Yan Chen
Yan Chen
Verified email at fiu.edu
TitleCited byYear
Organizations' information security policy compliance: Stick or carrot approach?
Y Chen, K Ramamurthy, KW Wen
Journal of Management Information Systems 29 (3), 157-188, 2012
2702012
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China.
Y Chen, FM Zahedi
Mis Quarterly 40 (1), 205-222, 2016
1132016
Impacts of comprehensive information security programs on information security culture
YAN Chen, K Ramamurthy, KW Wen
Journal of Computer Information Systems 55 (3), 11-19, 2015
942015
Brand relationship, consumption values and branded app adoption
KF Peng, Y Chen, KW Wen
Industrial Management & Data Systems, 2014
652014
Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance
FM Zahedi, A Abbasi, Y Chen
Journal of the Association for Information Systems 16 (6), 2, 2015
532015
E-business value creation in Small and Medium Enterprises: a US study using the TOE framework
KW Wen, Y Chen
International Journal of Electronic Business 8 (1), 80-100, 2010
532010
Enhancing predictive analytics for anti-phishing by exploiting website genre information
A Abbasi, FM Zahedi, D Zeng, Y Chen, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 31 (4), 109-157, 2015
342015
Impact of anti-phishing tool performance on attack success rates
A Abbasi, F Zahedi, Y Chen
2012 IEEE International Conference on Intelligence and Security Informatics …, 2012
192012
Interface design elements for anti-phishing systems
Y Chen, FM Zahedi, A Abbasi
International Conference on Design Science Research in Information Systems …, 2011
192011
Internet users’ security behaviors and trust
Y Chen, FM Zahedi
Proceedings of the Pre-ICIS Workshop on Information Security and Privacy, 2009
92009
Effects of exchange benefits, security concerns and situational privacy concerns on mobile commerce adoption
H Dai, Y Chen
journal of international technology and information management 24 (3), 3, 2015
82015
Are we ready for cyberterrorist attacks?—Examining the role of individual resilience
J Hua, Y Chen, XR Luo
Information & Management 55 (7), 928-938, 2018
62018
A systematic review on cross-cultural information systems research: Evidence from the last decade
X Chu, XR Luo, Y Chen
Information & Management 56 (3), 403-417, 2019
52019
Examining Internet Users’ Adaptive and Maladaptive Security Behaviors Using the Extended Parallel Process Model
Y Chen
the International Conference on Information Systems (ICIS), 2017
52017
Constructs Affecting Continuance intention in consumers with mobile financial apps: a dual factor approach
DL Amoroso, YAN Chen
Journal of Information Technology Management 28 (3), 1-24, 2017
42017
Phishing susceptibility: The good, the bad, and the ugly
A Abbasi, FM Zahedi, Y Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 169-174, 2016
32016
Do Innovators Concern Less about Security and Value New Technologies More? A Case of Mobile Commerce
Y Chen, H Dai
Journal of Information Technology Management 25 (4), 13-26, 2014
22014
Design Elements that Promote the use of Fake Website Detection Tools
FM Zahedi, A Abbasi, Y Chen
arXiv preprint arXiv:1309.7262, 2013
22013
A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach
Y Chen, S Deng, DH Kwak, A Elnoshokaty, J Wu
Chen, Y., Deng, S., Kwak, DH, Elnoshokaty, A., & Wu, J.(2019). A Multi …, 2019
12019
Aligning 4C Strategy with Social Network Applications for CRM Performance
WH Hung, IC Chang, Y Chen, YL Ho
Journal of Global Information Management (JGIM) 27 (1), 93-110, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20