Han Li

Orcid: 0000-0003-2842-1715

Affiliations:
  • University of New Mexico, Anderson School of Management, Albuquerque, NM, USA (since 2016)
  • Minnesota State University Moorhead, School of Business, MN, USA (2009-2016)
  • Virginia State University, School of Business, Petersburg, VA, USA (2007-2008)
  • Oklahoma State University, Spears School of Business, Stillwater, OK, USA (PhD 2007)


According to our database1, Han Li authored at least 35 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games.
Inf. Syst. Res., March, 2023

2022
The moderating effect of technology overload on the ability of online learning to meet students' basic psychological needs.
Inf. Technol. People, 2022

Beyond adaptive security coping behaviors: Theory and empirical evidence.
Inf. Manag., 2022

2021
Understanding Information Security Policy Violation from a Situational Action Perspective.
J. Assoc. Inf. Syst., 2021

2020
Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective.
J. Assoc. Inf. Syst., 2020

Who will use augmented reality? An integrated approach based on text analytics and field survey.
Eur. J. Oper. Res., 2020

2018
Cloud computing capability: its technological root and business impact.
J. Organ. Comput. Electron. Commer., 2018

Producing competitive advantage from an infrastructure technology: The case of cloud computing.
Inf. Syst. Manag., 2018

Self-control, organizational context, and rational choice in Internet abuses at work.
Inf. Manag., 2018

2017
Examining the Signaling Effect of E-tailers' Return Policies.
J. Comput. Inf. Syst., 2017

Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors.
Inf. Manag., 2017

Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
Decis. Sci., 2017

2016
Secure attribute sharing of linked microdata.
Decis. Support Syst., 2016

2014
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation.
J. Database Manag., 2014

Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance.
Inf. Syst. J., 2014

Examining the decision to use standalone personal health record systems as a trust-enabled fair social contract.
Decis. Support Syst., 2014

2013
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach.
J. Comput. Inf. Syst., 2013

Should I send this message? Understanding the impact of interruptions, social hierarchy and perceived task complexity on user performance and perceived workload.
Decis. Support Syst., 2013

2011
Trust in social computing. The case of peer-to-peer file sharing networks.
EAI Endorsed Trans. Security Safety, 2011

Exploring the impact of instant messaging on subjective task complexity and user satisfaction.
Eur. J. Inf. Syst., 2011

The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors.
Decis. Support Syst., 2011

2010
Understanding Situational Online Information Disclosure as a Privacy Calculus.
J. Comput. Inf. Syst., 2010

Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services.
Decis. Support Syst., 2010

Understanding compliance with internet use policy from the perspective of rational choice theory.
Decis. Support Syst., 2010

Understanding Compliance with Internet Use Policy: An Integrative Model Based on Command-and- Control and Self-Regulatory Approaches.
Proceedings of the International Conference on Information Systems, 2010

2009
Resource or Capability? A Dissection of SMEs' it Infrastructure Flexibility and its Relationship with it Responsiveness.
J. Comput. Inf. Syst., 2009

Impact of perceived technical protection on security behaviors.
Inf. Manag. Comput. Secur., 2009

Understanding the Impact of Instant Messaging (IM) on Subjective Task Complexity and User Satisfaction.
Proceedings of the Pacific Asia Conference on Information Systems, 2009

Understanding the Compliance with the INternet Use Policy from a Criminology Perspective.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Understanding the Impact of Self-Similarity on Network Utilization in Multimedia Networks.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
An Empirical Study of the Relationship Between IT Infastructure Flexibility and IT Responsiveness in SMEs: A Resource-Based Analysis.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Being Interrupted by Instant Messaging: Does it Matter Who is Interrupting - The Boss or The Coworker?
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Technical Note - Assessment of Disclosure Risk When Using Confidentiality via Camouflage.
Oper. Res., 2007

Understanding Online Information Disclosure As a Privacy Calculus Adjusted by Exchange Fairness.
Proceedings of the International Conference on Information Systems, 2007

2006
Exploring the Impact of Emotions on Internet Users' Perceived Privacy.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006


  Loading...