×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Busin... [1]
Faculty of Scien... [1]
Authors
WANG QIAN [1]
Document Type
Conference paper [1]
Journal article [1]
Date Issued
2024 [1]
2022 [1]
Language
英語English [2]
Source Publication
Conference on Hu... [1]
JOURNAL OF STRAT... [1]
Indexed By
SCIE [1]
SSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-2 of 2
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
Conference paper
Si, Janice Jianing, Sharma, Tanusree, Wang, Kanye Ye. Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem[C]:Association for Computing Machinery, New York, NY, United States, 2024, 974.
Authors:
Si, Janice Jianing
;
Sharma, Tanusree
;
Wang, Kanye Ye
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2024/07/04
Mitigation Strategy
Security Risk
User Perception
Web3 Ecosystem
Firm diversity and data breach risk: A longitudinal study
Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:
Wang, Qian
;
Ngai, Eric W.T.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
8.7
/
18.9
|
Submit date:2023/01/30
Data Breach Risk
Diversity Type
Firm Diversity
Information Security
Managerial Ability
Resource-based View