A Contingent Model of How Fear of External Security Threats Sparks Insiders’ Proactive Information Security Behaviors F Xu, C Hsu, XR Luo, M Warkentin The 2020 Dewald Roode Workshop on Information Systems Security Research, 2020 | | 2020 |
A framework for spyware assessment M Warkentin, X Luo, GF Templeton Communications of the ACM 48 (8), 79-84, 2005 | 47 | 2005 |
A Framework For Spyware Assessment The formulation of spyware policy must be a global effort and should reflect an understanding that not all spyware is bad. M Warkentin, X Luo, GF Templeton | | |
A holistic approach for managing spyware X Luo Inf. Secur. J. A Glob. Perspect. 15 (2), 42-48, 2006 | 10 | 2006 |
A holistic understanding of non-users’ adoption of university campus wireless network: An empirical investigation Q Liao, XR Luo, A Gurung, W Shi Computers in Human Behavior 49, 220-229, 2015 | 19 | 2015 |
A Longitudinal Study of the Actual Value of Big Data and Analytics: The Role of Industry Environment S Zhu, T Dong, XR Luo International Journal of Information Management 60, 102389, 2021 | 34 | 2021 |
A meta-analysis of online impulsive buying and the moderating effect of economic development level Y Zhao, Y Li, N Wang, R Zhou, XR Luo Information Systems Frontiers, 2021 | 116 | 2021 |
A Multi-Theoretical Study on Social Networking Tourism. AM French, XR Luo, R Bose PACIS 2014, 316, 2014 | 1 | 2014 |
A new dimensionality analysis algorithm for hyperspectral imagery X Luo, MF Jiang 2011 International Conference on Computer Science and Service System (CSSS …, 2011 | 3 | 2011 |
A scientometric investigation into the validity of IS journal quality measures BR Lewis, GF Templeton, X Luo Journal of the Association for Information Systems 8 (12), 35, 2007 | 85 | 2007 |
A Systematic Literature Review on IT-enabled value Co-creation: Toward an integrative framework H Zhang, S Yuan, F Zhang, B Wang, XR Luo Computers in Human Behavior, 108015, 2023 | | 2023 |
A Systematic Review on Cross-Cultural Information Systems Research: Evidence from the Last Decade X Chu, XR Luo, Y Chen Information & Management 56 (3), 401-417, 2019 | 53 | 2019 |
An Assessment of US and Chinese Online Gaming Environments and Futures M Warkentin, C Guo, X Luo, F Xie | 1 | 2007 |
An Empirical Examination of Organizational Commitment Across Psychological Contract Matching Patterns in Information Technology Outsourcing (ITO) B Yang, H Dai, P Haried, XR Luo, TE Hu Information Systems Frontiers, 2024 | | 2024 |
An Empirical Investigation of Trying and Trust toward Mobile Banking Adoption: A Crosscultural Analysis of Chinese and United States Users X Luo | 2 | 2007 |
An empirical investigation on customer’s privacy perceptions, trust and security awareness in E-commerce environment A Gurung, X Luo, MK Raja Journal of Information Privacy and Security 4 (1), 42-60, 2008 | 32 | 2008 |
An Empirical Investigation on the Impact of XBRL Adoption on Information Asymmetry: Evidence from Europe M Liu, XR Luo, FL Wang Decision Support Systems 93, 2017 | 129 | 2017 |
An exploratory study of mobile banking services resistance X Luo, CP Lee, M Mattila, L Liu International Journal of Mobile Communications 10 (4), 366-385, 2012 | 32 | 2012 |
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services C Guo, M Warkentin, XR Luo, A Gurung, JP Shim Information & Management 57 (8), 103261, 2020 | 24 | 2020 |
Anger or Fear? Effects of Discrete Emotions on Deviant Security Behavior F Xu, X Luo, C Hsu | 2 | 2017 |