default search action
Carol Hsu 0001
Person information
- affiliation: University of Sydney Business School, Discipline of Business Information Systems, Australia
- affiliation: Tongji University, Department of Management Science and Engineering, Shanghai, China
- affiliation: National Taiwan University, Deparment of Information Management, Taipei City, Taiwan
- affiliation: City University of Hong Kong, Hong Kong
- affiliation: National Chengchi University, Deparment of Management Information Systems, Taipei, Taiwan
- affiliation: Londion School of Economics, UK
Other persons with the same name
- Carol Hsu — disambiguation page
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Wenjing Lei, Siqi Hu, Carol Hsu:
Uncovering the role of optimism bias in social media phishing: an empirical study on TikTok. Behav. Inf. Technol. 43(9): 1827-1841 (2024) - [j38]Jiabao Lin, Xin (Robert) Luo, Lei Li, Carol Hsu:
Unraveling the effect of organisational resources and top management support on e-commerce capabilities: evidence from ADANCO-SEM and fsQCA. Eur. J. Inf. Syst. 33(3): 403-421 (2024) - [j37]Siqi Hu, Wenjing Lei, Hong Zhu, Carol Hsu:
Cyberbullying perpetration on social media: A situational action perspective. Inf. Manag. 61(6): 104013 (2024) - [j36]Siqi Hu, Carol Hsu, Zhongyun Zhou:
Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches. Internet Res. 34(2): 294-319 (2024) - [j35]Joyce Yi-Hui Lee, Chih-Yuan Chou, Hsin-Lu Chang, Carol Hsu:
Building digital resilience against crises: The case of Taiwan's COVID-19 pandemic management. Inf. Syst. J. 34(1): 39-79 (2024) - [j34]Feng Xu, Carol Hsu, Tawei David Wang, Paul Benjamin Lowry:
The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation. Inf. Syst. J. 34(4): 1144-1174 (2024) - 2023
- [j33]Wenjing Lei, Siqi Hu, Carol Hsu:
Unveiling the process of phishing precautions taking: The moderating role of optimism bias. Comput. Secur. 129: 103249 (2023) - [j32]Ya Yin, Carol Hsu, Zhongyun Zhou:
Employees' in-role and extra-role information security behaviors from the P-E fit perspective. Comput. Secur. 133: 103390 (2023) - [j31]Hong Zhu, Carol Hsu, Zhongyun Zhou:
Bystander pro-celebrity cyberbullying: An integrated perspective of susceptibility to retaliation and social capital gains. Inf. Manag. 60(5): 103797 (2023) - [j30]Ya Yin, Carol Hsu:
The role of privacy and emotion in ARBS continuing use intention. Internet Res. 33(1): 219-241 (2023) - [c34]Laura Hefer, Uri Gal, Carol Hsu:
AI Meeting Assistants, Views of Organisational Meetings and Potential Implications to Productivity. ACIS 2023 - [c33]Laura Hefer, Uri Gal, Carol Hsu:
Calling for Research into Digitalization of Voice Conversations in Organizational Meetings: A Literature Review. PACIS 2023: 182 - 2022
- [j29]Liang Li, Carol Hsu, Ji-Ye Mao, Wei Zhang:
Contextualising digital innovation in today's China: Local practices and global contributions. Inf. Syst. J. 32(3): 623-629 (2022) - [j28]Carol Hsu, Jae-Nam Lee, Yulin Fang, Detmar W. Straub, Ning Su, Hyun-Sun Ryu:
The Role of Vendor Legitimacy in IT Outsourcing Performance: Theory and Evidence. Inf. Syst. Res. 33(1): 337-361 (2022) - [j27]Feng Xu, Carol Hsu, Xin (Robert) Luo, Merrill Warkentin:
