selected scholarly activity
-
chapters
- Understanding Post-acceptance Usage Behaviors–An Ambidexterity View. Smart Innovation, Systems and Technologies. 505-513. 2012
- Constraint Preserving XML Updating. Lecture Notes in Computer Science. 47-58. 2003
- Index Selection for Efficient XML Path Expression Processing. Lecture Notes in Computer Science. 261-272. 2003
-
conferences
- Happy Index. Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences. 157-162. 2017
- A CONCEPTUAL FRAMEWORK FOR MOBILE GROUP SUPPORT SYSTEMS. International Conference on Mobile Business, ICMB 2012. 2012
- A Semantic Approach for Knowledge Sharing in Collaborative Commerce Environment. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing. 1-5. 2008
- Examining User Acceptance of Mobile Services. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing. 1-4. 2008
- An architecture and issues for Online Dispute Resolution with fairness and justice. 2008 Chinese Control and Decision Conference. 3966-3970. 2008
- A Decision Analysis Framework for Emergency Notification. Proceedings of the Annual Hawaii International Conference on System Sciences. 26-26. 2008
- Knowledge Representation and Query Process Based-on Semantic Web Technologies. 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 943-948. 2008
- A Uniform Integrated Reasoning Approach Based on User, Context and Service Models for Context-Aware Service. International Conference on the Management of Mobile Business (ICMB 2007). 55-55. 2007
- An Integrated Service Selection Engine for Context-aware Computing. International Conference on the Management of Mobile Business (ICMB 2007). 57-57. 2007
- What is the Influence of Context and Incentive on Mobile Commerce Adoption? A Case study of a GPS-based Taxi Dispatching System. International Conference on the Management of Mobile Business (ICMB 2007). 4-11. 2007
- Investigating the value of location information in taxi dispatching services: A case study of DaZhong Taxi. 9th Pacific Asia Conference on Information Systems: I.T. and Value Creation, PACIS 2005. 1333-1344. 2005
- G2ST. Proceedings of the 11th ACM international symposium on Advances in geographic information systems. 161-168. 2003
- Dynamic tuning of XML storage schema in VXMLR. Seventh International Database Engineering and Applications Symposium, 2003. Proceedings.. 76-86. 2003
-
journal articles
- Neural variability fingerprint predicts individuals’ information security violation intentions. Fundam Res. 2:303-310. 2022
- Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. Journal of Computer Information Systems. 60:61-75. 2020
- It ain’t my business: a coping perspective on employee effortful security behavior. Journal of Enterprise Information Management. 32:824-842. 2019
- Internet aggression in online communities: a contemporary deterrence perspective. Information Systems Journal. 26:641-667. 2016
- Why computer talents become computer hackers. Communications of the ACM. 56:64-74. 2013
- Online game addiction among adolescents: motivation and prevention factors. European Journal of Information Systems. 21:321-340. 2012
- Does deterrence work in reducing information security policy abuse by employees?. Communications of the ACM. 54:54-60. 2011
- A decision analysis framework for emergency notification: the case of the Sichuan earthquake. International Journal of Emergency Management. 6:227-227. 2009
- Principle-based dispute resolution for consumer protection. Knowledge-Based Systems. 22:18-27. 2009
- The impact of context and incentives on mobile service adoption. INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS. 7:363-363. 2009
- Xiaolingtong versus 3G in China: Which will be the winner?. Telecommunications Policy. 30:297-313. 2006