基本資料:

  • 姓名:陳志誠
  • Email:chenps@gm.ttu.edu.tw
  • 單位系所/職稱:
  • 資訊經營學系 榮譽教授

期刊論文:

  • 1. Hau-Ming Chang, Shu-Chiung Lin, Patrick Shicheng Che, Chieh-Hsiu Hsieh(2019). Protection of HTML5 CORS Security. TATUNG Journal, 34, 103-115.
  • 2. Patrick S. Chen, David C. Yen, Shu-Chiung Lin, Chien Shan Chou(2018). Toward an IT Investment Decision Model for Global Enterprises. Computer Standards & Interfaces, 59. SSCI
  • 3. Patrick S. Chen, Peterson Julian(2018). Bus Model with a Rectangular Service Zone Revisit. Journal of Transportation Engineering, Part A: Systems, 144. SCIE(SCI)
  • 4.陳志誠、林淑瓊、劉用貴、趙乃青(2018)。BYOD導入企業之關鍵管理因素:組織資訊安全管理觀點。中華民國資訊管理學報,25(1)。TSSCI
  • 5. Patrick S. Chen, Shu-Chiung Lin, Chien-Hsing Sun(2016). Simple and Effective Method for Detecting Abnormal Internet Behaviors of Mobile Devices. Information Sciences, 321. SCIE(SCI)
  • 6. Patrick S. Chen, David C. Yen, Shu-Chiung Lin(2015). The classification of information assets and risk assessment: An exploratory study using the case of C-Bank. Journal of Global Information Management, 23(4). SSCI
  • 7. Shu-Chiung Lin, Sheng-Wei Lin, Patrick S. Chen, Yung-Kuei Liu(2015). Adoption of 4G Wireless Services under Consideration of Technology and Economic Perspectives. International Journal of Mobile Communications, 13(1). SSCI
  • 8. Georg Hauer, Julia Kroll, David C. Yen, Patrick S. Chen, Shu-Chiung Lin(2015). A Performance Measurement Framework for Service-Oriented Marketing. Total Quality Management & Business Excellence, 2015.
  • 9. Shu-Chiung Lin, Patrick S. Chen, Chia-ching Chang(2014). A Novel Method of Mining Network Flow to Detect P2P Botnets. Peer-to-Peer Networking and Applications, 7. SCIE(SCI)
  • 10. Shu-Chiung Lin, David C. Yen, Patrick S. Chen, Wei-Kuo Lin(2013). Coding Behavior of Authentication Code on the Internet. Computers in Human Behavior, 29. SSCI
  • 11. Ching-Tsan Tsai, Fung-Chang Sung, Patrick S. Chen, Shu-Chiung Lin(2012). Exploring the Spatial and Temporal Relationships between Mosquito Population Dynamics and Dengue Outbreaks Based on Climatic Factors. Stochastic Environmental Research & Risk Assessment, 26(5). SCIE(SCI)
  • 12.陳志誠、林淑瓊、劉用貴、黃芳瑛(2012)。在異質營運環境中導入資訊系統之關鍵成功因素─以跨兩岸三地企業集團導入ERP為例。商略學報,4(4)。
  • 13.陳志誠、柯巧心、陳巧珮(2010)。線上遊戲犯罪模式分析之實證研究。Journal of Information, Technology and Society,10(2),25-50。
  • 14.陳志誠、黃志煌、高世宇、范綱仁、吳思萱(2010)。讓效能伸向遠方 -小型物流ERP。International Conference on the Development and Application of Enterprise Resource Management 2010,2010。
  • 15.廖文華、陳志誠、張家慶(2010)。使用資料探勘技術偵測P2P殭屍網路之方法。前瞻通信,2010。
  • 16. Patrick S. Chen, Shing-Han Li(2010). SCHEDULING THE ACCESS TO MULTI-LEVEL SECURE DATABASES IN A WIRELESS NETWORK ENVIRONMENT. International Journal of Innovative Computing, Information and Control, 6(12). SCIE(SCI)
  • 17.陳志誠、林淑瓊、李興漢、許派立(2009)。資訊資產分類與風險評鑑之研究-以銀行業者為例。資訊管理學報,16(3)。
  • 18.陳志誠、藍崇鳴(2009)。電子商務身份認證之概述。資通安全分析專論,2009。
  • 19.陳志誠、林淑瓊、李興漢、許派立(2009)。資訊資產分類與風險評鑑之研究—以銀行業為例。資訊管理學報,16(3),55-84。TSSCI
  • 20.陳志誠、藍崇鳴(2008)。電子化企業數位內容通訊管理機制。通安全分析專論,2008。
  • 21.陳志誠、洪承輿、柯巧心、陳英傑(2008)。一個虛擬資產描述語言之設計與應用。資訊、科技與社會,8(1)。
  • 22. Patrick S. Chen(2008). A faceted approach to information retrieval. Journal of Information & Optimization Sciences, 29 (2008)(4), 631-658.
