Paul Benjamin Lowry

Virginia Polytechnic Institute & State University - Pamplin College of Business

1016 Pamplin Hall

Blacksburg, VA 24061

United States

SCHOLARLY PAPERS

212

DOWNLOADS
Rank 825

SSRN RANKINGS

Top 825

in Total Papers Downloads

37,987

SSRN CITATIONS
Rank 1,484

SSRN RANKINGS

Top 1,484

in Total Papers Citations

259

CROSSREF CITATIONS

598

Scholarly Papers (212)

1.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 2,526 (6,722)
Citation 15

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

2.

Taking ‘Fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Journal of the Association for Information Systems, vol. 14(11), 617-671
Number of pages: 56 Posted: 18 Nov 2012 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, James Gaskin, Nathan Twyman, Bryan Hammer and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Arkansas - Department of Information Systems and University of Kansas - School of Business
Downloads 2,477 (6,922)
Citation 2

Abstract:

Loading...

Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation

3.

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management

Communications of the Association for Information Systems (CAIS), Vol. 17, No. 6, pp. 1-48, 2006
Number of pages: 49 Posted: 03 Feb 2006 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and My eBiz
Downloads 2,354 (7,545)

Abstract:

Loading...

online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education

4.

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Number of pages: 71 Posted: 18 May 2015 Last Revised: 27 Nov 2017
Bentley University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and Florida International University (FIU)
Downloads 1,272 (19,912)
Citation 6

Abstract:

Loading...

Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior

5.

Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

Journal of the Association for Information Systems (JAIS), Vol. 5, No. 2, pp. 29-80, 2004
Number of pages: 51 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Denton Romans and Aaron Mosiah Curtis
Virginia Polytechnic Institute & State University - Pamplin College of Business, PricewaterhouseCoopers LLP and Brigham Young University Hawaii
Downloads 1,012 (27,911)

Abstract:

Loading...

Information Systems, Journal Rankings, Journal Quality, Research Journals, Practitioner Journals, Reference Disciplines, Supporting Disciplines, Tenure, Academic Promotion, Management Information Systems, Computer Information Systems

6.

Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Journal of the Association for Information Systems, vol. 16(7), pp. 515-579
Number of pages: 81 Posted: 08 Dec 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry, James Gaskin and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School and University of Nevada, Las Vegas - College of Business
Downloads 976 (29,356)
Citation 4

Abstract:

Loading...

Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit

7.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 912 (32,361)
Citation 4

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

8.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 905 (32,704)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

9.

The Impact of Individualism-Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence

Journal of Management Information Systems (JMIS), Vol. 23, No. 4, pp. 53-80, 2007
Number of pages: 42 Posted: 31 May 2007 Last Revised: 25 Aug 2009
Dongsong Zhang, Paul Benjamin Lowry, Lina Zhou and Xiaolan Fu
University of Maryland, Baltimore County, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 777 (40,336)
Citation 2

Abstract:

Loading...

Majority influence, culture, social presence, computer-mediated communication (CMC), group diversity, virtual teams

10.

Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 42 Posted: 23 Nov 2014 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Tailai Wu and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems and University of Oulu
Downloads 764 (41,299)

Abstract:

Loading...

Stalking, Cyberstalking, Shame, Neutralization, Self-control, Rational choice theory, Social learning theory of crime, Emotional theory of stalking, Self-control theory, Social media, Deviance

11.

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?

MIS Quarterly Vol. 37(4), 993–1012
Number of pages: 63 Posted: 09 Dec 2012 Last Revised: 08 Jan 2018
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School, University of Pittsburgh and Director, Katz Doctoral Program, Brigham Young University - Department of Information Systems, California State University, Fullerton - Mihaylo College of Business & Economics and University of Arizona - Department of Management Information Systems
Downloads 761 (41,459)
Citation 4

Abstract:

Loading...

Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle

12.

A Taxonomy of Collaborative Writing to Improve Empirical Research, Writing Practice, and Tool Development

International Journal of Business Communication, Vol. 41, No. 1, pp. 66-99, 2004
Number of pages: 59 Posted: 14 Feb 2005 Last Revised: 04 May 2020
Paul Benjamin Lowry, Aaron Mosiah Curtis and Michelle Rene Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 700 (46,391)

Abstract:

Loading...

collaborative writing, taxonomy, collaboration, group awareness, collaborative writing software

13.

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning (SSSL) Model

Information Systems Research (ISR), vol. 27(4), pp. 962–986
Number of pages: 111 Posted: 26 Aug 2016 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems and University of Oulu
Downloads 673 (48,921)
Citation 6

Abstract:

Loading...

cyberbullying, cyberstalking, cyberharassment, social media, social media cyberbullying model (SMCBM), neutralization, anonymity, disinhibition, deindividuation, differential association, differential reinforcement, definition, imitation, social structure and social learning (SSSL) model, social lea

14.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
Clay Posey, Becky Bennett, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 585 (58,560)
Citation 2

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

15.

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust

International Journal of Human-Computer Interaction, vol. 30(1), pp. 63-93
Number of pages: 77 Posted: 05 Jun 2013 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, David Wilson and Bill Haig
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems and Powerlogos Design
Downloads 579 (59,314)
Citation 3

Abstract:

Loading...

e-commerce, internet retailing, logos, credibility, surface credibility, logo design, branding, website design, trust, distrust, online consumers, online marketing, e-commerce, source credibility theory

16.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 549 (63,435)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

17.

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess

Journal of the Association for Information Systems, vol. 17(1), pp. 39–76 ISSN: 1536-9323
Number of pages: 66 Posted: 28 May 2015 Last Revised: 26 Jan 2016
Jeffrey Wall, Paul Benjamin Lowry and Jordan B. Barlow
University of North Carolina (UNC) at Greensboro, Virginia Polytechnic Institute & State University - Pamplin College of Business and California State University, Fullerton - Mihaylo College of Business & Economics
Downloads 528 (66,611)
Citation 3

Abstract:

Loading...

selective organizational information privacy and security violations model (SOIPSVM), privacy, security, theory building, organizational privacy, organizational security, rule violations, policy violations, information abuse, SOIPSVM, PCI DSS, HIPPA, selective organizational rule violations model

18.

A Systematic Review of Social Networking Research in Information Systems

Communications of the Association for Information Systems, vol. 36(1)
Number of pages: 41 Posted: 18 Nov 2014 Last Revised: 31 Jul 2015
Jinwei Cao, Kamile Basoglu, Hong Sheng and Paul Benjamin Lowry
University of Delaware - Accounting & MIS, University of Delaware - Accounting & MIS, Missouri University of Science and Technology - Department of Business and Information Technology and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 489 (73,242)

Abstract:

Loading...

social networking (SN); social networking applications (SNAs); social media; literature review; systematic review; social networks; social network analysis; social computing; information systems (IS)

19.

Conceptualizing the Physical Internet: Literature Review, Implications and Directions for Future Research

11th CSCMP Annual European Research Seminar, Vienna, Austria, May 12–May 13
Number of pages: 19 Posted: 31 Oct 2016
Horst Treiblmaier, Kristijan Mirkovski and Paul Benjamin Lowry
MODUL University Vienna, City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 447 (81,605)
Citation 1

Abstract:

Loading...

Physical Internet (PI), systematic literature review, supply chain management (SCM)

20.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, James Courtney and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 405 (91,581)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

21.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 388 (96,224)
Citation 3

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

22.

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing a Bold Research Agenda

European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563
Number of pages: 36 Posted: 02 Oct 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Tamara Dinev and Robert Willison
Virginia Polytechnic Institute & State University - Pamplin College of Business, Florida Atlantic University - School of Accounting and University of Newcastle
Downloads 371 (101,279)
Citation 11

Abstract:

Loading...

Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)

23.

Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17, best paper nomination (accepted 27-July-2014)
Number of pages: 19 Posted: 23 Nov 2014
Mark J. Keith, Courtenay Maynes, Paul Benjamin Lowry and Jeffry Babb
Brigham Young University - Marriott School, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and West Texas A&M University
Downloads 364 (103,487)

Abstract:

Loading...

privacy fatigue, information privacy, privacy controls, information disclosure, feature fatigue, field experiment

24.

Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It

IEEE Transactions on Professional Communication, vol. 57(2), pp. 123–146
Number of pages: 57 Posted: 19 Mar 2014 Last Revised: 08 Jun 2014
Paul Benjamin Lowry and James Gaskin
Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Marriott School
Downloads 362 (104,147)
Citation 12

Abstract:

Loading...

Theory building; partial least squares (PLS); structural equation modeling (SEM); causal inquiry; first-generation statistical techniques; second-generation statistical techniques

25.

Genetic Programming for Prevention of Cyberterrorism Through Dynamic and Evolving Intrusion Detection

Decision Support Systems (DSS), Vol. 43, No. 4, pp. 1362-1374
Number of pages: 32 Posted: 26 Jan 2006 Last Revised: 11 Apr 2015
James V. Hansen, Paul Benjamin Lowry, Rayman Meservy and Dan McDonald
Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems and University of Arizona - Eller College of Management
Downloads 336 (113,177)

Abstract:

Loading...

terrorism, cyberterrorism, intrusion detection, genetic programming

26.

Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals

Communications of the Association for Information Systems (CAIS), Vol. 20, No. 16, pp. 142-203, 2007
Number of pages: 64 Posted: 19 Oct 2007 Last Revised: 01 Sep 2014
Paul Benjamin Lowry, Gilbert G. Karuga and Vernon J. Richardson
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas and University of Arkansas at Fayetteville
Downloads 324 (117,760)
Citation 2

Abstract:

Loading...

research productivity, citation analysis, scientometrics, bibliometrics, information systems

27.

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems

Journal of Global Information Management (JGIM), Vol. 16, No. 1, pp. 61-92, 2008
Number of pages: 50 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Dongsong Zhang and Paul Benjamin Lowry
University of Maryland, Baltimore County and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 319 (119,744)

Abstract:

Loading...

culture, cross-cultural groups, collaboration, collaborative software, group support systems, distributed teams

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2016), Dublin, The Republic of Ireland, December 10
Number of pages: 31 Posted: 31 Oct 2016
Ghazwan Hassna, Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 269 (142,579)

Abstract:

Loading...

Big data capability, customer agility, organization competitiveness

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

Proceedings of the 24th Annual Americas Conference on Information Systems (AMCIS 2018), New Orleans, August 16–18
Number of pages: 14 Posted: 21 May 2018
Ghazwan Hassna, Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 36 (554,684)

Abstract:

Loading...

Big data, big data capability, theory building, IT agility, dynamic capability theory

29.

