×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Socia... [9]
Faculty of Busin... [5]
Faculty of Educa... [2]
Faculty of Scien... [2]
Authors
CHENGXIN PAN [3]
TANG YUAN YAN [1]
CHEN WEI-WEN [1]
BRIAN JAMES HALL [1]
TODD OWEN JACKSO... [1]
CHEUNG SHU FAI [1]
More...
Document Type
Journal article [24]
Conference paper [1]
Date Issued
2024 [2]
2023 [1]
2022 [2]
2021 [3]
2020 [2]
2019 [5]
More...
Language
英語English [25]
Source Publication
JOURNAL OF PAIN [4]
JOURNAL OF ACCOU... [2]
Alternatives: Gl... [1]
Australian Journ... [1]
IEEE Transaction... [1]
IET Renewable Po... [1]
More...
Indexed By
SSCI [12]
SCIE [7]
其他 [2]
ESCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 25
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity
Journal article
Wang, Qian, Peng, Chih Hung, Jin, Yong, Jiang, Shenyang. Impact of Data Breach on IT Investment: Embracing Both Failure Learning and Threat Rigidity[J]. Production and Operations Management, 2024.
Authors:
Wang, Qian
;
Peng, Chih Hung
;
Jin, Yong
;
Jiang, Shenyang
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
4.8
/
6.0
|
Submit date:2024/11/05
Data Breach
Information Technology Investment
It Innovation
Failure Learning Theory
Threat Rigidity Theory
Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting
Journal article
Yang, Lei, Liang, Gaoshen, Yang, Yanrong, Ruan, Jiaqi, Yu, Peipei, Yang, Chao. Adversarial false data injection attacks on deep learning-based short-term wind speed forecasting[J]. IET Renewable Power Generation, 2024, 18(7), 1370-1379.
Authors:
Yang, Lei
;
Liang, Gaoshen
;
Yang, Yanrong
;
Ruan, Jiaqi
;
Yu, Peipei
; et al.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
3
IF:
2.6
/
2.8
|
Submit date:2024/02/22
Adversarial False Data Injection Attack
Cyber Threat
Deep Learning
Renewable Energy
Resilience
Wind Speed Forecasting
Intergroup identity conflict in tourism: The voice of the tourist
Journal article
Zhang Carol Xiaoyue, Fong Lawrence, McCabe Scott. Intergroup identity conflict in tourism: The voice of the tourist[J]. Journal of Travel Research, 2023, NA(NA), NA.
Authors:
Zhang Carol Xiaoyue
;
Fong Lawrence
;
McCabe Scott
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2024/06/20
Intergroup Conflict
Identity Conflict
Identity Threat
Social Identity
Resident-tourist Relationship
Restriction reduction: The effects of mobility restriction on consumers’ preferences for advertisements of tourism products
Journal article
Xiaoyan Luo, Jihao Hu, Lisa C. Wan, Xiao (Shannon) Yi. Restriction reduction: The effects of mobility restriction on consumers’ preferences for advertisements of tourism products[J]. Tourism Management, 2022, 94, 104638.
Authors:
Xiaoyan Luo
;
Jihao Hu
;
Lisa C. Wan
;
Xiao (Shannon) Yi
Favorite
|
TC[WOS]:
9
TC[Scopus]:
9
IF:
10.9
/
11.5
|
Submit date:2023/02/22
Physical Confinement
Mobility Restriction
Threat To Personal Freedom
Preferences For Advertisements
Scarcity-reduction
Covid-19
Tourist Response
The good, the bad, and the red: implicit color-valence associations across cultures
Journal article
Kawai, Claudia, Zhang, Yang, Lukács, Gáspár, Chu, Wenyi, Zheng, Chaoyi, Gao, Cijun, Gozli, Davood, Wang, Yonghui, Ansorge, Ulrich. The good, the bad, and the red: implicit color-valence associations across cultures[J]. PSYCHOLOGICAL RESEARCH, 2022, 87(3), 704-724.
