关注
Jun Zhang
标题
引用次数
引用次数
年份
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
3432016
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
PB Lowry, J Zhang, T Wu
Computers in Human Behavior 68, 104-120, 2017
972017
An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism
PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu
Journal of Management Information Systems (JMIS), 2019
402019
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
D Wu, GD Moody, J Zhang, PB Lowry
Information & Management 57 (5), 103235, 2020
352020
DESIGNING QUANTIFIED-SELF 2.0 RUNNING PLATFORM TO ENSURE PHYSICAL ACTIVITY MAINTENANCE: THE ROLE OF ACHIEVEMENT GOALS AND ACHIEVEMENT MOTIVATIONAL AFFORDANCE
J Zhang, PB Lowry
152016
Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning
PB Lowry, J Zhang, CL Wang, T Wu, M Siponen
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
152013
Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms
J Zhang, V Dibia, A Sodnomov, PB Lowry
19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015
142015
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective
J Zhang, PB Lowry
52015
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging
C Wang, J Zhang, MKO Lee
Information Technology & People, 2021
22021
Validating a Control-Based Model of Information Security Policy Compliance–A Meta-Analysis
J Liu, J Zhang, J Zhang
22019
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress
J Zhang, Q Jiang, PB Lowry, Y Li
The 17th Annual Pre-ICIS Workshop on HCI Research in MIS, 2018
12018
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks
D Wu, J Zhang, N Brown, PB Lowry, GD Moody
2020
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?
J Zhang, D Wu, N Brown, PB Lowry, GD Moody
2020
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary
C Wang, J Zhang
Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy 1, 2018
2018
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach
J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry
2018
系统目前无法执行此操作,请稍后再试。
文章 1–15