BibTeX records: Wei T. Yue

download as .bib file

@article{DBLP:journals/intr/XuLYS25,
  author       = {Junmin Xu and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue and
                  Qin Su},
  title        = {Corporate social responsibility and firm value: exploring the moderating
                  effects of information technology-enabled knowledge capabilities},
  journal      = {Internet Res.},
  volume       = {35},
  number       = {2},
  pages        = {546--566},
  year         = {2025},
  url          = {https://doi.org/10.1108/INTR-03-2023-0202},
  doi          = {10.1108/INTR-03-2023-0202},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/XuLYS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/ZhangYZY25,
  author       = {Xin Zhang and
                  Wei Thoo Yue and
                  Ran (Alan) Zhang and
                  Yugang Yu},
  title        = {Blessing or Curse? Implications of Data Brokers for Publisher Competition},
  journal      = {Inf. Syst. Res.},
  volume       = {36},
  number       = {1},
  pages        = {261--284},
  year         = {2025},
  url          = {https://doi.org/10.1287/isre.2022.0227},
  doi          = {10.1287/ISRE.2022.0227},
  timestamp    = {Fri, 22 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/ZhangYZY25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/XuYK25,
  author       = {Yamin Xu and
                  Wei Thoo Yue and
                  Weiling Ke},
  editor       = {Michael D. Myers and
                  Rose Alinda Alias and
                  Wai Fong Boh and
                  Robert M. Davisin and
                  Barney Tan and
                  Nor Zairah Ab Rahim},
  title        = {When {AI} Praises a Product: The Effects of {AI} Anthropomorphism
                  on Risk Perception},
  booktitle    = {29th Pacific Asia Conference on Information Systems, {PACIS} 2025,
                  Kuala Lumpur, Malaysia, July 6-9, 2025},
  year         = {2025},
  url          = {https://aisel.aisnet.org/pacis2025/general\_topic/general\_topic/9},
  timestamp    = {Fri, 25 Jul 2025 12:06:26 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/XuYK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2503-05770,
  author       = {Veda C. Storey and
                  Wei Thoo Yue and
                  J. Leon Zhao and
                  Roman Lukyanenko},
  title        = {Generative Artificial Intelligence: Evolving Technology, Growing Societal
                  Impact, and Opportunities for Information Systems Research},
  journal      = {CoRR},
  volume       = {abs/2503.05770},
  year         = {2025},
  url          = {https://doi.org/10.48550/arXiv.2503.05770},
  doi          = {10.48550/ARXIV.2503.05770},
  eprinttype    = {arXiv},
  eprint       = {2503.05770},
  timestamp    = {Fri, 11 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2503-05770.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/WangLLY24,
  author       = {Xiaoxiao Wang and
                  Wilson Weixun Li and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue},
  title        = {To alert or alleviate? {A} natural experiment on the effect of anti-phishing
                  laws on corporate {IT} and security investments},
  journal      = {Decis. Support Syst.},
  volume       = {179},
  pages        = {114173},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dss.2024.114173},
  doi          = {10.1016/J.DSS.2024.114173},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/WangLLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/XuYLS24,
  author       = {Junmin Xu and
                  Wei Thoo Yue and
                  Alvin Chung Man Leung and
                  Qin Su},
  title        = {Focusing on the fundamentals? An investigation of the relationship
                  between corporate social irresponsibility and data breach risk},
  journal      = {Decis. Support Syst.},
  volume       = {182},
  pages        = {114252},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dss.2024.114252},
  doi          = {10.1016/J.DSS.2024.114252},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/XuYLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/TarafdarLYB24,
  author       = {Pratik Tarafdar and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue and
                  Indranil Bose},
  title        = {Understanding the impact of augmented reality product presentation
                  on diagnosticity, cognitive load, and product sales},
  journal      = {Int. J. Inf. Manag.},
  volume       = {75},
  pages        = {102744},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2023.102744},
  doi          = {10.1016/J.IJINFOMGT.2023.102744},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/TarafdarLYB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ZhangYYZ23,
  author       = {Xin Zhang and
                  Wei Thoo Yue and
                  Yugang Yu and
                  Xiong Zhang},
  title        = {How to monetize data: An economic analysis of data monetization strategies
                  under competition},
  journal      = {Decis. Support Syst.},
  volume       = {173},
  pages        = {114012},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dss.2023.114012},
  doi          = {10.1016/J.DSS.2023.114012},
  timestamp    = {Fri, 22 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/ZhangYYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/LeungSKY23,
  author       = {Alvin Chung Man Leung and
                  Radhika Santhanam and
                  Ron Chi{-}Wai Kwok and
                  Wei Thoo Yue},
  title        = {Could Gamification Designs Enhance Online Learning Through Personalization?
                  Lessons from a Field Experiment},
  journal      = {Inf. Syst. Res.},
  volume       = {34},
  number       = {1},
  pages        = {27--49},
  year         = {2023},
  url          = {https://doi.org/10.1287/isre.2022.1123},
  doi          = {10.1287/ISRE.2022.1123},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/LeungSKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/LiLY23,
  author       = {Wilson Weixun Li and
                  Alvin Chung{-}Man Leung and
                  Wei T. Yue},
  title        = {Where is {IT} in Information Security? The Interrelationship among
                  {IT} Investment, Security Awareness, and Data Breaches},
  journal      = {{MIS} Q.},
  volume       = {47},
  number       = {1},
  pages        = {317--342},
  year         = {2023},
  url          = {https://doi.org/10.25300/misq/2022/15713},
  doi          = {10.25300/MISQ/2022/15713},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/LiLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/LiLY22,
  author       = {Wilson Weixun Li and
                  Alvin Chung Man Leung and
                  Wei T. Yue},
  title        = {The grey areas of Internet use: secret affairs in cyberspace and religiosity},
  journal      = {Internet Res.},
  volume       = {32},
  number       = {1},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.1108/INTR-04-2020-0218},
  doi          = {10.1108/INTR-04-2020-0218},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/LiLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ZhangZLY22,
  author       = {Xiong Zhang and
                  Xin Zhang and
                  Xuechen Luo and
                  Wei T. Yue},
  title        = {The Impact of Revenue Models on Anti-Counterfeiting Measures for Online
                  Intermediaries},
  journal      = {Inf. Syst. Frontiers},
  volume       = {24},
  number       = {6},
  pages        = {1905--1928},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10796-021-10189-7},
  doi          = {10.1007/S10796-021-10189-7},
  timestamp    = {Fri, 22 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/ZhangZLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/YuZZY22,
  author       = {Yugang Yu and
                  Xin Zhang and
                  Xiong Zhang and
                  Wei T. Yue},
  title        = {Is smart the new green? The impact of consumer environmental awareness
                  and data network effect},
  journal      = {Inf. Technol. People},
  volume       = {35},
  number       = {3},
  pages        = {1029--1053},
  year         = {2022},
  url          = {https://doi.org/10.1108/ITP-10-2020-0680},
  doi          = {10.1108/ITP-10-2020-0680},
  timestamp    = {Fri, 22 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itp/YuZZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/ZhangGYY22,
  author       = {Xin Zhang and
                  Xiaolong Guo and
                  Wei Thoo Yue and
                  Yugang Yu},
  title        = {Servitization for the Environment? The Impact of Data-Centric Product-Service
                  Models},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {39},
  number       = {4},
  pages        = {1146--1183},
  year         = {2022},
  url          = {http://www.jmis-web.org/articles/1598},
  timestamp    = {Sat, 23 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/ZhangGYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/WanTSYNY22,
  author       = {Wai Yee Wan and
                  Michael Tsimplis and
                  Keng L. Siau and
                  Wei T. Yue and
                  Fiona Fui{-}Hoon Nah and
                  Gabriel M. Yu},
  editor       = {Jessie Y. C. Chen and
                  Gino Fragomeni and
                  Helmut Degen and
                  Stavroula Ntoa},
  title        = {Legal and Regulatory Issues on Artificial Intelligence, Machine Learning,
                  Data Science, and Big Data},
  booktitle    = {{HCI} International 2022 - Late Breaking Papers: Interacting with
                  eXtended Reality and Artificial Intelligence - 24th International
                  Conference on Human-Computer Interaction, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13518},
  pages        = {558--567},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21707-4\_40},
  doi          = {10.1007/978-3-031-21707-4\_40},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/WanTSYNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/ChenLY22,
  author       = {Yingying Chen and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue},
  editor       = {Niels Bj{\o}rn{-}Andersen and
                  Roman Beck and
                  Stacie Petter and
                  Tina Blegind Jensen and
                  Tilo B{\"{o}}hmann and
                  Kai{-}Lung Hui and
                  Viswanath Venkatesh},
  title        = {Gamified System Effectiveness on Social Trading Platforms},
  booktitle    = {Proceedings of the 43rd International Conference on Information Systems,
                  {ICIS} 2022, Digitization for the Next Generation, Copenhagen, Denmark,
                  December 9-14, 2022},
  publisher    = {Association for Information Systems},
  year         = {2022},
  url          = {https://aisel.aisnet.org/icis2022/user\_behaivor/user\_behaivor/13},
  timestamp    = {Tue, 14 Feb 2023 13:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/ChenLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/ZhangY20,
  author       = {Xiong Zhang and
                  Wei T. Yue},
  title        = {A 2020 perspective on "Transformative value of the Internet of
                  Things and pricing decisions"},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {41},
  pages        = {100967},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.elerap.2020.100967},
  doi          = {10.1016/J.ELERAP.2020.100967},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/ZhangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/ZhangYH20,
  author       = {Xiong Zhang and
                  Wei T. Yue and
                  Wendy Hui},
  title        = {Bundling cloud software to fight piracy: an economic analysis},
  journal      = {Internet Res.},
  volume       = {30},
  number       = {1},
  pages        = {191--241},
  year         = {2020},
  url          = {https://doi.org/10.1108/INTR-10-2018-0455},
  doi          = {10.1108/INTR-10-2018-0455},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/ZhangYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/ZhangY20,
  author       = {Xiong Zhang and
                  Wei T. Yue},
  title        = {Integration of On-Premises and Cloud-Based Software: The Product Bundling
                  Perspective},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {21},
  number       = {6},
  pages        = {6},
  year         = {2020},
  url          = {https://doi.org/10.17705/1jais.00645},
  doi          = {10.17705/1JAIS.00645},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/ZhangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/TarafdarLYB20,
  author       = {Pratik Tarafdar and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue and
                  Indranil Bose},
  editor       = {Bonnie Brinton Anderson and
                  Jason Thatcher and
                  Rayman D. Meservy and
                  Kathy Chudoba and
                  Kelly J. Fadel and
                  Sue Brown},
  title        = {Can Touch Interaction Predict Product-Related Emotion? {A} Study on
                  Mobile Augmented Reality},
  booktitle    = {26th Americas Conference on Information Systems, {AMCIS} 2020, Virtual
                  Conference, August 15-17, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/amcis2020/sig\_hci/sig\_hci/11},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/TarafdarLYB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/XuLYS20,
  author       = {Junmin Xu and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue and
                  Qin Su},
  editor       = {Joey F. George and
                  Souren Paul and
                  Rahul De' and
                  Elena Karahanna and
                  Suprateek Sarker and
                  Gal Oestreicher{-}Singer},
  title        = {Leveraging CSR-related Knowledge for Firm Value: the Role of IT-enabled
                  Absorptive Capacities},
  booktitle    = {Proceedings of the 41st International Conference on Information Systems,
                  {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the
                  Global, Hyderabad, India, December 13-16, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/icis2020/governance\_is/governance\_is/3},
  timestamp    = {Tue, 06 Apr 2021 14:35:57 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/XuLYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/ZhangZYY20,
  author       = {Xin Zhang and
                  Ran Zhang and
                  Wei Thoo Yue and
                  Yugang Yu},
  editor       = {Joey F. George and
                  Souren Paul and
                  Rahul De' and
                  Elena Karahanna and
                  Suprateek Sarker and
                  Gal Oestreicher{-}Singer},
  title        = {The More, the Better? The Impact of Data Analytics and Data Provisioning
                  on Publisher Competition},
  booktitle    = {Proceedings of the 41st International Conference on Information Systems,
                  {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the
                  Global, Hyderabad, India, December 13-16, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/icis2020/sharing\_economy/sharing\_economy/17},
  timestamp    = {Sat, 23 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/ZhangZYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/XuLY20,
  author       = {Junmin Xu and
                  Alvin Chung Man Leung and
