Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults R Chakraborty, J Lee, S Bagchi-Sen, S Upadhyaya, HR Rao Decision Support Systems 83, 47-56, 2016 | 254 | 2016 |
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013 J Lee, M Agrawal, HR Rao Information Systems Frontiers 17, 997-1005, 2015 | 130 | 2015 |
Electric car sharing service using mobile technology J Lee, J Nah, Y Park, V Sugumaran | 41 | 2011 |
Coping Behaviors in Short Message Service (SMS)-Based Disaster Alert Systems: From the Lens of Protection Motivation Theory as Elaboration Likelihood CW Yoo, J Lee, C Yoo, N Xiao Information & Management 58 (4), 2021 | 36 | 2021 |
Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective EW Ayaburi, J Lee, M Maasberg Information Systems Frontiers 22, 1227–1240, 2019 | 30 | 2019 |
Use of online information and suitability of target in shoplifting: A routine activity based analysis J Lee, MC de Guzman, N Talebi, SK Korni, D Szumigala, HR Rao Decision Support Systems 110, 1-10, 2018 | 25 | 2018 |
The Egyptian Protest Movement in the Twittersphere: An Investigation of Dual Sentiment Pathways of Communication CC Bang, J Lee, HR Rao International Journal of Information Management 58, 2021 | 18 | 2021 |
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach J Lee, MC de Guzman, J Wang, M Gupta, HR Rao Computers & Security 121, 102832, 2022 | 14 | 2022 |
Eustress and Distress in the Context of Telework C Van Slyke, J Lee, BQ Duong, TS Ellis Information Resources Management Journal (IRMJ) 35 (1), 1-24, 2022 | 14 | 2022 |
Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing Tragedy J Lee, B Abdul Rehman, M Agrawal, HR Rao Lecture Notes in Business Information Processing 258, 1-14, 2016 | 12 | 2016 |
Requirements management using KANO Model and AHP for service systems design J Lee, V Sugumaran, S Park 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011 | 12 | 2011 |
An approach for service identification using value co-creation and IT convergence J Lee, V Sugumaran, S Park, D Sansi 2011 First ACIS/JNU International Conference on Computers, Networks, Systems …, 2011 | 12 | 2011 |
Announcement of Formal Controls as Phase-Shifting Perceptions: Their Determinants and Moderating Role in the Context of Mobile Loafing DH Kwak, S Lee, X Ma, J Lee, L Khansa, A Brandyberry Internet Research, 2021 | 10 | 2021 |
Telework Distress and Eustress Among Chinese Teleworkers C Van Slyke, J Lee, B Duong, X Ma, H Lou Journal of Global Information Management 30 (1), 1-29, 2022 | 9 | 2022 |
Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors EW Ayaburi, M Maasberg, J Lee Journal of Cases on Information Technology (JCIT) 22 (4), 60-74, 2020 | 8 | 2020 |
Antecedents of members' trust propensity and its impact on self-disclosure intention in mobile based online dating apps B Duong, J Lee, E Ayaburi, S Jin Journal of Southern Association for Information Systems (JSAIS), 2021 | 7 | 2021 |
Can I Help Prevent Data Breaches in the Workplace? From Routine Activities to Extra-Role Security Behaviors J Lee, J Wang, M De Guzman, M Gupta, HR Rao IEEE Transactions on Technology and Society 5 (4), 2024 | 2 | 2024 |
Distress Coping Responses Among Teleworkers B Duong, J Lee, C Van Slyke, TS Ellis IEEE Transactions on Professional Communication 66 (3), 259-283, 2023 | 2 | 2023 |
Post Data Breach Use of Protective Technologies: An Examination of Users’ Dilemma E Ayaburi, F Andoh-Baidoo, J Lee Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020 | 2 | 2020 |
Use of Body Worn Camera (BWC) In Gray Scenarios: A Law Enforcement Officers’ Perspective J Lee, CW Yoo, J Wang, HR Rao European Journal of Information Systems, 2023 | 1 | 2023 |