Follow
Jingguo Wang
Jingguo Wang
Professor of Information Systems, University of Texas at Arlington
Verified email at uta.edu
Title
Cited by
Cited by
Year
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
5462011
Consumer environmental awareness and channel coordination with two substitutable products
L Zhang, J Wang, J You
European Journal of Operational Research 241 (1), 63-73, 2015
5142015
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in human behavior 115, 106178, 2021
4012021
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012
290*2012
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information Systems Journal 24 (1), 61-84, 2014
2402014
Employees' information security policy compliance: A norm activation perspective
A Yazdanmehr, J Wang
Decision Support Systems 92, 36-46, 2016
2162016
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
J Wang, M Gupta, HR Rao
Management Information Systems Quarterly 39 (1), 91-112, 2015
199*2015
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1662017
A Value-at-Risk Approach to Information Security Investment
J Wang, A Chaudhury, HR Rao
Information Systems Research 19 (1), 106-120, 2008
1652008
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1592016
Peers matter: The moderating role of social influence on information security policy compliance
A Yazdanmehr, J Wang, Z Yang
Information Systems Journal 30 (5), 791-844, 2020
1032020
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
762011
Impact of smartphones on quality of life: A health information behavior perspective
F Ghahramani, J Wang
Information Systems Frontiers 22 (6), 1275-1290, 2020
732020
Coordination of the traditional and the online channels for a short-life-cycle product
L Zhang, J Wang
European Journal of Operational Research 258 (2), 639-651, 2017
652017
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal
Z Yang, J Wang, M Mourali
Journal of Business Research 68 (3), 516-525, 2015
602015
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
J Wang, Z Shan, M Gupta, HR Rao
MIS Quarterly 43 (2), 601-622, 2019
582019
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
582009
Negotiating wisely: Considerations based on MCDM/MAUT
J Wang, S Zionts
European Journal of Operational Research 188 (1), 191-205, 2008
482008
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
462019
An investigation into the antecedents of prepurchase online search
J Wang, Z Yang, ED Brocato
Information & Management 55 (3), 285-293, 2018
452018
The system can't perform the operation now. Try again later.
Articles 1–20