章骏 照片

章骏

副研究员

所属大学: 中国科学技术大学

所属学院: 国际金融研究院

邮箱:
jzhang90@ustc.edu.cn

个人主页:
https://faculty.ustc.edu.cn/zhangjun12/en/index/90489/list/index.htm

个人简介

章骏,男,1990年7月生,2016年于香港城市大学获得管理信息系统博士,2017年5月起任中国科学技术大学管理学院管理科学系特任副研究员。主要研究方向包括健身APP的设计,信息隐私与信息安全,人机交互,互联网上的越轨与犯罪行为等。UTD-24商学院顶级期刊之一的Information Systems Research,以及FT-50期刊之一的Journal of Management Information Systems. 教育经历 2008—2012 南京大学商学院 电子商务系 企业管理学士 2012—2016 香港城市大学商学院 资讯系统系 管理信息系统博士 工作经历 2016-2017 香港大学商学院 管理信息系统 博士后 2017—至今 中国科学技术大学管理学院 管理科学系 特任副研究员

研究领域

信息隐私与安全 (information privacy & information security) 人机交互 (Human-computer interaction) 互联网上的越轨与犯罪行为 (Online deviant behaviors) 科技在健康领域的应用(IT-enabled health behavior change/maintenance)

学术兼职

[期刊任职] Journal of the Association for Information Systems, 特邀评审, 2018-2018 [期刊任职] European Journal of Information Systems, 客座编辑, 2019-2019 [期刊任职] Information Systems Journal, 特邀评审, 2017-2018 [期刊任职] Information & Management, 特邀评审, 2016-2018 Guest Associate Editor, European Journal of Information Systems, special issue on “Getting Serious about Gamification: Putting more than mere ‘Fun and Games’ into Systems” Associate Editor, 2018 International Conference on Information Systems. Co-chair of the mini-track "The Dark Usage of Information Technology" at AMCIS 2019.

近期论文

[1] Paul Benjamin Lowry*, Jun Zhang, Chuang Wang, Tailai Wu, and Mikko Siponen (2013). “Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning,” Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15.. [2] Jun Zhang*, Victor Dibia, Alexey Sodnomov, and Paul Benjamin Lowry (2015). “Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms,” 19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9.. [3] Jun Zhang* and Paul Benjamin Lowry (2015). The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective, Proceedings of the JAIS Theory Development Workshop at ICIS 2015, Fort Worth, TX, December 13.. [4] Jun Zhang* and Paul Benjamin Lowry (2016). “Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: The Role of Achievement Goals and Achievement Motivational Affordance,” 20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27 – July 1.. [5] Chuang Wang, Jun Zhang* (2018). Regulate Privacy in SNS: Privacy Control on the Self-Boundary and the Dyadic-Boundary. Proceedings of the 2018 Workshop on Information Security and Privacy, San Francisco, USA, December 13.. [6] Jun Zhang*, Qiqi Jiang, Paul Benjamin Lowry, Yongjun Li (2018). Gamified Double-Edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users, SIGHCI 2018 Proceedings, San Francisco, USA, December 12.. [7] Liu Jing, Jun Zhang*, Jingzhi Zhang (2019) Validating a Control-Based Model of Information Security Policy Compliance – A Meta-Analysis, conditional accepted to be presented at 2019 International Conference on Information Systems (ICIS).. [8] Paul Benjamin Lowry, Jun Zhang, and Tailai Wu. (2017) “Nature or Nurture? A Meta-analysis of the Factors that Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework”. 68(March), Computers in Human Behavior (CHB), 104-120.. [9] Paul Benjamin Lowry, Jun Zhang, Chuang Wang, and Mikko Siponen. (2016) “Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning (SSSL) Model”. Information Systems Research (ISR) 27(4), 962-986.. [10] Paul Benjamin Lowry, Jun Zhang*(corresponding author), Gregory Moody, Sutirtha Chatterjee, Chuang Wang, Tailai Wu (2019). An integrative theory addressing cyberharassment in light of technology-based opportunism. Journal of Management Information Systems (JMIS), Forthcoming.. [11] Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention, Information & Management, 2020, 57(5): 103235-103235. [12] An integrative theory addressing cyberharassment in the light of technology-based opportunism, Journal of Management Information Systems, 2019, 36(4): 1142-1178.