Follow
Bong Keun Jeong
Bong Keun Jeong
Verified email at coastal.edu
Title
Cited by
Cited by
Year
An empirical investigation on consumer acceptance of mobile banking services
BK Jeong, TE Yoon
Business and management research 2 (1), 31-40, 2013
3102013
A multi-level intrusion detection method for abnormal network behaviors
SY Ji, BK Jeong, S Choi, DH Jeong
Journal of Network and Computer Applications 62, 9-17, 2016
1492016
Sequence-based clustering for Web usage mining: A new experimental framework and ANN-enhanced K-means algorithm
S Park, NC Suresh, BK Jeong
Data & Knowledge Engineering 65 (3), 512-543, 2008
1112008
User acceptance of business intelligence (BI) application: Technology, individual difference, social influence, and situational constraints
TE Yoon, B Ghosh, BK Jeong
2014 47th Hawaii International Conference on System Sciences, 3758-3766, 2014
822014
Improving IT process management through value stream mapping approach: A case study
BK Jeong, TE Yoon
JISTEM-Journal of Information Systems and Technology Management 13, 389-404, 2016
582016
Market reaction to application service provider (ASP) adoption: An empirical investigation
BK Jeong, AC Stylianou
Information & Management 47 (3), 176-187, 2010
542010
The impact of radio frequency identification (RFID) investment announcements on the market value of the firm
BK Jeong, Y Lu
Journal of Theoretical and Applied Electronic Commerce Research 3 (1), 41-54, 2008
422008
The impacts of piracy and supply chain contracts on digital music channel performance
BK Jeong, M Khouja, K Zhao
Decision Support Systems 52 (3), 590-603, 2012
392012
Consumer piracy risk: Conceptualization and measurement in music sharing
BK Jeong, K Zhao, M Khouja
International Journal of Electronic Commerce 16 (3), 89-118, 2012
332012
User acceptance of business intelligence application: motivation to learn, technology, social influence, and situational constraints
TE Yoon, BK Jeong, B Ghosh
International Journal of Business Information Systems 26 (4), 432-450, 2017
292017
Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach
BK Jeong, M Khouja
Computers in Human Behavior 29 (6), 2744-2755, 2013
292013
Evaluating visualization approaches to detect abnormal activities in network traffic data
SY Ji, BK Jeong, DH Jeong
International Journal of Information Security 20 (3), 331-345, 2021
212021
Service oriented architecture (SOA) implementation: Success factors and realized benefits
T Yoon, BK Jeong
International Journal of Information Systems in the Service Sector (IJISSS …, 2018
162018
Improving the effectiveness of anti-piracy educational deterrence efforts: The role of message frame, issue involvement, risk perception, and message evidence on perceived …
BK Jeong, T Yoon, SS Khan
Journal of Theoretical and Applied Electronic Commerce Research 16 (3), 298-319, 2020
132020
Forecasting network events to estimate attack risk: Integration of wavelet transform and vector auto regression with exogenous variables
SY Ji, BK Jeong, C Kamhoua, N Leslie, DH Jeong
Journal of Network and Computer Applications 203, 103392, 2022
112022
Designing a hybrid approach with computational analysis and visual analytics to detect network intrusions
DH Jeong, BK Jeong, SY Ji
2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017
102017
Designing a supervised feature selection technique for mixed attribute data analysis
DH Jeong, BK Jeong, N Leslie, C Kamhoua, SY Ji
Machine Learning with Applications 10, 100431, 2022
72022
An empirical investigation on consumer acceptance of mobile banking services. Business and Management Research, 2 (1), 31-40
BK Jeong, TE Yoon
72013
The role of regulatory focus and message framing on persuasion of anti-piracy educational campaigns
B Jeong, T Yoon
52014
Bong-Keun Jeong.(2014). User Acceptance of Business Intelligence (BI) Application: Technology, Individual Difference
TE Yoon, B Ghosh
Social Influence, and Situational Constraints. 2014 47th Hawaii …, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20