0000000000182274

AUTHOR

Fufan Liu

showing 4 related works from this author

Investigating switching intention of e-commerce live streaming users.

2022

As a new way of shopping, e-commerce live streaming (ELS) has gained unprecedented growth and popularity in the past years, especially in China. Because of the considerable rivalry in the ELS market, users frequently switch between ELS platforms. However, the switching intention of ELS users is yet to be explored for gaining new knowledge and practical insights. This study aims to improve the understanding of ELS users' switching intentions by developing an extended Push-Pull-Mooring (PPM) model. Using structural equation modeling, the study model was examined based on 443 valid responses from an online survey questionnaire. SmartPLS 3.3.2 was used to validate the causal model, and most of …

Multidisciplinaryverkkokauppakäyttäjätpush-pull-mooring modelswitching intentionkuluttajakäyttäytyminenmobiilikaupparakenneyhtälömallitstructural equation modelinge-commerce live streamingsuoratoistopalvelutHeliyon
researchProduct

Shall we follow? Impact of reputation concern on information security managers’ investment decisions

2020

Information security (infosec) is important for organizations. While budgeting for infosec is a crucial resource allocation decision, infosec managers may choose to follow other fellow experts’ recommendations or baseline practices. The present paper uses reputational herding theory to explain the decision made by infosec managers to use a “let's follow others” strategy in this context. Based on a sample of 106 organizations in Finland, we find that infosec managers’ ability to accurately predict the benefit of infosec investment, as well as their reputations, have significant effects on motivating them to discount their own information. Infosec managers’ discounting of their own informatio…

General Computer Sciencemedia_common.quotation_subjectpäätöksentekoorganisaatiotContext (language use)02 engineering and technologydecision makingdiscount own informationtietohallintojohtajat0202 electrical engineering electronic engineering information engineeringHerdingtietoturvauncertaintyBaseline (configuration management)media_commonDiscountingActuarial sciencetietoturvapolitiikka020206 networking & telecommunicationsInformation securityInvestment (macroeconomics)maineenhallintareputational herdingInfosec investmentInvestment decisions020201 artificial intelligence & image processingBusinessLawReputationComputers & Security
researchProduct

Investigating the impact of virtual tourism on travel intention during the post-COVID-19 era: evidence from China

2022

This study explores the mechanism that contributes to travel intention in the field of virtual tourism. The overall research method is based on the "Stimulus-Organism-Response" theory. In the research model, the effects of content quality, system quality, and interaction quality in virtual tourism on tourism experience and travel intention are explored, as well as the role of virtual attachment and travel intention. A total of 390 respondents were invited to participate in a virtual tourism experience, and provide feedback through a questionnaire. SmartPLS 3.3.2 was used to validate the causal model, and most of the study hypotheses were supported. The findings show that virtual tourism sig…

PLS-SEMChinaComputer Networks and Communicationsmatkailualavirtual tourismvirtuaalitodellisuusHuman-Computer Interactionstimulus-organism-response modelmatkailumatkailun edistäminenKiinapost-COVID-19travel intentionvirtuaalimatkailukäyttäjäkokemusSoftwareInformation Systems
researchProduct

Protection Motivation Theory in Information Systems Security Research

2021

Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…

Future studiesKnowledge managementthreat messageliterature reviewkäyttäjätComputer Networks and CommunicationsuhatInformation systems securityasenteet02 engineering and technologyProtection Motivation TheoryManagement Information Systemssuojelumotivaaatioteoria020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringIs securityInformation systemRoad maptietoturvasuojelutietojärjestelmätbehavioral IS securitybusiness.industry05 social sciencesInformation securityIS security threatFear appealProtection motivation theoryfear appeal050211 marketingbusinessACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct