Courses Taught
- ADMN 410: Management Information Systems
- ADMN 873: Data Mgmt & Visualization
- DS 774/898: E-Business
- DS 775: Corporate Project Experience
- DS 804: Communication of Data
- DS 815: Prog for Bus Analytics
Research Interests
- Computer/Data/Network Security
- Information Science/Systems
- Information Technology
- Privacy
- Small Business
- Artificial Intelligence
Selected Publications
Gwebu, K. L., & Wang, J. (2024). The defining features of a robust information security climate. Computers & Security, 142, 103891. doi:10.1016/j.cose.2024.103891
Du, S., Gwebu, K. L., Wang, J., & Yu, K. (2024). Differential Market Reaction to Data Security Breaches: A Screening Perspective. Communications of the Association for Information Systems, 54, 376-401. doi:10.17705/1cais.05414
Gwebu, K. L., Wang, J., & Zifla, E. (2021). Can warnings curb the spread of fake news? The interplay between warning, trust and confirmation bias. BEHAVIOUR & INFORMATION TECHNOLOGY. doi:10.1080/0144929X.2021.2002932
Gwebu, K. L., Wang, J., & Hu, M. Y. (2020). Information security policy noncompliance: An integrative social influence model. INFORMATION SYSTEMS JOURNAL, 30(2), 220-269. doi:10.1111/isj.12257
Gwebu, K. L., Sohl, J., & Wang, J. (2019). Differential performance of science park firms: an integrative model. SMALL BUSINESS ECONOMICS, 52(1), 193-211. doi:10.1007/s11187-018-0025-5
Gwebu, K. L., Wang, J., & Wang, L. (2018). The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 35(2), 683-714. doi:10.1080/07421222.2018.1451962
Gwebu, K. L., Wang, J., & Guo, L. (2014). Continued usage intention of multifunctional friend networking services: A test of a dual-process model using Facebook. DECISION SUPPORT SYSTEMS, 67, 66-77. doi:10.1016/j.dss.2014.08.004
Gwebu, K. L., Hu, M. Y., & Shanker, M. S. (2012). An experimental investigation into the effects of information revelation in multi-attribute reverse auctions. BEHAVIOUR & INFORMATION TECHNOLOGY, 31(6), 631-644. doi:10.1080/0144929X.2010.528028
Gwebu, K. L., & Wang, J. (2011). Adoption of Open Source Software: The role of social identification. DECISION SUPPORT SYSTEMS, 51(1), 220-229. doi:10.1016/j.dss.2010.12.010
Gwebu, K. L., Wang, J., & Wang, L. (2010). Does IT outsourcing deliver economic value to firms?. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 19(2), 109-123. doi:10.1016/j.jsis.2010.05.003
Wang, J., Gwebu, K., Shanker, M., & Troutt, M. D. (2009). An application of agent-based simulation to knowledge sharing. DECISION SUPPORT SYSTEMS, 46(2), 532-541. doi:10.1016/j.dss.2008.09.006
Wang, L., Gwebu, K. L., Wang, J., & Zhu, D. X. (2008). The Aftermath of Information Technology Outsourcing: An Empirical Study of Firm Performance Following Outsourcing Decisions. Journal of Information Systems, 22(1), 125-159. doi:10.2308/jis.2008.22.1.125