Follow
Alvin Leung
Title
Cited by
Cited by
Year
An investigation of information sharing and seeking behaviors in online investment communities
JH Park, B Gu, ACM Leung, P Konana
Computers in Human Behavior 31, 1-12, 2014
2292014
Assessing the severity of phishing attacks: A hybrid data mining approach
X Chen, I Bose, ACM Leung, C Guo
Decision Support Systems 50 (4), 662-672, 2011
1112011
Adoption of identity theft countermeasures and its short-and long-term impact on firm value.
I Bose, ACM Leung
Mis Quarterly 43 (1), 2019
662019
The impact of adoption of identity theft countermeasures on firm value
I Bose, ACM Leung
Decision Support Systems 55 (3), 753-763, 2013
642013
Do phishing alerts impact global corporations? A firm value analysis
I Bose, ACM Leung
Decision Support Systems 64, 67-78, 2014
622014
Network analysis of search dynamics: The case of stock habitats
ACM Leung, A Agarwal, P Konana, A Kumar
Management Science 63 (8), 2667-2687, 2017
552017
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
I Bose, ACM Leung
Communications of the Association for Information Systems 19 (1), 24, 2007
552007
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
I Bose, ACM Leung
Decision Support Systems 45 (4), 897-912, 2008
492008
Cosearch attention and stock return predictability in supply chains
A Agarwal, ACM Leung, P Konana, A Kumar
Information Systems Research 28 (2), 265-288, 2017
482017
An investigation of information sharing and seeking behaviors in virtual communities
JH Park, P Konana, B Gu, AC Man Leung
312010
Could Gamification Designs Enhance Online Learning through Personalization? Lessons from a Field Experiment
ACM LEUNG, R Santhanam, CWR KWOK, WT YUE
Information Systems Research, 2022
302022
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
252023
252 Tang BZ. Facile synthesis of Red/NIR AIE luminogens with simple structures, bright 253 emissions, and high photostabilities, and their applications for specific imaging of …
D Wang, HF Su, RT Kwok, GG Shan, AC Leung, MM Lee, HH Sung, ...
Adv Funct Mater 27, 1-10, 2017
252017
Indirect financial loss of phishing to global market
A Leung, I Bose
222008
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia
Y Zhuang, Y Choi, S He, ACM Leung, GM Lee, A Whinston
Journal of Management Information Systems 37 (3), 668-693, 2020
142020
When innovation meets evolution: An extensive study of emerging e-learning technologies for higher education in Hong Kong
Y Zhuang, H Ma, H Xie, ACM Leung, GP Hancke, FL Wang
Emerging Technologies for Education: First International Symposium, SETE …, 2017
122017
Technical opinion What drives the adoption of antiphishing measures by Hong Kong banks?
I Bose, ACM Leung
Communications of the ACM 52 (8), 141-143, 2009
112009
Matching in proximity authentication and mobile payment ecosystem: What are we missing?
Y Zhuang, ACM Leung, J Hughes
Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017
92017
Virtual trainer system: A tool to increase exercise participation and work productivity
RCW Kwok, ACM Leung, SS Hui, CCK Wong
Internet Research 31 (3), 892-910, 2021
62021
Impact of Immersive Interface Design on Consumer Perceptions during Online Product Presentation.
P Tarafdar, ACM Leung, WT Yue, I Bose
ICIS, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20