Paul Benjamin Lowry

Virginia Polytechnic Institute & State University - Pamplin College of Business

1016 Pamplin Hall

Blacksburg, VA 24061

United States

SCHOLARLY PAPERS

207

DOWNLOADS
Rank 720

SSRN RANKINGS

Top 720

in Total Papers Downloads

34,995

SSRN CITATIONS
Rank 1,512

SSRN RANKINGS

Top 1,512

in Total Papers Citations

201

CROSSREF CITATIONS

598

Scholarly Papers (207)

1.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 2,271 (7,048)
Citation 15

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

2.

Taking ‘Fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Journal of the Association for Information Systems, vol. 14(11), 617-671
Number of pages: 56 Posted: 18 Nov 2012 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, James Gaskin, Nathan Twyman, Bryan Hammer and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Arkansas - Department of Information Systems and University of Kansas - School of Business
Downloads 2,170 (7,615)
Citation 2

Abstract:

Loading...

Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation

3.

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management

Communications of the Association for Information Systems (CAIS), Vol. 17, No. 6, pp. 1-48, 2006
Number of pages: 49 Posted: 03 Feb 2006 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and My eBiz
Downloads 2,083 (8,137)

Abstract:

Loading...

online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education

4.

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Number of pages: 71 Posted: 18 May 2015 Last Revised: 27 Nov 2017
Bentley University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and Florida International University (FIU)
Downloads 1,239 (18,548)
Citation 7

Abstract:

Loading...

Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior

5.

Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

Journal of the Association for Information Systems (JAIS), Vol. 5, No. 2, pp. 29-80, 2004
Number of pages: 51 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Denton Romans and Aaron Mosiah Curtis
Virginia Polytechnic Institute & State University - Pamplin College of Business, PricewaterhouseCoopers LLP and Brigham Young University Hawaii
Downloads 968 (26,673)

Abstract:

Loading...

Information Systems, Journal Rankings, Journal Quality, Research Journals, Practitioner Journals, Reference Disciplines, Supporting Disciplines, Tenure, Academic Promotion, Management Information Systems, Computer Information Systems

6.

Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Journal of the Association for Information Systems, vol. 16(7), pp. 515-579
Number of pages: 81 Posted: 08 Dec 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry, James Gaskin and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School and University of Nevada, Las Vegas - College of Business
Downloads 886 (30,382)
Citation 4

Abstract:

Loading...

Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit

7.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 873 (30,995)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

8.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 858 (31,762)
Citation 3

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

9.

The Impact of Individualism-Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence

Journal of Management Information Systems (JMIS), Vol. 23, No. 4, pp. 53-80, 2007
Number of pages: 42 Posted: 31 May 2007 Last Revised: 25 Aug 2009
Dongsong Zhang, Paul Benjamin Lowry, Lina Zhou and Xiaolan Fu
University of Maryland, Baltimore County, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 753 (37,884)
Citation 1

Abstract:

Loading...

Majority influence, culture, social presence, computer-mediated communication (CMC), group diversity, virtual teams

10.

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?

MIS Quarterly Vol. 37(4), 993–1012
Number of pages: 63 Posted: 09 Dec 2012 Last Revised: 08 Jan 2018
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School, University of Pittsburgh and Director, Katz Doctoral Program, Brigham Young University - Department of Information Systems, California State University, Fullerton - Mihaylo College of Business & Economics and University of Arizona - Department of Management Information Systems
Downloads 743 (38,588)
Citation 4

Abstract:

Loading...

Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle

11.

Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 42 Posted: 23 Nov 2014 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Tailai Wu and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems and University of Oulu
Downloads 657 (45,651)

Abstract:

Loading...

Stalking, Cyberstalking, Shame, Neutralization, Self-control, Rational choice theory, Social learning theory of crime, Emotional theory of stalking, Self-control theory, Social media, Deviance

12.

A Taxonomy of Collaborative Writing to Improve Empirical Research, Writing Practice, and Tool Development

International Journal of Business Communication, Vol. 41, No. 1, pp. 66-99, 2004
Number of pages: 59 Posted: 14 Feb 2005 Last Revised: 04 May 2020
Paul Benjamin Lowry, Aaron Mosiah Curtis and Michelle Rene Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 634 (47,850)

Abstract:

Loading...

collaborative writing, taxonomy, collaboration, group awareness, collaborative writing software

13.

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning (SSSL) Model

Information Systems Research (ISR), vol. 27(4), pp. 962–986
Number of pages: 111 Posted: 26 Aug 2016 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems and University of Oulu
Downloads 618 (49,442)
Citation 2

Abstract:

Loading...

cyberbullying, cyberstalking, cyberharassment, social media, social media cyberbullying model (SMCBM), neutralization, anonymity, disinhibition, deindividuation, differential association, differential reinforcement, definition, imitation, social structure and social learning (SSSL) model, social lea

14.

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust

International Journal of Human-Computer Interaction, vol. 30(1), pp. 63-93
Number of pages: 77 Posted: 05 Jun 2013 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, David Wilson and Bill Haig
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems and Powerlogos Design
Downloads 570 (54,821)
Citation 2

Abstract:

Loading...

e-commerce, internet retailing, logos, credibility, surface credibility, logo design, branding, website design, trust, distrust, online consumers, online marketing, e-commerce, source credibility theory

15.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 542 (58,400)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

16.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
Clay Posey, Becky Bennett, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 497 (65,106)

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

17.

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess

Journal of the Association for Information Systems, vol. 17(1), pp. 39–76 ISSN: 1536-9323
Number of pages: 66 Posted: 28 May 2015 Last Revised: 26 Jan 2016
Jeffrey Wall, Paul Benjamin Lowry and Jordan B. Barlow
University of North Carolina (UNC) at Greensboro, Virginia Polytechnic Institute & State University - Pamplin College of Business and California State University, Fullerton - Mihaylo College of Business & Economics
Downloads 482 (67,578)
Citation 3

Abstract:

Loading...

selective organizational information privacy and security violations model (SOIPSVM), privacy, security, theory building, organizational privacy, organizational security, rule violations, policy violations, information abuse, SOIPSVM, PCI DSS, HIPPA, selective organizational rule violations model

18.

A Systematic Review of Social Networking Research in Information Systems

Communications of the Association for Information Systems, vol. 36(1)
Number of pages: 41 Posted: 18 Nov 2014 Last Revised: 31 Jul 2015
Jinwei Cao, Kamile Basoglu, Hong Sheng and Paul Benjamin Lowry
University of Delaware - Accounting & MIS, University of Delaware - Accounting & MIS, Missouri University of Science and Technology - Department of Business and Information Technology and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 456 (72,465)

Abstract:

Loading...

social networking (SN); social networking applications (SNAs); social media; literature review; systematic review; social networks; social network analysis; social computing; information systems (IS)

19.

