Graduate School of Information

Research Output

2020

A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated internet of things

Shin, S. & Kwon, T., 2020 Jan 1, In : IEEE Access. 8, p. 67555-67571 17 p., 9057455.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Design of sweepstakes-based social media marketing for online customer engagement

Jung, W. J., Yang, S. & Kim, H. W., 2020 Mar 1, In : Electronic Commerce Research. 20, 1, p. 119-146 28 p.

Research output: Contribution to journalArticle

IT maturity model for public agencies in developing countries: The case of Mongolia

Kwak, N., Lee, C. C., Hwang, S. H. & Yun, H., 2020 Jun 1, In : Information Development. 36, 2, p. 224-239 16 p.

Research output: Contribution to journalArticle

2019
Open Access
8 Citations (Scopus)

A practical measurement method of the occupied bandwidth for 8-VSB DTV signal using modified ACPR

Kim, Y. S., Lee, B. G. & Song, K., 2019 Jul, In : KSII Transactions on Internet and Information Systems. 13, 7, p. 3550-3565 16 p.

Research output: Contribution to journalArticle

Are information and communication technologies (ICTs) displacing workers? The relationship between ICT investment and employment

Jung, W. J., Lee, S. Y. T. & Kim, H. W., 2019 Jan 1, (Accepted/In press) In : Information Development.

Research output: Contribution to journalArticle

Customer perceptions of Korean digital and traditional banks

Shin, J. W., Cho, J. Y. & Lee, B. G., 2019 Sep 2, In : International Journal of Bank Marketing. 38, 2, p. 529-547 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Decisional factors leading to the reuse of an on-demand ride service

Lee, S. H., Lee, B. Y. & Kim, H. W., 2019 Jun, In : Information and Management. 56, 4, p. 493-506 14 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Detection of malicious packet dropping attacks in RPL-based internet of things

Shin, S., Kim, K. & Kwon, T., 2019 Jan 1, In : International Journal of Ad Hoc and Ubiquitous Computing. 31, 2, p. 133-141 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Ku, Y., Park, L. H., Shin, S. & Kwon, T., 2019 Jan 1, In : IEEE Access. 7, p. 69363-69378 16 p., 8721054.

Research output: Contribution to journalArticle

2 Citations (Scopus)
8 Citations (Scopus)

Forecasting stock prices with a feature fusion LSTM-CNN model using different representations of the same data

Kim, T. & Kim, H. Y., 2019 Feb, In : PloS one. 14, 2, e0212320.

Research output: Contribution to journalArticle

Open Access
24 Citations (Scopus)

Impact of IT in the public sector workplace

Lee, J., Andersen, K. N. & Henriksen, H. Z., 2019 Jun 18, Proceedings of the 20th Annual International Conference on Digital Government Research: Governance in the Age of Artificial Intelligence, dg.o 2019. Chen, Y-C., Salem, F. & Zuiderwijk, A. (eds.). Association for Computing Machinery, p. 370-377 8 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Intriguer: Field-level constraint solving for hybrid fuzzing

Cho, M., Kim, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 515-530 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Investigating signals on equity crowdfunding: Human capital, earlier investors, and social capital

An, J. & Kim, H. W., 2019 Jun 1, In : Asia Pacific Journal of Information Systems. 29, 2, p. 283-307 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Modified cyber kill chain model for multimedia service environments

Kim, H., Kwon, H. J. & Kim, K. K., 2019 Feb 1, In : Multimedia Tools and Applications. 78, 3, p. 3153-3170 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Policy compliance and deterrence mechanism in the sharing economy: Accommodation sharing in Korea

Park, S. K., Kwak, K. T. & Lee, B. G., 2019 Oct 7, In : Internet Research. 29, 5, p. 1124-1148 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Poster: Evaluating code coverage for system call fuzzers

Kim, S., Jeong, S., Cho, M., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2689-2691 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Poster: Effective layers in coverage metrics for deep neural networks

Park, L. H., Oh, S., Kim, J., Chung, S. & Kwon, T., 2019 Nov 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2681-2683 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Value recognition and intention to adopt smart city services: A public value management theory approach

Lee, S. H., Lee, J. H. & Lee, Y. J., 2019 Jan 1, In : Journal of Contemporary Eastern Asia. 18, 1, p. 124-152 29 p.

Research output: Contribution to journalArticle

Visual analytics and visualization for android security risk

Yoo, S., Ryu, H. R., Yeon, H., Kwon, T. & Jang, Y., 2019 Aug, In : Journal of Computer Languages. 53, p. 9-21 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

What content and context factors lead to selection of a video clip? The heuristic route perspective

Yoon, S. H. & Kim, H. W., 2019 Sep 15, In : Electronic Commerce Research. 19, 3, p. 603-627 25 p.