  • 23.陳志誠、劉用貴(2007)。RFID在檔案管理之應用。檔案與微縮,87,1—12。
  • 24.陳志誠、曾章瑞、劉用貴(2007)。企業入口網站安全議題及強化措施。資通安全分析專論,2007。
  • 25.曾章瑞、陳志誠、林靖、翁慶祝、劉用貴(2007)。個人化知識管理網站安全機制之研究。資通安全分析專論,2007。
  • 26.陳志誠(2007)。電子檔案管理及其相關問題。檔案與微縮,85,7—19。
  • 27.陳志誠、彭彥倫(2007)。恐怖主義可能實施的資訊戰及其反制措施。恐怖主義與國家安全,2007,102-117。
  • 28.陳志誠、蔡文峰、廖文昌(2006)。e 化勤務指管系統之規劃-植基於現代化通訊系統。執法新知論衡,2(2),35-61。
  • 29.陳志誠、曾章瑞、彭彥倫(2006)。資訊戰在反恐怖主義之具體作為。資通安全分析專論,2006。
  • 30.陳志誠(2006)。檔案管理與實際行政作業之結合――以德國地方行政機關為例。檔案與微縮,(81),11 - 16。
  • 31.曾章瑞、陳志誠、張榮鋒(2006)。認識資訊戰、資訊作戰及政府應有軍政作為。資通安全分析專論,2006。
  • 32. Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shiehchieh Chou(2006). Mining Criminal Databases to Finding Investigation Clues – By Example of Stolen Automobiles Database. LNCS, 2006, 91-102. SCIE(SCI)
  • 33. Ying-Chieh Chen, Patrick S. Chen, Larry Korba, Ronggong Song, George Yee(2005). Analysis of Online Gaming Crime Characteristics. Journal of Internet Research, 15(3). SCIE(SCI)
  • 34. P. Chu, K.-L. Yang, Patrick. S. Chen(2005). Improved Inventory Models with Service Level and Lead Time. Computer & Operations Research, 32 (2005). SCIE(SCI)
  • 35.陳志誠、曾德宜、蔡旻峰(2005)。由管理觀點探討數位鑑識實驗室之建置標。執法新知論衡,1(1),55-72。
  • 36.陳志誠、宋子傑(2005)。在無線網路環境中基於用戶優先權與利他鎖定之多級安全資料庫存取控制。資訊安全通訊,11(3)。
  • 37.陳志誠、曾德宜、蔡旻峰(2005)。由管理觀點探討數位證據實驗室之建置標準。執法新知論衡,1(1),55-72。
  • 38.陳志誠(2005)。信用卡網路交易特約商店防盜刷機制。程科技通訊,(80),93—95。
  • 39.陳志誠(2005)。在電子化公文環境中加強資訊安全之策略。檔案與微縮,77,1—17。
  • 40.陳志誠(2005)。信用卡網路交易防盜刷機制。工程科技通訊,(80)。
  • 41.陳志誠(2005)。資訊戰及其對國家社會安全之影響。資通安全分析專論,2005。
  • 42.陳志誠(2004)。資訊科技對檔案學術之影響(二)。檔案與微縮,74。
  • 43.陳志誠、詹培萱(2004)。資訊科技對檔案學術之影響(一)。檔案與微縮,72。
  • 44. Patrick S. Chen & Pe, P. Chan(2004). Using Text Mining in Finding Criminal Data on the Web. 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004, 2004.
  • 45. Peter Chu, Patrick S. Chen, Thomas Niu(2003). Note on supplier-restricted order quantity under temporary price discounts. Mathematical Methods of Operations Research, 57(3). SCIE(SCI)
  • 46. P. Chu, P. S. Chen(2001). Solving Stochastic Demand Inventory Models with Uncertain Data. accepted by the Journal of Interdisciplinary Mathematics, 2001.
  • 47. P. S. Chen(2001). On the minimum solution of the inventory system for deterioration items with shortages and time-varying demand. Journal of Information & Optimization Sciences, 22(3). SCIE(SCI)
  • 48. P. Deng, P. S. Chen, P. Chiu(2001). Cohen’s Inventory Model Revisited. accepted by the Journal of Interdisciplinary Mathematics, 2001.
  • 49. Patrick S. Chen, Peter Chu, Michelle Lin(2001). On Vargas’s Proof of Consistency Test for 3x3 Comparison Matrices in AHP. Journal of Operations Research of Japan, 45(3), 233-242. SCIE(SCI)
  • 50. P. S. Chen(2001). The Solution of the Constant Partially Backlogging Inventory Model under Rectangular Coordinate System. Journal of Statistics & Management System, 2001.
  • 51. P. Chu, P. S. Chen(2001). A Note on the Procedure for Synthesizing Ratio Judgements. Journal of Discrete Mathematical Sciences & Cryptography, 2001.
  • 52. M. H. Wang, P. S. Chen(2001). Goyal’s inventory model revisited. Journal of Information & Optimization Sciences, 22(1), 123-128.
  • 53. P. S. Chen(2001). Approximation of the Partially Backlogging Ratio of Inventory Models. the Journal of Interdisciplinary Mathematics, 2001.
  • 54. P. Chu, P. S. Chen(2001). A Note on Inventory Replenishment Policies for Deteriorating Items in an exponentially Declining Market. Computers & Operations Research, 2001.
  • 55. P. S. Chen, P. Chu(2001). Applying Lanchester’s Linear Law to Model the Ardennes Champaign. Naval Research Logistics, 48, 653-661.
  • 56. P. S. Chen, P. Chu(2001). The Impact of Time-Varying Demand and Production Rates on Determining Inventory Policy. Mathematical Methods of Operations Research, 2001.
  • 57.陳志誠、鄧少華、顏志平 & 董正談(2001)。生物特徵辨識技術之剖析。資訊安全通訊,7(2)。
  • 58.陳志誠、侯聯松(2001)。資料倉儲在決策資援之應用—以台灣地區溺水事件分析為例。第四屆網際空間: 資訊、法律與社會學術研究暨實務研討會論文集(I),2001,460-471。
  • 59.陳志誠、侯聯松(2001)。推播技術及其在資訊傳播之作用。檔案與微縮季刊,(60),14-39。
  • 60.陳志誠、黃英俊(2000)。警政資訊系統防火牆之設置與其安全之運作。警學叢刊,第31卷,(1),163-189。
  • 61. P. S. Chen, P. Chu(2000). A simple Method to Fit the Lanchester’s Linear Model for Ardennes Champaign. Journal of Information & Optimization Sciences, 21(3), 421-427.
  • 62. P. Deng, P. S. Chen(2000). On the Inventory Model with a One-time Opportunity to Order Extra Items. the Journal of Discrete Mathematical Sciences & Cryptography, 2000.
  • 63. P. S. Chen(2000). An Automatic System for Collecting Crime Information on the Internet. Journal of Information, Law and Technology, 2000. SSCI/EI
  • 64. P. S. Chen, P. Chu(2000). An Efficient Algorithm to Compute the Actual Service Level at each Maintenance Facility of a Two-Echelon Inventory System. Journal of Information & Optimization Sciences, 21(2000).
  • 65.陳志誠(1998)。地理資訊系統之設計與實作-以治安斑點圖為例。警學叢刊,第29卷,第3期,中央警察大學,29(3)。
  • 66.陳志誠(1998)。指紋資訊與國民身分証明。資訊安全通訊,Vol.5(1), 中華民國資訊安全學會,5(1),33-40。
  • 67.陳志誠(1998)。論電腦指紋識別之前處理技術。警政學報,第33期,中央警察大學,(33)。
  • 68.邱承迪、陳志誠(1998)。網路上犯罪情報之蒐集方。警學叢刊,第29卷,第2期,29(2),203-218。
  • 69.陳志誠、鄧少華(1998)。運用子圖匹配法於指紋識別。警政學報,1997。
  • 70. P.S.Chen, R. Hennicker & M. Ja(1995). On the Retrieval of Formal Specifications for Reuse. Journal of the Chinese Institute of Engineers, 1995.
  • 71.陳志誠(1994)。On Inference Rules of Logic-Based Retrieval Systems。Information Processing & Management,30(1),43-59。SCIE(SCI)/SSCI
  • 72. P.S.Chen(1989). On Structural Knowledge Base and Computational Reasoning. Journal of Lanzhou University, 1989.

研討會論文

  • 1.陳志誠(2018)。以SSL/TLS與CA流量分析偵測網路連結安全性。2018資訊技術與產業應用國際研討會R.O.C。
  • 2.陳慶祥、陳志誠(2018)。以SSL/TLS與CA流量分析偵測網路連結安全性。ITIA 2018 資訊技術與產業應用國際研討會R.O.C。
  • 3.陳志誠、簡燕鳳、吳鴻麟(2012)。金融決策之情境推理。KC2012 第八屆知識社群國際研討會R.O.C。
  • 4.陳志誠、簡燕鳳、吳鴻麟(2012)。資訊擷取技術在金融操作上之應用。2012 第八屆知識社群國際研討會,中國文化大學,台北R.O.C。
  • 5. Patrick S Chen, Lin, Shu-Chiung, WeiHeng Lin(2011). Constructing a Public Health Information System for Assisting Dengue Fever Control. 2011 International Conference on Environment Science and Engineering. Indonesia.
  • 6. Patrick S. Chen, Kung-Shen Lee(2010). HARNESSING FINANCIAL RISK USING INFORMATION TECHNOLOGY. ISTAM2010. United States of America.
  • 7.陳志誠、林毓超(2010)。基於特殊點向量關係的圖像形狀相似性檢測。Proceedings of Information Technologies Applications and Management Conference, kaohsiungR.O.C。
  • 8.陳志誠、黃志煌、范綱仁、高世宇、吳思萱(2010)。讓效能伸向遠方 小型物流ERP。Proceedings of International Conference on the Development and Application of Enterprise Resource MaR.O.C。
  • 9. Patrick S. Chen, Yung-Kuei Liu(2009). An Efficient Scheduler for Accessing Multi-Level Secure Databases in Wireless Environment. IEEE 2nd International Conference on Computer Science and its Applications(頁 342-354 ). Republic of Korea.
  • 10.陳志誠、張育偉(2008)。證據鏈管理研究─作業程序系統化協助管理數位證據。International Conference on Accounting and Information TechnologyR.O.C。
  • 11.陳志誠、李坤昇(2008)。利用催收控管系統來降低逾期風險-以U銀行車貸部門為例。International Conference on Accounting and Information TechnologyR.O.C。
  • 12.陳志誠、林淑瓊(2008)。A study of factors in successful ERP for cross-strait enterprise an electronic C. case in Taiwan。Proceedings of WMSCI 2008United States of America。
  • 13. Patrick S. Chen, Perry Shi, Shu-Chiung Lin(2008). A study of risk assessment of information assets in banking industry - a case of Taiwans bank. Proceedings of WMSCI 2008. United States of America.
  • 14. Patrick S. Chen, Cheng-Yu Hung, Chiao-Hsin Ko, Ying-Chieh Chen(2008). Preservation of Evidence in Case of Online Gaming Crime. Lecture Notes on Computer Science 5075, Spring Verlag, 2008(頁 229-244). United States of America.
  • 15. Jang-Ruey Tzeng, Patrick S .Chen, Hung-Chi Chen, Zhong-Xi Lin, Lian-Song Hou(2007). A Portal for Academic Meetings and Its Applications in Information Dissemination. Proceedings of WMSCI Orlando, USA 2007. United States of America.
  • 16. Patrick S.Chen, Fang-Ying Huang, Wally Su(2007). Research on the Critical Success Factors of Implementing ERP in the Cross-strait Enterprises. Proceedings of International Conference on Business and Information. Japan.
  • 17. Patrick S. Chen, Tseng Chi-Hsing(2007). A study on Utilizing OTP Technique to Tackle Phishing Attack. Proceedings of International Conference on Business and Information. Japan.
  • 18. J.-R. Tzeng, Patrick S. Chen, W.-H. Tsao(2007). Location-Based SMS Information Push System– Its Architecture, Design, and Applications. Proceddings of International Conference on Business and Information. Japan.
  • 19. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba(2005). Online Gaming Crime and Security Issue– Cases and Countermeasures from Taiwan. Second Annual Conference on Privacy, Security and Trust, Fredericton, N.B., Canada. Canada.
  • 20. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, George Yee, Larry Korba(2005). Classification of Online Gaming Crime and Security. 2005 IRMA International conference. United States of America.
  • 21. Ying-Chieh Chen, Patrick S. Chen, George Yee, Ronggong Song, Larry Korba(2005). Online Gaming Cheating and Security Issue. International Conference on Information Technology (ITCC) 2005. United States of America.
  • 22. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, George Yee, Larry Korba(2005). Taxonomy of Online Gaming Crime and Security. Taxonomy of Online Gaming Crime and Security. United States of America.
  • 23. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba(2004). Online Gaming Crime and Security Issue– Cases and Countermeasures from Taiwan. Second Annual Conference on Privacy, Security and Trust, Fredericton. Canada.
  • 24. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba(2004). Online Gaming Crime and Security Issue– Cases and Countermeasures from Taiwan. The Second Annual Conference on Privacy, Security and Trust Conference at Fredericton. Canada.
  • 25. Ying-Chieh Chen, Patrick S. Chen, Shu-Kuo Lin(2004). Online Game Crime and Security Issues - Taking Examples from Chinese Taipei. The Policing Cyberspace International Conference (POLCYB 2004), Richmond, B.C., Canada. Canada.
  • 26. Ying-Chieh Chen, Patrick S. Chen, Shu-Kuo Lin(2004). Online Game Crime and Security Issues - Taking Examples from Chinese Taipei. The Policing Cyberspace International Conference (POLCYB 2004). United States of America.
  • 27. Patrick S. Chen, Peggy P. Chan(2004). Using Text Mining in Finding Criminal Data on the Web. 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004). United States of America.
  • 28. P.S.Chen, M. Jarke(1991). A Decision-Making Model for Query Evaluation. the First Internation Workshop on Non-Standard Queries and Answers. France.
  • 29. P.S.Chen, Z. Zhou(1988). DECISION-MAKER from the Viewpoint of Decision-Making Software. Proc. of ISAHP88. Mainland China.

專書