Prof. YUE Wei Thoo (余偉圖)

Research Output

  1. 2017
  2. Published

    Big data analytics for security and criminal investigations

    Pramanik, M. I., Lau, R. Y. K., Yue, W. T., Ye, Y. & Li, C., Jul 2017, In: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 7, 4, e1208.

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 44
    Check@CityULib
  3. Published

    Content Restrictions on AdBlock Usage

    Li, W. W., Hui, W., Leung, A. C. M. & Yue, W. T., Jul 2017, Proceedings of the 21th Pacific Asia Conference on Information Systems (PACIS 2017). Association for Information Systems, 84. (Proceedings of the Pacific Asia Conference on Information Systems, PACIS).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  4. 2016
  5. Published

    A privacy preserving framework for big data in e-government

    Pramanik, M. I., Lau, R. Y. K. & Yue, W. T., Jun 2016, Pacific Asia Conference on Information Systems, PACIS 2016 - Proceedings. Pacific Asia Conference on Information Systems

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 2
    Check@CityULib
  6. Published

    RELIGIOUS BELIEFS AND CYBER-AFFAIRS

    Li, W., Leung, A. C. M. & Yue, W. T., Jun 2016, Proceeding of the 20th Pacific Asia Conference on Information Systems (PACIS 2016). Association for Information Systems, 376

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  7. 2015
  8. Presented

    Cybersecurity Regulations and Cyberattacks: A Case Study in China

    Ke, P. F., Hui, K. & YUE, W. T., 12 Dec 2015, (Presented).

    Research output: Conference PapersRGC 33 - Other conference paper

    Check@CityULib
  9. Published

    The classification of hackers by knowledge exchange behaviors

    Zhang, X., Tsang, A., Yue, W. T. & Chau, M., Dec 2015, In: Information Systems Frontiers. 17, 6, p. 1239-1251

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 40
    Check@CityULib
  10. Published

    WHAT DO WE KNOW ABOUT CROWDFUNDING? A REVIEW AND A RESEARCH FRAMEWORK

    LI, C. W., WANG, C. & YUE, W. T., 11 Jun 2015.

    Research output: Conference PapersRGC 32 - Refereed conference paper (without host publication)peer-review

    Check@CityULib
  11. 2014
  12. Published

    An Economic Analysis of Software Bundling on an Integrated Platform

    ZHANG, X. & YUE, W. T., 17 Dec 2014.

    Research output: Conference PapersRGC 32 - Refereed conference paper (without host publication)peer-review

    Check@CityULib
  13. Published

    Software Bundling on an Integrated Platform: An Economic Analysis

    Zhang, X. & YUE, W. T., 17 Dec 2014.

    Research output: Conference PapersRGC 32 - Refereed conference paper (without host publication)peer-review

    Check@CityULib
  14. Published

    Social Media Use in Decision Making: Special issue of Decision Support Systems for the 10th Workshop on E-Business

    Zhang, D. & Yue, W. T., Jul 2014, In: Decision Support Systems. 63, p. 65-66

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 6
    Check@CityULib
  15. 2013
  16. Published

    Bundling of software products and services to fight against piracy

    Zhang, X. & Yue, W. T., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 1. p. 640-654

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 2
    Check@CityULib
  17. Published

    Information security as a credence good

    Ke, P. F., Hui, K. & Yue, W. T., 2013, Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Revised Selected Papers. Springer Verlag, Vol. 7862 LNCS. p. 83-93 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7862 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Check@CityULib
  18. 2012
  19. Published

    An Analysis of Post Contributions in the Hacker Community

    Tsang, A., YUE, W. T. & Chau, M., 15 Dec 2012.

    Research output: Conference PapersRGC 32 - Refereed conference paper (without host publication)peer-review

    Check@CityULib
  20. Published

    Dissecting the Learning Behaviors in Hacker Forums

    Tsang, A., Zhang, X., Yue, W. T. & Chau, M., 15 Dec 2012.

    Research output: Conference PapersRGC 32 - Refereed conference paper (without host publication)peer-review

    Check@CityULib
  21. Published

    Information security outsourcing with system interdependency and mandatory security requirement

    Hui, K., Hui, W. & Yue, W., 1 Jan 2012, In: Journal of Management Information Systems. 29, 3, p. 117-155

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 52
    Check@CityULib
  22. Published

    An economic analysis of the online counterfeit market and the impact of anti-counterfeit technology

    Zhang, X., Guo, Z. & Yue, W. T., 2012, Proceedings - Pacific Asia Conference on Information Systems, PACIS 2012. Pacific Asia Conference on Information Systems

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 1
    Check@CityULib
  23. Published

    Cognitive elaboration on potential outcomes and its effects on employees' information security policy compliance intention-exploring the key antecedents

    Yang, X., Yue, W. T. & Sia, C. L., 2012, E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. Springer Verlag, Vol. 108 LNBIP. p. 180-194 (Lecture Notes in Business Information Processing; vol. 108 LNBIP).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 4
    Check@CityULib
  24. Published

    Do hacker forums contribute to security attacks?

    Wang, Q., Yue, W. T. & Hui, K., 2012, E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life. Springer Verlag, Vol. 108 LNBIP. p. 143-152 (Lecture Notes in Business Information Processing; vol. 108 LNBIP).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 8
    Check@CityULib
  25. Published

    E-Life: Web-enabled convergence of commerce, work, and social life: 10th Workshop on E-Business, WEB 2011, Shanghai, China, December 4, 2011, Revised selected papers

    Shaw, M. J., Zhang, D. & YUE, W. T., 2012, Berlin; New York: Springer. (Lecture notes in business information processing; vol. 108)

    Research output: Scholarly Books, Monographs, Reports and Case StudiesRGC 11 - Research book or monograph (Author)peer-review

    Check@CityULib
  26. Published

    Intelligence and Security Informatics

    Chau, M., Wang, G. A., YUE, W. T. & Chen, H., 2012, Germany: Springer.

    Research output: Scholarly Books, Monographs, Reports and Case StudiesRGC 11 - Research book or monograph (Author)

    Check@CityULib