Paul Benjamin Lowry

The University of Hong Kong - School of Business

Meng Wah Complex

Pokfulam Road

Hong Kong

China

SCHOLARLY PAPERS

172

DOWNLOADS
Rank 841

SSRN RANKINGS

Top 841

in Total Papers Downloads

26,034

CITATIONS
Rank 5,718

SSRN RANKINGS

Top 5,718

in Total Papers Citations

89

Scholarly Papers (172)

1.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis, The University of Hong Kong - School of Business and Brigham Young University - Department of Information Systems
Downloads 1,584 (9,531)

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

2.

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management

Communications of the Association for Information Systems (CAIS), Vol. 17, No. 6, pp. 1-48, 2006
Number of pages: 49 Posted: 03 Feb 2006 Last Revised: 25 Aug 2009
The University of Hong Kong - School of Business, California State University, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and My eBiz
Downloads 1,582 (9,489)

Abstract:

Loading...

online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education

3.

Taking ‘Fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Journal of the Association for Information Systems, vol. 14(11), 617-671
Number of pages: 56 Posted: 18 Nov 2012 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, James Gaskin, Nathan Twyman, Bryan Hammer and Tom Roberts
The University of Hong Kong - School of Business, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Arkansas - Department of Information Systems and University of Kansas - School of Business
Downloads 1,352 (12,394)

Abstract:

Loading...

Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation

4.

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Number of pages: 71 Posted: 18 May 2015 Last Revised: 27 Nov 2017
Bentley University, University of Pittsburgh and Director, Katz Doctoral Program, The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business and Florida International University (FIU)
Downloads 808 (26,860)

Abstract:

Loading...

Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior

5.

Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

Journal of the Association for Information Systems (JAIS), Vol. 5, No. 2, pp. 29-80, 2004
Number of pages: 51 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Denton Romans and Aaron Mosiah Curtis
The University of Hong Kong - School of Business, PricewaterhouseCoopers LLP and Brigham Young University Hawaii
Downloads 786 (27,756)
Citation 11

Abstract:

Loading...

Information Systems, Journal Rankings, Journal Quality, Research Journals, Practitioner Journals, Reference Disciplines, Supporting Disciplines, Tenure, Academic Promotion, Management Information Systems, Computer Information Systems

6.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 742 (29,951)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

7.

The Impact of Individualism-Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence

Journal of Management Information Systems (JMIS), Vol. 23, No. 4, pp. 53-80, 2007
Number of pages: 42 Posted: 31 May 2007 Last Revised: 25 Aug 2009
Dongsong Zhang, Paul Benjamin Lowry, Lina Zhou and Xiaolan Fu
University of Maryland, Baltimore County, The University of Hong Kong - School of Business, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 662 (34,972)
Citation 7

Abstract:

Loading...

Majority influence, culture, social presence, computer-mediated communication (CMC), group diversity, virtual teams

8.

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?

MIS Quarterly Vol. 37(4), 993–1012
Number of pages: 63 Posted: 09 Dec 2012 Last Revised: 08 Jan 2018
The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School, University of Pittsburgh and Director, Katz Doctoral Program, Brigham Young University - Department of Information Systems, California State University, Fullerton - Mihaylo College of Business & Economics and University of Arizona - Department of Management Information Systems
Downloads 605 (39,677)

Abstract:

Loading...

Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle

9.

Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Journal of the Association for Information Systems, vol. 16(7), pp. 515-579
Number of pages: 81 Posted: 08 Dec 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry, James Gaskin and Gregory D Moody
The University of Hong Kong - School of Business, Brigham Young University - Marriott School and University of Nevada, Las Vegas - College of Business
Downloads 557 (44,126)

Abstract:

Loading...

Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit

10.

A Taxonomy of Collaborative Writing to Improve Empirical Research, Writing Practice, and Tool Development

Journal of Business Communication (JBC), Vol. 41, No. 1, pp. 66-99, 2004
Number of pages: 59 Posted: 14 Feb 2005 Last Revised: 31 Aug 2009
Paul Benjamin Lowry, Aaron Mosiah Curtis and Michelle Rene Lowry
The University of Hong Kong - School of Business, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 521 (47,660)
Citation 2

Abstract:

Loading...

collaborative writing, taxonomy, collaboration, group awareness, collaborative writing software

11.

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust

International Journal of Human-Computer Interaction, vol. 30(1), pp. 63-93
Number of pages: 77 Posted: 05 Jun 2013 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, David Wilson and Bill Haig
The University of Hong Kong - School of Business, University of Arizona - Department of Management Information Systems and Powerlogos Design
Downloads 518 (48,126)

Abstract:

Loading...

e-commerce, internet retailing, logos, credibility, surface credibility, logo design, branding, website design, trust, distrust, online consumers, online marketing, e-commerce, source credibility theory

12.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 511 (49,203)

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

13.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 497 (50,721)
Citation 4

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

14.

Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 42 Posted: 23 Nov 2014 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Tailai Wu and Mikko Siponen
The University of Hong Kong - School of Business, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems and University of Oulu
Downloads 411 (64,143)

Abstract:

Loading...

Stalking, Cyberstalking, Shame, Neutralization, Self-control, Rational choice theory, Social learning theory of crime, Emotional theory of stalking, Self-control theory, Social media, Deviance

15.

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning (SSSL) Model

Information Systems Research (ISR), vol. 27(4), pp. 962–986
Number of pages: 111 Posted: 26 Aug 2016 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang and Mikko Siponen
The University of Hong Kong - School of Business, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems and University of Oulu
Downloads 370 (72,911)

Abstract:

Loading...

cyberbullying, cyberstalking, cyberharassment, social media, social media cyberbullying model (SMCBM), neutralization, anonymity, disinhibition, deindividuation, differential association, differential reinforcement, definition, imitation, social structure and social learning (SSSL) model, social lea

16.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 349 (78,063)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

17.

A Systematic Review of Social Networking Research in Information Systems

Communications of the Association for Information Systems, vol. 36(1)
Number of pages: 41 Posted: 18 Nov 2014 Last Revised: 31 Jul 2015
Jinwei Cao, Kamile Basoglu, Hong Sheng and Paul Benjamin Lowry
University of Delaware - Accounting & MIS, University of Delaware - Accounting & MIS, Missouri University of Science and Technology - Department of Business and Information Technology and The University of Hong Kong - School of Business
Downloads 340 (79,915)

Abstract:

Loading...

social networking (SN); social networking applications (SNAs); social media; literature review; systematic review; social networks; social network analysis; social computing; information systems (IS)

18.

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess

Journal of the Association for Information Systems, vol. 17(1), pp. 39–76 ISSN: 1536-9323
Number of pages: 66 Posted: 28 May 2015 Last Revised: 26 Jan 2016
Jeffrey Wall, Paul Benjamin Lowry and Jordan B. Barlow
University of North Carolina (UNC) at Greensboro, The University of Hong Kong - School of Business and California State University, Fullerton - Mihaylo College of Business & Economics
Downloads 320 (85,612)

Abstract:

Loading...

selective organizational information privacy and security violations model (SOIPSVM), privacy, security, theory building, organizational privacy, organizational security, rule violations, policy violations, information abuse, SOIPSVM, PCI DSS, HIPPA, selective organizational rule violations model

19.

Genetic Programming for Prevention of Cyberterrorism Through Dynamic and Evolving Intrusion Detection

Decision Support Systems (DSS), Vol. 43, No. 4, pp. 1362-1374
Number of pages: 32 Posted: 26 Jan 2006 Last Revised: 11 Apr 2015
James V. Hansen, Paul Benjamin Lowry, Rayman Meservy and Dan McDonald
Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems and University of Arizona - Eller College of Management
Downloads 317 (86,475)

Abstract:

Loading...

terrorism, cyberterrorism, intrusion detection, genetic programming

20.

Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It

IEEE Transactions on Professional Communication, vol. 57(2), pp. 123–146
Number of pages: 57 Posted: 19 Mar 2014 Last Revised: 08 Jun 2014
Paul Benjamin Lowry and James Gaskin
The University of Hong Kong - School of Business and Brigham Young University - Marriott School
Downloads 314 (88,389)

Abstract:

Loading...

Theory building; partial least squares (PLS); structural equation modeling (SEM); causal inquiry; first-generation statistical techniques; second-generation statistical techniques

21.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
Clay Posey, Becky Bennett, Tom Roberts and Paul Benjamin Lowry
The University of Alabama, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and The University of Hong Kong - School of Business
Downloads 302 (91,649)
Citation 1

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

22.

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing a Bold Research Agenda

European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563
Number of pages: 36 Posted: 02 Oct 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Tamara Dinev and Robert Willison
The University of Hong Kong - School of Business, Florida Atlantic University - School of Accounting and Newcastle University (UK)
Downloads 279 (101,893)

Abstract:

Loading...

Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)

23.

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems

Journal of Global Information Management (JGIM), Vol. 16, No. 1, pp. 61-92, 2008
Number of pages: 50 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Dongsong Zhang and Paul Benjamin Lowry
University of Maryland, Baltimore County and The University of Hong Kong - School of Business
Downloads 278 (99,950)
Citation 1

Abstract:

Loading...

culture, cross-cultural groups, collaboration, collaborative software, group support systems, distributed teams

24.

Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals

Communications of the Association for Information Systems (CAIS), Vol. 20, No. 16, pp. 142-203, 2007
Number of pages: 64 Posted: 19 Oct 2007 Last Revised: 01 Sep 2014
Paul Benjamin Lowry, Gilbert G. Karuga and Vernon J. Richardson
The University of Hong Kong - School of Business, University of Kansas and University of Arkansas at Fayetteville
Downloads 272 (102,244)
Citation 1

Abstract:

Loading...

research productivity, citation analysis, scientometrics, bibliometrics, information systems

25.

Model Checking for E-Commerce Control and Assurance

IEEE Transactions on Systems, Man, and Cybernetics: Part C (IEEETSMCC), Vol. 35, No. 3, pp. 445-450, 2005
Number of pages: 7 Posted: 02 Aug 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business and Brigham Young University - School of Accountancy
Downloads 271 (102,628)

Abstract:

Loading...

e-business, model checking, atomicity, process and communication protocols, data typing

26.

The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?

Small Group Research (SGR), Vol. 37, No. 6, pp. 631-661, 2006
Number of pages: 39 Posted: 11 Sep 2006 Last Revised: 25 Aug 2009
The University of Hong Kong - School of Business, University of Kansas - School of Business, Oklahoma State University-MSIS, University of Central Florida and University of Central Florida
Downloads 258 (108,102)
Citation 2

Abstract:

Loading...

Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)

27.

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Information Systems Research, vol. 26(2), pp. 282-300
Number of pages: 39 Posted: 19 Jan 2015 Last Revised: 25 Oct 2015
Jack Hsu, Sheng-Pao Shih, Yu Hung and Paul Benjamin Lowry
Tamkang University, Tamkang University, Tamkang University and The University of Hong Kong - School of Business
Downloads 251 (111,186)

Abstract:

Loading...

IS security; behavioral security; in-role behaviors; extra-role behaviors; social control theory (SCT); security management; information security policy (ISP); formal control; social control; organizations

28.

Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy that are Necessary for Business-to-Business Electronic Marketplace Survival

Supply Chain Forum: An International Journal, Vol. 9, No. 1, pp. 92-110, 2008
Number of pages: 53 Posted: 01 Sep 2009
Government of the United States of America - Institute of Technology, The University of Hong Kong - School of Business, Colorado State University, Fort Collins - Department of Management and Arizona State University (ASU) - Supply Chain Management
Downloads 251 (111,186)
Citation 1

Abstract:

Loading...

electronic markets, business-to-business marketplaces, supply-chain strategy, strategy

29.

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 10 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, California State University, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 244 (114,428)

Abstract:

Loading...

interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations

30.

Conceptualizing the Physical Internet: Literature Review, Implications and Directions for Future Research

11th CSCMP Annual European Research Seminar, Vienna, Austria, May 12–May 13
Number of pages: 19 Posted: 31 Oct 2016
Horst Treiblmaier, Kristijan Mirkovski and Paul Benjamin Lowry
MODUL University Vienna, City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 237 (119,425)

Abstract:

Loading...

Physical Internet (PI), systematic literature review, supply chain management (SCM)

31.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, James Courtney and Becky Bennett
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 233 (120,957)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

32.

Model Checking for Design and Assurance of E-Business Processes

Decision Support Systems (DSS), Vol. 39, No. 3, pp. 333-344, 2005
Number of pages: 29 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business and Brigham Young University - School of Accountancy
Downloads 228 (122,552)
Citation 2

Abstract:

Loading...

e-Business, Model checking, Money atomicity, Goods atomicity, Valid receipt, Process and communication protocols

33.

An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research

Communications of the Association for Information Systems (CAIS), Vol. 23, No. 3, pp. 37-62, 2008
Number of pages: 30 Posted: 04 Nov 2008 Last Revised: 25 Aug 2009
Brigham Young University Hawaii, California State University, affiliation not provided to SSRN and The University of Hong Kong - School of Business
Downloads 227 (123,092)

Abstract:

Loading...

repertory grid, repgrid, personal construct theory, cognitive mapping

34.

New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2801-2812, 2003
Number of pages: 13 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Denton Romans
The University of Hong Kong - School of Business and PricewaterhouseCoopers LLP
Downloads 221 (126,420)

Abstract:

Loading...

IS journal rankings, academics, scientometrics

35.

Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2203-2211
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Tom Roberts
The University of Hong Kong - School of Business and University of Kansas - School of Business
Downloads 216 (129,237)
Citation 2

Abstract:

Loading...

Heuristic evaluation, collaborative software, usability, HCI, distributed work

36.

Privacy Concerns versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures

Journal of Management Information Systems, Vol. 27(4), pp. 163–200 (doi: 10.2753/MIS0742-1222270406), 2011
Number of pages: 66 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
Paul Benjamin Lowry, Jinwei Cao and Andrea Everard
The University of Hong Kong - School of Business, University of Delaware - Accounting & MIS and University of Delaware - Accounting & MIS
Downloads 208 (135,135)
Citation 2

Abstract:

Loading...

37.

The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications

Number of pages: 66 Posted: 30 Jun 2013
Brigham Young University - Marriott School, West Texas A&M University, The University of Hong Kong - School of Business, West Texas A&M University and West Texas A&M University
Downloads 186 (148,669)

Abstract:

Loading...

location-based services, mobile computing, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, privacy

38.

Culture and Media Effects on Group Decision Making Under Majority Influence

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Dongsong Zhang, Paul Benjamin Lowry, Xiaolan Fu, Lina Zhou and Boonlit Adipat
University of Maryland, Baltimore County, The University of Hong Kong - School of Business, Chinese Academy of Sciences (CAS) - Institute of Psychology, University of Maryland, Baltimore County and University of Maryland, Baltimore County
Downloads 186 (148,669)
Citation 1

Abstract:

Loading...

39.

Future Directions for Behavioral Information Security Research

Computers & Security, Vol. 32(1), pp. 90-101 (doi:10.1016/j.cose.2012.09.010)
Number of pages: 38 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Washington State University - Department of Management, Information Systems, and Entrepreneurship (MISE), University of Alabama at Birmingham - Department of Accounting and Information Systems, The University of Hong Kong - School of Business, Zicklin School of Business, Baruch College - The City University of New York, Mississippi State University - Department of Management and Information Systems and Georgia State University
Downloads 181 (152,370)
Citation 1

Abstract:

Loading...

Information Security, Future Research, Behavioral Information Security, Research Challenges, Deviant Security Behavior

40.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 176 (156,922)

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

41.

Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations

Small Group Research (SGR), Vol. 38, No. 1, pp. 3-11, 2007
Number of pages: 16 Posted: 29 Mar 2007 Last Revised: 25 Aug 2009
Nicholas C. Romano, Paul Benjamin Lowry and Tom Roberts
Oklahoma State University-MSIS, The University of Hong Kong - School of Business and University of Kansas - School of Business
Downloads 174 (157,773)

Abstract:

Loading...

collaboration, small groups, virtual teams

42.

Using Internet-Based, Distributed Collaborative Writing Tools to Improve Coordination and Group Awareness in Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003
Number of pages: 22 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry and Jay F. Nunamaker
The University of Hong Kong - School of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 170 (161,038)
Citation 10

Abstract:

Loading...

Collaborative writing (CW), distributed work, group awareness, group support systems, group writing, media richness theory

43.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Anthony Vance, Paul Benjamin Lowry and Jeffrey A. Ogden
Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and Government of the United States of America - Institute of Technology
Downloads 167 (163,604)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

44.

Defending Against Spear-Phishing: Motivating Users Through Fear Appeal Manipulations

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 12 Posted: 31 Oct 2016
Sebastian Schuetz, Paul Benjamin Lowry and Jason Thatcher
City University of Hong Kong (CityUHK) - Department of Information Systems, The University of Hong Kong - School of Business and Clemson University, College of Business and Behavioral Science, John E. Walker Department of Economics, Students
Downloads 164 (167,984)

Abstract:

Loading...

Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory

45.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
Clay Posey, Tom Roberts and Paul Benjamin Lowry
The University of Alabama, University of Kansas - School of Business and The University of Hong Kong - School of Business
Downloads 158 (171,612)

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

46.

A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals

IEEE Transactions on Professional Communication (IEEETPC), Vol. 50, No. 4, pp. 352-378, 2007
Number of pages: 28 Posted: 19 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Sean Humphreys, Jason Malwitz and Joshua Nix
The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 157 (172,566)
Citation 1

Abstract:

Loading...

Business communication, journal influence, journal quality, journal rankings, journal survey, professional communication, scientometrics, technical communication, technology-based communication

47.

Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17, best paper nomination (accepted 27-July-2014)
Number of pages: 19 Posted: 23 Nov 2014
Mark J. Keith, Courtenay Maynes, Paul Benjamin Lowry and Jeffry Babb
Brigham Young University - Marriott School, Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and West Texas A&M University
Downloads 151 (178,364)

Abstract:

Loading...

privacy fatigue, information privacy, privacy controls, information disclosure, feature fatigue, field experiment

48.

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence

39th Annual Hawai'i International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Kauai, Hawaii, January 4-7, 2006 (doi: 10.1109/HICSS.2006.217).
Number of pages: 9 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Tom Roberts, Paul Benjamin Lowry, Paul Cheney and Ross Hightower
University of Kansas - School of Business, The University of Hong Kong - School of Business, University of Central Florida and University of Central Florida
Downloads 151 (178,364)

Abstract:

Loading...

communication, collaborative software, GSS, media richness, social presence, group size

49.

The Role of Mobile-Computing Self-Efficacy in Consumer Information Disclosure

Information Systems Journal (ISJ), vol. 25(4), pp. 637–667 (doi: 10.1287/isre.2015.0569)
Number of pages: 66 Posted: 12 May 2015 Last Revised: 21 Oct 2015
Brigham Young University - Marriott School, West Texas A&M University, The University of Hong Kong - School of Business, West Texas A&M University and West Texas A&M University
Downloads 133 (197,692)

Abstract:

Loading...

Mobile-Computing Self-Efficacy, Location-Based Services, Trust, Perceived Risk, Privacy Calculus, Mobile Apps, Smartphones

50.

An Evaluation of the Impact of Social Presence through Group Size and the Use of Collaborative Software on Group Member 'Voice' in Face-to-Face and Computer-Mediated Task Groups

IEEE Transactions on Professional Communication (IEEETPC), Vol. 49, No. 1, pp. 28-43, 2006
Number of pages: 17 Posted: 20 Jan 2006 Last Revised: 01 Sep 2009
Tom Roberts, Paul Benjamin Lowry and Paul Sweeney
University of Kansas - School of Business, The University of Hong Kong - School of Business and University of Dayton - School of Business Department of Management
Downloads 130 (201,288)
Citation 5

Abstract:

Loading...

Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration

51.

The Application of Model Checking for Securing E-Commerce Transactions

Communications of the Association for Computing Machinery (CACM), Vol. 49, No. 6, pp. 97-101, 2006
Number of pages: 11 Posted: 26 Jan 2006 Last Revised: 25 Aug 2009
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business and Brigham Young University - School of Accountancy
Downloads 129 (202,505)
Citation 1

Abstract:

Loading...

model checking, e-commerce, security, money atomicity, goods atomicity, validated receipt

52.

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

Journal of Management Information Systems (JMIS), vol. 34(2), pp. 560–596
Number of pages: 64 Posted: 17 Apr 2017 Last Revised: 27 Nov 2017
Virginia Polytechnic Institute & State University - Pamplin College of Business, The University of Hong Kong - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Mississippi State University - Department of Management and Information Systems
Downloads 128 (205,037)

Abstract:

Loading...

Online Social Networks (OSNs), OSN Obsessive-Compulsive Disorder, OSN Addiction, OSN Belongingness, Need-To-Belong Theory, Uses and Gratifications Theory, Facebook

53.

The Value of Distrust in Computer-Based Decision-Making Groups

43rd Annual Hawaii International Conference on System Sciences, Hawaii, January 5-8, 2010
Number of pages: 12 Posted: 14 Oct 2009
The University of Hong Kong - School of Business, University of Arizona - Department of Management Information Systems, University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis, Brigham Young University - Department of Information Systems, Georgia State University - Department of Computer Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - School of Accountancy
Downloads 127 (205,037)

Abstract:

Loading...

distrust, decision-making, groups, teams, collaboration, trust, CMC

54.

How Does Information Technology Capability Enable Digital Transformation? Considering the Mediating Roles of Agility

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 41 Posted: 31 Oct 2016
Victor Dibia, Lele Kang, Ghazwan Hassna, Shaobo Wei and Paul Benjamin Lowry
IBM Research, Independent, Hawaii Pacific University - College of Business, Independent and The University of Hong Kong - School of Business
Downloads 126 (210,106)

Abstract:

Loading...

Digital transformation, IT capability, Agility, Transformational leadership, Case studies, IT innovation, Strategy

55.

Examining the Intended and Unintended Consequences of Organisational Privacy Safeguards Enactment in Healthcare

European Journal of Information Systems (EJIS), 2017, vol. 26(1), pp. 37–65
Number of pages: 51 Posted: 11 May 2016 Last Revised: 24 Apr 2018
Rachida Parks, Heng Xu, Chao-Hsien Chu and Paul Benjamin Lowry
University of Arkansas at Little Rock - Department of Management, Pennsylvania State University - College of Information Sciences & Technology, Pennsylvania State University - College of Information Sciences & Technology and The University of Hong Kong - School of Business
Downloads 126 (207,564)

Abstract:

Loading...

Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework

56.

Standards and Verification for Fair-Exchange and Atomicity in E-Commerce Transactions

Information Sciences, Vol. 176, pp. 1045-1066, 2006
Number of pages: 28 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business and Brigham Young University - School of Accountancy
Downloads 124 (208,821)

Abstract:

Loading...

e-Business, e-commerce, protocols, model checking, money atomicity, goods atomicity, valid receipt, standards enforcement

57.

Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use

Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
Number of pages: 10 Posted: 30 Jun 2013 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, Kamel Rouibah, Gregory D Moody and Mikko Siponen
The University of Hong Kong - School of Business, Kuwait University - Department of Quantitative Methods & Information Systems, University of Nevada, Las Vegas - College of Business and University of Oulu
Downloads 121 (215,451)

Abstract:

Loading...

whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons

58.

Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions

MIS Quarterly, Vol. 35(1), pp. 1–15 (ISSN- 0276-7783), 2011
Number of pages: 48 Posted: 02 Mar 2010 Last Revised: 30 Jun 2013
Douglas L. Dean, Paul Benjamin Lowry and Sean Humphreys
Brigham Young University - Information Systems Department, The University of Hong Kong - School of Business and Brigham Young University - Department of Information Systems
Downloads 120 (215,451)

Abstract:

Loading...

Tenure standards, publication standards, publication benchmarks, faculty productivity, scientometrics, Carnegie Classification

59.

Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 244-253 (doi: 10.1109/HICSS.2002.993879)
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry, Conan Albrecht, James Lee and Jay F. Nunamaker
The University of Hong Kong - School of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)
Downloads 119 (215,451)
Citation 1

Abstract:

Loading...

Collaborative writing, user experiences, collaboration, group work

60.

Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 193-200, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry
The University of Hong Kong - School of Business
Downloads 119 (215,451)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work, design

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2016), Dublin, The Republic of Ireland, December 10
Number of pages: 31 Posted: 31 Oct 2016
Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of Business and The University of Hong Kong - School of Business
Downloads 113 (224,817)

Abstract:

Loading...

Big data capability, customer agility, organization competitiveness

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

Proceedings of the 24th Annual Americas Conference on Information Systems (AMCIS 2018), New Orleans, August 16–18
Number of pages: 14 Posted: 21 May 2018
Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of Business and The University of Hong Kong - School of Business
Downloads 5 (588,481)

Abstract:

Loading...

Big data, big data capability, theory building, IT agility, dynamic capability theory

62.

Consulting at the Laser ISP (LISP) Company: Using Excel(TM) Metrics Capabilities to Solve Unstructured, Management Problems

Journal of Information System Education (JISE), Vol. 14, No. 4, pp. 353-359, 2003
Number of pages: 8 Posted: 14 Feb 2005 Last Revised: 05 Nov 2014
Douglas L. Dean and Paul Benjamin Lowry
Brigham Young University - Information Systems Department and The University of Hong Kong - School of Business
Downloads 117 (218,144)

Abstract:

Loading...

Excel, metrics, management consulting, internet service providers, help desk, Information Systems, customer service

63.

Improving Password Cyber-Security Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals

Information Technology for Development, vol. 20(2), pp. 196–213
Number of pages: 31 Posted: 12 Jul 2013 Last Revised: 08 Jun 2014
University of Arizona, University of Arizona - Department of Management Information Systems, University of Arizona - Department of Management Information Systems and The University of Hong Kong - School of Business
Downloads 108 (232,627)

Abstract:

Loading...

password reuse, keystroke dynamics, protection motivation theory, just-in-time fear appeals, support vector machine, cyber-security, developing countries

64.

The Impact of Process Structure on Novice, Internet-Based, Asynchronous-Distributed Collaborative Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 48, No. 4, pp. 341-364, 2005
Number of pages: 25 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
The University of Hong Kong - School of Business, University of Arizona - Center for the Management of Information (CMI), Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 106 (234,184)
Citation 4

Abstract:

Loading...

distributed group work, collaborative writing, process structure, collaboration, Internet-based

65.

Understanding Patients’ Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 15 Posted: 23 Nov 2014
Paul Benjamin Lowry, Dongsong Zhang and Dezhi Wu
The University of Hong Kong - School of Business, University of Maryland, Baltimore County and Southern Utah University - School of Business
Downloads 105 (235,737)

Abstract:

Loading...

healthcare, mobile healthcare system, patient compliance, trust, patient-doctor communication, patient planned behavior

66.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University
Downloads 103 (238,905)

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

67.

