- Digital Platforms and Economics
- Semantic Web and Ontologies
- Technology Adoption and User Behaviour
- Multi-Agent Systems and Negotiation
- Business Process Modeling and Analysis
- Consumer Market Behavior and Pricing
- Big Data and Business Intelligence
- Constraint Satisfaction and Optimization
- AI-based Problem Solving and Planning
- Scheduling and Optimization Algorithms
- E-commerce and Technology Innovations
- Optimization and Packing Problems
- Advanced Database Systems and Queries
- Digital Marketing and Social Media
- Outsourcing and Supply Chain Management
- Advanced Manufacturing and Logistics Optimization
- Sharing Economy and Platforms
- Quality and Supply Management
- Cybercrime and Law Enforcement Studies
- Manufacturing Process and Optimization
- Auction Theory and Applications
- Mobile Agent-Based Network Management
- ICT Impact and Policies
- Service-Oriented Architecture and Web Services
- Impact of Technology on Adolescents
Xi'an Jiaotong University
2018-2025
Korea Advanced Institute of Science and Technology
2003-2023
Korea Institute for Advanced Study
2021
Yonsei University
2017-2020
Hyundai Motors (South Korea)
2017-2019
Chungbuk National University
2018
Carnegie Mellon University
2018
Jeonbuk National University
2011
Singapore Management University
2005-2006
Kootenay Association for Science & Technology
2004
Current search methods for mobile-Web content can be frustrating to use. To shorten searches cell phone wallpaper images, VISCORS combines collaborative filtering with content-based image retrieval. An increasing selection of is becoming available in the environment, where users navigate Web using wireless devices such as phones and PDAs. The fast growth excellent prospects market have attracted many providers.
Abstract The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources cybercrime threats is becoming an increasingly necessary complement current self-defensive systems. One concern associated with adopting such measures risk privacy infringement. Therefore, it design future Internet infrastructure so can appropriately balance protections. This research proposes using Bright Internet, namely protocol and identifiable anonymity , ten rights derived from Europe’s...
Abstract Cybersecurity incidents damage not only the organizations attacked, but also society in general, harming customers and stakeholders. Through text mining of incident database, we observed that impact cybersecurity trends became more outward-oriented causing increased risks associated with social responsibility. Thus, this study aims to validate potential effect on responsibility stock price drops. To derive meaningful factors from description incidents, mined texts extract features...
Since the advent of AIS Grand Vision Project ICT-enabled Bright Society (in short, ICT), there has been significant excitement as well confusion about concept. To resolve ambiguities types research that are consistent with this vision, notions Restorative ICT Research and Enriching defined. In addition, we propose three perspectives can differentiate from traditional approaches to create a disruptive impact on society. address societal problems often global in scope, recommends taking...
Axiomatic Theories and Improving the Relevance of Information Systems Research This paper examines fact that a significant number empirical information systems (IS) studies engage in confirmative testing self-evident axiomatic theories without yielding highly relevant knowledge for IS community. The authors conduct both horizontal analysis 72 representative an in-depth vertical 3 well-known (i.e., technology acceptance model, diffusion innovation theory, institutional theory) order to...
Bright Internet research was launched as a core project of the AIS ICT Initiative, which aims to build an ICT-enabled Society. To facilitate on Internet, we explicitly define goals and principles review evolution its principles. The three are: realization preventive security, provision freedom anonymous expression for innocent netizens, protection from risk privacy infringement that may be caused by security schemes. We respecify design fulfill these seemingly conflicting goals: origin...
Android has been researched in various mobile device fields such as Smartphone and Tablet PC. In here, we should remember that devices have limited storage constrained battery life. Therefore, when developers develop applications, they do efficient programming. this paper, proposed programming guidelines for an effective way to improve performance applications. We programmed applications using Java Native C, compared the between two languages. The are composed of five categories JNI delay,...
Under what conditions is the Internet more likely to be used maliciously for criminal activity? This study examines under which associated with cybercriminal offenses. Using comprehensive state-level data in United States during 2004–2010, our findings show that there no clear empirical evidence penetration rate related number of crime perpetrators; however, activities are contingent upon socioeconomic factors and connection speed. Specifically, a higher income, education, lower poverty...