Login / Signup
Yuan Li
ORCID
Publication Activity (10 Years)
Years Active: 2006-2023
Publications (10 Years): 17
Top Topics
Social Networking Sites
Information Security
Identity Theft
Email
Top Venues
AMCIS
Eur. J. Inf. Syst.
Decis. Support Syst.
MIS Q.
</>
Publications
</>
Adel Yazdanmehr
,
Yuan Li
,
Jingguo Wang
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies.
Eur. J. Inf. Syst.
32 (6) (2023)
Ahmad H. Juma'h
,
Yuan Li
The effects of auditors' knowledge, professional skepticism, and perceived adequacy of accounting standards on their intention to use blockchain.
Int. J. Account. Inf. Syst.
51 (2023)
Jingguo Wang
,
Meichen Dong
,
Zhiyong Yang
,
Yuan Li
Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites.
MIS Q.
47 (4) (2023)
Adel Yazdanmehr
,
Yuan Li
,
Jingguo Wang
Employee responses to information security related stress: Coping and violation intention.
Inf. Syst. J.
33 (3) (2023)
Yuan Li
,
Ahmad H. Juma'h
The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology.
J. Inf. Syst.
36 (3) (2022)
Yuan Li
,
William J. Kettinger
Testing the Relationship Between Information and Knowledge in Computer-Aided Decision-Making.
Inf. Syst. Frontiers
24 (6) (2022)
Yuan Li
Identity construction in social media: a study on blogging continuance.
Behav. Inf. Technol.
41 (8) (2022)
Yuan Li
,
Jingguo Wang
,
H. Raghav Rao
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution.
SKM
(2021)
Yuan Li
,
Kuo-Chung Chang
,
Jingguo Wang
Self-Determination and Perceived Information Control in Cloud Storage Service.
J. Comput. Inf. Syst.
60 (2) (2020)
Yuan Li
,
Adel Yazdanmehr
,
Jingguo Wang
,
H. Raghav Rao
Responding to identity theft: A victimization perspective.
Decis. Support Syst.
121 (2019)
Yuan Li
,
Adel Yazdanmehr
,
Jingguo Wang
,
H. Raghav Rao
How Do You Cope: Individuals' Responses to Identity Theft Victimization.
AMCIS
(2018)
Jingguo Wang
,
Adel Yazdanmehr
,
Yuan Li
,
H. Raghav Rao
Opting for Identity Theft Protection Services: The Role of Anticipated Distress.
ICIS
(2017)
Jingguo Wang
,
Yuan Li
,
H. Raghav Rao
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res.
28 (2) (2017)
Yuan Li
,
Jingguo Wang
,
H. Raghav Rao
Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
AMCIS
(2017)
Jingguo Wang
,
Yuan Li
,
H. Raghav Rao
Overconfidence in Phishing Email Detection.
J. Assoc. Inf. Syst.
17 (11) (2016)
Yuan Li
,
Jingguo Wang
,
H. Raghav Rao
An Examination of the Calibration and Resolution Skills in Phishing Email Detection.
AMCIS
(2016)
William J. Kettinger
,
Yuan Li
,
Joshua M. Davis
,
Lynda Kettinger
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective.
Eur. J. Inf. Syst.
24 (1) (2015)
Yuan Li
Theories in online information privacy research: A critical review and an integrated framework.
Decis. Support Syst.
54 (1) (2012)
Yuan Li
,
Kuo-Chung Chang
A Study on User Acceptance of Cloud Computing: A Multi-Theoretical Perspective.
AMCIS
(2012)
Yuan Li
,
Kuo-Chung Chang
Exploring the Dimensions and Effects of Computer Software Similarities in Computer Skills Transfer.
J. Organ. End User Comput.
23 (3) (2011)
William J. Kettinger
,
Yuan Li
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge.
Eur. J. Inf. Syst.
19 (4) (2010)
Yuan Li
,
Kuo-Chung Chang
Studying the Carry-over Effect in End User Computer Training: Proposition of a Research Agenda.
PACIS
(2008)
Yuan Li
,
William J. Kettinger
An Evolutionary Information-Processing Theory of Knowledge Creation.
J. Assoc. Inf. Syst.
7 (9) (2006)