1 |
Balamurugan, S., R. Rajaram, G. Athiappan and M. Muthupandian, "Data Mining Techniques for Suspicious Email Detection: A Comparative Study," Proceeding of the IADIS European Conference Data Mining 2007, (2007), 213-217.
|
2 |
Banerjee, A., Barman, D., Faloutsos, M., & Bhuyan, L. N. Cyber-fraud is one typo away. INFOCOM 2008. The 27th Conference on Computer Communications. IEEE (2008) (pp. 1939-1947). IEEE.
|
3 |
Bayer, M., W. Sommer and A. Schacht, "Reading emotional words within sentences: The impact of arousal and valence on event-related potentials," International Journal of Psychophysiology, Vol.78, No.3 (2010), 299-307.
DOI
|
4 |
Castell, M. R. F. and L. B. Dacuycuy, "Exploring the use of exchange market pressure and RMU deviation indicator for early warning system (EWS) in the ASEAN+3 region," DLSU Business & Economics Review, Vol.18, No.2 (2009), 1-30.
|
5 |
Comfort, L. K., "Crisis Management in Hindsight: Cognition, Communication, Coordination, and Control," Public Administration Review, Vol. 67, No.1 (2007), 189-197.
DOI
|
6 |
Choi, S., Jeon, J., Subrata, B., Kwon, O., "An efficient estimation of place brand image power based on text mining technology," Journal of Korea Intelligent Information Systems, Vol. 21, No.2 (2015), 113-129. (최석재, 전종식, 권오병, "텍스트마이닝 기반의 효율적인 장소 브랜드 이미지 강도 측정 방법," 지능정보연구, Vol.21, No.2 (2015), 113-129.)
DOI
|
7 |
Choi, S. Song, Y., Kwon, O., "Analyzing contextual polarity of unstructured data for measuring subjective well-being," Journal of Intelligent Information Systems, Vol.22, No.1 (2016), 83-105. (최석재, 송영은, 권오병, "주관적 웰빙 상태 측정을 위한 비정형 데이터의 상황기반 긍부 정성 분석 방법," 지능정보연구, Vol. 22, No.1 (2016), 83-105.)
DOI
|
8 |
Cui, M., Jin, Y. and Kwon, O., "A method of analyzing sentiment polarity of multilingual social media : A case of korean-chinese languages," Journal of Intelligent Information Systems, Vol.22, No.3 (2016), 91-111. (최미나, 진윤선, 권오병, "다국어 소셜미디어에 대한 감성분석 방법 개발," 지능정보연구, Vol. 22, No.3 (2016), 91-111.)
DOI
|
9 |
DeAngelo, H. and R. M. Stulz, "Liquid-claim production, risk management, and bank capital structure: Why high leverage is optimal for banks," Journal of Financial Economics, Vol.116, No.2 (2015), 219-236.
DOI
|
10 |
Dionne, G., "Risk management: History, definition, and critique," Risk Management and Insurance Review, Vol.16, No.2 (2013), 147-166.
DOI
|
11 |
Hassan, A. B., F. D. Lass and J. Makinde, "Cybercrime in Nigeria: Causes, Effects and the Way Out," ARPN Journal of Science and Technology, Vol.2, No.7 (2012), 626-631.
|
12 |
Flores, C., "Management of catastrophic risks considering the existence of early warning systems," Scandinavian Actuarial Journal, Vol.1 (2009), 38-62.
|
13 |
Folino, G., A. Forestiero, G. Papuzzo and G. Spezzano, "A grid portal for solving geoscience problems using distributed knowledge discovery services," Future Generation Computer Systems, Vol.26, No.1 (2010), 87-96.
DOI
|
14 |
Grace, M. F., J. T. Leverty, R. D. Phillips and P. Shimpi, "The value of investing in enterprise risk management," Journal of Risk and Insurance, Vol.82, No.2 (2015), 289-316.