Creating Agile Organizations Through IT: The Influence of Internal IT Service Perceptions on IT Service Quality and IT Agility

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 211–226
Number of pages: 51 Posted: 31 May 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry and David Wilson
The University of Hong Kong - School of Business and University of Arizona - Department of Management Information Systems
Downloads 102 (240,512)

Abstract:

Loading...

IT service climate, internal IT service perceptions, IT service quality, IT agility, construct distinctiveness, IT strategy

68.

It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis

European Journal of Information Systems (EJIS) vol. 26(4), pp. 379-413, 2015
Number of pages: 74 Posted: 23 Aug 2015 Last Revised: 27 Aug 2017
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, The University of Hong Kong - School of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 102 (242,149)

Abstract:

Loading...

Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer

Assessing the Impact of Premier Information Systems Research Over Time

Communications of the AIS (CAIS), Vol. 19, pp. 115-131, March 2007
Number of pages: 19 Posted: 29 Mar 2007 Last Revised: 03 Aug 2014
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, The University of Hong Kong - School of Business and University of Arkansas at Fayetteville
Downloads 102 (242,008)

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems, IS field

Assessing the Impact of Premier Information Systems Research Over Time

Posted: 14 Nov 2005
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, The University of Hong Kong - School of Business and University of Arkansas at Fayetteville

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems field, journal influence

70.

Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior

International Journal of Human-Computer Studies, vol. 71(12), pp. 1163-1173
Number of pages: 48 Posted: 10 Sep 2013 Last Revised: 01 Apr 2014
Brigham Young University - Marriott School, University of Alabama - Department of Information Systems, Statistics, and Management Science, University of Alabama - Department of Information Systems, Statistics, and Management Science, The University of Hong Kong - School of Business and University of Alabama - Department of Information Systems, Statistics, and Management Science
Downloads 97 (252,324)

Abstract:

Loading...

information privacy, information disclosure, location data, mobile devices, experimental methodology, privacy calculus

71.

Using the Thinklet Framework to Improve Distributed Collaborative Writing

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 4051-4060 (doi: 10.1109/HICSS.2002.994539).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
The University of Hong Kong - School of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 96 (250,633)
Citation 3

Abstract:

Loading...

Thinklets, collaborative writing, collaboration, facilitation, group work

72.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Gregory D Moody, Dennis Galletta and Anthony Vance
The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 94 (254,054)

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

73.

Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2172-2179, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Paul Benjamin Lowry
The University of Hong Kong - School of Business
Downloads 93 (255,791)
Citation 4

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work

74.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
Clay Posey, Paul Benjamin Lowry, Tom Roberts and Selwyn Ellis
The University of Alabama, The University of Hong Kong - School of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 92 (257,585)
Citation 6

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

75.

The Effects of Perceived Enjoyment and Perceived Risks on Trust Formation and Intentions to Use Online Payment Systems: New Perspectives from an Arab Country

Electronic Commerce Research and Applications (ECRA), vol. 19(3), pp. 33–43
Number of pages: 47 Posted: 22 Jul 2016 Last Revised: 29 Dec 2016
Kamel Rouibah, Paul Benjamin Lowry and Yujong Hwang
Kuwait University - Department of Quantitative Methods & Information Systems, The University of Hong Kong - School of Business and DePaul University
Downloads 89 (264,921)

Abstract:

Loading...

online payment, customer trust, perceived enjoyment, familiarity, propensity to trust, third-party seals, personal innovativeness, risk, intention to adopt, Kuwait

76.

Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets

34th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6, 2001, pp. 2535-2543 (doi: 10.1109/HICSS.2001.9270
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry
The University of Hong Kong - School of Business
Downloads 88 (264,921)

Abstract:

Loading...

XML, data mediation, collaboration, heterogeonous data

77.

The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing

40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Big Island, Hawaii, January 3-6, 2007 (doi: 10.1109/HICSS.2007.546))
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 06 Oct 2009
Gregory D Moody, Taylor Michael Wells and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, California State University and The University of Hong Kong - School of Business
Downloads 86 (268,719)

Abstract:

Loading...

interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE

78.

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

“A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security,” Journal of the Association for Information Systems (JAIS) (accepted 09-Jan-2018)
Number of pages: 48 Posted: 17 Jan 2018
Robert Willison, Paul Benjamin Lowry and Ray Paternoster
Newcastle University (UK), The University of Hong Kong - School of Business and University of Maryland - Department of Criminology & Criminal Justice
Downloads 85 (270,679)

Abstract:

Loading...

computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior

79.

Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation

Journal of the Association for Information Systems (JAIS), Vol. 10, No. 3, pp. 170-195.
Number of pages: 28 Posted: 21 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Tom Roberts, Douglas L. Dean and George M Marakas
The University of Hong Kong - School of Business, University of Kansas - School of Business, Brigham Young University - Information Systems Department and Florida International University (FIU)
Downloads 83 (276,649)
Citation 1

Abstract:

Loading...

Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software

80.

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best-paper nomination), pp. 72-76, Montréal, December 8, 2007
Number of pages: 7 Posted: 07 Oct 2009
The University of Hong Kong - School of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, Hitachi Consulting and University of Kansas - School of Business
Downloads 82 (278,725)

Abstract:

Loading...

Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli

81.

The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises,

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 19 Posted: 22 May 2015
Kristijan Mirkovski, Paul Benjamin Lowry, Frederik von Briel and Libo Liu
City University of Hong Kong (CityUHK) - Department of Information Systems, The University of Hong Kong - School of Business, Queensland University of Technology - School of Management and Swinburne University of Technology - Faculty of Business and Enterprise
Downloads 81 (278,725)

Abstract:

Loading...

Innovation intermediaries, open innovation, collaborative networks, SMEs, wine industry

82.

The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 10 Posted: 22 May 2015
Xiling Cui, Qiang Zhou and Paul Benjamin Lowry
Independent, Independent and The University of Hong Kong - School of Business
Downloads 80 (280,789)

Abstract:

Loading...

information and communication technology, knowledge sharing, in-role, extra-role, open innovation.

83.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Ross Hightower
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business and University of Central Florida
Downloads 79 (282,940)

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

84.

Understanding Contributor Withdrawal from Online Communities: The Role of Cognitive Dissonance and Emotional Change

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 33 Posted: 23 Nov 2014
Ling Jiang, Paul Benjamin Lowry and Christian Wagner
City University of Hong Kong (CityUHK) - Department of Information Systems, The University of Hong Kong - School of Business and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 78 (285,039)

Abstract:

Loading...

Contributor withdrawal, cognitive dissonance, emotional change, sense-making, online communities

85.

The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups

Journal of Management Information Systems, vol. 26(1), pp. 155–196 (doi: 10.2753/MIS0742-1222260107).
Number of pages: 61 Posted: 25 Aug 2009 Last Revised: 30 Jun 2013
The University of Hong Kong - School of Business, Oklahoma State University-MSIS, University of Arizona and California State Polytechnic University, Pomona
Downloads 76 (291,673)
Citation 4

Abstract:

Loading...

Ultra-lean interactive media (ULIM), Audience response systems (ARS), Human Computer Interaction (HCI), collaboration, large groups, interactivity, ultra-lean interactivity, CMC Interactivity Model (CMCIM)

86.

Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Nicholas C. Romano and Randy Guthrie
The University of Hong Kong - School of Business, Oklahoma State University-MSIS and California State Polytechnic University, Pomona
Downloads 76 (289,439)

Abstract:

Loading...

ARS, audience response systems, large classrooms, education, interactivity, communication, status effects, satisfaction, active learning

87.

The 'Voice Effect' in Groups

The Second Annual Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS), Seattle, December 12-13, pp. 42-46
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts and Paul Benjamin Lowry
University of Kansas - School of Business and The University of Hong Kong - School of Business
Downloads 75 (291,673)

Abstract:

Loading...

Human Computer Interaction, voice effect, collaboration

88.

Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 16 Posted: 21 May 2015
Jun Zhang, Victor Dibia, Alexey Sodnomov and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, IBM Research, City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 73 (296,154)

Abstract:

Loading...

Wearables, Quantified Self 2.0, Self-disclosure, Healthcare Online Communities, Self-Presentation Theory, Hierarchical Linear Modelling  

89.

Effects of Culture, Social Presence, and Group Composition on Trust in Technology-Supported Decision-Making Groups

Information Systems Journal (ISJ), Vol. 20, No. 3, pp. 297-315
Number of pages: 30 Posted: 25 Aug 2009 Last Revised: 05 Aug 2014
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
The University of Hong Kong - School of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 73 (296,154)
Citation 3

Abstract:

Loading...

90.

Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Environments

IEEE Transactions on Professional Communication (IEEETPC), Vol. 47, No. 3, pp. 171-189, 2004
Number of pages: 20 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
The University of Hong Kong - School of Business, University of Arizona - Center for the Management of Information (CMI), University of Arizona - Eller College of Management, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 71 (300,845)
Citation 1

Abstract:

Loading...

