Dr. YUE Wei Thoo (余偉圖博士)

PhD - Management (MIS)
MS - Economics
BS - Aeronautical Engineering

Associate Head (IS)
Associate Professor

Dr. YUE Wei Thoo (余偉圖博士)

Contact Information

Address: 6-279, Lau Ming Wai Academic Building
City University of Hong Kong
Phone: +852 34429694
Fax: +852 34420370
E-mail:
Wei.T.Yue@cityu.edu.hk

Research Areas

  • Information Security, Software Piracy, Software Bundling, Data mining, Expert systems

Wei Thoo Yue is an Associate Professor of Management Information Systems in the Department of Information Systems at City University of Hong Kong. He received his Ph.D. in Management Information Systems from Purdue University. Prior to joining City University of Hong Kong, he was a faculty member at University of Texas, Dallas. His research interests focus on the economic and operational aspects of information security and information systems. His work has appeared in Management Science, Information Systems Research, Journal of Management Information Systems, Decision Support Systems, and other journals.

Publications

Journal Articles
  • Xiong Zhang, Alex Tsang, Wei T. Yue, Michael Chau (December 2015), "The Classification of Hackers by Knowledge Exchange Behaviors", Information Systems Frontiers, 17, 6, 1239-1251.
  • Kai Lung Hui, Wendy Hui and Wei T. Yue (Winter 2012), "Information Security Outsourcing with System Interdependency and Mandatory Security Requirement", Journal of Management Information Systems, 29, 3, 117-156.
  • Paulo Goes, Noyan Ilk, Wei T. Yue and J. Leon Zhao (December 2011), "Live-chat Agent Assignments to Heterogeneous E-customers Under Imperfect Classification", ACM Transactions on Management Information Systems.
  • Vijay Mookerjee, Radha Mookerjee, Alain Bensoussan and Wei T. Yue (September 2011), "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination ", Information Systems Research, 22, 3, 606-623.
  • Wei T. Yue and Metin Çakanyildirim (December 2010), "A Cost-Based Analysis of Intrusion Detection System Configuration under Active or Passive Response", Decision Support Systems, 50, 1, 21-31.
  • Metin Çakanyildirim, Wei T. Yue and Young U. Ryu, (May 2009), "The Management of Intrusion Detection: Configuration, Inspection and Investment", European Journal of Operational Research, 195, 1, 186-294.
  • Alain Bensoussan, Radha Mookerjee, Vijay Mookerjee and Wei T. Yue (2009), "Maintaining a Diagnostic Knowledge-based Systems: A Control Theoretic Approach", Management Science, 55, 2, 294-360.
  • Huseyin Cavusoglu, Srinivasan Raghunathan and Wei T. Yue (2008), "Decision Theoretic and Game Theoretic Approaches to IT Security Investment", Journal of Management Information Systems, 24, 1, 281-304.
  • Wei T. Yue and Metin Çakanyildirim (2007), "Intrusion Prevention in Information Systems: Reactive and Proactive Response,” Journal of Management Information Systems", Journal of Management Information Systems, 24, 1, 329-353.
  • Wei T. Yue, Metin Çakanyildirim, Young U. Ryu and Dengpan Liu (2007), "Network Externalities, Layered Protection and IT Security Risk Management,” Decision Support Systems, Vol 44, No 1", Decision Support Systems, 44, 1, 1-16.
  • Young U. Ryu and Wei. T. Yue (2005), "Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches", IEEE Transactions on Systems Man and Cybernetics Part A-Systems and Humans, 35, 5, 727-737.
  • Kemal Altinkemer, Wei T. Yue and Liang Yu (2003), "Adoption of Low Earth Orbit Satellite Systems: A Diffusion Model under Competition," Information Technology & Management", Information Technology & Management, 4, 1, 33-54.
  • Wei T. Yue and Alok Chaturvedi (2000), "Reward Based Online Shopping Communities", Electronic Markets, 10, 4, 224-228.
Books and Book Chapters
  • Michael J. Shaw, Dongsong Zhang, Wei T. Yue (Eds.) (2012), Lecture Notes in Business Information Processing, E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 10th Workshop on E-Business (WEB 2011), Springer, Shanghai, China,, 108.
  • Michael Chau, G Alan Wang, Wei T. Yue, Hsinchun Chen (Eds.) (2012), Lecture Notes in Computer Science, Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2012, Springer, Kuala Lumpuer, Malaysia, 7299.