Positions

Research Areas research areas

Overview

  • Jing Wang is an Associate Professor of Decision Sciences at the Peter T. Paul College of Business and Economics, University of New Hampshire. Her research focuses on the areas of IT Outsourcing, Open Source Software, information technology adoption and use, privacy and data security. Her work has been published in the Journal of Management Information Systems, the Decision Support Systems Journal, Journal of Strategic Information Systems, Journal of Business Research, and Journal of Information Systems.
  • Selected Publications

    Academic Article

    Year Title
    2024 The defining features of a robust information security climate.Computers and Security.  142:103891-103891. 2024
    2021 Can warnings curb the spread of fake news? The interplay between warning, trust and confirmation biasBehaviour and Information Technology.  41:3552-3573. 2021
    2020 Information security policy noncompliance: An integrative social influence modelInformation Systems Journal: an international journal promoting the study and practice of information systems.  30:220-269. 2020
    2019 Differential performance of science park firms: an integrative modelSmall Business Economics: an international journal.  52:193-211. 2019
    2018 The Role of Corporate Reputation and Crisis Response Strategies in Data Breach ManagementJournal of Management Information Systems.  35:683-714. 2018
    2015 Personal innovativeness in technology, related knowledge and experience, and entrepreneurial intentions in emerging technology industries: a process of causation or effectuation?The International Entrepreneurship and Management Journal.  11:529-555. 2015
    2014 Continued usage intention of multifunctional friend networking services: A test of a dual-process model using FacebookDecision Support Systems.  67:66-77. 2014
    2012 Survival factors for Free Open Source Software projects: A multi-stage perspectiveEuropean Management Journal.  30:352-371. 2012
    2012 Human agency, social networks, and FOSS project successJournal of Business Research.  65:977-984. 2012
    2012 The Face-Off Between User Privacy and Information Exploitation in Online Social NetworkingInternational Journal of Information Systems and Social Change (IJISSC).  3:19-36. 2012
    2011 Adoption of Open Source Software: The role of social identificationDecision Support Systems.  51:220-229. 2011
    2011 Does IT outsourcing deliver economic value to firms?Operations Research Management Science.  51:391-391. 2011
    2011 EFFECTS OF PRICE RECOMMENDATIONS IN NAME-YOUR-OWN-PRICE AUCTIONSJournal of Electronic Commerce Research.  12:61-77. 2011
    2011 Some experiments on subjective optimisationInternational Journal of Operational Research.  12:79-103. 2011
    2011 Strategy and Vendor Selection in IT Outsourcing: Is there a Method in the Madness?Journal of Global Information Technology Management.  14:6-26. 2011
    2010 Seeing eye to eye? An exploratory study of free open source software users' perceptionsJournal of Systems and Software.  83:2287-2296. 2010
    2010 Does IT outsourcing deliver economic value to firms?Journal of Strategic Information Systems.  19:109-123. 2010
    2009 An application of agent-based simulation to knowledge sharingDecision Support Systems.  46:532-541. 2009
    2008 The Aftermath of Information Technology Outsourcing: An Empirical Study of Firm Performance Following Outsourcing DecisionsThe Journal of Information Systems.  22:125-159. 2008
    2007 The Role of Organizational, Environmental and Human Factors in E-Learning DiffusionInternational Journal of Web-Based Learning and Teaching Technologies.  2:59-78. 2007
    2007 A conceptual framework for understanding trust building and maintenance in virtual organizationsJITTA: Journal of Information Technology Theory and Application.  9:43-43. 2007
    Differential Market Reaction to Data Security Breaches: A Screening PerspectiveCommunications of the Association for Information Systems.  54:376-401.

    Article

    Year Title
    2014 Users’ Extended and Exploratory Use of Software Services 2014
    2013 Understanding E-Learning Adoption and Post Adoption Intentions 2013
    2012 Data Security Breach Impact and Disclosure. 2012
    Understanding E-Learning Adoption and Post Adoption Intentions.
    Users’ Extended and Exploratory Use of Software Services

    Chapter

    Year Title
    2017 Strategy and Vendor Selection in IT Outsourcing: Is There a Method in the Madness?.  451-477. 2017
    2012 The Effect of Merger and Acquisitions on the IS Function: An Overview and a Potential Agent-Based Approach.  157-168. 2012
    2008 Multi-Attribute Auctions: Research Challenges and Opportunities.  133-149. 2008
    2006 Establishing and sustaining trust in virtual organizations.  198-203. 2006
    2005 Intelligent Decision Support Systems in Agent-Mediated Environments 105 GE Phillips-Wren andL. C. Jain (Eds.) IOS Press. 2005.  105-105. 2005

    Conference Paper

    Year Title
    2017 Stock Market Reaction to Data Breaches: The Moderating Role of Corporate Social ResponsibilityCyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2017 International Conference On. 1-2. 2017
    2014 Understanding the Cost associated with Data Security Breaches.PACIS. 386-386. 2014
    Designing Effective Misinformation Warning Labels: A Word-of-Mouth Perspective
    Science Parks and Firm Performance: The Moderating Role of Endowments and Environmental Conditions
    The Language of Privacy Policies: Uncovering Hidden Meaning with NLP
    Understanding the Cost Associated With Data Security Breaches.

    Teaching Activities

  • Business Intelligence Taught course
  • Business Intelligence Taught course
  • Honors Thesis DS Taught course
  • Technology & Competitive Edge Taught course
  • Business Intelligence Taught course 2024
  • Technology & Competitive Edge Taught course 2024
  • Database Management Taught course 2023
  • Database Management Taught course 2023
  • Business Intelligence Taught course 2022
  • Technology & Competitive Edge Taught course 2022
  • Database Management Taught course 2022
  • Database Management Taught course 2022
  • Technology & Competitive Edge Taught course 2022
  • Business Intelligence Taught course 2021
  • Technology & Competitive Edge Taught course 2021
  • Technology & Competitive Edge Taught course 2021
  • Business Intelligence Taught course 2020
  • Technology & Competitive Edge Taught course 2020
  • Technology & Competitive Edge Taught course 2020
  • Database Mgmt/Systems Analysis Taught course 2020
  • Database Mgmt/Systems Analysis Taught course 2020
  • Database Mgmt/Systems Analysis Taught course 2019
  • Database Mgmt/Systems Analysis Taught course 2019
  • Technology & Competitive Edge Taught course 2019
  • Database Mgmt/Systems Analysis Taught course 2019
  • Database Mgmt/Systems Analysis Taught course 2019
  • Database Mgmt/Systems Analysis Taught course 2018
  • Database Mgmt/Systems Analysis Taught course 2018
  • Technology & Competitive Edge Taught course 2018
  • Database Mgmt/Systems Analysis Taught course 2018
  • Database Mgmt/Systems Analysis Taught course 2018
  • Info Sys &Enterprise Integratn Taught course 2018
  • Database Mgmt/Systems Analysis Taught course 2017
  • Database Mgmt/Systems Analysis Taught course 2017
  • Database Mgmt/Systems Analysis Taught course 2017
  • Info Sys &Enterprise Integratn Taught course 2017
  • Info Sys &Enterprise Integratn Taught course 2017
  • Info Sys &Enterprise Integratn Taught course 2017
  • Database Mgmt/Systems Analysis Taught course 2016
  • Database Mgmt/Systems Analysis Taught course 2016
  • Management Information Systems Taught course 2016
  • Mng Info Across Enterprise Taught course 2016
  • Info Sys &Enterprise Integratn Taught course 2016
  • Management Information Systems Taught course 2015
  • Mng Info Across Enterprise Taught course 2015
  • Management Information Systems Taught course 2015
  • Mng Info Across Enterprise Taught course 2015
  • Info Sys &Enterprise Integratn Taught course 2015
  • Management Information Systems Taught course 2014
  • Mng Info Across Enterprise Taught course 2014
  • Education And Training

  • B.A. Hospitality Management, Nankai University
  • M.A. Teaching English as a Second Language, Bowling Green State University
  • M.B.A. Management Information Systems, Kent State University
  • Ph.D. Management Information Systems, Kent State University
  • Full Name

  • Jing Wang