Collaborative tools, collaborative writing (CW), distributed education, distributed work, group writing, hybrid distributed education

91.

Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Journal of Management Information Systems (JMIS), Vol. 27, No. 1, pp. 181-207
Number of pages: 42 Posted: 24 Aug 2009 Last Revised: 27 Jul 2013
University of Oklahoma - Michael F. Price College of Business, The University of Hong Kong - School of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)
Downloads 68 (307,996)
Citation 1

Abstract:

Loading...

92.

Seeking Middle-Range Theories in Information Systems Research

International Conference on Information Systems (ICIS 2015), Fort Worth, TX, December 13-18 (accepted September 16, 2015)
Number of pages: 20 Posted: 21 Oct 2015
Nik R. Hassan and Paul Benjamin Lowry
University of Minnesota - Duluth and The University of Hong Kong - School of Business
Downloads 67 (312,895)

Abstract:

Loading...

Information systems theory, middle-range theory, grand theory, concepts, propositions, theory construction

93.

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites

HUMAN-COMPUTER INTERACTION, pp. 77-85, J. Jacko, ed., CRC, 2007, 12th International Conference on HCI, Beijing, Part 4, pp. 77-85, July 22-27, 2007
Number of pages: 10 Posted: 27 Sep 2009
Paul Benjamin Lowry, Tom Roberts and Trevor Higbee
The University of Hong Kong - School of Business, University of Kansas - School of Business and affiliation not provided to SSRN
Downloads 67 (310,461)

Abstract:

Loading...

trust, mere-exposure effect, familiarity, logos, swift trust, websites

94.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Paul Benjamin Lowry, Clay Posey, Becky Bennett and Tom Roberts
The University of Hong Kong - School of Business, The University of Alabama, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 66 (312,895)

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

95.

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques

38th Annual Hawaii International Conference on System Sciences, Hawaii, 2005, January 3-6, pp. 1-10 (doi: 10.1109/HICSS.2005.310).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts, Paul Benjamin Lowry and Nicholas C. Romano
University of Kansas - School of Business, The University of Hong Kong - School of Business and Oklahoma State University-MSIS
Downloads 66 (312,895)

Abstract:

Loading...

Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups

96.

Using it Design to Prevent Cyberbullying

Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901
Number of pages: 64 Posted: 19 Jun 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 65 (315,408)

Abstract:

Loading...

Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure

97.

Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

AIS Transactions on Human-Computer Interaction (THCI), vol. 8(3), pp. 88–130 (2016)
Number of pages: 44 Posted: 20 Sep 2016 Last Revised: 04 Oct 2016
Brigham Young University - Marriott School, West Texas A&M University, West Texas A&M University, West Texas A&M University and The University of Hong Kong - School of Business
Downloads 65 (318,012)

Abstract:

Loading...

Mobile applications, location-based services, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, information privacy

98.

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?

Journal of Management Information Systems (JMIS), vol. 33(4) 1209–1251
Number of pages: 61 Posted: 02 Nov 2016 Last Revised: 27 Feb 2017
Vincent Lai, Fujun Lai and Paul Benjamin Lowry
The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, University of Southern Mississippi - College of Business Administration and The University of Hong Kong - School of Business
Downloads 64 (318,012)

Abstract:

Loading...

Enterprise resource planning system (ERP), ERP assimilation, technology evaluation, technology imitation, diffusion of innovation (DOI) theory, China, adoption, assimilation

99.

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Journal of Management Information Systems (JMIS), vol. 32(3), pp. 1–39 (doi: 10.1080/07421222.2015.1099180)
Number of pages: 53 Posted: 08 Aug 2015 Last Revised: 21 Oct 2015
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, The University of Hong Kong - School of Business, Towson University and University of Nevada, Las Vegas
Downloads 62 (323,278)

Abstract:

Loading...

Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance

100.

Dependability Auditing with Model Checking

11th Annual Americas Conference on Information Systems, Omaha, August 11-14, pp. 3147-3156
Number of pages: 11 Posted: 26 Apr 2005 Last Revised: 06 Oct 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and The University of Hong Kong - School of Business
Downloads 62 (323,278)

Abstract:

Loading...

Model checking, e-processes, web services, electronic contracting, dependability auditing

101.

Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2180-2185, 2002
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 01 Oct 2014
Paul Benjamin Lowry
The University of Hong Kong - School of Business
Downloads 62 (323,278)
Citation 2

Abstract:

Loading...

Proximity, collaborative writing, distributed groups, group work

102.

Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study

Information Systems Journal (ISJ), Forthcoming
Number of pages: 60 Posted: 23 Oct 2017
John D'Arcy and Paul Benjamin Lowry
University of Delaware - Alfred Lerner College of Business and Economics and The University of Hong Kong - School of Business
Downloads 61 (325,881)

Abstract:

Loading...

Compliance, Information Security Policies (ISPs), Security, Organisational Security, ISP Compliance, Rational Choice Theory (RCT), Affect, Mood, Mood States, Morality, Multilevel Analysis, Organisational Compliance, Theory of Planned Behaviour (TPB), Organisational Citizenship Behaviours (OCBs)

103.

Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats

Journal of the Association for Information Systems (JAIS), Vol. 17(6) pp. 413-434, Forthcoming
Number of pages: 36 Posted: 26 Jan 2016 Last Revised: 28 Jun 2016
James Gaskin, Paul Benjamin Lowry and David Hull
Brigham Young University - Marriott School, The University of Hong Kong - School of Business and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 59 (331,279)

Abstract:

Loading...

Communication media, research dissemination, knowledge dissemination, scholarship, academic publishing, video media, multimedia instruction

104.

When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior

Electronic Commerce Research and Applications, vol. 13(4), pp. 266-282
Number of pages: 55 Posted: 09 Jun 2014 Last Revised: 05 Apr 2015
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and The University of Hong Kong - School of Business
Downloads 59 (331,279)

Abstract:

Loading...

Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle

105.

Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 104–120
Number of pages: 83 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Paul Benjamin Lowry, Jun Zhang and Tailai Wu
The University of Hong Kong - School of Business, City University of Hong Kong (CityUHK) - Department of Information Systems and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 58 (334,040)

Abstract:

Loading...

Digital Piracy, Piracy, Meta-Analysis, Literature Review, Social Cognitive Theory (SCT), Theory Building, Illegal File Sharing, Copyright Infringement, Neutralization, Sanctions, Morality, Costs, Benefits, Risks, Social Influence, Perceived Behavioral Control (PBC), Self-Efficacy

106.

Gender deception in asynchronous online communication: A path analysis

Information Processing & Management (IP&M), vol. 53(1), pp. 21–41
Number of pages: 49 Posted: 13 Jun 2016 Last Revised: 13 Mar 2017
Florida State University, The University of Hong Kong - School of Business, Mississippi State University - Department of Management and Information Systems, Florida State University and Florida State University, Students
Downloads 58 (334,040)

Abstract:

Loading...

Human Computer Interaction, Computer-Mediated Communication, Human Information Behavior, Gender, Deception, Online Game

107.

Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus, an Internet-Based Collaboration Tool

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003 (doi: 10.1109/tpc.2003.819650).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
The University of Hong Kong - School of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 57 (336,862)
Citation 2

Abstract:

Loading...

Collaborative writing, group work, Collaboratus

108.

Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies

Information Systems Journal, vol. 25(5), pp. 433-463 (2015)
Number of pages: 51 Posted: 09 Jun 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry and Gregory D Moody
The University of Hong Kong - School of Business and University of Nevada, Las Vegas - College of Business
Downloads 56 (339,700)

Abstract:

Loading...

Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects

109.

Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)

Number of pages: 42 Posted: 30 Jun 2013
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and The University of Hong Kong - School of Business
Downloads 56 (339,700)

Abstract:

Loading...

trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)

110.

Social Media Use for Open Innovation Initiatives: Proposing the Semantic Learning-Based Innovation Framework (SLBIF)

IT Professional, vol. 18(6), pp. 26–32
Number of pages: 10 Posted: 28 Jul 2016 Last Revised: 27 Feb 2017
Kristijan Mirkovski, Frederik von Briel and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, Queensland University of Technology - School of Management and The University of Hong Kong - School of Business
Downloads 52 (351,778)

Abstract:

Loading...

Open Innovation, Semantic Learning, Big Data, Social Media, Small and Medium Sized Enterprises

111.

Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

Group Decision and Negotiation, vol. 24(4), pp.723-752
Number of pages: 54 Posted: 25 Aug 2014 Last Revised: 31 Jul 2015
Paul Benjamin Lowry, Ryan M. Schuetzler, Justin Giboney and Tom Gregory
The University of Hong Kong - School of Business, University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis, University of Arizona - Department of Management Information Systems and Georgia State University - Department of Computer Information Systems
Downloads 52 (351,778)

Abstract:

Loading...

Trust, distrust, groups, virtual teams, tasks, team performance, decision making, decision quality, collaboration

112.

