Identifying factors influencing consumers’ intent to install mobile applications MA Harris, R Brookshire, AG Chin International Journal of Information Management 36 (3), 441-450, 2016 | 247 | 2016 |
A bidirectional perspective of trust and risk in determining factors that influence mobile app installation AG Chin, MA Harris, R Brookshire International Journal of Information Management 39, 49-59, 2018 | 89 | 2018 |
On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time BH Jones, AG Chin International Journal of Information Management 35 (5), 561-571, 2015 | 85 | 2015 |
An empirical investigation of intent to adopt mobile payment systems using a trust-based extended valence framework AG Chin, MA Harris, R Brookshire Information Systems Frontiers, 1-19, 2022 | 67 | 2022 |
Risky business: Students and smartphones BH Jones, AG Chin, P Aiken TechTrends 58, 73-83, 2014 | 62 | 2014 |
Data quality dimensions for information systems security: A theoretical exposition G Tejay, G Dhillon, AG Chin Security Management, Integrity, and Internal Control in Information Systems …, 2005 | 55 | 2005 |
Incremental data allocation and reallocation in distributed database systems AG Chin Data warehousing and web engineering, 137-160, 2002 | 47 | 2002 |
Incremental data allocation and reallocation in distributed database systems AG Chin Data warehousing and web engineering, 137-160, 2002 | 47 | 2002 |
On mobile device security practices and training efficacy: An empirical study AG Chin, U Etudo, MA Harris Informatics in Education 15 (2), 235, 2016 | 43 | 2016 |
Women in computing: historical roles, the perpetual glass ceiling, and current opportunities A Goyal IEEE Annals of the History of Computing 18 (3), 36-42, 1996 | 41 | 1996 |
Mobile Payment Adoption: An Empirical Review and Opportunities for Future Research M Harris, A Chin, J Beasley Southern Association for Information Systems, 2019 | 23 | 2019 |
Improving debt collection processes using rule-based decision engines: A case study of Capital One AG Chin, H Kotak International journal of information management 26 (1), 81-88, 2006 | 22 | 2006 |
Mobile app installation: the role of precautions and desensitization MA Harris, AG Chin, R Brookshire Journal of International Technology and Information Management 24 (4), 3, 2015 | 18 | 2015 |
An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University. AG Chin, P Little, BH Jones International Journal of Education and Development Using Information and …, 2020 | 11 | 2020 |
Consumer trust in Google’s top developers’ apps: an exploratory study MA Harris, AG Chin Information & Computer Security 24 (5), 474-495, 2016 | 11 | 2016 |
Text databases & document management: theory & practice AG Chin IGI Global, 2001 | 8 | 2001 |
An optimization algorithm for dynamic data migration in distributed database systems AG Chin The Journal of Computer Information Systems 39 (4), 74, 1999 | 8 | 1999 |
Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective S Mishra, AG Chin Computer Security, Privacy and Politics: Current Issues, Challenges and …, 2008 | 6 | 2008 |
Enhancing student creativity in information systems education: The active learning approach A Goyal Journal of Information Systems Education 7 (4), 135-139, 1995 | 6 | 1995 |
An Exploration of Mobile Device Security Artifacts At Institutions Of Higher Education AG Chin, D McRae, BH Jones, MA Harris Journal of International Technology and Information Management 25 (3), 27-52, 2016 | 5 | 2016 |