关注
Jinyoung Han
Jinyoung Han
Chung-Ang
在 cau.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Why smartphone advertising attracts customers: A model of Web advertising, flow, and personalization
YJ Kim, JY Han
Computers in human behavior 33, 256-269, 2014
5842014
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
JY Han, YJ Kim, H Kim
Computers & Security 66, 52-65, 2017
1642017
To bridge or to bond? Diverse social connections in an IS project team
JY Han, A Hovav
International Journal of Project Management 31 (3), 378-390, 2013
982013
Gift or threat? An examination of voice of the customer: The case of MyStarbucksIdea. com
H Lee, JY Han, Y Suh
Electronic Commerce Research and Applications 13 (3), 205-219, 2014
632014
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective
HL Kim, J Han
Information Technology & People 32 (4), 858-875, 2019
432019
Leader power and employees’ information security policy compliance
HL Kim, HBS Choi, J Han
Security Journal 32, 391-409, 2019
322019
Market reaction to security breach announcements: Evidence from South Korea
A Hovav, JY Han, J Kim
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017
292017
Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case
S Jeon, I Son, J Han
Information Technology & People 34 (2), 599-616, 2021
202021
Dimensionality of social capital and organizational citizenship behavior in information systems project teams
J Han, A Hovav
Journal of computer information systems 56 (3), 218-227, 2016
202016
Rethinking the prevailing security paradigm: can user empowerment with traceability reduce the rate of security policy circumvention?
S Jeon, A Hovav, J Han, S Alter
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49 (3 …, 2018
182018
Protecting intellectual property from insider threats: A management information security intelligence perspective
HL Kim, A Hovav, J Han
Journal of Intellectual Capital 21 (2), 181-202, 2019
152019
The impact of security breach announcements on the stock value of companies in south Korea
A Hovav, JY Han
The Journal of internet electronic commerce research 13 (3), 43-67, 2013
152013
Effects of interdisciplinary courses on future engineers' competency
H Rhee, J Han, M Lee, YW Choi
Higher Education, Skills and Work-Based Learning 10 (3), 467-479, 2020
112020
Confucian values, social fear, and knowledge sharing in Korean organizations
J Han, A Hovav, M Hemmert
Journal of Computer Information Systems 62 (2), 237-246, 2022
92022
The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective
A Hovav, I Gnizy, J Han
European Journal of Information Systems 32 (2), 154-172, 2023
82023
Investigating of psychological factors affecting information security compliance intention: convergent approach to information security and organizational citizenship behavior
JY Han, YJ Kim
Journal of Digital Convergence 13 (8), 133-144, 2015
82015
Effects of interdisciplinary courses on engineering students’ competencies
YW Choi, J Han, M Lee, H Rhee
TENCON 2018-2018 IEEE Region 10 Conference, 0793-0797, 2018
42018
The effect of individual’s cultural values and social capital on knowledge sharing in web-based communication environment
JY Han, H Lee, A Hovav
The journal of modern Project Management 4 (2), 2016
42016
The effect of paradoxical tensions between confucian culture and organizational culture on fear and knowledge sharing intention
J Han, A Hovav
32019
Understanding employee's emotional reactions to ISSP compliance: focus on frustration from security requirements
S Jeon, I Son, J Han
Behaviour & Information Technology 42 (13), 2093-2110, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20