Reactions to Abusive Supervision: Neutralization and IS Misuse. J. Comput. Inf. Syst. 62(3): 632-641 (2022) - [j26]Siqi Hu, Carol Hsu, Zhongyun Zhou:
Security Education, Training, and Awareness Programs: Literature Review. J. Comput. Inf. Syst. 62(4): 752-764 (2022) - [c32]Bowen Guan, Carol Hsu, Feng Xu:
Examining Employee Social Media Deviance: A Psychological Contract Breach Perspective. HICSS 2022: 1-10 - [c31]Bowen Guan, Carol Hsu:
Investigating Employees' Proactive Extra-Role Information Security Behaviors through Security Mindfulness. ICIS 2022 - [c30]Xuan Li, Carol Hsu:
Unveiling the Effects of Social Media Stress on College Students: A Stressor-Strain-Outcome Perspective. PACIS 2022: 78 - 2021
- [j25]Siqi Hu, Carol Hsu, Zhongyun Zhou:
The impact of SETA event attributes on employees' security-related Intentions: An event system theory perspective. Comput. Secur. 109: 102404 (2021) - [c29]Carol Hsu, Tawei Wang:
Too Busy to Monitor? Board Busyness and the Occurrence of Reported Information Security Incidents. HICSS 2021: 1-10 - [c28]Yilin Hu, Carol Hsu:
Effect of Perceived Cost, Altruistic and Egoistic Benefits on Security Policy Compliance Intention: A Rational Choice Perspective. PACIS 2021: 156 - [c27]Wenjing Lei, Siqi Hu, Carol Hsu:
Understanding Optimism Bias in Phishing: A Health Belief Model Perspective. PACIS 2021: 169 - 2020
- [j24]Feng Xu, Xin (Robert) Luo, Carol Hsu:
Anger or fear? Effects of discrete emotions on employee's computer-related deviant behavior. Inf. Manag. 57(3): 103180 (2020) - [j23]Bowen Guan, Carol Hsu:
The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention. Internet Res. 30(5): 1383-1405 (2020) - [j22]Joyce H. Y. Lee, Carol Hsu, Leiser Silva:
What Lies Beneath: Unraveling the Generative Mechanisms of Smart Technology and Service Design. J. Assoc. Inf. Syst. 21(6): 3 (2020) - [c26]Paolo Spagnoletti, Nilmini Wickramasinghe, Carol Hsu, Doug Vogel, Prasuna Reddy, Margunn Aanestad, Prem Prakash Jayaraman:
Mid-Career Workshop 2020 Opening Panel: Blending Local and Global Roles in IS career. ICIS 2020 - [c25]Haiying Xu, Carol Hsu:
The Impact of the Perceived Legitimacy of Computer Monitoring on Reactive Computer Abuse. PACIS 2020: 139 - [c24]Ya Yin, Carol Hsu:
Role of Privacy and Emotion in ARBS Continuing Use Intention. PACIS 2020: 209 - [e1]Doug Vogel, Kathy Ning Shen, Pan Shan Ling, Carol Hsu, James Y. L. Thong, Marco De Marco, Moez Limayem, Sean Xin Xu:
24th Pacific Asia Conference on Information Systems, PACIS 2020, Dubai, UAE, June 22-24, 2020. 2020 [contents]
2010 – 2019
- 2019
- [j21]Joyce Yi-Hui Lee, Chin-Sheng Yang, Carol Hsu, Jhong-Heng Wang:
A longitudinal study of leader influence in sustaining an online community. Inf. Manag. 56(2): 306-316 (2019) - [j20]Ken Peffers, Carol Hsu, Monica C. Tremblay, Jan vom Brocke, Marcus A. Rothenberger, Mark Srite, Tuure Tuunanen:
Editorial. J. Inf. Technol. Theory Appl. 20(1): 5 (2019) - [c23]Siqi Hu, Carol Hsu:
Employees' workplace cyberloafing: based on the perspective of guanxi. PACIS 2019: 199 - 2018
