An investigation of information sharing and seeking behaviors in online investment communities JH Park, B Gu, ACM Leung, P Konana Computers in Human Behavior 31, 1-12, 2014 | 231 | 2014 |
Assessing the severity of phishing attacks: A hybrid data mining approach X Chen, I Bose, ACM Leung, C Guo Decision Support Systems 50 (4), 662-672, 2011 | 111 | 2011 |
Adoption of identity theft countermeasures and its short-and long-term impact on firm value. I Bose, ACM Leung Mis Quarterly 43 (1), 2019 | 68 | 2019 |
The impact of adoption of identity theft countermeasures on firm value I Bose, ACM Leung Decision Support Systems 55 (3), 753-763, 2013 | 64 | 2013 |
Do phishing alerts impact global corporations? A firm value analysis I Bose, ACM Leung Decision Support Systems 64, 67-78, 2014 | 63 | 2014 |
Network analysis of search dynamics: The case of stock habitats ACM Leung, A Agarwal, P Konana, A Kumar Management Science 63 (8), 2667-2687, 2017 | 55 | 2017 |
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities I Bose, ACM Leung Communications of the Association for Information Systems 19 (1), 24, 2007 | 55 | 2007 |
Assessing anti-phishing preparedness: A study of online banks in Hong Kong I Bose, ACM Leung Decision Support Systems 45 (4), 897-912, 2008 | 49 | 2008 |
Cosearch attention and stock return predictability in supply chains A Agarwal, ACM Leung, P Konana, A Kumar Information Systems Research 28 (2), 265-288, 2017 | 48 | 2017 |
An investigation of information sharing and seeking behaviors in virtual communities JH Park, P Konana, B Gu, AC Man Leung | 31 | 2010 |
Could Gamification Designs Enhance Online Learning through Personalization? Lessons from a Field Experiment ACM LEUNG, R Santhanam, CWR KWOK, WT YUE Information Systems Research, 2022 | 30 | 2022 |
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches WW Li, ACM Leung, WT Yue MIS Quarterly 47 (1), 317-342, 2023 | 26 | 2023 |
252 Tang BZ. Facile synthesis of Red/NIR AIE luminogens with simple structures, bright 253 emissions, and high photostabilities, and their applications for specific imaging of … D Wang, HF Su, RT Kwok, GG Shan, AC Leung, MM Lee, HH Sung, ... Adv Funct Mater 27, 1-10, 2017 | 24 | 2017 |
Indirect financial loss of phishing to global market A Leung, I Bose | 22 | 2008 |
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia Y Zhuang, Y Choi, S He, ACM Leung, GM Lee, A Whinston Journal of Management Information Systems 37 (3), 668-693, 2020 | 14 | 2020 |
When innovation meets evolution: An extensive study of emerging e-learning technologies for higher education in Hong Kong Y Zhuang, H Ma, H Xie, ACM Leung, GP Hancke, FL Wang Emerging Technologies for Education: First International Symposium, SETE …, 2017 | 12 | 2017 |
Technical opinion What drives the adoption of antiphishing measures by Hong Kong banks? I Bose, ACM Leung Communications of the ACM 52 (8), 141-143, 2009 | 11 | 2009 |
Matching in proximity authentication and mobile payment ecosystem: What are we missing? Y Zhuang, ACM Leung, J Hughes Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017 | 9 | 2017 |
Virtual trainer system: A tool to increase exercise participation and work productivity RCW Kwok, ACM Leung, SS Hui, CCK Wong Internet Research 31 (3), 892-910, 2021 | 6 | 2021 |
Impact of Immersive Interface Design on Consumer Perceptions during Online Product Presentation. P Tarafdar, ACM Leung, WT Yue, I Bose ICIS, 2019 | 5 | 2019 |