                  Wei Yue},
  editor       = {Doug Vogel and
                  Kathy Ning Shen and
                  Pan Shan Ling and
                  Carol Hsu and
                  James Y. L. Thong and
                  Marco De Marco and
                  Moez Limayem and
                  Sean Xin Xu},
  title        = {Corporate Social Responsibility and Firm Value: the Moderating Effect
                  of {IT} Investment},
  booktitle    = {24th Pacific Asia Conference on Information Systems, {PACIS} 2020,
                  Dubai, UAE, June 22-24, 2020},
  pages        = {81},
  year         = {2020},
  url          = {https://aisel.aisnet.org/pacis2020/81},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/XuLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/ZhangY19,
  author       = {Xiong Zhang and
                  Wei T. Yue},
  title        = {Transformative value of the Internet of Things and pricing decisions},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {34},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.elerap.2019.100825},
  doi          = {10.1016/J.ELERAP.2019.100825},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/ZhangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/HuiKYY19,
  author       = {Kai Lung Hui and
                  Ping Fan Ke and
                  Yuxi Yao and
                  Wei T. Yue},
  title        = {Bilateral Liability-Based Contracts in Information Security Outsourcing},
  journal      = {Inf. Syst. Res.},
  volume       = {30},
  number       = {2},
  pages        = {411--429},
  year         = {2019},
  url          = {https://doi.org/10.1287/isre.2018.0806},
  doi          = {10.1287/ISRE.2018.0806},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/HuiKYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/0001YH19,
  author       = {Xiong Zhang and
                  Wei T. Yue and
                  Wendy Hui},
  title        = {Software piracy and bundling in the cloud-based software era},
  journal      = {Inf. Technol. People},
  volume       = {32},
  number       = {4},
  pages        = {1085--1122},
  year         = {2019},
  url          = {https://doi.org/10.1108/ITP-05-2018-0210},
  doi          = {10.1108/ITP-05-2018-0210},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itp/0001YH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocec/YangWYSL19,
  author       = {Xue Yang and
                  Xinwei Wang and
                  Wei Thoo Yue and
                  Choon Ling Sia and
                  Xin Robert Luo},
  title        = {Security Policy Opt-in Decisions in Bring-Your-Own-Device {(BYOD)}
                  - {A} Persuasion and Cognitive Elaboration Perspective},
  journal      = {J. Organ. Comput. Electron. Commer.},
  volume       = {29},
  number       = {4},
  pages        = {274--293},
  year         = {2019},
  url          = {https://doi.org/10.1080/10919392.2019.1639913},
  doi          = {10.1080/10919392.2019.1639913},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocec/YangWYSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/YueWH19,
  author       = {Wei T. Yue and
                  Qiu{-}Hong Wang and
                  Kai Lung Hui},
  title        = {See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker
                  Forums},
  journal      = {{MIS} Q.},
  volume       = {43},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.25300/misq/2019/13042},
  doi          = {10.25300/MISQ/2019/13042},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/YueWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/JainRYY19,
  author       = {Hemant K. Jain and
                  T. S. Raghu and
                  Victoria Y. Yoon and
                  Wei Thoo Yue},
  title        = {Introduction to Special Section Based on Papers Presented at the Workshop
                  on Information Technology and Systems, 2017},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {10},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342557},
  doi          = {10.1145/3342557},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/JainRYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/TarafdarLYB19,
  author       = {Pratik Tarafdar and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue and
                  Indranil Bose},
  editor       = {Helmut Krcmar and
                  Jane Fedorowicz and
                  Wai Fong Boh and
                  Jan Marco Leimeister and
                  Sunil Wattal},
  title        = {Impact of Immersive Interface Design on Consumer Perceptions during
                  Online Product Presentation},
  booktitle    = {Proceedings of the 40th International Conference on Information Systems,
                  {ICIS} 2019, Munich, Germany, December 15-18, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/icis2019/human\_computer\_interact/human\_computer\_interact/4},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/TarafdarLYB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/ZhangZYY19,
  author       = {Xin Zhang and
                  Ran Zhang and
                  Wei Thoo Yue and
                  Yugang Yu},
  editor       = {Helmut Krcmar and
                  Jane Fedorowicz and
                  Wai Fong Boh and
                  Jan Marco Leimeister and
                  Sunil Wattal},
  title        = {What is Your Data Strategy? The Strategic Interactions in Data-Driven
                  Advertising},
  booktitle    = {Proceedings of the 40th International Conference on Information Systems,
                  {ICIS} 2019, Munich, Germany, December 15-18, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/icis2019/economics\_is/economics\_is/24},
  timestamp    = {Sat, 23 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/ZhangZYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/WangLLY19,
  author       = {Xiaoxiao Wang and
                  Wilson Weixun Li and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue},
  editor       = {Kwok Kee Wei and
                  Wayne Wei Huang and
                  Jae Kyu Lee and
                  Dongming Xu and
                  James J. Jiang and
                  Hee{-}Woong Kim},
  title        = {The Impact of Anti-phishing Laws on {IT} and Security Investment},
  booktitle    = {23rd Pacific Asia Conference on Information Systems, {PACIS} 2019,
                  X'ian, China, July 8-12, 2019},
  pages        = {60},
  year         = {2019},
  url          = {https://aisel.aisnet.org/pacis2019/60},
  timestamp    = {Fri, 06 Aug 2021 15:04:59 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/WangLLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/widm/PramanikLYYL17,
  author       = {Md. Ileas Pramanik and
                  Raymond Y. K. Lau and
                  Wei T. Yue and
                  Yunming Ye and
                  Chunping Li},
  title        = {Big data analytics for security and criminal investigations},
  journal      = {WIREs Data Mining Knowl. Discov.},
  volume       = {7},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/widm.1208},
  doi          = {10.1002/WIDM.1208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/widm/PramanikLYYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LiHLY17,
  author       = {Wilson Weixun Li and
                  Wendy Hui and
                  Alvin Chung Man Leung and
                  Wei Yue},
  editor       = {Rose Alinda Alias and
                  Pan Shan Ling and
                  Shamshul Bahri and
                  Patrick Finnegan and
                  Choon Ling Sia},
  title        = {Content Restrictions on AdBlock Usage},
  booktitle    = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017,
                  Langkawi, Malaysia, July 16-20, 2017},
  pages        = {84},
  year         = {2017},
  url          = {http://aisel.aisnet.org/pacis2017/84},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/LiHLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isem/YueX16,
  author       = {Wei T. Yue and
                  Dongming Xu},
  title        = {IT-enabled business process management},
  journal      = {Inf. Syst. {E} Bus. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {691--692},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10257-016-0335-6},
  doi          = {10.1007/S10257-016-0335-6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isem/YueX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/PramanikLY16,
  author       = {Md. Ileas Pramanik and
                  Raymond Y. K. Lau and
                  Wei T. Yue},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {A Privacy Preserving Framework for Big Data in E-Government},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {72},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/72},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/PramanikLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LiMY16,
  author       = {Wilson Weixun Li and
                  Alvin Chung Man Leung and
                  Wei Thoo Yue},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {Religious Beliefs and Cyber-Affairs},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {376},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/376},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/LiMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ZhangTYC15,
  author       = {Xiong Zhang and
                  Alex Tsang and
                  Wei T. Yue and
                  Michael Chau},
  title        = {The classification of hackers by knowledge exchange behaviors},
  journal      = {Inf. Syst. Frontiers},
  volume       = {17},
  number       = {6},
  pages        = {1239--1251},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10796-015-9567-0},
  doi          = {10.1007/S10796-015-9567-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/ZhangTYC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ZhangY14,
