Match!
Jingguo Wang
University of Texas at Arlington
48Publications
11H-index
540Citations
Publications 48
Newest
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
#2Adel Yazdanmehr (CUNY: City University of New York)H-Index: 1
Last.H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 39
view all 4 authors...
Abstract This study examines victims' responses to identity theft and antecedents to their responses. Drawing upon the victimization and coping literature, we recognize an emotional response called perceived distress and a portfolio of four behavioral responses including refraining from online transactions, refraining from information disclosure, emotional adjustment, and self-protection such as subscription to identity theft protection services. We conduct an empirical test on the antecedents t...
#1Yajing Wang (CAU: China Agricultural University)H-Index: 1
#2Jingheng Guo (CAU: China Agricultural University)H-Index: 5
Last.Xiaoshan Zhang (CAS: Chinese Academy of Sciences)H-Index: 18
view all 6 authors...
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
Last.H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 39
view all 4 authors...
#1Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
#2kuo-chung Chang (YZU: Yuan Ze University)H-Index: 1
Last.Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 11
view all 3 authors...
ABSTRACTCloud storage is a common service underlying many cloud computing applications, but its adoption is dragged by users’ concerns about privacy and security. To enhance user information control, cloud storage service providers usually offer information assurance (such as technology-based assurance and institution-based assurance), but the effects vary across contexts. We argue that information assurance represents an external motivation that ought to be internalized by the users in order fo...
#1Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 11
#2Yuan Li (UIS: University of Illinois at Springfield)H-Index: 2
Last.H. Raghav Rao (UTSA: University of Texas at San Antonio)H-Index: 39
view all 3 authors...
This study investigates users' coping responses in the process of phishing email detection. Three common responses are identified based on the coping literature: task-focused coping, emotion-focused coping i.e., worry and self-criticism, and avoidance coping. The three responses are used to conceptualize a higher-order construct, coping adaptiveness, that resides on a continuum between maladaptive coping and adaptive coping manifested as increased task-focused coping and decreased emotion-focuse...
#1Linghong Zhang (SDNU: Shandong Normal University)H-Index: 2
#2Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 11
The study considers a retailer that sells a short-life-cycle product and uses the online channel as a supplement to its traditional channel. The inventory of the product is finite. The sales season is split into two periods: the premium period and the discount period. The study investigates how the retailer coordinates two channels with proper pricing strategies and channel mix. We introduce a new strategy to address channel conflict, in which two channels are introduced at different periods and...
#1Rui Chen (BSU: Ball State University)H-Index: 16
#2Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 11
Last.H. R. Rao (UTSA: University of Texas at San Antonio)H-Index: 1
view all 4 authors...
ABSTRACTIn this article, we develop a three-stage study to examine the role of an e-mail authentication and identification service (eATS) intervention in affecting end-user e-mail risk perceptions. We deploy the eATS and find that it reduces users’ risk perception. Pre-intervention risk perception is found to be positively associated with user perception of the e-authentication service’s usefulness. Moreover, perceived usefulness of the service negatively relates to e-mail risk perception in the...
12345678910