Why smartphone advertising attracts customers: A model of Web advertising, flow, and personalization YJ Kim, JY Han Computers in human behavior 33, 256-269, 2014 | 584 | 2014 |
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective JY Han, YJ Kim, H Kim Computers & Security 66, 52-65, 2017 | 164 | 2017 |
To bridge or to bond? Diverse social connections in an IS project team JY Han, A Hovav International Journal of Project Management 31 (3), 378-390, 2013 | 98 | 2013 |
Gift or threat? An examination of voice of the customer: The case of MyStarbucksIdea. com H Lee, JY Han, Y Suh Electronic Commerce Research and Applications 13 (3), 205-219, 2014 | 63 | 2014 |
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective HL Kim, J Han Information Technology & People 32 (4), 858-875, 2019 | 43 | 2019 |
Leader power and employees’ information security policy compliance HL Kim, HBS Choi, J Han Security Journal 32, 391-409, 2019 | 32 | 2019 |
Market reaction to security breach announcements: Evidence from South Korea A Hovav, JY Han, J Kim ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017 | 29 | 2017 |
Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case S Jeon, I Son, J Han Information Technology & People 34 (2), 599-616, 2021 | 20 | 2021 |
Dimensionality of social capital and organizational citizenship behavior in information systems project teams J Han, A Hovav Journal of computer information systems 56 (3), 218-227, 2016 | 20 | 2016 |
Rethinking the prevailing security paradigm: can user empowerment with traceability reduce the rate of security policy circumvention? S Jeon, A Hovav, J Han, S Alter ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49 (3 …, 2018 | 18 | 2018 |
Protecting intellectual property from insider threats: A management information security intelligence perspective HL Kim, A Hovav, J Han Journal of Intellectual Capital 21 (2), 181-202, 2019 | 15 | 2019 |
The impact of security breach announcements on the stock value of companies in south Korea A Hovav, JY Han The Journal of internet electronic commerce research 13 (3), 43-67, 2013 | 15 | 2013 |
Effects of interdisciplinary courses on future engineers' competency H Rhee, J Han, M Lee, YW Choi Higher Education, Skills and Work-Based Learning 10 (3), 467-479, 2020 | 11 | 2020 |
Confucian values, social fear, and knowledge sharing in Korean organizations J Han, A Hovav, M Hemmert Journal of Computer Information Systems 62 (2), 237-246, 2022 | 9 | 2022 |
The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective A Hovav, I Gnizy, J Han European Journal of Information Systems 32 (2), 154-172, 2023 | 8 | 2023 |
Investigating of psychological factors affecting information security compliance intention: convergent approach to information security and organizational citizenship behavior JY Han, YJ Kim Journal of Digital Convergence 13 (8), 133-144, 2015 | 8 | 2015 |
Effects of interdisciplinary courses on engineering students’ competencies YW Choi, J Han, M Lee, H Rhee TENCON 2018-2018 IEEE Region 10 Conference, 0793-0797, 2018 | 4 | 2018 |
The effect of individual’s cultural values and social capital on knowledge sharing in web-based communication environment JY Han, H Lee, A Hovav The journal of modern Project Management 4 (2), 2016 | 4 | 2016 |
The effect of paradoxical tensions between confucian culture and organizational culture on fear and knowledge sharing intention J Han, A Hovav | 3 | 2019 |
Understanding employee's emotional reactions to ISSP compliance: focus on frustration from security requirements S Jeon, I Son, J Han Behaviour & Information Technology 42 (13), 2093-2110, 2023 | 1 | 2023 |