Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 538 | 2011 |
Consumer environmental awareness and channel coordination with two substitutable products L Zhang, J Wang, J You European Journal of Operational Research 241 (1), 63-73, 2015 | 510 | 2015 |
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce AU Zafar, J Qiu, Y Li, J Wang, M Shahzad Computers in human behavior 115, 106178, 2021 | 375 | 2021 |
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email J Wang, T Herath, R Chen, A Vishwanath, HR Rao Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012 | 286* | 2012 |
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao Information Systems Journal 24 (1), 61-84, 2014 | 235 | 2014 |
Employees' information security policy compliance: A norm activation perspective A Yazdanmehr, J Wang Decision Support Systems 92, 36-46, 2016 | 213 | 2016 |
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications J Wang, M Gupta, HR Rao Management Information Systems Quarterly 39 (1), 91-112, 2015 | 194* | 2015 |
A Value-at-Risk Approach to Information Security Investment J Wang, A Chaudhury, HR Rao Information Systems Research 19 (1), 106-120, 2008 | 165 | 2008 |
Coping responses in phishing detection: an investigation of antecedents and consequences J Wang, Y Li, HR Rao Information Systems Research 28 (2), 378-396, 2017 | 164 | 2017 |
Overconfidence in phishing email detection J Wang, Y Li, HR Rao Journal of the Association for Information Systems 17 (11), 1, 2016 | 157 | 2016 |
Peers matter: The moderating role of social influence on information security policy compliance A Yazdanmehr, J Wang, Z Yang Information Systems Journal 30 (5), 791-844, 2020 | 98 | 2020 |
An investigation of email processing from a risky decision making perspective R Chen, J Wang, T Herath, HR Rao Decision Support Systems 52 (1), 73-81, 2011 | 76 | 2011 |
Impact of smartphones on quality of life: A health information behavior perspective F Ghahramani, J Wang Information Systems Frontiers 22 (6), 1275-1290, 2020 | 70 | 2020 |
Coordination of the traditional and the online channels for a short-life-cycle product L Zhang, J Wang European Journal of Operational Research 258 (2), 639-651, 2017 | 65 | 2017 |
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal Z Yang, J Wang, M Mourali Journal of Business Research 68 (3), 516-525, 2015 | 60 | 2015 |
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use J Wang, R Chen, T Herath, HR Rao Decision Support Systems 48 (1), 92-102, 2009 | 58 | 2009 |
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts J Wang, Z Shan, M Gupta, HR Rao MIS Quarterly 43 (2), 601-622, 2019 | 56 | 2019 |
Negotiating wisely: Considerations based on MCDM/MAUT J Wang, S Zionts European Journal of Operational Research 188 (1), 191-205, 2008 | 48 | 2008 |
Responding to identity theft: A victimization perspective Y Li, A Yazdanmehr, J Wang, HR Rao Decision Support Systems 121, 13-24, 2019 | 45 | 2019 |
An investigation into the antecedents of prepurchase online search J Wang, Z Yang, ED Brocato Information & Management 55 (3), 285-293, 2018 | 42 | 2018 |