Bong-Keun Jeong

Orcid: 0000-0001-7174-6625

According to our database1, Bong-Keun Jeong authored at least 21 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Segmentation Study of Digital Pirates and Understanding the Effectiveness of Targeted Anti-Piracy Communication.
J. Theor. Appl. Electron. Commer. Res., 2023

2022
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.
J. Netw. Comput. Appl., 2022

Lean IT With Value Stream Mapping Analysis: A Case Study in Software Development Life Cycle Process.
Inf. Resour. Manag. J., 2022

2021
Improving the Effectiveness of Anti-Piracy Educational Deterrence Efforts: The Role of Message Frame, Issue Involvement, Risk Perception, and Message Evidence on Perceived Message Effectiveness.
J. Theor. Appl. Electron. Commer. Res., 2021

Evaluating visualization approaches to detect abnormal activities in network traffic data.
Int. J. Inf. Sec., 2021

2020
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

2019
An Analysis of Human Emotions by Utilizing Wavelet Features.
Int. J. Multim. Data Eng. Manag., 2019

2018
An Empirical Investigation of Smartphone Adoption in Pakistan.
Int. J. Technol. Hum. Interact., 2018

Service Oriented Architecture (SOA) Implementation: Success Factors and Realized Benefits.
Int. J. Inf. Syst. Serv. Sect., 2018

2017
User acceptance of business intelligence application: motivation to learn, technology, social influence, and situational constraints.
Int. J. Bus. Inf. Syst., 2017

Understanding sensor data with uncertainty using a visual representation.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
A multi-level intrusion detection method for abnormal network behaviors.
J. Netw. Comput. Appl., 2016

2014
User Acceptance of Business Intelligence (BI) Application: Technology, Individual Difference, Social Influence, and Situational Constraints.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

The Role of Regulatory Focus and Message Framing on Persuasion of Anti-piracy Educational Campaigns.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach.
Comput. Hum. Behav., 2013

2012
Consumer Piracy Risk: Conceptualization and Measurement in Music Sharing.
Int. J. Electron. Commer., 2012

The impacts of piracy and supply chain contracts on digital music channel performance.
Decis. Support Syst., 2012

2010
Market reaction to application service provider (ASP) adoption: An empirical investigation.
Inf. Manag., 2010

2008
The Impact of Radio Frequency Identification (RFID) Investment Announcements on the Market Value of the Firm.
J. Theor. Appl. Electron. Commer. Res., 2008

Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm.
Data Knowl. Eng., 2008


  Loading...