Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model A Vishwanath, T Herath, R Chen, J Wang, HR Rao Decision Support Systems 51 (3), 576-586, 2011 | 501 | 2011 |
Research article phishing susceptibility: An investigation into the processing of a targeted spear phishing email J Wang, T Herath, R Chen, A Vishwanath, HR Rao IEEE transactions on professional communication 55 (4), 345-362, 2012 | 263 | 2012 |
Habitual Facebook use and its impact on getting deceived on social media A Vishwanath Journal of Computer-Mediated Communication 20 (1), 83-98, 2015 | 254 | 2015 |
An examination of the factors contributing to adoption decisions among late-diffused technology products A Vishwanath, GM Goldhaber New media & society 5 (4), 547-572, 2003 | 253 | 2003 |
Suspicion, cognition, and automaticity model of phishing susceptibility A Vishwanath, B Harrison, YJ Ng Communication research 45 (8), 1146-1166, 2018 | 230 | 2018 |
Barriers to the adoption of electronic health records: using concept mapping to develop a comprehensive empirical model A Vishwanath, SD Scamurra Health informatics journal 13 (2), 119-134, 2007 | 189 | 2007 |
Comparing online information effects: A cross-cultural comparison of online information and uncertainty avoidance A Vishwanath Communication Research 30 (6), 579-598, 2003 | 145 | 2003 |
Individual processing of phishing emails: How attention and elaboration protect against phishing B Harrison, E Svetieva, A Vishwanath Online Information Review 40 (2), 265-281, 2016 | 128 | 2016 |
Impact of personality on technology adoption: An empirical model A Vishwanath Journal of the American Society for Information Science and Technology 56 (8 …, 2005 | 125 | 2005 |
Cyber hygiene: The concept, its measure, and its initial tests A Vishwanath, LS Neo, P Goh, S Lee, M Khader, G Ong, J Chin Decision Support Systems 128, 113160, 2020 | 115 | 2020 |
The impact of electronic medical record systems on outpatient workflows: a longitudinal evaluation of its workflow effects A Vishwanath, SR Singh, P Winkelstein International journal of medical informatics 79 (11), 778-791, 2010 | 108 | 2010 |
Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack A Vishwanath Journal of Computer-Mediated Communication 20 (5), 570-584, 2015 | 105 | 2015 |
To fear or not to fear? Applying the social amplification of risk framework on two environmental health risks in Singapore YJ Ng, ZJ Yang, A Vishwanath Journal of Risk Research 21 (12), 1487-1501, 2018 | 93 | 2018 |
Diffusion of deception in social media: Social contagion effects and its antecedents A Vishwanath Information Systems Frontiers 17, 1353-1367, 2015 | 87 | 2015 |
From belief-importance to intention: The impact of framing on technology adoption A Vishwanath Communication Monographs 76 (2), 177-206, 2009 | 86 | 2009 |
Why do users not report spear phishing emails? Y Kwak, S Lee, A Damiano, A Vishwanath Telematics and Informatics 48, 101343, 2020 | 80 | 2020 |
Retweeting the Fukushima nuclear radiation disaster J Li, A Vishwanath, HR Rao Communications of the ACM 57 (1), 78-85, 2014 | 78 | 2014 |
The diffusion of innovations: A communication science perspective A Vishwanath, GA Barnett (No Title), 2011 | 75 | 2011 |
Technology clusters: Using multidimensional scaling to evaluate and structure technology clusters A Vishwanath, H Chen Journal of the American Society for Information Science and Technology 57 …, 2006 | 72 | 2006 |
Manifestations of interpersonal trust in online interaction: A cross-cultural study comparing the differential utilization of seller ratings by eBay participants in Canada … A Vishwanath New Media & Society 6 (2), 219-234, 2004 | 64 | 2004 |