Follow
QIU-HONG WANG
Title
Cited by
Cited by
Year
Pushing the limits of CMOS optical parametric amplifiers with USRN:Si7N3 above the two-photon absorption edge
KJA Ooi, DKT Ng, T Wang, AKL Chee, SK Ng, Q Wang, LK Ang, ...
Nature communications 8 (1), 13878, 2017
2122017
Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks
KL Hui, SH Kim, QH Wang
MIS Quarterly, 2017
1252017
A comparative study of cyberattacks
SH Kim, QH Wang, JB Ullrich
Communications of the ACM 55 (3), 66-73, 2012
872012
Information Security: Facilitating User Precautions Vis-ā-Vis Enforcement Against Attackers
I Png, QH Wang
Journal of Management Information Systems 26 (2), 97-121, 2009
842009
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
I Png, CY Wang, QH Wang
Journal of Management Information Systems 25 (2), 125-144, 2008
842008
See no evil, hear no evil? Dissecting the impact of online hacker forums
WT Yue, QH Wang, KL Hui
Mis Quarterly 43 (1), 73, 2019
582019
Copyright law and the supply of creative work: Evidence from the movies
IPL Png, QH Wang
Manuscript, National University of Singapore, 2009
48*2009
Information security: User precautions, attacker efforts, and enforcement
IPL Png, QH Wang
System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 1-11, 2009
41*2009
The Determinants of Monetary Value of Virtual Goods: An Empirical Study for A Cross-Section of MMORPGs
QH Wang, V Mayer-Schönberger, X Yang
Information Systems Frontier 15 (3), 481-495, 2013
34*2013
How to derive causal insights for digital commerce in China? A research commentary on computational social science methods
DCW Phang, K Wang, Q Wang, RJ Kauffman, M Naldi
Electronic Commerce Research and Applications 35, 100837, 2019
332019
Cyber Attacks: Cross-Country Interdependence and Enforcement
QH Wang, SH Kim
The Eighth Workshop on the Economics of Information Security (WEIS 2009), 2009
252009
Delayed Product Introduction
QH Wang, KL Hui
Decision Support Systems, 53 (4), 870-880, 2012
192012
Do hackers seek variety? An empirical analysis of website defacements
KW Ooi, SH Kim, QH Wang, KL Hui
AIS, 2012
182012
Copyright duration and the supply of creative work
IPL Png, QH Wang
Manuscript, National University of Singapore, 2009
182009
Marginal deterrence in the enforcement of law: Evidence from distributed denial of service attack
KL Hui, SH KIM, QH Wang
Wiley: 24 months, 2013
142013
Do Hacker Forums Contribute to Security Attacks?
QH Wang, WT Yue, KL Hui
Lecture Notes in Business Information Processing 108, 143-152, 2011
142011
Cyberattacks: Does Physical Boundry Matter?
QH Wang, SH Kim
ICIS 2009 Proceedings 48, 2009
132009
From offline to online: how health insurance policies drive the demand for online healthcare service?
Y Yu, QY Mei, QH Wang
AIS, 2016
102016
Technology mergers and acquisitions in the presence of an installed base: a strategic analysis
QH Wang, KL Hui
Information Systems Research, 2017
92017
To launch or not to launch: An economic analysis of delayed product introduction
QH Wang, KL Hui
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
7*2005
The system can't perform the operation now. Try again later.
Articles 1–20