Follow
Jingguo Wang
Jingguo Wang
Professor of Information Systems, University of Texas at Arlington
Verified email at uta.edu
Title
Cited by
Cited by
Year
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
4902011
Consumer environmental awareness and channel coordination with two substitutable products
L Zhang, J Wang, J You
European Journal of Operational Research 241 (1), 63-73, 2015
4732015
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in human behavior 115, 106178, 2021
2892021
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012
256*2012
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information Systems Journal 24 (1), 61-84, 2014
2132014
Employees' information security policy compliance: A norm activation perspective
A Yazdanmehr, J Wang
Decision Support Systems 92, 36-46, 2016
1892016
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
J Wang, M Gupta, HR Rao
Management Information Systems Quarterly 39 (1), 91-112, 2015
179*2015
A Value-at-Risk Approach to Information Security Investment
J Wang, A Chaudhury, HR Rao
Information Systems Research 19 (1), 106-120, 2008
1632008
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1382016
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1342017
Peers matter: The moderating role of social influence on information security policy compliance
A Yazdanmehr, J Wang, Z Yang
Information Systems Journal 30 (5), 791-844, 2020
872020
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
702011
Coordination of the traditional and the online channels for a short-life-cycle product
L Zhang, J Wang
European Journal of Operational Research 258 (2), 639-651, 2017
652017
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
572009
Impact of smartphones on quality of life: A health information behavior perspective
F Ghahramani, J Wang
Information Systems Frontiers 22 (6), 1275-1290, 2020
562020
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal
Z Yang, J Wang, M Mourali
Journal of Business Research 68 (3), 516-525, 2015
562015
Negotiating wisely: Considerations based on MCDM/MAUT
J Wang, S Zionts
European Journal of Operational Research 188 (1), 191-205, 2008
462008
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
J Wang, Z Shan, M Gupta, HR Rao
MIS Quarterly 43 (2), 601-622, 2019
402019
An investigation into the antecedents of prepurchase online search
J Wang, Z Yang, ED Brocato
Information & Management 55 (3), 285-293, 2018
392018
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
382019
The system can't perform the operation now. Try again later.
Articles 1–20