Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory L Cheng, Y Li, W Li, E Holm, Q Zhai Computers & Security 39, 447-459, 2013 | 391 | 2013 |
The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce AU Zafar, J Qiu, Y Li, J Wang, M Shahzad Computers in human behavior 115, 106178, 2021 | 341 | 2021 |
A call for research on home users’ information security behaviour Y Li, M Siponen | 73 | 2011 |
Influence of platform characteristics on purchase intention in social commerce: mechanism of psychological contracts S Hussain, Y Li, W Li Journal of theoretical and applied electronic commerce research 16 (1), 1-17, 2021 | 68 | 2021 |
Understanding consumers’ purchase intention for online paid knowledge: A customer value perspective L Su, Y Li, W Li Sustainability 11 (19), 5420, 2019 | 52 | 2019 |
Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue H Chen, Y Li, L Chen, J Yin Journal of Enterprise Information Management 34 (3), 770-792, 2021 | 42 | 2021 |
Examining the side effects of organizational Internet monitoring on employees H Jiang, A Tsohou, M Siponen, Y Li Internet Research 30 (6), 1613-1630, 2020 | 41 | 2020 |
Keeping secure to the end: a long-term perspective to understand employees’ consequence-delayed information security violation Y Li, N Zhang, M Siponen Behaviour & Information Technology 38 (5), 435-453, 2019 | 23 | 2019 |
From hindrance to challenge: How employees understand and respond to information security policies Y Li, T Pan, N Zhang Journal of enterprise information management 33 (1), 191-213, 2020 | 22 | 2020 |
Psychological contract-based consumer repurchase behavior on social commerce platform: An empirical study H Shahbaz, Y Li, W Li KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2061-2083, 2020 | 21 | 2020 |
What drives trust in online paid knowledge? The role of customer value L Su, R Zhang, Y Li, W Li | 9 | 2018 |
Understanding the roles of challenge security demands, psychological resources in information security policy noncompliance Y Li, N Zhang, T Pan | 6 | 2018 |
Psychological Contracts, Antecedents and Consequences: A New Roadmap to Enhance Purchase Intentions in Social Commerce S Hussain, Y Li, W Li, M Ali | 4 | 2017 |
Examining the boundary effect of information systems security behavior under different usage purposes Y Li, T Pan, N Zhang IEEE Access 7, 156544-156554, 2019 | 3 | 2019 |
用户在线知识付费影响因素研究: 基于信任和认同视角 苏鹭燕, 李瀛, 李文立 管理科学 32 (4), 90-104, 2019 | 2 | 2019 |
服务质量, 私人关系对顾客忠诚的影响研究 殷广杨, 金淳, 李瀛 技术经济 39 (2), 15-20, 2020 | 1 | 2020 |
Dual-process Accounts of Reasoning in User's Information System Risky Behavior Y Li, N Zhang China Summer Workshop on Information Management, 2016 | | 2016 |