Young U. Ryu

According to our database1, Young U. Ryu authored at least 49 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Interaction effects between supply chain capabilities and information technology on firm performance.
Inf. Technol. Manag., 2019

2018
Understanding mandatory IS use behavior: How outcome expectations affect conative IS use.
Int. J. Inf. Manag., 2018

Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective.
Proceedings of the National Cyber Summit, 2018

2016
Collaborative filtering with facial expressions for online video recommendation.
Int. J. Inf. Manag., 2016

Firm Failure Timeline Prediction: Math Programming Approaches.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Supply Chain Capabilities and Information Technology Characteristics: Interaction Effects on Firm Performance.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?
Inf. Syst. Res., 2015

A Two-Tiered Recommender System for Tourism Product Recommendations.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2013
Facilitating Effective User Navigation through Website Structure Improvement.
IEEE Trans. Knowl. Data Eng., 2013

The role of IT in Korea's economic development.
Inf. Technol. Manag., 2013

Introduction to the special issue information technology in Korea: its role in firm success and economic development.
Inf. Technol. Manag., 2013

A sequence-based filtering method for exhibition booth visit recommendations.
Int. J. Inf. Manag., 2013

A Local Scoring Model for Diversified Recommendation.
Proceedings of the International Conference on Information Systems, 2013

2012
Customer-Driven Content Recommendation Over a Network of Customers.
IEEE Trans. Syst. Man Cybern. Part A, 2012

Unrealistic optimism on information security management.
Comput. Secur., 2012

The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

The Effect of Third Party Investigation on Pay-Per-Click Advertising.
Proceedings of the International Conference on Information Systems, 2012

2011
Neural Network Analysis of Right-Censored Observations for Occurrence Time Prediction.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

2010
A group recommendation system for online communities.
Int. J. Inf. Manag., 2010

2009
Personalized Recommendation over a Customer Network for Ubiquitous Shopping.
IEEE Trans. Serv. Comput., 2009

The management of intrusion detection: Configuration, inspection, and investment.
Eur. J. Oper. Res., 2009

Self-efficacy in information security: Its influence on end users' information security practice behavior.
Comput. Secur., 2009

2008
Evaluation of Intrusion Detection Systems Under a Resource Constraint.
ACM Trans. Inf. Syst. Secur., 2008

Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches.
INFORMS J. Comput., 2008

2007
Internet content filtering using isotonic separation on content category ratings.
ACM Trans. Internet Techn., 2007

Breast cancer prediction using the isotonic separation technique.
Eur. J. Oper. Res., 2007

Network externalities, layered protection and IT security risk management.
Decis. Support Syst., 2007

2005
Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches.
IEEE Trans. Syst. Man Cybern. Part A, 2005

Isotonic Separation.
INFORMS J. Comput., 2005

IPM-EPDL: an XML-based executable process definition language.
Comput. Ind., 2005

I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security.
Proceedings of the International Conference on Information Systems, 2005

2004
Prognosis Using an Isotonic Prediction Technique.
Manag. Sci., 2004

IT Security Risk Management under Network Effects and Layered Protection Strategy.
Proceedings of the Intelligence and Security Informatics, 2004

2002
Exploration, exploitation and adaptive rationality: the neo-Schumpeterian perspective.
Simul. Model. Pract. Theory, 2002

1999
A hierarchical constraint satisfaction approach to product selection for electronic shopping support.
IEEE Trans. Syst. Man Cybern. Part A, 1999

Filtering objectionable internet content.
Proceedings of the Twentieth International Conference on Information Systems, 1999

1998
A logic-based modeling of resource consumption and production.
Decis. Support Syst., 1998

Constraint logic programming framework for integrated decision supports.
Decis. Support Syst., 1998

Specification of Contractual Obligations in Formal Business Communication.
Data Knowl. Eng., 1998

Negotiation Supports in a Commodity Trading Market.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Dynamic Construction of Product Taxonomy Hierarchies for Assisted Shopping in the Electronic Marketplace.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Approximate Constraint Satisfaction Over a Constraint Hierarchy: A Preliminary Study.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Logic-based representation and reasoning about knowledge of constrained resources.
Knowl. Based Syst., 1997

Hierarchical constraint satisfaction of multilateral trade matching in commodity auction markets.
Ann. Oper. Res., 1997

Relativized Deontic Modalities for Contractual Obligations in Formal Business Communication.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
Logical Specification of Resource Consumption and Production.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

1995
DX: A Deontic Expert System.
J. Manag. Inf. Syst., 1995

Defeasible deontic reasoning and its applications to normative systems.
Decis. Support Syst., 1995

Conditional Deontic Logic Augmented with Defeasible Reasoning.
Data Knowl. Eng., 1995


  Loading...