Conceptualizing the Physical Internet: Literature Review, Implications and Directions for Future Research

11th CSCMP Annual European Research Seminar, Vienna, Austria, May 12–May 13
Number of pages: 19 Posted: 31 Oct 2016
Horst Treiblmaier, Kristijan Mirkovski and Paul Benjamin Lowry
MODUL University Vienna, City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 410 (82,115)
Citation 1

Abstract:

Loading...

Physical Internet (PI), systematic literature review, supply chain management (SCM)

20.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 385 (88,322)
Citation 3

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

21.

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing a Bold Research Agenda

European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563
Number of pages: 36 Posted: 02 Oct 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Tamara Dinev and Robert Willison
Virginia Polytechnic Institute & State University - Pamplin College of Business, Florida Atlantic University - School of Accounting and University of Newcastle
Downloads 367 (93,394)
Citation 9

Abstract:

Loading...

Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)

22.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, James Courtney and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 359 (95,744)

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

23.

Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It

IEEE Transactions on Professional Communication, vol. 57(2), pp. 123–146
Number of pages: 57 Posted: 19 Mar 2014 Last Revised: 08 Jun 2014
Paul Benjamin Lowry and James Gaskin
Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Marriott School
Downloads 353 (97,628)
Citation 8

Abstract:

Loading...

Theory building; partial least squares (PLS); structural equation modeling (SEM); causal inquiry; first-generation statistical techniques; second-generation statistical techniques

24.

Genetic Programming for Prevention of Cyberterrorism Through Dynamic and Evolving Intrusion Detection

Decision Support Systems (DSS), Vol. 43, No. 4, pp. 1362-1374
Number of pages: 32 Posted: 26 Jan 2006 Last Revised: 11 Apr 2015
James V. Hansen, Paul Benjamin Lowry, Rayman Meservy and Dan McDonald
Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems and University of Arizona - Eller College of Management
Downloads 331 (105,311)

Abstract:

Loading...

terrorism, cyberterrorism, intrusion detection, genetic programming

25.

Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals

Communications of the Association for Information Systems (CAIS), Vol. 20, No. 16, pp. 142-203, 2007
Number of pages: 64 Posted: 19 Oct 2007 Last Revised: 01 Sep 2014
Paul Benjamin Lowry, Gilbert G. Karuga and Vernon J. Richardson
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas and University of Arkansas at Fayetteville
Downloads 320 (108,960)
Citation 2

Abstract:

Loading...

research productivity, citation analysis, scientometrics, bibliometrics, information systems

26.

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems

Journal of Global Information Management (JGIM), Vol. 16, No. 1, pp. 61-92, 2008
Number of pages: 50 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Dongsong Zhang and Paul Benjamin Lowry
University of Maryland, Baltimore County and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 313 (111,569)

Abstract:

Loading...

culture, cross-cultural groups, collaboration, collaborative software, group support systems, distributed teams

27.

Privacy Concerns versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures

Journal of Management Information Systems, Vol. 27(4), pp. 163–200 (doi: 10.2753/MIS0742-1222270406), 2011
Number of pages: 66 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
Paul Benjamin Lowry, Jinwei Cao and Andrea Everard
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Delaware - Accounting & MIS and University of Delaware - Accounting & MIS
Downloads 273 (128,985)
Citation 4

Abstract:

Loading...

28.

Model Checking for E-Commerce Control and Assurance

IEEE Transactions on Systems, Man, and Cybernetics: Part C (IEEETSMCC), Vol. 35, No. 3, pp. 445-450, 2005
Number of pages: 7 Posted: 02 Aug 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 273 (128,985)

Abstract:

Loading...

e-business, model checking, atomicity, process and communication protocols, data typing

29.

The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?

Small Group Research (SGR), Vol. 37, No. 6, pp. 631-661, 2006
Number of pages: 39 Posted: 11 Sep 2006 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Oklahoma State University-MSIS, University of Central Florida and University of Central Florida
Downloads 269 (131,027)
Citation 3

Abstract:

Loading...

Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)

30.

Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17, best paper nomination (accepted 27-July-2014)
Number of pages: 19 Posted: 23 Nov 2014
Mark J. Keith, Courtenay Maynes, Paul Benjamin Lowry and Jeffry Babb
Brigham Young University - Marriott School, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and West Texas A&M University
Downloads 266 (132,563)

Abstract:

Loading...

privacy fatigue, information privacy, privacy controls, information disclosure, feature fatigue, field experiment

31.

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Information Systems Research, vol. 26(2), pp. 282-300
Number of pages: 39 Posted: 19 Jan 2015 Last Revised: 25 Oct 2015
Jack Hsu, Sheng-Pao Shih, Yu Hung and Paul Benjamin Lowry
Tamkang University, Tamkang University, Tamkang University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 265 (133,072)
Citation 4

Abstract:

Loading...

IS security; behavioral security; in-role behaviors; extra-role behaviors; social control theory (SCT); security management; information security policy (ISP); formal control; social control; organizations

32.

An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research

Communications of the Association for Information Systems (CAIS), Vol. 23, No. 3, pp. 37-62, 2008
Number of pages: 30 Posted: 04 Nov 2008 Last Revised: 25 Aug 2009
Brigham Young University Hawaii, California State University, East Bay, affiliation not provided to SSRN and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 263 (134,078)

Abstract:

Loading...

repertory grid, repgrid, personal construct theory, cognitive mapping

33.

Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy that are Necessary for Business-to-Business Electronic Marketplace Survival

Supply Chain Forum: An International Journal, Vol. 9, No. 1, pp. 92-110, 2008
Number of pages: 53 Posted: 01 Sep 2009
Government of the United States of America - Institute of Technology, Virginia Polytechnic Institute & State University - Pamplin College of Business, Colorado State University, Fort Collins - Department of Management and Arizona State University (ASU) - Supply Chain Management
Downloads 254 (138,952)

Abstract:

Loading...

electronic markets, business-to-business marketplaces, supply-chain strategy, strategy

34.

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 10 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 247 (142,863)

Abstract:

Loading...

interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations

35.

Defending Against Spear-Phishing: Motivating Users Through Fear Appeal Manipulations

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 12 Posted: 31 Oct 2016
Sebastian Schuetz, Paul Benjamin Lowry and Jason Thatcher
City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and affiliation not provided to SSRN
Downloads 244 (144,527)

Abstract:

Loading...

Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2016), Dublin, The Republic of Ireland, December 10
Number of pages: 31 Posted: 31 Oct 2016
Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 211 (165,707)

Abstract:

Loading...

Big data capability, customer agility, organization competitiveness

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

Proceedings of the 24th Annual Americas Conference on Information Systems (AMCIS 2018), New Orleans, August 16–18
Number of pages: 14 Posted: 21 May 2018
Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 32 (539,648)

Abstract:

Loading...

Big data, big data capability, theory building, IT agility, dynamic capability theory

37.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 241 (146,244)
Citation 2

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

38.

Model Checking for Design and Assurance of E-Business Processes

Decision Support Systems (DSS), Vol. 39, No. 3, pp. 333-344, 2005
Number of pages: 29 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 229 (153,611)

Abstract:

Loading...

e-Business, Model checking, Money atomicity, Goods atomicity, Valid receipt, Process and communication protocols

39.

Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2203-2211
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 229 (153,611)
Citation 3

Abstract:

Loading...

Heuristic evaluation, collaborative software, usability, HCI, distributed work

40.

The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications

Number of pages: 66 Posted: 30 Jun 2013
Brigham Young University - Marriott School, West Texas A&M University, Virginia Polytechnic Institute & State University - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 225 (156,222)
Citation 1

Abstract:

Loading...

location-based services, mobile computing, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, privacy

41.

New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2801-2812, 2003
Number of pages: 13 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Denton Romans
Virginia Polytechnic Institute & State University - Pamplin College of Business and PricewaterhouseCoopers LLP
Downloads 222 (158,243)

Abstract:

Loading...

IS journal rankings, academics, scientometrics

42.

Future Directions for Behavioral Information Security Research

Computers & Security, Vol. 32(1), pp. 90-101 (doi:10.1016/j.cose.2012.09.010)
Number of pages: 38 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Washington State University - Department of Management, Information Systems, and Entrepreneurship (MISE), University of Alabama at Birmingham - Department of Accounting and Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Zicklin School of Business, Baruch College - The City University of New York, Mississippi State University - Department of Management and Information Systems and Georgia State University
Downloads 221 (158,892)
Citation 5

Abstract:

Loading...

Information Security, Future Research, Behavioral Information Security, Research Challenges, Deviant Security Behavior

43.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
Clay Posey, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 202 (173,067)
Citation 6

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

44.

Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications

Association for Information Systems Transactions on Human-Computer Interaction (THCI), vol. 10(3), pp. 129–163
Number of pages: 36 Posted: 15 Jul 2018 Last Revised: 09 Jan 2019
Horst Treiblmaier, Lisa-maria Putz and Paul Benjamin Lowry
MODUL University Vienna, Upper Austria - University of Applied Sciences Upper Austria and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 192 (181,220)
Citation 4

Abstract:

Loading...

Gamification, Gamification Definition, Gamification Domain, Research Agenda, Theory Building, Theories in IS Research, Attitudinal Change, Behavioral Change, Nomological Network

45.

Culture and Media Effects on Group Decision Making Under Majority Influence

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Dongsong Zhang, Paul Benjamin Lowry, Xiaolan Fu, Lina Zhou and Boonlit Adipat
University of Maryland, Baltimore County, Virginia Polytechnic Institute & State University - Pamplin College of Business, Chinese Academy of Sciences (CAS) - Institute of Psychology, University of Maryland, Baltimore County and University of Maryland, Baltimore County
Downloads 187 (185,630)

Abstract:

Loading...

46.

How Does Information Technology Capability Enable Digital Transformation? Considering the Mediating Roles of Agility

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 41 Posted: 31 Oct 2016
Victor Dibia, Lele Kang, Ghazwan Hassna, Shaobo Wei and Paul Benjamin Lowry
IBM Research, Independent, Hawaii Pacific University - College of Business, Independent and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 184 (188,335)

Abstract:

Loading...

Digital transformation, IT capability, Agility, Transformational leadership, Case studies, IT innovation, Strategy

47.

Using Internet-Based, Distributed Collaborative Writing Tools to Improve Coordination and Group Awareness in Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003
Number of pages: 22 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 178 (193,906)
Citation 1

Abstract:

Loading...

Collaborative writing (CW), distributed work, group awareness, group support systems, group writing, media richness theory

48.

Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations

Small Group Research (SGR), Vol. 38, No. 1, pp. 3-11, 2007
Number of pages: 16 Posted: 29 Mar 2007 Last Revised: 25 Aug 2009
Nicholas C. Romano, Paul Benjamin Lowry and Tom Roberts
Oklahoma State University-MSIS, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 177 (194,822)
Citation 1

Abstract:

Loading...

collaboration, small groups, virtual teams

49.

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

“A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security,” Journal of the Association for Information Systems (JAIS), vol. 19(12), pp. 1187-1216, 2018
Number of pages: 48 Posted: 17 Jan 2018 Last Revised: 09 Jan 2019
Robert Willison, Paul Benjamin Lowry and Ray Paternoster
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Maryland - Department of Criminology & Criminal Justice
Downloads 175 (196,723)
Citation 4

Abstract:

Loading...

computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior

50.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Anthony Vance, Paul Benjamin Lowry and Jeffrey A. Ogden
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Government of the United States of America - Institute of Technology
Downloads 172 (199,662)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

51.

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

Journal of Management Information Systems (JMIS), vol. 34(2), pp. 560–596
Number of pages: 64 Posted: 17 Apr 2017 Last Revised: 27 Nov 2017
Virginia Polytechnic Institute & State University - Pamplin College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Mississippi State University - Department of Management and Information Systems
Downloads 168 (203,753)

Abstract:

Loading...

Online Social Networks (OSNs), OSN Obsessive-Compulsive Disorder, OSN Addiction, OSN Belongingness, Need-To-Belong Theory, Uses and Gratifications Theory, Facebook

52.

A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals

IEEE Transactions on Professional Communication (IEEETPC), Vol. 50, No. 4, pp. 352-378, 2007
Number of pages: 28 Posted: 19 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Sean Humphreys, Jason Malwitz and Joshua Nix
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 165 (206,849)

Abstract:

Loading...

Business communication, journal influence, journal quality, journal rankings, journal survey, professional communication, scientometrics, technical communication, technology-based communication

53.

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance

Journal of Management Information Systems (JMIS), vol. 37(1), pp. 129-161
Number of pages: 76 Posted: 07 Aug 2019 Last Revised: 04 May 2020
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 154 (219,298)
Citation 2

Abstract:

Loading...

gamification; design science research (DSR); hedonic-motivation system adoption model (HMSAM); immersion; flow; security compliance; security education, training, and awareness (SETA)

54.

Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions

MIS Quarterly, Vol. 35(1), pp. 1–15 (ISSN- 0276-7783), 2011
Number of pages: 48 Posted: 02 Mar 2010 Last Revised: 30 Jun 2013
Douglas L. Dean, Paul Benjamin Lowry and Sean Humphreys
Brigham Young University - Information Systems Department, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 154 (219,298)

Abstract:

Loading...

Tenure standards, publication standards, publication benchmarks, faculty productivity, scientometrics, Carnegie Classification

55.

