Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory L Cheng, Y Li, W Li, E Holm, Q Zhai Computers & Security 39, 447-459, 2013 | 413 | 2013 |
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce AU Zafar, J Qiu, Y Li, J Wang, M Shahzad Computers in human behavior 115, 106178, 2021 | 402 | 2021 |
A call for research on home users’ information security behaviour Y Li, M Siponen | 81 | 2011 |
Influence of platform characteristics on purchase intention in social commerce: mechanism of psychological contracts S Hussain, Y Li, W Li Journal of theoretical and applied electronic commerce research 16 (1), 1-17, 2021 | 74 | 2021 |
Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue H Chen, Y Li, L Chen, J Yin Journal of Enterprise Information Management 34 (3), 770-792, 2021 | 55 | 2021 |
Understanding consumers’ purchase intention for online paid knowledge: A customer value perspective L Su, Y Li, W Li Sustainability 11 (19), 5420, 2019 | 55 | 2019 |
Examining the side effects of organizational Internet monitoring on employees H Jiang, A Tsohou, M Siponen, Y Li Internet Research 30 (6), 1613-1630, 2020 | 50 | 2020 |
Keeping secure to the end: a long-term perspective to understand employees’ consequence-delayed information security violation Y Li, N Zhang, M Siponen Behaviour & Information Technology 38 (5), 435-453, 2019 | 30 | 2019 |
Psychological contract-based consumer repurchase behavior on social commerce platform: an empirical study H Shahbaz, Y Li, W Li KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2061-2083, 2020 | 24 | 2020 |
From hindrance to challenge: How employees understand and respond to information security policies Y Li, T Pan, N Zhang Journal of enterprise information management 33 (1), 191-213, 2020 | 22 | 2020 |
Citizens’ cybersecurity behavior: Some major challenges Y Li, T Xin, M Siponen IEEE Security & Privacy 20 (01), 54-61, 2022 | 21 | 2022 |
A privacy risk identification framework of open government data: A mixed-method study in China Y Li, R Yang, Y Lu Government Information Quarterly 41 (1), 101916, 2024 | 8 | 2024 |
What drives trust in online paid knowledge? The role of customer value L Su, R Zhang, Y Li, W Li | 8 | 2018 |
Understanding the roles of challenge security demands, psychological resources in information security policy noncompliance Y Li, N Zhang, T Pan | 6 | 2018 |
Psychological Contracts, Antecedents and Consequences: A New Roadmap to Enhance Purchase Intentions in Social Commerce S Hussain, Y Li, W Li, M Ali | 5 | 2017 |
用户在线知识付费影响因素研究: 基于信任和认同视角 苏鹭燕, 李瀛, 李文立 管理科学 32 (4), 90-104, 2019 | 4 | 2019 |
Examining the boundary effect of information systems security behavior under different usage purposes Y Li, T Pan, N Zhang IEEE Access 7, 156544-156554, 2019 | 3 | 2019 |
网络新闻敏感信息识别与风险分级方法研究 李瀛, 王冠楠 Information studies: Theory & Application 45 (4), 105, 2022 | 1 | 2022 |
服务质量, 私人关系对顾客忠诚的影响研究 殷广杨, 金淳, 李瀛 技术经济 39 (2), 15-20, 2020 | 1 | 2020 |
Impacts of Information Security Systems on Employees' Critical Thinking and Procrastination. K Iqbal, Y Li PACIS, 150, 2021 | | 2021 |