Jingguo Wang

Orcid: 0000-0003-2412-4641

According to our database1, Jingguo Wang authored at least 73 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The role of ethical climates in employee information security policy violations.
Decis. Support Syst., February, 2024

2023
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies.
Eur. J. Inf. Syst., November, 2023

Continuous improvement of information security management: an organisational learning perspective.
Eur. J. Inf. Syst., November, 2023

Employee responses to information security related stress: Coping and violation intention.
Inf. Syst. J., May, 2023

Can peers help reduce violations of information security policies? The role of peer monitoring.
Eur. J. Inf. Syst., May, 2023

Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites.
MIS Q., 2023

2022
Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals.
Manag. Sci., 2022

Network Configuration in App Design: The Effects of Simplex and Multiplex Networks on Team Performance.
J. Assoc. Inf. Syst., 2022

Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach.
Comput. Secur., 2022

2021
The Impact of Helping Others in Coopetitive Crowdsourcing Communities.
J. Assoc. Inf. Syst., 2021

Seeking Foundations for the Science of Cyber Security.
Inf. Syst. Frontiers, 2021

The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce.
Comput. Hum. Behav., 2021

Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

2020
Self-Determination and Perceived Information Control in Cloud Storage Service.
J. Comput. Inf. Syst., 2020

Peers matter: The moderating role of social influence on information security policy compliance.
Inf. Syst. J., 2020

Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective.
Inf. Syst. Frontiers, 2020

Mutual influences between message volume and emotion intensity on emerging infectious diseases: An investigation with microblog data.
Inf. Manag., 2020

2019
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts.
MIS Q., 2019

Responding to identity theft: A victimization perspective.
Decis. Support Syst., 2019

2018
An investigation into the antecedents of prepurchase online search.
Inf. Manag., 2018

How Do You Cope: Individuals' Responses to Identity Theft Victimization.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Organizations' Proactive Information Security Behavior.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res., 2017

Coordination of the traditional and the online channels for a short-life-cycle product.
Eur. J. Oper. Res., 2017

Influence of Technology Affordance on the Adoption of Mobile Technologies for Diabetes Self-management.
Proceedings of the Smart Health - International Conference, 2017

Opting for Identity Theft Protection Services: The Role of Anticipated Distress.
Proceedings of the International Conference on Information Systems, 2017

Adoption of an Authentication System: Is Security the Only Consideration?
Proceedings of the International Conference on Information Systems, 2017

Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Overconfidence in Phishing Email Detection.
J. Assoc. Inf. Syst., 2016

Employees' information security policy compliance: A norm activation perspective.
Decis. Support Syst., 2016

Temporarily Distributed Hierarchy in Unmanned Vehicles Swarms.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera.
Proceedings of the International Conference on Information Systems, 2016

Family Work Conflict and Information Security Policy Compliance - An Empirical Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

A Comparative Analysis of Univariate Time Series Methods for Estimating and Forecasting Daily Spam in United States.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

An Examination of the Calibration and Resolution Skills in Phishing Email Detection.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications.
MIS Q., 2015

Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior.
Inf. Syst. Res., 2015

Consumer environmental awareness and channel coordination with two substitutable products.
Eur. J. Oper. Res., 2015

Differential effects of social influence sources on self-reported music piracy.
Decis. Support Syst., 2015

Peer-recognition and Performance in Online Crowdsourcing Communities.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Involvement in Online Crowdsourcing Communities.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
Inf. Syst. J., 2014

Social Media Use in Physician-Patient Interaction - A Fit Perspective.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2012
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email.
IEEE Trans. Prof. Commun., 2012

Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy.
J. Manag. Inf. Syst., 2012

Dynamics Modeling and Simulation of a kind of wheeled humanoid Robot Based on Screw Theory.
Int. J. Humanoid Robotics, 2012

An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security.
Decis. Support Syst., 2012

Functionality defense through diversity: a design framework to multitier systems.
Ann. Oper. Res., 2012

2011
Manipulation of a Mobile Modular Manipulator Interacting with the Environment with the Assistance of Tactile Sensing Feedback.
Int. J. Humanoid Robotics, 2011

Traching Control Of A Redundant Manipulator With The Assistance Of Tactile Sensing.
Intell. Autom. Soft Comput., 2011

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.
Decis. Support Syst., 2011

An investigation of email processing from a risky decision making perspective.
Decis. Support Syst., 2011

2010
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures.
ACM Trans. Manag. Inf. Syst., 2010

A study on a robotic arm contacting with human skin using tactile sensing feedback strategies.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

A Cooperated-Robot Arm Used for Rehabilitation Treatment with Hybrid Impedance Control Method.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010

Surface-tracking of a 5-DOF manipulator equipped with tactile sensors.
Proceedings of the 11th International Conference on Control, 2010

Hybrid impedance control of a 3-DOF robotic arm used for rehabilitation treatment.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2010

2009
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use.
Decis. Support Syst., 2009

AMCIS 2008 Panel Report: Aging Content on the Web: Issues, Implications, and Potential Research Opportunities.
Commun. Assoc. Inf. Syst., 2009

An Exploration of the Search for Information Security.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009

Analysis on the interaction between the nonholonomic mobile modular robot and the environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Dynamic Control and Analysis of a Nonholonomic Mobile Modular Robot.
Proceedings of the Intelligent Robotics and Applications, Second International Conference, 2009

2008
Shared Content Management in Replicated Web Systems: A Design Framework Using Problem Decomposition, Controlled Simulation, and Feedback Learning.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Research Note - A Value-at-Risk Approach to Information Security Investment.
Inf. Syst. Res., 2008

Negotiating wisely: Considerations based on MCDM/MAUT.
Eur. J. Oper. Res., 2008

Analysis of dynamic stability constraints for a mobile humanoid robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

Dynamic modeling of a mobile humanoid robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

Static force analysis for a mobile humanoid robot moving on a slope.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

A survey on the structures of current mobile humanoid robots.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2006
The aspiration level interactive method (AIM) reconsidered: Robustness of solutions.
Eur. J. Oper. Res., 2006

A Design Framework to Information System Functionality Defense through Diversity.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
An Extreme Value Approach to Information Technology Security Investment.
Proceedings of the International Conference on Information Systems, 2005


  Loading...