Research

Published/Forthcoming in Refereed Journals

  1. Wang, J., Y. Li, Forthcoming, “Digital Contact Tracing for Pandemic Response: The Roles of Cultural Worldviews and Technology Awareness”, Information Systems Research.
  2. Lee, J., J. Wang, M. Guzman, M. Gupta, H. R. Rao, Forthcoming, Can I Help Prevent Data Breaches in the Workplace? From Routine Activities to Extra-Role Security Behaviors, IEEE Transactions on Technology and Society.
  3. Zhang, X., Y. Wang, X. Quan, J. Wang, 2024. The Impact of Doctors’ Facial Attractiveness on Users’ Choices in Online Health Communities: A Stereotype Content and Social Role Perspective. Decision Support Systems 182 (July).
  4. Xie, Y., W. Yeoh, J. Wang, 2024. How Self-selection Bias in Online Reviews Affects Buyer Satisfaction: A Product Type Perspective. Decision Support Systems 181(June).
  5. Yazdanmehr, A., R. Fich, M. Jawad, J. Wang, 2024. The Role of Ethical Climates in Employee Information Security Policy Violations. Decision Support Systems 177 (February).
  6. Lee, J., C. Woo,  J. Wang,  H. R. Rao, 2024 “Use of Body Worn Camera (BWC) In Gray Scenarios: A Police Perspective”, European Journal of Information Systems 33(4).
  7. Wang, J., M. Dong, Z. Yang, Y, Li, 2023, “Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites”, MIS Quarterly 47(4) 1585-1614.
  8. Yazdanmehr, A., Y. Li, J. Wang, 2023 “Employee Responses to Information Security Related Stress: Coping and Violation Intention”, Information Systems Journal 33(3).
  9. Lee, J., M. Guzman, J. Wang, M. Gupta, H. Rao, 2022, “Investigating Perceptions about  Risk of Data Breaches in Financial Institutions: a  Routine Activity-Approach,” Computer & Security 121(October).
  10. Ghahramani, F., A. Yazdanmehr, D. Chen, J. Wang, 2023, “Continuous Improvement of Information Security Management: An Organizational Learning Perspective,” European Journal of Information Systems 32(6).
  11. Yazdanmehr, A, Y. Li, J. Wang, 2023, “Does Stress Reduce Violation Intention? Insights from Eustress and Distress Processes on Employee Reaction to Information Security Policies,” European Journal of Information Systems 32(6).
  12. Qu, G., J. Wang, X. Lu, Q. Xu, Q. Wang, 2022, “Network Configuration in App Design: The Effects of Simplex and Multiplex Networks on Team Performance”, Journal of the Association for Information Systems 23(6).
  13. Yazdanmehr, A., J. Wang, 2023, “Can Peers Help Reduce Violations of Information Security Policies? The Role of Peer Monitoring”, European Journal of Information Systems 32(3).
  14. Chen, K., J. Wang, Y. Lang, 2022, “Coping with Digital Extortion: An Experimental Study on Benefit Appeals and Normative Appeals,” Management Science 68(7).
  15. Dissanayake, I., N. Sridhar, J. Wang, M. Yasur, J. Zhang, 2021, “Impact of Helping Others in a Coopetitive Crowdsourcing Community,”  Journal of the Association for Information Systems 22(1) .
  16. Qiu J., L. Xu, J. Wang , W. Gu, 2020, “Mutual Influences between Message Volume and Emotion Intensity on Emerging Infectious Diseases: An Investigation with Microblog Data,”  Information & Management 57(4) 1-15.
  17. Zafar, A., J. Qiu, Y. Li, J. Wang, M. Shahzad, 2021, “The Impact Of Social Media Celebrities’ Posts And Contextual Interactions On Impulse Buying In Social Commerce,”  Computers in Human Behavior 115 (Feb).
  18. Yazdanmehr, A.,Wang, J., and Z. Yang, 2020, “Peers Matter: The Moderating Role of Social Influence on Information Security Policy Compliance,”  Information Systems Journal 30 (5) 791-844.
  19. Li, Y., A. Yazdanmehr, Wang, J., and H. R. Rao, 2019, “Responding to identity theft: A victimization perspective,”  Decision Support Systems 121(2019) 13-24.
  20. Wang, J.,J. Shan, M. Gupta, and H. R. Rao, 2019, “A Longitudinal Study of Unauthorized Access Attempts on Information Systems: the Role of Opportunity Contexts,”  MIS Quarterly 43(2) 601-622.
  21. Li, Y., K. Chang, Wang, J., 2020, “Self-Determination and Perceived Information Control in Cloud Storage Service,”  Journal of Computer Information Systems 60(2).
  22. Wang, J., Z. Yang, and D. Brocato, 2018, “An investigation into the antecedents of pre-purchase online search,”  Information & Management 55(3) 285-293.
  23. Chen, R., J. Wang, T. Herath, H. R. Rao, 2017, “An Examination Of An E-Authentication Service As An Intervention In E-Mail Risk Perception”, Journal of Information Privacy and Security 13(1) 2-16.
  24. Wang, J., Y. Li, and H. R. Rao, 2017, “Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences,”  Information Systems Research 28(2) 378 – 396.
  25. Yazdanmehr, A., J. Wang, 2017, “Employees’ Information Security Policy Compliance: A Norm Activation Perspective,”  Decision Support Systems 92 (12) 36-46.
  26. Zhang, L., J. Wang, 2017, “Coordination of the Traditional and the Online Channels for a Short-life-cycle Product,”  European Journal of Operational Research 258 (2) 639–651.
  27. Wang, J., Y. Li, and H. R. Rao, 2016, “Overconfidence in Phishing Email Detection,”  Journal of the Association for Information Systems 17(11).
  28. Wang, J., N. Xiao and H. R. Rao 2015 , “An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior,”  Information Systems Research 26(3) 619-633.
  29. Yang, Z., J. Wang, 2015 , “Differential Effects of Social Influence Sources on Self-Reported Music Piracy,”  Decision Support Systems 69 70-81.
  30. Wang, J., M. Gupta, and H. R. Rao, 2015 , “Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications,”  MIS Quarterly 39(1) 91-112.
  31. Zhang, L., J. Wang, and J. You, 2015 , “Consumer environmental awareness and channel coordination with two substitutable products,”  European Journal of Operational Research 241(1) 63-73.
  32. Wang, J. and S. Zionts, 2015 , “Using Ordinal Data To Estimate Cardinal Values,”  Journal of Multi-criteria Decision Analysis 22(3-4) 185-196.
  33. Yang, Z., J. Wang, and M. Mourali, 2015, “The Effect of Peer Influence on Two Aspects of Music Piracy: The Moderating Role of Self-Construal,” Journal of Business Research 68(2) 516-525.
  34. Herath, T., R. Chen, J. Wang, K. Banjara, J. Wilbur, H. R. Rao, 2014, “Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service”, Information Systems Journal 24(1) 61-84.
  35. Wang, J., R. Chen, T. Herath, A. Vishwanath, H. R. Rao. 2012. “Phishing Susceptibility: An Investigation into the Processing of a Targeted Spear Phishing Email.” IEEE Transactions on Professional Communication 55(4) 345-362.
  36. Wang, J., N. Xiao, H. R. Rao, 2012, “An Exploration of Risk Information Search via a Search Engine: Queries and Clicks in Healthcare and Information Security”, Decision Support Systems 52(2) 395-405.
  37. Wang, J., R. Sharman, S. Zionts. 2012.“Functionality Defense through Diversity: A Design Framework to Multitier Systems.”  Annals of Operations Research 197(1) 25-45.
  38. Wang, J., Z.Yang, S. Bhattacharjee. 2011,   “Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy”, Journal of Management Information Systems 28(3) 343-384.
  39. Chen, R., J. Wang, T. Herath, H. R. Rao, 2011, “An Investigation of Email Processing from a Risky Decision Making Perspective”, Decision Support Systems. 51(1) 73-81.
  40. Vishwanath, A., T. Herath, R. Chen, J. Wang, H. R. Rao, 2011, “Why do People get Phished? Testing Individual Differences in Phishing Susceptibility Within an Integrated, Information Processing Model”, Decision Support Systems 51(3) 576-586.  
  41. Wang, J., N. Xiao, H. R. Rao, 2010, “Drivers of Information Security Search Behavior: An Investigation of Network Attacks and Vulnerability Disclosures,” ACM Transactions on Management Information Systems 1(1) Article 3.
  42. Wang, J. , R. Chen, T. Herath, H. R. Rao. 2009. “Visual E-Mail Authentication and Identification Services: An Investigation of the Effect on E-mail Use.” Decision Support Systems 48 92-102.
  43. “AMCIS 2008 Panel Report: Aging Content on the Web: Issues, Implications, and Potential Research Opportunities”, 2009, with B. Furneaux, T. Hill, W. Smith, S. Venkatsubramanyan, A. Washington, P. Witman. Communications of the AIS  24 113-128.
  44. Wang, J., A. Chaudhury, H. R. Rao. 2008. “A Value-at-Risk Approach to Information Security Investment.”Information Systems Research  19(1) 106-120.
  45. Wang, J. , R. Sharman, R. Ramesh. 2008. “Shared Content Management in Replicated Web Systems: A Design Framework using Problem Decomposition, Controlled Simulation and Feedback Learning.” IEEE Transactions On Systems, Man, And Cybernetics (Part C) 38(1) 110-124.
  46. Wang, J. , S. Zionts. 2008. “Negotiating Wisely: Considerations Based on Multi-Criteria Decision Making/Multi-Attributes Utility Theory.” European Journal of Operational Research 188(1) 191-205.
  47. Wang, J. , S. Zionts. 2006. “The Aspiration Level Interactive Method (AIM) Reconsidered: Robustness of Solutions.” European Journal of Operational Research 175(2) 948-958.
  48. Wang, J. , S. Zionts. 2005. “WebAIM: An Online Aspiration Level Interactive Method.” Journal of Multi-Criteria Decision Analysis 13 51-63.

