Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model PB Lowry, J Zhang, C Wang, M Siponen Information Systems Research 27 (4), 962-986, 2016 | 343 | 2016 |
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework PB Lowry, J Zhang, T Wu Computers in Human Behavior 68, 104-120, 2017 | 97 | 2017 |
An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu Journal of Management Information Systems (JMIS), 2019 | 40 | 2019 |
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention D Wu, GD Moody, J Zhang, PB Lowry Information & Management 57 (5), 103235, 2020 | 35 | 2020 |
DESIGNING QUANTIFIED-SELF 2.0 RUNNING PLATFORM TO ENSURE PHYSICAL ACTIVITY MAINTENANCE: THE ROLE OF ACHIEVEMENT GOALS AND ACHIEVEMENT MOTIVATIONAL AFFORDANCE J Zhang, PB Lowry | 15 | 2016 |
Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning PB Lowry, J Zhang, CL Wang, T Wu, M Siponen Proceedings of the Journal of the Association for Information Systems Theory …, 2013 | 15 | 2013 |
Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms J Zhang, V Dibia, A Sodnomov, PB Lowry 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015 | 14 | 2015 |
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective J Zhang, PB Lowry | 5 | 2015 |
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging C Wang, J Zhang, MKO Lee Information Technology & People, 2021 | 2 | 2021 |
Validating a Control-Based Model of Information Security Policy Compliance–A Meta-Analysis J Liu, J Zhang, J Zhang | 2 | 2019 |
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress J Zhang, Q Jiang, PB Lowry, Y Li The 17th Annual Pre-ICIS Workshop on HCI Research in MIS, 2018 | 1 | 2018 |
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks D Wu, J Zhang, N Brown, PB Lowry, GD Moody | | 2020 |
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior? J Zhang, D Wu, N Brown, PB Lowry, GD Moody | | 2020 |
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary C Wang, J Zhang Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy 1, 2018 | | 2018 |
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry | | 2018 |