Bong-Keun Jeong
Orcid: 0000-0001-7174-6625
According to our database1,
Bong-Keun Jeong
authored at least 22 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Leveraging Machine Learning to Analyze Semantic User Interactions in Visual Analytics.
Inf., June, 2024
2023
A Segmentation Study of Digital Pirates and Understanding the Effectiveness of Targeted Anti-Piracy Communication.
J. Theor. Appl. Electron. Commer. Res., 2023
2022
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables.
J. Netw. Comput. Appl., 2022
Lean IT With Value Stream Mapping Analysis: A Case Study in Software Development Life Cycle Process.
Inf. Resour. Manag. J., 2022
2021
Improving the Effectiveness of Anti-Piracy Educational Deterrence Efforts: The Role of Message Frame, Issue Involvement, Risk Perception, and Message Evidence on Perceived Message Effectiveness.
J. Theor. Appl. Electron. Commer. Res., 2021
Evaluating visualization approaches to detect abnormal activities in network traffic data.
Int. J. Inf. Sec., 2021
2020
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
2019
Int. J. Multim. Data Eng. Manag., 2019
2018
Int. J. Technol. Hum. Interact., 2018
Service Oriented Architecture (SOA) Implementation: Success Factors and Realized Benefits.
Int. J. Inf. Syst. Serv. Sect., 2018
2017
User acceptance of business intelligence application: motivation to learn, technology, social influence, and situational constraints.
Int. J. Bus. Inf. Syst., 2017
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
2016
J. Netw. Comput. Appl., 2016
2014
User Acceptance of Business Intelligence (BI) Application: Technology, Individual Difference, Social Influence, and Situational Constraints.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
The Role of Regulatory Focus and Message Framing on Persuasion of Anti-piracy Educational Campaigns.
Proceedings of the 20th Americas Conference on Information Systems, 2014
2013
Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach.
Comput. Hum. Behav., 2013
2012
Int. J. Electron. Commer., 2012
The impacts of piracy and supply chain contracts on digital music channel performance.
Decis. Support Syst., 2012
2010
Market reaction to application service provider (ASP) adoption: An empirical investigation.
Inf. Manag., 2010
2008
The Impact of Radio Frequency Identification (RFID) Investment Announcements on the Market Value of the Firm.
J. Theor. Appl. Electron. Commer. Res., 2008
Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm.
Data Knowl. Eng., 2008