scispace - formally typeset
Search or ask a question
Author

Han Li

Bio: Han Li is an academic researcher from University of New Mexico. The author has contributed to research in topics: Information privacy & The Internet. The author has an hindex of 17, co-authored 42 publications receiving 2208 citations. Previous affiliations of Han Li include Minnesota State University Moorhead & Virginia State University.

Papers
More filters
Journal ArticleDOI
01 May 2010
TL;DR: Results of this study indicate that risk perception, derived from eight different facets, is a salient antecedent to innovative technology acceptance and provides empirical support for employing personal trait factors in analyzing acceptance of emerging IT artifacts.
Abstract: The factors affecting rejection or acceptance of an emerging IT artifact such as mobile banking have piqued interest among IS researchers and remain unknown due in part to consumers' trust and risk perceptions in the wireless platform. This study extends this line of research by conjointly examining multi-dimensional trust and multi-faceted risk perceptions in the initial adoption stage of the wireless Internet platform. Results of this study indicate that risk perception, derived from eight different facets, is a salient antecedent to innovative technology acceptance. Beyond prior studies, the results also provide empirical support for employing personal trait factors in analyzing acceptance of emerging IT artifacts.

923 citations

Journal ArticleDOI
01 Jun 2011
TL;DR: It is found that, initial emotions formed from an overall impression of a Web site act as initial hurdles to information disclosure and once online consumers enter the information exchange stage, fairness-based levers further adjust privacy beliefs.
Abstract: Based on the privacy calculus framework and the stimulus-organism-response (S-O-R) model, this study examines online information disclosure decision as a result of affective and cognitive reactions of online consumers over several stages, i.e. an initial stage where an overall impression is formed about an unfamiliar online vendor, and a subsequent information exchange stage where information necessary to complete the ecommerce transaction will be provided to the online vendor. We found that, initial emotions formed from an overall impression of a Web site act as initial hurdles to information disclosure. Once online consumers enter the information exchange stage, fairness-based levers further adjust privacy beliefs.

310 citations

Journal ArticleDOI
01 Mar 2010
TL;DR: Rational choice theory is applied to examine how employees' intention to comply with Internet use policy is driven by cost-benefit assessments, personal norms and organizational context factors, and indicates that employees' compliance intention is the result of competing influences of perceived benefits, formal sanctions, and security risks.
Abstract: Current studies on compliance with security policies have largely ignored the impact of the perceived benefits of deviant behavior, personal norms, and organizational context. Drawing on the literature in criminology, this paper applies rational choice theory to examine how employees' intention to comply with Internet use policy is driven by cost-benefit assessments, personal norms and organizational context factors. The results indicate that employees' compliance intention is the result of competing influences of perceived benefits, formal sanctions, and security risks. Furthermore, the effect of sanction severity is found to be moderated by personal norms.

237 citations

Journal ArticleDOI
TL;DR: The results of this study indicate that, in the context of an e-commerce transaction with an unfamiliar vendor, information disclosure is the result of competing influences of exchange benefits and two types of privacy beliefs (privacy protection belief and privacy risk belief).
Abstract: The effect of situational factors is largely ignored by current studies on information privacy. This paper theorized and empirically tested how an individual's decision-making on information disclosure is driven by competing situational benefits and risk factors. The results of this study indicate that, in the context of an e-commerce transaction with an unfamiliar vendor, information disclosure is the result of competing influences of exchange benefits and two types of privacy beliefs (privacy protection belief and privacy risk belief). In addition, the effect of monetary rewards is dependent upon the fairness of information exchange. Monetary rewards could undermine information disclosure when information collected has low relevance to the purpose of the e-commerce transaction.

220 citations

Journal ArticleDOI
TL;DR: Perceived technical protection affects behavioral intentions both indirectly, through PBC, and directly, and suggests possible risk compensation effects in the information security context.
Abstract: Purpose – The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies.Design/methodology/approach – An online survey is conducted to validate the proposed research model. The survey is sent out to an industrial panel. A total of 176 usable responses are received and used in the data analysis.Findings – The results show that both perceived behavioral control (PBC) and attitude have significant impact on intention to comply with security policy. Perceived technical protection affects behavioral intentions both indirectly, through PBC, and directly. The negative direct effect (i.e. perceived high technical protection leads to low intention to comply with security policy) suggests possible risk compensation effects in the information security context.Practical implications – This result should be of interest to pra...

125 citations


Cited by
More filters
Journal ArticleDOI

3,628 citations

Journal ArticleDOI
TL;DR: A critical analysis of the literature reveals that information privacy is a multilevel concept, but rarely studied as such, and calls for research on information privacy to use a broader diversity of sampling populations and to publish more design and action research in journal articles that can result in IT artifacts for protection or control of information privacy.
Abstract: Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.

1,068 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examined the factors influencing behavioral intentions and adoption of mobile banking by Jordanian bank customers using extended unified theory of acceptance and use (UTAUT2) as a basic model.

815 citations

01 Jan 1892
TL;DR: In this paper, the authors explore a hypothesis, based on acIcumulating evidence, regarding the character of inventions likely to issue from the research laboratories of the large industrial corporations.
Abstract: r 9HE purpose of this paper is to explore a hypothesis, based on acIcumulating evidence, regarding the character of inventions likely to issue from the research laboratories of the large industrial corporations. Simply put, this hypothesis may be stated as follows: with few exceptions, the large industrial laboratories are likely to be minor sources of major (radically new and commercially or militarily important) inventions; rather they are likely to be major sources of essentially "improvement" inventions. Put more precisely, the hypothesis states that the proportion of all minor inventions originating in the large industrial laboratories is likely to exceed the proportion of all major inventions originating in these laboratories. Note that the stress on the relative importance of these laboratories as sources of improvement inventions is not necessarily a denigration of the economic importance of this contribution. The cumulative effect of these improvement inventions may be, and often has been, of substantial importance over long periods of time for advancing technology, investment opportunities, and economic growth. The stress on improvement inventions as the principal product of the research laboratories of the large industrial corporations is meant simply to emphasize that, whatever the importance of their contributions, most of the latter is not likely to involve radically new inventive activity. I cannot claim originality for this hypothesis. After it suggested itself in the course of my investigations, I discovered that others, some of them in the most unlikely positions,2 had earlier said much the same thing. But, apart from occasional remarks, I can find no discussions attempting to explain or justify it. And because, if reasonably accurate, it has numerous ramifications, I have felt the need to set down an extended analysis of 1 I wish to thank members of the Seminar on Law and Technology, sponsored by the University of Wisconsin Law School under the auspices of the Ford Foundation, for their many helpful comments on this paper. Especially do I wish to thank Professors Jacob Schmookler, Robert Merrill, John Stedman, Harrison White, and John Heath. 2 See particularly the statement quoted below (p. 114) of D)r. Frank Jewett, former president of Bell Laboratories.

689 citations