Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks KL Hui, SH Kim, QH Wang MIS Quarterly, 2017 | 144 | 2017 |
A comparative study of cyberattacks SH Kim, QH Wang, JB Ullrich Communications of the ACM 55 (3), 66-73, 2012 | 94 | 2012 |
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers I Png, QH Wang Journal of Management Information Systems 26 (2), 97-121, 2009 | 89 | 2009 |
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence I Png, CY Wang, QH Wang Journal of Management Information Systems 25 (2), 125-144, 2008 | 87 | 2008 |
See no evil, hear no evil? Dissecting the impact of online hacker forums WT Yue, QH Wang, KL Hui Mis Quarterly 43 (1), 73-A20, 2019 | 74 | 2019 |
Copyright law and the supply of creative work: Evidence from the movies IPL Png, QH Wang Manuscript, National University of Singapore, 2009 | 48* | 2009 |
Information security: User precautions, attacker efforts, and enforcement IPL Png, QH Wang System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-11, 2009 | 39* | 2009 |
How to derive causal insights for digital commerce in China? A research commentary on computational social science methods DCW Phang, K Wang, Q Wang, RJ Kauffman, M Naldi Electronic Commerce Research and Applications 35, 100837, 2019 | 38 | 2019 |
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for A Cross-Section of MMORPGs QH Wang, V Mayer-Schönberger, X Yang Information Systems Frontier 15 (3), 481-495, 2013 | 36* | 2013 |
Cyber Attacks: Cross-Country Interdependence and Enforcement QH Wang, SH Kim The Eighth Workshop on the Economics of Information Security (WEIS 2009), 2009 | 24 | 2009 |
Delayed Product Introduction QH Wang, KL Hui Decision Support Systems, 53 (4), 870-880, 2012 | 22 | 2012 |
Do hackers seek variety? An empirical analysis of website defacements KW Ooi, SH Kim, QH Wang, KL Hui AIS, 2012 | 19 | 2012 |
Copyright duration and the supply of creative work IPL Png, QH Wang Manuscript, National University of Singapore, 2009 | 18 | 2009 |
Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack KL Hui, SH KIM, QH Wang Wiley: 24 months, 2013 | 14 | 2013 |
Do Hacker Forums Contribute to Security Attacks? QH Wang, WT Yue, KL Hui Lecture Notes in Business Information Processing 108, 143-152, 2011 | 14 | 2011 |
Cyberattacks: Does Physical Boundry Matter? QH Wang, SH Kim ICIS 2009 Proceedings 48, 2009 | 13 | 2009 |
From offline to online: how health insurance policies drive the demand for online healthcare service? Y Yu, QY MEI, QH Wang AIS, 2016 | 12 | 2016 |
Technology mergers and acquisitions in the presence of an installed base: a strategic analysis QH Wang, KL Hui Information Systems Research, 2017 | 9 | 2017 |
To launch or not to launch: An economic analysis of delayed product introduction QH Wang, KL Hui Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 7* | 2005 |
Driving cybersecurity policy insights from information on the internet QH Wang, SM Miller, RH Deng IEEE Security & Privacy 18 (6), 42-50, 2020 | 5 | 2020 |