Xin (Robert) Luo

According to our database1, Xin (Robert) Luo authored at least 80 papers between 2004 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Juxtaposed Effect of Social Media Overload on Discontinuous Usage Intention: The Perspective of Stress Coping Strategies.
Inf. Process. Manag., 2021

Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective.
J. Assoc. Inf. Syst., 2020

Using Mobile Phone Data for Emergency Management: a Systematic Literature Review.
Inf. Syst. Frontiers, 2020

The impact of e-commerce capabilities on agricultural firms' performance gains: the mediating role of organizational agility.
Ind. Manag. Data Syst., 2020

Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior.
Inf. Manag., 2020

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services.
Inf. Manag., 2020

The value of backers' word-of-mouth in crowdfunding projects filtering: an empirical investigation.
Electron. Commer. Res., 2020

How do agribusinesses thrive through complexity? The pivotal role of e-commerce capability and business agility.
Decis. Support Syst., 2020

Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective.
J. Organ. Comput. Electron. Commer., 2019

Do Strategy and Timing in IT Security Investments Matter? An Empirical Investigation of the Alignment Effect.
Inf. Syst. Frontiers, 2019

Unveiling the interplay between blockchain and loyalty program participation: A qualitative approach based on Bubichain.
Int. J. Inf. Manag., 2019

Easy come or easy go? Empirical evidence on switching behaviors in mobile payment applications.
Inf. Manag., 2019

Social Commerce and Social Media: Behaviors in the New Service Economy.
Inf. Manag., 2019

A systematic review on cross-cultural information systems research: Evidence from the last decade.
Inf. Manag., 2019

Mindfulness matters: An exploratory study of its effects on behavioral automaticity and affect in cyberloafing.
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019

Exploring How Blockchain Impacts Loyalty Program Participation Behaviors: An Exploratory Case Study.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Cloud computing capability: its technological root and business impact.
J. Organ. Comput. Electron. Commer., 2018

Producing competitive advantage from an infrastructure technology: The case of cloud computing.
Inf. Syst. Manag., 2018

Self-control, organizational context, and rational choice in Internet abuses at work.
Inf. Manag., 2018

Are we ready for cyberterrorist attacks? - Examining the role of individual resilience.
Inf. Manag., 2018

Information usefulness in online third party forums.
Comput. Hum. Behav., 2018

Why patients switch help from online to offline: An empirical investigation of emotions and effects of cognitions.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Too Good to Be True? Understanding How Blockchain Revolutionizes Loyalty Programs.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Using Government Microblogs to Enhance Citizen Engagement.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors.
Inf. Manag., 2017

Toward a holistic understanding of continued use of social networking tourism: A mixed-methods approach.
Inf. Manag., 2017

An empirical investigation on the impact of XBRL adoption on information asymmetry: Evidence from Europe.
Decis. Support Syst., 2017

Designing an intelligent decision support system for effective negotiation pricing: A systematic and learning approach.
Decis. Support Syst., 2017

Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
Decis. Sci., 2017

Anger or Fear? Effects of Discrete Emotions on Deviant Security Behavior.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Guest editors introduction to the special issue on service and manufacturing innovations in e-business platforms.
Electron. Commer. Res., 2016

Special issue introduction: A comprehensive perspective on information systems security - technical advances and behavioral issues.
Decis. Support Syst., 2016

The Value of Chief Data Officer presence on Firm Performance.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Electronic word-of-mouth: a systematic perspective and multilevel analysis.
Proceedings of the 18th Annual International Conference on Electronic Commerce, 2016

Does IT team climate matter? An empirical study of the impact of co-workers and the Confucian work ethic on deviance behavior.
Inf. Manag., 2015

Examining the moderating role of sense of membership in online review evaluations.
Inf. Manag., 2015

Factors influencing e-tax filing adoption intention by business users in China.
Electron. Gov. an Int. J., 2015

Explaining consumer satisfaction of services: The role of innovativeness and emotion in an electronic mediated environment.
Decis. Support Syst., 2015

Automated negotiation for e-commerce decision making: A goal deliberated agent architecture for multi-strategy selection.
Decis. Support Syst., 2015

A holistic understanding of non-users' adoption of university campus wireless network: An empirical investigation.
Comput. Hum. Behav., 2015

Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation.
J. Database Manag., 2014

Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance.
Inf. Syst. J., 2014

The impact of XBRL adoption in PR China.
Decis. Support Syst., 2014

A Multi-Theoretical Study on Social Networking Tourism.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach.
J. Comput. Inf. Syst., 2013

Impact of informational factors on online recommendation credibility: The moderating role of source credibility.
Decis. Support Syst., 2013

Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration.
Comput. Secur., 2013

Cloud-Based Virtual Computing Laboratories.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits.
Int. J. Wirel. Networks Broadband Technol., 2012

E-commerce intelligence development and research in the Greater China Region.
Electron. Mark., 2012

Leader personal influences on membership decisions in moderated online social networking groups.
Decis. Support Syst., 2012

The Domain Name System - Past, Present, and Future.
Commun. Assoc. Inf. Syst., 2012

How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Integrative framework for assessing firms' potential to undertake Green IT initiatives via virtualization - A theoretical perspective.
J. Strateg. Inf. Syst., 2011

Social Engineering: The Neglected Human Factor for Information Security Management.
Inf. Resour. Manag. J., 2011

Exploring the impact of instant messaging on subjective task complexity and user satisfaction.
Eur. J. Inf. Syst., 2011

The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing.
Decis. Support Syst., 2011

Validating Perception and Use of Mobile Social Network Service: A Cross-Cultural Comparison Study.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Understanding the Determinants of User Acceptance of Enterprise Instant Messaging: An Empirical Study.
J. Organ. Comput. Electron. Commer., 2010

Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services.
Decis. Support Syst., 2010

Research on Synchronous Low Power Listening for Collection Tree Protocol in WSN.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

Intelligent Software Agents Analysis in E-Commerce II.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Intelligent Software Agents Analysis in E-Commerce I.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Protein Structure Prediction by Fusion, Bayesian Methods.
Proceedings of the Encyclopedia of Artificial Intelligence (3 Volumes), 2009

Rebuilding Post-Violation Trust in B2C Electronic Commerce.
J. Organ. End User Comput., 2009

Workplace Management and Employee Misuse: Does Punishment Matter?
J. Comput. Inf. Syst., 2009

Consumer motivations in taking action against spyware: an empirical investigation.
Inf. Manag. Comput. Secur., 2009

Improving multiple-password recall: an empirical study.
Eur. J. Inf. Syst., 2009

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Bottlenecks in the Process of Improving ICT Infastructure in Developing Countries: A Chinese Perspective.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

A Scientometric Investigation into the Validity of IS Journal Quality Measures.
J. Assoc. Inf. Syst., 2007

Awareness Education as the Key to Ransomware Prevention.
Inf. Secur. J. A Glob. Perspect., 2007

Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp Coder.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Assessment of U.S. and Chinese Online Gaming Environments and Futures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Understanding Consumer Motivation for Taking Action against Spyware.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Workplace Internet Use Monitoring and Employee Behavior Intention Change.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Intelligent Built-in Test (BIT) for More-Electric Aircraft Power System Based on Hybrid Generalized LVQ Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A framework for spyware assessment.
Commun. ACM, 2005

Student Recognition and Awareness of Information Security in Course Learning from Management Information Systems and Computer Science Classes: An Empirical Investigation.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Student Acceptance of Web-based Learning Environment: an Empirical Investigation of an Undergraduate IS Course.
Proceedings of the 10th Americas Conference on Information Systems, 2004