The Effects of Perceived Enjoyment and Perceived Risks on Trust Formation and Intentions to Use Online Payment Systems: New Perspectives from an Arab Country

Electronic Commerce Research and Applications (ECRA), vol. 19(3), pp. 33–43
Number of pages: 47 Posted: 22 Jul 2016 Last Revised: 29 Dec 2016
Kamel Rouibah, Paul Benjamin Lowry and Yujong Hwang
Kuwait University - Department of Quantitative Methods & Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and DePaul University
Downloads 153 (220,410)
Citation 1

Abstract:

Loading...

online payment, customer trust, perceived enjoyment, familiarity, propensity to trust, third-party seals, personal innovativeness, risk, intention to adopt, Kuwait

56.

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence

39th Annual Hawai'i International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Kauai, Hawaii, January 4-7, 2006 (doi: 10.1109/HICSS.2006.217).
Number of pages: 9 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Tom Roberts, Paul Benjamin Lowry, Paul Cheney and Ross Hightower
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida and University of Central Florida
Downloads 153 (220,410)

Abstract:

Loading...

communication, collaborative software, GSS, media richness, social presence, group size

57.

The Role of Mobile-Computing Self-Efficacy in Consumer Information Disclosure

Information Systems Journal (ISJ), vol. 25(4), pp. 637–667 (doi: 10.1287/isre.2015.0569)
Number of pages: 66 Posted: 12 May 2015 Last Revised: 21 Oct 2015
Brigham Young University - Marriott School, West Texas A&M University, Virginia Polytechnic Institute & State University - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 149 (225,274)
Citation 1

Abstract:

Loading...

Mobile-Computing Self-Efficacy, Location-Based Services, Trust, Perceived Risk, Privacy Calculus, Mobile Apps, Smartphones

58.

Improving Password Cyber-Security Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals

Information Technology for Development, vol. 20(2), pp. 196–213
Number of pages: 31 Posted: 12 Jul 2013 Last Revised: 08 Jun 2014
University of Arizona, University of Arizona - Department of Management Information Systems, University of Arizona - Department of Management Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 140 (236,884)

Abstract:

Loading...

password reuse, keystroke dynamics, protection motivation theory, just-in-time fear appeals, support vector machine, cyber-security, developing countries

59.

Examining the Intended and Unintended Consequences of Organisational Privacy Safeguards Enactment in Healthcare

European Journal of Information Systems (EJIS), 2017, vol. 26(1), pp. 37–65
Number of pages: 51 Posted: 11 May 2016 Last Revised: 24 Apr 2018
Rachida Parks, Heng Xu, Chao-Hsien Chu and Paul Benjamin Lowry
University of Arkansas at Little Rock - Department of Management, Pennsylvania State University - College of Information Sciences & Technology, Pennsylvania State University - College of Information Sciences & Technology and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 139 (238,277)
Citation 3

Abstract:

Loading...

Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework

60.

Creating Agile Organizations Through IT: The Influence of Internal IT Service Perceptions on IT Service Quality and IT Agility

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 211–226
Number of pages: 51 Posted: 31 May 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry and David Wilson
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 138 (239,726)
Citation 1

Abstract:

Loading...

IT service climate, internal IT service perceptions, IT service quality, IT agility, construct distinctiveness, IT strategy

61.

Seeking Middle-Range Theories in Information Systems Research

International Conference on Information Systems (ICIS 2015), Fort Worth, TX, December 13-18 (accepted September 16, 2015)
Number of pages: 20 Posted: 21 Oct 2015
Nik R. Hassan and Paul Benjamin Lowry
University of Minnesota - Duluth and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 138 (239,726)
Citation 1

Abstract:

Loading...

Information systems theory, middle-range theory, grand theory, concepts, propositions, theory construction

62.

Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior

International Journal of Human-Computer Studies, vol. 71(12), pp. 1163-1173
Number of pages: 48 Posted: 10 Sep 2013 Last Revised: 01 Apr 2014
Brigham Young University - Marriott School, University of Alabama - Department of Information Systems, Statistics, and Management Science, University of Alabama - Department of Information Systems, Statistics, and Management Science, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Alabama - Department of Information Systems, Statistics, and Management Science
Downloads 134 (245,397)
Citation 1

Abstract:

Loading...

information privacy, information disclosure, location data, mobile devices, experimental methodology, privacy calculus

63.

Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use

Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
Number of pages: 10 Posted: 30 Jun 2013 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, Kamel Rouibah, Gregory D Moody and Mikko Siponen
Virginia Polytechnic Institute & State University - Pamplin College of Business, Kuwait University - Department of Quantitative Methods & Information Systems, University of Nevada, Las Vegas - College of Business and University of Oulu
Downloads 133 (246,857)

Abstract:

Loading...

whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons

64.

An Evaluation of the Impact of Social Presence through Group Size and the Use of Collaborative Software on Group Member 'Voice' in Face-to-Face and Computer-Mediated Task Groups

IEEE Transactions on Professional Communication (IEEETPC), Vol. 49, No. 1, pp. 28-43, 2006
Number of pages: 17 Posted: 20 Jan 2006 Last Revised: 01 Sep 2009
Tom Roberts, Paul Benjamin Lowry and Paul Sweeney
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Dayton - School of Business Department of Management
Downloads 132 (248,269)
Citation 1

Abstract:

Loading...

Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration

65.

The Value of Distrust in Computer-Based Decision-Making Groups

43rd Annual Hawaii International Conference on System Sciences, Hawaii, January 5-8, 2010
Number of pages: 12 Posted: 14 Oct 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Georgia State University - Department of Computer Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - School of Accountancy
Downloads 131 (249,709)

Abstract:

Loading...

distrust, decision-making, groups, teams, collaboration, trust, CMC

66.

Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

AIS Transactions on Human-Computer Interaction (THCI), vol. 8(3), pp. 88–130 (2016)
Number of pages: 44 Posted: 20 Sep 2016 Last Revised: 04 Oct 2016
Brigham Young University - Marriott School, West Texas A&M University, West Texas A&M University, West Texas A&M University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 130 (251,184)

Abstract:

Loading...

Mobile applications, location-based services, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, information privacy

67.

The Application of Model Checking for Securing E-Commerce Transactions

Communications of the Association for Computing Machinery (CACM), Vol. 49, No. 6, pp. 97-101, 2006
Number of pages: 11 Posted: 26 Jan 2006 Last Revised: 25 Aug 2009
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 130 (251,184)

Abstract:

Loading...

model checking, e-commerce, security, money atomicity, goods atomicity, validated receipt

68.

It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis

European Journal of Information Systems (EJIS) vol. 26(4), pp. 379-413, 2015
Number of pages: 74 Posted: 23 Aug 2015 Last Revised: 27 Aug 2017
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 128 (254,073)
Citation 2

Abstract:

Loading...

Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer

69.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 126 (257,120)
Citation 1

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

70.

Standards and Verification for Fair-Exchange and Atomicity in E-Commerce Transactions

Information Sciences, Vol. 176, pp. 1045-1066, 2006
Number of pages: 28 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 126 (257,120)

Abstract:

Loading...

e-Business, e-commerce, protocols, model checking, money atomicity, goods atomicity, valid receipt, standards enforcement

71.

An Emerging Scholar's Guide to More Effective Citation of Sources and Management of Citations

Number of pages: 8 Posted: 22 Apr 2019
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 121 (265,136)

Abstract:

Loading...

citations, writing, citation managers, Ph.D. students

72.

Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 244-253 (doi: 10.1109/HICSS.2002.993879)
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry, Conan Albrecht, James Lee and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)
Downloads 121 (266,726)
Citation 2

Abstract:

Loading...

Collaborative writing, user experiences, collaboration, group work

73.

Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 193-200, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 120 (266,726)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work, design

74.

Consulting at the Laser ISP (LISP) Company: Using Excel(TM) Metrics Capabilities to Solve Unstructured, Management Problems

Journal of Information System Education (JISE), Vol. 14, No. 4, pp. 353-359, 2003
Number of pages: 8 Posted: 14 Feb 2005 Last Revised: 05 Nov 2014
Douglas L. Dean and Paul Benjamin Lowry
Brigham Young University - Information Systems Department and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 119 (268,408)

Abstract:

Loading...

Excel, metrics, management consulting, internet service providers, help desk, Information Systems, customer service

75.

Understanding Patients’ Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 15 Posted: 23 Nov 2014
Paul Benjamin Lowry, Dongsong Zhang and Dezhi Wu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County and University of South Carolina
Downloads 117 (271,608)

Abstract:

Loading...

healthcare, mobile healthcare system, patient compliance, trust, patient-doctor communication, patient planned behavior

Assessing the Impact of Premier Information Systems Research Over Time

Communications of the AIS (CAIS), Vol. 19, pp. 115-131, March 2007
Number of pages: 19 Posted: 29 Mar 2007 Last Revised: 03 Aug 2014
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arkansas at Fayetteville
Downloads 116 (274,531)

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems, IS field

Assessing the Impact of Premier Information Systems Research Over Time

Posted: 14 Nov 2005
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arkansas at Fayetteville

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems field, journal influence

77.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
Clay Posey, Paul Benjamin Lowry, Tom Roberts and Selwyn Ellis
University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 110 (283,588)
Citation 28

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

78.

An Emerging Scholar’s Guide to the Leading International Information Systems and Business Analytics Research Resources and Publication Outlets

Number of pages: 17 Posted: 26 Mar 2020
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 109 (285,478)

Abstract:

Loading...

Information Systems, Analytics, Journal Rankings, Scientometrics, Tenure and Promotion

79.

An Emerging Scholar’s Guide to Writing Theory-Based Post-Positivistic Academic Articles

Number of pages: 21 Posted: 11 Dec 2018
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 108 (287,291)

Abstract:

Loading...

scholarship, publishing, research articles, writing, post-postivism, theory building

80.

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best-paper nomination), pp. 72-76, Montréal, December 8, 2007
Number of pages: 7 Posted: 07 Oct 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, Hitachi Consulting and University of Kansas - School of Business
Downloads 108 (287,291)
Citation 5

Abstract:

Loading...

Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli

81.

The Impact of Process Structure on Novice, Internet-Based, Asynchronous-Distributed Collaborative Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 48, No. 4, pp. 341-364, 2005
Number of pages: 25 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 108 (287,291)

Abstract:

Loading...

distributed group work, collaborative writing, process structure, collaboration, Internet-based

82.

The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises,

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 19 Posted: 22 May 2015
Kristijan Mirkovski, Paul Benjamin Lowry, Frederik von Briel and Libo Liu
City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, UQ Business School and Swinburne University of Technology - Faculty of Business and Enterprise
Downloads 105 (293,049)

Abstract:

Loading...

Innovation intermediaries, open innovation, collaborative networks, SMEs, wine industry

83.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Gregory D Moody, Dennis Galletta and Anthony Vance
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 103 (296,916)

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

84.

Using the Thinklet Framework to Improve Distributed Collaborative Writing

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 4051-4060 (doi: 10.1109/HICSS.2002.994539).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 100 (302,785)

Abstract:

Loading...

Thinklets, collaborative writing, collaboration, facilitation, group work

85.

Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 16 Posted: 21 May 2015
Jun Zhang, Victor Dibia, Alexey Sodnomov and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, IBM Research, City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 98 (306,780)

Abstract:

Loading...

Wearables, Quantified Self 2.0, Self-disclosure, Healthcare Online Communities, Self-Presentation Theory, Hierarchical Linear Modelling  

86.

Using it Design to Prevent Cyberbullying

Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901
Number of pages: 64 Posted: 19 Jun 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 97 (308,862)
Citation 3

Abstract:

Loading...

Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure

87.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), vol. 30(4), pp. 1228–1247 (2019)
Number of pages: 46 Posted: 21 Mar 2019 Last Revised: 02 Jan 2020
AJ Burns, Tom Roberts, Clay Posey and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 95 (312,920)
Citation 5

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

88.

The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 10 Posted: 22 May 2015
Xiling Cui, Qiang Zhou and Paul Benjamin Lowry
Independent, Independent and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 93 (317,208)

Abstract:

Loading...

information and communication technology, knowledge sharing, in-role, extra-role, open innovation.

89.

The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups

Journal of Management Information Systems, vol. 26(1), pp. 155–196 (doi: 10.2753/MIS0742-1222260107).
Number of pages: 61 Posted: 25 Aug 2009 Last Revised: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, Oklahoma State University-MSIS, University of Arizona and California State Polytechnic University, Pomona
Downloads 93 (317,208)

Abstract:

Loading...

Ultra-lean interactive media (ULIM), Audience response systems (ARS), Human Computer Interaction (HCI), collaboration, large groups, interactivity, ultra-lean interactivity, CMC Interactivity Model (CMCIM)

90.

Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2172-2179, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 93 (317,208)
Citation 1

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work

91.

Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation

Journal of the Association for Information Systems (JAIS), Vol. 10, No. 3, pp. 170-195.
Number of pages: 28 Posted: 21 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Tom Roberts, Douglas L. Dean and George M Marakas
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Brigham Young University - Information Systems Department and Florida International University (FIU)
Downloads 92 (319,405)

Abstract:

Loading...

Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software

92.

Understanding Contributor Withdrawal from Online Communities: The Role of Cognitive Dissonance and Emotional Change

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 33 Posted: 23 Nov 2014
Ling Jiang, Paul Benjamin Lowry and Christian Wagner
Shenzhen University - Department of Marketing, Virginia Polytechnic Institute & State University - Pamplin College of Business and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 90 (323,904)

Abstract:

Loading...

Contributor withdrawal, cognitive dissonance, emotional change, sense-making, online communities

93.

Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets

34th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6, 2001, pp. 2535-2543 (doi: 10.1109/HICSS.2001.9270
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 89 (326,203)

Abstract:

Loading...

XML, data mediation, collaboration, heterogeonous data

94.