- [j19]Joyce Yi-Hui Lee, Niki Panteli, Anne Marie Bülow, Carol Hsu:
Email adaptation for conflict handling: A case study of cross-border inter-organisational partnership in East Asia. Inf. Syst. J. 28(2): 318-339 (2018) - [j18]Carol Hsu:
Editorial. J. Inf. Technol. Theory Appl. 19(1): 1 (2018) - [j17]Carol Hsu:
Editorial. J. Inf. Technol. Theory Appl. 19(3): 1 (2018) - [j16]Carol Hsu:
Editorial. J. Inf. Technol. Theory Appl. 19(4): 1 (2018) - [c22]Joyce Yi-Hui Lee, Chin-Sheng Yang, Carol Hsu, Jhong-Heng Wang:
Emerging Leaderships in an Online Community: A Longitudinal Network Analysis. HICSS 2018: 1-10 - [c21]Bowen Guan, Carol Hsu:
The Role of Abusive Supervision and Interactional Justice in Employee Information Security Policy Noncompliance Intention. PACIS 2018: 33 - 2017
- [j15]Carol Hsu:
Complexity and Flexibility in Information Systems Design and Implementation. J. Inf. Technol. Theory Appl. 18(2): 1 (2017) - [j14]Shirley Ou Yang, Carol Hsu, Suprateek Sarker, Allen S. Lee:
Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. J. Manag. Inf. Syst. 34(3): 727-753 (2017) - [c20]Feng Xu, Xin (Robert) Luo, Carol Hsu:
Anger or Fear? Effects of Discrete Emotions on Deviant Security Behavior. HICSS 2017: 1-9 - 2016
- [j13]Leiser Silva, Carol Hsu, James Backhouse, Aidan McDonnell:
Resistance and power in a security certification scheme: The case of c: cure. Decis. Support Syst. 92: 68-78 (2016) - [j12]Carol Hsu:
Editorial: IT-enabled Organization Design. J. Inf. Technol. Theory Appl. 17(2): 3 (2016) - [c19]Carol Hsu, Tawei Wang, Ang Lu:
The Impact of ISO 27001 Certification on Firm Performance. HICSS 2016: 4842-4848 - [c18]Siew Kien Sia, Carol Hsu, Wen Jing Teo:
Implementing ASEAN Stock Trading Links: Tackling the Institutional Challenges. PACIS 2016: 237 - 2015
- [j11]Carol Hsu, Yu-Tzu Lin, Tawei Wang:
A legitimacy challenge of a cross-cultural interorganizational information system. Eur. J. Inf. Syst. 24(3): 278-294 (2015) - 2014
- [j10]Carol Hsu, Jimmy C. Huang, Robert D. Galliers:
Conceptualizing the dynamics of rhetorical practice and technological frame in the context of technology diffusion and adoption. Inf. Manag. 51(8): 984-994 (2014) - [j9]Carol Hsu, James Backhouse, Leiser Silva:
Institutionalizing operational risk management: an empirical study. J. Inf. Technol. 29(1): 59-72 (2014) - [j8]Carol Hsu, Shirley Ou Yang:
Achieving Online Relationship Marketing via Tourism Blogs: A Social Network Perspective. Pac. Asia J. Assoc. Inf. Syst. 5(4): 2 (2014) - [c17]Liang-Cheng Wei, Carol Hsu:
Employee Intention to Whistleblow Information Security Policy Violation. PACIS 2014: 273 - [c16]Yen-Win Lai, Carol Hsu, Yuh-Jzer Joung:
A Case Study on Cloud Computing Strategy of aTelecom Company in Taiwan: an Organizational Legitimacy Perspective. PACIS 2014: 356 - 2013
- [c15]Yen-Ling Lin, Yu Shirley Ou Yang, Carol Hsu:
Building Legitimacy for Green IS Innovations in Taiwan. PACIS 2013: 97 - 2012
- [j7]Carol Hsu, Jae-Nam Lee, Detmar W. Straub:
Institutional Influences on Information Systems Security Innovations. Inf. Syst. Res. 23(3-2): 918-939 (2012) - [c14]Hsin-Lu Chang, Jia-Ren Lin, Kai Wang, Carol Hsu, Jeffrey C. F. Tai:
The Design of the Mobile Service: Fit between Mobility and Customer Variability. HICSS 2012: 1383-1392 - 2011
- [c13]Jimmy C. Huang, Carol Hsu, Robert D. Galliers, Yu-Tzu Lin, Sue Newell:
The Rhetorics of System Adoption and Diffusion in the Taiwan Mutual Fund Industry. HICSS 2011: 1-10 - [c12]Yu-Tzu Lin, Carol Hsu:
Unfolding the Organizing Vision for Straight-Through-Processing in Taiwan Financial Industry. HICSS 2011: 1-10 - [c11]Yu Shirley Ou Yang, Carol Hsu:
The Power Of Networks And Information Flows-In Circuits Of Power Perspective On Online Religion. PACIS 2011: 146 - 2010
- [j6]Wei-Lun Chang, Soe-Tsyr Yuan, Carol W. Hsu:
Creating the experience economy in e-commerce. Commun. ACM 53(7): 122-127 (2010) - [c10]Yu Shirley Ou Yang, Jia-Li Hsu, Carol Hsu:
Making Sense of Corporate Tour-Guide Bloggers' Networking Behavior: A Social Network Perspective. PACIS 2010: 105 - [c9]Yu-Tzu Lin, Carol Hsu:
Financial Inter-Organizational System Diffusion in Taiwan's Fund Management Industry: A Social Shaping of Technology Perspective. PACIS 2010: 141 - [c8]Tawei Wang, Carol Hsu:
The Impact of Board Structure on Information Security Breaches. PACIS 2010: 165
2000 – 2009
- 2009
- [j5]Carol W. Hsu:
Frame misalignment: interpreting the implementation of information systems security certification in an organization. Eur. J. Inf. Syst. 18(2): 140-150 (2009) - 2008
- [c7]Carol Hsu, Jae-Nam Lee:
Strategic Response to the Institutional Process on the Adoption and Assimilation of. ECIS 2008: 1394-1405 - 2007
- [c6]Carol Hsu:
Making Sense of Institutionalizing Information Systems Security Management in Organizations. ICIS 2007: 102 - 2006
- [j4]James Backhouse, Carol W. Hsu, Leiser Silva:
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard. MIS Q. 30(Special Issue): 143-438 (2006) - 2005
- [j3]James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista:
A question of trust. Commun. ACM 48(9): 87-91 (2005) - 2004
- [c5]James Backhouse, John Baptista, Carol Hsu:
Rating Certificate Authorities: a market approach to the Lemons problem. AMCIS 2004: 173 - [c4]Carol Hsu, Robert M. Davison, Sally Stares:
Cultural Influences on Attitudes Towards Hong Kong's Smart Identity Card. PACIS 2004: 20 - 2003
- [j2]James Backhouse, Carol Hsu, Aidan McDonnell:
Toward public-key infrastructure interoperability. Commun. ACM 46(6): 98-100 (2003) - [c3]James Backhouse, Carol Hsu, John Baptista, Jimmy C. Tseng:
The key to trust? signalling quality in the PKI market. ECIS 2003: 118-121 - [c2]Robert M. Davison, Ernest Jordan, Carol Hsu, Chrisanthi Avgerou:
Professional Socieies in Information Systems: A Force for Globalisation or Good? Information Systems Perspectives and Challenges in the Context of Globalization 2003: 455-459 - [c1]Wei (Joy) He, Jae-Nam Lee, Carol Hsu:
The Evolution of Knowledge Management: Current and Future Application in China. PACIS 2003: 88 - 2002
- [j1]Carol Hsu, James Backhouse:
Information Systems Security Education: Redressing the Balance of Theory and Practice. J. Inf. Syst. Educ. 13(3): 211-218 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint