Jun Zhang
Title
Cited by
Cited by
Year
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
1762016
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
PB Lowry, J Zhang, T Wu
Computers in Human Behavior 68, 104-120, 2017
602017
An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism
PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu
Journal of Management Information Systems (JMIS), 2019
122019
Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms
J Zhang, V Dibia, A Sodnomov, PB Lowry
19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015
122015
DESIGNING QUANTIFIED-SELF 2.0 RUNNING PLATFORM TO ENSURE PHYSICAL ACTIVITY MAINTENANCE: THE ROLE OF ACHIEVEMENT GOALS AND ACHIEVEMENT MOTIVATIONAL AFFORDANCE
J Zhang, PB Lowry
112016
Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning
PB Lowry, J Zhang, CL Wang, T Wu, M Siponen
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
82013
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
D Wu, GD Moody, J Zhang, PB Lowry
Information & Management 57 (5), 103235, 2020
52020
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective
J Zhang, PB Lowry
32015
Validating a Control-Based Model of Information Security Policy Compliance–A Meta-Analysis
J Liu, J Zhang, J Zhang
12019
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks
D Wu, J Zhang, N Brown, PB Lowry, GD Moody
2020
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?
J Zhang, D Wu, N Brown, PB Lowry, GD Moody
2020
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary
C Wang, J Zhang
Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy 1, 2018
2018
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach
J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry
2018
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress
J Zhang, Q Jiang, PB Lowry, Y Li
The 17th Annual Pre-ICIS Workshop on HCI Research in MIS, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14