附件一: 西南财经大学接收(引进)教学人员登记表 姓名 罗欣 性别 男 年龄 1975 年 8月 政治面貌 -- 籍贯 美国 民族 汉 婚否 已婚 身体状况 良好 所学专业 商业信息系统 博 士 毕业院校及时间 美国密西西比州立大学 – 2007 博士 家庭详细地址 908 Molten Place NW Albuquerque, NM 87120, USA 邮政编码 87120 E-mail [email protected] 联系电话 505-836-5425 时间 现职务或职称 终身制 副教授 学历(学位) 应聘单位 经济信息工程学院 就读学校或工作单位 见附件 1 学 习 工 作 简 历 所 获 奖 励 1 证明人 已 公 开 发 表 、 出 版 的 论 文 或 著 作 发表时间 论文或著作名称 期刊或出版社名称 本人排名 见附件 2 承 担 的 科 研 项 目 备 注 注:本表未涉及的其他内容,应聘者可在备注栏中加以说明。 2 附件 1: 个人简历 一、个人基本信息 姓名 性别 罗欣 男 二、教育背景 起止年月 院校及系、专业 1994 年 9 月至 1999 年 7 月 四川师范大学 –外贸英语学士 2000 年 8 月至 2003 年 5 月 美国路易斯安娜大学 – 工商管理硕士 2003 年 8 月至 2007 年 5 月 美国密西西比州立大学 – 商业信息系统博士 三、工作经历 起止年月 单位及职务 2006 年 至 2008 年 美国弗吉尼亚州立大学商学院计算机信息系统系助理教授 美国新墨西哥大学安德森管理学院市场营销信息系统及决策科 2008 年至 2012 年 学系助理教授 美国新墨西哥大学安德森管理学院市场营销信息系统及决策科 2012 至今 学系终身制副教授,信息保障研究及教学中心副主任 四、主要研究成果和方向 成果名称 “Trust Restoration in Electronic Commerce” 成果形式 专业著作 出版社 出版时间或发表(转载)刊 物及期号 2011 年 IGI Global “Leader Influences on Member Personality and 专业期刊 Values Homogeneity in Online Social Networks” Decision Support Systems “Exploring the Impact of Instant Messaging on 专业期刊 Subjective Task Complexity and User Satisfaction” European Journal of Information Systems “Integrative Framework for Assessing Firms’ Potential to Undertake 专业期刊 Green IT Initiatives via Virtualization – A Theoretical Perspective” Journal of Strategic Information Systems 3 Vol. 54, Page. 655-664 (2012 年) Vol. 20, No. 2, Page 139-155 (2011 年) Vol. 20, No. 1, Page 38-54 (2011 年) 附件 2:已发表论文 专业书籍 1. Liao, Qinyu, Xin Luo, and Anil Gurung, “Trust Restoration in Electronic Commerce,” in Organizational and End-User Interactions: New Explorations, Summation of the Journal of Organizational and End User Computing, Clarke and Dwivedi (Ed.), IGI Global, Chapter 3, pp.72-88, May 2011, ISBN 978-1-60960-577-3 2. Xu, Shuting and Xin Luo, “Current Issues and Future Analysis in Text Mining for Information Security Applications”, in Handbook of Research on Text and Web Mining Technologies, Song and Wu (Ed.), IGI Global, September 2008, Chapter XXXIX, ISBN: 978-1-59904-990-8 (reprinted – “Current Issues and Future Analysis in Text Mining for Information Security Applications “, in Social and Political Implications of Data Mining, Hakikur Rahman (Ed.), IGI Global, December 2008, Chapter X, ISBN: 978-1-60566-230-5) 3. Luo, Xin and Merrill Warkentin, “Developments and Defenses of Malicious Code,” in Pagani, Margherita (Ed.), Encyclopedia of Multimedia Technology and Networking (2e), Hershey, PA: Idea Group Publishing, 2008, pp. 356-363, ISBN: 978-1-60566-014-1 4. Luo, Xin and Qinyu Liao, “Ransomware: A New Cyber Threat to Enterprises”, in Handbook of Research on Information Security and Assurance, Sharma and Gupta (Ed.), Hershey, PA: Idea Group Publishing, 2008, pp. 1-6, ISBN: 978-1-59904-855-0 5. Luo, Xin and Somasheker Akkaladevi, “Analysis of Intelligent Software Agents in E-commerce I”, Encyclopedia of Artificial Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 940-944, ISBN: 978-1-59904-849-9 6. Luo, Xin and Somasheker Akkaladevi, “Analysis of Intelligent Software Agents in E-commerce II”, Encyclopedia of Artificial Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 945-949, ISBN: 978-1-59904-849-9 7. Akkaladevi, Somasheker, Ajay K. Katangur, and Xin Luo, “Improving the Protein Secondary Structure Prediction Accuracy Using Decision Fusion and Bayesian Inference Method”, Encyclopedia of Artificial Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 1330-1336, ISBN: 978-1-59904-849-9 8. Luo, Xin and Qinyu Liao, “Using Instant Messaging to Improve E-collaboration in Organizations”, in Encyclopedia of E-Collaboration, Ned Kock (Editor), Publisher: Information Science Reference, November 2007, ISBN: 978-1599-04000-4 9. Liao, Qinyu and Xin Luo, “Instant Messaging As an E-collaboration Tool”, in Encyclopedia of E-Collaboration, Ned Kock (Editor), Publisher: Information Science Reference, November 2007, ISBN: 978-1599-04000-4 10. Luo, Xin and Merrill Warkentin, "Consumer's Attitude toward Mobile Office Use: A Technology Trade-Off Research Agenda," in E-Business Processes: Technologies and