product sales. Int. J. Inf. Manag. 75: 102744 (2024) - 2023
- [j32]Xin Zhang, Wei Thoo Yue, Yugang Yu, Xiong Zhang:
How to monetize data: An economic analysis of data monetization strategies under competition. Decis. Support Syst. 173: 114012 (2023) - [j31]Alvin Chung Man Leung, Radhika Santhanam, Ron Chi-Wai Kwok, Wei Thoo Yue:
Could Gamification Designs Enhance Online Learning Through Personalization? Lessons from a Field Experiment. Inf. Syst. Res. 34(1): 27-49 (2023) - [j30]Wilson Weixun Li, Alvin Chung-Man Leung, Wei T. Yue:
Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches. MIS Q. 47(1): 317-342 (2023) - 2022
- [j29]Wilson Weixun Li, Alvin Chung Man Leung, Wei T. Yue:
The grey areas of Internet use: secret affairs in cyberspace and religiosity. Internet Res. 32(1): 1-23 (2022) - [j28]Xiong Zhang, Xin Zhang, Xuechen Luo, Wei T. Yue:
The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries. Inf. Syst. Frontiers 24(6): 1905-1928 (2022) - [j27]Yugang Yu, Xin Zhang, Xiong Zhang, Wei T. Yue:
Is smart the new green? The impact of consumer environmental awareness and data network effect. Inf. Technol. People 35(3): 1029-1053 (2022) - [j26]Xin Zhang, Xiaolong Guo, Wei Thoo Yue, Yugang Yu:
Servitization for the Environment? The Impact of Data-Centric Product-Service Models. J. Manag. Inf. Syst. 39(4): 1146-1183 (2022) - [c21]Wai Yee Wan, Michael Tsimplis, Keng L. Siau, Wei T. Yue, Fiona Fui-Hoon Nah, Gabriel M. Yu:
Legal and Regulatory Issues on Artificial Intelligence, Machine Learning, Data Science, and Big Data. HCI (43) 2022: 558-567 - [c20]Yingying Chen, Alvin Chung Man Leung, Wei Thoo Yue:
Gamified System Effectiveness on Social Trading Platforms. ICIS 2022 - 2020
- [j25]Xiong Zhang, Wei T. Yue:
A 2020 perspective on "Transformative value of the Internet of Things and pricing decisions". Electron. Commer. Res. Appl. 41: 100967 (2020) - [j24]Xiong Zhang, Wei T. Yue, Wendy Hui:
Bundling cloud software to fight piracy: an economic analysis. Internet Res. 30(1): 191-241 (2020) - [j23]Xiong Zhang, Wei T. Yue:
Integration of On-Premises and Cloud-Based Software: The Product Bundling Perspective. J. Assoc. Inf. Syst. 21(6): 6 (2020) - [c19]Pratik Tarafdar, Alvin Chung Man Leung, Wei Thoo Yue, Indranil Bose:
Can Touch Interaction Predict Product-Related Emotion? A Study on Mobile Augmented Reality. AMCIS 2020 - [c18]Junmin Xu, Alvin Chung Man Leung, Wei Thoo Yue, Qin Su:
Leveraging CSR-related Knowledge for Firm Value: the Role of IT-enabled Absorptive Capacities. ICIS 2020 - [c17]Xin Zhang, Ran Zhang, Wei Thoo Yue, Yugang Yu:
The More, the Better? The Impact of Data Analytics and Data Provisioning on Publisher Competition. ICIS 2020 - [c16]Junmin Xu, Alvin Chung Man Leung, Wei Yue:
Corporate Social Responsibility and Firm Value: the Moderating Effect of IT Investment. PACIS 2020: 81
2010 – 2019
- 2019
- [j22]Xiong Zhang, Wei T. Yue:
Transformative value of the Internet of Things and pricing decisions. Electron. Commer. Res. Appl. 34 (2019) - [j21]Kai Lung Hui, Ping Fan Ke, Yuxi Yao, Wei T. Yue:
Bilateral Liability-Based Contracts in Information Security Outsourcing. Inf. Syst. Res. 30(2): 411-429 (2019) - [j20]Xiong Zhang, Wei T. Yue, Wendy Hui:
Software piracy and bundling in the cloud-based software era. Inf. Technol. People 32(4): 1085-1122 (2019) - [j19]Xue Yang, Xinwei Wang, Wei Thoo Yue, Choon Ling Sia, Xin Robert Luo:
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective. J. Organ. Comput. Electron. Commer. 29(4): 274-293 (2019) - [j18]Wei T. Yue, Qiu-Hong Wang, Kai Lung Hui:
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums. MIS Q. 43(1) (2019) - [j17]Hemant K. Jain, T. S. Raghu, Victoria Y. Yoon, Wei Thoo Yue:
Introduction to Special Section Based on Papers Presented at the Workshop on Information Technology and Systems, 2017. ACM Trans. Manag. Inf. Syst. 10(2) (2019) - [c15]Pratik Tarafdar, Alvin Chung Man Leung, Wei Thoo Yue, Indranil Bose:
Impact of Immersive Interface Design on Consumer Perceptions during Online Product Presentation. ICIS 2019 - [c14]Xin Zhang, Ran Zhang, Wei Thoo Yue, Yugang Yu:
What is Your Data Strategy? The Strategic Interactions in Data-Driven Advertising. ICIS 2019 - [c13]Xiaoxiao Wang, Wilson Weixun Li, Alvin Chung Man Leung, Wei Thoo Yue:
The Impact of Anti-phishing Laws on IT and Security Investment. PACIS 2019: 60 - 2017
- [j16]Md. Ileas Pramanik, Raymond Y. K. Lau, Wei T. Yue, Yunming Ye, Chunping Li:
Big data analytics for security and criminal investigations. WIREs Data Mining Knowl. Discov. 7(4) (2017) - [c12]Wilson Weixun Li, Wendy Hui, Alvin Chung Man Leung, Wei Yue:
Content Restrictions on AdBlock Usage. PACIS 2017: 84 - 2016
- [j15]Wei T. Yue, Dongming Xu:
IT-enabled business process management. Inf. Syst. E Bus. Manag. 14(4): 691-692 (2016) - [c11]Md. Ileas Pramanik, Raymond Y. K. Lau, Wei T. Yue:
A Privacy Preserving Framework for Big Data in E-Government. PACIS 2016: 72 - [c10]Wilson Weixun Li, Alvin Chung Man Leung, Wei Thoo Yue:
Religious Beliefs and Cyber-Affairs. PACIS 2016: 376 - 2015
- [j14]Xiong Zhang, Alex Tsang, Wei T. Yue, Michael Chau:
The classification of hackers by knowledge exchange behaviors. Inf. Syst. Frontiers 17(6): 1239-1251 (2015) - 2014
- [j13]Dongsong Zhang, Wei Thoo Yue:
Social Media Use in Decision Making: Special issue of Decision Support Systems for the 10th Workshop on E-Business. Decis. Support Syst. 63: 65-66 (2014) - 2013
- [j12]Kai Lung Hui, Wendy Hui, Wei T. Yue:
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. J. Manag. Inf. Syst. 29(3): 117-156 (2013) - [c9]Ping Fan Ke, Kai Lung Hui, Wei T. Yue:
Information Security as a Credence Good. Financial Cryptography Workshops 2013: 83-93 - [c8]Xiong Zhang, Wei Yue:
Bundling of Software Products and Services to Fight against Piracy. ICIS 2013 - 2012
- [c7]Xiong Zhang, Zhiling Guo, Wei Thoo Yue:
An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology. PACIS 2012: 92 - [e2]Michael Chau, G. Alan Wang, Wei Thoo Yue, Hsinchun Chen:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings. Lecture Notes in Computer Science 7299, Springer 2012, ISBN 978-3-642-30427-9 [contents] - [e1]Michael J. Shaw, Dongsong Zhang, Wei T. Yue:
E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life - 10th Workshop on E-Business, WEB 2011, Shanghai, China, December 4, 2011, Revised Selected Papers. Lecture Notes in Business Information Processing 108, Springer 2012, ISBN 978-3-642-29872-1 [contents] - 2011
- [j11]Vijay S. Mookerjee, Radha V. Mookerjee, Alain Bensoussan, Wei T. Yue:
When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination. Inf. Syst. Res. 22(3): 606-623 (2011) - [j10]Paulo B. Góes, Noyan Ilk, Wei T. Yue, J. Leon Zhao:
Live-chat agent assignments to heterogeneous e-customers under imperfect classification. ACM Trans. Manag. Inf. Syst. 2(4): 24:1-24:15 (2011) - [c6]Qiu-Hong Wang, Wei T. Yue, Kai Lung Hui:
Do Hacker Forums Contribute to Security Attacks? WEB 2011: 143-152 - [c5]Xue Yang, Wei T. Yue, Choon Ling Sia:
Cognitive Elaboration on Potential Outcomes and Its Effects on Employees' Information Security Policy Compliance Intention-Exploring the Key Antecedents. WEB 2011: 180-194 - 2010
- [j9]Wei T. Yue, Metin Çakanyildirim:
A cost-based analysis of intrusion detection system configuration under active or passive response. Decis. Support Syst. 50(1): 21-31 (2010)
2000 – 2009
- 2009
- [j8]Metin Çakanyildirim, Wei T. Yue, Young U. Ryu:
The management of intrusion detection: Configuration, inspection, and investment. Eur. J. Oper. Res. 195(1): 186-204 (2009) - [j7]Alain Bensoussan, Radha V. Mookerjee, Vijay S. Mookerjee, Wei T. Yue:
Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach. Manag. Sci. 55(2): 294-310 (2009) - 2008
- [j6]Huseyin Cavusoglu, Srinivasan Raghunathan, Wei T. Yue:
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment. J. Manag. Inf. Syst. 25(2): 281-304 (2008) - 2007
- [j5]Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:
Network externalities, layered protection and IT security risk management. Decis. Support Syst. 44(1): 1-16 (2007) - [j4]Wei T. Yue, Metin Çakanyildirim:
Intrusion Prevention in Information Systems: Reactive and Proactive Responses. J. Manag. Inf. Syst. 24(1): 329-353 (2007) - 2005
- [j3]Young U. Ryu, Wei T. Yue:
Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches. IEEE Trans. Syst. Man Cybern. Part A 35(5): 727-737 (2005) - 2004
- [c4]Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:
IT Security Risk Management under Network Effects and Layered Protection Strategy. ISI 2004: 331-348 - 2003
- [j2]Kemal Altinkemer, Wei Thoo Yue, Liang Yu:
Adoption of Low Earth Orbit Satellite Systems: A Diffusion Model under Competition. Inf. Technol. Manag. 4(1): 33-54 (2003) - [c3]Wei T. Yue, Amitava Bagchi:
Tuning the Quality Parameters of a Firewall to Maximize Net Benefit. IWDC 2003: 321-329 - 2000
- [j1]Wei T. Yue, Alok R. Chaturvedi:
The Reward Based Online Shopping Community. Electron. Mark. 10(4): 224-228 (2000) - [c2]Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue:
Agent-based Simulation Approach to Information Warfare in the SEAS Environment. HICSS 2000 - [c1]Wei Yue, Alok R. Chaturvedi, Shailendra Raj Mehta:
Is more information better? The effect of traders' irrational behavior on an artificial stock market. ICIS 2000: 660-666
Coauthor Index
aka: Alvin Chung-Man Leung
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint