西南财经大学拟引进人才基本情况表

附件一:
西南财经大学接收(引进)教学人员登记表
姓名
罗欣
性别
男
年龄
1975 年
8月
政治面貌
--
籍贯
美国
民族
汉
婚否
已婚
身体状况
良好
所学专业
商业信息系统 博 士
毕业院校及时间
美国密西西比州立大学 – 2007
博士
家庭详细地址
908 Molten Place NW
Albuquerque, NM 87120, USA
邮政编码
87120
E-mail
[email protected]
联系电话
505-836-5425
时间
现职务或职称
终身制
副教授
学历(学位)
应聘单位 经济信息工程学院
就读学校或工作单位
见附件 1
学
习
工
作
简
历
所
获
奖
励
1
证明人
已
公
开
发
表
、
出
版
的
论
文
或
著
作
发表时间
论文或著作名称
期刊或出版社名称 本人排名
见附件 2
承
担
的
科
研
项
目
备
注
注:本表未涉及的其他内容,应聘者可在备注栏中加以说明。
2
附件 1: 个人简历
一、个人基本信息
姓名
性别
罗欣
男
二、教育背景
起止年月
院校及系、专业
1994 年 9 月至 1999 年 7 月
四川师范大学 –外贸英语学士
2000 年 8 月至 2003 年 5 月
美国路易斯安娜大学 – 工商管理硕士
2003 年 8 月至 2007 年 5 月
美国密西西比州立大学 – 商业信息系统博士
三、工作经历
起止年月
单位及职务
2006 年 至 2008 年
美国弗吉尼亚州立大学商学院计算机信息系统系助理教授
美国新墨西哥大学安德森管理学院市场营销信息系统及决策科
2008 年至 2012 年
学系助理教授
美国新墨西哥大学安德森管理学院市场营销信息系统及决策科
2012 至今
学系终身制副教授,信息保障研究及教学中心副主任
四、主要研究成果和方向
成果名称
“Trust Restoration in
Electronic Commerce”
成果形式
专业著作
出版社
出版时间或发表(转载)刊
物及期号
2011 年
IGI Global
“Leader Influences on
Member Personality and
专业期刊
Values Homogeneity in
Online Social Networks”
Decision Support
Systems
“Exploring the Impact of
Instant Messaging on
专业期刊
Subjective Task
Complexity and User
Satisfaction”
European Journal of
Information Systems
“Integrative Framework
for Assessing Firms’
Potential to Undertake
专业期刊
Green IT Initiatives via
Virtualization – A
Theoretical Perspective”
Journal of Strategic
Information Systems
3
Vol. 54, Page. 655-664
(2012 年)
Vol.
20,
No.
2,
Page
139-155 (2011 年)
Vol. 20, No. 1, Page 38-54
(2011 年)
附件 2:已发表论文
专业书籍
1. Liao, Qinyu, Xin Luo, and Anil Gurung, “Trust Restoration in Electronic Commerce,” in Organizational
and End-User Interactions: New Explorations, Summation of the Journal of Organizational and End
User Computing, Clarke and Dwivedi (Ed.), IGI Global, Chapter 3, pp.72-88, May 2011, ISBN
978-1-60960-577-3
2. Xu, Shuting and Xin Luo, “Current Issues and Future Analysis in Text Mining for Information Security
Applications”, in Handbook of Research on Text and Web Mining Technologies, Song and Wu (Ed.),
IGI Global, September 2008, Chapter XXXIX, ISBN: 978-1-59904-990-8 (reprinted – “Current Issues
and Future Analysis in Text Mining for Information Security Applications “, in Social and Political
Implications of Data Mining, Hakikur Rahman (Ed.), IGI Global, December 2008, Chapter X, ISBN:
978-1-60566-230-5)
3. Luo, Xin and Merrill Warkentin, “Developments and Defenses of Malicious Code,” in Pagani,
Margherita (Ed.), Encyclopedia of Multimedia Technology and Networking (2e), Hershey, PA: Idea
Group Publishing, 2008, pp. 356-363, ISBN: 978-1-60566-014-1
4. Luo, Xin and Qinyu Liao, “Ransomware: A New Cyber Threat to Enterprises”, in Handbook of
Research on Information Security and Assurance, Sharma and Gupta (Ed.), Hershey, PA: Idea Group
Publishing, 2008, pp. 1-6, ISBN: 978-1-59904-855-0
5. Luo, Xin and Somasheker Akkaladevi, “Analysis of Intelligent Software Agents in E-commerce I”,
Encyclopedia of Artificial Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 940-944, ISBN:
978-1-59904-849-9
6. Luo, Xin and Somasheker Akkaladevi, “Analysis of Intelligent Software Agents in E-commerce II”,
Encyclopedia of Artificial Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 945-949, ISBN:
978-1-59904-849-9
7. Akkaladevi, Somasheker, Ajay K. Katangur, and Xin Luo, “Improving the Protein Secondary Structure
Prediction Accuracy Using Decision Fusion and Bayesian Inference Method”, Encyclopedia of Artificial
Intelligence, Hershey, PA: Idea Group Publishing, 2008, pp. 1330-1336, ISBN: 978-1-59904-849-9
8. Luo, Xin and Qinyu Liao, “Using Instant Messaging to Improve E-collaboration in Organizations”, in
Encyclopedia of E-Collaboration, Ned Kock (Editor), Publisher: Information Science Reference,
November 2007, ISBN: 978-1599-04000-4
9. Liao, Qinyu and Xin Luo, “Instant Messaging As an E-collaboration Tool”, in Encyclopedia of
E-Collaboration, Ned Kock (Editor), Publisher: Information Science Reference, November 2007, ISBN:
978-1599-04000-4
10. Luo, Xin and Merrill Warkentin, "Consumer's Attitude toward Mobile Office Use: A Technology
Trade-Off Research Agenda," in E-Business Processes: Technologies and Solutions, Sounderpandian, J.
and T. Sinha (Eds), January 2007 (reprinted – “Consumer’s Attitude toward Mobile Office User: A
4
Technology Trade-Off Research Agenda,” in Electronic Business: Concepts, Methodologies, Tools, and
Applications, In Lee (Ed), IGI Global, December 2008, Chapter 6.13, pp. 1920 – 1928, ISBN:
978-1-60566-056-1)
11. Luo, Xin and Merrill Warkentin, "Malware and Anti-Virus Procedures", in Encyclopedia of Multimedia
Technology and Networking, April 2005, Editor: Margherita Pagani, ISBN: 1591405610, Idea Group
Publishing
部分发表论文
1. Li, Han, Krishnamurty Muralidhar, Rathindra Sarathy, and Xin Luo, “Assessment of Re-identification
Risks of Data Perturbation Methods Using Record Linkage,” Journal of Database Management,
forthcoming
2. Li, Han, Jie Zhang, Rathin Sarathy, and Xin Luo, “Exploring the Effects of Organizational Justice,
Personal Ethics, and Sanction on Internet Use Policy Compliance,” Information Systems Journal,
forthcoming
3. Liu, Chunhui, Xin Luo, Choonling Sia, Grace O’Farrel, and Hock Hai Teo, “The Impact of XBRL
Adoption in P.R. China,” Decision Support Systems, forthcoming
4. Luo, Chuan, Xin Luo, Laurie Schatzberg, and Choonling Sia, “Impact of Informational and Social
Factors on Online Recommendation Credibility: the Moderating Role of Source Credibility,” Decision
Support Systems, Vol. 56, pp. 92-102, December 2013
5. Luo, Xin, Wei Zhang, Stephan Burd, and Alessandro Seazzu, “Investigating Phishing Victimization
with the Heuristic-Systematic Model: A Theoretical Framework and an Exploration,” Computers &
Security, Vol. 38, pp. 28-38, October 2013
6. Templeton, Gary, Xin Luo, Tomas Giberson, and Natalie Campbell, “Leader Influences on Member
Personality and Values Homogeneity in Online Social Networks,” Decision Support Systems, Vol. 54,
No. 1, pp. 655-664, 2012
7. Luo, Xin, Merrill Warkentin, and Han Li, "Understanding Mobile Office Technology Adoption
Trade-offs: A Conjoint Analysis Approach," Journal of Computer Information Systems, Vol. 53, No. 3,
Spring 2013, forthcoming
8. Pope, Michael, Merrill Warkentin, Leigh A. Mutchler, and Xin Luo, “The Domain Name System – Past,
Present, and Future,” Communications of the Association for Information Systems, Vol. 30, No. 1,
Article 21, pp. 329-346, 2012
9. Luo, Xin, Cheon-Pyo Lee, and Minna Mattila, “An Exploratory Study of Mobile Banking Services
Resistance,” International Journal of Mobile Communications, Vol. 10, No. 4, pp. 366-385, 2012
5
10. Bose, Ranjit and Xin Luo, “Integrative Framework for Assessing Firms’ Potential to Undertake Green IT
Initiatives via Virtualization – A Theoretical Perspective,” Journal of Strategic Information Systems,
Vol. 20, Issue 1, pp. 38-54, March 2011
11. Li, Han, Ashish Gupta, Xin Luo, and Merrill Warkentin, “Exploring the Impact of Instant Messaging on
Subjective Task Complexity and User Satisfaction,” European Journal of Information Systems, Vol.
20, No. 2, pp. 139-155, March 2011
12. Xu, Heng, Xin Luo, John M. Carroll, and Mary Beth Rosson, “The Personalization Privacy Paradox: An
Exploratory Study of Decision Making Process for Location-Aware Marketing,” Decision Support
Systems, Vol. 51, Issue 1, pp. 42-52, April 2011
13. Luo, Xin, Rich Brody, Alex Seazzu, and Stephen Burd, “Social Engineering: The Neglected Human
Factor for Information Security Management,” Information Resources Management Journal, Vol. 24,
No. 3, pp. 1-7, 2011
14. Lu, Yong, Michael Polgar, Xin Luo, and Yuanyuan Cao, “Social Network Analysis of a Criminal Hacker
Community,” Journal of Computer Information Systems, Vol. 51, Issue 2, pp. 31-41, Winter 2010-2011
15. Luo, Xin, Han Li, Jie Zhang, and J. P. Shim, “Examining Multi-dimensional Trust and Multi-faceted
Risk in Initial Acceptance of Emerging Technologies: An Empirical Study of Mobile Banking
Services,” Decision Support Systems, Vol. 49, pp. 222-234, May 2010
16. Luo, Xin, Anil Gurung, and J. P. Shim, “Understanding the Determinants of User Acceptance of
Enterprise Instant Messaging: An Empirical Study,” Journal of Organizational Computing and
Electronic Commerce, Vol. 20, Issue 2, pp. 155-181, 2010
17. Liao, Qinyu, Xin Luo, Anil Gurung, and Long Li, “Workplace Monitoring and Employee Misuse
Avoidance: Does Punishment Matter?” Journal of Computer Information Systems, Vol. 50, Issue 2, pp.
49-59, 2010
18. Zhang, Jie, Xin Luo, Somasheker Akkaladevi, and Jennifer Ziegelmayer, “Improving Multiple-password
Recall – An Empirical Study,” European Journal of Information Systems, Vol. 18, Issue 2, pp.
165-176, 2009
19. Gurung, Anil, Xin Luo, and Qinyu Liao, “Consumer Motivations in Taking Action against Spyware: An
Empirical Investigation,” Information Management & Computer Security, Vol. 17, Issue 3, pp.
276-289, 2009
20. Brody, Richard and Xin Luo, “Fraud and White Collar Crime: A Chinese Perspective,” Cross-Cultural
Management, special issue on International Ethics and Fraud, Vol. 16, Issue 3, pp. 317-326, 2009
21. Liao, Qinyu, Xin Luo, and Anil Gurung, “Rebuilding Post-Violation Trust in B2C Electronic
Commerce”, Journal of Organizational and End User Computing, 21(1), 60-74, January-March 2009
22. Gurung, Anil, Xin Luo, and M.K Raja, “An Empirical Investigation on Customer's Privacy Perceptions,
6
Trust and Security Awareness in E-commerce Environment,” Journal of Information Privacy and
Security, Vol. 4, Issue 1, 2008
23. Lewis, Bruce R., Gary F. Templeton, and Xin Luo, "A Scientometric Investigation into the Quality of IS
Journal Quality Measures", Journal of the Association for Information Systems, Vol. 8, Issue 12,
Article 35, pp. 619-633, 2007.
24. Luo, Xin and Qinyu Liao, “Awareness Education as the Key to Ransomware Prevention”, Information
Systems Security, Vol. 16, Issue 4, pp. 195 – 202, July – August 2007
25. Templeton, F. Gary, Bruce R. Lewis, and Xin Luo, “Author Affiliation Index: Response to Ferratt et
al.”, Communications of the Associations for Information Systems, Vol. 19, Letter 2, pp. 710-724,
2007
26. Luo, Xin and Tan Teik Guan, "Defeating Active Phishing Attacks for Web-Based Transactions",
International Journal of Information Security and Privacy, Vol. 1, Issue 3, pp. 47-60, July September 2007
27. Luo, Xin, "A Holistic Approach for Managing Spyware", Information Systems Security, Vol. 15, Issue
2, pp. 42 – 48, May – June 2006
28. Warkentin, Merrill, Xin Luo, and Gary F. Templeton, "A Framework for Spyware Assessment",
Communications of the ACM, Vol. 48, Issue 8, August 2005 (translated into Japanese - Warkentin,
Merrill, Xin Luo, and Gary F. Templeton. "A Framework for Spyware Assessment,” Communications
of the ACM (Japan), Vol. 5, No. 2, 2006 N1, pp. 43-49.)
29. Liao, Qinyu and Xin Luo, "The Phishing Hook: Issues and Reality", Journal of Internet Banking and
Commerce, November 2004, Vol. 9, No. 3, ISSN 1204-5357
30. Luo, Xin and Cheon-Pyo Lee, "Micropayments in Wireless M-Commerce: Issues, Security, and Trend",
Journal of Internet Banking and Commerce, July 2004, Vol. 9, No. 2, ISSN 1204-5357
31. Luo, Xin and Stephen Burd, “Guest Editorial Preface: Information Fraud and Investigation: A Global
Perspective,” special issue on Information Fraud and Investigation, International Journal of
Accounting and Information Management, forthcoming
32. Luo, Xin, Heng Xu, and Lee J. Yao, “Guest Editorial Preface: E-commerce Intelligence Research and
Development in the Greater China Region,” special issue on E-commerce Intelligence Research and
Development in the Greater China Region, Electronic Markets, Vol. 22, No.2, 2012
33. Bose, Ranjit and Xin Luo, “Green IT Adoption: A Process Management Approach,” International
Journal of Accounting and Information Management, Vol. 20, No. 1, 2012, pp. 63-77
34. Brody, Richard, Xin Luo, and Alex Seazzu, “Electronic Discovery: A Descriptive Analysis of
Technological, Legal, and Managerial Issues,” Oil, Gas & Energy Quarterly, March 2011, Vol. 59,
No.3
7
35. Luo, Xin and Wei Zhang, “Guest Editorial Preface: Information and Communication Technology Issues
in the Greater China Region,” special issue on ICT Issues in Greater China Region, Journal of Global
Information Technology Management, Vol.13, No. 2, April 2010
8