Research Grant

  • Interdisciplinary Research Program, the University of Texas at Arlington (with M. Wright, Computer Science, UT Arlington), 8/2015-7/2016
  • NSF, Small: Collaborative: Modeling Insider Threat Behavior in Financial Institutions: Large Scale Data Analysis(With H. R. Rao, SUNY Buffalo), 8/15/2014-7/31/2017
  • NSF, E-mail Deception and Visual E-Mail Authentication Services: an Investigation, (Involved as senior personnel), 9/1/2012-8/31/2015
  • Research Enhancement Program Grant, the University of Texas at Arlington (with Z. Yang, UT Arlington), 6/1/2009-5/1/2010.

Book Chapters

  • Wang, J., N. Xiao, H. R. Rao. 2010.  “An Exploration of the Search For Information Security.”  In Lecture Notes in Business Information Processing (52), edited by R. Sharman, T. S. Raghu, H. R. Rao. Springer
  • Wang, J. , R. Chen, T. Herath, H. R. Rao. 2009. “An Exploration of the Design Features of Phishing Attacks.” In Annals of Emerging Research in IA, Security and Privacy Services, edited by H.R. Rao and Shambhu Upadhyaya. Emerald.

Software

  • WebAIM : An Online Aspiration-level Interactive Model For Multiple Criteria Decision Making.