Privacy Concerns versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures

Journal of Management Information Systems, Vol. 27(4), pp. 163–200 (doi: 10.2753/MIS0742-1222270406), 2011
Number of pages: 66 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
Paul Benjamin Lowry, Jinwei Cao and Andrea Everard
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Delaware - Accounting & MIS and University of Delaware - Accounting & MIS
Downloads 288 (133,458)
Citation 6

Abstract:

Loading...

30.

Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications

Association for Information Systems Transactions on Human-Computer Interaction (THCI), vol. 10(3), pp. 129–163
Number of pages: 36 Posted: 15 Jul 2018 Last Revised: 09 Jan 2019
Horst Treiblmaier, Lisa-maria Putz and Paul Benjamin Lowry
MODUL University Vienna, Upper Austria - University of Applied Sciences Upper Austria and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 284 (135,431)
Citation 4

Abstract:

Loading...

Gamification, Gamification Definition, Gamification Domain, Research Agenda, Theory Building, Theories in IS Research, Attitudinal Change, Behavioral Change, Nomological Network

31.

Model Checking for E-Commerce Control and Assurance

IEEE Transactions on Systems, Man, and Cybernetics: Part C (IEEETSMCC), Vol. 35, No. 3, pp. 445-450, 2005
Number of pages: 7 Posted: 02 Aug 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 275 (140,018)

Abstract:

Loading...

e-business, model checking, atomicity, process and communication protocols, data typing

32.

The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?

Small Group Research (SGR), Vol. 37, No. 6, pp. 631-661, 2006
Number of pages: 39 Posted: 11 Sep 2006 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Oklahoma State University-MSIS, University of Central Florida and University of Central Florida
Downloads 274 (140,511)
Citation 3

Abstract:

Loading...

Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)

33.

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Information Systems Research, vol. 26(2), pp. 282-300
Number of pages: 39 Posted: 19 Jan 2015 Last Revised: 25 Oct 2015
Jack Hsu, Sheng-Pao Shih, Yu Hung and Paul Benjamin Lowry
Tamkang University, Tamkang University, Tamkang University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 273 (141,005)
Citation 5

Abstract:

Loading...

IS security; behavioral security; in-role behaviors; extra-role behaviors; social control theory (SCT); security management; information security policy (ISP); formal control; social control; organizations

34.

An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research

Communications of the Association for Information Systems (CAIS), Vol. 23, No. 3, pp. 37-62, 2008
Number of pages: 30 Posted: 04 Nov 2008 Last Revised: 25 Aug 2009
Brigham Young University Hawaii, California State University, East Bay, affiliation not provided to SSRN and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 267 (144,333)

Abstract:

Loading...

repertory grid, repgrid, personal construct theory, cognitive mapping

35.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 259 (149,342)
Citation 3

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

36.

Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy that are Necessary for Business-to-Business Electronic Marketplace Survival

Supply Chain Forum: An International Journal, Vol. 9, No. 1, pp. 92-110, 2008
Number of pages: 53 Posted: 01 Sep 2009
Government of the United States of America - Institute of Technology, Virginia Polytechnic Institute & State University - Pamplin College of Business, Colorado State University, Fort Collins - Department of Management and Arizona State University (ASU) - Supply Chain Management
Downloads 259 (148,752)

Abstract:

Loading...

electronic markets, business-to-business marketplaces, supply-chain strategy, strategy

37.

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 10 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 252 (152,838)

Abstract:

Loading...

interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations

38.

Defending Against Spear-Phishing: Motivating Users Through Fear Appeal Manipulations

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 12 Posted: 31 Oct 2016
Sebastian Schuetz, Paul Benjamin Lowry and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and affiliation not provided to SSRN
Downloads 250 (154,098)

Abstract:

Loading...

Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory

39.

The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications

Number of pages: 66 Posted: 30 Jun 2013
Brigham Young University - Marriott School, West Texas A&M University, Virginia Polytechnic Institute & State University - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 249 (154,716)
Citation 3

Abstract:

Loading...

location-based services, mobile computing, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, privacy

40.

Model Checking for Design and Assurance of E-Business Processes

Decision Support Systems (DSS), Vol. 39, No. 3, pp. 333-344, 2005
Number of pages: 29 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 232 (165,652)

Abstract:

Loading...

e-Business, Model checking, Money atomicity, Goods atomicity, Valid receipt, Process and communication protocols

41.

Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2203-2211
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 231 (166,311)
Citation 3

Abstract:

Loading...

Heuristic evaluation, collaborative software, usability, HCI, distributed work

42.

New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2801-2812, 2003
Number of pages: 13 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Denton Romans
Virginia Polytechnic Institute & State University - Pamplin College of Business and PricewaterhouseCoopers LLP
Downloads 225 (170,565)

Abstract:

Loading...

IS journal rankings, academics, scientometrics

43.

Future Directions for Behavioral Information Security Research

Computers & Security, Vol. 32(1), pp. 90-101 (doi:10.1016/j.cose.2012.09.010)
Number of pages: 38 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Washington State University - Department of Management, Information Systems, and Entrepreneurship (MISE), University of Alabama at Birmingham - Department of Accounting and Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Zicklin School of Business, Baruch College - The City University of New York, Mississippi State University - Department of Management and Information Systems and Georgia State University
Downloads 223 (172,056)
Citation 6

Abstract:

Loading...

Information Security, Future Research, Behavioral Information Security, Research Challenges, Deviant Security Behavior

44.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
Clay Posey, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 219 (175,045)
Citation 11

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

45.

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

“A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security,” Journal of the Association for Information Systems (JAIS), vol. 19(12), pp. 1187-1216, 2018
Number of pages: 48 Posted: 17 Jan 2018 Last Revised: 09 Jan 2019
Robert Willison, Paul Benjamin Lowry and Ray Paternoster
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Maryland - Department of Criminology & Criminal Justice
Downloads 205 (186,147)
Citation 7

Abstract:

Loading...

computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior

46.

How Does Information Technology Capability Enable Digital Transformation? Considering the Mediating Roles of Agility

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 41 Posted: 31 Oct 2016
IBM Research, Independent, Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems, Independent and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 195 (194,810)

Abstract:

Loading...

Digital transformation, IT capability, Agility, Transformational leadership, Case studies, IT innovation, Strategy

47.

Culture and Media Effects on Group Decision Making Under Majority Influence

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Dongsong Zhang, Paul Benjamin Lowry, Xiaolan Fu, Lina Zhou and Boonlit Adipat
University of Maryland, Baltimore County, Virginia Polytechnic Institute & State University - Pamplin College of Business, Chinese Academy of Sciences (CAS) - Institute of Psychology, University of Maryland, Baltimore County and University of Maryland, Baltimore County
Downloads 188 (201,350)

Abstract:

Loading...

48.

Using Internet-Based, Distributed Collaborative Writing Tools to Improve Coordination and Group Awareness in Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003
Number of pages: 22 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 184 (205,209)
Citation 1

Abstract:

Loading...

Collaborative writing (CW), distributed work, group awareness, group support systems, group writing, media richness theory

49.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Anthony Vance, Paul Benjamin Lowry and Jeffrey A. Ogden
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Government of the United States of America - Institute of Technology
Downloads 182 (207,207)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

50.

Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations

Small Group Research (SGR), Vol. 38, No. 1, pp. 3-11, 2007
Number of pages: 16 Posted: 29 Mar 2007 Last Revised: 25 Aug 2009
Nicholas C. Romano, Paul Benjamin Lowry and Tom Roberts
Oklahoma State University-MSIS, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 179 (210,209)
Citation 1

Abstract:

Loading...

collaboration, small groups, virtual teams

51.

The Effects of Perceived Enjoyment and Perceived Risks on Trust Formation and Intentions to Use Online Payment Systems: New Perspectives from an Arab Country

Electronic Commerce Research and Applications (ECRA), vol. 19(3), pp. 33–43
Number of pages: 47 Posted: 22 Jul 2016 Last Revised: 29 Dec 2016
Kamel Rouibah, Paul Benjamin Lowry and Yujong Hwang
Kuwait University - Department of Quantitative Methods & Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and DePaul University
Downloads 177 (212,240)
Citation 1

Abstract:

Loading...

online payment, customer trust, perceived enjoyment, familiarity, propensity to trust, third-party seals, personal innovativeness, risk, intention to adopt, Kuwait

52.

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

Journal of Management Information Systems (JMIS), vol. 34(2), pp. 560–596
Number of pages: 64 Posted: 17 Apr 2017 Last Revised: 27 Nov 2017
Virginia Polytechnic Institute & State University - Pamplin College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Mississippi State University - Department of Management and Information Systems
Downloads 172 (217,559)
Citation 1

Abstract:

Loading...

Online Social Networks (OSNs), OSN Obsessive-Compulsive Disorder, OSN Addiction, OSN Belongingness, Need-To-Belong Theory, Uses and Gratifications Theory, Facebook

53.

A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals

IEEE Transactions on Professional Communication (IEEETPC), Vol. 50, No. 4, pp. 352-378, 2007
Number of pages: 28 Posted: 19 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Sean Humphreys, Jason Malwitz and Joshua Nix
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 171 (218,670)

Abstract:

Loading...

Business communication, journal influence, journal quality, journal rankings, journal survey, professional communication, scientometrics, technical communication, technology-based communication

54.

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance

Journal of Management Information Systems (JMIS), vol. 37(1), pp. 129-161
Number of pages: 76 Posted: 07 Aug 2019 Last Revised: 04 May 2020
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 170 (219,724)
Citation 3

Abstract:

Loading...

gamification; design science research (DSR); hedonic-motivation system adoption model (HMSAM); immersion; flow; security compliance; security education, training, and awareness (SETA)

55.

Seeking Middle-Range Theories in Information Systems Research

International Conference on Information Systems (ICIS 2015), Fort Worth, TX, December 13-18 (accepted September 16, 2015)
Number of pages: 20 Posted: 21 Oct 2015
Nik R. Hassan and Paul Benjamin Lowry
University of Minnesota - Duluth and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 169 (220,820)
Citation 1

Abstract:

Loading...

Information systems theory, middle-range theory, grand theory, concepts, propositions, theory construction

56.

Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

AIS Transactions on Human-Computer Interaction (THCI), vol. 8(3), pp. 88–130 (2016)
Number of pages: 44 Posted: 20 Sep 2016 Last Revised: 04 Oct 2016
Brigham Young University - Marriott School, West Texas A&M University, West Texas A&M University, West Texas A&M University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 166 (224,159)

Abstract:

Loading...

Mobile applications, location-based services, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, information privacy

57.

Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions

MIS Quarterly, Vol. 35(1), pp. 1–15 (ISSN- 0276-7783), 2011
Number of pages: 48 Posted: 02 Mar 2010 Last Revised: 30 Jun 2013
Douglas L. Dean, Paul Benjamin Lowry and Sean Humphreys
Brigham Young University - Information Systems Department, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 161 (230,022)

Abstract:

Loading...

Tenure standards, publication standards, publication benchmarks, faculty productivity, scientometrics, Carnegie Classification

58.

An Emerging Scholar's Guide to More Effective Citation of Sources and Management of Citations

Number of pages: 8 Posted: 22 Apr 2019
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 156 (236,342)

Abstract:

Loading...

citations, writing, citation managers, Ph.D. students

59.

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence

39th Annual Hawai'i International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Kauai, Hawaii, January 4-7, 2006 (doi: 10.1109/HICSS.2006.217).
Number of pages: 9 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Tom Roberts, Paul Benjamin Lowry, Paul Cheney and Ross Hightower
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida and University of Central Florida
Downloads 156 (236,342)

Abstract:

Loading...

communication, collaborative software, GSS, media richness, social presence, group size

60.

The Role of Mobile-Computing Self-Efficacy in Consumer Information Disclosure

Information Systems Journal (ISJ), vol. 25(4), pp. 637–667 (doi: 10.1287/isre.2015.0569)
Number of pages: 66 Posted: 12 May 2015 Last Revised: 21 Oct 2015
Brigham Young University - Marriott School, West Texas A&M University, Virginia Polytechnic Institute & State University - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 151 (242,727)
Citation 1

Abstract:

Loading...

Mobile-Computing Self-Efficacy, Location-Based Services, Trust, Perceived Risk, Privacy Calculus, Mobile Apps, Smartphones

61.

Improving Password Cyber-Security Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals

Information Technology for Development, vol. 20(2), pp. 196–213
Number of pages: 31 Posted: 12 Jul 2013 Last Revised: 08 Jun 2014
University of Arizona, University of Arizona - Department of Management Information Systems, University of Arizona - Department of Management Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 150 (244,055)
Citation 1

Abstract:

Loading...

password reuse, keystroke dynamics, protection motivation theory, just-in-time fear appeals, support vector machine, cyber-security, developing countries

62.

Creating Agile Organizations Through IT: The Influence of Internal IT Service Perceptions on IT Service Quality and IT Agility

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 211–226
Number of pages: 51 Posted: 31 May 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry and David Wilson
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 147 (248,056)
Citation 1

Abstract:

Loading...

IT service climate, internal IT service perceptions, IT service quality, IT agility, construct distinctiveness, IT strategy

63.

An Emerging Scholar’s Guide to Writing Theory-Based Post-Positivistic Academic Articles

Number of pages: 21 Posted: 11 Dec 2018
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 145 (250,834)

Abstract:

Loading...

scholarship, publishing, research articles, writing, post-postivism, theory building

64.

Examining the Intended and Unintended Consequences of Organisational Privacy Safeguards Enactment in Healthcare

European Journal of Information Systems (EJIS), 2017, vol. 26(1), pp. 37–65
Number of pages: 51 Posted: 11 May 2016 Last Revised: 24 Apr 2018
Rachida Parks, Heng Xu, Chao-Hsien Chu and Paul Benjamin Lowry
University of Arkansas at Little Rock - Department of Management, Pennsylvania State University - College of Information Sciences & Technology, Pennsylvania State University - College of Information Sciences & Technology and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 144 (252,196)
Citation 3

Abstract:

Loading...

Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework

65.

Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior

International Journal of Human-Computer Studies, vol. 71(12), pp. 1163-1173
Number of pages: 48 Posted: 10 Sep 2013 Last Revised: 01 Apr 2014
Brigham Young University - Marriott School, University of Alabama - Department of Information Systems, Statistics, and Management Science, University of Alabama - Department of Information Systems, Statistics, and Management Science, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Alabama - Department of Information Systems, Statistics, and Management Science
Downloads 141 (256,437)
Citation 1

Abstract:

Loading...

information privacy, information disclosure, location data, mobile devices, experimental methodology, privacy calculus

66.

Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use

Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
Number of pages: 10 Posted: 30 Jun 2013 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, Kamel Rouibah, Gregory D Moody and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, Kuwait University - Department of Quantitative Methods & Information Systems, University of Nevada, Las Vegas - College of Business and University of Oulu
Downloads 139 (259,386)

Abstract:

Loading...

whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons

67.

It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis

European Journal of Information Systems (EJIS) vol. 26(4), pp. 379-413, 2015
Number of pages: 74 Posted: 23 Aug 2015 Last Revised: 27 Aug 2017
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 137 (262,339)
Citation 3

Abstract:

Loading...

Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer

68.

An Evaluation of the Impact of Social Presence through Group Size and the Use of Collaborative Software on Group Member 'Voice' in Face-to-Face and Computer-Mediated Task Groups

IEEE Transactions on Professional Communication (IEEETPC), Vol. 49, No. 1, pp. 28-43, 2006
Number of pages: 17 Posted: 20 Jan 2006 Last Revised: 01 Sep 2009
Tom Roberts, Paul Benjamin Lowry and Paul Sweeney
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Dayton - School of Business Department of Management
Downloads 137 (262,339)
Citation 1

Abstract:

Loading...

Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration

69.

The Value of Distrust in Computer-Based Decision-Making Groups

43rd Annual Hawaii International Conference on System Sciences, Hawaii, January 5-8, 2010
Number of pages: 12 Posted: 14 Oct 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Georgia State University - Department of Computer Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - School of Accountancy
Downloads 136 (263,892)

Abstract:

Loading...

distrust, decision-making, groups, teams, collaboration, trust, CMC

70.

An Emerging Scholar’s Guide to the Leading International Information Systems and Business Analytics Research Resources and Publication Outlets

Number of pages: 17 Posted: 26 Mar 2020
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 134 (266,901)

Abstract:

Loading...

Information Systems, Analytics, Journal Rankings, Scientometrics, Tenure and Promotion

71.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 134 (266,901)
Citation 3

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

72.

The Application of Model Checking for Securing E-Commerce Transactions

Communications of the Association for Computing Machinery (CACM), Vol. 49, No. 6, pp. 97-101, 2006
Number of pages: 11 Posted: 26 Jan 2006 Last Revised: 25 Aug 2009
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 133 (268,391)

Abstract:

Loading...

model checking, e-commerce, security, money atomicity, goods atomicity, validated receipt

73.

Understanding Patients’ Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 15 Posted: 23 Nov 2014
Paul Benjamin Lowry, Dongsong Zhang and Dezhi Wu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County and University of South Carolina
Downloads 132 (269,922)

Abstract:

Loading...

healthcare, mobile healthcare system, patient compliance, trust, patient-doctor communication, patient planned behavior

74.

Standards and Verification for Fair-Exchange and Atomicity in E-Commerce Transactions

Information Sciences, Vol. 176, pp. 1045-1066, 2006
Number of pages: 28 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 128 (276,171)

Abstract:

Loading...

e-Business, e-commerce, protocols, model checking, money atomicity, goods atomicity, valid receipt, standards enforcement

Assessing the Impact of Premier Information Systems Research Over Time

Communications of the AIS (CAIS), Vol. 19, pp. 115-131, March 2007
Number of pages: 19 Posted: 29 Mar 2007 Last Revised: 03 Aug 2014
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arkansas at Fayetteville
Downloads 123 (285,813)

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems, IS field

Assessing the Impact of Premier Information Systems Research Over Time

Posted: 14 Nov 2005
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arkansas at Fayetteville

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems field, journal influence

76.

Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 244-253 (doi: 10.1109/HICSS.2002.993879)
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry, Conan Albrecht, James Lee and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)
Downloads 123 (284,562)
Citation 2

Abstract:

Loading...

Collaborative writing, user experiences, collaboration, group work

77.

Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 193-200, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 122 (286,314)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work, design

78.

Consulting at the Laser ISP (LISP) Company: Using Excel(TM) Metrics Capabilities to Solve Unstructured, Management Problems

Journal of Information System Education (JISE), Vol. 14, No. 4, pp. 353-359, 2003
Number of pages: 8 Posted: 14 Feb 2005 Last Revised: 05 Nov 2014
Douglas L. Dean and Paul Benjamin Lowry
Brigham Young University - Information Systems Department and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 122 (286,314)

Abstract:

Loading...

Excel, metrics, management consulting, internet service providers, help desk, Information Systems, customer service

79.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
Clay Posey, Paul Benjamin Lowry, Tom Roberts and Selwyn Ellis
University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 119 (291,495)
Citation 28

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

80.

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best-paper nomination), pp. 72-76, Montréal, December 8, 2007
Number of pages: 7 Posted: 07 Oct 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, Hitachi Consulting and University of Kansas - School of Business
Downloads 117 (294,926)
Citation 5

Abstract:

Loading...

Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli

81.

The Impact of Process Structure on Novice, Internet-Based, Asynchronous-Distributed Collaborative Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 48, No. 4, pp. 341-364, 2005
Number of pages: 25 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 111 (306,046)

Abstract:

Loading...

distributed group work, collaborative writing, process structure, collaboration, Internet-based

82.

The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises,

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 19 Posted: 22 May 2015
Kristijan Mirkovski, Paul Benjamin Lowry, Frederik von Briel and Libo Liu
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, UQ Business School and Swinburne University of Technology - Faculty of Business and Enterprise
Downloads 108 (311,916)

Abstract:

Loading...

Innovation intermediaries, open innovation, collaborative networks, SMEs, wine industry

83.

Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 16 Posted: 21 May 2015
Jun Zhang, Victor Dibia, Alexey Sodnomov and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, IBM Research, City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 104 (320,099)

Abstract:

Loading...

Wearables, Quantified Self 2.0, Self-disclosure, Healthcare Online Communities, Self-Presentation Theory, Hierarchical Linear Modelling  

84.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Gregory D Moody, Dennis Galletta and Anthony Vance
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 103 (322,151)

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

85.

Using the Thinklet Framework to Improve Distributed Collaborative Writing

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 4051-4060 (doi: 10.1109/HICSS.2002.994539).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 102 (324,197)

Abstract:

Loading...

Thinklets, collaborative writing, collaboration, facilitation, group work

86.

Using it Design to Prevent Cyberbullying

Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901
Number of pages: 64 Posted: 19 Jun 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 101 (326,291)
Citation 3

Abstract:

Loading...

Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure

87.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), vol. 30(4), pp. 1228–1247 (2019)
Number of pages: 46 Posted: 21 Mar 2019 Last Revised: 02 Jan 2020
AJ Burns, Tom Roberts, Clay Posey and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 99 (330,550)
Citation 5

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

88.

The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups

Journal of Management Information Systems, vol. 26(1), pp. 155–196 (doi: 10.2753/MIS0742-1222260107).
Number of pages: 61 Posted: 25 Aug 2009 Last Revised: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, Oklahoma State University-MSIS, University of Arizona and California State Polytechnic University, Pomona
Downloads 97 (334,963)

Abstract:

Loading...

Ultra-lean interactive media (ULIM), Audience response systems (ARS), Human Computer Interaction (HCI), collaboration, large groups, interactivity, ultra-lean interactivity, CMC Interactivity Model (CMCIM)

89.

Understanding Contributor Withdrawal from Online Communities: The Role of Cognitive Dissonance and Emotional Change

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 33 Posted: 23 Nov 2014
Ling Jiang, Paul Benjamin Lowry and Christian Wagner
Shenzhen University - Department of Marketing, Virginia Polytechnic Institute & State University - Pamplin College of Business and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 96 (337,209)

Abstract:

Loading...

Contributor withdrawal, cognitive dissonance, emotional change, sense-making, online communities

90.

Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation

Journal of the Association for Information Systems (JAIS), Vol. 10, No. 3, pp. 170-195.
Number of pages: 28 Posted: 21 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Tom Roberts, Douglas L. Dean and George M Marakas
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Brigham Young University - Information Systems Department and Florida International University (FIU)
Downloads 95 (339,484)

Abstract:

Loading...

Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software

91.

Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2172-2179, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 95 (339,484)
Citation 1

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work

92.

The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 10 Posted: 22 May 2015
Xiling Cui, Qiang Zhou and Paul Benjamin Lowry
Independent, Independent and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 94 (341,673)

Abstract:

Loading...

information and communication technology, knowledge sharing, in-role, extra-role, open innovation.

93.

Effects of Culture, Social Presence, and Group Composition on Trust in Technology-Supported Decision-Making Groups

Information Systems Journal (ISJ), Vol. 20, No. 3, pp. 297-315
Number of pages: 30 Posted: 25 Aug 2009 Last Revised: 05 Aug 2014
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 93 (344,038)
Citation 1

Abstract:

Loading...

94.

The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing

40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Big Island, Hawaii, January 3-6, 2007 (doi: 10.1109/HICSS.2007.546))
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 06 Oct 2009
Gregory D Moody, Taylor Michael Wells and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, California State University, East Bay and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 91 (348,775)

Abstract:

Loading...

interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE

95.

Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets

34th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6, 2001, pp. 2535-2543 (doi: 10.1109/HICSS.2001.9270
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 91 (348,775)

Abstract:

Loading...

XML, data mediation, collaboration, heterogeonous data

96.

The Process of Information Systems Theorizing as a Discursive Practice

Journal of Information Technology (JIT), vol. 34(3), pp. 198-220 (2019)
Number of pages: 57 Posted: 04 Feb 2019 Last Revised: 04 May 2020
Nik R. Hassan, Lars Mathiassen and Paul Benjamin Lowry
University of Minnesota - Duluth, Georgia State University - Center for Process Innovation (CEPRIN) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 90 (351,188)
Citation 3

Abstract:

Loading...

Information systems theory, theorizing, research methods, discursive practices, problematizing, paradigms, analogies, metaphors, myths, models and concepts

97.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Ross Hightower
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Central Florida
Downloads 85 (363,793)
Citation 7

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

98.

Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)

Number of pages: 42 Posted: 30 Jun 2013
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 85 (363,793)
Citation 3

Abstract:

Loading...

trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)

99.

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?

Journal of Management Information Systems (JMIS), vol. 33(4) 1209–1251
Number of pages: 61 Posted: 02 Nov 2016 Last Revised: 27 Feb 2017
Vincent Lai, Fujun Lai and Paul Benjamin Lowry
The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, University of Southern Mississippi - College of Business Administration and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 84 (366,387)
Citation 1

Abstract:

Loading...

Enterprise resource planning system (ERP), ERP assimilation, technology evaluation, technology imitation, diffusion of innovation (DOI) theory, China, adoption, assimilation

100.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 83 (369,019)

Abstract:

Loading...

101.

Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study

Information Systems Journal (ISJ), vol. 29(1), pp. 43-69, 2019
Number of pages: 60 Posted: 23 Oct 2017 Last Revised: 09 Jan 2019
John D'Arcy and Paul Benjamin Lowry
University of Delaware - Alfred Lerner College of Business and Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 81 (374,448)

Abstract:

Loading...

Compliance, Information Security Policies (ISPs), Security, Organisational Security, ISP Compliance, Rational Choice Theory (RCT), Affect, Mood, Mood States, Morality, Multilevel Analysis, Organisational Compliance, Theory of Planned Behaviour (TPB), Organisational Citizenship Behaviours (OCBs)

102.

Proposing the Hedonic Affect Model (HAM) to Explain How Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences, Paris, France, December 13. All Sprouts Content, vol. 8(24), paper 230, pp. 1-51
Number of pages: 59 Posted: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, University of Arizona - Department of Management Information Systems and University of Arkansas
Downloads 81 (374,448)
Citation 1

Abstract:

Loading...

affect, expectations disconfirmation, stimulus, attention, perceived affective quality, hedonic systems

103.

Using the Control Balance Theory to Explain Social Media Deviance

Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI, January 4–7, pp. 2253–2262
Number of pages: 11 Posted: 31 Oct 2016 Last Revised: 13 Mar 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 80 (377,181)

Abstract:

Loading...

104.

Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies

Information Systems Journal, vol. 25(5), pp. 433-463 (2015)
Number of pages: 51 Posted: 09 Jun 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 80 (377,181)
Citation 3

Abstract:

Loading...

Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects

105.

Application of Expectancy Violations Theory to Communication with and Judgments About Embodied Agents During a Decision-Making Task

International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36, Forthcoming
Number of pages: 47 Posted: 15 Feb 2016 Last Revised: 09 May 2016
University of Arizona - Eller College of Management, University of Arizona, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School and University of Arizona - Department of Management Information Systems
Downloads 79 (379,896)
Citation 2

Abstract:

Loading...

Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making

106.

Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats

Journal of the Association for Information Systems (JAIS), Vol. 17(6) pp. 413-434, Forthcoming
Number of pages: 36 Posted: 26 Jan 2016 Last Revised: 28 Jun 2016
James Gaskin, Paul Benjamin Lowry and David Hull
Brigham Young University - Marriott School, Virginia Polytechnic Institute & State University - Pamplin College of Business and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 78 (382,642)
Citation 1

Abstract:

Loading...

Communication media, research dissemination, knowledge dissemination, scholarship, academic publishing, video media, multimedia instruction

107.

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites

HUMAN-COMPUTER INTERACTION, pp. 77-85, J. Jacko, ed., CRC, 2007, 12th International Conference on HCI, Beijing, Part 4, pp. 77-85, July 22-27, 2007
Number of pages: 10 Posted: 27 Sep 2009
Paul Benjamin Lowry, Tom Roberts and Trevor Higbee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and affiliation not provided to SSRN
Downloads 77 (385,536)

Abstract:

Loading...

trust, mere-exposure effect, familiarity, logos, swift trust, websites

108.

Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Journal of Management Information Systems (JMIS), Vol. 27, No. 1, pp. 181-207
Number of pages: 42 Posted: 24 Aug 2009 Last Revised: 27 Jul 2013
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)
Downloads 77 (385,536)

Abstract:

Loading...

109.

The 'Voice Effect' in Groups

The Second Annual Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS), Seattle, December 12-13, pp. 42-46
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts and Paul Benjamin Lowry
University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 77 (385,536)

Abstract:

Loading...

Human Computer Interaction, voice effect, collaboration

110.

Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Nicholas C. Romano and Randy Guthrie
Virginia Polytechnic Institute & State University - Pamplin College of Business, Oklahoma State University-MSIS and California State Polytechnic University, Pomona
Downloads 76 (388,425)

Abstract:

Loading...

ARS, audience response systems, large classrooms, education, interactivity, communication, status effects, satisfaction, active learning

111.

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Journal of Management Information Systems (JMIS), vol. 32(3), pp. 1–39 (doi: 10.1080/07421222.2015.1099180)
Number of pages: 53 Posted: 08 Aug 2015 Last Revised: 21 Oct 2015
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 75 (391,285)
Citation 3

Abstract:

Loading...

Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance

112.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Paul Benjamin Lowry, Clay Posey, Becky Bennett and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 74 (394,272)
Citation 6

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

113.

Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Environments

IEEE Transactions on Professional Communication (IEEETPC), Vol. 47, No. 3, pp. 171-189, 2004
Number of pages: 20 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), University of Arizona - Eller College of Management, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 73 (397,258)

Abstract:

Loading...

Collaborative tools, collaborative writing (CW), distributed education, distributed work, group writing, hybrid distributed education

114.

Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: The Role of Achievement Goals and Achievement Motivational Affordance

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 11 Posted: 02 Jul 2018
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 72 (400,290)

Abstract:

Loading...

wearable device, quantified-self, running platforms, physical activity maintenance, motivational affordance, achievement goal, mastery goal, performance goal

115.

Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 104–120
Number of pages: 83 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Paul Benjamin Lowry, Jun Zhang and Tailai Wu
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 71 (403,443)
Citation 3

Abstract:

Loading...

Digital Piracy, Piracy, Meta-Analysis, Literature Review, Social Cognitive Theory (SCT), Theory Building, Illegal File Sharing, Copyright Infringement, Neutralization, Sanctions, Morality, Costs, Benefits, Risks, Social Influence, Perceived Behavioral Control (PBC), Self-Efficacy

116.

Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach

Journal of the Association for Information Systems (JAIS), vol. 19(7), pp. 618-671
Number of pages: 72 Posted: 17 Aug 2017 Last Revised: 13 Oct 2018
Jack Hsu, Chao-Min Chiu, Paul Benjamin Lowry and T.P. Liang
Tamkang University, National Sun Yat-sen University, Virginia Polytechnic Institute & State University - Pamplin College of Business and National Sun Yat-sen University - College of Management
Downloads 70 (406,511)

Abstract:

Loading...

Formative Measurement, Fixed-Weight Redundancy Model (FWRM), Free-Estimation Model, Interpretational Confounding, Interpretational Ambiguity, MIMIC Model, Structural Equation Modeling (SEM), Partial Least Squares (PLS)

117.

