Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 536 | 2011 |
Coordination in emergency response management R Chen, R Sharman, HR Rao, SJ Upadhyaya Communications of the ACM 51 (5), 66-73, 2008 | 479 | 2008 |
Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan YC Ku, R Chen, H Zhang Information & Management 50 (7), 571-581, 2013 | 385 | 2013 |
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email J Wang, T Herath, R Chen, A Vishwanath, HR Rao IEEE transactions on professional communication 55 (4), 345-362, 2012 | 287 | 2012 |
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao Information systems journal 24 (1), 61-84, 2014 | 236 | 2014 |
Web 2.0 emergency applications: How useful can Twitter be for emergency response? A Mills, R Chen, JK Lee, H Raghav Rao Journal of Information Privacy and Security 5 (3), 3-26, 2009 | 232 | 2009 |
Living a private life in public social networks: An exploration of member self-disclosure R Chen Decision support systems 55 (3), 661-668, 2013 | 196 | 2013 |
Member use of social networking sites—an empirical examination R Chen Decision Support Systems 54 (3), 1219-1227, 2013 | 193 | 2013 |
Data model development for fire related extreme events: An activity theory approach R Chen, R Sharman, HR Rao, SJ Upadhyaya Mis Quarterly, 125-147, 2013 | 165 | 2013 |
Learning and self-disclosure behavior on social networking sites: the case of Facebook users R Chen, SK Sharma European Journal of Information Systems 24 (1), 93-106, 2015 | 152 | 2015 |
Self-disclosure at social networking sites: An exploration through relational capitals R Chen, SK Sharma Information systems frontiers 15, 269-278, 2013 | 144 | 2013 |
Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory R Mousavi, R Chen, DJ Kim, K Chen Decision Support Systems 135, 113323, 2020 | 143 | 2020 |
Emergency response information system interoperability: Development of chemical incident response data model R Chen, R Sharman, N Chakravarti, HR Rao, SJ Upadhyaya Journal of the Association for Information Systems 9 (3), 7, 2008 | 139 | 2008 |
Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study M Mousavizadeh, DJ Kim, R Chen Decision Support Systems 92, 79-90, 2016 | 117 | 2016 |
Design principles for critical incident response systems R Chen, R Sharman, HR Rao, S Upadhyaya Information Systems and E-Business Management 5, 201-227, 2007 | 94 | 2007 |
Development of theory of mind on online social networks: Evidence from Facebook, Twitter, Instagram, and Snapchat E Gentina, R Chen, Z Yang Journal of Business Research 124, 652-666, 2021 | 89 | 2021 |
An examination of the effect of recent phishing encounters on phishing susceptibility R Chen, J Gaia, HR Rao Decision Support Systems 133, 113287, 2020 | 81 | 2020 |
Digital natives’ coping with loneliness: Facebook or face-to-face? E Gentina, R Chen Information & Management 56 (6), 103138, 2019 | 79 | 2019 |
An investigation of email processing from a risky decision making perspective R Chen, J Wang, T Herath, HR Rao Decision Support Systems 52 (1), 73-81, 2011 | 76 | 2011 |
Members' site use continuance on Facebook: Examining the role of relational capital R Chen, SK Sharma, HR Rao Decision Support Systems 90, 86-98, 2016 | 65 | 2016 |