Solutions, Sounderpandian, J. and T. Sinha (Eds), January 2007 (reprinted – “Consumer’s Attitude toward Mobile Office User: A 4 Technology Trade-Off Research Agenda,” in Electronic Business: Concepts, Methodologies, Tools, and Applications, In Lee (Ed), IGI Global, December 2008, Chapter 6.13, pp. 1920 – 1928, ISBN: 978-1-60566-056-1) 11. Luo, Xin and Merrill Warkentin, "Malware and Anti-Virus Procedures", in Encyclopedia of Multimedia Technology and Networking, April 2005, Editor: Margherita Pagani, ISBN: 1591405610, Idea Group Publishing 部分发表论文 1. Li, Han, Krishnamurty Muralidhar, Rathindra Sarathy, and Xin Luo, “Assessment of Re-identification Risks of Data Perturbation Methods Using Record Linkage,” Journal of Database Management, forthcoming 2. Li, Han, Jie Zhang, Rathin Sarathy, and Xin Luo, “Exploring the Effects of Organizational Justice, Personal Ethics, and Sanction on Internet Use Policy Compliance,” Information Systems Journal, forthcoming 3. Liu, Chunhui, Xin Luo, Choonling Sia, Grace O’Farrel, and Hock Hai Teo, “The Impact of XBRL Adoption in P.R. China,” Decision Support Systems, forthcoming 4. Luo, Chuan, Xin Luo, Laurie Schatzberg, and Choonling Sia, “Impact of Informational and Social Factors on Online Recommendation Credibility: the Moderating Role of Source Credibility,” Decision Support Systems, Vol. 56, pp. 92-102, December 2013 5. Luo, Xin, Wei Zhang, Stephan Burd, and Alessandro Seazzu, “Investigating Phishing Victimization with the Heuristic-Systematic Model: A Theoretical Framework and an Exploration,” Computers & Security, Vol. 38, pp. 28-38, October 2013 6. Templeton, Gary, Xin Luo, Tomas Giberson, and Natalie Campbell, “Leader Influences on Member Personality and Values Homogeneity in Online Social Networks,” Decision Support Systems, Vol. 54, No. 1, pp. 655-664, 2012 7. Luo, Xin, Merrill Warkentin, and Han Li, "Understanding Mobile Office Technology Adoption Trade-offs: A Conjoint Analysis Approach," Journal of Computer Information Systems, Vol. 53, No. 3, Spring 2013, forthcoming 8. Pope, Michael, Merrill Warkentin, Leigh A. Mutchler, and Xin Luo, “The Domain Name System – Past, Present, and Future,” Communications of the Association for Information Systems, Vol. 30, No. 1, Article 21, pp. 329-346, 2012 9. Luo, Xin, Cheon-Pyo Lee, and Minna Mattila, “An Exploratory Study of Mobile Banking Services Resistance,” International Journal of Mobile Communications, Vol. 10, No. 4, pp. 366-385, 2012 5 10. Bose, Ranjit and Xin Luo, “Integrative Framework for Assessing Firms’ Potential to Undertake Green IT Initiatives via Virtualization – A Theoretical Perspective,” Journal of Strategic Information Systems, Vol. 20, Issue 1, pp. 38-54, March 2011 11. Li, Han, Ashish Gupta, Xin Luo, and Merrill Warkentin, “Exploring the Impact of Instant Messaging on Subjective Task Complexity and User Satisfaction,” European Journal of Information Systems, Vol. 20, No. 2, pp. 139-155, March 2011 12. Xu, Heng, Xin Luo, John M. Carroll, and Mary Beth Rosson, “The Personalization Privacy Paradox: An Exploratory Study of Decision Making Process for Location-Aware Marketing,” Decision Support Systems, Vol. 51, Issue 1, pp. 42-52, April 2011 13. Luo, Xin, Rich Brody, Alex Seazzu, and Stephen Burd, “Social Engineering: The Neglected Human Factor for Information Security Management,” Information Resources Management Journal, Vol. 24, No. 3, pp. 1-7, 2011 14. Lu, Yong, Michael Polgar, Xin Luo, and Yuanyuan Cao, “Social Network Analysis of a Criminal Hacker Community,” Journal of Computer Information Systems, Vol. 51, Issue 2, pp. 31-41, Winter 2010-2011 15. Luo, Xin, Han Li, Jie Zhang, and J. P. Shim, “Examining Multi-dimensional Trust and Multi-faceted Risk in Initial Acceptance of Emerging Technologies: An Empirical Study of Mobile Banking Services,” Decision Support Systems, Vol. 49, pp. 222-234, May 2010 16. Luo, Xin, Anil Gurung, and J. P. Shim, “Understanding the Determinants of User Acceptance of Enterprise Instant Messaging: An Empirical Study,” Journal of Organizational Computing and Electronic Commerce, Vol. 20, Issue 