Yong Wu

Orcid: 0000-0002-9831-8089

Affiliations:
  • Donghua University, Glorious Sun School of Business and Management, Shanghai, China


According to our database1, Yong Wu authored at least 17 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
A network fairness consensus model considering opinion retention utility.
Expert Syst. Appl., 2026

2025
Maximum expert consensus models with both type-α and type-ε constraints.
J. Comb. Optim., September, 2025

Information security outsourcing strategies in the supply chain considering security externality.
J. Oper. Res. Soc., March, 2025

Decision Making in Information Security Investments: Impact of System Vulnerability and Investment Timing on Resource-Sharing Platforms.
Decis. Anal., 2025

2024
Managing cloud security in the presence of strategic hacker and joint responsibility.
J. Oper. Res. Soc., July, 2024

When to announce the queueing information for bounded rationality customers: a discrete-event-based simulation model.
Simul., 2024

Managing partial outsourcing on information security in the presence of security externality.
Expert Syst. Appl., 2024

2023
How to react to hacker types and asset types in security decision-making.
Expert Syst. Appl., November, 2023

2022
A game-theoretical model of firm security reactions responding to a strategic hacker in a competitive industry.
J. Oper. Res. Soc., 2022

Maximum satisfaction consensus with budget constraints considering individual tolerance and compromise limit behaviors.
Eur. J. Oper. Res., 2022

Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker.
Decis. Anal., 2022

2021
Information security decisions of firms considering security risk interdependency.
Expert Syst. Appl., 2021

2020
Reaching a minimum adjustment consensus in social network group decision-making.
Inf. Fusion, 2020

Managing Security Outsourcing in the Presence of Strategic Hackers.
Decis. Anal., 2020

2018
Comparison of information security decisions under different security and business environments.
J. Oper. Res. Soc., 2018

2017
Decisions making in information security outsourcing: Impact of complementary and substitutable firms.
Comput. Ind. Eng., 2017

2015
Game of information security investment: Impact of attack types and network vulnerability.
Expert Syst. Appl., 2015


  Loading...