Authors:
Kawai, Claudia
;
Zhang, Yang
;
Lukács, Gáspár
;
Chu, Wenyi
;
Zheng, Chaoyi
; et al.
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
|
Submit date:2022/08/05
Brightness
Blue
Attention
Emotions
Threat
Anger
Ontological (In)Security and Neoliberal Governmentality: Explaining Australia’s China Emergency
Journal article
Pan, Chengxin, Hagström, Linus. Ontological (In)Security and Neoliberal Governmentality: Explaining Australia’s China Emergency[J]. Australian Journal of Politics and History, 2021, 67(3-4), 454-473.
Authors:
Pan, Chengxin
;
Hagström, Linus
Adobe PDF
|
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
0.6
/
0.6
|
Submit date:2022/08/09
Australia-china Relations
Australian Foreign Policy
China Threat
Ontological Security
Neoliberalism
Governmentality
Explaining public support for violence against politicians during conflict: Evidence from a panel study in Israel
Journal article
Elad-Strenger, Julia, Hall, Brian J., Hobfoll, Stevan E., Canetti, Daphna. Explaining public support for violence against politicians during conflict: Evidence from a panel study in Israel[J]. JOURNAL OF PEACE RESEARCH, 2021, 58(3), 417-432.
Authors:
Elad-Strenger, Julia
;
Hall, Brian J.
;
Hobfoll, Stevan E.
;
Canetti, Daphna
Favorite
|
TC[WOS]:
9
TC[Scopus]:
9
IF:
3.4
/
4.5
|
Submit date:2021/12/07
Intergroup Conflict
Perceived Threat
Political Ideology
Political Violence
Psychological Distress
The effect of masculinity threat on transprejudice: Influence of different aspects of masculinity contingent self-worth
Journal article
Ching, Boby Ho Hong. The effect of masculinity threat on transprejudice: Influence of different aspects of masculinity contingent self-worth[J]. Psychology & Sexuality, 2021, 13(3), 550 - 564.
Authors:
Ching, Boby Ho Hong
Favorite
|
TC[WOS]:
12
TC[Scopus]:
12
IF:
2.4
/
3.2
|
Submit date:2022/05/11
Masculinity Contingent Self-worth
Masculinity Threat
Precarious Manhood
Transphobia
Transprejudice
Defense against Advanced Persistent Threat through Data Backup and Recovery
Journal article
Yang, Lu Xing, Huang, Kaifan, Yang, Xiaofan, Zhang, Yushu, Xiang, Yong, Tang, Yuan Yan. Defense against Advanced Persistent Threat through Data Backup and Recovery[J]. IEEE Transactions on Network Science and Engineering, 2020, 8(3), 2001-2013.
Authors:
Yang, Lu Xing
;
Huang, Kaifan
;
Yang, Xiaofan
;
Zhang, Yushu
;
Xiang, Yong
; et al.
Favorite
|
TC[WOS]:
20
TC[Scopus]:
17
IF:
6.7
/
6.0
|
Submit date:2021/12/08
Advanced Persistent Threat
Data Backup And Recovery
Dbar-based Apt Defense Mechanism
Dbars Problem
Differential Game
Nash Equilibrium
Software-defined Networking
Factor structure, correlates, and incremental validity of the Pain Appraisal Inventory-Short Form
Journal article
Chen, Shuanghong, Pu, Jiajia, Ye, Xiaoxuan, Wang, Yang, Jackson, Todd. Factor structure, correlates, and incremental validity of the Pain Appraisal Inventory-Short Form[J]. Journal of Health Psychology, 2020, 25(9), 1292-1302.
Authors:
Chen, Shuanghong
;
Pu, Jiajia
;
Ye, Xiaoxuan
;
Wang, Yang
;
Jackson, Todd
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
IF:
2.5
/
2.9
|
Submit date:2021/12/06
Challenge Appraisals
Coping
Pain Appraisal Inventory
Stress
Threat Appraisals