古政元

教授

研究室

管理二館MB314

校內分機

57413

E-mail

cooper.c.y.ku[at]gmail.com

實驗室

通訊網路實驗室

通訊網路實驗室

地點:管理二館MB107

分機:57421

研究領域

電腦與資料通訊網路

資訊安全

電子與行動商務

開授課程

隨機過程

資訊安全

商用資料通訊

教師學歷

  • 美國 西北大學 電機工程與資訊科學博士

教師經歷

  • 國立中正大學 資訊管理系所 教授兼管理學院副院長暨EMBA執行長
  • 國立中正大學 資訊管理系所 教授兼系主任暨所長
  • 國立中正大學 資訊管理系所 教授
  • 國立中正大學 資訊管理系所 副教授
  • 國立中正大學 資訊管理系所 助理教授
  • 義守大學 資訊工程系所 副教授
  • 美國 西北大學 電機工程與資訊科學系所 研究助理

研究領域

  • 電腦與資料通訊網路
  • 資訊安全
  • 電子與行動商務

開授課程

  • 隨機過程
  • 資訊安全
  • 商用資料通訊

期刊論文

  • 1.Po-Ling Sun, Cheng-Yuan Ku, and Dong-Her Shih, “An Implementation Framework for E-Government 2.0,” Telematics and Informatics, Forthcoming. (SSCI)
  • 2.Tsung-Sheng Chang, Hsin-Pin Fu, and Cheng-Yuan Ku, “A Novel Model to Implement ERP Based on Dynamic Capabilities - A Case Study of An IC Design Company,” Journal of Manufacturing Technology Management, Forthcoming.
  • 3.Tsung-Han Yang, Cheng-Yuan Ku, and Man-Nung Liu, “An Integrated System for Information Security Management with the Unified Framework,” Journal of Risk Research, Forthcoming. (SSCI)
  • 4.Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, “House Selection via the Internet by Considering Homebuyers' Risk Attitudes with S-shaped Utility Functions,” European Journal of Operational Research, vol. 241, no. 1, pp. 188-201, Feb. 2015. (SCI)
  • 5.Po-Ling Sun and Cheng-Yuan Ku, “Review of Threats on Trust and Reputation Models,” Industrial Management & Data System, vol. 114, no. 3, pp. 472-483, 2014. (SCI)
  • 6.Cheng-Yuan Ku, Pei-Chen Sung and Wen-Huai Hsieh, “Policy Satisfaction for Separation of Dispensing from Medical Practices in Taiwan: Success of the Prescription-Release Information System,” Telematics and Informatics, vol. 31, no. 2, pp. 334-343, May 2014. (SSCI)
  • 7.Pei-Chen Sung, Cheng-Yuan Ku, and Chien-Yuan Su, “Understanding the Propagation Dynamics of Multipartite Computer Virus,” Industrial Management & Data System, vol. 114, no. 1, pp. 86-106, 2014. (SCI)
  • 8.Hsin-Pin Fu, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang, Cheng-Hsin Huang, “The Critical Success Factors Affecting the Adoption of an Inter-Organization System by SMEs,” Journal of Business and Industrial Marketing, vol. 29, no. 5, pp. 400-416, 2014. (SSCI)
  • 9.Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, "Grey Theory Analysis of Online Population and Online Game Industry Revenue in Taiwan," Technological Forecasting and Social Change, vol. 80, pp. 175-185, 2013. (SSCI)
  • 10.Hui-Ping Ho, Ching-Ter Chang, and Cheng-Yuan Ku, “On the Location Selection Problem Using Analytic Hierarchy Process and Multi-Choice Goal Programming,” International Journal of Systems Science, vol. 44, no. 1, pp. 94-108, Jan. 2013. (SCI)
