default search action
Yuan Li 0002
Person information
- affiliation: University of Illinois at Springfield, Department of Management Information Systems, IL, USA
- affiliation (former): Columbia College, SC, USA
Other persons with the same name
- Yuan Li — disambiguation page
- Yuan Li 0001 — University of Chicago, Department of Computer Science, IL, USA (and 1 more)
- Yuan Li 0003 — Princeton University, Library, NJ, USA (and 3 more)
- Yuan Li 0004 — Northeastern University, Institute of Systems Science, Shenyang, China (and 1 more)
- Yuan Li 0005 — Monash University, Department of Civil Engineering, Clayton, VIC, Australia
- Yuan Li 0006 — University of Wisconsin-Madison, Department of Statistics, WI, USA
- Yuan Li 0007 — National University of Defense Technology, Institute of Software, College of Computer, Changsha, China
- Yuan Li 0008 — North China University of Technology, School of Information Science and Technology, Beijing, China (and 2 more)
- Yuan Li 0009 — Peking University, School of Mathematical Sciences, Beijing, China
- Yuan Li 0010 — Xiamen University, School of Architecture and Civil Engineering, China
- Yuan Li 0011 — National Innovation Institute of Defense Technology, Beijing, China (and 1 more)
- Yuan Li 0012 — University of Melbourne, School of Computing and Information Systems, Parkville, Victoria, Australia
- Yuan Li 0013 — Facebook Inc. Seattle, WA, USA (and 1 more)
- Yuan Li 0014 — Peking University, School of Electronics Engineering and Computer Science, National Engineering Laboratory for Video Technology, Beijing, China
- Yuan Li 0015 — Beijing Institute of Technology, School of Automation, State Key Laboratory of Intelligent Control and Decision of Complex Systems, China (and 1 more)
- Yuan Li 0016 — Institute for Infocomm Research, Singapore
- Yuan Li 0017 — Huawei Technol. Co. Ltd., Beijing, China (and 2 more)
- Yuan Li 0018 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Yuan Li 0019 — Jiangsu Normal University, School of Mathematics and Statistics, Xuzhou, China
- Yuan Li 0020 — Sichuan University, College of Electrical Engineering, High Voltage Laboratory, Chengdu, China (and 1 more)
- Yuan Li 0021 — Sun Yat-Sen University, School of Geospatial Engineering and Science, Zhuhai, China (and 1 more)
- Yuan Li 0022 — Google, Inc., Los Angeles, CA, USA (and 2 more)
- Yuan Li 0023 — Harbin Institute of Technology, China
- Yuan Li 0024 — Kunming University of Science and Technology, Faculty of Information Engineering and Automation, China
- Yuan Li 0025 — North University of China, School of Information and Communication Engineering, Taiyuan, China
- Yuan Li 0026 — Inner Mongolia University of Technology, College of Energy and Power Engineering, Hohhot, China (and 1 more)
- Yuan Li 0027 — State Grid Chongqing Electric Power Company Electric Power Research Institute, Chongqing, China
- Yuan Li 0028 — Aalborg University, AAU Energy, Denmark (and 1 more)
- Yuan Li 0029 — George Washington University, Department of Electrical and Computer Engineering, Washington, DC, USA
- Yuan Li 0030 — Shantou Polytechnic, China
- Yuan Li 0031 — Amazon
- Yuan Li 0032 — Duke University, Durham, NC, USA
- Yuan Li 0033 — Virginia Tech, Department of Computer Science, Center for Human-Computer Interaction, Blacksburg, VA, USA
- Yuan Li 0034 — Huawei Technologies Company Ltd., Hangzhou, China (and 1 more)
- Yuan Li 0035 — University of Alabama, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Adel Yazdanmehr, Yuan Li, Jingguo Wang:
Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. Eur. J. Inf. Syst. 32(6): 1033-1051 (2023) - [j15]Ahmad H. Juma'h, Yuan Li:
