An empirical investigation on consumer acceptance of mobile banking services BK Jeong, TE Yoon Business and management research 2 (1), 31-40, 2013 | 310 | 2013 |
A multi-level intrusion detection method for abnormal network behaviors SY Ji, BK Jeong, S Choi, DH Jeong Journal of Network and Computer Applications 62, 9-17, 2016 | 149 | 2016 |
Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm S Park, NC Suresh, BK Jeong Data & Knowledge Engineering 65 (3), 512-543, 2008 | 111 | 2008 |
User acceptance of business intelligence (BI) application: Technology, individual difference, social influence, and situational constraints TE Yoon, B Ghosh, BK Jeong 2014 47th Hawaii International Conference on System Sciences, 3758-3766, 2014 | 82 | 2014 |
Improving IT process management through value stream mapping approach: A case study BK Jeong, TE Yoon JISTEM-Journal of Information Systems and Technology Management 13, 389-404, 2016 | 58 | 2016 |
Market reaction to application service provider (ASP) adoption: An empirical investigation BK Jeong, AC Stylianou Information & Management 47 (3), 176-187, 2010 | 54 | 2010 |
The impact of radio frequency identification (RFID) investment announcements on the market value of the firm BK Jeong, Y Lu Journal of Theoretical and Applied Electronic Commerce Research 3 (1), 41-54, 2008 | 42 | 2008 |
The impacts of piracy and supply chain contracts on digital music channel performance BK Jeong, M Khouja, K Zhao Decision Support Systems 52 (3), 590-603, 2012 | 39 | 2012 |
Consumer piracy risk: Conceptualization and measurement in music sharing BK Jeong, K Zhao, M Khouja International Journal of Electronic Commerce 16 (3), 89-118, 2012 | 33 | 2012 |
User acceptance of business intelligence application: motivation to learn, technology, social influence, and situational constraints TE Yoon, BK Jeong, B Ghosh International Journal of Business Information Systems 26 (4), 432-450, 2017 | 29 | 2017 |
Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach BK Jeong, M Khouja Computers in Human Behavior 29 (6), 2744-2755, 2013 | 29 | 2013 |
Evaluating visualization approaches to detect abnormal activities in network traffic data SY Ji, BK Jeong, DH Jeong International Journal of Information Security 20 (3), 331-345, 2021 | 21 | 2021 |
Service oriented architecture (SOA) implementation: Success factors and realized benefits T Yoon, BK Jeong International Journal of Information Systems in the Service Sector (IJISSS …, 2018 | 16 | 2018 |
Improving the effectiveness of anti-piracy educational deterrence efforts: The role of message frame, issue involvement, risk perception, and message evidence on perceived … BK Jeong, T Yoon, SS Khan Journal of Theoretical and Applied Electronic Commerce Research 16 (3), 298-319, 2020 | 13 | 2020 |
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables SY Ji, BK Jeong, C Kamhoua, N Leslie, DH Jeong Journal of Network and Computer Applications 203, 103392, 2022 | 11 | 2022 |
Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions DH Jeong, BK Jeong, SY Ji 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 10 | 2017 |
Designing a supervised feature selection technique for mixed attribute data analysis DH Jeong, BK Jeong, N Leslie, C Kamhoua, SY Ji Machine Learning with Applications 10, 100431, 2022 | 7 | 2022 |
An empirical investigation on consumer acceptance of mobile banking services. Business and Management Research, 2 (1), 31-40 BK Jeong, TE Yoon | 7 | 2013 |
The role of regulatory focus and message framing on persuasion of anti-piracy educational campaigns B Jeong, T Yoon | 5 | 2014 |
Bong-Keun Jeong.(2014). User Acceptance of Business Intelligence (BI) Application: Technology, Individual Difference TE Yoon, B Ghosh Social Influence, and Situational Constraints. 2014 47th Hawaii …, 2014 | 4 | 2014 |