Identifying the signs of fraudulent accounts using data mining techniques SH Li, DC Yen, WH Lu, C Wang Computers in Human Behavior 28 (3), 1002-1013, 2012 | 69 | 2012 |
Effects of virtualization on information security SH Li, DC Yen, SC Chen, PS Chen, WH Lu, CC Cho Computer Standards & Interfaces 42, 1-8, 2015 | 48 | 2015 |
Design and implementation of a telecare information platform SH Li, CY Wang, WH Lu, YY Lin, DC Yen Journal of medical systems 36, 1629-1650, 2012 | 46 | 2012 |
Migrating from WCAG 1.0 to WCAG 2.0–A comparative study based on Web Content Accessibility Guidelines in Taiwan SH Li, DC Yen, WH Lu, TL Lin Computers in Human Behavior 28 (1), 87-96, 2012 | 45 | 2012 |
Developing an active emergency medical service system based on WiMAX technology SH Li, KA Cheng, WH Lu, TC Lin Journal of medical systems 36, 3177-3193, 2012 | 25 | 2012 |
Identifying critical factors for corporate implementing virtualization technology SH Li, DC Yen, CC Hu, WH Lu, YC Chiu Computers in Human Behavior 28 (6), 2244-2257, 2012 | 20 | 2012 |
The characteristics of information system maintenance: an empirical analysis SH Li, DC Yen, WH Lu, TY Chen Total Quality Management & Business Excellence 25 (3-4), 280-295, 2014 | 16 | 2014 |
e-Commerce and ERP System Integration SH Li, WH Lu, YW Hsu | | |
CONSTRUCTING AN INTEGRATING MODEL TO ACCESS THE USERS’PERCEPTIONS ABOUT THE ADOPTION OF CLOUD COMPUTING SERVICES SC Chen, WH Lu, SH Li | | |
USING EVENT LOG AND DATABASE LOG TO ANALYZE BUSINESS PROCESS WH Lu, SH Li, KA Cheng, SH Chu | | |