UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Vendor selection in the wake of data breaches: A longitudinal study Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:  Wang, Qian;  Jiang, Shenyang;  Ngai, Eric W.T.;  Huo, Baofeng
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:6.5/9.2 | Submit date:2024/05/16
Attention-based View  Data Breach  Electronic Medical Record Systems  Information Security  Information Technology Outsourcing  Vendor Selection  
Security Analysts’ Site Visits and Stock Price Synchronicity Journal article
Jiang,Yu, Lei Adrian CH. Security Analysts’ Site Visits and Stock Price Synchronicity[J]. Financial Markets, Institutions and Instruments, 2023, 32(4), 195 - 219.
Authors:  Jiang,Yu;  Lei Adrian CH
Favorite | TC[Scopus]:0 | Submit date:2023/08/28
Corporate Governance  Hsr Introduction  Information Disclosure Quality  Security Analysts’ Site Visits  Stock Price Synchronicity  
Firm diversity and data breach risk: A longitudinal study Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:  Wang, Qian;  Ngai, Eric W.T.
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:8.7/18.9 | Submit date:2023/01/30
Data Breach Risk  Diversity Type  Firm Diversity  Information Security  Managerial Ability  Resource-based View  
Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation Journal article
Guan-Nan Dongt, Chi-Man Pun, Zheng Zhang. Deep Collaborative Multi-Modal Learning for Unsupervised Kinship Estimation[J]. IEEE Transactions on Information Forensics and Security, 2021, 16, 4197-4210.
Authors:  Guan-Nan Dongt;  Chi-Man Pun;  Zheng Zhang
Favorite | TC[WOS]:5 TC[Scopus]:4  IF:6.3/7.3 | Submit date:2022/05/13
Information Security  Kinship Verification  Self-supervised Learning  
Content-adaptive image encryption with partial unwinding decomposition Journal article
Wu, Yongfei, Zhang, Liming, Qian, Tao, Liu, Xilin, Xie, Qiwei. Content-adaptive image encryption with partial unwinding decomposition[J]. Signal Processing, 2021, 181, 107911.
Authors:  Wu, Yongfei;  Zhang, Liming;  Qian, Tao;  Liu, Xilin;  Xie, Qiwei
Favorite | TC[WOS]:21 TC[Scopus]:21  IF:3.4/3.8 | Submit date:2021/12/07
Image Encryption  Image-content-adaptive Encryption  Information Security  Partial Unwinding Decomposition  
Information security display via uncrowded window Conference paper
Zhongpai Gao, Guangtao Zhai, Jiantao Zhou, Xiongkuo Min, Chunjia Hu. Information security display via uncrowded window[C], 2015, 454-457.
Authors:  Zhongpai Gao;  Guangtao Zhai;  Jiantao Zhou;  Xiongkuo Min;  Chunjia Hu
Adobe PDF | Favorite | TC[WOS]:2 TC[Scopus]:1 | Submit date:2018/12/22
Display Technology  Eye Tracking  Information Security  Uncrowded Window  
The network security regime for the hybrid connection of healthcare entities Conference paper
Ip C.H., Pun S.H., Vai M.I., Mak P.U.. The network security regime for the hybrid connection of healthcare entities[C], 2012, 1832-1834.
Authors:  Ip C.H.;  Pun S.H.;  Vai M.I.;  Mak P.U.
Favorite | TC[Scopus]:1 | Submit date:2019/02/14
Healthcare Information Systems  Hospital Network  Nat  Network Policy  Security