Organizations' information security policy compliance: Stick or carrot approach? Y Chen, K Ramamurthy, KW Wen Journal of Management Information Systems 29 (3), 157-188, 2012 | 533 | 2012 |
Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China Y Chen, FM Zahedi MIS Quarterly 40 (1), 2016 | 372 | 2016 |
Impacts of comprehensive information security programs on information security culture YAN Chen, K Ramamurthy, KW Wen Journal of Computer Information Systems 55 (3), 11-19, 2015 | 255 | 2015 |
Brand relationship, consumption values and branded app adoption KF Peng, Y Chen, KW Wen Industrial Management & Data Systems 114 (8), 1131-1143, 2014 | 188 | 2014 |
E-business value creation in Small and Medium Enterprises: a US study using the TOE framework KW Wen, Y Chen International Journal of Electronic Business 8 (1), 80-100, 2010 | 157 | 2010 |
Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance FM Zahedi, A Abbasi, Y Chen Journal of the Association for Information Systems 16 (6), 2, 2015 | 135 | 2015 |
Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges Y Chen, PE zadeh Journal of Medical Internet Research 26, 1-20, 2024 | 123 | 2024 |
Enhancing predictive analytics for anti-phishing by exploiting website genre information A Abbasi, FM Zahedi, D Zeng, Y Chen, H Chen, JF Nunamaker Jr Journal of Management Information Systems 31 (4), 109-157, 2015 | 104 | 2015 |
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model Y Chen, DF Galletta, PB Lowry, X Luo, GD Moody, R Willison Information Systems Research 32 (3), 1043-1065, 2021 | 83 | 2021 |
Constructs Affecting Continuance intention in consumers with mobile financial apps: a dual factor approach DL Amoroso, YAN Chen Journal of Information Technology Management 28 (3), 1-24, 2017 | 69 | 2017 |
A systematic review on cross-cultural information systems research: Evidence from the last decade X Chu, XR Luo, Y Chen Information & Management 56 (3), 403-417, 2019 | 67 | 2019 |
Are we ready for cyberterrorist attacks?—Examining the role of individual resilience J Hua, Y Chen, XR Luo Information & Management 55 (7), 928-938, 2018 | 62 | 2018 |
Understanding Information Security Policy Violation from a Situational Action Perspective H Li, XR Luo, Y Chen Journal of the Association for Information Systems 22 (3), 739-772, 2021 | 60 | 2021 |
A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach Y Chen, S Deng, DH Kwak, A Elnoshokaty, J Wu Journal of the Association for Information Systems 20 (2), 105-131, 2019 | 51 | 2019 |
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools Y Chen, FM Zahedi, A Abbasi, D Dobolyi Information & Management 58 (1), 103394, 2021 | 50 | 2021 |
Phishing susceptibility: The good, the bad, and the ugly A Abbasi, FM Zahedi, Y Chen 2016 IEEE conference on intelligence and security informatics (ISI), 169-174, 2016 | 47 | 2016 |
Impact of anti-phishing tool performance on attack success rates A Abbasi, F Zahedi, Y Chen 2012 IEEE international conference on intelligence and security informatics …, 2012 | 45 | 2012 |
Beyond adaptive security coping behaviors: Theory and empirical evidence Y Chen, XR Luo, H Li Information & Management 59 (2), 103575, 2022 | 38 | 2022 |
Interface design elements for anti-phishing systems Y Chen, F Zahedi, A Abbasi Service-Oriented Perspectives in Design Science Research: 6th International …, 2011 | 31 | 2011 |
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence Y Chen, W Xia, K Cousins Computers & Security 113, 102568, 2022 | 22 | 2022 |