Jun Zhang

Jun Zhang
University of Science and Technology of China | USTC · Department of Management Science, School of Management

PhD in information systems

About

12
Publications
19,512
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
321
Citations
Education
September 2012 - August 2016
City University of Hong Kong
Field of study
  • Information Systems
September 2008 - June 2012
Nanjing University
Field of study
  • E-business

Publications

Publications (12)
Article
Full-text available
The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a ma...
Article
Full-text available
Digital piracy has permeated virtually every country and costs the global economy many billions of dollars annually. Digital piracy is the unauthorized and illegal digital copying or distribution of digital goods, such as music, movies, and software. To date, researchers have used disparate theories and models to understand individuals’ motivations...
Conference Paper
Full-text available
With the rapid development of wearable technologies, people can nowadays easily track and record their health-related information—particularly their athletic performance. The quantified-self 2.0 (QS 2.0) movement encourages running website or mobile application users to share their athletic information with other online community members to ensure...
Conference Paper
Full-text available
The quantified self-movement encourages a continuous tracking of data points regarding a person’s daily activities through wearable sensors, and thus has important implications for health and wellness. With the advent of sophisticated low-cost wearable computing devices, online communities that facilitate social interaction and exchange of wearable...
Conference Paper
Full-text available
The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organizational work settings to their homes, where they work virtually to access key organizational assets through their cyberinfrastructure. This large-scale virtual workforce imposes drastic cybersecurity issues, threats, and challenges to organizations. To on...
Conference Paper
Full-text available
Smartphone users often find mobile security notifications (MSNs) to be annoying and intrusive. MSNs are security warnings displayed on mobile interfaces designed to protect mobile phone users from security attacks. Traditionally, users are forced to choose between “Yes” (“Accept”) or “No” (“Ignore” or “Deny”) decisions in response to MSNs. However,...
Article
Full-text available
The explosive global adoption of mobile applications (i.e., apps) has been fraught with security and privacy issues. App users typically have a poor understanding of information security; worse, they routinely ignore security notifications designed to increase security on apps. By considering both mobile app interface usability and mobile security...
Article
Full-text available
Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated social learning theory (SLT) and self-control theory (SCT); (2) empirically studied this model with two contrasting samples, e...
Article
The explosive global adoption of mobile applications (i.e., apps) has been fraught with security and privacy issues. App users typically have a poor understanding of information security; worse, they routinely ignore security notifications designed to increase security on apps. By considering both mobile app interface usability and mobile security...
Conference Paper
The flourishment of mobile applications leads to the fierce competition. To avoid users to prompt abandonment, mobile application producers constantly add features into the m-app to increase the usage. Gamification has been widely regarded as an effective approach to improve the system usage. However, previous studies emphasized on particular or ce...
Conference Paper
Full-text available
With the rapid development of wearable technologies, nowadays people can easily track and record their health-related information, such as athletic performance and vital signs. The quantified-self 2.0 movement encourages wearable device users to share their health information with other online community members to ensure the sustainable use of wear...
Conference Paper
Full-text available
Cyberstalking has received increasing attention in academia and the public for its pervasive effect on society. However, there has been little comprehensive research concerning the mechanisms of cyberstalking behavior, particularly in social media. In this article, we define cyberstalking and explain how it is dramatically different from real-world...

Network

Cited By