default search action
H. Joseph Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2010
- [j31]Ronald D. Freeze, Khaled A. Alshare, Peggy Lane, H. Joseph Wen:
IS Success Model in E-Learning Context Based on Students' Perceptions. J. Inf. Syst. Educ. 21(2): 173-184 (2010) - 2007
- [j30]H. Joseph Wen, Dana Schwieger, Pam Gershuny:
Internet Usage Monitoring in the Workplace: Its Legal Challenges and Implementation Strategies. Inf. Syst. Manag. 24(2): 185-196 (2007) - 2006
- [j29]Dana Schwieger, Arlyn J. Melcher, C. Ranganathan, H. Joseph Wen:
Applying Adaptive Structuration Theory to Health Information Systems Adoption: A Case Study. Int. J. Heal. Inf. Syst. Informatics 1(1): 78-92 (2006) - [j28]Pruthikrai Mahatanankoon, H. Joseph Wen, Billy B. L. Lim:
Evaluating the technological characteristics and trust affecting mobile device usage. Int. J. Mob. Commun. 4(6): 662-681 (2006) - [j27]H. Joseph Wen, Stephen C. Shih:
Strategic Information Technology Prioritization. J. Comput. Inf. Syst. 46(4): 54-63 (2006) - 2005
- [j26]Joseph K. Tan, H. Joseph Wen, Neveen Awad:
Health care and services delivery systems as complex adaptive systems. Commun. ACM 48(5): 36-44 (2005) - [j25]Tibor Gyires, H. Joseph Wen:
Extension of Multiprotocol Label Switching for long-range dependent traffic: QoS routing and performance in IP networks. Comput. Stand. Interfaces 27(2): 117-132 (2005) - [j24]Pruthikrai Mahatanankoon, H. Joseph Wen, Billy B. L. Lim:
Consumer-based m-commerce: exploring consumer perception of mobile applications. Comput. Stand. Interfaces 27(4): 347-357 (2005) - [j23]Stephen C. Shih, H. Joseph Wen:
Integrated e-enterprise security design and implementation: a case study of e-service in supply chain management. Int. J. Electron. Bus. 3(2): 154-173 (2005) - [j22]H. Joseph Wen, Joseph K. Tan:
Mapping e-health strategies: thinking outside the traditional healthcare box. Int. J. Electron. Heal. 1(3): 261-276 (2005) - [j21]Stephen C. Shih, H. Joseph Wen:
E-enterprise security management life cycle. Inf. Manag. Comput. Security 13(2): 121-134 (2005) - [j20]R. G. Rathnam, Justin Johnsen, H. Joseph Wen:
Alignment of Business Strategy and it Strategy: A Case Study of A Fortune 50 Financial Services Company. J. Comput. Inf. Syst. 45(2): 1-8 (2005) - 2004
- [j19]H. Joseph Wen, Pruthikrai Mahatanankoon:
M-commerce operation modes and applications. Int. J. Electron. Bus. 2(3): 301-315 (2004) - [j18]Eltayeb Abuelyaman, H. Joseph Wen:
An efficient wireless transmission method for m-commerce. Int. J. Mob. Commun. 2(4): 405-417 (2004) - [j17]Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen:
Adopting e-commerce Web site operation modes: The current state of large US firms. Inf. Manag. Comput. Secur. 12(1): 73-90 (2004) - 2003
- [j16]J. Michael Tarn, David C. Yen, H. Joseph Wen:
XML and electronic business. Int. J. Electron. Bus. 1(3): 296-309 (2003) - [j15]Joseph K. Tan, H. Joseph Wen, Tibor Gyires:
M-commerce security: the impact of wireless application protocol (WAP) security services on e-business and e-health solutions. Int. J. Mob. Commun. 1(4): 409-424 (2003) - [j14]Yun E. Zeng, H. Joseph Wen, David C. Yen:
Customer relationship management (CRM) in business-to-business (B2B) e-commerce. Inf. Manag. Comput. Secur. 11(1): 39-44 (2003) - [j13]H. Joseph Wen, Billy B. L. Lim, H. Lisa Huang:
Measuring e-commerce efficiency: a data envelopment analysis (DEA) approach. Ind. Manag. Data Syst. 103(9): 703-710 (2003) - [j12]Stephen C. Shih, H. Joseph Wen:
Building E-Enterprise Security: A Business View. Inf. Secur. J. A Glob. Perspect. 12(4): 41-49 (2003) - [j11]Billy B. L. Lim, H. Joseph Wen:
Web Services: An Analysis of the Technology, its Benefits, and Implementation Difficulties. Inf. Syst. Manag. 20(2): 49-57 (2003) - 2002
- [j10]J. Michael Tarn, H. Joseph Wen:
Exploring organizational expansion modes and their associated communication system requirements: consolidation and complementation. Int. J. Inf. Manag. 22(1): 3-26 (2002) - [j9]Cheickna Sylla, H. Joseph Wen:
A conceptual framework for evaluation of information technology investments. Int. J. Technol. Manag. 24(2/3): 236-261 (2002) - [j8]Billy B. L. Lim, H. Joseph Wen:
The impact of next generation XML. Inf. Manag. Comput. Secur. 10(1): 33-40 (2002) - [j7]Darene B. Lewis, H. Joseph Wen, J. Michael Tarn:
Managing Legal Issues in the Software Development Life Cycle. Inf. Syst. Manag. 19(3): 25-31 (2002) - 2001
- [j6]H. Joseph Wen, Houn-Gee Chen, Hsin-Ginn Hwang:
E-commerce Web site design: strategies and models. Inf. Manag. Comput. Secur. 9(1): 5-12 (2001) - [j5]H. Joseph Wen, J. Michael Tarn:
Privacy and Security in E-Healthcare Information Management. Inf. Secur. J. A Glob. Perspect. 10(4): 1-16 (2001) - 1998
- [j4]H. Joseph Wen:
From client/server to intranet. Inf. Manag. Comput. Secur. 6(1): 15-20 (1998) - [j3]H. Joseph Wen:
Internet computer virus protection policy. Inf. Manag. Comput. Secur. 6(2): 66-71 (1998) - [j2]H. Joseph Wen, Jyh-Horng Michael Tarn:
Internet security: a case study of firewall selection. Inf. Manag. Comput. Secur. 6(4): 178-184 (1998) - [j1]H. Joseph Wen, David C. Yen, Binshan Lin:
Intranet document management systems. Internet Res. 8(4): 338-346 (1998)
Conference and Workshop Papers
- 2003
- [c1]H. Joseph Wen, Joseph K. Tan:
The Evolving Face of TeleMedicine & E-Health: Opening Doors and Closing Gaps in E-Health Services Opportunities & Challenges. HICSS 2003: 172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint