Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Hao Chen
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2024) 37 (3): 1025–1051.
Published: 17 March 2023
Journal Articles
How short-form video features influence addiction behavior? Empirical research from the opponent process theory perspective
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2023) 36 (1): 387–408.
Published: 24 February 2022
Journal Articles
E-waste information security protection motivation: the role of optimism bias
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (2): 600–620.
Published: 18 February 2021
Journal Articles
The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (4): 973–992.
Published: 30 October 2018
