Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Heedong Yang"'
Publikováno v:
Applied Sciences, Vol 10, Iss 7, p 2555 (2020)
About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnerabilities ca
Externí odkaz:
https://doaj.org/article/761e00049fd94f578b63a8c49d45b097
Autor:
Heedong Yang
Publikováno v:
APEC Studies Association of Korea. 12:37-51
Publikováno v:
ICEA
With the advent of the 4th industrial era, ICT technologies such as artificial intelligence and autonomous driving are rapidly developing. However, unlike these positive aspects, malicious hackers target IoT devices around us using malwares such as v
Publikováno v:
Information Systems Review. 19:157-169
ERP 프로젝트는 비용과 시간이 많이 들고 재무적인 위험 및 정보기술과 관련된 위험이 상대적으로 높다고 할 수 있다. 정보기술 관리자들이 ERP 투자를 고려할 때 실물옵션 사고를 하게 된다
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030222628
IMIS
IMIS
The security attack on the computer was mainly caused by software attack using the vulnerability of the operating system or application and physical attacks such as power measurement, electromagnetic measurement and encryption key extraction by noise
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4d0b924921e1cec4289a3cce715b8538
https://doi.org/10.1007/978-3-030-22263-5_80
https://doi.org/10.1007/978-3-030-22263-5_80
Publikováno v:
Applied Sciences
Volume 10
Issue 7
Applied Sciences, Vol 10, Iss 2555, p 2555 (2020)
Volume 10
Issue 7
Applied Sciences, Vol 10, Iss 2555, p 2555 (2020)
About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnerabilities ca
Publikováno v:
The Journal of Information Systems. 22:43-58
This work investigates factors that may affect the choice of real options by ERP project managers. Financial theory suggest that these factors include risk-free interest rate, time to maturity, volatility of net present value, and options exercise pr
Publikováno v:
The Journal of Strategic Information Systems. 14:323-353
We explore the evolution of the mobile infrastructure in South Korea through the lens of actor network theory. In particular, we analyze the roles of standards in promoting, enabling and constraining innovation in broadband mobile services over a 10-
Autor:
Youngjin Yoo, Heedong Yang
Publikováno v:
Decision Support Systems. 38:19-31
We expanded Davis et al.'s technology acceptance model (TAM) by considering both the affective and the cognitive dimensions of attitude and the hypothesized internal hierarchy among beliefs, cognitive attitude, affective attitude and information syst