×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [4]
Faculty of Busin... [3]
INSTITUTE OF MIC... [1]
Authors
WANG QIAN [2]
PUN CHI MAN [1]
VAI MANG I [1]
ZHOU JIANTAO [1]
PUN SIO HANG [1]
LEI ADRIAN CHEUK... [1]
More...
Document Type
Journal article [5]
Conference paper [2]
Date Issued
2024 [1]
2023 [1]
2022 [1]
2021 [2]
2015 [1]
2012 [1]
More...
Language
英語English [7]
Source Publication
2014 IEEE Visual... [1]
Financial Market... [1]
IEEE Transaction... [1]
JOURNAL OF STRAT... [1]
Journal of Opera... [1]
Proceedings - 20... [1]
More...
Indexed By
SCIE [4]
SSCI [2]
CPCI-S [1]
其他OTHER [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Vendor selection in the wake of data breaches: A longitudinal study
Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:
Wang, Qian
;
Jiang, Shenyang
;
Ngai, Eric W.T.
;
Huo, Baofeng
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
IF:
6.5
/
9.2
|
Submit date:2024/05/16
Attention-based View
Data Breach
Electronic Medical Record Systems
Information Security
Information Technology Outsourcing
Vendor Selection
Security Analysts’ Site Visits and Stock Price Synchronicity
Journal article
Jiang,Yu, Lei Adrian CH. Security Analysts’ Site Visits and Stock Price Synchronicity[J]. Financial Markets, Institutions and Instruments, 2023, 32(4), 195 - 219.
Authors:
Jiang,Yu
;
Lei Adrian CH
Favorite
|
TC[Scopus]:
0
|
Submit date:2023/08/28
Corporate Governance
Hsr Introduction
Information Disclosure Quality
Security Analysts’ Site Visits
Stock Price Synchronicity
Firm diversity and data breach risk: A longitudinal study
Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:
Wang, Qian
;
Ngai, Eric W.T.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
8.7
/
18.9
|
Submit date:2023/01/30
Data Breach Risk
Diversity Type
Firm Diversity
Information Security
Managerial Ability
Resource-based View
Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation
Journal article
Guan-Nan Dongt, Chi-Man Pun, Zheng Zhang. Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation[J]. IEEE Transactions on Information Forensics and Security, 2021, 16, 4197-4210.
Authors:
Guan-Nan Dongt
;
Chi-Man Pun
;
Zheng Zhang
Favorite
|
TC[WOS]:
5
TC[Scopus]:
4
IF:
6.3
/
7.3
|
Submit date:2022/05/13
Information Security
Kinship Verification
Self-supervised Learning
Content-adaptive image encryption with partial unwinding decomposition
Journal article
Wu, Yongfei, Zhang, Liming, Qian, Tao, Liu, Xilin, Xie, Qiwei. Content-adaptive image encryption with partial unwinding decomposition[J]. Signal Processing, 2021, 181, 107911.
Authors:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
Favorite
|
TC[WOS]:
21
TC[Scopus]:
21
IF:
3.4
/
3.8
|
Submit date:2021/12/07
Image Encryption
Image-content-adaptive Encryption
Information Security
Partial Unwinding Decomposition
Information security display via uncrowded window
Conference paper
Zhongpai Gao, Guangtao Zhai, Jiantao Zhou, Xiongkuo Min, Chunjia Hu. Information security display via uncrowded window[C], 2015, 454-457.
Authors:
Zhongpai Gao
;
Guangtao Zhai
;
Jiantao Zhou
;
Xiongkuo Min
;
Chunjia Hu
Adobe PDF
|
Favorite
|
TC[WOS]:
2
TC[Scopus]:
1
|
Submit date:2018/12/22
Display Technology
Eye Tracking
Information Security
Uncrowded Window
The network security regime for the hybrid connection of healthcare entities
Conference paper
Ip C.H., Pun S.H., Vai M.I., Mak P.U.. The network security regime for the hybrid connection of healthcare entities[C], 2012, 1832-1834.
Authors:
Ip C.H.
;
Pun S.H.
;
Vai M.I.
;
Mak P.U.
Favorite
|
TC[Scopus]:
1
|
Submit date:2019/02/14
Healthcare Information Systems
Hospital Network
Nat
Network Policy
Security