Theories in online information privacy research: A critical review and an integrated framework Y Li Decision support systems 54 (1), 471-481, 2012 | 499 | 2012 |
Empirical studies on online information privacy concerns: Literature review and an integrative framework Y Li Communications of the Association for Information Systems 28 (1), 28, 2011 | 377 | 2011 |
The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns Y Li Decision support systems 57, 343-354, 2014 | 274 | 2014 |
Overconfidence in phishing email detection J Wang, Y Li, HR Rao Journal of the Association for Information Systems 17 (11), 1, 2016 | 149 | 2016 |
Coping responses in phishing detection: an investigation of antecedents and consequences J Wang, Y Li, HR Rao Information Systems Research 28 (2), 378-396, 2017 | 141 | 2017 |
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge WJ Kettinger, Y Li European Journal of Information Systems 19 (4), 409-421, 2010 | 123 | 2010 |
A mediation model of green supply chain management adoption: The role of internal impetus A Agarwal, FC Giraud-Carrier, Y Li International Journal of Production Economics 205, 342-358, 2018 | 107 | 2018 |
A multi-level model of individual information privacy beliefs Y Li Electronic Commerce Research and Applications 13 (1), 32-44, 2014 | 107 | 2014 |
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective WJ Kettinger, Y Li, JM Davis, L Kettinger European Journal of Information Systems 24 (1), 59-75, 2015 | 92 | 2015 |
A study on user acceptance of cloud computing: A multi-theoretical perspective Y Li, K Chang | 51 | 2012 |
An evolutionary information-processing theory of knowledge creation Y Li, WJ Kettinger Journal of the Association for Information Systems 7 (1), 25, 2006 | 50 | 2006 |
Responding to identity theft: A victimization perspective Y Li, A Yazdanmehr, J Wang, HR Rao Decision Support Systems 121, 13-24, 2019 | 38 | 2019 |
Identity construction in social media: a study on blogging continuance Y Li Behaviour & Information Technology 41 (8), 1671–1688, 2022 | 21 | 2022 |
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies J Yazdanmehr, A., Li, Y. and Wang European Journal of Information Systems, 2022 | 16* | 2022 |
Self-determination and perceived information control in cloud storage service Y Li, KC Chang, J Wang Journal of Computer Information Systems 60 (2), 113-123, 2020 | 16 | 2020 |
Employee responses to information security related stress: Coping and violation intention J Yazdanmehr, A., Li, Y. and Wang Information Systems Journal 33 (3), 598-639, 2023 | 13 | 2023 |
The effect of technological and task considerations on auditors’ acceptance of blockchain technology A Li, Y. and Jumah Journal of Information Systems 36 (3), 129-151, 2022 | 12 | 2022 |
Developing a dichotomy of information privacy concerns Y Li | 11 | 2011 |
Adoption of identity protection service: An integrated protection motivation–precaution adoption process model Y Li, J Wang, HR Rao | 8 | 2017 |
Information technology attachment and continuance Y Li | 8 | 2014 |