  author       = {Dongsong Zhang and
                  Wei Thoo Yue},
  title        = {Social Media Use in Decision Making: Special issue of Decision Support
                  Systems for the 10th Workshop on E-Business},
  journal      = {Decis. Support Syst.},
  volume       = {63},
  pages        = {65--66},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dss.2013.08.007},
  doi          = {10.1016/J.DSS.2013.08.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/ZhangY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/HuiHY13,
  author       = {Kai Lung Hui and
                  Wendy Hui and
                  Wei T. Yue},
  title        = {Information Security Outsourcing with System Interdependency and Mandatory
                  Security Requirement},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {117--156},
  year         = {2013},
  url          = {https://doi.org/10.2753/mis0742-1222290304},
  doi          = {10.2753/MIS0742-1222290304},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/HuiHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KeHY13,
  author       = {Ping Fan Ke and
                  Kai Lung Hui and
                  Wei T. Yue},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Information Security as a Credence Good},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {83--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_6},
  doi          = {10.1007/978-3-642-41320-9\_6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KeHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/ZhangY13,
  author       = {Xiong Zhang and
                  Wei Yue},
  editor       = {Richard L. Baskerville and
                  Michael Chau},
  title        = {Bundling of Software Products and Services to Fight against Piracy},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/icis2013/proceedings/EconomicsOfIS/11},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/ZhangY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/ZhangGY12,
  author       = {Xiong Zhang and
                  Zhiling Guo and
                  Wei Thoo Yue},
  editor       = {Shan L. Pan and
                  Tru H. Cao},
  title        = {An Economic Analysis Of The Online Counterfeit Market And The Impact
                  Of Anti-Counterfeit Technology},
  booktitle    = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012,
                  Ho Chi Minh City, Vietnam, 11-15 July 2012},
  pages        = {92},
  year         = {2012},
  url          = {http://aisel.aisnet.org/pacis2012/92},
  timestamp    = {Tue, 31 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/ZhangGY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/paisi/2012,
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Wei Thoo Yue and
                  Hsinchun Chen},
  title        = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7299},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30428-6},
  doi          = {10.1007/978-3-642-30428-6},
  isbn         = {978-3-642-30427-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/web/2011,
  editor       = {Michael J. Shaw and
                  Dongsong Zhang and
                  Wei T. Yue},
  title        = {E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life
                  - 10th Workshop on E-Business, {WEB} 2011, Shanghai, China, December
                  4, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29873-8},
  doi          = {10.1007/978-3-642-29873-8},
  isbn         = {978-3-642-29872-1},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/web/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/MookerjeeMBY11,
  author       = {Vijay S. Mookerjee and
                  Radha V. Mookerjee and
                  Alain Bensoussan and
                  Wei T. Yue},
  title        = {When Hackers Talk: Managing Information Security Under Variable Attack
                  Rates and Knowledge Dissemination},
  journal      = {Inf. Syst. Res.},
  volume       = {22},
  number       = {3},
  pages        = {606--623},
  year         = {2011},
  url          = {https://doi.org/10.1287/isre.1100.0341},
  doi          = {10.1287/ISRE.1100.0341},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/MookerjeeMBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/GoesIYZ11,
  author       = {Paulo B. G{\'{o}}es and
                  Noyan Ilk and
                  Wei T. Yue and
                  J. Leon Zhao},
  title        = {Live-chat agent assignments to heterogeneous e-customers under imperfect
                  classification},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {2},
  number       = {4},
  pages        = {24:1--24:15},
  year         = {2011},
  url          = {https://doi.org/10.1145/2070710.2070715},
  doi          = {10.1145/2070710.2070715},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/GoesIYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/web/WangYH11,
  author       = {Qiu{-}Hong Wang and
