Xin (Robert) Luo

Affiliations:
  • University of New Mexico, School of Management, Albuquerque, NM, USA
  • Mississippi State University, USA (PhD)


According to our database1, Xin (Robert) Luo authored at least 109 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Does Techno-invasion Lead to Employees' Deviant Behaviors?
J. Manag. Inf. Syst., 2022

Reactions to Abusive Supervision: Neutralization and IS Misuse.
J. Comput. Inf. Syst., 2022

Online prejudice and barriers to digital innovation: Empirical investigations of Chinese consumers.
Inf. Syst. J., 2022

Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance.
Inf. Manag., 2022

How big data analytics enables the alliance relationship stability of contract farming in the age of digital transformation.
Inf. Manag., 2022

Beyond adaptive security coping behaviors: Theory and empirical evidence.
Inf. Manag., 2022

Understanding Inconsistent Corruption Control through E-government Participation: Updated Evidence from a Cross-Country Investigation.
Electron. Commer. Res., 2022

Effect of sponsorship disclosure on online consumer responses to positive reviews: The moderating role of emotional intensity and tie strength.
Decis. Support Syst., 2022

Big arena, small potatoes: A mixed-methods investigation of atmospheric cues in live-streaming e-commerce.
Decis. Support Syst., 2022

Exploring the spoiler effect in the digital age: Evidence from the movie industry.
Decis. Support Syst., 2022

Get your report a thumb-up: An empirical investigation on crowd testing.
Decis. Support Syst., 2022

Effects of Organizational Controls on Employees' Cyber-loafing: The Moderating Effects of Trait Mindfulness.
Data Base, 2022

Understanding Users' Willingness to Pay for Privacy in Mobile Applications: An Integration of Protection Motivation and Privacy Calculus.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022

2021
Understanding Information Security Policy Violation from a Situational Action Perspective.
J. Assoc. Inf. Syst., 2021

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Inf. Syst. Res., 2021

Juxtaposed Effect of Social Media Overload on Discontinuous Usage Intention: The Perspective of Stress Coping Strategies.
Inf. Process. Manag., 2021

Trialing or combining? Understanding consumer partial switching in mobile application usage from the variety seeking perspective.
Internet Res., 2021

A longitudinal study of the actual value of big data and analytics: The role of industry environment.
Int. J. Inf. Manag., 2021

Exploring viewer participation in online video game streaming: A mixed-methods approach.
Int. J. Inf. Manag., 2021

The Paradox of Word-of-Mouth in Social Commerce: Exploring the Juxtaposed Impacts of Source Credibility and Information Quality on SWOM Spreading.
Inf. Manag., 2021

Why I give money to unknown people? An investigation of online donation and forwarding intention.
Electron. Commer. Res. Appl., 2021

Understanding the Interplay Between Government Microblogs and Citizen Engagement: Evidence from China.
Electron. Commer. Res., 2021

How to increase customer repeated bookings in the short-term room rental market? A large-scale granular data investigation.
Decis. Support Syst., 2021

Why do organizations leverage social media to create business value? An external factor-centric empirical investigation.
Decis. Support Syst., 2021

Social media-driven customer engagement and movie performance: Theory and empirical evidence.
Decis. Support Syst., 2021

Toward a Unified View of Dynamic Information Security Behaviors: Insights from Organizational Culture and Sensemaking.
Data Base, 2021

Discovering group-based transnational cyber fraud actives: A polymethodological view.
Comput. Secur., 2021

2020
Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective.
J. Assoc. Inf. Syst., 2020

Using Mobile Phone Data for Emergency Management: a Systematic Literature Review.
Inf. Syst. Frontiers, 2020

The impact of e-commerce capabilities on agricultural firms' performance gains: the mediating role of organizational agility.
Ind. Manag. Data Syst., 2020

Understanding the roles of institutional pressures and organizational innovativeness in contextualized transformation toward e-business: Evidence from agricultural firms.
Int. J. Inf. Manag., 2020

Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior.
Inf. Manag., 2020

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services.
Inf. Manag., 2020

The value of backers' word-of-mouth in crowdfunding projects filtering: an empirical investigation.
Electron. Commer. Res., 2020

How do agribusinesses thrive through complexity? The pivotal role of e-commerce capability and business agility.
Decis. Support Syst., 2020

Information and Operational Decision Sciences: The Interplay of Information Technology and Operational Decision Sciences.
Decis. Sci., 2020

2019
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective.
J. Organ. Comput. Electron. Commer., 2019

Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect.
Inf. Syst. Frontiers, 2019

Unveiling the interplay between blockchain and loyalty program participation: A qualitative approach based on Bubichain.
Int. J. Inf. Manag., 2019

Easy come or easy go? Empirical evidence on switching behaviors in mobile payment applications.
Inf. Manag., 2019

Social Commerce and Social Media: Behaviors in the New Service Economy.
Inf. Manag., 2019

A systematic review on cross-cultural information systems research: Evidence from the last decade.
Inf. Manag., 2019

Mindfulness matters: An exploratory study of its effects on behavioral automaticity and affect in cyberloafing.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

Exploring How Blockchain Impacts Loyalty Program Participation Behaviors: An Exploratory Case Study.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Cloud computing capability: its technological root and business impact.
J. Organ. Comput. Electron. Commer., 2018

Producing competitive advantage from an infrastructure technology: The case of cloud computing.
Inf. Syst. Manag., 2018

Self-control, organizational context, and rational choice in Internet abuses at work.
Inf. Manag., 2018

