ÃÛÌÒÊÓƵ

Intellectual Contributions

Dr. Xiao (Jerry) Zhang
Assistant Professor of
Management Information Systems


Zhang

Refereed Articles

  • Maasberg, M., Zhang, X., Ko, M., Miller, S. R., & Beebe, N. L. (2020). An Analysis of Motive and Observable Behavioral Indicators Associated With Insider Cyber-Sabotage and Other Attacks. IEEE Engineering Management Review, 48 (2), 151-165, doi: 10.1109/EMR.2020.2989108.
  • Zhang, X., Wu, Y., & Wang, W. (2020). eWOM, what are we suspecting? Motivation, truthfulness or identity. Journal of Information, Communication & Ethics in Society, 18 (4)., doi: https://doi.org/10.1108/JICES-12-2019-0135.
  • Zhang, X., Wu, Y., & Li, Y. (2019). The Tendency of Trust in A Distrustful Environment: The Mediation Role of Contextual Perceptions in eWOM. Journal of Marketing Development and Competitiveness, 13 (5).
  • Zhang, X. (2019). The Suspicious Factors in Electronic Word-of-Mouth Communication. Journal of Marketing Development and Competitiveness, 13 (2), 101-115.
  • Zhang, X., Ko, M., & Carpenter, D. (2016). Development of A Scale to Measure Skepticism toward Electronic Word-of-Mouth. Computers in Human Behavior, 56, 198-208.

Refereed Proceedings

  • Zhang, X., & Barnes, C. (2019). Discovering the Suspicious Factors in Electronic Word-of-Mouth Communication. Southwestern DSI.
  • Li, G., Li, Y., Zhang, J., & Zhang, X. (2017). A Design Feature and Cross-Culture Based Comparative Evaluation of Web Maps. Human Factors and Ergonomics Society Annual Meeting, 61 (1), Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 818-822.
  • Zhang, X. & Ko, M. (2014). Is It Better to Be Suspicious? Investigating the case of Online User-Generated Content. Americas Conference on Information Systems.
  • Zhang, X., Ko, M., & Carpenter, D. (2013). Current State of the Digital Deception Studies in IS. Americas Conference on Information Systems.
  • Zhang, X., Carpenter, D., & Ko, M. (2013). Online Astroturfing: A Theoretical Perspective. Americas Conference on Information Systems.
  • Zhang, X. & Clark, J. (2012). Matrix Passwords: A Proposed Methodology of Password Authentication. Americas Conference on Information Systems.

Chapters, Cases, Readings, Supplements

Chapters
  • Zhao, R., Zhu, Z., Li, Y., Zhang, J., & Zhang, X. (2020). Use a UAV System to Enhance Port Security in Unconstrained Environment. Advances in Human Factors in Robots, Drones and Unmanned Systems. Springer.

Presentations of Refereed Papers

  • Zhao, R., Zhu, Z., Li, Y., Zhang, J., & Zhang, X. (2020). Use a UAV System to Enhance Port Security in Unconstrained Environment. The 11th International Conference on Applied Human Factors and Ergonomics (AHFE 2020), San Diego, California.
  • Zhang, X. & Barnes, C. (2019, April). Discovering the Suspicious Factors in Electronic Word-of-Mouth Communication. Southwestern DSI, Houston, TX, United States of America.
  • Li, G., Li, Y., Zhang, J., & Zhang, X. (2017). A Design Feature and Cross-Culture Based Comparative Evaluation of Web Maps. Human Factors and Ergonomics Society Annual Meeting 2017, Austin, Texas.

Patents/Inventions

  • 2012 - System and Method for Password Verification.