Hanus, B., Wu, Y. (2012). The role of situation awareness in detecting criminal intrusions: A different perspective on information security awareness. The 18th Americas Conference on Information Systems.
Yang, M., Wu, Y. (2012). Using virtualization to ensure uninterrupted access to software applications for financial services firms. 5623-5630. The 45th Hawaii International Conference on System Sciences.
Wu, Y. (2012). Enabling constructivist learning in a graduate information security course. 157-163. Sixteenth Colloquium for Information Systems Security Education.
Hanus, B., Wu, Y. (2011). Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Las Vegas, NV: The 10th Security Conference.
Paul, B., Wu, Y., Prytutok, V. R., Harden, G. (2010). Social network position measured by constraint and centrality: Performance effect on IT professionals. 921-926. San Diego, CA: Decision Sciences Institute.
Wu, Y. (2010). TCP three-way handshake as a pedagogical tool. 49-56. Baltimore, MD: Fourteenth Colloquium for Information Systems Security Education. http://www.cisse.info/archives/14th-colloquium/papers?download=156:0851-2010
Wu, Y. (2008). We govern, therefore we are secure: Effects of IT governance on information security services. Academy of Management Conference.
Wu, Y., Saunders, C. (2006). Control of agency problems in information security. Security Conference, Proceedings of the Fifth Security Conference.
Wu, Y. (2006). Controlling Adverse Selection in Information Security Budgeting: An IT Governance Approach. 4554-4559. Americas Conference on Information Systems.
Wu, Y., Li, Y., Saunders, C. (2006). Trust in B2B Commerce: Taxonomy and Roles. 1789-1797. Americas Conference on Information Systems.
Wu, Y., Saunders, C. (2005). Decision making, IT governance, and information systems security. 3239-3247. Americas Conference on Information Systems, Proceedings of the 11th Americas Conference on Inf.
Wu, Y., Van Slyke, C. (2005). Interface complexity and elderly users: Revisited. 289-294. Information Systems Conference Southern Association, Proceedings of the 2005 Southern Association of In.
Saunders, C., Wu, Y., Li, Y., Weisfeld, S. (2004). Interorganizational trust in B2B relationships. 272-279. International Conference on Electronic Commerce, Proceedings of the Sixth International Conference.
Wu, Y., Hanus, B., Xue, B., Mahto, R. V. (2023). Information security ignorance: An exploration of the concept and its antecedents. Information & Management. 60(2), 103753.
Hanus, B., Wu, Y., Parrish, J. L. (2022). Phish me, phish me not: Analysis of Phishing Antecedents in Humans. Journal of Computer Information Systems. 62(3), 516-526.
Liang, H., Xue, Y., Pinsonneault, A., Wu, Y. (2019). What users do besides problem-focused coping in the IT security context: An emotion-focused coping perspective. MIS Quarterly.
Hanus, B., Windsor, J. C., Wu, Y. (2018). Definition and multidimensionality of security awareness: Close encounters of the second order. The Data Base for Advances in Information Systems.
Wu, Y., Saunders, C. S. (2016). Governing the fiduciary relationship in information security services. Decision Support Systems. 92, 57-67.
Hanus, B., Wu, Y. (2016). Impact of users' security awareness on desktop security behavior: A Protection Motivation Theory perspective. Information Systems Management. 33(1), 2-16.
Visinescu, L. L., Azogu, O., Ryan, S., Wu, Y., Kim, D. (2016). Better safe than sorry: A study of investigating individuals’ protection of privacy in the use of storage as cloud computing service. International Journal of Human-Computer Interaction. 32(11), 885-900.
Schuessler, J. H., Windsor, J., Wu, Y. (2014). Assessing information systems security effectiveness in large versus small businesses. Journal of Information System Security. 10(1), 3-39.
Peak, D., Prybutok, V., Gibson, M., Wu, Y., Xu, C. (2014). User perceptions of aesthetic visual design variables: A pluralistic, Web-based experiment. Informing Science. 17, 25-57.
Han, B., Wu, Y., Windsor, J. User's adoption of free third-party security apps. Journal of Computer Information Systems. 54(3), 77-86.
Wu, Y., Prybutok, V. R., Koh, C. E., Hanus, B. (2012). A nomological model of RFID privacy concern. Business Process Management Journal. 18(3), 420-444.
Burton, P., Wu, Y., Prybutok, V. R., Harden, G. (2012). Differential effects of strong and weak social network ties as communication links on knowledge workers' performance. IEEE Transactions on Professional Communication. 55(3), 239-253. http://libproxy.library.unt.edu:2253/stamp/stamp.jsp?tp=&arnumber=6212489
Wu, Y., Guynes, C. S., Windsor, J. (2012). Security awareness programs. Review of Business Information Systems. 16(4), 165-168.
Guynes, S., Wu, Y., Windsor, J. (2011). E-Commerce/network security considerations. International Journal of Management & Information Systems. 15(2), 1-7.
Wu, Y., Saunders, C. S. (2011). Governing information security: Governance domains and decision rights allocation patterns. Information Resources Management Journal. 24(1), 28-45.
Peak, D. A., Prybutok, V. R., Wu, Y., Xu, C. (2011). Integrating the visual design discipline with information systems research and practice. Informing Science. 14, 161-181. http://www.inform.nu/Articles/Vol14/ISJv14p161-181Peak603.pdf
Koh, C. E., Prybutok, V. R., Ryan, S. D., Wu, Y. (2010). A model for mandatory use of software technologies: An integrative approach by applying multiple levels of abstraction of informing science. Informing Science. 13, 177-203. http://www.inform.nu/Articles/Vol13/ISJv13p177-203Koh561.pdf
Paul, B., Wu, Y., Prybutok, V. R. (2010). Social network position and its relationship to performance of IT professionals. Informing Science. 13, 121-137. http://www.inform.nu/Articles/Vol13/ISJv13p121-137Burton554.pdf
Wu, Y., Li, Y. (2009). Trust in B2B commerce: Taxonomy and roles. International Journal of Networking and Virtual Organisations.
Hornik, S., Johnson, R. D., Wu, Y. (2007). When technology does not support learning: Conflicts between epistemological beliefs and technology support in virtual learning environments. Journal of Organizational and End User Computing. 19(2), 23-46.
Wu, Y. (2010). Benefits of virtualization in security lab design. ACM inroads - The SIGCSE Bulletin.
Wu, Y., Saunders, C. (2003). Further along the road to the IT artifact. Communications of the Association for Information Systems. 12, 562-567.