Jaeung Lee

Orcid: 0000-0002-9869-050X

Affiliations:
  • State University of New York at Buffalo, Department of Management Science and Systems, NY, USA
  • Louisiana Tech University, College of Business, Ruston, LA, USA (former)


According to our database1, Jaeung Lee authored at least 23 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Use of Body Worn Camera (BWC) In Gray Scenarios: a Law Enforcement Officers' Perspective.
Eur. J. Inf. Syst., July, 2024

Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice.
Comput. Secur., 2024

2023
Distress Coping Responses Among Teleworkers.
IEEE Trans. Prof. Commun., September, 2023

2022
Telework Distress and Eustress Among Chinese Teleworkers.
J. Glob. Inf. Manag., 2022

Eustress and Distress in the Context of Telework.
Inf. Resour. Manag. J., 2022

Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach.
Comput. Secur., 2022

2021
Announcement of formal controls as phase-shifting perceptions: their determinants and moderating role in the context of mobile loafing.
Internet Res., 2021

The Egyptian protest movement in the twittersphere: An investigation of dual sentiment pathways of communication.
Int. J. Inf. Manag., 2021

Coping behaviors in short message service (SMS)-based disaster alert systems: From the lens of protection motivation theory as elaboration likelihood.
Inf. Manag., 2021

2020
Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors.
J. Cases Inf. Technol., 2020

Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective.
Inf. Syst. Frontiers, 2020

Post Data Breach Use of Protective Technologies: An Examination of Users' Dilemma.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
How much is your private information? Does Privacy Calculus Matter?
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Use of online information and suitability of target in shoplifting: A routine activity based analysis.
Decis. Support Syst., 2018

Assessing Fraud Risks in IT Security.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Internal Audit Function (IAF)'s Competencies and Cybersecurity Audit.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Security Violation Prevention; CPTED in the context of information Security.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2016
Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.
Decis. Support Syst., 2016

Management of Digital Evidence: Police Judgment about Ethical Use of Body Worn Camera.
Proceedings of the International Conference on Information Systems, 2016

Management of Digital Evidence: Body Worn Camera Use by Law Enforcement Agents.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013.
Inf. Syst. Frontiers, 2015

Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing Tragedy.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

An Examination of Emotions in the Boston Bombing Twitterverse.
Proceedings of the 21st Americas Conference on Information Systems, 2015


  Loading...