default search action
Jingguo Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Liwei Xu, Mingxing Han, Jingguo Wang, Yu Chen, Jiangnan Qiu:
Dynamic effects of emotions in microblogs on sharing during EID outbreaks: The contingent role of user personality traits. Inf. Manag. 62(1): 104063 (2025) - 2024
- [j47]Adel Yazdanmehr, Muhammad Jawad, Raquel Benbunan-Fich, Jingguo Wang:
The role of ethical climates in employee information security policy violations. Decis. Support Syst. 177: 114086 (2024) - [j46]Yancong Xie, William Yeoh, Jingguo Wang:
How self-selection Bias in online reviews affects buyer satisfaction: A product type perspective. Decis. Support Syst. 181: 114199 (2024) - [j45]Xing Zhang, Yuanyuan Wang, Quan Xiao, Jingguo Wang:
The impact of doctors' facial attractiveness on users' choices in online health communities: A stereotype content and social role perspective. Decis. Support Syst. 182: 114246 (2024) - [j44]Jaeung Lee, Chul Woo Yoo, Jingguo Wang, H. Raghav Rao:
Use of Body Worn Camera (BWC) In Gray Scenarios: a Law Enforcement Officers' Perspective. Eur. J. Inf. Syst. 33(4): 597-616 (2024) - 2023
- [j43]Adel Yazdanmehr, Jingguo Wang:
Can peers help reduce violations of information security policies? The role of peer monitoring. Eur. J. Inf. Syst. 32(3): 508-528 (2023) - [j42]Fereshteh Ghahramani, Adel Yazdanmehr, Daniel Chen, Jingguo Wang:
Continuous improvement of information security management: an organisational learning perspective. Eur. J. Inf. Syst. 32(6): 1011-1032 (2023) - [j41]Adel Yazdanmehr, Yuan Li, Jingguo Wang:
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. Eur. J. Inf. Syst. 32(6): 1033-1051 (2023) - [j40]Adel Yazdanmehr, Yuan Li, Jingguo Wang:
Employee responses to information security related stress: Coping and violation intention. Inf. Syst. J. 33(3): 598-639 (2023) - [j39]Jingguo Wang, Meichen Dong, Zhiyong Yang, Yuan Li:
Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites. MIS Q. 47(4): 1585-1614 (2023) - 2022
- [j38]Jaeung Lee, Melchor C. de Guzman, Jingguo Wang, Manish Gupta, H. Raghav Rao:
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach. Comput. Secur. 121: 102832 (2022) - [j37]Gang Qu, Jingguo Wang, Xin Lu, Qi Xu, Qi Wang:
Network Configuration in App Design: The Effects of Simplex and Multiplex Networks on Team Performance. J. Assoc. Inf. Syst. 23(6): 4 (2022) - [j36]Kay-Yut Chen, Jingguo Wang, Yan Lang:
Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals. Manag. Sci. 68(7): 5269-5286 (2022) - 2021
- [j35]Abaid Ullah Zafar, Jiangnan Qiu, Ying Li, Jingguo Wang, Mohsin Shahzad:
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce. Comput. Hum. Behav. 115: 106178 (2021) - [j34]Shouhuai Xu, Moti Yung, Jingguo Wang:
Seeking Foundations for the Science of Cyber Security. Inf. Syst. Frontiers 23(2): 263-267 (2021) - [j33]Indika Dissanayake, Sridhar P. Nerur, Jingguo Wang, Mahmut Yasar, Jie Zhang:
The Impact of Helping Others in Coopetitive Crowdsourcing Communities. J. Assoc. Inf. Syst. 22(1): 7 (2021) - [c30]Yuan Li, Jingguo Wang, H. Raghav Rao:
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution. SKM 2021: 37-47 - 2020
- [j32]Jiangnan Qiu, Liwei Xu, Jingguo Wang, Wenjing Gu:
Mutual influences between message volume and emotion intensity on emerging infectious diseases: An investigation with microblog data. Inf. Manag. 57(4): 103217 (2020) - [j31]Fereshteh Ghahramani, Jingguo Wang:
Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective. Inf. Syst. Frontiers 22(6): 1275-1290 (2020) - [j30]Adel Yazdanmehr, Jingguo Wang, Zhiyong Yang:
Peers matter: The moderating role of social influence on information security policy compliance. Inf. Syst. J. 30(5): 791-844 (2020) - [j29]Yuan Li, Kuo-Chung Chang, Jingguo Wang:
Self-Determination and Perceived Information Control in Cloud Storage Service. J. Comput. Inf. Syst. 60(2): 113-123 (2020)
2010 – 2019
- 2019
- [j28]Yuan Li, Adel Yazdanmehr, Jingguo Wang, H. Raghav Rao:
Responding to identity theft: A victimization perspective. Decis. Support Syst. 121: 13-24 (2019) - [j27]Jingguo Wang, Zhe Shan, Manish Gupta, H. Raghav Rao:
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts. MIS Q. 43(2) (2019) - 2018
- [j26]Jingguo Wang, Zhiyong Yang, E. Deanne Brocato:
An investigation into the antecedents of prepurchase online search. Inf. Manag. 55(3): 285-293 (2018) - [c29]Fereshteh Ghahramani, Daniel Chen, Jingguo Wang:
Organizations' Proactive Information Security Behavior. AMCIS 2018 - [c28]Yuan Li, Adel Yazdanmehr, Jingguo Wang, H. Raghav Rao:
How Do You Cope: Individuals' Responses to Identity Theft Victimization. AMCIS 2018 - 2017
- [j25]Linghong Zhang, Jingguo Wang:
Coordination of the traditional and the online channels for a short-life-cycle product. Eur. J. Oper. Res. 258(2): 639-651 (2017) - [j24]Jingguo Wang, Yuan Li, H. Raghav Rao:
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences. Inf. Syst. Res. 28(2): 378-396 (2017) - [c27]Yuan Li, Jingguo Wang, H. Raghav Rao:
Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model. AMCIS 2017 - [c26]Fereshteh Ghahramani, Jingguo Wang:
Adoption of an Authentication System: Is Security the Only Consideration? ICIS 2017 - [c25]Jingguo Wang, Adel Yazdanmehr, Yuan Li, H. Raghav Rao:
Opting for Identity Theft Protection Services: The Role of Anticipated Distress. ICIS 2017 - [c24]Ramakrishna Dantu, Radha K. Mahapatra, Jingguo Wang:
Influence of Technology Affordance on the Adoption of Mobile Technologies for Diabetes Self-management. ICSH 2017: 104-115 - 2016
- [j23]Adel Yazdanmehr, Jingguo Wang:
Employees' information security policy compliance: A norm activation perspective. Decis. Support Syst. 92: 36-46 (2016) - [j22]Jingguo Wang, Yuan Li, H. Raghav Rao:
Overconfidence in Phishing Email Detection. J. Assoc. Inf. Syst. 17(11): 1 (2016) - [c23]Jaeung Lee, Jingguo Wang, Gerald Cliff, H. Raghav Rao:
Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents. AMCIS 2016 - [c22]Yuan Li, Jingguo Wang, H. Raghav Rao:
An Examination of the Calibration and Resolution Skills in Phishing Email Detection. AMCIS 2016 - [c21]Jie Zhang, Gene Lee, Jingguo Wang:
A Comparative Analysis of Univariate Time Series Methods for Estimating and Forecasting Daily Spam in United States. AMCIS 2016 - [c20]Peng Zhang, Jingguo Wang:
Family Work Conflict and Information Security Policy Compliance - An Empirical Study. AMCIS 2016 - [c19]Jaeung Lee, Jingguo Wang, Gerald Cliff, H. Raghav Rao:
Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera. ICIS 2016 - [c18]Hong-an Yang, Luis Carlos Velasco, Ya Zhang, Ting Zhang, Jingguo Wang:
Temporarily Distributed Hierarchy in Unmanned Vehicles Swarms. ICSI (2) 2016: 511-518 - 2015
- [j21]Zhiyong Yang, Jingguo Wang:
Differential effects of social influence sources on self-reported music piracy. Decis. Support Syst. 69: 70-81 (2015) - [j20]Linghong Zhang, Jingguo Wang, Jianxin You:
Consumer environmental awareness and channel coordination with two substitutable products. Eur. J. Oper. Res. 241(1): 63-73 (2015) - [j19]Jingguo Wang, Nan Xiao, H. Raghav Rao:
Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior. Inf. Syst. Res. 26(3): 619-633 (2015) - [j18]Jingguo Wang, Manish Gupta, H. Raghav Rao:
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications. MIS Q. 39(1): 91-112 (2015) - [c17]Indika Dissanayake, Jingguo Wang, Feirong Yuan, Jie Jennifer Zhang:
Involvement in Online Crowdsourcing Communities. AMCIS 2015 - [c16]Indika Dissanayake, Jie Zhang, Feirong Yuan, Jingguo Wang:
Peer-recognition and Performance in Online Crowdsourcing Communities. HICSS 2015: 4262-4265 - 2014
- [j17]Tejaswini C. Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur, H. Raghav Rao:
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf. Syst. J. 24(1): 61-84 (2014) - [c15]Ramakrishna Dantu, Jingguo Wang, RadhaKanta Mahapatra:
Social Media Use in Physician-Patient Interaction - A Fit Perspective. AMCIS 2014 - 2012
- [j16]Jingguo Wang, Raj Sharman, Stanley Zionts:
Functionality defense through diversity: a design framework to multitier systems. Ann. Oper. Res. 197(1): 25-45 (2012) - [j15]Jingguo Wang, Nan Xiao, H. Raghav Rao:
An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security. Decis. Support Syst. 52(2): 395-405 (2012) - [j14]Jingguo Wang, Yangmin Li:
Dynamics Modeling and Simulation of a kind of wheeled humanoid Robot Based on Screw Theory. Int. J. Humanoid Robotics 9(4) (2012) - [j13]Jingguo Wang, Zhiyong Yang, Sudip Bhattacharjee:
Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy. J. Manag. Inf. Syst. 28(3): 343-384 (2012) - [j12]Jingguo Wang, Tejaswini C. Herath, Rui Chen, Arun Vishwanath, H. Raghav Rao:
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. IEEE Trans. Prof. Commun. 55(4): 345-362 (2012) - 2011
- [j11]Arun Vishwanath, Tejaswini C. Herath, Rui Chen, Jingguo Wang, H. Raghav Rao:
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3): 576-586 (2011) - [j10]Rui Chen, Jingguo Wang, Tejaswini C. Herath, H. Raghav Rao:
An investigation of email processing from a risky decision making perspective. Decis. Support Syst. 52(1): 73-81 (2011) - [j9]Jingguo Wang, Yangmin Li:
Traching Control Of A Redundant Manipulator With The Assistance Of Tactile Sensing. Intell. Autom. Soft Comput. 17(7): 833-845 (2011) - [j8]Jingguo Wang, Yangmin Li:
Manipulation of a Mobile Modular Manipulator Interacting with the Environment with the Assistance of Tactile Sensing Feedback. Int. J. Humanoid Robotics 8(4): 777-793 (2011) - 2010
- [j7]Jingguo Wang, Nan Xiao, H. Raghav Rao:
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures. ACM Trans. Manag. Inf. Syst. 1(1): 3:1-3:23 (2010) - [c14]Jingguo Wang, Yangmin Li:
Hybrid impedance control of a 3-DOF robotic arm used for rehabilitation treatment. CASE 2010: 768-773 - [c13]Jingguo Wang, Yangmin Li:
Surface-tracking of a 5-DOF manipulator equipped with tactile sensors. ICARCV 2010: 2448-2453 - [c12]Jingguo Wang, Yangmin Li:
Manipulation of a Mobile Modular Manipulator Interacting with the Environment with the Assistance of Tactile Sensing Feedback. ICIRA (1) 2010: 214-225 - [c11]Jingguo Wang, Yangmin Li:
A Cooperated-Robot Arm Used for Rehabilitation Treatment with Hybrid Impedance Control Method. ICIRA (2) 2010: 451-462 - [c10]Jingguo Wang, Yangmin Li:
A study on a robotic arm contacting with human skin using tactile sensing feedback strategies. ROBIO 2010: 1559-1564
2000 – 2009
- 2009
- [j6]Brent Furneaux, Timothy R. Hill, Wayne Smith, Shailaja Venkatsubramanyan, Jingguo Wang, Anne L. Washington, Paul Witman:
AMCIS 2008 Panel Report: Aging Content on the Web: Issues, Implications, and Potential Research Opportunities. Commun. Assoc. Inf. Syst. 24: 8 (2009) - [j5]Jingguo Wang, Rui Chen, Tejaswini C. Herath, H. Raghav Rao:
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decis. Support Syst. 48(1): 92-102 (2009) - [c9]Jingguo Wang, Yangmin Li:
Dynamic Control and Analysis of a Nonholonomic Mobile Modular Robot. ICIRA 2009: 776-791 - [c8]Jingguo Wang, Yangmin Li:
Analysis on the interaction between the nonholonomic mobile modular robot and the environment. ROBIO 2009: 86-91 - [c7]Jingguo Wang, Nan Xiao, H. Raghav Rao:
An Exploration of the Search for Information Security. WEB 2009: 177-180 - 2008
- [j4]Jingguo Wang, Stanley Zionts:
Negotiating wisely: Considerations based on MCDM/MAUT. Eur. J. Oper. Res. 188(1): 191-205 (2008) - [j3]Jingguo Wang, Abhijit Chaudhury, H. Raghav Rao:
Research Note - A Value-at-Risk Approach to Information Security Investment. Inf. Syst. Res. 19(1): 106-120 (2008) - [j2]Jingguo Wang, Raj Sharman, Ram Ramesh:
Shared Content Management in Replicated Web Systems: A Design Framework Using Problem Decomposition, Controlled Simulation, and Feedback Learning. IEEE Trans. Syst. Man Cybern. Part C 38(1): 110-124 (2008) - [c6]Jingguo Wang, Yangmin Li:
A survey on the structures of current mobile humanoid robots. APCCAS 2008: 1826-1829 - [c5]Jingguo Wang, Yangmin Li:
Static force analysis for a mobile humanoid robot moving on a slope. ROBIO 2008: 371-376 - [c4]Jingguo Wang, Yangmin Li, Changwu Qiu:
Analysis of dynamic stability constraints for a mobile humanoid robot. ROBIO 2008: 377-382 - [c3]Jingguo Wang, Yangmin Li:
Dynamic modeling of a mobile humanoid robot. ROBIO 2008: 639-644 - 2006
- [j1]Jingguo Wang, Stanley Zionts:
The aspiration level interactive method (AIM) reconsidered: Robustness of solutions. Eur. J. Oper. Res. 175(2): 948-958 (2006) - [c2]Jingguo Wang, Raj Sharman, Stanley Zionts:
A Design Framework to Information System Functionality Defense through Diversity. AMCIS 2006: 414 - 2005
- [c1]Jingguo Wang, Abhijit Chaudhury, H. Raghav Rao:
An Extreme Value Approach to Information Technology Security Investment. ICIS 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint