Research
Published/Forthcoming in Refereed Journals
- Wang, J., Y. Li, Forthcoming, “Digital Contact Tracing for Pandemic Response: The Roles of Cultural Worldviews and Technology Awareness”, Information Systems Research.
- Lee, J., J. Wang, M. Guzman, M. Gupta, H. R. Rao, Forthcoming, Can I Help Prevent Data Breaches in the Workplace? From Routine Activities to Extra-Role Security Behaviors, IEEE Transactions on Technology and Society.
- Zhang, X., Y. Wang, X. Quan, J. Wang, 2024. The Impact of Doctors’ Facial Attractiveness on Users’ Choices in Online Health Communities: A Stereotype Content and Social Role Perspective. Decision Support Systems 182 (July).
- Xie, Y., W. Yeoh, J. Wang, 2024. How Self-selection Bias in Online Reviews Affects Buyer Satisfaction: A Product Type Perspective. Decision Support Systems 181(June).
- Yazdanmehr, A., R. Fich, M. Jawad, J. Wang, 2024. The Role of Ethical Climates in Employee Information Security Policy Violations. Decision Support Systems 177 (February).
- Lee, J., C. Woo, J. Wang, H. R. Rao, 2024 “Use of Body Worn Camera (BWC) In Gray Scenarios: A Police Perspective”, European Journal of Information Systems 33(4).
- Wang, J., M. Dong, Z. Yang, Y, Li, 2023, “Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites”, MIS Quarterly 47(4) 1585-1614.
- Yazdanmehr, A., Y. Li, J. Wang, 2023 “Employee Responses to Information Security Related Stress: Coping and Violation Intention”, Information Systems Journal 33(3).
- Lee, J., M. Guzman, J. Wang, M. Gupta, H. Rao, 2022, “Investigating Perceptions about Risk of Data Breaches in Financial Institutions: a Routine Activity-Approach,” Computer & Security 121(October).
- Ghahramani, F., A. Yazdanmehr, D. Chen, J. Wang, 2023, “Continuous Improvement of Information Security Management: An Organizational Learning Perspective,” European Journal of Information Systems 32(6).
- Yazdanmehr, A, Y. Li, J. Wang, 2023, “Does Stress Reduce Violation Intention? Insights from Eustress and Distress Processes on Employee Reaction to Information Security Policies,” European Journal of Information Systems 32(6).
- Qu, G., J. Wang, X. Lu, Q. Xu, Q. Wang, 2022, “Network Configuration in App Design: The Effects of Simplex and Multiplex Networks on Team Performance”, Journal of the Association for Information Systems 23(6).
- Yazdanmehr, A., J. Wang, 2023, “Can Peers Help Reduce Violations of Information Security Policies? The Role of Peer Monitoring”, European Journal of Information Systems 32(3).
- Chen, K., J. Wang, Y. Lang, 2022, “Coping with Digital Extortion: An Experimental Study on Benefit Appeals and Normative Appeals,” Management Science 68(7).
- Dissanayake, I., N. Sridhar, J. Wang, M. Yasur, J. Zhang, 2021, “Impact of Helping Others in a Coopetitive Crowdsourcing Community,” Journal of the Association for Information Systems 22(1) .
- Qiu J., L. Xu, J. Wang , W. Gu, 2020, “Mutual Influences between Message Volume and Emotion Intensity on Emerging Infectious Diseases: An Investigation with Microblog Data,” Information & Management 57(4) 1-15.
- Zafar, A., J. Qiu, Y. Li, J. Wang, M. Shahzad, 2021, “The Impact Of Social Media Celebrities’ Posts And Contextual Interactions On Impulse Buying In Social Commerce,” Computers in Human Behavior 115 (Feb).
- Yazdanmehr, A.,Wang, J., and Z. Yang, 2020, “Peers Matter: The Moderating Role of Social Influence on Information Security Policy Compliance,” Information Systems Journal 30 (5) 791-844.
- Li, Y., A. Yazdanmehr, Wang, J., and H. R. Rao, 2019, “Responding to identity theft: A victimization perspective,” Decision Support Systems 121(2019) 13-24.
- Wang, J.,J. Shan, M. Gupta, and H. R. Rao, 2019, “A Longitudinal Study of Unauthorized Access Attempts on Information Systems: the Role of Opportunity Contexts,” MIS Quarterly 43(2) 601-622.
- Li, Y., K. Chang, Wang, J., 2020, “Self-Determination and Perceived Information Control in Cloud Storage Service,” Journal of Computer Information Systems 60(2).
- Wang, J., Z. Yang, and D. Brocato, 2018, “An investigation into the antecedents of pre-purchase online search,” Information & Management 55(3) 285-293.
- Chen, R., J. Wang, T. Herath, H. R. Rao, 2017, “An Examination Of An E-Authentication Service As An Intervention In E-Mail Risk Perception”, Journal of Information Privacy and Security 13(1) 2-16.
- Wang, J., Y. Li, and H. R. Rao, 2017, “Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences,” Information Systems Research 28(2) 378 – 396.
- Yazdanmehr, A., J. Wang, 2017, “Employees’ Information Security Policy Compliance: A Norm Activation Perspective,” Decision Support Systems 92 (12) 36-46.
- Zhang, L., J. Wang, 2017, “Coordination of the Traditional and the Online Channels for a Short-life-cycle Product,” European Journal of Operational Research 258 (2) 639–651.
- Wang, J., Y. Li, and H. R. Rao, 2016, “Overconfidence in Phishing Email Detection,” Journal of the Association for Information Systems 17(11).
