Jingguo Wang
Orcid: 0000-0003-2412-4641
According to our database1,
Jingguo Wang
authored at least 78 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Dynamic effects of emotions in microblogs on sharing during EID outbreaks: The contingent role of user personality traits.
Inf. Manag., 2025
2024
Use of Body Worn Camera (BWC) In Gray Scenarios: a Law Enforcement Officers' Perspective.
Eur. J. Inf. Syst., July, 2024
Decis. Support Syst., February, 2024
Digital Contact Tracing for Pandemic Response: The Roles of Cultural Worldviews and Technology Awareness.
Inf. Syst. Res., 2024
The impact of doctors' facial attractiveness on users' choices in online health communities: A stereotype content and social role perspective.
Decis. Support Syst., 2024
How self-selection Bias in online reviews affects buyer satisfaction: A product type perspective.
Decis. Support Syst., 2024
2023
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies.
Eur. J. Inf. Syst., November, 2023
Continuous improvement of information security management: an organisational learning perspective.
Eur. J. Inf. Syst., November, 2023
Employee responses to information security related stress: Coping and violation intention.
Inf. Syst. J., May, 2023
Can peers help reduce violations of information security policies? The role of peer monitoring.
Eur. J. Inf. Syst., May, 2023
Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites.
MIS Q., 2023
2022
Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals.
Manag. Sci., 2022
Network Configuration in App Design: The Effects of Simplex and Multiplex Networks on Team Performance.
J. Assoc. Inf. Syst., 2022
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach.
Comput. Secur., 2022
2021
J. Assoc. Inf. Syst., 2021
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce.
Comput. Hum. Behav., 2021
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
2020
J. Comput. Inf. Syst., 2020
Peers matter: The moderating role of social influence on information security policy compliance.
Inf. Syst. J., 2020
Inf. Syst. Frontiers, 2020
Mutual influences between message volume and emotion intensity on emerging infectious diseases: An investigation with microblog data.
Inf. Manag., 2020
2019
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts.
MIS Q., 2019
Decis. Support Syst., 2019
2018
Inf. Manag., 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res., 2017
Coordination of the traditional and the online channels for a short-life-cycle product.
Eur. J. Oper. Res., 2017
Influence of Technology Affordance on the Adoption of Mobile Technologies for Diabetes Self-management.
Proceedings of the Smart Health - International Conference, 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the International Conference on Information Systems, 2017
Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Decis. Support Syst., 2016
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016
Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera.
Proceedings of the International Conference on Information Systems, 2016
Family Work Conflict and Information Security Policy Compliance - An Empirical Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
A Comparative Analysis of Univariate Time Series Methods for Estimating and Forecasting Daily Spam in United States.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications.
MIS Q., 2015
Research Note - An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior.
Inf. Syst. Res., 2015
Consumer environmental awareness and channel coordination with two substitutable products.
Eur. J. Oper. Res., 2015
Decis. Support Syst., 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service.
Inf. Syst. J., 2014
Proceedings of the 20th Americas Conference on Information Systems, 2014
2012
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email.
IEEE Trans. Prof. Commun., 2012
Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy.
J. Manag. Inf. Syst., 2012
Dynamics Modeling and Simulation of a kind of wheeled humanoid Robot Based on Screw Theory.
Int. J. Humanoid Robotics, 2012
An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security.
Decis. Support Syst., 2012
Ann. Oper. Res., 2012
2011
Manipulation of a Mobile Modular Manipulator Interacting with the Environment with the Assistance of Tactile Sensing Feedback.
Int. J. Humanoid Robotics, 2011
Intell. Autom. Soft Comput., 2011
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model.
Decis. Support Syst., 2011
Decis. Support Syst., 2011
2010
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures.
ACM Trans. Manag. Inf. Syst., 2010
A study on a robotic arm contacting with human skin using tactile sensing feedback strategies.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
A Cooperated-Robot Arm Used for Rehabilitation Treatment with Hybrid Impedance Control Method.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010
Proceedings of the 11th International Conference on Control, 2010
Proceedings of the IEEE Conference on Automation Science and Engineering, 2010
2009
Visual e-mail authentication and identification services: An investigation of the effects on e-mail use.
Decis. Support Syst., 2009
AMCIS 2008 Panel Report: Aging Content on the Web: Issues, Implications, and Potential Research Opportunities.
Commun. Assoc. Inf. Syst., 2009
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009
Analysis on the interaction between the nonholonomic mobile modular robot and the environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009
Proceedings of the Intelligent Robotics and Applications, Second International Conference, 2009
2008
Shared Content Management in Replicated Web Systems: A Design Framework Using Problem Decomposition, Controlled Simulation, and Feedback Learning.
IEEE Trans. Syst. Man Cybern. Part C, 2008
Inf. Syst. Res., 2008
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008
2006
Eur. J. Oper. Res., 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
Proceedings of the International Conference on Information Systems, 2005