Follow
Alvin Leung
Title
Cited by
Cited by
Year
An investigation of information sharing and seeking behaviors in online investment communities
JH Park, B Gu, ACM Leung, P Konana
Computers in Human Behavior 31, 1-12, 2014
2592014
Assessing the severity of phishing attacks: A hybrid data mining approach
X Chen, I Bose, ACM Leung, C Guo
Decision Support Systems 50 (4), 662-672, 2011
1132011
Adoption of identity theft countermeasures and its short-and long-term impact on firm value
I Bose, ACM Leung
Mis Quarterly 43 (1), 313-A31, 2019
792019
The impact of adoption of identity theft countermeasures on firm value
I Bose, ACM Leung
Decision Support Systems 55 (3), 753-763, 2013
752013
Where is IT in information security? The interrelationship among IT investment, security awareness, and data breaches
WW Li, ACM Leung, WT Yue
MIS Quarterly 47 (1), 317-342, 2023
662023
Do phishing alerts impact global corporations? A firm value analysis
I Bose, ACM Leung
Decision Support Systems 64, 67-78, 2014
662014
Could Gamification Designs Enhance Online Learning through Personalization? Lessons from a Field Experiment
ACM LEUNG, R Santhanam, CWR KWOK, WT YUE
Information Systems Research, 2022
592022
Network analysis of search dynamics: The case of stock habitats
ACM Leung, A Agarwal, P Konana, A Kumar
Management Science 63 (8), 2667-2687, 2017
552017
Assessing anti-phishing preparedness: a study of online banks in Hong Kong
I Bose, ACM Leung
Decision Support Systems 45 (4), 897-912, 2008
552008
Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
I Bose, ACM Leung
Communications of the Association for Information Systems 19 (1), 24, 2007
552007
Cosearch attention and stock return predictability in supply chains
A Agarwal, ACM Leung, P Konana, A Kumar
Information Systems Research 28 (2), 265-288, 2017
532017
An investigation of information sharing and seeking behaviors in virtual communities
JH Park, P Konana, B Gu, AC Man Leung
322010
252 Tang BZ. Facile synthesis of Red/NIR AIE luminogens with simple structures, bright 253 emissions, and high photostabilities, and their applications for specific imaging of …
D Wang, HF Su, RT Kwok, GG Shan, AC Leung, MM Lee, HH Sung, ...
Adv Funct Mater 27, 1-10, 2017
242017
Indirect financial loss of phishing to global market
A Leung, I Bose
212008
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia
Y Zhuang, Y Choi, S He, ACM Leung, GM Lee, A Whinston
Journal of Management Information Systems 37 (3), 668-693, 2020
202020
Developing a composite measure to represent information flows in networks: Evidence from a stock market
W Shangguan, ACM Leung, A Agarwal, P Konana, X Chen
Information Systems Research 33 (2), 413-428, 2022
132022
When innovation meets evolution: An extensive study of emerging e-learning technologies for higher education in Hong Kong
Y Zhuang, H Ma, H Xie, ACM Leung, GP Hancke, FL Wang
Emerging Technologies for Education: First International Symposium, SETE …, 2017
132017
Technical opinion What drives the adoption of antiphishing measures by Hong Kong banks?
I Bose, ACM Leung
Communications of the ACM 52 (8), 141-143, 2009
122009
Understanding the impact of augmented reality product presentation on diagnosticity, cognitive load, and product sales
P Tarafdar, ACM Leung, WT Yue, I Bose
International Journal of Information Management 75, 102744, 2024
112024
Matching in proximity authentication and mobile payment ecosystem: What are we missing?
Y Zhuang, ACM Leung, J Hughes
Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20