Proposing the Hedonic Affect Model (HAM) to Explain How Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences, Paris, France, December 13. All Sprouts Content, vol. 8(24), paper 230, pp. 1-51
Number of pages: 59 Posted: 30 Jun 2013
The University of Hong Kong - School of Business, University of Arizona, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, University of Arizona - Department of Management Information Systems and University of Arkansas
Downloads 51 (357,890)

Abstract:

Loading...

affect, expectations disconfirmation, stimulus, attention, perceived affective quality, hedonic systems

113.

Factors that Influence Interorganizational Use of Information and Communications Technology in Relationship-Based Supply Chains: Evidence from the Macedonian and American Wine Industries

Supply Chain Management: An International Journal (SCM), Vol., 21(3), 1-31, 2016, DOI: 10.1108/SCM-08-2015-0343
Number of pages: 37 Posted: 27 Nov 2015 Last Revised: 28 Jun 2016
Kristijan Mirkovski and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 50 (357,890)

Abstract:

Loading...

Supply chain integration, Developed economies, Developing economies, ICT use, SMEs, Wine industry.

114.

The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups

40th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
The University of Hong Kong - School of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 50 (357,890)

Abstract:

Loading...

trust, culture, GSS, collaborative software, individualism, collectivism

115.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and University of Arizona - Department of Management Information Systems
Downloads 49 (361,013)

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

116.

The IS Core: An Integration of the Core IS Courses

Number of pages: 20 Posted: 31 Aug 2009
Conan Albrecht, Gregory D Moody, Marshall Romney and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 47 (367,413)

Abstract:

Loading...

: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum

117.

Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, pp. 1-40
Number of pages: 42 Posted: 30 Jun 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 46 (370,629)

Abstract:

Loading...

control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, organizational mandatoriness, threat to freedom, boomerang effects, anger

118.

A Longitudinal Study of Information Privacy on Mobile Devices

47th Hawaiian International Conference on Systems Sciences (HICSS 2014), Big Island, Hawaii, January 6–9, 3149-3158
Number of pages: 11 Posted: 11 Sep 2013 Last Revised: 23 Nov 2014
Mark J. Keith, Jeffry Babb and Paul Benjamin Lowry
Brigham Young University - Marriott School, West Texas A&M University and The University of Hong Kong - School of Business
Downloads 45 (377,263)

Abstract:

Loading...

mobile computing, mobile commerce, self-disclosure, privacy, privacy calculus

119.

Using the Control Balance Theory to Explain Social Media Deviance

Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI, January 4–7, pp. 2253–2262
Number of pages: 11 Posted: 31 Oct 2016 Last Revised: 13 Mar 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
The University of Hong Kong - School of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 44 (377,263)

Abstract:

Loading...

120.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 44 (377,263)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

121.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 42 (384,332)

Abstract:

Loading...

122.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Paul Benjamin Lowry, Clay Posey, Tom Roberts and Becky Bennett
The University of Hong Kong - School of Business, The University of Alabama, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 40 (391,378)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

123.

Breaking Free from the Limitations of Classical Test Theory: Developing and Measuring Information Systems Scales Using Item Response Theory

Information & Management (I&M), vol. 54(2), pp. 189–203
Number of pages: 46 Posted: 09 Jun 2016 Last Revised: 27 Feb 2017
Thomas Rusch, Paul Benjamin Lowry, Patrick Mair and Horst Treiblmaier
Vienna University of Economics and Business, The University of Hong Kong - School of Business, Harvard University - Department of Psychology and MODUL University Vienna
Downloads 39 (394,987)

Abstract:

Loading...

Item Response Theory, Classical Test Theory, Scale Development, Rasch Model, Measurement, Measures, Hedonism, Reliability, Hedonic IS

124.

How Increased Social Presence Through Co-Browsing Influences User Engagement in Collaborative Online Shopping

Electronic Commerce Research and Applications (ECRA), vol. 24, (July-August 2017), pp. 84-99
Number of pages: 49 Posted: 07 Jul 2017 Last Revised: 02 Sep 2017
Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum and Thimo Schulze
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics, The University of Hong Kong - School of Business, Synchronite GmbH and Independent
Downloads 35 (414,527)

Abstract:

Loading...

Collaboration; user engagement; social presence; co-presence; e-commerce; social presence theory; online shopping; co-browsing

125.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
A. J. Burns, Clay Posey, Tom Roberts and Paul Benjamin Lowry
University of Texas at Tyler, The University of Alabama, University of Kansas - School of Business and The University of Hong Kong - School of Business
Downloads 35 (410,558)

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

126.

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Journal of Information Privacy and Security, vol. 9(4), pp. 52-79, 2013
Number of pages: 29 Posted: 26 Mar 2014 Last Revised: 28 Mar 2014
Jeffrey Wall, Prashant Palvia and Paul Benjamin Lowry
University of North Carolina (UNC) at Greensboro, University of North Carolina (UNC) at Greensboro - Bryan School of Business & Economics and The University of Hong Kong - School of Business
Downloads 35 (410,558)

Abstract:

Loading...

Self-determination, reactance, efficacy, information security policy

127.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Anthony Vance, Braden Molyneux, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, The University of Hong Kong - School of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 35 (410,558)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

128.

Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach

Journal of the Association for Information Systems (JAIS), Forthcoming
Number of pages: 72 Posted: 17 Aug 2017
Jack Hsu, Chao-Min Chiu, Paul Benjamin Lowry and T.P. Liang
Tamkang University, National Sun Yat-sen University, The University of Hong Kong - School of Business and National Sun Yat-sen University - College of Management
Downloads 31 (431,232)

Abstract:

Loading...

Formative Measurement, Fixed-Weight Redundancy Model (FWRM), Free-Estimation Model, Interpretational Confounding, Interpretational Ambiguity, MIMIC Model, Structural Equation Modeling (SEM), Partial Least Squares (PLS)

129.

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce

Pacific Asia Conference on Information Systems (PACIS) 2013, Jeju Island, Korea, June 18-22.
Number of pages: 14 Posted: 30 Jun 2013
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, The University of Hong Kong - School of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 31 (426,823)

Abstract:

Loading...

trust, distrust, online behaviour, ambivalence, e-commerce, situational abnormality, situational normality

130.

‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 232–240
Number of pages: 21 Posted: 29 Jun 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, John D'Arcy, Bryan Hammer and Gregory D Moody
The University of Hong Kong - School of Business, University of Delaware - Alfred Lerner College of Business and Economics, University of Oklahoma - Division of Management Information Systems (MIS) and University of Nevada, Las Vegas - College of Business
Downloads 30 (431,232)

Abstract:

Loading...

Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research

131.

Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals’ Intent to Comply with New IT Security Policies

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 40 Posted: 30 Aug 2010 Last Revised: 27 Jul 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 30 (431,232)

Abstract:

Loading...

Control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, anger

132.

The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences (ICIS 2015), Fort Worth, TX, December 13–18
Number of pages: 38 Posted: 31 Oct 2016
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 28 (440,417)

Abstract:

Loading...

wearable device, quantified-self 2.0 platforms, health behavior maintenance, motivational affordance, self-efficacy

133.

User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit

Decision Support Systems, vol. 72(April), pp. 1-10 (doi: http://dx.doi.org/10.1016/j.dss.2015.02.005)
Number of pages: 31 Posted: 06 Apr 2015
Justin Giboney, Susan Brown, Paul Benjamin Lowry and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, University of Arizona - Eller College of Management, The University of Hong Kong - School of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 27 (445,180)

Abstract:

Loading...

User acceptance, explanations, cognitive fit, recommendations

134.

Why Do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011 Shanghai, China, December 3, All Sprouts Content, vol. 11(138), paper 453
Number of pages: 51 Posted: 30 Jun 2013
Paul Benjamin Lowry, Jeffrey Wall and James Selfridge
The University of Hong Kong - School of Business, University of North Carolina (UNC) at Greensboro and Brigham Young University
Downloads 27 (445,180)

Abstract:

Loading...

HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies

135.

What Signal is Your Inspection Team Sending to Each Other? Using a Shared Collaborative Interface to Improve Shared Cognition and Implicit Coordination in Error-Detection Teams

International Journal of Human-Computer Studies, Vol. 71(4), pp. 455-474 (doi: 10.1016/j.ijhcs.2012.11.004)
Number of pages: 57 Posted: 18 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Tom Roberts and Nicholas C. Romano
The University of Hong Kong - School of Business, University of Kansas - School of Business and Oklahoma State University-MSIS
Downloads 27 (445,180)

Abstract:

Loading...

Implicit Coordination, Implicit Coordination Theory, Shared Cognition, Signal Detection Theory, Collaborative Software, Error Detection, Explicit Coordination

136.

Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable

Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS 2012), Maui, Hawaii, USA, January 4-7, pp. 4623-4632 (best paper nomination)
Number of pages: 11 Posted: 30 Jun 2013
Anthony Vance, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 26 (450,233)

Abstract:

Loading...

accountability, security, organizational security, least privilege, access, identifiability, evaluation, social presence

137.

