default search action
William Yeoh 0002
Person information
- affiliation: Deakin University Australia
Other persons with the same name
- William Yeoh 0001 — Washington University in St. Louis, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Grazia Spiga, Syed Zamberi Ahmad, William Yeoh:
Blockchain adoption impact on real estate performance: the mediating role of real estate and blockchain transparency. Bus. Process. Manag. J. 30(6): 1874-1894 (2024) - [j41]Yancong Xie, William Yeoh, Jingguo Wang:
How self-selection Bias in online reviews affects buyer satisfaction: A product type perspective. Decis. Support Syst. 181: 114199 (2024) - [j40]Md. Habibur Rahman, William Yeoh, Shantanu Pal:
Exploring factors influencing blockchain adoption's effectiveness in organizations for generating business value: a systematic literature review and thematic analysis. Enterp. Inf. Syst. 18(8) (2024) - [j39]William Yeoh, Angela Siew-Hoong Lee, Claudia Ng, Ales Popovic, Yue Han:
Examining the Acceptance of Blockchain by Real Estate Buyers and Sellers. Inf. Syst. Frontiers 26(3): 1121-1137 (2024) - 2023
- [j38]William Yeoh, Marina Liu, Malcolm Shore, Frank Jiang:
Zero trust cybersecurity: Critical success factors and A maturity assessment framework. Comput. Secur. 133: 103412 (2023) - [j37]Jiongbin Liu, William Yeoh, Longxiang Gao, Shang Gao, Ojelanki K. Ngwenyama:
Designing a Secure Blockchain-Based Supply Chain Management Framework. J. Comput. Inf. Syst. 63(3): 592-607 (2023) - [c20]Mojca Simonovic, Ales Popovic, William Yeoh:
Exploring the Role of Creativity in Business Analytics Use: A Business Analysts Perspective. HICSS 2023: 5382-5389 - 2022
- [j36]William Yeoh, Shan Wang, Ales Popovic, Noman H. Chowdhury:
A systematic synthesis of critical success factors for cybersecurity. Comput. Secur. 118: 102724 (2022) - [j35]Shan Wang, William Yeoh, Jie Ren, Alvin Lee:
Learnings and Implications of Virtual Hackathon. J. Comput. Inf. Syst. 62(3): 547-559 (2022) - [j34]William Yeoh, He Huang, Wang-Sheng Lee, Fadi Al Jafari, Rachel Mansson:
Simulated Phishing Attack and Embedded Training Campaign. J. Comput. Inf. Syst. 62(4): 802-821 (2022) - [j33]Marina Liu, William Yeoh, Frank Jiang, Kim-Kwang Raymond Choo:
Blockchain for Cybersecurity: Systematic Literature Review and Classification. J. Comput. Inf. Syst. 62(6): 1182-1198 (2022) - [c19]Malyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang:
Towards Improving the Adoption and Usage of National Digital Identity Systems. ASE 2022: 223:1-223:6 - [i1]Jiongbin Liu, William Yeoh, Youyang Qu, Longxiang Gao:
Blockchain-based Digital Twin for Supply Chain Management: A Literature Review and Future Research Directions. CoRR abs/2202.03966 (2022) - 2021
- [j32]Hang Yin, Shuang Zheng, William Yeoh, Jie Ren:
How online review richness impacts sales: An attribute substitution perspective. J. Assoc. Inf. Sci. Technol. 72(7): 901-917 (2021) - [j31]Angela Siew-Hoong Lee, Shan Wang, William Yeoh, Novita Ikasari:
Understanding the Use of Knowledge Sharing Tools. J. Comput. Inf. Syst. 61(5): 458-470 (2021) - 2020
- [j30]Alireza Moayedikia, Hadi Ghaderi, William Yeoh:
Optimizing microtask assignment on crowdsourcing platforms using Markov chain Monte Carlo. Decis. Support Syst. 139: 113404 (2020) - [j29]Mansoor Al-Gharibi, Matthew J. Warren, William Yeoh:
Risks of Critical Infrastructure Adoption of Cloud Computing by Government. Int. J. Cyber Warf. Terror. 10(3): 47-58 (2020) - [j28]Ruwan Nagahawatta, Matthew J. Warren, William Yeoh:
A Study of Cyber Security Issues in Sri Lanka. Int. J. Cyber Warf. Terror. 10(3): 59-72 (2020) - [j27]Alireza Moayedikia, William Yeoh, Kok-Leong Ong, Yee Ling Boo:
Framework and Literature Analysis for Crowdsourcing's Answer Aggregation. J. Comput. Inf. Syst. 60(1): 49-60 (2020) - [j26]Adel Alamin, Carla L. Wilkin, William Yeoh, Matthew J. Warren:
The Impact of Self-Efficacy on Accountants' Behavioral Intention to Adopt and Use Accounting Information Systems. J. Inf. Syst. 34(3): 31-46 (2020)
2010 – 2019
- 2019
