Jingguo Wang
Jingguo Wang
Professor of Information Systems, University of Texas at Arlington
Verified email at
Cited by
Cited by
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
A Vishwanath, T Herath, R Chen, J Wang, HR Rao
Decision Support Systems 51 (3), 576-586, 2011
Consumer environmental awareness and channel coordination with two substitutable products
L Zhang, J Wang, J You
European Journal of Operational Research 241 (1), 63-73, 2015
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
J Wang, T Herath, R Chen, A Vishwanath, HR Rao
Professional Communication, IEEE Transactions on 55 (4), 345-362, 2012
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in Human Behavior, 106178, 2019
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao
Information Systems Journal 24 (1), 61-84, 2014
Employees' information security policy compliance: A norm activation perspective
A Yazdanmehr, J Wang
Decision Support Systems 92, 36-46, 2016
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
J Wang, M Gupta, HR Rao
Management Information Systems Quarterly 39 (1), 91-112, 2015
A Value-at-Risk Approach to Information Security Investment
J Wang, A Chaudhury, HR Rao
Information Systems Research 19 (1), 106-120, 2008
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
Peers matter: The moderating role of social influence on information security policy compliance
A Yazdanmehr, J Wang, Z Yang
Information Systems Journal 30 (5), 791-844, 2020
An investigation of email processing from a risky decision making perspective
R Chen, J Wang, T Herath, HR Rao
Decision Support Systems 52 (1), 73-81, 2011
Coordination of the traditional and the online channels for a short-life-cycle product
L Zhang, J Wang
European Journal of Operational Research 258 (2), 639-651, 2017
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
J Wang, R Chen, T Herath, HR Rao
Decision Support Systems 48 (1), 92-102, 2009
Effect of peer influence on unauthorized music downloading and sharing: The moderating role of self-construal
Z Yang, J Wang, M Mourali
Journal of Business Research 68 (3), 516-525, 2015
Impact of smartphones on quality of life: A health information behavior perspective
F Ghahramani, J Wang
Information Systems Frontiers 22 (6), 1275-1290, 2020
Negotiating wisely: Considerations based on MCDM/MAUT
J Wang, S Zionts
European Journal of Operational Research 188 (1), 191-205, 2008
A longitudinal study of unauthorized access attempts on information systems: The role of opportunity contexts
J Wang, Z Shan, M Gupta, HR Rao
MIS Quarterly 43 (2), 601-622, 2019
Differential effects of social influence sources on self-reported music piracy
Z Yang, J Wang
Decision Support Systems 69, 70-81, 2015
The aspiration level interactive method (AIM) reconsidered: Robustness of solutions
J Wang, S Zionts
European journal of operational research 175 (2), 948-958, 2006
The system can't perform the operation now. Try again later.
Articles 1–20