The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing

40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Big Island, Hawaii, January 3-6, 2007 (doi: 10.1109/HICSS.2007.546))
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 06 Oct 2009
Gregory D Moody, Taylor Michael Wells and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, California State University, East Bay and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 87 (330,870)

Abstract:

Loading...

interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE

95.

The Process of Information Systems Theorizing as a Discursive Practice

Journal of Information Technology (JIT), vol. 34(3), pp. 198-220 (2019)
Number of pages: 57 Posted: 04 Feb 2019 Last Revised: 04 May 2020
Nik R. Hassan, Lars Mathiassen and Paul Benjamin Lowry
University of Minnesota - Duluth, Georgia State University - Center for Process Innovation (CEPRIN) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 86 (333,226)
Citation 2

Abstract:

Loading...

Information systems theory, theorizing, research methods, discursive practices, problematizing, paradigms, analogies, metaphors, myths, models and concepts

96.

Effects of Culture, Social Presence, and Group Composition on Trust in Technology-Supported Decision-Making Groups

Information Systems Journal (ISJ), Vol. 20, No. 3, pp. 297-315
Number of pages: 30 Posted: 25 Aug 2009 Last Revised: 05 Aug 2014
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 86 (333,226)
Citation 1

Abstract:

Loading...

97.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Ross Hightower
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Central Florida
Downloads 82 (342,910)
Citation 4

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

98.

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?

Journal of Management Information Systems (JMIS), vol. 33(4) 1209–1251
Number of pages: 61 Posted: 02 Nov 2016 Last Revised: 27 Feb 2017
Vincent Lai, Fujun Lai and Paul Benjamin Lowry
The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, University of Southern Mississippi - College of Business Administration and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 80 (347,926)
Citation 1

Abstract:

Loading...

Enterprise resource planning system (ERP), ERP assimilation, technology evaluation, technology imitation, diffusion of innovation (DOI) theory, China, adoption, assimilation

99.

Using the Control Balance Theory to Explain Social Media Deviance

Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI, January 4–7, pp. 2253–2262
Number of pages: 11 Posted: 31 Oct 2016 Last Revised: 13 Mar 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 79 (350,518)

Abstract:

Loading...

100.

Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study

Information Systems Journal (ISJ), vol. 29(1), pp. 43-69, 2019
Number of pages: 60 Posted: 23 Oct 2017 Last Revised: 09 Jan 2019
John D'Arcy and Paul Benjamin Lowry
University of Delaware - Alfred Lerner College of Business and Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 78 (353,136)

Abstract:

Loading...

Compliance, Information Security Policies (ISPs), Security, Organisational Security, ISP Compliance, Rational Choice Theory (RCT), Affect, Mood, Mood States, Morality, Multilevel Analysis, Organisational Compliance, Theory of Planned Behaviour (TPB), Organisational Citizenship Behaviours (OCBs)

101.

Proposing the Hedonic Affect Model (HAM) to Explain How Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences, Paris, France, December 13. All Sprouts Content, vol. 8(24), paper 230, pp. 1-51
Number of pages: 59 Posted: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, University of Arizona - Department of Management Information Systems and University of Arkansas
Downloads 76 (358,461)
Citation 1

Abstract:

Loading...

affect, expectations disconfirmation, stimulus, attention, perceived affective quality, hedonic systems

102.

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites

HUMAN-COMPUTER INTERACTION, pp. 77-85, J. Jacko, ed., CRC, 2007, 12th International Conference on HCI, Beijing, Part 4, pp. 77-85, July 22-27, 2007
Number of pages: 10 Posted: 27 Sep 2009
Paul Benjamin Lowry, Tom Roberts and Trevor Higbee
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and affiliation not provided to SSRN
Downloads 76 (358,461)

Abstract:

Loading...

trust, mere-exposure effect, familiarity, logos, swift trust, websites

103.

Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Nicholas C. Romano and Randy Guthrie
Virginia Polytechnic Institute & State University - Pamplin College of Business, Oklahoma State University-MSIS and California State Polytechnic University, Pomona
Downloads 76 (358,461)

Abstract:

Loading...

ARS, audience response systems, large classrooms, education, interactivity, communication, status effects, satisfaction, active learning

104.

The 'Voice Effect' in Groups

The Second Annual Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS), Seattle, December 12-13, pp. 42-46
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts and Paul Benjamin Lowry
University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 76 (358,461)

Abstract:

Loading...

Human Computer Interaction, voice effect, collaboration

105.

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Journal of Management Information Systems (JMIS), vol. 32(3), pp. 1–39 (doi: 10.1080/07421222.2015.1099180)
Number of pages: 53 Posted: 08 Aug 2015 Last Revised: 21 Oct 2015
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 75 (361,175)
Citation 3

Abstract:

Loading...

Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance

106.

Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats

Journal of the Association for Information Systems (JAIS), Vol. 17(6) pp. 413-434, Forthcoming
Number of pages: 36 Posted: 26 Jan 2016 Last Revised: 28 Jun 2016
James Gaskin, Paul Benjamin Lowry and David Hull
Brigham Young University - Marriott School, Virginia Polytechnic Institute & State University - Pamplin College of Business and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 74 (363,863)
Citation 1

Abstract:

Loading...

Communication media, research dissemination, knowledge dissemination, scholarship, academic publishing, video media, multimedia instruction

107.

Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies

Information Systems Journal, vol. 25(5), pp. 433-463 (2015)
Number of pages: 51 Posted: 09 Jun 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 74 (363,863)
Citation 1

Abstract:

Loading...

Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects

108.

Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)

Number of pages: 42 Posted: 30 Jun 2013
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 74 (363,863)
Citation 3

Abstract:

Loading...

trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)

109.

Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Journal of Management Information Systems (JMIS), Vol. 27, No. 1, pp. 181-207
Number of pages: 42 Posted: 24 Aug 2009 Last Revised: 27 Jul 2013
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)
Downloads 74 (363,863)

Abstract:

Loading...

110.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Paul Benjamin Lowry, Clay Posey, Becky Bennett and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 72 (369,428)
Citation 4

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

111.

Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Environments

IEEE Transactions on Professional Communication (IEEETPC), Vol. 47, No. 3, pp. 171-189, 2004
Number of pages: 20 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), University of Arizona - Eller College of Management, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 72 (372,250)

Abstract:

Loading...

Collaborative tools, collaborative writing (CW), distributed education, distributed work, group writing, hybrid distributed education

112.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 71 (372,250)

Abstract:

Loading...

113.

Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 104–120
Number of pages: 83 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Paul Benjamin Lowry, Jun Zhang and Tailai Wu
Virginia Polytechnic Institute & State University - Pamplin College of Business, City University of Hong Kong (CityUHK) - Department of Information Systems and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 70 (375,218)
Citation 1

Abstract:

Loading...