Developing and Measuring IS Scales Using Item Response Theory

34th International Conference on Information Systems (ICIS 2013), Milan, Italy, December 15-18, pp. 1-16, 2013
Number of pages: 17 Posted: 30 Jun 2014 Last Revised: 07 Dec 2014
Thomas Rusch, Patrick Mair, Paul Benjamin Lowry and Horst Treiblmaier
Vienna University of Economics and Business, Harvard University - Department of Psychology, The University of Hong Kong - School of Business and MODUL University Vienna
Downloads 25 (455,321)

Abstract:

Loading...

Item Response Theory, Rasch Model, Partial Credit Model, Measurement, Hedonism, Hedonic Information Systems, Classical Test Theory

138.

Disentangling the Motivations for Organizational Insider Computer Abuse Through the Rational Choice and Life Course Perspectives

DATA BASE for Advances in Information Systems, vol.49 (April 2018), 81-102
Number of pages: 39 Posted: 10 Jan 2018 Last Revised: 05 May 2018
Robert Willison and Paul Benjamin Lowry
Newcastle University (UK) and The University of Hong Kong - School of Business
Downloads 24 (460,592)

Abstract:

Loading...

computer abuse (CA), insider computer abuse (ICA), life course perspective (LCP), rational choice perspective (RCP), deterrence, employee computer abuse, organizational security, organizational insider, future directions for IS security research

139.

The Assimilation of RFID Technology by Chinese Companies: A Technology Diffusion Perspective

Information & Management, vol. 52(6), pp. 628-642
Number of pages: 46 Posted: 14 May 2015 Last Revised: 29 Dec 2016
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and The University of Hong Kong - School of Business
Downloads 24 (460,592)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, DOI theory

140.

A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China

International Conference on ICT Management for Global Competitiveness and Economic Growth in Emerging Economies (ICTM 2012), Wroclaw, Poland, September 17-18, pp. 101-120
Number of pages: 21 Posted: 30 Jun 2013
Wei Jie, Paul Benjamin Lowry and Stefan Seedorf
City University of Hong Kong (CityUHK), The University of Hong Kong - School of Business and University of Mannheim - Institute of Computer Science and Business Informatics
Downloads 24 (465,793)

Abstract:

Loading...

innovation diffusion, assimilation, RFID technology, TOE framework, stage-based model

141.

A Contingency Model of Bidding Strategies in Online Auctions in China

Pacific Asia Journal of the Association for Information Systems (PAJAIS), vol. 8(2), pp. 47–62
Number of pages: 27 Posted: 22 Jul 2016 Last Revised: 05 Sep 2016
Xiling Cui, Lai Law, Paul Benjamin Lowry and Qiuzhen Wang
Independent, Hong Kong Shue Yan University, The University of Hong Kong - School of Business and Zhejiang University - School of Management
Downloads 23 (465,793)

Abstract:

Loading...

Bidding strategies, Bidders, Online auctions, Qualitative research, China, Bidding motivations

142.

Application of Expectancy Violations Theory to Communication with and Judgments About Embodied Agents During a Decision-Making Task

International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36, Forthcoming
Number of pages: 47 Posted: 15 Feb 2016 Last Revised: 09 May 2016
University of Arizona - Eller College of Management, University of Arizona, The University of Hong Kong - School of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School and University of Arizona - Department of Management Information Systems
Downloads 23 (465,793)

Abstract:

Loading...

Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making

143.

The Agent Bidding Habit and Use Model (ABHUM) and Its Validation in the Taobao Online Auction Context

Information & Management (I&M), Vol. 54(3), pp. 281-289, April 2017
Number of pages: 36 Posted: 30 Jul 2016 Last Revised: 24 Apr 2018
Xiling Cui, Nan Zhang and Paul Benjamin Lowry
Independent, Tsinghua University and The University of Hong Kong - School of Business
Downloads 22 (471,181)

Abstract:

Loading...

Bidding agents, Agent bidding, Online auctions, Habit, Taobao, E-commerce, China

144.

How Do Bidders’ Organism Reactions Mediate Auction Stimuli and Bidder Loyalty in Online Auctions? The Case of Taobao in China

Information & Management (I&M), vol. 53 (2016), pp. 609-624
Number of pages: 46 Posted: 01 Feb 2016 Last Revised: 28 Jul 2016
Xiling Cui, Vincent Lai and Paul Benjamin Lowry
Independent, The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics and The University of Hong Kong - School of Business
Downloads 22 (471,181)

Abstract:

Loading...

S-O-R model, evolutionary S-O-R model, bidder loyalty, online auctions, organism

145.

Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment

Journal of Management Information Systems, Vol. 28, No. 1, pp. 201-234, 2011
Number of pages: 47 Posted: 15 Aug 2011 Last Revised: 12 Jun 2014
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, The University of Hong Kong - School of Business and University of Arizona
Downloads 22 (471,181)

Abstract:

Loading...

credibility assessment, decision support systems, indirect cues elicitation, linguistic analysis, signal detection theory

146.

Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

Proceedings of the 16th Annual Americas Conference on Information Systems, Lima, Peru, August 12-15
Number of pages: 11 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
James V. Hansen, Paul Benjamin Lowry and Rayman Meservy
Brigham Young University - School of Accountancy, The University of Hong Kong - School of Business and Brigham Young University - Department of Information Systems
Downloads 22 (471,181)

Abstract:

Loading...

Data mining, intrusion detection, pattern discovery, rule-induction algorithms, link analysis

147.

Automated and Participative Decision Support in Computer-Aided Credibility Assessment

8th Annual Special Interest Group on Human-Computer Interaction 2009 Pre-ICIS Workshop, Scottsdale, December 2009
Number of pages: 6 Posted: 14 Oct 2009 Last Revised: 27 Jul 2013
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, The University of Hong Kong - School of Business and University of Arizona
Downloads 22 (471,181)

Abstract:

Loading...

Credibility Assessment, Signal Detection Theory, Linguistic Analysis, Indirect Cues Elicitation, Decision Support Systems

148.

Creating Automated Plans for Semantic Web Applications Through Planning as Model Checking

Expert Systems with Applications (ESWA), Vol. 47, No.1, 2009
Number of pages: 35 Posted: 24 Aug 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and The University of Hong Kong - School of Business
Downloads 22 (471,181)

Abstract:

Loading...

semantic web, model checking, formal methods, software engineering for Internet projects, artificial intelligence, agents, planning as model checking

149.

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms

Decision Sciences Journal (DSJ) (20-Feb-2018 Forthcoming)
Number of pages: 50 Posted: 04 Mar 2018
Frederik von Briel, Christoph Schneider and Paul Benjamin Lowry
Queensland University of Technology - School of Management, City University of Hong Kong (CityUHK) and The University of Hong Kong - School of Business
Downloads 20 (482,127)

Abstract:

Loading...

Innovation, Absorptive Capacity, Social Integration, External Partners, Organizational Capabilities, Knowledge Absorption, Collaboration, Mechanisms

150.

The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination

Computers & Security, vol. 75(June), pp. 147-166, 2018
Number of pages: 42 Posted: 06 Feb 2018 Last Revised: 30 Jun 2018
Phillip Menard, Merrill Warkentin and Paul Benjamin Lowry
University of South Alabama, Mississippi State University - Department of Management and Information Systems and The University of Hong Kong - School of Business
Downloads 20 (487,572)

Abstract:

Loading...

protection motivation theory (PMT), psychological ownership, collectivism, individualism, information security behavior

151.

Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA)

Forthcoming in ACIS 2016 JAIS Workshop Advances in Qualitative IS Research Methodologies, Sydney, Australia, November 30
Number of pages: 5 Posted: 31 Oct 2016
Robert Willison, Paul Benjamin Lowry and Richard Baskerville
Newcastle University (UK), The University of Hong Kong - School of Business and Georgia State University
Downloads 19 (487,572)

Abstract:

Loading...

security, organizational security, qualitative methods

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web-Vendor Trust

Information & Management, vol. 51(5), pp. 579–594
Number of pages: 66 Posted: 26 Mar 2014 Last Revised: 19 Jun 2014
The University of Hong Kong - School of Business, University of Arizona - Department of Management Information Systems, Georgia State University, University of Arizona and Brigham Young University - Department of Information Systems
Downloads 11 (553,140)

Abstract:

Loading...

Website design, trust, emotion, affect, affect infusion, Web site performance, Affect-Trust Infusion Model (ATIM)

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011, Shanghai, China, December 3, All Sprouts Content, vol. 11(136), paper 451.
Number of pages: 41 Posted: 30 Jun 2013
The University of Hong Kong - School of Business, University of Arizona, University of Arizona - Department of Management Information Systems and Georgia State University
Downloads 8 (570,936)

Abstract:

Loading...

trust, affect infusion, positive website performance, positive emotion, cognition, Affect-Trust Infusion Model, trust transference

153.

Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications

Association for Information Systems Transactions on Human-Computer Interaction (THCI), Forthcoming
Number of pages: 54 Posted: 15 Jul 2018
Horst Treiblmaier, Lisa-maria Putz and Paul Benjamin Lowry
MODUL University Vienna, Upper Austria - University of Applied Sciences Upper Austria and The University of Hong Kong - School of Business
Downloads 18 (514,556)

Abstract:

Loading...

