default search action
Young U. Ryu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Chenglong Zhang, Varghese S. Jacob, Young U. Ryu:
Modeling Individual Fairness Beliefs and Its Applications. ACM Trans. Manag. Inf. Syst. 15(3): 14:1-14:26 (2024)
2010 – 2019
- 2019
- [j33]Soojung Oh, Young U. Ryu, Hongsuk Yang:
Interaction effects between supply chain capabilities and information technology on firm performance. Inf. Technol. Manag. 20(2): 91-106 (2019) - 2018
- [j32]Kee-Young Kwahk, Hyunchul Ahn, Young U. Ryu:
Understanding mandatory IS use behavior: How outcome expectations affect conative IS use. Int. J. Inf. Manag. 38(1): 64-76 (2018) - [c16]Dan J. Kim, Brandon Phillps, Young U. Ryu:
Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective. NCS 2018: 58-63 - 2016
- [j31]Il Young Choi, Myung Geun Oh, Jae Kyeong Kim, Young U. Ryu:
Collaborative filtering with facial expressions for online video recommendation. Int. J. Inf. Manag. 36(3): 397-402 (2016) - [c15]Young U. Ryu:
Firm Failure Timeline Prediction: Math Programming Approaches. HICSS 2016: 1181-1187 - [c14]Soojung Oh, Young U. Ryu, Hongsuk Yang:
Supply Chain Capabilities and Information Technology Characteristics: Interaction Effects on Firm Performance. HICSS 2016: 1417-1425 - 2015
- [j30]Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
Can Payment-per-Click Induce Improvements in Click Fraud Identification Technologies? Inf. Syst. Res. 26(4): 754-772 (2015) - [c13]Il Young Choi, Jae Kyeong Kim, Young U. Ryu:
A Two-Tiered Recommender System for Tourism Product Recommendations. HICSS 2015: 3354-3363 - 2013
- [j29]Hyun Sil Moon, Jae Kyeong Kim, Young U. Ryu:
A sequence-based filtering method for exhibition booth visit recommendations. Int. J. Inf. Manag. 33(4): 620-626 (2013) - [j28]Young U. Ryu, Jae Kyeong Kim:
Introduction to the special issue information technology in Korea: its role in firm success and economic development. Inf. Technol. Manag. 14(1): 1 (2013) - [j27]Young U. Ryu, Jae Kyeong Kim, Il Young Choi:
The role of IT in Korea's economic development. Inf. Technol. Manag. 14(1): 3-6 (2013) - [j26]Min Chen, Young U. Ryu:
Facilitating Effective User Navigation through Website Structure Improvement. IEEE Trans. Knowl. Data Eng. 25(3): 571-588 (2013) - [c12]Young U. Ryu, Jae Kyeong Kim, Hyea Kyeong Kim:
A Local Scoring Model for Diversified Recommendation. ICIS 2013 - 2012
- [j25]Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim:
Unrealistic optimism on information security management. Comput. Secur. 31(2): 221-232 (2012) - [j24]Hyea Kyeong Kim, Young U. Ryu, Yoon Ho Cho, Jae Kyeong Kim:
Customer-Driven Content Recommendation Over a Network of Customers. IEEE Trans. Syst. Man Cybern. Part A 42(1): 48-56 (2012) - [c11]Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
The Effect of Third Party Investigation on Pay-Per-Click Advertising. ICIS 2012 - [c10]Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising. WEIS 2012 - 2011
- [c9]Young U. Ryu, Jae Kyeong Kim, Kwang Hyuk Im, Hankuk Hong:
Neural Network Analysis of Right-Censored Observations for Occurrence Time Prediction. WEB 2011: 100-109 - 2010
- [j23]Jae Kyeong Kim, Hyea Kyeong Kim, Hee Young Oh, Young U. Ryu:
A group recommendation system for online communities. Int. J. Inf. Manag. 30(3): 212-219 (2010)
2000 – 2009
- 2009
- [j22]Hyeun-Suk Rhee, Cheong-Tag Kim, Young U. Ryu:
Self-efficacy in information security: Its influence on end users' information security practice behavior. Comput. Secur. 28(8): 816-826 (2009) - [j21]Metin Çakanyildirim, Wei T. Yue, Young U. Ryu:
The management of intrusion detection: Configuration, inspection, and investment. Eur. J. Oper. Res. 195(1): 186-204 (2009) - [j20]Hyea Kyeong Kim, Jae Kyeong Kim, Young U. Ryu:
Personalized Recommendation over a Customer Network for Ubiquitous Shopping. IEEE Trans. Serv. Comput. 2(2): 140-151 (2009) - 2008
- [j19]Young U. Ryu, Hyeun-Suk Rhee:
Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches. INFORMS J. Comput. 20(3): 356-367 (2008) - [j18]Young U. Ryu, Hyeun-Suk Rhee:
Evaluation of Intrusion Detection Systems Under a Resource Constraint. ACM Trans. Inf. Syst. Secur. 11(4): 20:1-20:24 (2008) - 2007
- [j17]Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:
Network externalities, layered protection and IT security risk management. Decis. Support Syst. 44(1): 1-16 (2007) - [j16]Young U. Ryu, R. Chandrasekaran, Varghese S. Jacob:
Breast cancer prediction using the isotonic separation technique. Eur. J. Oper. Res. 181(2): 842-854 (2007) - [j15]Varghese S. Jacob, Ramayya Krishnan, Young U. Ryu:
Internet content filtering using isotonic separation on content category ratings. ACM Trans. Internet Techn. 7(1): 1 (2007) - 2005
- [j14]Injun Choi, Hyunbae Jeong, Minseok Song, Young U. Ryu:
IPM-EPDL: an XML-based executable process definition language. Comput. Ind. 56(1): 85-104 (2005) - [j13]Ramaswamy Chandrasekaran, Young U. Ryu, Varghese S. Jacob, Sungchul Hong:
Isotonic Separation. INFORMS J. Comput. 17(4): 462-474 (2005) - [j12]Young U. Ryu, Wei T. Yue:
Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches. IEEE Trans. Syst. Man Cybern. Part A 35(5): 727-737 (2005) - [c8]Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim:
I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security. ICIS 2005 - 2004
- [j11]Young U. Ryu, R. Chandrasekaran, Varghese S. Jacob:
Prognosis Using an Isotonic Prediction Technique. Manag. Sci. 50(6): 777-785 (2004) - [c7]Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:
IT Security Risk Management under Network Effects and Layered Protection Strategy. ISI 2004: 331-348 - 2002
- [j10]Jeho Lee, Young U. Ryu:
Exploration, exploitation and adaptive rationality: the neo-Schumpeterian perspective. Simul. Model. Pract. Theory 10(5-7): 297-320 (2002)
1990 – 1999
- 1999
- [j9]Young U. Ryu:
A hierarchical constraint satisfaction approach to product selection for electronic shopping support. IEEE Trans. Syst. Man Cybern. Part A 29(6): 525-532 (1999) - [c6]Varghese S. Jacob, Ramayya Krishnan, Young U. Ryu, Ramaswamy Chandrasekaran, Sungchul Hong:
Filtering objectionable internet content. ICIS 1999: 274-278 - 1998
- [j8]Young U. Ryu:
Specification of Contractual Obligations in Formal Business Communication. Data Knowl. Eng. 26(3): 309-326 (1998) - [j7]Young U. Ryu:
Constraint logic programming framework for integrated decision supports. Decis. Support Syst. 22(2): 155-170 (1998) - [j6]Young U. Ryu:
A logic-based modeling of resource consumption and production. Decis. Support Syst. 22(3): 243-257 (1998) - [c5]Young U. Ryu:
Approximate Constraint Satisfaction Over a Constraint Hierarchy: A Preliminary Study. HICSS (5) 1998: 134-141 - [c4]Young U. Ryu:
Dynamic Construction of Product Taxonomy Hierarchies for Assisted Shopping in the Electronic Marketplace. HICSS (5) 1998: 196-204 - [c3]Young U. Ryu, Sungchul Hong:
Negotiation Supports in a Commodity Trading Market. HICSS (5) 1998: 233- - 1997
- [j5]Young U. Ryu:
Hierarchical constraint satisfaction of multilateral trade matching in commodity auction markets. Ann. Oper. Res. 71: 317-334 (1997) - [j4]Young U. Ryu:
Logic-based representation and reasoning about knowledge of constrained resources. Knowl. Based Syst. 10(2): 71-80 (1997) - [c2]Young U. Ryu:
Relativized Deontic Modalities for Contractual Obligations in Formal Business Communication. HICSS (4) 1997: 485-493 - 1996
- [c1]Young U. Ryu:
Logical Specification of Resource Consumption and Production. HICSS (2) 1996: 39-46 - 1995
- [j3]Young U. Ryu:
Conditional Deontic Logic Augmented with Defeasible Reasoning. Data Knowl. Eng. 16(1): 73-91 (1995) - [j2]Young U. Ryu, Ronald M. Lee:
Defeasible deontic reasoning and its applications to normative systems. Decis. Support Syst. 14(1): 59-73 (1995) - [j1]Ronald M. Lee, Young U. Ryu:
DX: A Deontic Expert System. J. Manag. Inf. Syst. 12(1): 145-169 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint