Follow
Jingguo Wang
Jingguo Wang
Professor of Information Systems, University of Texas at Arlington
Verified email at uta.edu
Title
Cited by
Cited by
Year
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
5382011
Consumer environmental awareness and channel coordination with two substitutable products
L Zhang, J Wang, J You
European Journal of Operational Research 241 (1), 63-73, 2015
5102015
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in human behavior 115, 106178, 2021
3752021
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012
286*2012
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information Systems Journal 24 (1), 61-84, 2014
2352014
Employees' information security policy compliance: A norm activation perspective
A Yazdanmehr, J Wang
Decision Support Systems 92, 36-46, 2016
2132016
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
J Wang, M Gupta, HR Rao
Management Information Systems Quarterly 39 (1), 91-112, 2015
194*2015
A Value-at-Risk Approach to Information Security Investment
J Wang, A Chaudhury, HR Rao
Information Systems Research 19 (1), 106-120, 2008
1652008
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1642017
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1572016
Peers matter: The moderating role of social influence on information security policy compliance
A Yazdanmehr, J Wang, Z Yang
Information Systems Journal 30 (5), 791-844, 2020
982020
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
762011
Impact of smartphones on quality of life: A health information behavior perspective
F Ghahramani, J Wang
Information Systems Frontiers 22 (6), 1275-1290, 2020
702020
Coordination of the traditional and the online channels for a short-life-cycle product
L Zhang, J Wang
European Journal of Operational Research 258 (2), 639-651, 2017
652017
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal
Z Yang, J Wang, M Mourali
Journal of Business Research 68 (3), 516-525, 2015
602015
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
582009
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
J Wang, Z Shan, M Gupta, HR Rao
MIS Quarterly 43 (2), 601-622, 2019
562019
Negotiating wisely: Considerations based on MCDM/MAUT
J Wang, S Zionts
European Journal of Operational Research 188 (1), 191-205, 2008
482008
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
452019
An investigation into the antecedents of prepurchase online search
J Wang, Z Yang, ED Brocato
Information & Management 55 (3), 285-293, 2018
422018
The system can't perform the operation now. Try again later.
Articles 1–20