DOI
|
15 |
Joachims, T., "Text categorization with support vector machines: Learning with many relevant features," Technical Report LS8-Report, Universitaet Dortmund, 1997.
|
16 |
Henderson, L. J., "Emergency and disaster: Pervasive risk and public bureaucracy in developing nations," Public Organization Review, Vol.4, No.2 (2004), 103-119.
DOI
|
17 |
Holton, C., "Identifying disgruntled employee systems fraud risk through text mining: a simple solution for a multi-billion dollar problem," Decision Support Systems, Vol.46, No.4 (2009), 853-864.
DOI
|
18 |
Jans, M., N. Lybaert and K. Vanhoof, "Internal fraud risk reduction: results of a data mining case study," International Journal of Accounting Information Systems, Vol.11, No.1 (2010), 17-41.
DOI
|
19 |
Kim, J. and Kwon, O., "A method of predicting service time based on voice of customer data," Journal of the Korea society of IT services, Vol. 15 (2016), 197-210. (김정훈, 권오병, "고객의 소리 (VOC) 데이터를 활용한 서비스 처리 시간 예측방법," 한국IT 서비스학회지, Vol.15 (2016), 197-210.)
DOI
|
20 |
Kumari, A., K. Sharma, and M. Sharma, "Predictive Analysis of Cyber Crime Against Women in India and Laws Prohibiting Them," International Journal of Innovations & Advancement in Computer Science, Vol.4, No.3 (2015), 1-6.
|
21 |
Lin, M., X. Ke and A.B. Whinston, "Vertical differentiation and a comparison of online advertising models," Journal of Management Information Systems, Vol.29, No.1 (2012), 195-236.
DOI
|
22 |
Mazurczyk, W., T. Holt, and K. Szczypiorski, "Guest Editors' Introduction: Special Issue on Cyber Crime," IEEE Transactions on Dependable and Secure Computing, Vol.13, No.2 (2016), 146-147.
DOI
|
23 |
McEntire, David A. The status of emergency management theory: Issues, barriers, and recommendations for improved scholarship. University of North Texas. Department of Public Administration. Emergency Administration and Planning, (2004).
|
24 |
Sadgrove, K. The complete guide to business risk management. Routledge, 2016.
|
25 |
Nykodym N., R. Taylor and J. Vilela, "Criminal profiling and insider cyber crime," Digital Investigation, Vol.2 (2005), 261-267.
DOI
|
26 |
Perez-Gonzalez, F., and H. Yun, "Risk management and firm value: Evidence from weather derivatives," The Journal of Finance, Vol.68, No.5 (2013), 2143-2176.
DOI
|
27 |
Petak, W. J., "A Challenge for Public Administration," Public Administration Review, Vol.45 (1985), 3-7.
DOI
|
28 |
Waugh, W. L., and G. Streib, "Collaboration and leadership for effective emergency management," Public administration review, Vol.66, No.1 (2006), 131-140.
DOI
|
29 |
Sahami, M., S. Dumais and D. Heckerman and E. Horvitz, "A Bayesian Approach to Filtering Junk E-Mail," In Learning for Text Categorization: Papers from the 1998 workshop, Vol.62 (1998), 98-105.
|
30 |
Sreenivasulu, V., and R.S. Prasad, "A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model," International Journal of Computer Applications, Vol.117, No.13 (2015), 29-32.
DOI
|
31 |
Yates, D, and S. Paquette, "Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake," International Journal of Information Management, Vol.31 (2011), 6-13.
DOI
|
32 |
Michaelidou, N., N. T. Siamagka and G. Christodoulides, "Usage, barriers and measurement of social media marketing: An exploratory investigation of small and medium B2B brands," Industrial Marketing Management, Vol.40 (2011), 1153-1159.
DOI
|
33 |
Zhao. L. and Y. Jiang, "A game theoretic optimization model between project risk set and measurement," International Journal of Information Technology & Decision Making, Vol.8, No.4 (2009), 769-786.
DOI
|