default search action
BibTeX records: Han Li 0001
@article{DBLP:journals/isr/WangLLL23, author = {Le Wang and Paul Benjamin Lowry and Xin (Robert) Luo and Han Li}, title = {Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games}, journal = {Inf. Syst. Res.}, volume = {34}, number = {1}, pages = {275--296}, year = {2023}, url = {https://doi.org/10.1287/isre.2022.1127}, doi = {10.1287/ISRE.2022.1127}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/WangLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/ChenLL22, author = {Yan Chen and Xin (Robert) Luo and Han Li}, title = {Beyond adaptive security coping behaviors: Theory and empirical evidence}, journal = {Inf. Manag.}, volume = {59}, number = {2}, pages = {103575}, year = {2022}, url = {https://doi.org/10.1016/j.im.2021.103575}, doi = {10.1016/J.IM.2021.103575}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/ChenLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itp/JamesZLZC22, author = {Tabitha L. James and Jie Zhang and Han Li and Jennifer L. Ziegelmayer and Eduardo D. Villacis Calderon}, title = {The moderating effect of technology overload on the ability of online learning to meet students' basic psychological needs}, journal = {Inf. Technol. People}, volume = {35}, number = {4}, pages = {1364--1382}, year = {2022}, url = {https://doi.org/10.1108/ITP-03-2021-0225}, doi = {10.1108/ITP-03-2021-0225}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itp/JamesZLZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LiLC21, author = {Han Li and Xin (Robert) Luo and Yan Chen}, title = {Understanding Information Security Policy Violation from a Situational Action Perspective}, journal = {J. Assoc. Inf. Syst.}, volume = {22}, number = {3}, pages = {5}, year = {2021}, url = {https://aisel.aisnet.org/jais/vol22/iss3/5}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jais/LiLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/LiGZF20, author = {Han Li and Ashish Gupta and Jie Zhang and Nick Flor}, title = {Who will use augmented reality? An integrated approach based on text analytics and field survey}, journal = {Eur. J. Oper. Res.}, volume = {281}, number = {3}, pages = {502--516}, year = {2020}, url = {https://doi.org/10.1016/j.ejor.2018.10.019}, doi = {10.1016/J.EJOR.2018.10.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eor/LiGZF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LuoLHX20, author = {Xin (Robert) Luo and Han Li and Qing Hu and Heng Xu}, title = {Why Individual Employees Commit Malicious Computer Abuse: {A} Routine Activity Theory Perspective}, journal = {J. Assoc. Inf. Syst.}, volume = {21}, number = {6}, pages = {5}, year = {2020}, url = {https://doi.org/10.17705/1jais.00646}, doi = {10.17705/1JAIS.00646}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/LuoLHX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/LiLZS18, author = {Han Li and Xin (Robert) Luo and Jie Zhang and Rathindra Sarathy}, title = {Self-control, organizational context, and rational choice in Internet abuses at work}, journal = {Inf. Manag.}, volume = {55}, number = {3}, pages = {358--367}, year = {2018}, url = {https://doi.org/10.1016/j.im.2017.09.002}, doi = {10.1016/J.IM.2017.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/LiLZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ism/LuoZBLC18, author = {Xin (Robert) Luo and Wei Zhang and Ranjit Bose and Han Li and Q. B. Chung}, title = {Producing competitive advantage from an infrastructure technology: The case of cloud computing}, journal = {Inf. Syst. Manag.}, volume = {35}, number = {2}, pages = {147--160}, year = {2018}, url = {https://doi.org/10.1080/10580530.2018.1440732}, doi = {10.1080/10580530.2018.1440732}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ism/LuoZBLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocec/LuoZLBC18, author = {Xin (Robert) Luo and Wei Zhang and Han Li and Ranjit Bose and Q. B. Chung}, title = {Cloud computing capability: its technological root and business impact}, journal = {J. Organ. Comput. Electron. Commer.}, volume = {28}, number = {3}, pages = {193--213}, year = {2018}, url = {https://doi.org/10.1080/10919392.2018.1480926}, doi = {10.1080/10919392.2018.1480926}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocec/LuoZLBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsj/ZhangLLW17, author = {Jie Zhang and Han Li and Xin (Robert) Luo and Merrill Warkentin}, title = {Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: {A} Conflict Management Perspective}, journal = {Decis. Sci.}, volume = {48}, number = {5}, pages = {956--989}, year = {2017}, url = {https://doi.org/10.1111/deci.12243}, doi = {10.1111/DECI.12243}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsj/ZhangLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/LiLZX17, author = {Han Li and Xin (Robert) Luo and Jie Zhang and Heng Xu}, title = {Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors}, journal = {Inf. Manag.}, volume = {54}, number = {8}, pages = {1012--1022}, year = {2017}, url = {https://doi.org/10.1016/j.im.2017.02.005}, doi = {10.1016/J.IM.2017.02.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/LiLZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ZhangLYJ17, author = {Jie Zhang and Han Li and Ruiliang Yan and Chuck Johnston}, title = {Examining the Signaling Effect of E-tailers' Return Policies}, journal = {J. Comput. Inf. Syst.