default search action
Tony Yu-Ju Tu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Yu-Ju Tu, Selwyn Piramuthu:
Ethical consumerism, supply chains, and deceptions with RFID-based systems. Inf. Manag. 61(7): 104016 (2024) - 2023
- [j15]Yu-Ju Tu, Shari S. C. Shang, Junyi Wu:
Decision support or decision making? The critical decision roles of IS in autonomous vehicles. Int. J. Serv. Technol. Manag. 28(3/4): 205-222 (2023) - 2022
- [j14]Tony Yu-Ju Tu, Shari S. C. Shang, Junyi Wu:
Is your autonomous vehicle as smart as you expected? Commun. ACM 65(2): 31-34 (2022) - [j13]Yu-Ju Tu, Selwyn Piramuthu:
Models to address RFID-based ticket-switching in retailing. Decis. Support Syst. 153: 113666 (2022) - [j12]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
On Group Ownership Delegate Protocol for RFID Systems. Inf. Syst. Frontiers 24(5): 1577-1584 (2022) - 2021
- [j11]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Critical risk considerations in auto-ID security: Barcode vs. RFID. Decis. Support Syst. 142: 113471 (2021) - [j10]Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu:
Security of lightweight mutual authentication protocols. J. Supercomput. 77(5): 4565-4581 (2021) - 2020
- [j9]Yu-Ju Tu, Selwyn Piramuthu:
On addressing RFID/NFC-based relay attacks: An overview. Decis. Support Syst. 129 (2020) - [j8]Yu-Ju Tu, Yu-Hsiang (John) Huang, Troy J. Strader, Ramanath Subramanyam, Michael J. Shaw:
Candidate diversity and granularity in IT portfolio construction. Inf. Technol. Manag. 21(3): 157-168 (2020) - [c11]Yu-Hsiang (John) Huang, Daniel Connolly, Tianshu Zheng, Yu-Ju Tu:
Developing a Framework for Hotel IT Investment Decision-Making Amid COVID-19. WEB 2020: 25-31
2010 – 2019
- 2019
- [j7]Yu-Hsiang (John) Huang, Yu-Ju Tu, Troy J. Strader, Michael J. Shaw, Ramanath Subramanyam:
Selecting the Most Desirable IT Portfolio Under Various Risk Tolerance Levels. Inf. Resour. Manag. J. 32(4): 1-19 (2019) - [c10]Saerom Lee, Austin Kwak, Yuju Tu, Xiao Ma, Lara Khansa:
Announcement of Formal control as a phase-Shifting perception and its Moderating Role in the Context of Mobile-Loafing. ECIS 2019 - [c9]Yuju Tu:
An Investigation of Using Time and Ambient Conditions to Sense the Unexpected Removal of RFID Tag. FNSS 2019: 190-197 - [c8]Yu-Ju Tu, Huihui Chi, Wei Zhou, Gaurav Kapoor, Enes Eryarsoy, Selwyn Piramuthu:
Critical Evaluation of RFID Applications in Healthcare. FNSS 2019: 240-248 - 2018
- [j6]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
A novel means to address RFID tag/item separation in supply chains. Decis. Support Syst. 115: 13-23 (2018) - 2017
- [j5]Tony Yu-Ju Tu, Selwyn Piramuthu:
Lightweight non-distance-bounding means to address RFID relay attacks. Decis. Support Syst. 102: 12-21 (2017) - 2016
- [c7]Yu-Ju Tu:
Budget Sufficiency, Profile Diversity, and Managerial Flexibility for Improving IT Portfolio. AMCIS 2016 - [c6]Yu-Ju Tu:
On Profiling the Superior IT Portfolio Characteristics. AMCIS 2016 - [c5]Yu-Ju Tu, Hsin-Lu Chang:
IS portfolio characteristics and SCM capabilities. AMCIS 2016 - 2015
- [c4]Yu-Hsiang (John) Huang, Michael J. Shaw, Ramanath Subramanyam, Tony Yu-Ju Tu:
How Can a Firm Select the Most Qualified IT Portfolio Under Various Risk Tolerance Levels? AMCIS 2015 - [c3]Tony Yu-Ju Tu, Michael J. Shaw, Ramanath Subramanyam:
IT Governance and Portfolio Management: An Exploration of the Superior IT Project Investment Portfolios. PACIS 2015: 70 - 2013
- [c2]Yu-Ju Tu, Michael J. Shaw, Ramanath Subramanyam, Eric C. Larson:
An Examination of IT Initiative Portfolio Characteristics and Investment Allocation: A Computational Modeling and Simulation Approach. AMCIS 2013 - 2011
- [j4]Yu-Ju Tu, Selwyn Piramuthu:
A Decision-Support Model for Filtering RFID Read Data in Supply Chains. IEEE Trans. Syst. Man Cybern. Part C 41(2): 268-273 (2011)
2000 – 2009
- 2009
- [j3]Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu:
Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2): 586-593 (2009) - [j2]Wei Zhou, Yu-Ju Tu, Selwyn Piramuthu:
RFID-enabled item-level retail pricing. Decis. Support Syst. 48(1): 169-179 (2009) - [c1]Yu-Ju Tu, Michael J. Shaw:
An Integrated Approach to Managing IT Portfolio. WEB 2009: 243-253 - 2008
- [j1]Yu-Ju Tu, Selwyn Piramuthu:
Reducing False Reads in RFID-Embedded Supply Chains. J. Theor. Appl. Electron. Commer. Res. 3(2): 60-70 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint