Young U. Ryu

According to our database1, Young U. Ryu
  • authored at least 44 papers between 1995 and 2016.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Firm Failure Timeline Prediction: Math Programming Approaches.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Supply Chain Capabilities and Information Technology Characteristics: Interaction Effects on Firm Performance.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies?
Information Systems Research, 2015

A Two-Tiered Recommender System for Tourism Product Recommendations.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2013
Facilitating Effective User Navigation through Website Structure Improvement.
IEEE Trans. Knowl. Data Eng., 2013

The role of IT in Korea's economic development.
Information Technology and Management, 2013

Introduction to the special issue information technology in Korea: its role in firm success and economic development.
Information Technology and Management, 2013

A sequence-based filtering method for exhibition booth visit recommendations.
Int J. Information Management, 2013

A Local Scoring Model for Diversified Recommendation.
Proceedings of the International Conference on Information Systems, 2013

2012
Customer-Driven Content Recommendation Over a Network of Customers.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2012

Unrealistic optimism on information security management.
Computers & Security, 2012

The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

The Effect of Third Party Investigation on Pay-Per-Click Advertising.
Proceedings of the International Conference on Information Systems, 2012

2011
Neural Network Analysis of Right-Censored Observations for Occurrence Time Prediction.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2011

2010
A group recommendation system for online communities.
Int J. Information Management, 2010

2009
Personalized Recommendation over a Customer Network for Ubiquitous Shopping.
IEEE Trans. Services Computing, 2009

The management of intrusion detection: Configuration, inspection, and investment.
European Journal of Operational Research, 2009

Self-efficacy in information security: Its influence on end users' information security practice behavior.
Computers & Security, 2009

2008
Evaluation of Intrusion Detection Systems Under a Resource Constraint.
ACM Trans. Inf. Syst. Secur., 2008

Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches.
INFORMS Journal on Computing, 2008

2007
Internet content filtering using isotonic separation on content category ratings.
ACM Trans. Internet Techn., 2007

Breast cancer prediction using the isotonic separation technique.
European Journal of Operational Research, 2007

Network externalities, layered protection and IT security risk management.
Decision Support Systems, 2007

2005
Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2005

Isotonic Separation.
INFORMS Journal on Computing, 2005

IPM-EPDL: an XML-based executable process definition language.
Computers in Industry, 2005

I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security.
Proceedings of the International Conference on Information Systems, 2005

2004
Prognosis Using an Isotonic Prediction Technique.
Management Science, 2004

IT Security Risk Management under Network Effects and Layered Protection Strategy.
Proceedings of the Intelligence and Security Informatics, 2004

2002
Exploration, exploitation and adaptive rationality: the neo-Schumpeterian perspective.
Simulation Modelling Practice and Theory, 2002

1999
A hierarchical constraint satisfaction approach to product selection for electronic shopping support.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 1999

Filtering objectionable internet content.
Proceedings of the Twentieth International Conference on Information Systems, 1999

1998
A logic-based modeling of resource consumption and production.
Decision Support Systems, 1998

Constraint logic programming framework for integrated decision supports.
Decision Support Systems, 1998

Specification of Contractual Obligations in Formal Business Communication.
Data Knowl. Eng., 1998

Negotiation Supports in a Commodity Trading Market.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Dynamic Construction of Product Taxonomy Hierarchies for Assisted Shopping in the Electronic Marketplace.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Approximate Constraint Satisfaction Over a Constraint Hierarchy: A Preliminary Study.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Logic-based representation and reasoning about knowledge of constrained resources.
Knowl.-Based Syst., 1997

Relativized Deontic Modalities for Contractual Obligations in Formal Business Communication.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
Logical Specification of Resource Consumption and Production.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

1995
DX: A Deontic Expert System.
J. of Management Information Systems, 1995

Defeasible deontic reasoning and its applications to normative systems.
Decision Support Systems, 1995

Conditional Deontic Logic Augmented with Defeasible Reasoning.
Data Knowl. Eng., 1995


  Loading...