Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 543 | 2011 |
Consumer environmental awareness and channel coordination with two substitutable products L Zhang, J Wang, J You European Journal of Operational Research 241 (1), 63-73, 2015 | 514 | 2015 |
Endophytic fungi for producing bioactive compounds originally from their host plants J Zhao, L Zhou, J Wang, T Shan, L Zhong, X Liu, X Gao Curr Res, Technol Educ Trop Appl Microbiol Microbial Biotechnol 1, 567-576, 2010 | 326 | 2010 |
Biological control of phytopathogenic fungi by fatty acids S Liu, W Ruan, J Li, H Xu, J Wang, Y Gao, J Wang Mycopathologia 166, 93-102, 2008 | 294 | 2008 |
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email J Wang, T Herath, R Chen, A Vishwanath, HR Rao IEEE transactions on professional communication 55 (4), 345-362, 2012 | 289 | 2012 |
Excessive use of nitrogen in Chinese agriculture results in high N2O/(N2O+N2) product ratio of denitrification, primarily due to acidification of the soils Z Qu, J Wang, T Almøy, LR Bakken Global change biology 20 (5), 1685-1698, 2014 | 249 | 2014 |
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao Information systems journal 24 (1), 61-84, 2014 | 239 | 2014 |
Soil pH as the chief modifier for regional nitrous oxide emissions: new evidence and implications for global estimates and mitigation Y Wang, J Guo, RD Vogt, J Mulder, J Wang, X Zhang Global change biology 24 (2), e617-e626, 2018 | 220 | 2018 |
Employees' information security policy compliance: A norm activation perspective A Yazdanmehr, J Wang Decision Support Systems 92, 36-46, 2016 | 216 | 2016 |
Inverse kinematics and control of a 7-DOF redundant manipulator based on the closed-loop algorithm J Wang, Y Li, X Zhao International Journal of Advanced Robotic Systems 7 (4), 37, 2010 | 216 | 2010 |
Effect of monoculture soybean on soil microbial community in the Northeast China C Li, X Li, W Kong, Y Wu, J Wang Plant and soil 330, 423-433, 2010 | 214 | 2010 |
Antimicrobial Metabolites from the Endophytic Fungus Pichia guilliermondii Isolated from Paris polyphylla var. yunnanensis J Zhao, Y Mou, T Shan, Y Li, L Zhou, M Wang, J Wang Molecules 15 (11), 7961-7970, 2010 | 206 | 2010 |
Effect of amendments with different phenolic acids on soil microbial biomass, activity, and community diversity XH Qu, JG Wang Applied Soil Ecology 39 (2), 172-179, 2008 | 200 | 2008 |
Insider threats in a financial institution J Wang, M Gupta, HR Rao MIS quarterly 39 (1), 91-112, 2015 | 199 | 2015 |
Conventional flooding irrigation causes an overuse of nitrogen fertilizer and low nitrogen use efficiency in intensively used solar greenhouse vegetable production Z Fan, S Lin, X Zhang, Z Jiang, K Yang, D Jian, Y Chen, J Li, Q Chen, ... Agricultural Water Management 144, 11-19, 2014 | 178 | 2014 |
Competition for nitrogen during decomposition of plant residues in soil: effect of spatial placement of N-rich and N-poor plant residues W Jingguo, LR Bakken Soil biology and biochemistry 29 (2), 153-162, 1997 | 169 | 1997 |
Coping responses in phishing detection: an investigation of antecedents and consequences J Wang, Y Li, HR Rao Information Systems Research 28 (2), 378-396, 2017 | 165 | 2017 |
Research Note—A Value-at-Risk Approach to Information Security Investment J Wang, A Chaudhury, HR Rao Information Systems Research 19 (1), 106-120, 2008 | 165 | 2008 |
Overconfidence in phishing email detection J Wang, Y Li, HR Rao Journal of the Association for Information Systems 17 (11), 1, 2016 | 158 | 2016 |
Fungal endophytes from Dioscorea zingiberensis rhizomes and their antibacterial activity L Xu, L Zhou, J Zhao, J Li, X Li, J Wang Letters in Applied Microbiology 46 (1), 68-72, 2008 | 150 | 2008 |