Are we ready for cyberterrorist attacks? - Examining the role of individual resilience.
Inf. Manag., 2018

Information usefulness in online third party forums.
Comput. Hum. Behav., 2018

Why patients switch help from online to offline: An empirical investigation of emotions and effects of cognitions.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Too Good to Be True? Understanding How Blockchain Revolutionizes Loyalty Programs.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Using Government Microblogs to Enhance Citizen Engagement.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors.
Inf. Manag., 2017

Toward a holistic understanding of continued use of social networking tourism: A mixed-methods approach.
Inf. Manag., 2017

An empirical investigation on the impact of XBRL adoption on information asymmetry: Evidence from Europe.
Decis. Support Syst., 2017

Designing an intelligent decision support system for effective negotiation pricing: A systematic and learning approach.
Decis. Support Syst., 2017

Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
Decis. Sci., 2017

Anger or Fear? Effects of Discrete Emotions on Deviant Security Behavior.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Guest editors introduction to the special issue on service and manufacturing innovations in e-business platforms.
Electron. Commer. Res., 2016

Special issue introduction: A comprehensive perspective on information systems security - technical advances and behavioral issues.
Decis. Support Syst., 2016

The Value of Chief Data Officer presence on Firm Performance.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Electronic word-of-mouth: a systematic perspective and multilevel analysis.
Proceedings of the 18th Annual International Conference on Electronic Commerce, 2016

2015
Does IT team climate matter? An empirical study of the impact of co-workers and the Confucian work ethic on deviance behavior.
Inf. Manag., 2015

Examining the moderating role of sense of membership in online review evaluations.
Inf. Manag., 2015

Factors influencing e-tax filing adoption intention by business users in China.
Electron. Gov. an Int. J., 2015

The interplay between value and service quality experience: e-loyalty development process through the eTailQ scale and value perception.
Electron. Commer. Res., 2015

Explaining consumer satisfaction of services: The role of innovativeness and emotion in an electronic mediated environment.
Decis. Support Syst., 2015

Automated negotiation for e-commerce decision making: A goal deliberated agent architecture for multi-strategy selection.
Decis. Support Syst., 2015

A holistic understanding of non-users' adoption of university campus wireless network: An empirical investigation.
Comput. Hum. Behav., 2015

2014
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation.
J. Database Manag., 2014

Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance.
Inf. Syst. J., 2014

The impact of XBRL adoption in PR China.
Decis. Support Syst., 2014

A Multi-Theoretical Study on Social Networking Tourism.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach.
J. Comput. Inf. Syst., 2013

Impact of informational factors on online recommendation credibility: The moderating role of source credibility.
Decis. Support Syst., 2013

Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration.
Comput. Secur., 2013

Cloud-Based Virtual Computing Laboratories.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits.
Int. J. Wirel. Networks Broadband Technol., 2012

An exploratory study of mobile banking services resistance.
Int. J. Mob. Commun., 2012

E-commerce intelligence development and research in the Greater China Region.
Electron. Mark., 2012

Leader personal influences on membership decisions in moderated online social networking groups.
Decis. Support Syst., 2012

The Domain Name System - Past, Present, and Future.
Commun. Assoc. Inf. Syst., 2012

How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization - A theoretical perspective.
J. Strateg. Inf. Syst., 2011

Social Engineering: The Neglected Human Factor for Information Security Management.
Inf. Resour. Manag. J., 2011

Exploring the impact of instant messaging on subjective task complexity and user satisfaction.
Eur. J. Inf. Syst., 2011

The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing.
Decis. Support Syst., 2011

Validating Perception and Use of Mobile Social Network Service: A Cross-Cultural Comparison Study.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Understanding the Determinants of User Acceptance of Enterprise Instant Messaging: An Empirical Study.
J. Organ. Comput. Electron. Commer., 2010

Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services.
Decis. Support Syst., 2010

2009
Intelligent Software Agents Analysis in E-Commerce II.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Intelligent Software Agents Analysis in E-Commerce I.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Protein Structure Prediction by Fusion, Bayesian Methods.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Rebuilding Post-Violation Trust in B2C Electronic Commerce.
J. Organ. End User Comput., 2009

Workplace Management and Employee Misuse: Does Punishment Matter?
J. Comput. Inf. Syst., 2009

Consumer motivations in taking action against spyware: an empirical investigation.
Inf. Manag. Comput. Secur., 2009

Improving multiple-password recall: an empirical study.
Eur. J. Inf. Syst., 2009

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Bottlenecks in the Process of Improving ICT Infastructure in Developing Countries: A Chinese Perspective.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
A Scientometric Investigation into the Validity of IS Journal Quality Measures.
J. Assoc. Inf. Syst., 2007

Awareness Education as the Key to Ransomware Prevention.
Inf. Secur. J. A Glob. Perspect., 2007

Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp Coder.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Assessment of U.S. and Chinese Online Gaming Environments and Futures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Understanding Consumer Motivation for Taking Action against Spyware.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Workplace Internet Use Monitoring and Employee Behavior Intention Change.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Intelligent Built-in Test (BIT) for More-Electric Aircraft Power System Based on Hybrid Generalized LVQ Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
A framework for spyware assessment.
Commun. ACM, 2005

2004
Student Recognition and Awareness of Information Security in Course Learning from Management Information Systems and Computer Science Classes: An Empirical Investigation.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Student Acceptance of Web-based Learning Environment: an Empirical Investigation of an Undergraduate IS Course.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...