Arun Vishwanath, PhD., MBA
Arun Vishwanath, PhD., MBA
Technologist, Researcher, Educator, Author
Verified email at - Homepage
Cited by
Cited by
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
An examination of the factors contributing to adoption decisions among late-diffused technology products
A Vishwanath, GM Goldhaber
New media & society 5 (4), 547-572, 2003
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
IEEE transactions on professional communication 55 (4), 345-362, 2012
Habitual Facebook use and its impact on getting deceived on social media
A Vishwanath
Journal of Computer-Mediated Communication 20 (1), 83-98, 2015
Suspicion, cognition, and automaticity model of phishing susceptibility
A Vishwanath, B Harrison, YJ Ng
Communication Research 45 (8), 1146-1166, 2018
Barriers to the adoption of electronic health records: using concept mapping to develop a comprehensive empirical model
A Vishwanath, SD Scamurra
Health informatics journal 13 (2), 119-134, 2007
Comparing online information effects: A cross-cultural comparison of online information and uncertainty avoidance
A Vishwanath
Communication Research 30 (6), 579-598, 2003
Impact of personality on technology adoption: An empirical model
A Vishwanath
Journal of the American Society for Information Science and Technology 56 (8 …, 2005
Individual processing of phishing emails: How attention and elaboration protect against phishing
B Harrison, E Svetieva, A Vishwanath
Online Information Review 40 (2), 265-281, 2016
The impact of electronic medical record systems on outpatient workflows: a longitudinal evaluation of its workflow effects
A Vishwanath, SR Singh, P Winkelstein
International journal of medical informatics 79 (11), 778-791, 2010
Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack
A Vishwanath
Journal of Computer-Mediated Communication 20 (5), 570-584, 2015
Cyber hygiene: The concept, its measure, and its initial tests
A Vishwanath, LS Neo, P Goh, S Lee, M Khader, G Ong, J Chin
Decision Support Systems 128, 113160, 2020
To fear or not to fear? Applying the social amplification of risk framework on two environmental health risks in Singapore
YJ Ng, ZJ Yang, A Vishwanath
Journal of Risk Research 21 (12), 1487-1501, 2018
Diffusion of deception in social media: Social contagion effects and its antecedents
A Vishwanath
Information Systems Frontiers 17, 1353-1367, 2015
Retweeting the Fukushima nuclear radiation disaster
J Li, A Vishwanath, HR Rao
Communications of the ACM 57 (1), 78-85, 2014
From belief-importance to intention: The impact of framing on technology adoption
A Vishwanath
Communication Monographs 76 (2), 177-206, 2009
Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters
A Vishwanath, H Chen
Journal of the American Society for Information Science and Technology 57 …, 2006
The diffusion of innovations: A communication science perspective
A Vishwanath, GA Barnett
(No Title), 2011
Why do users not report spear phishing emails?
Y Kwak, S Lee, A Damiano, A Vishwanath
Telematics and Informatics 48, 101343, 2020
Manifestations of interpersonal trust in online interaction: A cross-cultural study comparing the differential utilization of seller ratings by eBay participants in Canada …
A Vishwanath
New Media & Society 6 (2), 219-234, 2004
The system can't perform the operation now. Try again later.
Articles 1–20