| 2007 |
| 12 | EE | Younghwa Lee,
Kenneth A. Kozar:
Music Composition Theory and Web Purchases.
HICSS 2007: 27 |
| 2006 |
| 11 | EE | Younghwa Lee,
Hojung Cha:
A Light-weight and Scalable Localization Technique Using Mobile Acoustic Source.
CIT 2006: 235 |
| 10 | EE | Younghwa Lee,
Kenneth A. Kozar:
Investigating the effect of website quality on e-business success: An analytic hierarchy process (AHP) approach.
Decision Support Systems 42(3): 1383-1401 (2006) |
| 2005 |
| 9 | EE | Younghwa Lee,
Kenneth A. Kozar,
Kai R. T. Larsen:
Does avatar email improve communication?
Commun. ACM 48(12): 91-95 (2005) |
| 8 | EE | Younghwa Lee:
The CAN-SPAM Act: a silver bullet solution?
Commun. ACM 48(6): 131-132 (2005) |
| 7 | EE | Younghwa Lee,
Kenneth A. Kozar:
Investigating factors affecting the adoption of anti-spyware systems.
Commun. ACM 48(8): 72-77 (2005) |
| 2004 |
| 6 | | Younghwa Lee,
Kenneth A. Kozar:
Developing a Theory of Website Usability: An Exploratory Study to Identify Constructs and Nomological Networks.
ICIS 2004: 629-630 |
| 2003 |
| 5 | | Zoonky Lee,
Younghwa Lee:
Cultural Implications of Electronic Communication Usage: A Theory-Based Empirical Analysis.
ICIS 2003: 630-641 |
| 4 | EE | Younghwa Lee,
Zoonky Lee,
Kai R. T. Larsen:
Coping with Internet channel conflict.
Commun. ACM 46(7): 137-142 (2003) |
| 2002 |
| 3 | | Younghwa Lee,
Jintae Lee,
Zoonky Lee:
Integrating Software Lifecycle Process Standards with Security Engineering.
Computers & Security 21(4): 345-355 (2002) |
| 2 | EE | Jintae Lee,
Younghwa Lee:
A holistic model of computer abuse within organizations.
Inf. Manag. Comput. Security 10(2): 57-63 (2002) |
| 2001 |
| 1 | | Younghwa Lee,
Jintae Lee,
Zoonky Lee:
The Effect of Self Identity and Social Identity on Technology Acceptance.
ICIS 2001: 481-490 |