Follow
Alvin Leung
Title
Cited by
Cited by
Year
An investigation of information sharing and seeking behaviors in online investment communities
JH Park, B Gu, ACM Leung, P Konana
Computers in Human Behavior 31, 1-12, 2014
2342014
Assessing the severity of phishing attacks: A hybrid data mining approach
X Chen, I Bose, ACM Leung, C Guo
Decision Support Systems 50 (4), 662-672, 2011
1112011
Adoption of identity theft countermeasures and its short-and long-term impact on firm value.
I Bose, ACM Leung
Mis Quarterly 43 (1), 2019
682019
The impact of adoption of identity theft countermeasures on firm value
I Bose, ACM Leung
Decision Support Systems 55 (3), 753-763, 2013
642013
Do phishing alerts impact global corporations? A firm value analysis
I Bose, ACM Leung
Decision Support Systems 64, 67-78, 2014
632014
Network analysis of search dynamics: The case of stock habitats
ACM Leung, A Agarwal, P Konana, A Kumar
Management Science 63 (8), 2667-2687, 2017
552017
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
I Bose, ACM Leung
Communications of the Association for Information Systems 19 (1), 24, 2007
552007
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
I Bose, ACM Leung
Decision Support Systems 45 (4), 897-912, 2008
492008
Cosearch attention and stock return predictability in supply chains
A Agarwal, ACM Leung, P Konana, A Kumar
Information Systems Research 28 (2), 265-288, 2017
482017
Could Gamification Designs Enhance Online Learning through Personalization? Lessons from a Field Experiment
ACM LEUNG, R Santhanam, CWR KWOK, WT YUE
Information Systems Research, 2022
312022
An investigation of information sharing and seeking behaviors in virtual communities
JH Park, P Konana, B Gu, AC Man Leung
312010
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
272023
252 Tang BZ. Facile synthesis of Red/NIR AIE luminogens with simple structures, bright 253 emissions, and high photostabilities, and their applications for specific imaging of …
D Wang, HF Su, RT Kwok, GG Shan, AC Leung, MM Lee, HH Sung, ...
Adv Funct Mater 27, 1-10, 2017
242017
Indirect financial loss of phishing to global market
A Leung, I Bose
222008
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia
Y Zhuang, Y Choi, S He, ACM Leung, GM Lee, A Whinston
Journal of Management Information Systems 37 (3), 668-693, 2020
132020
When innovation meets evolution: An extensive study of emerging e-learning technologies for higher education in Hong Kong
Y Zhuang, H Ma, H Xie, ACM Leung, GP Hancke, FL Wang
Emerging Technologies for Education: First International Symposium, SETE …, 2017
122017
Technical opinion What drives the adoption of antiphishing measures by Hong Kong banks?
I Bose, ACM Leung
Communications of the ACM 52 (8), 141-143, 2009
112009
Matching in proximity authentication and mobile payment ecosystem: What are we missing?
Y Zhuang, ACM Leung, J Hughes
Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017
92017
Virtual trainer system: A tool to increase exercise participation and work productivity
RCW Kwok, ACM Leung, SS Hui, CCK Wong
Internet Research 31 (3), 892-910, 2021
62021
Impact of Immersive Interface Design on Consumer Perceptions during Online Product Presentation.
P Tarafdar, ACM Leung, WT Yue, I Bose
ICIS, 2019
52019
The system can't perform the operation now. Try again later.
Articles 1–20