Gamification, Gamification Definition, Gamification Domain, Research Agenda, Theory Building, Theories in IS Research, Attitudinal Change, Behavioral Change, Nomological Network

154.

Why Students Engage in Cyber-Cheating Through a Collective Movement: A Case of Deviance and Collusion

Computers & Education (C&E), Vol. 125 (October), pp. 308-326
Number of pages: 40 Posted: 03 May 2018 Last Revised: 04 Aug 2018
University of Arkansas at Little Rock - Department of Management, The University of Hong Kong - School of Business, University of Arkansas at Little Rock, University of Arkansas - Little Rock and University of Central Oklahoma - College of Business
Downloads 16 (503,632)

Abstract:

Loading...

cyber-cheating, computer-mediated communication, pedagogical issues, social networking sites, qualitative

155.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 16 (503,632)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy

156.

Investigation of Radio-Frequency Identification Assimilation Process in China: A Stage-Based Model Perspective

Electronic Journal of Information Systems in Developing Countries Vol. 57(4), 1-17
Number of pages: 18 Posted: 04 Jun 2013
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and The University of Hong Kong - School of Business
Downloads 16 (503,632)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, stage-based model, emerging economies

157.

Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior

Hawaii International Conference on Systems Sciences (HICSS 2015), Kauai, HI, January 5–8 (accepted 17-Aug-2014)
Number of pages: 10 Posted: 10 Dec 2014
Dezhi Wu, Paul Benjamin Lowry and Dongsong Zhang
Southern Utah University - School of Business, The University of Hong Kong - School of Business and University of Maryland, Baltimore County
Downloads 13 (520,042)

Abstract:

Loading...

158.

Explaining Opposing Compliance Motivations Towards Organizational Information Security Policies

46th Annual Hawaii International Conference on System Sciences (HICSS 2013), Mauii, Hawaii, USA, January 7-10
Number of pages: 11 Posted: 30 Jun 2013
Paul Benjamin Lowry and Gregory D Moody
The University of Hong Kong - School of Business and University of Nevada, Las Vegas - College of Business
Downloads 8 (547,006)

Abstract:

Loading...

security, policy compliance, reactance, organizational security

159.

Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions

Proceedings of the Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 / 11.13, Cape Town, South Africa, June 14–15
Number of pages: 32 Posted: 21 May 2018
Kennedy Njenga and Paul Benjamin Lowry
University of Johannesburg and The University of Hong Kong - School of Business
Downloads 7 (557,428)

Abstract:

Loading...

Information System (IS) Security, Information Security Policy (ISP), Violations, Grounded Theory

160.

Does More Accessibility Lead to More Disclosure? Exploring the Influence of Information Accessibility on Self-Disclosure in Online Social Networks

Information Technology & People (IT&P) (accepted 28-July-2018)
Number of pages: 37 Posted: 14 Aug 2018
Shanshan Zhang, Ron Kwok, Paul Benjamin Lowry and Zhiying Liu
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, The University of Hong Kong - School of Business and University of Science and Technology of China (USTC)
Downloads 3

Abstract:

Loading...

Online social network (OSN), self-disclosure, information accessibility, social exchange beliefs

161.

Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: The Role of Achievement Goals and Achievement Motivational Affordance

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 11 Posted: 02 Jul 2018
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business
Downloads 3 (574,179)

Abstract:

Loading...

wearable device, quantified-self, running platforms, physical activity maintenance, motivational affordance, achievement goal, mastery goal, performance goal

162.

Proposing the Core Contributor Withdrawal Theory (CCWT) to Understand Core Contributor Withdrawal from Online Peer-Production Communities

Forthcoming in Internet Research (accepted 06-Apr-2018)
Posted: 02 May 2018
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, University of North Carolina (UNC) at Greensboro, City University of Hong Kong (CityUHK) - Department of Information Systems and The University of Hong Kong - School of Business

Abstract:

Loading...

163.

Using Multistage Competing Risks Approaches to Model Web Page Transitions

Internet Research (IR), vol. 27(3), pp. 650–669, 2017
Posted: 03 Oct 2016 Last Revised: 27 Aug 2017
Patrick Mair, Horst Treiblmaier and Paul Benjamin Lowry
Harvard University - Department of Psychology, MODUL University Vienna and The University of Hong Kong - School of Business

Abstract:

Loading...

Survival Analysis, Clickstream Analysis, E-Commerce, Online Retailing, Competing Risks Models, Dwell-Time Analysis, Hazard Models, Website Interaction

164.

Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context

Journal of Global Information Management, vol. 23(3), pp. 41–70
Posted: 18 Nov 2014 Last Revised: 05 Apr 2015
Kamel Rouibah, Paul Benjamin Lowry and Laila Al-Mutairi
Kuwait University - Department of Quantitative Methods & Information Systems, The University of Hong Kong - School of Business and Kuwait University - School of Business

Abstract:

Loading...

E-commerce, business-to-consumer (B2C), IS success model, satisfaction, service quality, perceived value, information quality, system quality, service quality, Kuwait, the Arab world

165.

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

Journal of Management Information Systems, vol. 31(3), pp. 106–137, DOI: 10.1080/07421222.2014.995535).
Posted: 20 Jun 2014 Last Revised: 02 Jun 2015
Nathan Twyman, Paul Benjamin Lowry, Judee K. Burgoon and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, The University of Hong Kong - School of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Autonomous scientifically controlled screening systems (ASCSS), Credibility assessment, Deception detection, Concealed information test (CIT), Orienting response, Defensive response, Automated screening kiosk (ASK), Eye tracking measures, Physical security, Design Science

166.

Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Posted: 30 Aug 2010
Anthony Vance, Gove N. Allen, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and The University of Hong Kong - School of Business

Abstract:

Loading...

accountability, identifiability, evaluation, IS security policies, computer abuse

167.

Evolutionary Development and Research on Internet-Based Collaborative Writing Tools and Processes to Enhance Ewriting in an Egovernment Setting

Decision Support Systems (DSS), Vol. 34, No. 3, pp. 229-252, 2002
Posted: 20 Jan 2006
Paul Benjamin Lowry, Conan Albrecht, Jay F. Nunamaker and James Lee
The University of Hong Kong - School of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Collaborative writing, group writing, eWriting, eGovernment, eGov, digital government, GSS, collaboration, group work, facilitation, distributed work, self-sustaining writing teams, multi-methodological research, collaborative systems development

168.

Familiarity Effects on Trust with Mobile Computing Device Websites

11th International Conference on HCI, Las Vegas, July 22-27, 2005
Posted: 21 Feb 2005 Last Revised: 02 Jul 2014
Paul Benjamin Lowry, Tom Roberts and Bryce Caine
The University of Hong Kong - School of Business, University of Kansas - School of Business and Brigham Young University - School of Accountancy

Abstract:

Loading...

Familiarity, Web, websites, usability, HCI, logos, interfaces

169.

Biometrics: A Critical Consideration in Information Security Management

ENCYCLOPEDIA OF MULTIMEDAI TECHNOLOGY AND NETWORKS, Margherita Pagani, ed., Idea Group Inc., pp. 69-75, 2005
Posted: 21 Feb 2005
Paul Benjamin Lowry
The University of Hong Kong - School of Business

Abstract:

Loading...

biometrics, security, fraud

170.

Making Money with Open-Source Software Business Initiatives

in Margherita Pagani, ed. Encyclopedia of Multimedia Technology and Networks, Idea Group Inc., pp. 555-561
Posted: 21 Feb 2005
Paul Benjamin Lowry
The University of Hong Kong - School of Business

Abstract:

Loading...

OSS, open-source software, business models

171.

The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes

Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
Paul Benjamin Lowry and Dennis C. Wilson
The University of Hong Kong - School of Business and University of Arizona

Abstract:

Loading...

GSS, collaborative software, systems analysis and design, JAD, CASE, data modeling

172.

MIS Legitimacy and the Proposition of a New, Multi-Dimensional Model of MIS

Annual Conference of the Southern Association for Information Systems, 2002
Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
The University of Hong Kong - School of Business, University of Arizona - Eller College of Management, University of Arizona, University of Arizona - Eller College of Management and University of Arizona

Abstract:

Loading...

MIS, IS, academics, IS discipline

Other Papers (1)

Total Downloads: 0    Citations: 0
1.

Goals, Values, and Expectations of the AIS Family of Journals

Journal of the Association for Information Systems (JAIS), vol. 18(9), pp. 633–647
Posted: 03 Nov 2017
University of Central Florida, University of Oslo, University of Arizona - Eller College of Management, Indiana University - Kelley School of Business - Department of Operation & Decision Technologies, Governors State University - College of Business and Public Administration, University of Pittsburgh and Director, Katz Doctoral Program, National Sun Yat-sen University - College of Management, The University of Hong Kong - School of Business, Queensland University of Technology and University of Virginia

Abstract:

Loading...

AIS Journals, Journal Mission, Journal Review Processes, Journal Values, Replication, Open Science, Publication Ethics.