×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Busin... [3]
Authors
WANG QIAN [3]
Document Type
Journal article [3]
Date Issued
2025 [1]
2024 [2]
Language
英語English [2]
Source Publication
Journal of Opera... [1]
Journal of the A... [1]
Production and O... [1]
Indexed By
SCIE [2]
SSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-3 of 3
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Author Ascending
Author Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir) responsibility and Information Security Performance
Journal article
WANG QIAN, Dan Pienta, Shenyang Jiang, Eric W. T. Ngai, Jason Bennett Thatcher. Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir) responsibility and Information Security Performance[J]. Journal of the Association for Information Systems, 2025, 26(1), 171-204.
Authors:
WANG QIAN
;
Dan Pienta
;
Shenyang Jiang
;
Eric W. T. Ngai
;
Jason Bennett Thatcher
Adobe PDF
|
Favorite
|
IF:
7.0
/
7.4
|
Submit date:2025/01/19
Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity
Journal article
Wang, Qian, Peng, Chih Hung, Jin, Yong, Jiang, Shenyang. Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity[J]. Production and Operations Management, 2024.
Authors:
Wang, Qian
;
Peng, Chih Hung
;
Jin, Yong
;
Jiang, Shenyang
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
4.8
/
6.0
|
Submit date:2024/11/05
Data Breach
Information Technology Investment
It Innovation
Failure Learning Theory
Threat Rigidity Theory
Vendor selection in the wake of data breaches: A longitudinal study
Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:
Wang, Qian
;
Jiang, Shenyang
;
Ngai, Eric W.T.
;
Huo, Baofeng
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
6.5
/
9.2
|
Submit date:2024/05/16
Attention-based View
Data Breach
Electronic Medical Record Systems
Information Security
Information Technology Outsourcing
Vendor Selection