When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior

Electronic Commerce Research and Applications, vol. 13(4), pp. 266-282
Number of pages: 55 Posted: 09 Jun 2014 Last Revised: 05 Apr 2015
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 70 (406,511)
Citation 1

Abstract:

Loading...

Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle

118.

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques

38th Annual Hawaii International Conference on System Sciences, Hawaii, 2005, January 3-6, pp. 1-10 (doi: 10.1109/HICSS.2005.310).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts, Paul Benjamin Lowry and Nicholas C. Romano
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Oklahoma State University-MSIS
Downloads 67 (416,113)

Abstract:

Loading...

Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups

119.

Dependability Auditing with Model Checking

11th Annual Americas Conference on Information Systems, Omaha, August 11-14, pp. 3147-3156
Number of pages: 11 Posted: 26 Apr 2005 Last Revised: 06 Oct 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 66 (419,453)

Abstract:

Loading...

Model checking, e-processes, web services, electronic contracting, dependability auditing

120.

Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2180-2185, 2002
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 01 Oct 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 65 (422,773)

Abstract:

Loading...

Proximity, collaborative writing, distributed groups, group work

121.

Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions

Proceedings of the Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 / 11.13, Cape Town, South Africa, June 14–15
Number of pages: 32 Posted: 21 May 2018
Kennedy Njenga and Paul Benjamin Lowry
University of Johannesburg and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 64 (426,134)

Abstract:

Loading...

Information System (IS) Security, Information Security Policy (ISP), Violations, Grounded Theory

122.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 64 (426,134)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

123.

Collaborating with Technology-Based Autonomous Agents: Issues and Research Opportunities

“Collaborating with technology-based autonomous agents: Issues and research opportunities,” Internet Research, vol. 30(1) 1-18
Number of pages: 24 Posted: 09 Jan 2020 Last Revised: 18 May 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, Saarland University, University of British Columbia (UBC) - Sauder School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 63 (429,537)
Citation 3

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences.

124.

Gender deception in asynchronous online communication: A path analysis

Information Processing & Management (IP&M), vol. 53(1), pp. 21–41
Number of pages: 49 Posted: 13 Jun 2016 Last Revised: 13 Mar 2017
Florida State University, Virginia Polytechnic Institute & State University - Pamplin College of Business, Mississippi State University - Department of Management and Information Systems, Florida State University and Florida State University, Students
Downloads 63 (429,537)

Abstract:

Loading...

Human Computer Interaction, Computer-Mediated Communication, Human Information Behavior, Gender, Deception, Online Game

125.

Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

Group Decision and Negotiation, vol. 24(4), pp.723-752
Number of pages: 54 Posted: 25 Aug 2014 Last Revised: 31 Jul 2015
Paul Benjamin Lowry, Ryan M. Schuetzler, Justin Giboney and Tom Gregory
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Arizona - Department of Management Information Systems and Georgia State University - Department of Computer Information Systems
Downloads 63 (429,537)

Abstract:

Loading...

Trust, distrust, groups, virtual teams, tasks, team performance, decision making, decision quality, collaboration

126.

Factors that Influence Interorganizational Use of Information and Communications Technology in Relationship-Based Supply Chains: Evidence from the Macedonian and American Wine Industries

Supply Chain Management: An International Journal (SCM), Vol., 21(3), 1-31, 2016, DOI: 10.1108/SCM-08-2015-0343
Number of pages: 37 Posted: 27 Nov 2015 Last Revised: 28 Jun 2016
Kristijan Mirkovski and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 61 (436,486)

Abstract:

Loading...

Supply chain integration, Developed economies, Developing economies, ICT use, SMEs, Wine industry.

127.

Social Media Use for Open Innovation Initiatives: Proposing the Semantic Learning-Based Innovation Framework (SLBIF)

IT Professional, vol. 18(6), pp. 26–32
Number of pages: 10 Posted: 28 Jul 2016 Last Revised: 27 Feb 2017
Kristijan Mirkovski, Frederik von Briel and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, UQ Business School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 60 (440,018)

Abstract:

Loading...

Open Innovation, Semantic Learning, Big Data, Social Media, Small and Medium Sized Enterprises

128.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Anthony Vance, Braden Molyneux, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 60 (440,018)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

129.

Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus, an Internet-Based Collaboration Tool

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003 (doi: 10.1109/tpc.2003.819650).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 60 (440,018)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus

130.

The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination

Computers & Security, vol. 75(June), pp. 147-166, 2018
Number of pages: 42 Posted: 06 Feb 2018 Last Revised: 30 Jun 2018
Phillip Menard, Merrill Warkentin and Paul Benjamin Lowry
University of South Alabama, Mississippi State University - Department of Management and Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 58 (447,287)
Citation 6

Abstract:

Loading...

protection motivation theory (PMT), psychological ownership, collectivism, individualism, information security behavior

131.

How Increased Social Presence Through Co-Browsing Influences User Engagement in Collaborative Online Shopping

Electronic Commerce Research and Applications (ECRA), vol. 24, (July-August 2017), pp. 84-99
Number of pages: 49 Posted: 07 Jul 2017 Last Revised: 02 Sep 2017
Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum and Thimo Schulze
City University of Hong Kong (CityU) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics, Virginia Polytechnic Institute & State University - Pamplin College of Business, Synchronite GmbH and Independent
Downloads 57 (451,015)

Abstract:

Loading...

Collaboration; user engagement; social presence; co-presence; e-commerce; social presence theory; online shopping; co-browsing

132.

An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism

Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019)
Number of pages: 78 Posted: 05 Aug 2019 Last Revised: 28 Oct 2019
Virginia Polytechnic Institute & State University - Pamplin College of Business, School of Management, University of Science and Technology of China, University of Nevada, Las Vegas - College of Business, University of Nevada, Las Vegas - Center for Entrepreneurship, City University of Hong Kong (CityU) - Department of Information Systems and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 55 (458,386)
Citation 2

Abstract:

Loading...

Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon

133.

The Effect of CIO Virtues on CIO Role Effectiveness

52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11
Number of pages: 10 Posted: 30 Oct 2018
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Virginia, University of Nevada, Las Vegas - College of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 55 (458,386)

Abstract:

Loading...

Virtues, Ethics, Organizational Leadership, Role Effectiveness, CIO, Information Technology, Executives

134.

Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, pp. 1-40
Number of pages: 42 Posted: 30 Jun 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 55 (458,386)

Abstract:

Loading...

control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, organizational mandatoriness, threat to freedom, boomerang effects, anger

135.

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security

Journal of Management Information Systems (JMIS), vol. 37(3), pp. 723-757
Number of pages: 62 Posted: 11 Jun 2020 Last Revised: 30 Nov 2020
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 54 (462,127)

Abstract:

Loading...

Information security (ISec) threats, fear appeals, protection motivation theory (PMT), construal-level theory (CLT), concrete, abstract

136.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 53 (466,023)
Citation 1

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

137.

The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups

40th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 53 (466,023)
Citation 5

Abstract:

Loading...

trust, culture, GSS, collaborative software, individualism, collectivism

138.

The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences (ICIS 2015), Fort Worth, TX, December 13–18
Number of pages: 38 Posted: 31 Oct 2016
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 51 (474,031)

Abstract:

Loading...

wearable device, quantified-self 2.0 platforms, health behavior maintenance, motivational affordance, self-efficacy

139.

The IS Core: An Integration of the Core IS Courses

Number of pages: 20 Posted: 31 Aug 2009
Conan Albrecht, Gregory D Moody, Marshall Romney and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 51 (474,031)

Abstract:

Loading...

: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum

140.

A Longitudinal Study of Information Privacy on Mobile Devices

47th Hawaiian International Conference on Systems Sciences (HICSS 2014), Big Island, Hawaii, January 6–9, 3149-3158
Number of pages: 11 Posted: 11 Sep 2013 Last Revised: 23 Nov 2014
Mark J. Keith, Jeffry Babb and Paul Benjamin Lowry
Brigham Young University - Marriott School, West Texas A&M University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 50 (478,087)

Abstract:

Loading...

mobile computing, mobile commerce, self-disclosure, privacy, privacy calculus

141.

‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 232–240
Number of pages: 21 Posted: 29 Jun 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, John D'Arcy, Bryan Hammer and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Delaware - Alfred Lerner College of Business and Economics, University of Oklahoma - Division of Management Information Systems (MIS) and University of Nevada, Las Vegas - College of Business
Downloads 49 (482,186)
Citation 9

Abstract:

Loading...

Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research

142.

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Information Systems Research (ISR) (accepted 15-Feb-2021)
Number of pages: 85 Posted: 22 Mar 2021
Florida International University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of New Mexico - Robert O. Anderson Schools of Management, UNLV and Xi'an Jiaotong University (XJTU)
Downloads 48 (486,262)

Abstract:

Loading...

Information security (ISec), extended parallel processing model (EPPM), protection motivation theory (PMT), organizational security

143.

Breaking Free from the Limitations of Classical Test Theory: Developing and Measuring Information Systems Scales Using Item Response Theory

Information & Management (I&M), vol. 54(2), pp. 189–203
Number of pages: 46 Posted: 09 Jun 2016 Last Revised: 27 Feb 2017
Thomas Rusch, Paul Benjamin Lowry, Patrick Mair and Horst Treiblmaier
Vienna University of Economics and Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Harvard University - Department of Psychology and MODUL University Vienna
Downloads 47 (490,654)

Abstract:

Loading...

Item Response Theory, Classical Test Theory, Scale Development, Rasch Model, Measurement, Measures, Hedonism, Reliability, Hedonic IS

144.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
AJ Burns, Clay Posey, Tom Roberts and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 46 (494,969)
Citation 5

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

145.

Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals’ Intent to Comply with New IT Security Policies

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 40 Posted: 30 Aug 2010 Last Revised: 27 Jul 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 43 (508,377)

Abstract:

Loading...

Control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, anger

146.

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Journal of Information Privacy and Security, vol. 9(4), pp. 52-79, 2013
Number of pages: 29 Posted: 26 Mar 2014 Last Revised: 28 Mar 2014
Jeffrey Wall, Prashant Palvia and Paul Benjamin Lowry
University of North Carolina (UNC) at Greensboro, University of North Carolina (UNC) at Greensboro - Bryan School of Business & Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 42 (512,945)
Citation 1

Abstract:

Loading...

Self-determination, reactance, efficacy, information security policy

147.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Paul Benjamin Lowry, Clay Posey, Tom Roberts and Becky Bennett
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 41 (517,683)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

148.

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature

Journal of the Association for Information Systems (JAIS) (accepted 20-Oct-2020)
Number of pages: 89 Posted: 28 Dec 2020
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 40 (522,415)

Abstract:

Loading...

information security (ISec), security threats, fear appeals, construal level theory (CLT), protection motivation theory (PMT), fear-appeal design, argument nature, temporal distance, organizational security, behavioral security

149.

Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention

Information & Management (I&M),vol. 57(July), Article 103235, pp. 1–15
Number of pages: 50 Posted: 13 Dec 2019 Last Revised: 24 Aug 2020
Dezhi Wu, Gregory D Moody, Jun Zhang and Paul Benjamin Lowry
University of South Carolina, University of Nevada, Las Vegas - College of Business, City University of Hong Kong and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 39 (527,233)
Citation 1

Abstract:

Loading...

Mobile device; mobile security; human–computer interaction(HCI); mobile applications (apps); perceived security; dual-task interference; mobile security notification (MSN)

150.

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms

Decision Sciences Journal (DSJ), vol. 50(1), pp. 7–45 (2018)
Number of pages: 50 Posted: 04 Mar 2018 Last Revised: 28 May 2019
Frederik von Briel, Christoph Schneider and Paul Benjamin Lowry
UQ Business School, University of Navarra, IESE Business School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 38 (532,071)

Abstract:

Loading...

Innovation, Absorptive Capacity, Social Integration, External Partners, Organizational Capabilities, Knowledge Absorption, Collaboration, Mechanisms

151.

Disentangling the Motivations for Organizational Insider Computer Abuse Through the Rational Choice and Life Course Perspectives

DATA BASE for Advances in Information Systems, vol.49 (April 2018), 81-102
Number of pages: 39 Posted: 10 Jan 2018 Last Revised: 05 May 2018
Robert Willison and Paul Benjamin Lowry
University of Newcastle and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 37 (537,075)
Citation 1

Abstract:

Loading...

computer abuse (CA), insider computer abuse (ICA), life course perspective (LCP), rational choice perspective (RCP), deterrence, employee computer abuse, organizational security, organizational insider, future directions for IS security research

152.

The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers’ Cognitive Gaps in IoT Settings

Hawaii International Conferences on Systems Sciences (HICSS-53), Maui, January 8–10, pp. 5076–5085
Number of pages: 12 Posted: 13 Dec 2019 Last Revised: 12 Jul 2021
Daeeun Choi, Paul Benjamin Lowry and G. Alan Wang
Virginia Tech, Virginia Polytechnic Institute & State University - Pamplin College of Business and Virginia Tech
Downloads 36 (542,190)

Abstract:

Loading...

privacy, Internet of Things

153.

Useful Products in Information Systems Theorizing: A Discursive Formation Perspective

Journal of the Association for Information Systems (JAIS) (accepted 24-June-2021)
Number of pages: 58 Posted: 13 Jul 2021
Nik R. Hassan, Paul Benjamin Lowry and Lars Mathiassen
University of Minnesota - Duluth, Virginia Polytechnic Institute & State University - Pamplin College of Business and Georgia State University - Center for Process Innovation (CEPRIN)
Downloads 35 (547,458)
Citation 1

Abstract:

Loading...

Information Systems (IS) theory, theorizing, discursive formation, question, paradigm, law, framework, myth, analogy, metaphor, model, concept, construct, hypothesis, statement, media richness theory

154.

Breaking Bad in Cyberspace: Understanding Why and How Black Hat Hackers Manage Their Nerves to Commit Their Virtual Crimes

Information Systems Frontiers (ISF), vol. 23 (April), pp. 329-341
Number of pages: 29 Posted: 11 Sep 2019 Last Revised: 12 Jul 2021
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 35 (547,458)

Abstract:

Loading...

Black hat hacker; security; criminology nerve management; general strain theory; routine activity theory (RAT)

155.

Why Do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011 Shanghai, China, December 3, All Sprouts Content, vol. 11(138), paper 453
Number of pages: 51 Posted: 30 Jun 2013
Paul Benjamin Lowry, Jeffrey Wall and James Selfridge
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of North Carolina (UNC) at Greensboro and Brigham Young University
Downloads 35 (547,458)

Abstract:

Loading...

HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies

156.

Information technology and organizational innovation: Harmonious information technology affordance and courage-based actualization

Journal of Strategic Information Systems (JSIS), vol. 29(1), March, Article 101596, pp. 1–23
Number of pages: 55 Posted: 30 Dec 2019 Last Revised: 04 May 2020
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 34 (552,826)
Citation 2

Abstract:

Loading...

IT affordance, innovation, matching fit, covariance fit, organizational courage, actualization

157.

User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit

Decision Support Systems, vol. 72(April), pp. 1-10 (doi: http://dx.doi.org/10.1016/j.dss.2015.02.005)
Number of pages: 31 Posted: 06 Apr 2015
Justin Giboney, Susan Brown, Paul Benjamin Lowry and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, University of Arizona - Eller College of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 34 (552,826)

Abstract:

Loading...

User acceptance, explanations, cognitive fit, recommendations

158.

The Assimilation of RFID Technology by Chinese Companies: A Technology Diffusion Perspective

Information & Management, vol. 52(6), pp. 628-642
Number of pages: 46 Posted: 14 May 2015 Last Revised: 29 Dec 2016
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 33 (558,244)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, DOI theory

159.

Why Students Engage in Cyber-Cheating Through a Collective Movement: A Case of Deviance and Collusion

Computers & Education (C&E), Vol. 125 (October), pp. 308-326
Number of pages: 40 Posted: 03 May 2018 Last Revised: 04 Aug 2018
University of Arkansas at Little Rock - Department of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arkansas at Little Rock, University of Arkansas - Little Rock and University of Central Oklahoma - College of Business
Downloads 31 (569,184)
Citation 1

Abstract:

Loading...

cyber-cheating, computer-mediated communication, pedagogical issues, social networking sites, qualitative

160.

Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable

Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS 2012), Maui, Hawaii, USA, January 4-7, pp. 4623-4632 (best paper nomination)
Number of pages: 11 Posted: 30 Jun 2013
Anthony Vance, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 31 (569,184)

Abstract:

Loading...

accountability, security, organizational security, least privilege, access, identifiability, evaluation, social presence

161.

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce

Pacific Asia Conference on Information Systems (PACIS) 2013, Jeju Island, Korea, June 18-22.
Number of pages: 14 Posted: 30 Jun 2013
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 31 (569,184)

Abstract:

Loading...

trust, distrust, online behaviour, ambivalence, e-commerce, situational abnormality, situational normality

162.

A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ That Needs to Be Fostered in Information Security Practitioners and How This Can Be Accomplished

Computers & Security (C&S), vol. 92, May, Article 101761
Number of pages: 44 Posted: 13 Mar 2020 Last Revised: 04 May 2020
Bongsik Shin and Paul Benjamin Lowry
San Diego State University - College of Business Administration and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 30 (574,949)
Citation 2

Abstract:

Loading...

Security; Organizational security (OrgSec); human factors of security; cyberthreat intelligence (CTI); risk management; triarchic theory of intelligence (TTI); CTI capability model (CTI-CM); information security officer; CTI practitioner; CTI analyst

163.

A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China

International Conference on ICT Management for Global Competitiveness and Economic Growth in Emerging Economies (ICTM 2012), Wroclaw, Poland, September 17-18, pp. 101-120
Number of pages: 21 Posted: 30 Jun 2013
Wei Jie, Paul Benjamin Lowry and Stefan Seedorf
City University of Hong Kong (CityU), Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Mannheim - Institute of Computer Science and Business Informatics
Downloads 30 (574,949)

Abstract:

Loading...

innovation diffusion, assimilation, RFID technology, TOE framework, stage-based model

164.

What Signal is Your Inspection Team Sending to Each Other? Using a Shared Collaborative Interface to Improve Shared Cognition and Implicit Coordination in Error-Detection Teams

International Journal of Human-Computer Studies, Vol. 71(4), pp. 455-474 (doi: 10.1016/j.ijhcs.2012.11.004)
Number of pages: 57 Posted: 18 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Tom Roberts and Nicholas C. Romano
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Oklahoma State University-MSIS
Downloads 30 (574,949)

Abstract:

Loading...

Implicit Coordination, Implicit Coordination Theory, Shared Cognition, Signal Detection Theory, Collaborative Software, Error Detection, Explicit Coordination

165.

Institutional Governance and Protection Motivation: Theoretical Insights into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World

Computers & Security (C&S), vol. 87 (November, 2019), article Article 101594
Number of pages: 42 Posted: 19 Aug 2019 Last Revised: 30 Nov 2019
Sadaf Hina, Dominic Dhanapal and Paul Benjamin Lowry
Universiti Teknologi Petronas, Universiti Teknologi Petronas and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 29 (580,852)
Citation 4

Abstract:

Loading...

Information security policy (ISP), Information security policy compliance (ISPC), behavior, protection motivation, institutional governance (IG), higher education institutions (HEIs), protection motivation theory (PMT), theory of planned behavior (TPB)

166.

The Agent Bidding Habit and Use Model (ABHUM) and Its Validation in the Taobao Online Auction Context

Information & Management (I&M), Vol. 54(3), pp. 281-289, April 2017
Number of pages: 36 Posted: 30 Jul 2016 Last Revised: 24 Apr 2018
Xiling Cui, Nan Zhang and Paul Benjamin Lowry
Independent, Tsinghua University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 29 (580,852)
Citation 1

Abstract:

Loading...

Bidding agents, Agent bidding, Online auctions, Habit, Taobao, E-commerce, China

167.

Reinventing Collaboration with Autonomous Technology-Based Agents

In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8-14, 2019. ISBN 978-1-7336325-0-8 Panels.
Number of pages: 7 Posted: 06 Jan 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, affiliation not provided to SSRN, University of British Columbia (UBC) - Sauder School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 28 (586,995)

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences

168.

Does Opportunity Make the Thief? Abilities and Moral Disengagement in Illegal Downloading

Behaviour & Information Technology (BIT), vol. 38(12), pp. 1273-1289 (2019)
Number of pages: 54 Posted: 08 Mar 2019 Last Revised: 30 Nov 2019
University of Milano-Bicocca, University of Bergamo - Department of Human and Social Sciences, University of Milano-Bicocca, University of Milano-Bicocca and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 28 (586,995)

Abstract:

Loading...

piracy, digital piracy, illegal file sharing, copyright infringement, social cognitive theory (SCT), neutralisation, moral obligation, morality, theory of planned behaviour (TPB), moral disengagement, perceived behavioural control (PBC), self-efficacy, subjective norms

169.

Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA)

Forthcoming in ACIS 2016 JAIS Workshop Advances in Qualitative IS Research Methodologies, Sydney, Australia, November 30
Number of pages: 5 Posted: 31 Oct 2016
Robert Willison, Paul Benjamin Lowry and Richard Baskerville
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and Georgia State University
Downloads 28 (586,995)

Abstract:

Loading...

security, organizational security, qualitative methods

170.

A Contingency Model of Bidding Strategies in Online Auctions in China

Pacific Asia Journal of the Association for Information Systems (PAJAIS), vol. 8(2), pp. 47–62
Number of pages: 27 Posted: 22 Jul 2016 Last Revised: 05 Sep 2016
Xiling Cui, Lai Law, Paul Benjamin Lowry and Qiuzhen Wang
Independent, Hong Kong Shue Yan University, Virginia Polytechnic Institute & State University - Pamplin College of Business and Zhejiang University - School of Management
Downloads 28 (586,995)
Citation 1

Abstract:

Loading...

Bidding strategies, Bidders, Online auctions, Qualitative research, China, Bidding motivations

171.

Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment

Journal of Management Information Systems, Vol. 28, No. 1, pp. 201-234, 2011
Number of pages: 47 Posted: 15 Aug 2011 Last Revised: 12 Jun 2014
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona
Downloads 28 (586,995)

Abstract:

Loading...

credibility assessment, decision support systems, indirect cues elicitation, linguistic analysis, signal detection theory

172.

How Do Bidders’ Organism Reactions Mediate Auction Stimuli and Bidder Loyalty in Online Auctions? The Case of Taobao in China

Information & Management (I&M), vol. 53 (2016), pp. 609-624
Number of pages: 46 Posted: 01 Feb 2016 Last Revised: 28 Jul 2016
Xiling Cui, Vincent Lai and Paul Benjamin Lowry
Independent, The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 27 (593,153)
Citation 1

Abstract:

Loading...

S-O-R model, evolutionary S-O-R model, bidder loyalty, online auctions, organism

173.

Digital Borders, Location Recognition, and Experience Attribution Within a Digital Geography

Journal of Management Information Systems (JMIS), vol. 36(2), pp. 418–449
Number of pages: 56 Posted: 21 Mar 2019 Last Revised: 25 Jun 2019
Brian Dunn, Dennis Galletta, Narayan Ramasubbu and Paul Benjamin Lowry
Utah State University - Department of Business Information Systems, University of Pittsburgh and Director, Katz Doctoral Program, University of Pittsburgh - Management Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 26 (599,575)

Abstract:

Loading...

digital borders, digital geography, online experience, attribution, experiment, space and place theory, memory, website design

174.

Developing and Measuring IS Scales Using Item Response Theory

34th International Conference on Information Systems (ICIS 2013), Milan, Italy, December 15-18, pp. 1-16, 2013
Number of pages: 17 Posted: 30 Jun 2014 Last Revised: 07 Dec 2014
Thomas Rusch, Patrick Mair, Paul Benjamin Lowry and Horst Treiblmaier
Vienna University of Economics and Business, Harvard University - Department of Psychology, Virginia Polytechnic Institute & State University - Pamplin College of Business and MODUL University Vienna
Downloads 26 (599,575)

Abstract:

Loading...

Item Response Theory, Rasch Model, Partial Credit Model, Measurement, Hedonism, Hedonic Information Systems, Classical Test Theory

175.

Does More Accessibility Lead to More Disclosure? Exploring the Influence of Information Accessibility on Self-Disclosure in Online Social Networks

Information Technology & People (IT&P) (accepted 28-July-2018)
Number of pages: 37 Posted: 14 Aug 2018
Shanshan Zhang, Ron Kwok, Paul Benjamin Lowry and Zhiying Liu
City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Science and Technology of China (USTC)
Downloads 24 (612,919)

Abstract:

Loading...

Online social network (OSN), self-disclosure, information accessibility, social exchange beliefs

176.

Automated and Participative Decision Support in Computer-Aided Credibility Assessment

8th Annual Special Interest Group on Human-Computer Interaction 2009 Pre-ICIS Workshop, Scottsdale, December 2009
Number of pages: 6 Posted: 14 Oct 2009 Last Revised: 27 Jul 2013
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona
Downloads 24 (612,919)

Abstract:

Loading...

Credibility Assessment, Signal Detection Theory, Linguistic Analysis, Indirect Cues Elicitation, Decision Support Systems

177.

Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

Proceedings of the 16th Annual Americas Conference on Information Systems, Lima, Peru, August 12-15
Number of pages: 11 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
James V. Hansen, Paul Benjamin Lowry and Rayman Meservy
Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 23 (619,687)

Abstract:

Loading...

Data mining, intrusion detection, pattern discovery, rule-induction algorithms, link analysis

178.

Creating Automated Plans for Semantic Web Applications Through Planning as Model Checking

Expert Systems with Applications (ESWA), Vol. 47, No.1, 2009
Number of pages: 35 Posted: 24 Aug 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 23 (619,687)

Abstract:

Loading...

semantic web, model checking, formal methods, software engineering for Internet projects, artificial intelligence, agents, planning as model checking

179.

Research Opinion: A Storyteller’s Guide to Problem-Based Learning for Information Systems Management Education

Information Systems Journal (ISJ), 29(5), pp. 1040–1057
Number of pages: 33 Posted: 17 Jan 2019 Last Revised: 09 Sep 2019
David Hull, Paul Benjamin Lowry, James Gaskin and Kristijan Mirkovski
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 21 (633,743)
Citation 1

Abstract:

Loading...

Narrative animated video (NAV), storytelling, multimedia learning, motivation theory, theory-driven multimedia design, information systems (IS) research leadership, problem-based learning

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web-Vendor Trust

Information & Management, vol. 51(5), pp. 579–594
Number of pages: 66 Posted: 26 Mar 2014 Last Revised: 19 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Georgia State University, University of Arizona and Brigham Young University - Department of Information Systems
Downloads 13 (718,486)

Abstract:

Loading...

Website design, trust, emotion, affect, affect infusion, Web site performance, Affect-Trust Infusion Model (ATIM)

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011, Shanghai, China, December 3, All Sprouts Content, vol. 11(136), paper 451.
Number of pages: 41 Posted: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona, University of Arizona - Department of Management Information Systems and Georgia State University
Downloads 8 (761,310)

Abstract:

Loading...

trust, affect infusion, positive website performance, positive emotion, cognition, Affect-Trust Infusion Model, trust transference

181.

The Nonlinear Influence of Harmonious Information Technology Affordance on Organizational Innovation

Information Systems Journal (ISJ) vol. 31(2), pp. 294-322
Number of pages: 59 Posted: 23 Nov 2020 Last Revised: 21 Mar 2021
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 18 (655,096)

Abstract:

Loading...

Organizational Innovation, Harmonious Information Technology Affordance (HITA), Nonlinearity, Quadratic Relationship, U-Shaped Curve

182.

The Efficiency–Exposure Paradox: Reconciling the Conflicting Effects of Measured Website Browsing Behaviors for Non-Transactional Outcomes

Association for Information Systems Transactions on Human-Computer Interaction (THCI) (accepted 14-Mar-2021)
Number of pages: 59 Posted: 08 Apr 2021
Utah State University - Department of Business Information Systems, University of Pittsburgh - Katz Graduate School of Business, University of Oklahoma - Michael F. Price College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 17 (662,242)

Abstract:

Loading...

Mere Exposure, Cognitive Attitude Formation, Website Design, Interface Design, Brand Attitude, Information Recall

183.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 17 (662,242)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy

184.

Investigation of Radio-Frequency Identification Assimilation Process in China: A Stage-Based Model Perspective

Electronic Journal of Information Systems in Developing Countries Vol. 57(4), 1-17
Number of pages: 18 Posted: 04 Jun 2013
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 17 (662,242)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, stage-based model, emerging economies

185.

The Effects of Bidder Factors on Online Bidding Strategies: A Motivation-Opportunity-Ability (MOA) Model

Decision Support Systems (DSS), vol. 138(November), Article 113397
Number of pages: 36 Posted: 23 Nov 2020
Xiling Cui, Vincent Lai, Paul Benjamin Lowry and Yang Lei
Independent, The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, Virginia Polytechnic Institute & State University - Pamplin College of Business and Southern University of Science and Technology
Downloads 15 (676,944)

Abstract:

Loading...

Online Auctions; Bidding Strategy; Risk Preference; E-Commerce; Motivation-Opportunity-Ability (MOA)

186.

Visual Storytelling for Improving the Comprehension and Utility in Disseminating Information Systems Research: Evidence from a Quasi-Experiment

Information Systems Journal (ISJ), vol. 29(6), pp. 1153-1177 (2019)
Number of pages: 46 Posted: 08 Mar 2019 Last Revised: 30 Nov 2019
Kristijan Mirkovski, David Hull, James Gaskin and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, Brigham Young University - Marriott School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 15 (676,944)
Citation 1

Abstract:

Loading...

visual storytelling, video stories, scholarly knowledge dissemination, cognitive learning theory, cognitive theory of multimedia learning, deep processing

187.

Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior

Hawaii International Conference on Systems Sciences (HICSS 2015), Kauai, HI, January 5–8 (accepted 17-Aug-2014)
Number of pages: 10 Posted: 10 Dec 2014
Dezhi Wu, Paul Benjamin Lowry and Dongsong Zhang
University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Maryland, Baltimore County
Downloads 15 (676,944)

Abstract:

Loading...

188.

Desperately Seeking the Artefacts and the Foundations of Native Theory in Gamification Research: Why Information Systems Researchers Can Play a Legitimate Role in this Discourse and How They Can Better Contribute

European Journal of Information Systems (EJIS), vol. 29(6) pp. 609–620
Number of pages: 76 Posted: 16 Dec 2020 Last Revised: 30 Dec 2020
Paul Benjamin Lowry, Stacie Petter and J. M. Leimeister
Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and University of St. Gallen
Downloads 12 (700,371)

Abstract:

Loading...

Gamification; information systems (IS); discourse; discursive thinking; IS–gamification discourse; artefacts of theory; gamification artefact; theory building; native theory; taxonomies; constructs

189.

Stock Market Reactions to Favorable and Unfavorable Information Security Events: A Systematic Literature Review

Computers & Security (C&S), Forthcoming
Number of pages: 65 Posted: 30 Sep 2021
Universiti Teknologi Petronas, Universiti Teknologi Petronas, Universiti Teknologi Petronas, Virginia Polytechnic Institute & State University - Pamplin College of Business, Virginia Polytechnic Institute & State University, Department of Business Information Technology and Universiti Teknologi Petronas
Downloads 10 (715,881)

Abstract:

Loading...