2, pp. 155-181, 2010 17. Liao, Qinyu, Xin Luo, Anil Gurung, and Long Li, “Workplace Monitoring and Employee Misuse Avoidance: Does Punishment Matter?” Journal of Computer Information Systems, Vol. 50, Issue 2, pp. 49-59, 2010 18. Zhang, Jie, Xin Luo, Somasheker Akkaladevi, and Jennifer Ziegelmayer, “Improving Multiple-password Recall – An Empirical Study,” European Journal of Information Systems, Vol. 18, Issue 2, pp. 165-176, 2009 19. Gurung, Anil, Xin Luo, and Qinyu Liao, “Consumer Motivations in Taking Action against Spyware: An Empirical Investigation,” Information Management & Computer Security, Vol. 17, Issue 3, pp. 276-289, 2009 20. Brody, Richard and Xin Luo, “Fraud and White Collar Crime: A Chinese Perspective,” Cross-Cultural Management, special issue on International Ethics and Fraud, Vol. 16, Issue 3, pp. 317-326, 2009 21. Liao, Qinyu, Xin Luo, and Anil Gurung, “Rebuilding Post-Violation Trust in B2C Electronic Commerce”, Journal of Organizational and End User Computing, 21(1), 60-74, January-March 2009 22. Gurung, Anil, Xin Luo, and M.K Raja, “An Empirical Investigation on Customer's Privacy Perceptions, 6 Trust and Security Awareness in E-commerce Environment,” Journal of Information Privacy and Security, Vol. 4, Issue 1, 2008 23. Lewis, Bruce R., Gary F. Templeton, and Xin Luo, "A Scientometric Investigation into the Quality of IS Journal Quality Measures", Journal of the Association for Information Systems, Vol. 8, Issue 12, Article 35, pp. 619-633, 2007. 24. Luo, Xin and Qinyu Liao, “Awareness Education as the Key to Ransomware Prevention”, Information Systems Security, Vol. 16, Issue 4, pp. 195 – 202, July – August 2007 25. Templeton, F. Gary, Bruce R. Lewis, and Xin Luo, “Author Affiliation Index: Response to Ferratt et al.”, Communications of the Associations for Information Systems, Vol. 19, Letter 2, pp. 710-724, 2007 26. Luo, Xin and Tan Teik Guan, "Defeating Active Phishing Attacks for Web-Based Transactions", International Journal of Information Security and Privacy, Vol. 1, Issue 3, pp. 47-60, July September 2007 27. Luo, Xin, "A Holistic Approach for Managing Spyware", Information Systems Security, Vol. 15, Issue 2, pp. 42 – 48, May – June 2006 28. Warkentin, Merrill, Xin Luo, and Gary F. Templeton, "A Framework for Spyware Assessment", Communications of the ACM, Vol. 48, Issue 8, August 2005 (translated into Japanese - Warkentin, Merrill, Xin Luo, and Gary F. Templeton. "A Framework for Spyware Assessment,” Communications of the ACM (Japan), Vol. 5, No. 2, 2006 N1, pp. 43-49.) 29. Liao, Qinyu and Xin Luo, "The Phishing Hook: Issues and Reality", Journal of Internet Banking and Commerce, November 2004, Vol. 9, No. 3, ISSN 1204-5357 30. Luo, Xin and Cheon-Pyo Lee, "Micropayments in Wireless M-Commerce: Issues, Security, and Trend", Journal of Internet Banking and Commerce, July 2004, Vol. 9, No. 2, ISSN 1204-5357 31. Luo, Xin and Stephen Burd, “Guest Editorial Preface: Information Fraud and Investigation: A Global Perspective,” special issue on Information Fraud and Investigation, International Journal of Accounting and Information Management, forthcoming 32. Luo, Xin, Heng Xu, and Lee J. Yao, “Guest Editorial Preface: E-commerce Intelligence Research and Development in the Greater China Region,” special issue on E-commerce Intelligence Research and Development in the Greater China Region, Electronic Markets, Vol. 22, No.2, 2012 33. Bose, Ranjit and Xin Luo, “Green IT Adoption: A Process Management Approach,” International Journal of Accounting and Information Management, Vol. 20, No. 1, 2012, pp. 63-77 34. Brody, Richard, Xin Luo, and Alex Seazzu, “Electronic Discovery: A Descriptive Analysis of Technological, Legal, and Managerial Issues,” Oil, Gas & Energy Quarterly, March 2011, Vol. 59, No.3 7 35. Luo, Xin and Wei Zhang, “Guest Editorial Preface: Information and Communication Technology Issues in the Greater China Region,” special issue on ICT Issues in Greater China Region, Journal of Global Information Technology Management, Vol.13, No. 2, April 2010 8
© Copyright 2025 Paperzz