PhD in Information Systems
The Hong Kong University of Science and Technology, 2000
After the Dust Settled: Online Participation and Adaptation in Hong Kong
Article
Cyber Insurance and Post-Breach Services: A Normative Analysis
Article
Knowledge Contribution under Demographic Information Disclosure: Evidence from a Natural Experiment
Conference paper
Online Health Information Seeking and Patients’ Health: An Empirical Investigation
Conference paper
Sentiment Influences on Sentiment with Discussion in Football Subreddits
Conference paper
Sentiment Influences on Sentiment with Discussion in Football Subreddits
Conference paper
Unexpected monetary incentives and user-generated content on digital platforms
Conference paper
Monetary Incentives and Knowledge Spillover: Evidence from a Natural Experiment
Article
Does online health information seeking improve health outcomes?
Conference paper
IP Region Disclosure and Knowledge Contribution: Evidence from a Natural Experiment
Conference paper
Synchronous Online Learning and Student Satisfaction: Evidence from a Natural Experiment
Conference paper
Article
Does Crowdfunding Spur Innovation? The Impact of Kickstarter on US Patent Applications
Conference paper
Effects of Mobile App Unbundling on New App Adoption and User Engagements
Conference paper
Helpful or Harmful? Negative Behavior Toward Newcomers and Welfare in Online Communities
Conference paper
Permissioned Blockchains, Transaction Fee, and Strategic Orderers: An Economic Analysis
Conference paper
Why Unbundling Works: An Impact of Mobile App Unbundling on New App Adoption and Engagement
Conference paper
Book chapter
An Impact of Mobile Application Unbundling on User Engagements
Conference paper
The Effect of Content Filtering on the Internet: An Empirical Investigation
Conference paper
Unbundling Mobile Application: Path Dependency Bias, and Regular Use
Conference paper
Bilateral Liability-Based Contracts in Information Security Outsourcing
Article
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums
Article
Bug Bounty Programs, Security Investment and Law Enforcement: A Security Game Perspective
Conference paper
Evaluating the Economic and Security Benefits of Bug Bounty Programs
Conference paper
Monetary Incentives and Knowledge Spillover: Evidence from a Natural Experiment
Conference paper
The Impact of Anonymity on Piracy – Evidence from China
Conference paper
An Economic Analysis of Peer Disclosure in Online Social Communities
Article
Views on the Past, Present, and Future of Business and Information Systems Engineering
Article
When Discounts Hurt Sales: The Case of Daily-Deal Markets
Article
Information Privacy Paradox: A Neural Science Study
Conference paper
Article
Technology Mergers and Acquisitions in the Presence of an Installed Base: a Strategic Analysis
Article
Federal Trade Commission Privacy Law and Policy [Book review]
Book review
An Empirical Study of the Effect of Government-Initiated Filter Schemes on Cybersecurity
Conference paper
Conference paper
Equilibrium Distribution of APP Quality and Information Request
Conference paper
Information Privacy Paradox: A Neural Science Study
Conference paper
Conference paper
Migration of Service to the Internet: Evidence from a Federal Natural Experiment
Article
Article
Privacy and Marketing Externalities: Evidence from Do Not Call
Article
The challenges of personal data markets and privacy
Article
What Makes a Review Voted? An Empirical Investigation of Review Voting in Online Review Systems
Article
Cybersecurity Regulations and Cyberattacks: A Case Study in China
Conference paper
When Discount Hurts Sales: The Case of Daily Deal Markets
Conference paper
Regulating Information Asymmetry in Information Security Outsourcing Market
Conference paper
Conference paper
An Economic Analysis of Peer-Disclosure in Online Social Communities
Conference paper
Information Security as a Credence Good
Conference paper
Article
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Article
Do Hacker Forums Contribute to Security Attacks?
Conference paper
Do hackers seek variety? An empirical analysis of website defacements
Conference paper
Newspaper Reports and Consumer Choice: Evidence from the Do Not Call Registry
Article
Dissecting the Threats Posed by Online Hacker Communities
Conference paper
Conference paper
Conference paper
Externalities in the Demand for Privacy: Evidence from the Do Not Call Registry
Conference paper
Newspaper Reports and Consumer Choice: Evidence from the Do Not Call Registry
Conference paper
The Effects of Moving Animation on Recall, Hedonic and Utilitarian Perceptions, and Attitude
Article
The value of online information privacy: An empirical investigation
Article
Empirical Advances for the Study of Weblogs: Relevance and Testing of Random Effects Models
Book chapter
Analysis of joint provision of public goods in online communities
Conference paper
The value of online information privacy: Evidence from the usa and singapore
Conference paper
Overcoming Online Information Privacy Concerns: An Information Processing Theory Approach
Article
The Value of Privacy Assurance: An Exploratory Field Experiment
Article
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
Conference paper
Social Interaction and Observational Learning: Diffusion Analysis of "Do Not Call" Registration
Conference paper
To Animate or Not to Animate? The Effects of Animation on Recall, Product Perceptions and Attitude
Conference paper
Online Information Disclosure: Motivators and Measurements
Article
Article
Book chapter
Internet opt-in opt-out: Investigating the of frames, and privacy concerns
Conference paper
The Blogging Phenomenon: An Empirical Study of Factors Affecting Weblog Traffic
Conference paper
The Opt-in and Opt-out Debate: Is it really necessary?
Conference paper
To Animate or Not to Animate? The Effects of Animation on Recall, Product Perceptions and Attitude
Conference paper
Article
Measuring Piracy of IP-Protected Goods: A Methodology
Article
Technology Timing and Pricing In the Presence of an Installed Base
Article
Book chapter
Copyright Piracy: Measuring the Extent and Impact
Conference paper
Conference paper
Luring the Prey: Attracting Online Consumer Participation through Choice Configurations
Conference paper
To Launch or Not to Launch: An Economic Analysis of Delayed Product Introduction
Conference paper
Product Variety under Brand Influence: An Empirical Investigation of Personal Computer Demand
Article
Direct Marketing: Privacy and Competition
Conference paper
Conference paper
Opting-In or Opting-Out on the Internet: Does It Really Matter?
Conference paper
The Influence of Technology on Internet Brand Loyalty: An Exploratory Study
Conference paper
Piracy and the Legitimate Demand for Recorded Music
Article
Consumer Trust and Online Information Privacy
Conference paper
Direct Marketing: Privacy and Competition
Conference paper
The Effects of Retail Format Characteristics on ELoyalty
Conference paper
Article
On the Supply of Creative Work: Evidence from the Movies
Article
Software Functionality: A Game Theoretic Analysis
Article
Building successful e-business: A brand perspective
Conference paper
Determinants of Brand Equity in EBusinesses: An Exploratory Study
Conference paper
Conference paper
Online Information Privacy: Measuring the Cost-Benefit Tradeoff
Conference paper
Perceived Web Retailer Qualities and Individual Differences: Effects on Internet Shopping
Conference paper
Piracy and the Demand for Legitimate Recorded Music
Conference paper
What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses
Conference paper
A Choice Model for the Selection of Computer Vendors and Its Empirical Estimation
Article
Determinants of Small Business EDI Adoption: An Empirical Investigation
Article
Conference paper
The Impact of Internet on Education: Towards an Emerging Paradigm
Conference paper
Using Genetic Programming as a Learning Tool in Discovering Financial Trading Rules
Conference paper
Does Crowdfunding Spur Innovation? The Impact of Kickstarter on US Patent Applications
Effects of Mobile App Unbundling on New App Adoption and User Engagements
Helpful or Harmful? Negative Behavior Toward Newcomers and Welfare in Online Communities
Permissioned Blockchains, Transaction Fee, and Strategic Orderers: An Economic Analysis
Why Unbundling Works: An Impact of Mobile App Unbundling on New App Adoption and Engagement
Bilateral Liability-Based Contracts in Information Security Outsourcing
See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums
An Economic Analysis of Peer Disclosure in Online Social Communities
Views on the Past, Present, and Future of Business and Information Systems Engineering
Technology Mergers and Acquisitions in the Presence of an Installed Base: a Strategic Analysis
The Effects of Moving Animation on Recall, Hedonic and Utilitarian Perceptions, and Attitude
The value of online information privacy: An empirical investigation
Overcoming Online Information Privacy Concerns: An Information Processing Theory Approach
The Value of Privacy Assurance: An Exploratory Field Experiment
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
Social Interaction and Observational Learning: Diffusion Analysis of "Do Not Call" Registration
To Animate or Not to Animate? The Effects of Animation on Recall, Product Perceptions and Attitude
Product Variety under Brand Influence: An Empirical Investigation of Personal Computer Demand
Determinants of Brand Equity in EBusinesses: An Exploratory Study
Online Information Privacy: Measuring the Cost-Benefit Tradeoff
Perceived Web Retailer Qualities and Individual Differences: Effects on Internet Shopping
What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses
An Economic Analysis of Peer Disclosure in Online Social Communities
Article
Views on the Past, Present, and Future of Business and Information Systems Engineering
Article
When Discounts Hurt Sales: The Case of Daily-Deal Markets
Article
Information Privacy Paradox: A Neural Science Study
Conference paper
Article
Technology Mergers and Acquisitions in the Presence of an Installed Base: a Strategic Analysis
Article
Federal Trade Commission Privacy Law and Policy [Book review]
Book review
An Empirical Study of the Effect of Government-Initiated Filter Schemes on Cybersecurity
Conference paper
Conference paper
Equilibrium Distribution of APP Quality and Information Request
Conference paper
Information Privacy Paradox: A Neural Science Study
Conference paper
Conference paper
Migration of Service to the Internet: Evidence from a Federal Natural Experiment
Article
Article
Privacy and Marketing Externalities: Evidence from Do Not Call
Article
The challenges of personal data markets and privacy
Article
What Makes a Review Voted? An Empirical Investigation of Review Voting in Online Review Systems
Article
Cybersecurity Regulations and Cyberattacks: A Case Study in China
Conference paper
When Discount Hurts Sales: The Case of Daily Deal Markets
Conference paper
Regulating Information Asymmetry in Information Security Outsourcing Market
Conference paper
Conference paper
An Economic Analysis of Peer-Disclosure in Online Social Communities
Conference paper
Information Security as a Credence Good
Conference paper
Article
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Article
Do Hacker Forums Contribute to Security Attacks?
Conference paper
Do hackers seek variety? An empirical analysis of website defacements
Conference paper
Newspaper Reports and Consumer Choice: Evidence from the Do Not Call Registry
Article
Dissecting the Threats Posed by Online Hacker Communities
Conference paper
Conference paper
Conference paper
Externalities in the Demand for Privacy: Evidence from the Do Not Call Registry
Conference paper
Newspaper Reports and Consumer Choice: Evidence from the Do Not Call Registry
Conference paper
The Effects of Moving Animation on Recall, Hedonic and Utilitarian Perceptions, and Attitude
Article
The value of online information privacy: An empirical investigation
Article
Empirical Advances for the Study of Weblogs: Relevance and Testing of Random Effects Models
Book chapter
Analysis of joint provision of public goods in online communities
Conference paper
The value of online information privacy: Evidence from the usa and singapore
Conference paper
Overcoming Online Information Privacy Concerns: An Information Processing Theory Approach
Article
The Value of Privacy Assurance: An Exploratory Field Experiment
Article
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach
Conference paper
Social Interaction and Observational Learning: Diffusion Analysis of "Do Not Call" Registration
Conference paper
To Animate or Not to Animate? The Effects of Animation on Recall, Product Perceptions and Attitude
Conference paper
Online Information Disclosure: Motivators and Measurements
Article
Article
Book chapter
Internet opt-in opt-out: Investigating the of frames, and privacy concerns
Conference paper
The Blogging Phenomenon: An Empirical Study of Factors Affecting Weblog Traffic
Conference paper
The Opt-in and Opt-out Debate: Is it really necessary?
Conference paper
To Animate or Not to Animate? The Effects of Animation on Recall, Product Perceptions and Attitude
Conference paper
Article
Measuring Piracy of IP-Protected Goods: A Methodology
Article
Technology Timing and Pricing In the Presence of an Installed Base
Article
Book chapter
Copyright Piracy: Measuring the Extent and Impact
Conference paper
Conference paper
Luring the Prey: Attracting Online Consumer Participation through Choice Configurations
Conference paper
To Launch or Not to Launch: An Economic Analysis of Delayed Product Introduction
Conference paper
Product Variety under Brand Influence: An Empirical Investigation of Personal Computer Demand
Article
Direct Marketing: Privacy and Competition
Conference paper
Conference paper
Opting-In or Opting-Out on the Internet: Does It Really Matter?
Conference paper
The Influence of Technology on Internet Brand Loyalty: An Exploratory Study
Conference paper
Piracy and the Legitimate Demand for Recorded Music
Article
Consumer Trust and Online Information Privacy
Conference paper
Direct Marketing: Privacy and Competition
Conference paper
The Effects of Retail Format Characteristics on ELoyalty
Conference paper
Article
On the Supply of Creative Work: Evidence from the Movies
Article
Software Functionality: A Game Theoretic Analysis
Article
Building successful e-business: A brand perspective
Conference paper
Determinants of Brand Equity in EBusinesses: An Exploratory Study
Conference paper
Conference paper
Online Information Privacy: Measuring the Cost-Benefit Tradeoff
Conference paper
Perceived Web Retailer Qualities and Individual Differences: Effects on Internet Shopping
Conference paper
Piracy and the Demand for Legitimate Recorded Music
Conference paper
What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses
Conference paper
A Choice Model for the Selection of Computer Vendors and Its Empirical Estimation
Article
Determinants of Small Business EDI Adoption: An Empirical Investigation
Article
Conference paper
The Impact of Internet on Education: Towards an Emerging Paradigm
Conference paper
Using Genetic Programming as a Learning Tool in Discovering Financial Trading Rules
Conference paper
IMBA5120 | Managing Emerging Technologies |
IMBA5020 | Capstone Management Strategy and Execution |
ISOM5420 | Integrated Business Simulation and Strategy |
EMBA5760 | Managing Emerging Technologies |
IMBA6100A | Global Field Trip Study |
SBMT4000 | SBM Undergraduate Honors Research Project |
IMBA5120 | Managing Emerging Technologies |
ISOM7000J | IS Doctoral Seminar: Current Research in Information Systems |
SBMT4000 | SBM Undergraduate Honors Research Project |
ISOM5420 | Integrated Business Simulation and Strategy |
CAI, Yuying
Information Systems
ZHANG, Bingqian
Information Systems
KUAN, Ka Lin
(co-supervision)
Environmental Science, Policy and Management
YUAN, Wanci
(co-supervision)
Information Systems
YANG, Lanxi
(co-supervision)
Information Systems
ZHAO, Yao
(co-supervision)
Information Systems( Completed in 2024 )
ZHOU, Jiali
Information Systems( Completed in 2023 )
CAI, Yuying
Information Systems( Completed in 2023 )
ZHANG, Bingqian
Information Systems( Completed in 2023 )
CHEN, Chen
Technology Leadership and Entrepreneurship( Completed in 2021 )
Update your browser to view this website correctly. Update your browser now