关注
Ying Li
标题
引用次数
引用次数
年份
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
L Cheng, Y Li, W Li, E Holm, Q Zhai
Computers & Security 39, 447-459, 2013
3912013
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce
AU Zafar, J Qiu, Y Li, J Wang, M Shahzad
Computers in human behavior 115, 106178, 2021
3412021
A call for research on home users’ information security behaviour
Y Li, M Siponen
732011
Influence of platform characteristics on purchase intention in social commerce: mechanism of psychological contracts
S Hussain, Y Li, W Li
Journal of theoretical and applied electronic commerce research 16 (1), 1-17, 2021
682021
Understanding consumers’ purchase intention for online paid knowledge: A customer value perspective
L Su, Y Li, W Li
Sustainability 11 (19), 5420, 2019
522019
Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue
H Chen, Y Li, L Chen, J Yin
Journal of Enterprise Information Management 34 (3), 770-792, 2021
422021
Examining the side effects of organizational Internet monitoring on employees
H Jiang, A Tsohou, M Siponen, Y Li
Internet Research 30 (6), 1613-1630, 2020
412020
Keeping secure to the end: a long-term perspective to understand employees’ consequence-delayed information security violation
Y Li, N Zhang, M Siponen
Behaviour & Information Technology 38 (5), 435-453, 2019
232019
From hindrance to challenge: How employees understand and respond to information security policies
Y Li, T Pan, N Zhang
Journal of enterprise information management 33 (1), 191-213, 2020
222020
Psychological contract-based consumer repurchase behavior on social commerce platform: An empirical study
H Shahbaz, Y Li, W Li
KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2061-2083, 2020
212020
What drives trust in online paid knowledge? The role of customer value
L Su, R Zhang, Y Li, W Li
92018
Understanding the roles of challenge security demands, psychological resources in information security policy noncompliance
Y Li, N Zhang, T Pan
62018
Psychological Contracts, Antecedents and Consequences: A New Roadmap to Enhance Purchase Intentions in Social Commerce
S Hussain, Y Li, W Li, M Ali
42017
Examining the boundary effect of information systems security behavior under different usage purposes
Y Li, T Pan, N Zhang
IEEE Access 7, 156544-156554, 2019
32019
用户在线知识付费影响因素研究: 基于信任和认同视角
苏鹭燕, 李瀛, 李文立
管理科学 32 (4), 90-104, 2019
22019
服务质量, 私人关系对顾客忠诚的影响研究
殷广杨, 金淳, 李瀛
技术经济 39 (2), 15-20, 2020
12020
Dual-process Accounts of Reasoning in User's Information System Risky Behavior
Y Li, N Zhang
China Summer Workshop on Information Management, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–17