Event study methodology (ESM), information security (ISec) breaches, systematic literature review (SLR), ISec events, ISec investments, efficient market hypothesis, contingency factors, abnormal returns

190.

Patients’ Compliance Behavior in a Personalized Mobile Patient Education System (PMPES) Setting: Rational, Social, or Personal Choices?

International Journal of Medical Informatics (IJMI) (accepted 02-Oct-2020)
Number of pages: 46 Posted: 23 Nov 2020
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang and Rachida Parks
University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business, The University of North Carolina at Charlotte and University of Arkansas at Little Rock - Department of Management
Downloads 10 (715,881)

Abstract:

Loading...

Compliance, Adherence, Rational Choice Theory (RCT), Theory of Planned Behavior (TPB), mHealth, Cost-Benefit Analysis, Personalized Mobile Patient Education System (PMPES)

191.

Explaining Opposing Compliance Motivations Towards Organizational Information Security Policies

46th Annual Hawaii International Conference on System Sciences (HICSS 2013), Mauii, Hawaii, USA, January 7-10
Number of pages: 11 Posted: 30 Jun 2013
Paul Benjamin Lowry and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 9 (723,883)

Abstract:

Loading...

security, policy compliance, reactance, organizational security

192.

The Influence of Role Stress on Self-Disclosure on Social Networking Sites: A Conservation of Resources Perspective

Information & Management (I&M), vol. 56(7), article 103147 (2019)
Number of pages: 49 Posted: 07 Mar 2019 Last Revised: 30 Nov 2019
Shanshan Zhang, Ron Kwok, Paul Benjamin Lowry, Zhiying Liu and Ji Wu
City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Science and Technology of China (USTC) and National Sun Yat-sen University - College of Management
Downloads 7 (739,624)

Abstract:

Loading...

role stress, conservation of resources, self-presentation, motivation for relationship maintenance, self-disclosure

193.

The Roles of Prior Experience and the Location on the Severity of Supply Chain Disruptions

International Journal of Production Research, Forthcoming
Number of pages: 49 Posted: 05 Aug 2021
Florida Atlantic University - Department of Information Technology & Operations Management, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - Center for Entrepreneurship and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 6 (747,594)

Abstract:

Loading...

Supply chain disruptions (SCDs), Firm resilience, Organizational learning and knowledge acquisition, Archival research, Regression analysis

194.

Remind Me Later’ in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?

19th Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5
Posted: 03 Mar 2021
Jun Zhang, Dezhi Wu, Paul Benjamin Lowry and Gregory D Moody
School of Management, University of Science and Technology of China, University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Mobile security notification, MSN, deferred coping, choice deferral, HCI, dual-task interference

195.

'Human' in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks

Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5 (recipient of workshop’s “People’s Choice” award)
Posted: 01 Jan 2021
Dezhi Wu, Jun Zhang, Paul Benjamin Lowry and Gregory D Moody
University of South Carolina, School of Management, University of Science and Technology of China, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Inoculation theory, resiliency ratio, SETA, ISec, security training, phishing, attack messages

196.

Information Privacy Behavior in the Use of Facebook Apps: A Personality-Based Vulnerability Assessment

Heliyon, vol. 6(8), Article: e04714 (open access), 2020
Posted: 13 Oct 2020
Karl van der Schyff, Stephen Flowerday and Paul Benjamin Lowry
Rhodes University, Rhodes University and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

197.

Corporate Crisis Management on Social Media: A Morality Violations Perspective

Heliyon, vol. 6(7), Article: e04435, pp. 1–11 (open access), 2020
Posted: 13 Oct 2020
Bowen Zheng, Gongbing Bi, Hefu Liu, Hefu Liu and Paul Benjamin Lowry
Tsinghua University - School of Economics & Management, University of Science and Technology China, University of Science and Technology of China (USTC) - School of ManagementUniversity of Science and Technology of China (USTC) - School of Management and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

198.

The Physical Internet as a New Supply Chain Paradigm: A Systematic Literature Review and a Comprehensive Framework

International Journal of Logistics Management (IJLM), vol. 31(2), pp. 239–287 (open access), 2020
Posted: 13 Oct 2020
MODUL University Vienna, City University of Hong Kong (CityU) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and affiliation not provided to SSRN

Abstract:

Loading...

Physical Internet (PI), Systematic Literature Review (SLR), Citation Analysis, Thematic Analysis, Methodological Analysis, Logistics, Supply Chain Management (SCM)

199.

Interorganizational Cooperation and Supplier Performance in High-Technology Supply Chains

Heliyon, vol. 6(March), Article e03434, pp. 1–16, 2020
Posted: 01 Jun 2020
Monash University MalaysiaMonash University Malaysia, Virginia Polytechnic Institute & State University - Pamplin College of Business and MODUL University Vienna

Abstract:

Loading...

supply chain performance; interorganizational (IO) cooperation; relationship learning; buyer-supplier relationships; relationship marketing theory; social exchange theory; collaboration; electronics industry; global supply chain

200.

Enhancing Theoretical Contribution in Information Systems Research: The Case of Technology Adoption

27th European Conference on Information Systems (2019), Stockholm-Uppsala, Sweden, June 12–14 (accepted 28-Feb-2019)
Posted: 24 Jun 2019
Nik R. Hassan, Lars Mathiassen and Paul Benjamin Lowry
University of Minnesota - Duluth, Georgia State University - Center for Process Innovation (CEPRIN) and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

Information Systems Theory, Foucault, Contribution to Theory, Discursive Formation, Products of Theorizing, Novel Concepts

201.

How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach

The 3rd Pre-ICIS Workshop on the Digitization of the Individual (DOTI), International Conference on Information Systems (ICIS 2018), San Francisco, December 12
Posted: 29 May 2019
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

gamification, storytelling, social interdependence theory, competition, cooperation

202.

Proposing the Core Contributor Withdrawal Theory (CCWT) to Understand Core Contributor Withdrawal from Online Peer-Production Communities

Internet Research, vol. 28(4), pp. 988–1028
Posted: 02 May 2018 Last Revised: 13 Oct 2018
City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, University of North Carolina (UNC) at Greensboro, City University of Hong Kong (CityU) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

203.

Using Multistage Competing Risks Approaches to Model Web Page Transitions

Internet Research (IR), vol. 27(3), pp. 650–669, 2017
Posted: 03 Oct 2016 Last Revised: 27 Aug 2017
Patrick Mair, Horst Treiblmaier and Paul Benjamin Lowry
Harvard University - Department of Psychology, MODUL University Vienna and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

Survival Analysis, Clickstream Analysis, E-Commerce, Online Retailing, Competing Risks Models, Dwell-Time Analysis, Hazard Models, Website Interaction

204.

Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context

Journal of Global Information Management, vol. 23(3), pp. 41–70
Posted: 18 Nov 2014 Last Revised: 05 Apr 2015
Kamel Rouibah, Paul Benjamin Lowry and Laila Al-Mutairi
Kuwait University - Department of Quantitative Methods & Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Kuwait University - School of Business

Abstract:

Loading...

E-commerce, business-to-consumer (B2C), IS success model, satisfaction, service quality, perceived value, information quality, system quality, service quality, Kuwait, the Arab world

205.

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

Journal of Management Information Systems, vol. 31(3), pp. 106–137, DOI: 10.1080/07421222.2014.995535).
Posted: 20 Jun 2014 Last Revised: 02 Jun 2015
Nathan Twyman, Paul Benjamin Lowry, Judee K. Burgoon and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Autonomous scientifically controlled screening systems (ASCSS), Credibility assessment, Deception detection, Concealed information test (CIT), Orienting response, Defensive response, Automated screening kiosk (ASK), Eye tracking measures, Physical security, Design Science

206.

Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Posted: 30 Aug 2010
Anthony Vance, Gove N. Allen, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

accountability, identifiability, evaluation, IS security policies, computer abuse

207.

Evolutionary Development and Research on Internet-Based Collaborative Writing Tools and Processes to Enhance Ewriting in an Egovernment Setting

Decision Support Systems (DSS), Vol. 34, No. 3, pp. 229-252, 2002
Posted: 20 Jan 2006
Paul Benjamin Lowry, Conan Albrecht, Jay F. Nunamaker and James Lee
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Collaborative writing, group writing, eWriting, eGovernment, eGov, digital government, GSS, collaboration, group work, facilitation, distributed work, self-sustaining writing teams, multi-methodological research, collaborative systems development

208.

Familiarity Effects on Trust with Mobile Computing Device Websites

11th International Conference on HCI, Las Vegas, July 22-27, 2005
Posted: 21 Feb 2005 Last Revised: 02 Jul 2014
Paul Benjamin Lowry, Tom Roberts and Bryce Caine
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Brigham Young University - School of Accountancy

Abstract:

Loading...

Familiarity, Web, websites, usability, HCI, logos, interfaces

209.

Biometrics: A Critical Consideration in Information Security Management

ENCYCLOPEDIA OF MULTIMEDAI TECHNOLOGY AND NETWORKS, Margherita Pagani, ed., Idea Group Inc., pp. 69-75, 2005
Posted: 21 Feb 2005
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

biometrics, security, fraud

210.

Making Money with Open-Source Software Business Initiatives

in Margherita Pagani, ed. Encyclopedia of Multimedia Technology and Networks, Idea Group Inc., pp. 555-561
Posted: 21 Feb 2005
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

OSS, open-source software, business models

211.

The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes

Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
Paul Benjamin Lowry and Dennis C. Wilson
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona

Abstract:

Loading...

GSS, collaborative software, systems analysis and design, JAD, CASE, data modeling

212.

MIS Legitimacy and the Proposition of a New, Multi-Dimensional Model of MIS

Annual Conference of the Southern Association for Information Systems, 2002
Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management, University of Arizona, University of Arizona - Eller College of Management and University of Arizona

Abstract:

Loading...

MIS, IS, academics, IS discipline

Other Papers (1)

Total Downloads: 0
1.

Goals, Values, and Expectations of the AIS Family of Journals

Journal of the Association for Information Systems (JAIS), vol. 18(9), pp. 633–647
Posted: 03 Nov 2017 Last Revised: 10 May 2021
University of Central Florida, University of Oslo, University of Arizona - Eller College of Management, Indiana University - Kelley School of Business - Department of Operation & Decision Technologies, Governors State University, University of Pittsburgh and Director, Katz Doctoral Program, National Sun Yat-sen University - College of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business, Queensland University of TechnologyUniversity of Hamburg and University of Virginia

Abstract:

Loading...

AIS Journals, Journal Mission, Journal Review Processes, Journal Values, Replication, Open Science, Publication Ethics.