}, volume = {57}, number = {3}, pages = {191--200}, year = {2017}, url = {https://doi.org/10.1080/08874417.2016.1183989}, doi = {10.1080/08874417.2016.1183989}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ZhangLYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/MuralidharSL16, author = {Krishnamurty Muralidhar and Rathindra Sarathy and Han Li}, title = {Secure attribute sharing of linked microdata}, journal = {Decis. Support Syst.}, volume = {81}, pages = {20--29}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2015.10.005}, doi = {10.1016/J.DSS.2015.10.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/MuralidharSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/Li0ZS14, author = {Han Li and Ashish Gupta and Jie Zhang and Rathindra Sarathy}, title = {Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract}, journal = {Decis. Support Syst.}, volume = {57}, pages = {376--386}, year = {2014}, url = {https://doi.org/10.1016/j.dss.2012.10.043}, doi = {10.1016/J.DSS.2012.10.043}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/Li0ZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/LiS0L14, author = {Han Li and Rathindra Sarathy and Jie Zhang and Xin (Robert) Luo}, title = {Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance}, journal = {Inf. Syst. J.}, volume = {24}, number = {6}, pages = {479--502}, year = {2014}, url = {https://doi.org/10.1111/isj.12037}, doi = {10.1111/ISJ.12037}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/LiS0L14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdm/LiMSL14, author = {Han Li and Krishnamurty Muralidhar and Rathindra Sarathy and Xin (Robert) Luo}, title = {Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation}, journal = {J. Database Manag.}, volume = {25}, number = {2}, pages = {52--74}, year = {2014}, url = {https://doi.org/10.4018/jdm.2014040103}, doi = {10.4018/JDM.2014040103}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdm/LiMSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/0004LS13, author = {Ashish Gupta and Han Li and Ramesh Sharda}, title = {Should {I} send this message? Understanding the impact of interruptions, social hierarchy and perceived task complexity on user performance and perceived workload}, journal = {Decis. Support Syst.}, volume = {55}, number = {1}, pages = {135--145}, year = {2013}, url = {https://doi.org/10.1016/j.dss.2012.12.035}, doi = {10.1016/J.DSS.2012.12.035}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/0004LS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LuoWL13, author = {Xin (Robert) Luo and Merrill Warkentin and Han Li}, title = {Understanding Technology Adoption Trade-Offs: {A} Conjoint Analysis Approach}, journal = {J. Comput. Inf. Syst.}, volume = {53}, number = {3}, pages = {65--74}, year = {2013}, url = {https://doi.org/10.1080/08874417.2013.11645633}, doi = {10.1080/08874417.2013.11645633}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LuoWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiSX11, author = {Han Li and Rathindra Sarathy and Heng Xu}, title = {The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors}, journal = {Decis. Support Syst.}, volume = {51}, number = {3}, pages = {434--445}, year = {2011}, url = {https://doi.org/10.1016/j.dss.2011.01.017}, doi = {10.1016/J.DSS.2011.01.017}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiSX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/LiGLW11, author = {Han Li and Ashish Gupta and Xin (Robert) Luo and Merrill Warkentin}, title = {Exploring the impact of instant messaging on subjective task complexity and user satisfaction}, journal = {Eur. J. Inf. Syst.}, volume = {20}, number = {2}, pages = {139--155}, year = {2011}, url = {https://doi.org/10.1057/ejis.2010.59}, doi = {10.1057/EJIS.2010.59}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/LiGLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/XuDL11, author = {Heng Xu and Tamara Dinev and Han Li}, title = {Trust in social computing. The case of peer-to-peer file sharing networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {1}, number = {1}, pages = {e5}, year = {2011}, url = {https://doi.org/10.4108/trans.sesa.2011.e5}, doi = {10.4108/TRANS.SESA.2011.E5}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/XuDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiZS10, author = {Han Li and Jie Zhang and Rathindra Sarathy}, title = {Understanding compliance with internet use policy from the perspective of rational choice theory}, journal = {Decis. Support Syst.}, volume = {48}, number = {4}, pages = {635--645}, year = {2010}, url = {https://doi.org/10.1016/j.dss.2009.12.005}, doi = {10.1016/J.DSS.2009.12.005}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LuoLZS10, author = {Xin (Robert) Luo and Han Li and Jie Zhang and Jung P. Shim}, title = {Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services}, journal = {Decis. Support Syst.}, volume = {49}, number = {2}, pages = {222--234}, year = {2010}, url = {https://doi.org/10.1016/j.dss.2010.02.008}, doi = {10.1016/J.DSS.2010.02.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/LuoLZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/LiSX10, author = {Han Li and Rathindra Sarathy and Heng Xu}, title = {Understanding Situational Online Information Disclosure as a Privacy Calculus}, journal = {J. Comput. Inf. Syst.