College of Business
Florida International University
Modesto A. Maidique Campus
11200 S.W. 8th St, RB 202A
Miami, FL 33199
Phone: (305) 348-6377
Email: yachen@fiu.edu
Yan Chen
Ryder MIS Eminent Scholar Endowed Chair
Director, MBA in Cybersecurity Risk Management Program
Professor, Department of Information Systems and Business Analytics
College of Business
Florida International University
Modesto A. Maidique Campus
11200 S.W. 8th St, RB 202A
Miami, FL 33199
Phone: (305) 348-6377
Email: yachen@fiu.edu
Education
Ph.D. in Business
University of Wisconsin-Milwaukee, Milwauke, Wisconsin
Professional Activities
Dr. Yan Chen is a professor and faculty director for the MBA in Cybersecurity Risk Management in the Department of Information Systems and Business Analytics at Florida International University. She received her Ph.D. in management information systems (MIS) from the University of Wisconsin–Milwaukee. Her research focuses on information security and online fraud, security management, information privacy, AI security and privacy, and social media. Her work has appeared in many refereed academic journals and conference proceedings, including Information & Management, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems, MIS Quarterly and others. She is a recipient of research scholarships and best paper award nominees, and a member of the Association for Information Systems. She has served as a reviewer for IS journals and conferences, including Decision Sciences, Information & Management, Information Systems Research, Journal of Management Information Systems, Journal of the Association for Information Systems and MIS Quarterly, and others. She was appointed the Ryder MIS Eminent Scholar Endowment Chair in August 2021.
Courses Taught
- DBA Dissertation
- Dissertation Preparation
- Information Security Management
- Introduction to Information Systems Management
- Management Information Systems Internship
- Ph.D. Dissertation
- Protecting and Defending Business Digital Assets
- Seminar on Research in Emerging ICT and their Implications
Publications
Zahedi, F., Chen, Y., & Zhao, H.
(2025).
Ontology-Based Intelligent Interface Personalization for Protection against Phishing Attacks.
Information Systems Research
.
Pflughoeft, K. A., Zahedi, M. F., & Chen, Y.
(2024).
Data avatars: A theory-guided design and assessment for multidimensional data visualization.
Information & Management
, 61(2)
.
Chen, Y.
(2023).
Information security management: compliance challenges and new directions.
Journal of Information Technology Case and Application Research
, 24(4)
.
Liang, X., Zhao, J., Chen, Y., Bandara, E., & Shetty, S.
(2023).
Architectural Design of a Blockchain-enabled Federated Learning Platform for Algorithmic Fairness in Predictive Healthcare: A Design Science Study.
Journal of Medical Internet Research
.
Liu, H., Li, K., Chen, Y., & Luo, X.
(2023).
Is Personally Identifiable Information Really More Valuable? Evidence from Consumers’ Willingness-To-Accept Valuation of Their Privacy Information.
Decision Support Systems
.
Tian, Y., Chen, Y., & Luo, X.
(2023).
How do live-streaming platforms facilitate persuasion in political campaigns? Theory and empirical evidence from the perspective of affordance actualization.
Information & Management
, 60(3)
.
Chen, Y., Luo, X., & Li, H.
(2022).
Beyond adaptive security coping behaviors: Theory and empirical evidence.
Information & Management
, 59(2)
.
Chen, Y., Xia, W., & Cousins, K. C.
(2022).
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence.
Computers & Security
.
Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X., Moody, G. D., & Willison, R.
(2021).
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Information Systems Research
, 32(3)
.
Chen, Y., Zahedi, F., Abbasi, A., & Dobolyi, D.
(2021).
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools.
Information & Management
, 58(1)
.
Li, H., Luo, X., & Chen, Y.
(2021).
Understanding Information Security Policy Violation from a Situational Action Perspective.
Journal of the Association for Information Systems
, 22(3)
.
Claybaugh, C. C., Haried, P., Chen, Y., & Chen, L.
(2020).
ERP Vendor Satisfaction: From Communication and IT Capability Perspectives.
Journal of Computer Information Systems
, 61(1)
.
- Chen, Y., Deng, S., Kwak, D., Noshokaty, A. E., & Wu, J. (2019). A Multi-Appeal Model of Persuasion for Online Petition Success: A Linguistic Cue-Based Approach. Journal of the Association for Information Systems, 20(2).
- Chu, X., Luo, X., & Chen, Y. (2019). A Systematic Review on Cross-cultural Information Systems Research: Evidence from the Last Decade. Information & Management, 56(3).
- Hung, W., Chang, I., Chen, Y., & Ho, Y. (2019). Aligning 4C Strategy with Social Network Applications for CRM Performance. Journal of Global Information Management, 27(1).
- Hua, J., Chen, Y., & Luo, X. (2018). Are We Ready for Cyberterrorist Attacks?—Examining the Role of Individual Resilience. Information & Management, 55(7).
- Amoroso, D. L., & Chen, Y. (2017). Constructs Affecting Continuance Intention in Consumers with Mobile Financial Apps: A Dual Factor Approach. Journal of Information Technology Management, 28(3).
- Chen, Y., & Zahedi, F. M. (2016). Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China. MIS Quarterly, 40(1).
- Abbasi, A., Zahedi, F. M., Zhang, D., Chen, Y., Chen, H., & Nunamaker Jr., J. F. (2015). Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information. Journal of Management Information Systems, 31(4).
- Chen, Y., & Dai, H. (2015). Effects of Exchange Benefits, Security Concerns and Situational Privacy Concerns on Mobile Commerce Adoption. Journal of International Technology and Information Management, 24(3).
- Chen, Y., Ramamurthy, K., & Wen, K. (2015). Impacts of Comprehensive Information Security Programs on Information Security Culture. Journal of Computer Information Systems, 55(3).
- Hua, J., Bapna, S., & Chen, Y. (2015). Industrial Cyber Espionage. Journal of Management Systems, 25(3).
- Zahedi, F. M., Abbasi, A., & Chen, Y. (2015). Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance. Journal of the Association for Information Systems, 16.
- Chen, Y., & Dai, H. (2014). Do Innovators Concern Less about Security and Value New Technologies More? A Case of Mobile Commerce. Journal of Information Technology Management, 25(4).
- Peng, K., Chen, Y., & Wen, K. (2014). Brand Relationship, Consumption Values and Branded App Adoption. Industrial Management & Data Systems, 114(8).
- Chen, Y., Ramamurthy, K., & Wen, K. (2013). Organizations' Information Security Policy Compliance: Stick or Carrot Approach? Journal of Management Information Systems, 29(3).
- Wen, K., & Chen, Y. (2010). E-business Value Creation in Small and Medium Enterprises: A US Study using the TOE Framework. International Journal of Electronic Business, 8(1).