李文立
个人信息Personal Information
教授
博士生导师
硕士生导师
性别:男
毕业院校:大连理工大学
学位:博士
所在单位:信息管理与信息系统研究所
学科:管理科学与工程
办公地点:管理与经济学部D501
电子邮箱:wlli@dlut.edu.cn
扫描关注
- [41]梁欢, 李文立, 陈昊.基于产品不确定性视角的消费者满意度研究[A],2015,533-539
- [42]Wang, Xiao-long, Li, Wen-li.Using Galois Lattice to Represent and Analyze Information Security Policy Compliance[A],2015,353-358
- [43]Wang X., Li W..The influence of psychic income and monetary reward on information security policy compliance[J],ICIC Express Letters,2015,9(6):1559-1564
- [44]陈立荣, 李文立, 李强.用户生成内容对电子商务平台定价的影响--基于中国家庭金融调查数据[A],2014,241-248
- [45]魏曦初, 李文立.基于备件分类的供应商管理策略研究[J],工业工程与管理,2014,19(6):37-43,132
- [46]Cheng, Lijiao, Li, Wenli, Zhai, Qingguo, Smyth, Russell, LJ (reprint author), Dalian Univ Technol, Fac Management & Econ, Dalian 116023, Liaoning, Peoples R China..Understanding personal use of the Internet at work: An integrated model of neutralization techn...[J],COMPUTERS IN HUMAN BEHAVIOR,2014,38:220-228
- [47]Li Wen-li, Wei Xi-chu.Research on the Classification of Spare Parts for Supplier Management[A],2014,379-386
- [48]Wang X.-L., Li W.-L..Using Galois lattice to represent and analyze information security policy compliance[A],2014,353-358
- [49]Li W., Gao L., Ke Y..Social commerce: The critical role of argument strength and source dynamism of ewom[A],2014
- [50]Chen H., Li W..Understanding organization employee's information security omission behavior: An integrated model...[A],2014
- [51]Li R., Li W., Geng S., An Y..Measurement of privacy leakage tolerance on the mobile internet[A],2014
- [52]Li W., Wu N., Ke Y., Lv X., An Y..The empirical study on human flesh search based on neutralization theory[A],2014
- [53]宋明秋, 陈冬浩, 李文立.安全系统开发同化影响因素研究[J],信息系统学报,2014,01:59-68
- [54]李文立.Information Security Policy Compliance Game: The Role of Penalty[A],2014,45-49
- [55]李文立.Research on Suppliers Segmentation:From the Perspective of Spare Parts Classification[A],2014,2:5-8
- [56]李文立.UNDERSTANDING ORGANIZATION EMPLOYEE`S INFORMATION SECURITY OMISSION BEHAVIOR: AN INTERGRATED MODE...[A],2014,1(1):1-9
- [57]Cheng, Lijiao, Li, Ying, Wenli, Holm, Eric, Zhai, Qingguo, LJ (reprint author), Dalian Univ Technol, Fac Management & Econ, Inst Syst Engn, Dalian, Liaoning, Peoples R China..Understanding the violation of IS security policy in organizations: An integrated model based o...[J],COMPUTERS & SECURITY,2013,39(PART B):447-459
- [58]Li W., Cheng L..Effects of neutralization techniques and rational choice theory on internet abuse in the workplac...[A],2013
- [59]李文立.基于中和技术理论的隐私泄露意向研究[A],2013,259-264
- [60]李文立.Measuring Employees’ Information Security Compliance Behaviors: A Holistic State Perspective[J],International Journal of Information Processing and Management,2013,4(6):76-85