UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
A 3D SPH framework for simulating landslide dam breaches by coupling erosion and side slope failure Journal article
Li, Shuang, Peng, Ming, Gao, Liang, Xia, Chengzhi, Zhu, Yan. A 3D SPH framework for simulating landslide dam breaches by coupling erosion and side slope failure[J]. Computers and Geotechnics, 2024, 175, 106699.
Authors:  Li, Shuang;  Peng, Ming;  Gao, Liang;  Xia, Chengzhi;  Zhu, Yan
Favorite | TC[Scopus]:0  IF:5.3/5.7 | Submit date:2024/10/10
Breach  Erosion  Landslide Dam  Side Slope Failure  Sph  
Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity Journal article
Wang, Qian, Peng, Chih Hung, Jin, Yong, Jiang, Shenyang. Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity[J]. Production and Operations Management, 2024.
Authors:  Wang, Qian;  Peng, Chih Hung;  Jin, Yong;  Jiang, Shenyang
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:4.8/6.0 | Submit date:2024/11/05
Data Breach  Information Technology Investment  It Innovation  Failure Learning Theory  Threat Rigidity Theory  
Vendor selection in the wake of data breaches: A longitudinal study Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:  Wang, Qian;  Jiang, Shenyang;  Ngai, Eric W.T.;  Huo, Baofeng
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:6.5/9.2 | Submit date:2024/05/16
Attention-based View  Data Breach  Electronic Medical Record Systems  Information Security  Information Technology Outsourcing  Vendor Selection  
Sediment transport and bed erosion during storm surge using a coupled hydrodynamic and morphodynamic model considering wave and current interaction Journal article
Ma, He, Xu, Ludi, Okon, Samuel Ukpong, Hu, Peng, Li, Wei, Shi, Huabin, He, Zhiguo. Sediment transport and bed erosion during storm surge using a coupled hydrodynamic and morphodynamic model considering wave and current interaction[J]. Coastal Engineering, 2024, 187, 104409.
Authors:  Ma, He;  Xu, Ludi;  Okon, Samuel Ukpong;  Hu, Peng;  Li, Wei; et al.
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:4.2/4.4 | Submit date:2024/02/22
Breach  Finite-volume Method  Flow-wave-sediment Interaction  Overwash  Storm Surge  
Firm diversity and data breach risk: A longitudinal study Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:  Wang, Qian;  Ngai, Eric W.T.
Favorite | TC[WOS]:7 TC[Scopus]:6  IF:8.7/18.9 | Submit date:2023/01/30
Data Breach Risk  Diversity Type  Firm Diversity  Information Security  Managerial Ability  Resource-based View  
Am I Motivated to Share Knowledge for Better Innovative Performance? An Approach and Avoidance Framework Journal article
Lin, Xiaowan, Lu, Lin, Ozer, Muammer, Tang, Heng. Am I Motivated to Share Knowledge for Better Innovative Performance? An Approach and Avoidance Framework[J]. Journal of Applied Psychology, 2022, 108(1).
Authors:  Lin, Xiaowan;  Lu, Lin;  Ozer, Muammer;  Tang, Heng
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:9.4/11.2 | Submit date:2022/08/05
Approach And Avoidance Motivation Orientation  Innovative Performance  Knowledge Sharing  Perceived Organizational Support  Psychological Contract Breach  
Sentiments and perceptions after a privacy breach incident Journal article
Lee, Chang Boon, Io, Hio Nam, Tang, Heng. Sentiments and perceptions after a privacy breach incident[J]. Cogent Business & Management, 2022, 9(1), 2050018.
Authors:  Lee, Chang Boon;  Io, Hio Nam;  Tang, Heng
Favorite | TC[WOS]:7 TC[Scopus]:5  IF:3.0/3.0 | Submit date:2022/05/17
Big Data  Privacy Breach  Sentiment Analysis  
Work-related attitudes and behaviors: Empirical evidence from a casino destination Journal article
Li, Jun (Justin), Liu, Xiaoming, Ali, Faizan. Work-related attitudes and behaviors: Empirical evidence from a casino destination[J]. JOURNAL OF DESTINATION MARKETING & MANAGEMENT, 2018, 9, 175-183.
Authors:  Li, Jun (Justin);  Liu, Xiaoming;  Ali, Faizan
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:8.9/8.3 | Submit date:2018/10/30
Psychological Contract Breach  Leader-member Exchange  Organizational Citizenship Behavior  Organizational Identification  Turnover Intentions  
Empirical formulas in the prediction of breach parameters Conference paper
Lin Zhang, W. M. Yan, Ka-Veng Yuen. Empirical formulas in the prediction of breach parameters[C], 2016, 1727-1731.
Authors:  Lin Zhang;  W. M. Yan;  Ka-Veng Yuen
Favorite | TC[Scopus]:1 | Submit date:2019/02/12
Bayesian Analysis  Probability  Dam Failure  Breach Parameters  Model Class Selection