  • 11.Cheng-Yuan Ku, Yi-Wen Chang, and Chun-Wei Kuo, “A Method to Accelerate the Computation of Successive Approximation,” Advanced Science Letters, vol. 16, no. 1, pp. 326-331, Sep. 2012. (SCI)
  • 12.Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen and Wen-Huai Hsieh, “Electronic Hand-Drafting and Picture Management System,” Journal of Medical Systems, vol. 36, no. 4, pp. 2297-2307, Aug. 2012. (SCI)
  • 13.Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, “Aligning Websites with Enterprise Success: An Evaluative Approach,” Journal of Computer Information Systems, vol. 52, no. 4, pp. 49-58, summer 2012. (SCI)
  • 14.Hsieh-Hong Huang, Jack Shih-Chieh Hsu, and Cheng-Yuan Ku, “Understanding the role of computer-mediated counter-argument in countering confirmation bias,” Decision Support Systems, vol. 53, no. 3, pp. 438-447, Jun. 2012. (SCI)
  • 15.Cheng-Yuan Ku and Yi-Wen Chang, “Optimal Production and Selling Policies with Fixed-Price Contracts and Contingent-Price Offers”, International Journal of Production Economics, vol. 137, no. 1, pp. 94-101, May 2012. (SCI)
  • 16.Ching-Ter Chang, Cheng-Yuan Ku, Hui-Ping Ho, and Chechen Liao, “A MCGP Decision Aid for Homebuyers to Make the Best Choice,” Quality & Quantity, vol. 45, no. 4, pp. 969-983, Jun. 2011. (SSCI)
  • 17.Mi-Cheng Lu, Cheng-Yuan Ku, Lain-Chyr Hwang, and Hui-Ming Chao, “Using Smart Card in RFID Infrastructure to Protect Consumer Privacy,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 4, pp. 1777-1788, Apr. 2011. (SCI)
  • 18.Tsung-Han Yang, Cheng-Yuan Ku, David C. Yen and Yi-Chen Lin, “Utilizing the Interactive Techniques to Achieve Automated Service Composition for Web Services,” Journal of High Speed Networks, vol. 17, no. 4, pp. 219-236, 2010. (SCI)
  • 19.Lain-Chyr Hwang, Chao-Wei Chou, and Cheng-Yuan Ku, and Jen-Hao Teng “Pseudo Inverse Functions of Service Curves for Deadline Calculations,” International Journal of Innovative Computing, Information and Control, vol. 6, no. 8, pp. 3595–3610, August 2010. (SCI)
  • 20.Cheng-Yuan Ku, Ching-Ter Chang, and Hui-Ping Ho, “Global Supplier Selection Using Fuzzy Analytic Hierarchy Process and Fuzzy Goal Programming,” Quality & Quantity, vol. 44, no. 4, pp. 623-640, Jun. 2010. (SSCI)
  • 21.Ching-Ter Chang, Cheng-Yuan Ku, and Hui-Ping Ho, “Fuzzy Multi-choice Goal Programming for Supplier Selection,” International Journal of Operations Research and Information Systems, vol. 1, no. 3, pp. 28-52, 2010.