Research output: Contribution to journalArticle

What makes people send gifts via social network services? A mixed methods approach

Lee, S. H., Choi, S. J. & Kim, H. W., 2019 Jul 29, In : Internet Research. 30, 1, p. 315-334 20 p.

Research output: Contribution to journalArticle

2018

A customer value theory approach to the engagement with a brand: The case of KakaoTalk Plus in Korea

Lee, S. H., Lee, J. E. & Kim, H. W., 2018 Jan 1, In : Asia Pacific Journal of Information Systems. 28, 1, p. 36-60 25 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A Data Analytics Approach to the Cybercrime Underground Economy

An, J. & Kim, H. W., 2018 Apr 28, In : IEEE Access. 6, p. 26636-26652 17 p.

Research output: Contribution to journalArticle

Open Access
9 Citations (Scopus)

Analysis on spectrum policy of WAVE for V2X communication system in automobile industry

Jeong, S. B., Jo, H. J., Cho, S. H. & Lee, B. G., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Amien, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Analyzing consumption trends of broadcasting contents with theoretical frameworks

Cho, E. Y. & Lee, B. G., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Amien, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An analysis of a repetitive news display phenomenon in the digital news ecosystem

Kwak, K. T., Hong, S. C. & Lee, S. W., 2018 Dec 12, In : Sustainability (Switzerland). 10, 12, 4736.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Customer benefits and value co-creation activities in corporate social networking services

Lee, A. R. & Kim, K. K., 2018 Jul 3, In : Behaviour and Information Technology. 37, 7, p. 675-692 18 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Data Transfusion: Pairing Wearable Devices and Its Implication on Security for Internet of Things

Lee, Y., Yang, W. & Kwon, T., 2018 Jul 21, In : IEEE Access. 6, p. 48994-49006 13 p., 8418356.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Design of car license plate area detection algorithm for enhanced recognition plate

Ahn, C. S., Lee, B. G., Yang, S. S. & Park, S. C., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Amien, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Examining gifting through social network services: A social exchange theory perspective

Kim, H. W., Kankanhalli, A. & Lee, S. H., 2018 Jan 1, In : Information Systems Research. 29, 4, p. 805-828 24 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Finding an optimal balance between agreement and performance in an online reciprocal peer evaluation system

Cho, K. & Schunn, C. D., 2018 Mar, In : Studies in Educational Evaluation. 56, p. 94-101 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Forecasting the volatility of stock price index: A hybrid model integrating LSTM with multiple GARCH-type models

Kim, H. Y. & Won, C. H., 2018 Aug 1, In : Expert Systems with Applications. 103, p. 25-37 13 p.

Research output: Contribution to journalArticle

90 Citations (Scopus)

Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

Joh, J., Seo, Y., Kim, H. K. & Kwon, T., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying issues for the bright ICT initiative: A Worldwide delphi study of IS journal editors and scholars

Lee, J. & Fedorowicz, J., 2018 Jan 1, In : Communications of the Association for Information Systems. 42, 1, p. 301-333 33 p., 11.

Research output: Contribution to journalArticle

4 Citations (Scopus)
Open Access
3 Citations (Scopus)
32 Citations (Scopus)

Policy development of sharing economy in Korea: Case of home-sharing

Lee, S. & Lee, B. G., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Amien, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 1-4 4 p. (Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Proposing a value-based digital government model: Toward broadening sustainability and public participation

Lee, J., Kim, B. J., Park, S. J., Park, S. & Oh, K., 2018 Aug 29, In : Sustainability (Switzerland). 10, 9, 3078.

Research output: Contribution to journalArticle

Open Access
4 Citations (Scopus)

Round-reduced modular construction of asymmetric password-authenticated key exchange

Hwang, J. Y., Jarecki, S., Kwon, T., Lee, J., Shin, J. S. & Xu, J., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 485-504 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
1 Citation (Scopus)
5 Citations (Scopus)

Trust and Dependence Model of Knowledge Sharing in Systems Development

Park, J. G. & Lee, J., 2018 Jan 1.

Research output: Contribution to conferencePaper

Two-factor authenticated key agreement supporting unlinkability in 5G-integrated wireless sensor networks

Shin, S. & Kwon, T., 2018 Jan 22, In : IEEE Access. 6, p. 11229-11241 13 p.

Research output: Contribution to journalArticle

Open Access
19 Citations (Scopus)
2017

A comparative study of KakaoStory and Facebook: Focusing on use patterns and use motives

Lee, S. W. & Lee, J., 2017 Feb 1, In : Telematics and Informatics. 34, 1, p. 220-229 10 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment

Gupta, S., Yun, H., Xu, H. & Kim, H. W., 2017 Jan 2, In : Information Technology for Development. 23, 1, p. 127-152 26 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A psychological empowerment approach to online knowledge sharing

Kang, Y. J., Lee, J. Y. & Kim, H. W., 2017 Sep 1, In : Computers in Human Behavior. 74, p. 175-187 13 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)