Takip et
Jingguo Wang
Jingguo Wang
Professor of Information Systems, University of Texas at Arlington
uta.edu üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
4902011
Consumer environmental awareness and channel coordination with two substitutable products
L Zhang, J Wang, J You
European Journal of Operational Research 241 (1), 63-73, 2015
4732015
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in human behavior 115, 106178, 2021
2912021
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012
256*2012
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information Systems Journal 24 (1), 61-84, 2014
2162014
Employees' information security policy compliance: A norm activation perspective
A Yazdanmehr, J Wang
Decision Support Systems 92, 36-46, 2016
1902016
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
J Wang, M Gupta, HR Rao
Management Information Systems Quarterly 39 (1), 91-112, 2015
179*2015
A Value-at-Risk Approach to Information Security Investment
J Wang, A Chaudhury, HR Rao
Information Systems Research 19 (1), 106-120, 2008
1632008
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1382016
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1342017
Peers matter: The moderating role of social influence on information security policy compliance
A Yazdanmehr, J Wang, Z Yang
Information Systems Journal 30 (5), 791-844, 2020
872020
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
702011
Coordination of the traditional and the online channels for a short-life-cycle product
L Zhang, J Wang
European Journal of Operational Research 258 (2), 639-651, 2017
652017
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
572009
Impact of smartphones on quality of life: A health information behavior perspective
F Ghahramani, J Wang
Information Systems Frontiers 22 (6), 1275-1290, 2020
562020
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal
Z Yang, J Wang, M Mourali
Journal of Business Research 68 (3), 516-525, 2015
562015
Negotiating wisely: Considerations based on MCDM/MAUT
J Wang, S Zionts
European Journal of Operational Research 188 (1), 191-205, 2008
462008
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
J Wang, Z Shan, M Gupta, HR Rao
MIS Quarterly 43 (2), 601-622, 2019
402019
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
392019
An investigation into the antecedents of prepurchase online search
J Wang, Z Yang, ED Brocato
Information & Management 55 (3), 285-293, 2018
392018
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20