Seguir
Yan Chen
Yan Chen
Dirección de correo verificada de fiu.edu - Página principal
Título
Citado por
Citado por
Año
Organizations' information security policy compliance: Stick or carrot approach?
Y Chen, K Ramamurthy, KW Wen
Journal of Management Information Systems 29 (3), 157-188, 2012
4922012
Individuals’ Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
Y Chen, FM Zahedi
MIS Quarterly 40 (1), 2016
3142016
Impacts of comprehensive information security programs on information security culture
YAN Chen, K Ramamurthy, KW Wen
Journal of Computer Information Systems 55 (3), 11-19, 2015
2342015
Brand relationship, consumption values and branded app adoption
KF Peng, Y Chen, KW Wen
Industrial Management & Data Systems 114 (8), 1131-1143, 2014
1652014
E-business value creation in Small and Medium Enterprises: a US study using the TOE framework
KW Wen, Y Chen
International Journal of Electronic Business 8 (1), 80-100, 2010
1382010
Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance
FM Zahedi, A Abbasi, Y Chen
Journal of the Association for Information Systems 16 (6), 2, 2015
1202015
Enhancing predictive analytics for anti-phishing by exploiting website genre information
A Abbasi, FM Zahedi, D Zeng, Y Chen, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 31 (4), 109-157, 2015
922015
Constructs Affecting Continuance intention in consumers with mobile financial apps: a dual factor approach
DL Amoroso, YAN Chen
Journal of Information Technology Management 28 (3), 1-24, 2017
562017
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Y Chen, DF Galletta, PB Lowry, X Luo, GD Moody, R Willison
Information Systems Research 32 (3), 1043-1065, 2021
552021
A systematic review on cross-cultural information systems research: Evidence from the last decade
X Chu, XR Luo, Y Chen
Information & Management 56 (3), 403-417, 2019
532019
Are we ready for cyberterrorist attacks?—Examining the role of individual resilience
J Hua, Y Chen, XR Luo
Information & Management 55 (7), 928-938, 2018
522018
Understanding Information Security Policy Violation from a Situational Action Perspective
H Li, XR Luo, Y Chen
Journal of the Association for Information Systems 22 (3), 739-772, 2021
412021
A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach
Y Chen, S Deng, DH Kwak, A Elnoshokaty, J Wu
Journal of the Association for Information Systems 20 (2), 105-131, 2019
412019
Phishing susceptibility: The good, the bad, and the ugly
A Abbasi, FM Zahedi, Y Chen
2016 IEEE conference on intelligence and security informatics (ISI), 169-174, 2016
402016
Impact of anti-phishing tool performance on attack success rates
A Abbasi, F Zahedi, Y Chen
2012 IEEE international conference on intelligence and security informatics …, 2012
402012
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools
Y Chen, FM Zahedi, A Abbasi, D Dobolyi
Information & Management 58 (1), 103394, 2021
332021
Interface design elements for anti-phishing systems
Y Chen, F Zahedi, A Abbasi
Service-Oriented Perspectives in Design Science Research: 6th International …, 2011
302011
Beyond adaptive security coping behaviors: Theory and empirical evidence
Y Chen, XR Luo, H Li
Information & Management 59 (2), 103575, 2022
262022
Effects of exchange benefits, security concerns and situational privacy concerns on mobile commerce adoption
H Dai, Y Chen
Journal of International Technology and Information Management 24 (3), 3, 2015
162015
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence
Y Chen, W Xia, K Cousins
Computers & Security 113, 102568, 2022
152022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20