研討會論文

  • 1.Man-Nung Liu, Cheng-Yuan Ku and Tsung-Han Yang, 2014 May, “A Secure Software Development Framework Based on Security Patterns,” Proceedings of TIIM 2014, Seoul, Korea.
  • 2.Tsung-Han Yang, Cheng-Yuan Ku, Yung-Ting Chuang, 2014 Apr., “An Integrated Risk Analysis Framework for Improving Security of Software Development Life Cycle,” Proceedings of WDSI 2014, Napa Valley, California, U.S.A.
  • 3.Po-Ling Sun and Cheng-Yuan Ku, 2013 Aug., “Trust Management Model for QoS-driven Web Service Selection,” Proceedings of 2013 International Conference on Medical Innovation and Computing Service, Tainan, Taiwan, R.O.C.
  • 4.Hui-Ping Ho, Ching-Ter Chang and Cheng-Yuan Ku, 2013 Jun., “House Selection via Internet by considering Homebuyers’ Risk Attitudes,” PACIS 2013 Proceedings, Paper 151, Jeju Island, Korea, http://aisel.aisnet.org/pacis2013/151.
  • 5.Cheng-Yuan Ku and Yu-Siang Chiu, 2013 May, “A Novel Infrastructure for Data Sanitization in Cloud Computing,” Proceedings of TIIM 2013, Phuket, Thailand, pp. 72.
  • 6.Cheng-Yuan Ku, and Chien-Te Ho, 2013 Mar., “A Security Mechanism for Cloud Computing Based on Trust Platform Module,” Proceedings of WDSI 2013, Long Beach, California, U.S.A., paper 55.
  • 7.Tsung-Sheng Chang, Cheng-Yuan Ku and Hsin-Pin Fu, 2013 Jan., “Solving Optimal Match-up Problem with Heuristics Algorithm: A Simulation-based Investigation,” International Conference on Innovation and Management (IAM 2013 Winter), Sapporo, Japan.
  • 8.Wei-Hsi Hung, Robert John McQueen, Cheng-Yuan Ku, and Li-Min Chang, 2012 Apr., “Assessing Alignment of Websites with Enterprise Success,” Proceedings of WDSI 2012, Big Island, Hawaii, U.S.A., pp. 349-350.
  • 9.Ja-Long Chen, Cheng-Yuan Ku, and David C. Yen, 2012 Apr., “An Efficient Key Management Scheme for Multicast Communication,” Proceedings of WDSI 2012, Big Island, Hawaii, U.S.A., pp. 373-374.
  • 10.Cheng-Yuan Ku and Chih Zhe Hung, 2011 Dec., “An Anonymous and Non-framing Watermarking Protocol for Digital Right Management,” Online Proceedings of World Business and Economics Research Conference, Auckland, New Zealand, http://www.wbiconpro.com/513-Cheng-Yuan.pdf.
  • 11.Cheng-Yuan Ku, Yi-Chang Lee, Yi-Hsien Lin, and Yi-Wen Chang, 2011 Aug., “A Detection Method for Replication Attacks in Wireless Sensor Networks,” Proceedings of International Conference on HumanCom and EMC 2011, Enshi, China, pp. 235-244.
  • 12.Cheng-Yuan Ku, 2011 Apr., “System Design of Active Detection for Alternate Data Streams in the NTFS File”, CD Proceeding of TBI
  • 13.Cheng-Yuan Ku, 2011 Apr., “A Client-based Handoff Algorithm for 4G Networks Using Fuzzy Decision”, CD Proceeding of TBI
  • 14.Cheng-Yuan Ku, 2011 Apr., “The Efficient Broadcast Authentication Mechanism for Wireless Sensor Network Using GPS and HAS”, CD Proceeding of TBI
  • 15.Cheng-Yuan Ku, 2011 Apr., “A Secure and Anonymous Protocol for Online Reporting System”, CD Proceeding of TBI
  • 16.Cheng-Yuan Ku, 2010 Jul., “Continuous and Dynamic Pricing Strategy with Inventory Control and Multiple Demands” presented in 2010 ACME, Macau.

實驗室介紹

本實驗室主要著重在資訊科技與網路技術的整合應用,以連結產業發展的學術研究與產學需求為主軸,理論與實務並重。研究從事電腦網路相關應用技術開發,以及此方面的基礎理論。主題有無線感測網路 (WSN)和長期演進技術(LTE)等網路之攻擊偵測與防護、拓樸研究、模型最佳化與網路模型模擬;也針對物聯網(IoT)和軟體定義網路(SDN)等系統解決其安全或資源分配之問題;另外包括電子與行動商務層面的信任聲譽模型、服務水平協議(SLA)和資訊安全系統架構之分析與風險評估等。希冀藉由理論與實務並行的方式訓練成員熟悉相關技術和應用。

實驗室方向

電腦與通訊網路
資訊安全
電子與行動商務

研究工具

Java
C++ or C#
Networking Simulators
Computer Networks
Information Security

基礎需求

Programming
Computer Networks
Wireless Sensor Networks
Information Security

可供聯絡之學長姊

黃淑容 / hsr.long@gmail.com

實驗室花絮