- [j25]Chin-Hoong Chee, Jafreezal Jaafar, Izzatdin Abdul Aziz, Mohd Hilmi Hasan, William Yeoh:
Algorithms for frequent itemset mining: a literature review. Artif. Intell. Rev. 52(4): 2603-2621 (2019) - [j24]Alireza Moayedikia, William Yeoh, Kok-Leong Ong, Yee Ling Boo:
Improving accuracy and lowering cost in crowdsourcing through an unsupervised expertise estimation approach. Decis. Support Syst. 122 (2019) - [j23]Shan Wang, William Yeoh, Gregory Richards, Siew Fan Wong, Younghoon Chang:
Harnessing business analytics value through organizational absorptive capacity. Inf. Manag. 56(7) (2019) - [j22]Gregory Richards, William Yeoh, Alain Yee-Loong Chong, Ales Popovic:
Business Intelligence Effectiveness and Corporate Performance Management: An Empirical Analysis. J. Comput. Inf. Syst. 59(2): 188-196 (2019) - [j21]Jie Ren, Pinar Öztürk, William G. S. Yeoh:
Online Crowdsourcing Campaigns: Bottom-Up versus Top-Down Process Model. J. Comput. Inf. Syst. 59(3): 266-276 (2019) - 2018
- [j20]Ishan Senarathna, Carla Wilkin, Matthew J. Warren, William Yeoh, Scott Salzman:
Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs. Australas. J. Inf. Syst. 22 (2018) - [j19]Alireza Moayedikia, Kok-Leong Ong, Yee Ling Boo, William G. S. Yeoh:
Task assignment in microtask crowdsourcing platforms using learning automata. Eng. Appl. Artif. Intell. 74: 212-225 (2018) - [j18]Jie Ren, William Yeoh, Mong-Shan Ee, Ales Popovic:
Online consumer reviews and sales: Examining the chicken-egg relationships. J. Assoc. Inf. Sci. Technol. 69(3): 449-460 (2018) - 2017
- [j17]Alireza Moayedikia, Kok-Leong Ong, Yee Ling Boo, William G. S. Yeoh, Richard Jensen:
Feature selection for high dimensional imbalanced class data using harmony search. Eng. Appl. Artif. Intell. 57: 38-49 (2017) - [j16]Say Yen Teoh, William Yeoh, Hossein Seif Zadeh:
Towards a resilience management framework for complex enterprise systems upgrade implementation. Enterp. Inf. Syst. 11(5): 694-718 (2017) - [j15]Shijia Gao, William Yeoh, Siew Fan Wong, Rens Scheepers:
A literature analysis of the use of Absorptive Capacity construct in IS research. Int. J. Inf. Manag. 37(2): 36-42 (2017) - [c18]Alireza Moayedikia, Kok-Leong Ong, Yee Ling Boo, William Yeoh:
Meta-Heuristic Multi-objective Community Detection Based on Users' Attributes. AusDM 2017: 250-264 - [c17]Jie Ren, Yue Han, William Yeoh, Yegin Genc:
Exploring the Role of Learning in Crowdsourcing Creativity: The Value of Idea-Building in the Crowd. ICIS 2017 - 2016
- [j14]Ishan Senarathna, William Yeoh, Matthew J. Warren, Scott Salzman:
Security and Privacy Concerns for Australian SMEs Cloud Adoption: Empirical Study of Metropolitan Vs Regional SMEs. Australas. J. Inf. Syst. 20 (2016) - [j13]Te-Wei Wang, Yuriy Verbitskiy, William Yeoh:
Depicting Data Quality Issues in Business Intelligence Environment through a Metadata Framework. Int. J. Bus. Intell. Res. 7(2): 20-31 (2016) - [j12]Yuriy Verbitskiy, William Yeoh:
An End-User Metadata Model on Object and Element Levels for Business Intelligence Users. Int. J. Bus. Intell. Res. 7(2): 50-58 (2016) - [j11]William Yeoh, Ales Popovic:
Extending the understanding of critical success factors for implementing business intelligence systems. J. Assoc. Inf. Sci. Technol. 67(1): 134-147 (2016) - [j10]Chin-Hoong Chee, William Yeoh, Hung-Khoon Tan, Mong-Shan Ee:
Supporting Business Intelligence Usage: An Integrated Framework with Automatic Weighting. J. Comput. Inf. Syst. 56(4): 301-312 (2016) - [c16]Alireza Moayedikia, Kok-Leong Ong, Yee Ling Boo, William Yeoh:
Bee Colony Based Worker Reliability Estimation Algorithm in Microtask Crowdsourcing. ICMLA 2016: 713-717 - 2015
- [j9]Neil Foshay, William Yeoh, Yee Ling Boo, Kok-Leong Ong, David Mattie:
A Comprehensive Diagnostic Framework for Evaluating Business Intelligence and Analytics Effectiveness. Australas. J. Inf. Syst. 19 (2015) - [j8]Amir Parssian, William Yeoh, Mong-Shan Ee:
Quality-Based SQL: Specifying Information Quality in Relational Database Queries. Computer 48(9): 69-74 (2015) - [c15]Adel Alamin, William Yeoh, Matthew J. Warren, Scott Salzman:
An Empirical Study of Factors Influencing Accounting Information Systems Adoption. ECIS 2015 - [c14]Edgar Kautzner, Shijia Gao, William Yeoh, Siew Fan Wong:
An Exploratory Study on the Factors Influencing Managers' Use of Mobile Tablets. PACIS 2015: 84 - 2014
- [j7]Ishan Senarathna, Matthew J. Warren, William Yeoh, Scott Salzman:
The influence of organisation culture on E-commerce adoption. Ind. Manag. Data Syst. 114(7): 1007-1021 (2014) - [j6]William Yeoh, Gregory Richards, Shan Wang:
Benefits and Barriers to Corporate Performance Management Systems. J. Comput. Inf. Syst. 55(1): 105-116 (2014) - [j5]Chin-Hoong Chee, William Yeoh, Shijia Gao, Gregory Richards:
Improving Business Intelligence Traceability and Accountability: An Integrated Framework of BI Product and Metacontent Map. J. Database Manag. 25(3): 28-47 (2014) - [c13]Michael Addorisio, Shijia Gao, William Yeoh, Siew Fan Wong:
Critical Analysis of the Use of Absorptive Capacity Theory in IS Research. ICIS 2014 - [c12]Michael S. Gendron, William Yeoh, Robert Swarr:
Supporting Decision Making: The BI Sweet Spot. DSS 2014: 279-290 - [c11]Gregory Richards, William Yeoh, Alain Yee-Loong Chong, Ales Popovic:
An Empirical Study of Business Intelligence Impact on Corporate Performance Management. PACIS 2014: 341 - [c10]Ding-Wen Tan, Soung-Yue Liew, William Yeoh:
Improving telemarketing Intelligence through Significant proportion of target Instances. PACIS 2014: 368 - 2013
- [j4]Ding-Wen Tan, William Yeoh, Yee Ling Boo, Soung-Yue Liew:
The Impact of Feature Selection: a Data-Mining Application in Direct Marketing. Intell. Syst. Account. Finance Manag. 20(1): 23-38 (2013) - [c9]Ishan Senarathna, Matthew J. Warren, William Yeoh, Scott Salzman:
An Empirical Study of the Influence of Different Organisation Cultures on E-Commerce Adoption Maturity. ACIS 2013: 143 - [c8]William Yeoh, Gregory Richards, Shan Wang:
Linking BI Competency and Assimilation through Absorptive Capacity: A Conceptual Framework. PACIS 2013: 17 - 2012
- [c7]William Yeoh, Te-Wei Wang, Yuriy Verbitskiy:
Describing Data Quality Problem through a Metadata Framework. AMCIS 2012 - [c6]Ding-Wen Tan, Soung-Yue Liew, Teik-Boon Tan, William Yeoh:
A feature selection model for binary classification of imbalanced data based on preference for target instances. DMO 2012: 35-42 - 2011
- [j3]William Yeoh:
Business intelligence systems implementation: testing a critical success factors framework in multiple cases. Int. J. Bus. Inf. Syst. 8(2): 192-209 (2011) - [c5]Chin-Hoong Chee, William Yeoh, Shijia Gao:
Enhancing Business Intelligence Traceability through an Integrated Metadata Framework. ACIS 2011 - [c4]Gregory Richards, William Yeoh, Shan Wang:
An Empirical Study of BI-based Corporate Performance Management in North America and East Asia. AMCIS 2011 - [c3]Ding-Wen Tan, Yee-Wai Sim, William Yeoh:
Applying Feature Selection Methods to Improve the Predictive Model of a Direct Marketing Problem. ICSECS (1) 2011: 155-167 - [c2]Yuriy Verbitskiy, William Yeoh:
Data quality management in a business intelligence environment: From the lens of metadata. ICIQ 2011 - 2010
- [j2]William Yeoh, Andy Koronios:
Critical Success Factors for Business Intelligence Systems. J. Comput. Inf. Syst. 50(3): 23-32 (2010)
2000 – 2009
- 2008
- [j1]William Yeoh, Andy Koronios, Jing Gao:
Managing the Implementation of Business Intelligence Systems: A Critical Success Factors Framework. Int. J. Enterp. Inf. Syst. 4(3): 79-94 (2008) - 2007
- [c1]William Yeoh, Jing Gao, Andy Koronios:
Towards a Critical Success Factor Framework for Implementing Business Intelligence Systems: A Delphi Study in Engineering Asset Management Organizations. CONFENIS (2) 2007: 1353-1367 - [p1]William Yeoh, Andy Koronios, Jing Gao:
Critical Success Factors for Implementation of Business Intelligence Systems: A Study of Engineering Asset Management Organizations. Decision Support for Global Enterprises 2007: 33-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint