Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks KL Hui, SH Kim, QH Wang MIS Quarterly, 2017 | 133 | 2017 |
A comparative study of cyberattacks SH Kim, QH Wang, JB Ullrich Communications of the ACM 55 (3), 66-73, 2012 | 88 | 2012 |
Information Security: Facilitating User Precautions Vis-à-Vis Enforcement Against Attackers I Png, QH Wang Journal of Management Information Systems 26 (2), 97-121, 2009 | 86 | 2009 |
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence I Png, CY Wang, QH Wang Journal of Management Information Systems 25 (2), 125-144, 2008 | 86 | 2008 |
See no evil, hear no evil? Dissecting the impact of online hacker forums WT Yue, QH Wang, KL Hui Mis Quarterly 43 (1), 73, 2019 | 65 | 2019 |
Copyright law and the supply of creative work: Evidence from the movies IPL Png, QH Wang Manuscript, National University of Singapore, 2009 | 47* | 2009 |
Information security: User precautions, attacker efforts, and enforcement IPL Png, QH Wang System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-11, 2009 | 41* | 2009 |
How to derive causal insights for digital commerce in China? A research commentary on computational social science methods DCW Phang, K Wang, Q Wang, RJ Kauffman, M Naldi Electronic Commerce Research and Applications 35, 100837, 2019 | 33 | 2019 |
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for A Cross-Section of MMORPGs QH Wang, V Mayer-Schönberger, X Yang Information Systems Frontier 15 (3), 481-495, 2013 | 33* | 2013 |
Cyber Attacks: Cross-Country Interdependence and Enforcement QH Wang, SH Kim The Eighth Workshop on the Economics of Information Security (WEIS 2009), 2009 | 26 | 2009 |
Delayed Product Introduction QH Wang, KL Hui Decision Support Systems, 53 (4), 870-880, 2012 | 22 | 2012 |
Do hackers seek variety? An empirical analysis of website defacements KW Ooi, SH Kim, QH Wang, KL Hui AIS, 2012 | 19 | 2012 |
Copyright duration and the supply of creative work IPL Png, QH Wang Manuscript, National University of Singapore, 2009 | 18 | 2009 |
Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack KL Hui, SH KIM, QH Wang Wiley: 24 months, 2013 | 14 | 2013 |
Do Hacker Forums Contribute to Security Attacks? QH Wang, WT Yue, KL Hui Lecture Notes in Business Information Processing 108, 143-152, 2011 | 14 | 2011 |
Cyberattacks: Does Physical Boundry Matter? QH Wang, SH Kim ICIS 2009 Proceedings 48, 2009 | 13 | 2009 |
From offline to online: how health insurance policies drive the demand for online healthcare service? Y Yu, QY MEI, QH Wang AIS, 2016 | 10 | 2016 |
Technology mergers and acquisitions in the presence of an installed base: a strategic analysis QH Wang, KL Hui Information Systems Research, 2017 | 9 | 2017 |
To launch or not to launch: An economic analysis of delayed product introduction QH Wang, KL Hui Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 7* | 2005 |
Online hacker forum censorship: Would banning the bad guys attract good guys? QH Wang, LT Zhang, MK Qiao AIS, 2017 | 4 | 2017 |