- Wang, J., N. Xiao and H. R. Rao 2015 , “An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior,” Information Systems Research 26(3) 619-633.
- Yang, Z., J. Wang, 2015 , “Differential Effects of Social Influence Sources on Self-Reported Music Piracy,” Decision Support Systems 69 70-81.
- Wang, J., M. Gupta, and H. R. Rao, 2015 , “Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications,” MIS Quarterly 39(1) 91-112.
- Zhang, L., J. Wang, and J. You, 2015 , “Consumer environmental awareness and channel coordination with two substitutable products,” European Journal of Operational Research 241(1) 63-73.
- Wang, J. and S. Zionts, 2015 , “Using Ordinal Data To Estimate Cardinal Values,” Journal of Multi-criteria Decision Analysis 22(3-4) 185-196.
- Yang, Z., J. Wang, and M. Mourali, 2015, “The Effect of Peer Influence on Two Aspects of Music Piracy: The Moderating Role of Self-Construal,” Journal of Business Research 68(2) 516-525.
- Herath, T., R. Chen, J. Wang, K. Banjara, J. Wilbur, H. R. Rao, 2014, “Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service”, Information Systems Journal 24(1) 61-84.
- Wang, J., R. Chen, T. Herath, A. Vishwanath, H. R. Rao. 2012. “Phishing Susceptibility: An Investigation into the Processing of a Targeted Spear Phishing Email.” IEEE Transactions on Professional Communication 55(4) 345-362.
- Wang, J., N. Xiao, H. R. Rao, 2012, “An Exploration of Risk Information Search via a Search Engine: Queries and Clicks in Healthcare and Information Security”, Decision Support Systems 52(2) 395-405.
- Wang, J., R. Sharman, S. Zionts. 2012.“Functionality Defense through Diversity: A Design Framework to Multitier Systems.” Annals of Operations Research 197(1) 25-45.
- Wang, J., Z.Yang, S. Bhattacharjee. 2011, “Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy”, Journal of Management Information Systems 28(3) 343-384.
- Chen, R., J. Wang, T. Herath, H. R. Rao, 2011, “An Investigation of Email Processing from a Risky Decision Making Perspective”, Decision Support Systems. 51(1) 73-81.
- Vishwanath, A., T. Herath, R. Chen, J. Wang, H. R. Rao, 2011, “Why do People get Phished? Testing Individual Differences in Phishing Susceptibility Within an Integrated, Information Processing Model”, Decision Support Systems 51(3) 576-586.
- Wang, J., N. Xiao, H. R. Rao, 2010, “Drivers of Information Security Search Behavior: An Investigation of Network Attacks and Vulnerability Disclosures,” ACM Transactions on Management Information Systems 1(1) Article 3.
- Wang, J. , R. Chen, T. Herath, H. R. Rao. 2009. “Visual E-Mail Authentication and Identification Services: An Investigation of the Effect on E-mail Use.” Decision Support Systems 48 92-102.
- “AMCIS 2008 Panel Report: Aging Content on the Web: Issues, Implications, and Potential Research Opportunities”, 2009, with B. Furneaux, T. Hill, W. Smith, S. Venkatsubramanyan, A. Washington, P. Witman. Communications of the AIS 24 113-128.
- Wang, J., A. Chaudhury, H. R. Rao. 2008. “A Value-at-Risk Approach to Information Security Investment.”Information Systems Research 19(1) 106-120.
- Wang, J. , R. Sharman, R. Ramesh. 2008. “Shared Content Management in Replicated Web Systems: A Design Framework using Problem Decomposition, Controlled Simulation and Feedback Learning.” IEEE Transactions On Systems, Man, And Cybernetics (Part C) 38(1) 110-124.
- Wang, J. , S. Zionts. 2008. “Negotiating Wisely: Considerations Based on Multi-Criteria Decision Making/Multi-Attributes Utility Theory.” European Journal of Operational Research 188(1) 191-205.
- Wang, J. , S. Zionts. 2006. “The Aspiration Level Interactive Method (AIM) Reconsidered: Robustness of Solutions.” European Journal of Operational Research 175(2) 948-958.
- Wang, J. , S. Zionts. 2005. “WebAIM: An Online Aspiration Level Interactive Method.” Journal of Multi-Criteria Decision Analysis 13 51-63.
Research Grant
- Interdisciplinary Research Program, the University of Texas at Arlington (with M. Wright, Computer Science, UT Arlington), 8/2015-7/2016
- NSF, Small: Collaborative: Modeling Insider Threat Behavior in Financial Institutions: Large Scale Data Analysis(With H. R. Rao, SUNY Buffalo), 8/15/2014-7/31/2017
- NSF, E-mail Deception and Visual E-Mail Authentication Services: an Investigation, (Involved as senior personnel), 9/1/2012-8/31/2015
- Research Enhancement Program Grant, the University of Texas at Arlington (with Z. Yang, UT Arlington), 6/1/2009-5/1/2010.
Book Chapters
- Wang, J., N. Xiao, H. R. Rao. 2010. “An Exploration of the Search For Information Security.” In Lecture Notes in Business Information Processing (52), edited by R. Sharman, T. S. Raghu, H. R. Rao. Springer
- Wang, J. , R. Chen, T. Herath, H. R. Rao. 2009. “An Exploration of the Design Features of Phishing Attacks.” In Annals of Emerging Research in IA, Security and Privacy Services, edited by H.R. Rao and Shambhu Upadhyaya. Emerald.
Software
- WebAIM : An Online Aspiration-level Interactive Model For Multiple Criteria Decision Making.