}, volume = {51}, number = {1}, pages = {62--71}, year = {2010}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2010.11645450}, doi = {10.1080/08874417.2010.11645450}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/LiSX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/LiSZ10, author = {Han Li and Rathindra Sarathy and Jie Zhang}, editor = {Rajiv Sabherwal and Mary Sumner}, title = {Understanding Compliance with Internet Use Policy: An Integrative Model Based on Command-and- Control and Self-Regulatory Approaches}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2010, Saint Louis, Missouri, USA, December 12-15, 2010}, pages = {181}, publisher = {Association for Information Systems}, year = {2010}, url = {http://aisel.aisnet.org/icis2010\_submissions/181}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/LiSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ZhangRL09, author = {Jie Zhang and Brian J. Reithel and Han Li}, title = {Impact of perceived technical protection on security behaviors}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {4}, pages = {330--340}, year = {2009}, url = {https://doi.org/10.1108/09685220910993980}, doi = {10.1108/09685220910993980}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ZhangRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ZhangLZ09, author = {Jie Zhang and Han Li and Jennifer L. Ziegelmayer}, title = {Resource or Capability? {A} Dissection of SMEs' it Infrastructure Flexibility and its Relationship with it Responsiveness}, journal = {J. Comput. Inf. Syst.}, volume = {50}, number = {1}, pages = {46--53}, year = {2009}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2009.11645361}, doi = {10.1080/08874417.2009.11645361}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ZhangLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LiG09, author = {Han Li and Ashish Gupta}, editor = {Robert C. Nickerson and Ramesh Sharda}, title = {Understanding the Impact of Self-Similarity on Network Utilization in Multimedia Networks}, booktitle = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, pages = {150}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/amcis2009/150}, timestamp = {Mon, 04 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/LiG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LiZS09, author = {Han Li and Jie Zhang and Rathindra Sarathy}, editor = {Robert C. Nickerson and Ramesh Sharda}, title = {Understanding the Compliance with the INternet Use Policy from a Criminology Perspective}, booktitle = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, pages = {418}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/amcis2009/418}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/LiZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LiG09, author = {Han Li and Ashish Gupta}, title = {Understanding the Impact of Instant Messaging {(IM)} on Subjective Task Complexity and User Satisfaction}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2009, Hyderabad, India, July 10-12, 2009}, pages = {10}, publisher = {AISeL}, year = {2009}, url = {http://aisel.aisnet.org/pacis2009/10}, timestamp = {Mon, 04 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/LiG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/GuptaL08, author = {Ashish Gupta and Han Li}, editor = {Izak Benbasat and Ali R. Montazemi}, title = {Being Interrupted by Instant Messaging: Does it Matter Who is Interrupting - The Boss or The Coworker?}, booktitle = {Learning from the past {\&} charting the future of the discipline. 14th Americas Conference on Information Systems, {AMCIS} 2008, Toronto, Ontario, Canada, August 14-17, 2008}, pages = {24}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/amcis2008/24}, timestamp = {Mon, 04 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/GuptaL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/ZhangLZ08, author = {Jie Zhang and Han Li and Jennifer L. Ziegelmayer}, editor = {Izak Benbasat and Ali R. Montazemi}, title = {An Empirical Study of the Relationship Between {IT} Infastructure Flexibility and {IT} Responsiveness in SMEs: {A} Resource-Based Analysis}, booktitle = {Learning from the past {\&} charting the future of the discipline. 14th Americas Conference on Information Systems, {AMCIS} 2008, Toronto, Ontario, Canada, August 14-17, 2008}, pages = {241}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/amcis2008/241}, timestamp = {Mon, 04 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/ZhangLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ior/LiMS07, author = {Han Li and Krishnamurty Muralidhar and Rathindra Sarathy}, title = {Technical Note - Assessment of Disclosure Risk When Using Confidentiality via Camouflage}, journal = {Oper. Res.}, volume = {55}, number = {6}, pages = {1178--1182}, year = {2007}, url = {https://doi.org/10.1287/opre.1070.0426}, doi = {10.1287/OPRE.1070.0426}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ior/LiMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SarathyL07, author = {Rathindra Sarathy and Han Li}, title = {Understanding Online Information Disclosure As a Privacy Calculus Adjusted by Exchange Fairness}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2007, Montreal, Quebec, Canada, December 9-12, 2007}, pages = {21}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/icis2007/21}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/SarathyL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LiS06, author = {Han Li and Rathindra Sarathy}, editor = {Guillermo Rodr{\'{\i}}guez{-}Abitia and Ignacio Ania B.}, title = {Exploring the Impact of Emotions on Internet Users' Perceived Privacy}, booktitle = {Connecting the Americas. 12th Americas Conference on Information Systems, {AMCIS} 2006, Acapulco, Mexico, August 4-6, 2006}, pages = {121}, publisher = {Association for Information Systems}, year = {2006}, url = {http://aisel.aisnet.org/amcis2006/121}, timestamp = {Fri, 01 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/LiS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.