Achieving IT-business strategic alignment via enterprise-wide implementation of balanced scorecards CD Huang, Q Hu Information Systems Management 24 (2), 173-184, 2007 | 226 | 2007 |
Smart tourism technologies in travel planning: The role of exploration and exploitation CD Huang, J Goo, K Nam, CW Yoo Information & Management 54 (6), 757-770, 2017 | 218 | 2017 |
Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment–trust theory J Goo, CD Huang Decision Support Systems 46 (1), 216-232, 2008 | 185 | 2008 |
An economic analysis of the optimal information security investment in the case of a risk-averse firm CD Huang, Q Hu, RS Behara International Journal of Production Economics 114 (2), 793-804, 2008 | 136 | 2008 |
A path to successful IT outsourcing: interaction between service‐level agreements and commitment J Goo, CD Huang, P Hart Decision Sciences 39 (3), 469-506, 2008 | 116 | 2008 |
Using the balanced scorecard to achieve sustained IT-business alignment: a case study Q Hu, CD Huang Communications of the Association for Information Systems 17 (1), 8, 2006 | 107 | 2006 |
Outcome-driven experiential learning with Web 2.0. CD Huang, RS Behara Journal of Information Systems Education 18 (3), 2007 | 105 | 2007 |
Improving travel decision support satisfaction with smart tourism technologies: A framework of tourist elaboration likelihood and self-efficacy CW Yoo, J Goo, CD Huang, K Nam, M Woo Technological Forecasting and Social Change 123, 330-341, 2017 | 89 | 2017 |
Optimal information security investment in a Healthcare Information Exchange: An economic analysis CD Huang, RS Behara, J Goo Decision Support Systems 61, 1-11, 2014 | 74 | 2014 |
Integrating Web services with competitive strategies: A balanced scorecard approach CD Huang, Q Hu The Communications of the Association for Information Systems 13 (1), 44, 2004 | 65 | 2004 |
Economics of Information Security Investment in the Case of Simultaneous Attacks. CD Huang, Q Hu, RS Behara WEIS, 2006 | 64 | 2006 |
Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints CD Huang, RS Behara International Journal of Production Economics 141 (1), 255-268, 2013 | 62 | 2013 |
A System Dynamics Model of Information Security Investments. RS Behara, CD Huang, Q Hu ECIS, 1572-1583, 2007 | 37 | 2007 |
Managing risk propagation in extended enterprise networks CD Huang, RS Behara, Q Hu IT professional, 14-19, 2008 | 31 | 2008 |
Rescuing it outsourcing: Strategic use of service-level agreements CD Huang, J Goo IT professional 11 (1), 2009 | 23 | 2009 |
Learning for healthy outcomes: Exploration and exploitation with electronic medical records J Goo, CD Huang, C Koo Information & Management 52 (5), 550-562, 2015 | 18 | 2015 |
In search for optimal level of information security investment in risk-averse firms CD Huang, Q Hu, R Behara Proceedings of the third annual security symposium, Tempe, Arizona, Sept, 8-9, 2005 | 9 | 2005 |
Investment decision on information system security: A scenario approach CD Huang, J Goo AMCIS 2009 Proceedings, 571, 2009 | 7 | 2009 |
Economics of information security investment CD Huang, RS Behara, Q Hu Handbooks in Information Systems, 53-69, 2007 | 7 | 2007 |
Judy Ho, June Liang, Jonathan Martinez C Huang, M Yeh Racial and Ethnic Disparities in Health and Health Care, 149, 2006 | 7* | 2006 |