Jun Zhang
Cited by
Cited by
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
PB Lowry, J Zhang, T Wu
Computers in Human Behavior 68, 104-120, 2017
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention
D Wu, GD Moody, J Zhang, PB Lowry
Information & Management 57 (5), 103235, 2020
An integrative theory addressing cyberharassment in the light of technology-based opportunism
PB Lowry, J Zhang, GD Moody, S Chatterjee, C Wang, T Wu
Journal of Management Information Systems 36 (4), 1142-1178, 2019
Understanding and predicting cyberstalking in social media: Integrating theoretical perspectives on shame, neutralization, self-control, rational choice, and social learning
PB Lowry, J Zhang, C Wang, T Wu, M Siponen
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
Designing quantified-self 2.0 running platform to ensure physical activity maintenance: the role of achievement goals and achievement motivational affordance
J Zhang, PB Lowry
20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi …, 2016
Understanding the disclosure of private healthcare information within online quantified self 2.0 platforms
J Zhang, V Dibia, A Sodnomov, PB Lowry
19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore …, 2015
Explaining the outcomes of social gamification: A longitudinal field experiment
J Zhang, Q Jiang, W Zhang, L Kang, PB Lowry, X Zhang
Journal of Management Information Systems 40 (2), 401-439, 2023
Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging
C Wang, J Zhang, MKO Lee
Information Technology & People 35 (7), 2167-2192, 2022
The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective
J Zhang, PB Lowry
Journal of the Association for Information Systems Theory Development …, 2015
Validating a Control-Based Model of Information Security Policy Compliance-A Meta-Analysis.
J Liu, J Zhang, J Zhang
ICIS, 2019
How external monitoring can mitigate cyberloafing: understanding the mediating and moderating roles of employees’ self-control
H Jiang, J Zhang, X Zheng
Behaviour & Information Technology, 1-15, 2023
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks
D Wu, J Zhang, N Brown, PB Lowry, GD Moody
Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users-Research in Progress
J Zhang, Q Jiang, PB Lowry, Y Li
Promoting exercise behavior with monetary and social incentives: An empirical study based on an online fitness program
Z Zhang, J Zhang, B Zheng, J Zhang
JUSTC 52 (10), 4-1-4-11, 2022
The Role of Psychological Ownership in Privacy Risk Compensation: A Moderated Mediation Model
L Wang, J Zhang, J Zhang, Z Xiabing
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?
J Zhang, D Wu, N Brown, PB Lowry, GD Moody
How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach
J Zhang, Q Jiang, W Zhang, L Kang, X Zhang, PB Lowry
Regulate Privacy in SNS: Privacy Control on the Self-Ego Boundary and Dyadic-Boundary
C Wang, J Zhang
The system can't perform the operation now. Try again later.
Articles 1–19