Yong Wu

ORCID: 0000-0002-9831-8089
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybercrime and Law Enforcement Studies
  • Information and Cyber Security
  • Outsourcing and Supply Chain Management
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Magnesium Alloys: Properties and Applications
  • Aluminum Alloys Composites Properties
  • Innovation and Knowledge Management
  • Flood Risk Assessment and Management
  • Energy, Environment, Economic Growth
  • Music and Audio Processing
  • Corporate Social Responsibility Reporting
  • Gender Diversity and Inequality
  • Corporate Finance and Governance
  • Environmental Sustainability in Business
  • Blockchain Technology Applications and Security
  • Private Equity and Venture Capital
  • Multi-Criteria Decision Making
  • Web visibility and informetrics
  • Catalytic Alkyne Reactions
  • Legal principles and applications
  • Regional Economic and Spatial Analysis
  • Underwater Acoustics Research
  • Precipitation Measurement and Analysis
  • Force Microscopy Techniques and Applications

Fujian Normal University
2008-2024

Donghua University
2020-2024

Hefei University of Technology
2008-2024

Xi'an Jiaotong University
2008-2022

Northwest University
2022

City University of Hong Kong
2015-2017

Tianjin University
2001-2012

Information resources have been shared to promote the business operations of firms. However, connection information sharing interfaces between firms has increased attack surface and created opportunities for hacker. We examine benefits risks who exert security efforts against a strategic hacker that launches attacks subjectively. show two kinds efforts, investment knowledge sharing, act as substitutes when business-sharing degree is low complements otherwise. Besides, not always aggressive,...

10.1287/deca.2021.0442 article EN Decision Analysis 2022-03-23

To efficiently manage information security, firms typically outsource part of their security functions to a managed service provider (MSSP) under variety contractual arrangements. Based on this practice, we study business setting in which the management outsourcing depends efforts both MSSP and its clients, taking into account that allocation can change during contract horizon. Since are private each other, double moral hazard (DMH) problem arise with use bilateral refund contracts, have...

10.17705/1jais.00681 article EN Journal of the Association for Information Systems 2021-01-01

Purpose The purpose of this paper is to describe the building a theoretical model explore how team pay disparity and resource slack moderate effects top management (TMT) diversity on strategic change if moderating differ in firms with low or high level disparity. Design/methodology/approach Nine hypotheses are proposed tested sample from 391 listed Chinese firms. Archival data collected annual reports form sample. hypothesized relationships through regression analysis. Findings findings show...

10.1108/09534811111132686 article EN Journal of Organizational Change Management 2011-05-24

Based on the DBSCAN analysis, kernel density analysis and word cloud this paper analyzed composition types spatio-temporal evolution characteristics of catering points clusters form macro, meso micro dimensions within 5th ring road in Beijing with caterings POI data 2012, 2014 2016. The conclusions are as follows: first: (1) number total increased by about 6 times, center whole shows a tendency to move from west southeast. There is little change quantity clusters. distribution relatively...

10.1016/j.procs.2018.04.343 article EN Procedia Computer Science 2018-01-01

Nowadays, firms tend to outsource security operations professional managed service providers (MSSPs) as a result of the sophistication strategic hackers. Thus, how an MSSP makes decisions according hacker’s action is worth researching. Constructing contract theory model, this paper examines interaction between and hacker based on both parties’ characteristics. We find that will give up less valuable information assets, thus not all assets are protecting for MSSP. For parties, their optimal...

10.1287/deca.2019.0406 article EN Decision Analysis 2020-03-18

The calibration of the performance an SFM (scanning force microscope) cantilever has gained more and interest in past years, particularly due to increasing applications SFMs for determination mechanical properties materials, such as biological structures organic molecules. In this paper, a MEMS-based nano-force actuator with resolution up nN (10−9 N) is presented quantitatively determine stiffness cantilever. principle, structure design realization are detailed. Preliminary experiments...

10.1088/0957-0233/21/1/015103 article EN Measurement Science and Technology 2009-11-16

Abstract DMAP‐catalyzed [3+3] annulation of cyclopropenones with α‐bromoketones is described, which provides a simple and convenient synthesis 2‐pyrones in good yields broad scope. The reaction features advantages transition metal‐free conditions, readily available starting materials, excellent regioselectivity. Experimental investigation DFT calculations suggest mechanism encompassing pyridium ylide‐initiated ring opening cyclopropenones, elimination DMAP catalyst, final 6π‐electrocyclization.

10.1002/ejoc.202200243 article EN European Journal of Organic Chemistry 2022-03-25

In queueing systems where queues are invisible, it is critical for companies to make decisions about the timing of announcing anticipated delay customers. this paper, a simulation model built simulate an invisible system, and several scenarios considered, including different system congestion company goals, explore impact announcement timings. modeling customer behavior, we argue that difficult announce perfectly accurate rarely have customers fully trust announcement, so quantal-response...

10.1177/00375497241236968 article EN SIMULATION 2024-03-22

This study distinguishes enterprises into high- and low-type categories based on enterprise value cost efficiency, examining their strategic behaviors in three investment timing games: move simultaneously, the high-type moves first, first. By comparing games, we find that both types of would always exert more effort sequential game than simultaneous game, later-move advantage makes prefer to become follower game. We also enhanced efficiency or gap possessed by widen between two enterprises,...

10.1287/deca.2024.0190 article EN Decision Analysis 2024-11-26

Rainfall data have a profound significance for meteorology, climatology, hydrology, and environmental sciences. However, existing rainfall observation methods (including ground-based rain gauges radar-/satellite-based remote sensing) are not efficient in terms of spatiotemporal resolution cannot meet the needs high-resolution application scenarios (urban waterlogging, emergency rescue, etc.). Widespread surveillance cameras been regarded as alternative studies. Surveillance audio, through...

10.3390/rs14225750 article EN cc-by Remote Sensing 2022-11-14

Purpose Since the implementation of regulatory inquiry system, research on its impact information disclosure in capital market has been increasing. This article focuses a specific area study using Chinese annual report letters as basis. From text mining perspective, we explore whether textual contained these can help predict financial restatement behavior inquired companies. Design/methodology/approach Python was used to process data, nonparametric tests were conducted for hypothesis testing...

10.1108/k-12-2023-2605 article EN Kybernetes 2024-04-26
Coming Soon ...