Prati
Yuan Li
Yuan Li
Potvrđena adresa e-pošte na utk.edu
Naslov
Citirano
Citirano
Godina
Theories in online information privacy research: A critical review and an integrated framework
Y Li
Decision support systems 54 (1), 471-481, 2012
5292012
Empirical studies on online information privacy concerns: Literature review and an integrative framework
Y Li
Communications of the Association for Information Systems 28 (1), 28, 2011
3962011
The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns
Y Li
Decision support systems 57, 343-354, 2014
2902014
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1702017
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1612016
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge
WJ Kettinger, Y Li
European Journal of Information Systems 19 (4), 409-421, 2010
1252010
A mediation model of green supply chain management adoption: The role of internal impetus
A Agarwal, FC Giraud-Carrier, Y Li
International Journal of Production Economics 205, 342-358, 2018
1192018
A multi-level model of individual information privacy beliefs
Y Li
Electronic Commerce Research and Applications 13 (1), 32-44, 2014
1102014
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective
WJ Kettinger, Y Li, JM Davis, L Kettinger
European Journal of Information Systems 24 (1), 59-75, 2015
962015
A study on user acceptance of cloud computing: A multi-theoretical perspective
Y Li, K Chang
532012
An evolutionary information-processing theory of knowledge creation
Y Li, WJ Kettinger
Journal of the Association for Information Systems 7 (1), 25, 2006
502006
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
452019
Identity construction in social media: a study on blogging continuance
Y Li
Behaviour & Information Technology 41 (8), 1671–1688, 2022
322022
Employee responses to information security related stress: Coping and violation intention
J Yazdanmehr, A., Li, Y. and Wang
Information Systems Journal 33 (3), 598-639, 2023
252023
The effect of technological and task considerations on auditors’ acceptance of blockchain technology
A Li, Y. and Jumah
Journal of Information Systems 36 (3), 129-151, 2022
232022
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
J Yazdanmehr, A., Li, Y. and Wang
European Journal of Information Systems, 2022
22*2022
Self-determination and perceived information control in cloud storage service
Y Li, KC Chang, J Wang
Journal of Computer Information Systems 60 (2), 113-123, 2020
202020
Testing the relationship between information and knowledge in computer-aided decision-making
WJ Li, Y. and Kettinger
Information Systems Frontiers 24 (6), 1827-1843, 2022
112022
Developing a dichotomy of information privacy concerns
Y Li
112011
Adoption of identity protection service: An integrated protection motivation–precaution adoption process model
Y Li, J Wang, HR Rao
82017
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20