Follow
Yuan Li
Yuan Li
Verified email at utk.edu
Title
Cited by
Cited by
Year
Theories in online information privacy research: A critical review and an integrated framework
Y Li
Decision support systems 54 (1), 471-481, 2012
4922012
Empirical studies on online information privacy concerns: Literature review and an integrative framework
Y Li
Communications of the Association for Information Systems 28 (1), 28, 2011
3752011
The impact of disposition to privacy, website reputation and website familiarity on information privacy concerns
Y Li
Decision support systems 57, 343-354, 2014
2682014
Overconfidence in phishing email detection
J Wang, Y Li, HR Rao
Journal of the Association for Information Systems 17 (11), 1, 2016
1402016
Coping responses in phishing detection: an investigation of antecedents and consequences
J Wang, Y Li, HR Rao
Information Systems Research 28 (2), 378-396, 2017
1372017
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge
WJ Kettinger, Y Li
European Journal of Information Systems 19 (4), 409-421, 2010
1212010
A multi-level model of individual information privacy beliefs
Y Li
Electronic Commerce Research and Applications 13 (1), 32-44, 2014
1062014
A mediation model of green supply chain management adoption: The role of internal impetus
A Agarwal, FC Giraud-Carrier, Y Li
International Journal of Production Economics 205, 342-358, 2018
1022018
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective
WJ Kettinger, Y Li, JM Davis, L Kettinger
European Journal of Information Systems 24 (1), 59-75, 2015
912015
A study on user acceptance of cloud computing: A multi-theoretical perspective
Y Li, K Chang
512012
An evolutionary information-processing theory of knowledge creation
Y Li, WJ Kettinger
Journal of the Association for Information Systems 7 (1), 25, 2006
502006
Responding to identity theft: A victimization perspective
Y Li, A Yazdanmehr, J Wang, HR Rao
Decision Support Systems 121, 13-24, 2019
382019
Identity construction in social media: a study on blogging continuance
Y Li
Behaviour & Information Technology 41 (8), 1671–1688, 2022
192022
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
J Yazdanmehr, A., Li, Y. and Wang
European Journal of Information Systems, 2022
15*2022
Self-determination and perceived information control in cloud storage service
Y Li, KC Chang, J Wang
Journal of Computer Information Systems 60 (2), 113-123, 2020
152020
Employee responses to information security related stress: Coping and violation intention
J Yazdanmehr, A., Li, Y. and Wang
Information Systems Journal 33 (3), 598-639, 2023
122023
The effect of technological and task considerations on auditors’ acceptance of blockchain technology
A Li, Y. and Jumah
Journal of Information Systems 36 (3), 129-151, 2022
122022
Developing a dichotomy of information privacy concerns
Y Li
112011
Adoption of identity protection service: An integrated protection motivation–precaution adoption process model
Y Li, J Wang, HR Rao
82017
Information technology attachment and continuance
Y Li
82014
The system can't perform the operation now. Try again later.
Articles 1–20