                  Wei T. Yue and
                  Kai Lung Hui},
  editor       = {Michael J. Shaw and
                  Dongsong Zhang and
                  Wei T. Yue},
  title        = {Do Hacker Forums Contribute to Security Attacks?},
  booktitle    = {E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life
                  - 10th Workshop on E-Business, {WEB} 2011, Shanghai, China, December
                  4, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {108},
  pages        = {143--152},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29873-8\_14},
  doi          = {10.1007/978-3-642-29873-8\_14},
  timestamp    = {Mon, 30 Nov 2020 13:33:53 +0100},
  biburl       = {https://dblp.org/rec/conf/web/WangYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/web/YangYS11,
  author       = {Xue Yang and
                  Wei T. Yue and
                  Choon Ling Sia},
  editor       = {Michael J. Shaw and
                  Dongsong Zhang and
                  Wei T. Yue},
  title        = {Cognitive Elaboration on Potential Outcomes and Its Effects on Employees'
                  Information Security Policy Compliance Intention-Exploring the Key
                  Antecedents},
  booktitle    = {E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life
                  - 10th Workshop on E-Business, {WEB} 2011, Shanghai, China, December
                  4, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {108},
  pages        = {180--194},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29873-8\_17},
  doi          = {10.1007/978-3-642-29873-8\_17},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/web/YangYS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/YueC10,
  author       = {Wei T. Yue and
                  Metin {\c{C}}akanyildirim},
  title        = {A cost-based analysis of intrusion detection system configuration
                  under active or passive response},
  journal      = {Decis. Support Syst.},
  volume       = {50},
  number       = {1},
  pages        = {21--31},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.dss.2010.06.001},
  doi          = {10.1016/J.DSS.2010.06.001},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/YueC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/CakanyildirimYR09,
  author       = {Metin {\c{C}}akanyildirim and
                  Wei T. Yue and
                  Young U. Ryu},
  title        = {The management of intrusion detection: Configuration, inspection,
                  and investment},
  journal      = {Eur. J. Oper. Res.},
  volume       = {195},
  number       = {1},
  pages        = {186--204},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ejor.2008.01.034},
  doi          = {10.1016/J.EJOR.2008.01.034},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eor/CakanyildirimYR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/BensoussanMMY09,
  author       = {Alain Bensoussan and
                  Radha V. Mookerjee and
                  Vijay S. Mookerjee and
                  Wei T. Yue},
  title        = {Maintaining Diagnostic Knowledge-Based Systems: {A} Control-Theoretic
                  Approach},
  journal      = {Manag. Sci.},
  volume       = {55},
  number       = {2},
  pages        = {294--310},
  year         = {2009},
  url          = {https://doi.org/10.1287/mnsc.1080.0908},
  doi          = {10.1287/MNSC.1080.0908},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/BensoussanMMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/CavusogluRY08,
  author       = {Huseyin Cavusoglu and
                  Srinivasan Raghunathan and
                  Wei T. Yue},
  title        = {Decision-Theoretic and Game-Theoretic Approaches to {IT} Security
                  Investment},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {25},
  number       = {2},
  pages        = {281--304},
  year         = {2008},
  url          = {https://doi.org/10.2753/mis0742-1222250211},
  doi          = {10.2753/MIS0742-1222250211},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/CavusogluRY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/YueCRL07,
  author       = {Wei T. Yue and
                  Metin {\c{C}}akanyildirim and
                  Young U. Ryu and
                  Dengpan Liu},
  title        = {Network externalities, layered protection and {IT} security risk management},
  journal      = {Decis. Support Syst.},
  volume       = {44},
  number       = {1},
  pages        = {1--16},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.dss.2006.08.009},
  doi          = {10.1016/J.DSS.2006.08.009},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/YueCRL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/YueC07,
  author       = {Wei T. Yue and
                  Metin {\c{C}}akanyildirim},
  title        = {Intrusion Prevention in Information Systems: Reactive and Proactive
                  Responses},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {329--353},
