关注
Jun Zhang
标题
引用次数
引用次数
年份
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
4592016
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
PB Lowry, J Zhang, T Wu
Computers in Human Behavior 68, 104-120, 2017
1182017
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
D Wu, GD Moody, J Zhang, PB Lowry
Information & Management 57 (5), 103235, 2020
602020
An integrative theory addressing cyberharassment in the light of technology-based opportunism
PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu
Journal of Management Information Systems 36 (4), 1142-1178, 2019
582019
Understanding and predicting cyberstalking in social media: Integrating theoretical perspectives on shame, neutralization, self-control, rational choice, and social learning
PB Lowry, J Zhang, C Wang, T Wu, M Siponen
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
172013
Designing quantified-self 2.0 running platform to ensure physical activity maintenance: the role of achievement goals and achievement motivational affordance
J Zhang, PB Lowry
20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi …, 2016
152016
Understanding the disclosure of private healthcare information within online quantified self 2.0 platforms
J Zhang, V Dibia, A Sodnomov, PB Lowry
19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015
152015
Explaining the outcomes of social gamification: A longitudinal field experiment
J Zhang, Q Jiang, W Zhang, L Kang, PB Lowry, X Zhang
Journal of Management Information Systems 40 (2), 401-439, 2023
92023
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging
C Wang, J Zhang, MKO Lee
Information Technology & People 35 (7), 2167-2192, 2022
92022
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective
J Zhang, PB Lowry
Journal of the Association for Information Systems Theory Development …, 2015
52015
Validating a Control-Based Model of Information Security Policy Compliance-A Meta-Analysis.
J Liu, J Zhang, J Zhang
ICIS, 2019
22019
How external monitoring can mitigate cyberloafing: understanding the mediating and moderating roles of employees’ self-control
H Jiang, J Zhang, X Zheng
Behaviour & Information Technology, 1-15, 2023
12023
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks
D Wu, J Zhang, N Brown, PB Lowry, GD Moody
12020
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress
J Zhang, Q Jiang, PB Lowry, Y Li
12018
Promoting exercise behavior with monetary and social incentives: An empirical study based on an online fitness program
Z Zhang, J Zhang, B Zheng, J Zhang
JUSTC 52 (10), 4-1-4-11, 2022
2022
The Role of Psychological Ownership in Privacy Risk Compensation: A Moderated Mediation Model
L Wang, J Zhang, J Zhang, Z Xiabing
2022
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?
J Zhang, D Wu, N Brown, PB Lowry, GD Moody
2020
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach
J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry
2018
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary
C Wang, J Zhang
2018
系统目前无法执行此操作,请稍后再试。
文章 1–19