Personality traits, interpersonal relationships, online social support, and Facebook addiction JH Tang, MC Chen, CY Yang, TY Chung, YA Lee Telematics and Informatics 33 (1), 102-108, 2016 | 444 | 2016 |
An integrated system theory of information security management KS Hong, YP Chi, LR Chao, JH Tang Information Management & Computer Security 11 (5), 243-248, 2003 | 292 | 2003 |
Team structure and team performance in IS development: a social network perspective HL Yang, JH Tang Information & management 41 (3), 335-349, 2004 | 287 | 2004 |
Effects of social network on students’ performance: A web-based forum study in Taiwan HL Yang, JH Tang Journal of Asynchronous Learning Networks 7 (3), 93-107, 2003 | 203 | 2003 |
Self-disclosure among bloggers: Re-examination of social penetration theory JH Tang, CC Wang Cyberpsychology, behavior, and social networking 15 (5), 245-250, 2012 | 118 | 2012 |
The effect of interpersonal influence on softlifting intention and behaviour JH Tang, CK Farn Journal of Business Ethics 56, 149-161, 2005 | 98 | 2005 |
An empirical study of information security policy on information security elevation in Taiwan KS Hong, YP Chi, LR Chao, JH Tang Information Management & Computer Security 14 (2), 104-115, 2006 | 91 | 2006 |
A three‐stage model of requirements elicitation for Web‐based information systems HL Yang, JH Tang Industrial Management & Data Systems 103 (6), 398-409, 2003 | 53 | 2003 |
User role and perception of requirements in a web‐based community of practice JH Tang, HL Yang Online information review 29 (5), 499-512, 2005 | 32 | 2005 |
Effect of Facebook social comparison on well-being: A meta-analysis FR Yang, CF Wei, JH Tang Journal of Internet Technology 20 (6), 1829-1836, 2019 | 23 | 2019 |
An intelligent three‐phase spam filtering method based on decision tree data mining JJ Sheu, YK Chen, KT Chu, JH Tang, WP Yang Security and Communication Networks 9 (17), 4013-4026, 2016 | 23 | 2016 |
Emergent user roles and perceived requirements in a social‐oriented community JH Tang, HL Yang Library Review 55 (8), 508-519, 2006 | 22 | 2006 |
Key user roles on web‐based information systems requirements HL Yang, JH Tang Industrial Management & Data Systems 105 (5), 577-595, 2005 | 21 | 2005 |
Websites, Data Types and Information Privacy Concerns: A Contingency Model YJL Tang, Jih-Hsin Telematics & Informatics 34, 1274-1284, 2017 | 17 | 2017 |
A general domain name appraisal model JH Tang, MC Hsu, TY Hu, HH Huang Journal of Internet Technology 15 (3), 427-431, 2014 | 12 | 2014 |
Customer behavior analysis by using multiple databases: A case of university students' use of online bookstore services KT Chu, SM Wang, JL Hou, JH Tang, JJ Sheu Journal of Internet Technology 13 (6), 891-908, 2012 | 4 | 2012 |
應用推敲可能性模型探討部落格行銷效果: 以旅遊部落格為例 唐日新, 葉耀仁 中山管理評論 19 (3), 517-555, 2011 | 4 | 2011 |
社群導向系統的使用者需求擷取之研究 唐日新 國立政治大學資訊管理研究所博士論文, 2002 | 2 | 2002 |
Plagiarism Cognition, Attitude and Behavioral Intention: A Trade-Off Analysis JH Tang, TY Chung, MC Chen Proceedings of the International Conference on Information and Knowledge …, 2018 | 1 | 2018 |
軟體盜版的因素探討 唐日新, 郭鴻志, 范錚強 第八屆國際資訊管理學術研討會論文集, 1997 | 1 | 1997 |