Match!
Jingguo Wang
University of Texas at Arlington
Control engineeringComputer scienceInformation securityKnowledge managementControl theory
98Publications
22H-index
1,656Citations
What is this?
Publications 97
Newest
#1Xinmu Zhang (CAU: China Agricultural University)H-Index: 1
#2Jingheng Guo (CAU: China Agricultural University)H-Index: 5
Last. Xiaoshan Zhang (CAS: Chinese Academy of Sciences)H-Index: 19
view all 8 authors...
Abstract Significant increase in soil organic carbon (SOC) has been found in Chinese croplands. Current literature largely attributes this to the increased organic C inputs from manure, crop straw and root. However, using a meta-analysis of 185 long-term trials and 6669 spatial data pairs across China, we show here that soil acidification is an additional significant cause for the SOC accumulation. Results from long-term experiments showed that soil acidification due to excessive N fertilization...
1 CitationsSource
#1Jinchuang Wang (CAU: China Agricultural University)
#2Jingguo Wang (CAU: China Agricultural University)H-Index: 22
Last. Diana Di Gioia (UNIBO: University of Bologna)H-Index: 21
view all 7 authors...
As potent allelochemicals, flavonoids are believed to be associated with the development of soil-borne diseases. Fusarium species infection is responsible for soybean [Glycine max(L.) Merr.] root rot. However, it is uncertain if and how flavonoids influence rhizosphere Fusarium communities under consecutive soybean monoculture. Quantitative real-time PCR and pyrosequencing were used to study the Fusarium community. Spectrophotometric techniques and ultra-performance liquid chromatography (UPLC) ...
Source
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
#2kuo-chung Chang (YZU: Yuan Ze University)H-Index: 1
Last. Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 22
view all 3 authors...
ABSTRACTCloud storage is a common service underlying many cloud computing applications, but its adoption is dragged by users’ concerns about privacy and security. To enhance user information contro...
2 CitationsSource
#1Adel Yazdanmehr (CUNY: City University of New York)H-Index: 1
#2Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 22
Last. Zhiyong Yang (UNCG: University of North Carolina at Greensboro)
view all 3 authors...
Source
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
#2Adel Yazdanmehr (CUNY: City University of New York)H-Index: 1
Last. H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 37
view all 4 authors...
Abstract This study examines victims' responses to identity theft and antecedents to their responses. Drawing upon the victimization and coping literature, we recognize an emotional response called perceived distress and a portfolio of four behavioral responses including refraining from online transactions, refraining from information disclosure, emotional adjustment, and self-protection such as subscription to identity theft protection services. We conduct an empirical test on the antecedents t...
Source
This study investigates employee behavior of unauthorized access attempts on information systems (IS) applications in a financial institution and examines how opportunity contexts facilitate such behavior. By contextualizing multilevel criminal opportunity theory, we develop a model that considers both employee- and department-level opportunity contexts. At the employee level, we hypothesize that the scope and data value of the applications that an employee has legitimately accessed, together wi...
Source
#1Yajing Wang (CAU: China Agricultural University)H-Index: 1
#2Jingheng Guo (CAU: China Agricultural University)H-Index: 5
Last. Xiaoshan Zhang (CAS: Chinese Academy of Sciences)H-Index: 19
view all 6 authors...
18 CitationsSource
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
#2Adel YazdanmehrH-Index: 1
Last. H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 37
view all 4 authors...
#1Yuan LiH-Index: 2
#2Jingguo WangH-Index: 22
Last. H. Raghav RaoH-Index: 37
view all 3 authors...
#1Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 22
#2Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
Last. H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 37
view all 3 authors...
This study investigates users' coping responses in the process of phishing email detection. Three common responses are identified based on the coping literature: task-focused coping, emotion-focused coping i.e., worry and self-criticism, and avoidance coping. The three responses are used to conceptualize a higher-order construct, coping adaptiveness, that resides on a continuum between maladaptive coping and adaptive coping manifested as increased task-focused coping and decreased emotion-focuse...
8 CitationsSource
12345678910