×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Research outside affiliated...
8
Authors
CHAU Patrick
3
JIA Weijia
2
WANG Tian
2
LUO Zongwei
1
Document Type
Journal article
5
Book
2
Conference paper
1
Date Issued
2021
1
2019
2
2017
2
2015
1
2014
1
2007
1
More...
Language
英语English
8
Indexed By
SCIE
2
SSCI
2
EI
1
中文核心期刊要目总览
1
Funding Organization
Keyword
Information security
3
Deviant behavior
2
big data
2
cloud computing
2
deep web
2
linked data
2
More...
Source Publication
Communications of the Assoc...
1
Decision Support Systems
1
Dianzi Keji Daxue Xuebao/Jo...
1
Information Sciences
1
Information Technology and ...
1
Lecture Notes of the Instit...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-8 of 8
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Issue Date Ascending
Issue Date Descending
A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems
Journal article
Information Sciences,2021, volume: 545, pages: 65-81
Authors:
Li, Ting
;
Liu, Anfeng
;
Xiong, Neal N.
;
Zhang, Shaobo
;
Wang, Tian
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Coverage
Distributed Networked Systems
Information quality
Security
Trustworthiness
Vehicle recruitment
The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior
Journal article
Information Technology and People,2019, volume: 32, issue: 4, pages: 973-992
Authors:
Chen, Hao
;
Chau, Patrick Y. K.
;
Li, Wenli
Favorite
  |  
View/Download:1/0
  |  
Submit date:2023/05/19
Information security behaviour
Information security policy violation
Moral disengagement
Organizational ethical climate
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid
Conference paper
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
Authors:
Bhuiyan, Md Zakirul Alam
;
Zaman, Mdaliuz
;
Wang, Guojun
;
Wang, Tian
;
Rahman, Md Arafat
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
Compromised information injection
Demand response
Internet of Things (IoT)
Privacy
Security attack
Smart grid
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II
Book
United States:Springer, 2017
Authors:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I
Book
United States:Springer, 2017
Authors:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Developing a typological theory using a quantitative approach: A case of information security deviant behavior
Journal article
Communications of the Association for Information Systems,2015, volume: 37, pages: 510-535
Authors:
Chu, Amanda M. Y.
;
Chau, Patrick Y. K.
;
So, Mike K. P.
Favorite
  |  
View/Download:2/0
  |  
Submit date:2023/05/19
Deviant behavior
Information security
Multidimensional scaling
Theory building
Typological theory
Development and validation of instruments of information security deviant behavior
Journal article
Decision Support Systems,2014, volume: 66, pages: 93-101
Authors:
Chu, Amanda M. Y.
;
Chau, Patrick Y. K.
Favorite
  |  
View/Download:3/0
  |  
Submit date:2023/05/19
Deviant behavior
Information security
Instrument development
Measurement
Reliability
Validity
Enhancement of a lightweight RFID security protocol
Journal article
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China,2007, volume: 36, issue: 6, pages: 1172-1178+1186
Authors:
Luo, Zongwei
;
Zhou, Shijie
;
Li, Jenny
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/11/25
Hash function
Information security
Mutual authentication protocol
Radio frequency identification