  year         = {2007},
  url          = {https://doi.org/10.2753/mis0742-1222240110},
  doi          = {10.2753/MIS0742-1222240110},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/YueC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/RyuY05,
  author       = {Young U. Ryu and
                  Wei T. Yue},
  title        = {Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation
                  and Other Classification Approaches},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {35},
  number       = {5},
  pages        = {727--737},
  year         = {2005},
  url          = {https://doi.org/10.1109/TSMCA.2005.843393},
  doi          = {10.1109/TSMCA.2005.843393},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/RyuY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YuecRL04,
  author       = {Wei T. Yue and
                  Metin {\c{C}}akanyildirim and
                  Young U. Ryu and
                  Dengpan Liu},
  editor       = {Hsinchun Chen and
                  Reagan W. Moore and
                  Daniel Dajun Zeng and
                  John Leavitt},
  title        = {{IT} Security Risk Management under Network Effects and Layered Protection
                  Strategy},
  booktitle    = {Intelligence and Security Informatics, Second Symposium on Intelligence
                  and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3073},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25952-7\_25},
  doi          = {10.1007/978-3-540-25952-7\_25},
  timestamp    = {Tue, 24 May 2022 18:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YuecRL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/AltinkemerYY03,
  author       = {Kemal Altinkemer and
                  Wei Thoo Yue and
                  Liang Yu},
  title        = {Adoption of Low Earth Orbit Satellite Systems: {A} Diffusion Model
                  under Competition},
  journal      = {Inf. Technol. Manag.},
  volume       = {4},
  number       = {1},
  pages        = {33--54},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1021824416243},
  doi          = {10.1023/A:1021824416243},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/AltinkemerYY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdc/YueB03,
  author       = {Wei T. Yue and
                  Amitava Bagchi},
  editor       = {Samir R. Das and
                  Sajal K. Das},
  title        = {Tuning the Quality Parameters of a Firewall to Maximize Net Benefit},
  booktitle    = {Distributed Computing - {IWDC} 2003, 5th International Workshop, Kolkata,
                  India, December 27-30, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2918},
  pages        = {321--329},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24604-6\_31},
  doi          = {10.1007/978-3-540-24604-6\_31},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdc/YueB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/electronicmarkets/YueC00,
  author       = {Wei T. Yue and
                  Alok R. Chaturvedi},
  title        = {The Reward Based Online Shopping Community},
  journal      = {Electron. Mark.},
  volume       = {10},
  number       = {4},
  pages        = {224--228},
  year         = {2000},
  url          = {https://doi.org/10.1080/101967800750050335},
  doi          = {10.1080/101967800750050335},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/electronicmarkets/YueC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChaturvediGMY00,
  author       = {Alok R. Chaturvedi and
                  Mukul Gupta and
                  Shailendra Raj Mehta and
                  Wei T. Yue},
  title        = {Agent-based Simulation Approach to Information Warfare in the {SEAS}
                  Environment},
  booktitle    = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33),
                  4-7 January, 2000, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/HICSS.2000.926647},
  doi          = {10.1109/HICSS.2000.926647},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ChaturvediGMY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/YueCM00,
  author       = {Wei Yue and
                  Alok R. Chaturvedi and
                  Shailendra Raj Mehta},
  editor       = {Soon Ang and
                  Helmut Krcmar and
                  Wanda J. Orlikowski and
                  Peter Weill and
                  Janice I. DeGross},
  title        = {Is more information better? The effect of traders' irrational behavior
                  on an artificial stock market},
  booktitle    = {Proceedings of the Twenty-First International Conference on Information
                  Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000},
  pages        = {660--666},
  publisher    = {Association for Information Systems},
  year         = {2000},
  url          = {http://aisel.aisnet.org/icis2000/72},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/YueCM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}