Jai-Yeol Son

Orcid: 0000-0002-1216-2854

According to our database1, Jai-Yeol Son authored at least 17 papers between 1999 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Fear appeal cues to motivate users' security protection behaviors: an empirical test of heuristic cues to enhance risk communication.
Internet Res., 2022

2021
Accurately or accidentally? Recommendation agent and search experience in over-the-top (OTT) services.
Internet Res., 2021

The Roles of Digital Exhibition in Enhancing Immersive Experience and Purchase Intention.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Three Qualities of OTT Services: A Mixed Methods Approach.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2016
Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns.
Int. J. Inf. Manag., 2016

2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.
Inf. Manag., 2015

2011
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies.
Inf. Manag., 2011

2010
Can Market Knowledge from Intermediaries Increase Sellers' Performance in On-Line Marketplaces?
Int. J. Electron. Commer., 2010

2009
Out of Dedication or Constraint? A Dual Model of Post-Adoption Phenomena and its Empirical Test in the Context of Online Services.
MIS Q., 2009

2008
Understanding the Development of IOS-Based Trading Partner Relationships: A Structural Model with Empirical Validation.
J. Organ. Comput. Electron. Commer., 2008

2007
Organizational Buyers' Adoption and Use of B2B Electronic Marketplaces: Efficiency- and Legitimacy-Oriented Perspectives.
J. Manag. Inf. Syst., 2007

Out of Fear or Desire: Why do Employees Follow Information Systems Security Policies?
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model.
MIS Q., 2006

Consumer Adoption of Net-Enabled Infomediaries: Theoretical Explanations and an Empirical Test.
J. Assoc. Inf. Syst., 2006

A Descriptive Content Analysis of Trust-Building Measures in B2B Electronic Marketplaces.
Commun. Assoc. Inf. Syst., 2006

2005
Effects of Relational Factors and Channel Climate on EDI Usage in the Customer-Supplier Relationship.
J. Manag. Inf. Syst., 2005

1999
Factors affecting the extent of electronic cooperation between firms: economic and sociological perspectives.
Proceedings of the Twentieth International Conference on Information Systems, 1999


  Loading...