Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 473 | 2011 |
Coordination in emergency response management R Chen, R Sharman, HR Rao, SJ Upadhyaya Communications of the ACM 51 (5), 66-73, 2008 | 463 | 2008 |
Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan YC Ku, R Chen, H Zhang Information & Management 50 (7), 571-581, 2013 | 364 | 2013 |
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email J Wang, T Herath, R Chen, A Vishwanath, HR Rao IEEE transactions on professional communication 55 (4), 345-362, 2012 | 247 | 2012 |
Web 2.0 emergency applications: How useful can Twitter be for emergency response? A Mills, R Chen, JK Lee, H Raghav Rao Journal of Information Privacy and Security 5 (3), 3-26, 2009 | 223 | 2009 |
Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service T Herath, R Chen, J Wang, K Banjara, J Wilbur, HR Rao Information systems journal 24 (1), 61-84, 2014 | 206 | 2014 |
Member use of social networking sites—an empirical examination R Chen Decision Support Systems 54 (3), 1219-1227, 2013 | 185 | 2013 |
Living a private life in public social networks: An exploration of member self-disclosure R Chen Decision support systems 55 (3), 661-668, 2013 | 169 | 2013 |
Data model development for fire related extreme events: An activity theory approach R Chen, R Sharman, HR Rao, SJ Upadhyaya Mis Quarterly, 125-147, 2013 | 148 | 2013 |
Learning and self-disclosure behavior on social networking sites: the case of Facebook users R Chen, SK Sharma European Journal of Information Systems 24, 93-106, 2015 | 142 | 2015 |
Self-disclosure at social networking sites: An exploration through relational capitals R Chen, SK Sharma Information systems frontiers 15, 269-278, 2013 | 128 | 2013 |
Emergency response information system interoperability: Development of chemical incident response data model R Chen, R Sharman, N Chakravarti, HR Rao, SJ Upadhyaya Journal of the Association for Information Systems 9 (3), 7, 2008 | 128 | 2008 |
Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study M Mousavizadeh, DJ Kim, R Chen Decision Support Systems 92, 79-90, 2016 | 95 | 2016 |
Design principles for critical incident response systems R Chen, R Sharman, HR Rao, S Upadhyaya Information Systems and E-Business Management 5, 201-227, 2007 | 90 | 2007 |
Effectiveness of privacy assurance mechanisms in users' privacy protection on social networking sites from the perspective of protection motivation theory R Mousavi, R Chen, DJ Kim, K Chen Decision Support Systems 135, 113323, 2020 | 86 | 2020 |
An investigation of email processing from a risky decision making perspective R Chen, J Wang, T Herath, HR Rao Decision Support Systems 52 (1), 73-81, 2011 | 66 | 2011 |
Development of theory of mind on online social networks: Evidence from Facebook, Twitter, Instagram, and Snapchat E Gentina, R Chen, Z Yang Journal of Business Research 124, 652-666, 2021 | 62 | 2021 |
An examination of the effect of recent phishing encounters on phishing susceptibility R Chen, J Gaia, HR Rao Decision Support Systems 133, 113287, 2020 | 62 | 2020 |
Members' site use continuance on Facebook: Examining the role of relational capital R Chen, SK Sharma, HR Rao Decision Support Systems 90, 86-98, 2016 | 59 | 2016 |
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use J Wang, R Chen, T Herath, HR Rao Decision Support Systems 48 (1), 92-102, 2009 | 58 | 2009 |