Yuan Li

Orcid: 0000-0002-2117-7425

Affiliations:
  • University of Illinois at Springfield, Department of Management Information Systems, IL, USA
  • Columbia College, SC, USA (former)


According to our database1, Yuan Li authored at least 24 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The effects of auditors' knowledge, professional skepticism, and perceived adequacy of accounting standards on their intention to use blockchain.
Int. J. Account. Inf. Syst., December, 2023

Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies.
Eur. J. Inf. Syst., November, 2023

Employee responses to information security related stress: Coping and violation intention.
Inf. Syst. J., May, 2023

Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites.
MIS Q., 2023

2022
The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology.
J. Inf. Syst., September, 2022

Testing the Relationship Between Information and Knowledge in Computer-Aided Decision-Making.
Inf. Syst. Frontiers, 2022

Identity construction in social media: a study on blogging continuance.
Behav. Inf. Technol., 2022

2021
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

2020
Self-Determination and Perceived Information Control in Cloud Storage Service.
J. Comput. Inf. Syst., 2020

Auditors' Adoption of Blockchain Technology: A Study on Antecedents.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Responding to identity theft: A victimization perspective.
Decis. Support Syst., 2019

2018
How Do You Cope: Individuals' Responses to Identity Theft Victimization.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences.
Inf. Syst. Res., 2017

Opting for Identity Theft Protection Services: The Role of Anticipated Distress.
Proceedings of the International Conference on Information Systems, 2017

Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Overconfidence in Phishing Email Detection.
J. Assoc. Inf. Syst., 2016

An Examination of the Calibration and Resolution Skills in Phishing Email Detection.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective.
Eur. J. Inf. Syst., 2015

2012
Theories in online information privacy research: A critical review and an integrated framework.
Decis. Support Syst., 2012

A Study on User Acceptance of Cloud Computing: A Multi-Theoretical Perspective.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Exploring the Dimensions and Effects of Computer Software Similarities in Computer Skills Transfer.
J. Organ. End User Comput., 2011

2010
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge.
Eur. J. Inf. Syst., 2010

2008
Studying the Carry-over Effect in End User Computer Training: Proposition of a Research Agenda.
Proceedings of the Pacific Asia Conference on Information Systems, 2008

2006
An Evolutionary Information-Processing Theory of Knowledge Creation.
J. Assoc. Inf. Syst., 2006


  Loading...