The role of corporate reputation and crisis response strategies in data breach management KL Gwebu, J Wang, L Wang Journal of management information systems 35 (2), 683-714, 2018 | 203 | 2018 |
The aftermath of information technology outsourcing: An empirical study of firm performance following outsourcing decisions L Wang, KL Gwebu, J Wang, DX Zhu Journal of Information Systems 22 (1), 125-159, 2008 | 155 | 2008 |
A critical analysis of current indexes for digital divide measurement G Bruno, E Esposito, A Genovese, KL Gwebu The Information Society 27 (1), 16-28, 2011 | 146 | 2011 |
Personal innovativeness in technology, related knowledge and experience, and entrepreneurial intentions in emerging technology industries: a process of causation or effectuation? DK Dutta, KL Gwebu, J Wang International Entrepreneurship and Management Journal 11, 529-555, 2015 | 133 | 2015 |
Impact of virtual brand experience on purchase intentions: the role of multichannel congruence. JA Gabisch, KL Gwebu Journal of Electronic Commerce Research 12 (4), 2011 | 133 | 2011 |
Adoption of Open Source Software: The role of social identification KL Gwebu, J Wang Decision support systems 51 (1), 220-229, 2011 | 121 | 2011 |
An application of agent-based simulation to knowledge sharing J Wang, K Gwebu, M Shanker, MD Troutt Decision Support Systems 46 (2), 532-541, 2009 | 118 | 2009 |
Continued usage intention of multifunctional friend networking services: A test of a dual-process model using Facebook KL Gwebu, J Wang, L Guo Decision Support Systems 67, 66-77, 2014 | 90 | 2014 |
Information security policy noncompliance: An integrative social influence model KL Gwebu, J Wang, MY Hu Information Systems Journal 30 (2), 220-269, 2020 | 79 | 2020 |
Does IT outsourcing deliver economic value to firms? KL Gwebu, J Wang, L Wang The Journal of Strategic Information Systems 19 (2), 109-123, 2010 | 42 | 2010 |
A conceptual framework for understanding trust building and maintenance in virtual organizations KL Gwebu, J Wang, MD Troutt Journal of Information Technology Theory and Application (JITTA) 9 (1), 5, 2007 | 38 | 2007 |
Seeing eye to eye? An exploratory study of free open source software users’ perceptions KL Gwebu, J Wang Journal of systems and software 83 (11), 2287-2296, 2010 | 37 | 2010 |
Strategy and Vendor Selection in IT Outsourcing: Is there a Method in the Madness? D Dutta, K Gwebu, J Wang Journal of Global Information Technology Management 14 (2), 6-26, 2011 | 33 | 2011 |
Differential performance of science park firms: an integrative model KL Gwebu, J Sohl, J Wang Small Business Economics 52, 193-211, 2019 | 27 | 2019 |
Data breaches in hospitality: is the industry different? K Gwebu, CW Barrows Journal of Hospitality and Tourism Technology 11 (3), 511-527, 2020 | 23 | 2020 |
Understanding the cost associated with data security breaches. KL Gwebu, J Wang, W Xie PACIS, 386, 2014 | 23 | 2014 |
The role of organizational, environmental and human factors in e-learning diffusion KL Gwebu, J Wang International Journal of Web-Based Learning and Teaching Technologies …, 2007 | 23 | 2007 |
Can warnings curb the spread of fake news? The interplay between warning, trust and confirmation bias KL Gwebu, J Wang, E Zifla Behaviour & Information Technology 41 (16), 3552-3573, 2022 | 15 | 2022 |
An experimental investigation into the effects of information revelation in multi-attribute reverse auctions KL Gwebu, MY Hu, MS Shanker Behaviour & Information Technology 31 (6), 631-644, 2012 | 15 | 2012 |
Constructing a multi-agent system: an architecture for a virtual marketplace K Gwebu, J Wang, MD Troutt Intelligent decision support systems in agent-mediated environments, 2005 | 9 | 2005 |