The effects of auditors' knowledge, professional skepticism, and perceived adequacy of accounting standards on their intention to use blockchain. Int. J. Account. Inf. Syst. 51: 100650 (2023) - [j14]Adel Yazdanmehr, Yuan Li, Jingguo Wang:
Employee responses to information security related stress: Coping and violation intention. Inf. Syst. J. 33(3): 598-639 (2023) - [j13]Jingguo Wang, Meichen Dong, Zhiyong Yang, Yuan Li:
Passing the Torch: How Parental Privacy Concerns Affect Adolescent Self-Disclosure on Social Networking Sites. MIS Q. 47(4): 1585-1614 (2023) - 2022
- [j12]Yuan Li:
Identity construction in social media: a study on blogging continuance. Behav. Inf. Technol. 41(8): 1671-1688 (2022) - [j11]Yuan Li, William J. Kettinger:
Testing the Relationship Between Information and Knowledge in Computer-Aided Decision-Making. Inf. Syst. Frontiers 24(6): 1827-1843 (2022) - [j10]Yuan Li, Ahmad H. Juma'h:
The Effect of Technological and Task Considerations on Auditors' Acceptance of Blockchain Technology. J. Inf. Syst. 36(3): 129-151 (2022) - 2021
- [c8]Yuan Li, Jingguo Wang, H. Raghav Rao:
Metacognitive Skills in Phishing Email Detection: A Study of Calibration and Resolution. SKM 2021: 37-47 - 2020
- [j9]Yuan Li, Kuo-Chung Chang, Jingguo Wang:
Self-Determination and Perceived Information Control in Cloud Storage Service. J. Comput. Inf. Syst. 60(2): 113-123 (2020) - [c7]Ahmad H. Juma'h, Yuan Li:
Auditors' Adoption of Blockchain Technology: A Study on Antecedents. AMCIS 2020
2010 – 2019
- 2019
- [j8]Yuan Li, Adel Yazdanmehr, Jingguo Wang, H. Raghav Rao:
Responding to identity theft: A victimization perspective. Decis. Support Syst. 121: 13-24 (2019) - 2018
- [c6]Yuan Li, Adel Yazdanmehr, Jingguo Wang, H. Raghav Rao:
How Do You Cope: Individuals' Responses to Identity Theft Victimization. AMCIS 2018 - 2017
- [j7]Jingguo Wang, Yuan Li, H. Raghav Rao:
Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences. Inf. Syst. Res. 28(2): 378-396 (2017) - [c5]Yuan Li, Jingguo Wang, H. Raghav Rao:
Adoption of Identity Protection Service: An Integrated Protection Motivation - Precaution Adoption Process Model. AMCIS 2017 - [c4]Jingguo Wang, Adel Yazdanmehr, Yuan Li, H. Raghav Rao:
Opting for Identity Theft Protection Services: The Role of Anticipated Distress. ICIS 2017 - 2016
- [j6]Jingguo Wang, Yuan Li, H. Raghav Rao:
Overconfidence in Phishing Email Detection. J. Assoc. Inf. Syst. 17(11): 1 (2016) - [c3]Yuan Li, Jingguo Wang, H. Raghav Rao:
An Examination of the Calibration and Resolution Skills in Phishing Email Detection. AMCIS 2016 - 2015
- [j5]William J. Kettinger, Yuan Li, Joshua M. Davis, Lynda Kettinger:
The roles of psychological climate, information management capabilities, and IT support on knowledge-sharing: an MOA perspective. Eur. J. Inf. Syst. 24(1): 59-75 (2015) - 2012
- [j4]Yuan Li:
Theories in online information privacy research: A critical review and an integrated framework. Decis. Support Syst. 54(1): 471-481 (2012) - [c2]Yuan Li, Kuo-Chung Chang:
A Study on User Acceptance of Cloud Computing: A Multi-Theoretical Perspective. AMCIS 2012 - 2011
- [j3]Yuan Li, Kuo-Chung Chang:
Exploring the Dimensions and Effects of Computer Software Similarities in Computer Skills Transfer. J. Organ. End User Comput. 23(3): 48-66 (2011) - 2010
- [j2]William J. Kettinger, Yuan Li:
The infological equation extended: towards conceptual clarity in the relationship between data, information and knowledge. Eur. J. Inf. Syst. 19(4): 409-421 (2010)
2000 – 2009
- 2008
- [c1]Yuan Li, Kuo-Chung Chang:
Studying the Carry-over Effect in End User Computer Training: Proposition of a Research Agenda. PACIS 2008: 249 - 2006
- [j1]Yuan Li, William J. Kettinger:
An Evolutionary Information-Processing Theory of Knowledge Creation. J. Assoc. Inf. Syst. 7(9): 25 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint