A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science CE Koh, VR Prybutok, SD Ryan, YA Wu Informing Science: the International Journal of an Emerging Transdiscipline …, 2010 | 166 | 2010 |
Social network position and its relationship to performance of IT professionals P Burton, Y Wu, V Prybutok Informing Science: The International Journal of an Emerging Transdiscipline …, 2010 | 55 | 2010 |
Interorganizational trust in B2B relationships C Saunders, YA Wu, Y Li, S Weisfeld Proceedings of the 6th international conference on Electronic commerce, 272-279, 2004 | 54 | 2004 |
Influence of social context and affect on individuals' implementation of information security safeguards Y Wu ICIS 2009 Proceedings, 70, 2009 | 23 | 2009 |
Security Awareness Programs YA Wu, CS Guynes, J Windsor Review of Business Information Systems (RBIS) 16 (4), 165-168, 2012 | 21* | 2012 |
Differential Effects of the Volume and Diversity of Communication Network Ties on Knowledge Workers' Performance P Burton, Y Wu, VR Prybutok, G Harden Professional Communication, IEEE Transactions on 55 (3), 239-253, 2012 | 19 | 2012 |
E-Commerce/Network Security Considerations CS Guynes, YA Wu, J Windsor International Journal of Management & Information Systems (IJMIS) 15 (2), 1-8, 2011 | 12 | 2011 |
Governing information security: governance domains and decision rights allocation patterns YA Wu, CS Saunders Information Resources Management Journal (IRMJ) 24 (1), 28-45, 2011 | 12 | 2011 |
Interorganisational trust in B2B commerce YA Wu, Y Li International Journal of Networking and Virtual Organisations 6 (3), 303-317, 2009 | 12 | 2009 |
Integrating the visual design discipline with information systems research and practice DA Peak, VR Prybutok, YA Wu, C Xu Informing Science: the International Journal of an Emerging Transdiscipline 14, 2011 | 11 | 2011 |
EFFECTS OF IT GOVERNANCE ON INFORMATION SECURITY YU WU University of Central Florida Orlando, Florida, 2007 | 11 | 2007 |
The IS Core-VI: Further Along the Road to the IT Artifact C Saunders, Y Wu Communications of the Association for Information Systems 12 (1), 36, 2003 | 11 | 2003 |
Benefits of virtualization in security lab design YA Wu ACM Inroads 1 (4), 38-42, 2010 | 8 | 2010 |
Decision Making, IT Governance, and Information Systems Security YA Wu, CS Saunders | 6 | 2005 |
Using Virtualization to Ensure Uninterrupted Access to Software Applications for Financial Services Firms M Yang, Y Wu System Science (HICSS), 2012 45th Hawaii International Conference on, 5623-5630, 2012 | 5 | 2012 |
The Role of Situation Awareness in Detecting Criminal Intrusions: A Different Perspective on Information Security Awareness B Hanus, Y Wu | 2 | 2012 |
Controlling Adverse Selection in Information Security Budgeting: An IT Governance Approach Y Wu AMCIS 2006 Proceedings, 540, 2006 | 2 | 2006 |
Trust in B2B Commerce: Taxonomy and Roles Y Wu, Y Li, C Saunders | 2 | 2006 |