Wei T. Yue

Orcid: 0000-0002-1344-153X

Affiliations:
  • City University of Hong Kong, Department of Information Systems, Hong Kong
  • University of Texas at Dallas, Department of Information Systems and Operations Management, Richardson, TX, USA
  • Purdue University, West Lafayette, IN, USA (PhD)


According to our database1, Wei T. Yue authored at least 53 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
How to monetize data: An economic analysis of data monetization strategies under competition.
Decis. Support Syst., October, 2023

Could Gamification Designs Enhance Online Learning Through Personalization? Lessons from a Field Experiment.
Inf. Syst. Res., March, 2023

Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches.
MIS Q., 2023

2022
Servitization for the Environment? The Impact of Data-Centric Product-Service Models.
J. Manag. Inf. Syst., 2022

Is smart the new green? The impact of consumer environmental awareness and data network effect.
Inf. Technol. People, 2022

The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries.
Inf. Syst. Frontiers, 2022

The grey areas of Internet use: secret affairs in cyberspace and religiosity.
Internet Res., 2022

Gamified System Effectiveness on Social Trading Platforms.
Proceedings of the 43rd International Conference on Information Systems, 2022

Legal and Regulatory Issues on Artificial Intelligence, Machine Learning, Data Science, and Big Data.
Proceedings of the HCI International 2022 - Late Breaking Papers: Interacting with eXtended Reality and Artificial Intelligence, 2022

2020
Integration of On-Premises and Cloud-Based Software: The Product Bundling Perspective.
J. Assoc. Inf. Syst., 2020

Bundling cloud software to fight piracy: an economic analysis.
Internet Res., 2020

A 2020 perspective on "Transformative value of the Internet of Things and pricing decisions".
Electron. Commer. Res. Appl., 2020

Corporate Social Responsibility and Firm Value: the Moderating Effect of IT Investment.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

The More, the Better? The Impact of Data Analytics and Data Provisioning on Publisher Competition.
Proceedings of the 41st International Conference on Information Systems, 2020

Leveraging CSR-related Knowledge for Firm Value: the Role of IT-enabled Absorptive Capacities.
Proceedings of the 41st International Conference on Information Systems, 2020

Can Touch Interaction Predict Product-Related Emotion? A Study on Mobile Augmented Reality.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Introduction to Special Section Based on Papers Presented at the Workshop on Information Technology and Systems, 2017.
ACM Trans. Manag. Inf. Syst., 2019

See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums.
MIS Q., 2019

Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective.
J. Organ. Comput. Electron. Commer., 2019

Software piracy and bundling in the cloud-based software era.
Inf. Technol. People, 2019

Bilateral Liability-Based Contracts in Information Security Outsourcing.
Inf. Syst. Res., 2019

Transformative value of the Internet of Things and pricing decisions.
Electron. Commer. Res. Appl., 2019

The Impact of Anti-phishing Laws on IT and Security Investment.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

What is Your Data Strategy? The Strategic Interactions in Data-Driven Advertising.
Proceedings of the 40th International Conference on Information Systems, 2019

Impact of Immersive Interface Design on Consumer Perceptions during Online Product Presentation.
Proceedings of the 40th International Conference on Information Systems, 2019

2017
Big data analytics for security and criminal investigations.
WIREs Data Mining Knowl. Discov., 2017

Content Restrictions on AdBlock Usage.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

2016
IT-enabled business process management.
Inf. Syst. E Bus. Manag., 2016

A Privacy Preserving Framework for Big Data in E-Government.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Religious Beliefs and Cyber-Affairs.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

2015
The classification of hackers by knowledge exchange behaviors.
Inf. Syst. Frontiers, 2015

2014
Social Media Use in Decision Making: Special issue of Decision Support Systems for the 10th Workshop on E-Business.
Decis. Support Syst., 2014

2013
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement.
J. Manag. Inf. Syst., 2013

Bundling of Software Products and Services to Fight against Piracy.
Proceedings of the International Conference on Information Systems, 2013

Information Security as a Credence Good.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
An Economic Analysis Of The Online Counterfeit Market And The Impact Of Anti-Counterfeit Technology.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

2011
Live-chat agent assignments to heterogeneous e-customers under imperfect classification.
ACM Trans. Manag. Inf. Syst., 2011

When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination.
Inf. Syst. Res., 2011

Cognitive Elaboration on Potential Outcomes and Its Effects on Employees' Information Security Policy Compliance Intention-Exploring the Key Antecedents.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

Do Hacker Forums Contribute to Security Attacks?
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

2010
A cost-based analysis of intrusion detection system configuration under active or passive response.
Decis. Support Syst., 2010

2009
Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach.
Manag. Sci., 2009

The management of intrusion detection: Configuration, inspection, and investment.
Eur. J. Oper. Res., 2009

2008
Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment.
J. Manag. Inf. Syst., 2008

2007
Intrusion Prevention in Information Systems: Reactive and Proactive Responses.
J. Manag. Inf. Syst., 2007

Network externalities, layered protection and IT security risk management.
Decis. Support Syst., 2007

2005
Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches.
IEEE Trans. Syst. Man Cybern. Part A, 2005

2004
IT Security Risk Management under Network Effects and Layered Protection Strategy.
Proceedings of the Intelligence and Security Informatics, 2004

2003
Adoption of Low Earth Orbit Satellite Systems: A Diffusion Model under Competition.
Inf. Technol. Manag., 2003

Tuning the Quality Parameters of a Firewall to Maximize Net Benefit.
Proceedings of the Distributed Computing, 2003

2000
The Reward Based Online Shopping Community.
Electron. Mark., 2000

Is more information better? The effect of traders' irrational behavior on an artificial stock market.
Proceedings of the Twenty-First International Conference on Information Systems, 2000

Agent-based Simulation Approach to Information Warfare in the SEAS Environment.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000


  Loading...