Digital Piracy, Piracy, Meta-Analysis, Literature Review, Social Cognitive Theory (SCT), Theory Building, Illegal File Sharing, Copyright Infringement, Neutralization, Sanctions, Morality, Costs, Benefits, Risks, Social Influence, Perceived Behavioral Control (PBC), Self-Efficacy

114.

Application of Expectancy Violations Theory to Communication with and Judgments About Embodied Agents During a Decision-Making Task

International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36, Forthcoming
Number of pages: 47 Posted: 15 Feb 2016 Last Revised: 09 May 2016
University of Arizona - Eller College of Management, University of Arizona, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School and University of Arizona - Department of Management Information Systems
Downloads 70 (375,218)
Citation 1

Abstract:

Loading...

Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making

115.

When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior

Electronic Commerce Research and Applications, vol. 13(4), pp. 266-282
Number of pages: 55 Posted: 09 Jun 2014 Last Revised: 05 Apr 2015
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 68 (381,061)
Citation 1

Abstract:

Loading...

Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle

116.

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques

38th Annual Hawaii International Conference on System Sciences, Hawaii, 2005, January 3-6, pp. 1-10 (doi: 10.1109/HICSS.2005.310).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts, Paul Benjamin Lowry and Nicholas C. Romano
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Oklahoma State University-MSIS
Downloads 66 (387,167)

Abstract:

Loading...

Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups

117.

Dependability Auditing with Model Checking

11th Annual Americas Conference on Information Systems, Omaha, August 11-14, pp. 3147-3156
Number of pages: 11 Posted: 26 Apr 2005 Last Revised: 06 Oct 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 64 (393,302)

Abstract:

Loading...

Model checking, e-processes, web services, electronic contracting, dependability auditing

118.

Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

Group Decision and Negotiation, vol. 24(4), pp.723-752
Number of pages: 54 Posted: 25 Aug 2014 Last Revised: 31 Jul 2015
Paul Benjamin Lowry, Ryan M. Schuetzler, Justin Giboney and Tom Gregory
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Arizona - Department of Management Information Systems and Georgia State University - Department of Computer Information Systems
Downloads 63 (396,547)

Abstract:

Loading...

Trust, distrust, groups, virtual teams, tasks, team performance, decision making, decision quality, collaboration

119.

Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2180-2185, 2002
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 01 Oct 2014
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 63 (396,547)

Abstract:

Loading...

Proximity, collaborative writing, distributed groups, group work

120.

Gender deception in asynchronous online communication: A path analysis

Information Processing & Management (IP&M), vol. 53(1), pp. 21–41
Number of pages: 49 Posted: 13 Jun 2016 Last Revised: 13 Mar 2017
Florida State University, Virginia Polytechnic Institute & State University - Pamplin College of Business, Mississippi State University - Department of Management and Information Systems, Florida State University and Florida State University, Students
Downloads 61 (403,043)

Abstract:

Loading...

Human Computer Interaction, Computer-Mediated Communication, Human Information Behavior, Gender, Deception, Online Game

121.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 61 (403,043)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

122.

Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions

Proceedings of the Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 / 11.13, Cape Town, South Africa, June 14–15
Number of pages: 32 Posted: 21 May 2018
Kennedy Njenga and Paul Benjamin Lowry
University of Johannesburg and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 60 (406,278)

Abstract:

Loading...

Information System (IS) Security, Information Security Policy (ISP), Violations, Grounded Theory

123.

Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus, an Internet-Based Collaboration Tool

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003 (doi: 10.1109/tpc.2003.819650).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 59 (409,639)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus

124.

Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach

Journal of the Association for Information Systems (JAIS), vol. 19(7), pp. 618-671
Number of pages: 72 Posted: 17 Aug 2017 Last Revised: 13 Oct 2018
Jack Hsu, Chao-Min Chiu, Paul Benjamin Lowry and T.P. Liang
Tamkang University, National Sun Yat-sen University, Virginia Polytechnic Institute & State University - Pamplin College of Business and National Sun Yat-sen University - College of Management
Downloads 58 (413,137)

Abstract:

Loading...

Formative Measurement, Fixed-Weight Redundancy Model (FWRM), Free-Estimation Model, Interpretational Confounding, Interpretational Ambiguity, MIMIC Model, Structural Equation Modeling (SEM), Partial Least Squares (PLS)

125.

Social Media Use for Open Innovation Initiatives: Proposing the Semantic Learning-Based Innovation Framework (SLBIF)

IT Professional, vol. 18(6), pp. 26–32
Number of pages: 10 Posted: 28 Jul 2016 Last Revised: 27 Feb 2017
Kristijan Mirkovski, Frederik von Briel and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, UQ Business School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 58 (413,137)

Abstract:

Loading...

Open Innovation, Semantic Learning, Big Data, Social Media, Small and Medium Sized Enterprises

126.

Factors that Influence Interorganizational Use of Information and Communications Technology in Relationship-Based Supply Chains: Evidence from the Macedonian and American Wine Industries

Supply Chain Management: An International Journal (SCM), Vol., 21(3), 1-31, 2016, DOI: 10.1108/SCM-08-2015-0343
Number of pages: 37 Posted: 27 Nov 2015 Last Revised: 28 Jun 2016
Kristijan Mirkovski and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 58 (413,137)

Abstract:

Loading...

Supply chain integration, Developed economies, Developing economies, ICT use, SMEs, Wine industry.

127.

Collaborating with Technology-Based Autonomous Agents: Issues and Research Opportunities

“Collaborating with technology-based autonomous agents: Issues and research opportunities,” Internet Research, vol. 30(1) 1-18
Number of pages: 24 Posted: 09 Jan 2020 Last Revised: 18 May 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, Karlsruhe Institute of Technology, University of British Columbia (UBC) - Sauder School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 55 (423,465)
Citation 3

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences.

128.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Anthony Vance, Braden Molyneux, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 54 (426,999)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

129.

Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: The Role of Achievement Goals and Achievement Motivational Affordance

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 11 Posted: 02 Jul 2018
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 53 (430,682)

Abstract:

Loading...

wearable device, quantified-self, running platforms, physical activity maintenance, motivational affordance, achievement goal, mastery goal, performance goal

130.

The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination

Computers & Security, vol. 75(June), pp. 147-166, 2018
Number of pages: 42 Posted: 06 Feb 2018 Last Revised: 30 Jun 2018
Phillip Menard, Merrill Warkentin and Paul Benjamin Lowry
University of South Alabama, Mississippi State University - Department of Management and Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 53 (430,682)
Citation 6

Abstract:

Loading...

protection motivation theory (PMT), psychological ownership, collectivism, individualism, information security behavior

131.

Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, pp. 1-40
Number of pages: 42 Posted: 30 Jun 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 52 (434,251)

Abstract:

Loading...

control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, organizational mandatoriness, threat to freedom, boomerang effects, anger

132.

How Increased Social Presence Through Co-Browsing Influences User Engagement in Collaborative Online Shopping

Electronic Commerce Research and Applications (ECRA), vol. 24, (July-August 2017), pp. 84-99
Number of pages: 49 Posted: 07 Jul 2017 Last Revised: 02 Sep 2017
Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum and Thimo Schulze
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics, Virginia Polytechnic Institute & State University - Pamplin College of Business, Synchronite GmbH and Independent
Downloads 51 (437,936)

Abstract:

Loading...

Collaboration; user engagement; social presence; co-presence; e-commerce; social presence theory; online shopping; co-browsing

133.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 51 (437,936)
Citation 1

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

134.

The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups

40th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 51 (437,936)
Citation 5

Abstract:

Loading...

trust, culture, GSS, collaborative software, individualism, collectivism

135.

A Longitudinal Study of Information Privacy on Mobile Devices

47th Hawaiian International Conference on Systems Sciences (HICSS 2014), Big Island, Hawaii, January 6–9, 3149-3158
Number of pages: 11 Posted: 11 Sep 2013 Last Revised: 23 Nov 2014
Mark J. Keith, Jeffry Babb and Paul Benjamin Lowry
Brigham Young University - Marriott School, West Texas A&M University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 49 (445,558)

Abstract:

Loading...

mobile computing, mobile commerce, self-disclosure, privacy, privacy calculus

136.

The IS Core: An Integration of the Core IS Courses

Number of pages: 20 Posted: 31 Aug 2009
Conan Albrecht, Gregory D Moody, Marshall Romney and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 49 (445,558)

Abstract:

Loading...

: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum

137.

An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism

Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019)
Number of pages: 78 Posted: 05 Aug 2019 Last Revised: 28 Oct 2019
Virginia Polytechnic Institute & State University - Pamplin College of Business, School of Management, University of Science and Technology of China, University of Nevada, Las Vegas - College of Business, University of Nevada, Las Vegas - Center for Entrepreneurship, City University of Hong Kong (CityUHK) - Department of Information Systems and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 48 (449,428)
Citation 2

Abstract:

Loading...

Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon

138.

Breaking Free from the Limitations of Classical Test Theory: Developing and Measuring Information Systems Scales Using Item Response Theory

Information & Management (I&M), vol. 54(2), pp. 189–203
Number of pages: 46 Posted: 09 Jun 2016 Last Revised: 27 Feb 2017
Thomas Rusch, Paul Benjamin Lowry, Patrick Mair and Horst Treiblmaier
Vienna University of Economics and Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Harvard University - Department of Psychology and MODUL University Vienna
Downloads 47 (453,346)

Abstract:

Loading...

Item Response Theory, Classical Test Theory, Scale Development, Rasch Model, Measurement, Measures, Hedonism, Reliability, Hedonic IS

139.

‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 232–240
Number of pages: 21 Posted: 29 Jun 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, John D'Arcy, Bryan Hammer and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Delaware - Alfred Lerner College of Business and Economics, University of Oklahoma - Division of Management Information Systems (MIS) and University of Nevada, Las Vegas - College of Business
Downloads 46 (457,309)
Citation 7

Abstract:

Loading...

Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research

140.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
AJ Burns, Clay Posey, Tom Roberts and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 45 (461,422)
Citation 4

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

141.

The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences (ICIS 2015), Fort Worth, TX, December 13–18
Number of pages: 38 Posted: 31 Oct 2016
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 45 (461,422)

Abstract:

Loading...

wearable device, quantified-self 2.0 platforms, health behavior maintenance, motivational affordance, self-efficacy

142.

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security

Journal of Management Information Systems (JMIS), vol. 37(3), pp. 723-757
Number of pages: 62 Posted: 11 Jun 2020 Last Revised: 30 Nov 2020
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 44 (465,579)

Abstract:

Loading...

Information security (ISec) threats, fear appeals, protection motivation theory (PMT), construal-level theory (CLT), concrete, abstract

143.

The Effect of CIO Virtues on CIO Role Effectiveness

52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11
Number of pages: 10 Posted: 30 Oct 2018
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Virginia, University of Nevada, Las Vegas - College of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 43 (469,807)

Abstract:

Loading...

Virtues, Ethics, Organizational Leadership, Role Effectiveness, CIO, Information Technology, Executives

144.

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Journal of Information Privacy and Security, vol. 9(4), pp. 52-79, 2013
Number of pages: 29 Posted: 26 Mar 2014 Last Revised: 28 Mar 2014
Jeffrey Wall, Prashant Palvia and Paul Benjamin Lowry
University of North Carolina (UNC) at Greensboro, University of North Carolina (UNC) at Greensboro - Bryan School of Business & Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 42 (474,136)

Abstract:

Loading...

Self-determination, reactance, efficacy, information security policy

145.

Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals’ Intent to Comply with New IT Security Policies

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 40 Posted: 30 Aug 2010 Last Revised: 27 Jul 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 42 (474,136)

Abstract:

Loading...

Control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, anger

146.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Paul Benjamin Lowry, Clay Posey, Tom Roberts and Becky Bennett
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 41 (478,442)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

147.

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms

Decision Sciences Journal (DSJ), vol. 50(1), pp. 7–45 (2018)
Number of pages: 50 Posted: 04 Mar 2018 Last Revised: 28 May 2019
Frederik von Briel, Christoph Schneider and Paul Benjamin Lowry
UQ Business School, University of Navarra, IESE Business School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 36 (501,046)

Abstract:

Loading...

Innovation, Absorptive Capacity, Social Integration, External Partners, Organizational Capabilities, Knowledge Absorption, Collaboration, Mechanisms

148.

Disentangling the Motivations for Organizational Insider Computer Abuse Through the Rational Choice and Life Course Perspectives

DATA BASE for Advances in Information Systems, vol.49 (April 2018), 81-102
Number of pages: 39 Posted: 10 Jan 2018 Last Revised: 05 May 2018
Robert Willison and Paul Benjamin Lowry
University of Newcastle and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 36 (501,046)
Citation 1

Abstract:

Loading...

computer abuse (CA), insider computer abuse (ICA), life course perspective (LCP), rational choice perspective (RCP), deterrence, employee computer abuse, organizational security, organizational insider, future directions for IS security research

149.

Why Do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011 Shanghai, China, December 3, All Sprouts Content, vol. 11(138), paper 453
Number of pages: 51 Posted: 30 Jun 2013
Paul Benjamin Lowry, Jeffrey Wall and James Selfridge
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of North Carolina (UNC) at Greensboro and Brigham Young University
Downloads 35 (510,813)

Abstract:

Loading...

HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies

150.

The Assimilation of RFID Technology by Chinese Companies: A Technology Diffusion Perspective

Information & Management, vol. 52(6), pp. 628-642
Number of pages: 46 Posted: 14 May 2015 Last Revised: 29 Dec 2016
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 33 (515,864)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, DOI theory

151.

User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit

Decision Support Systems, vol. 72(April), pp. 1-10 (doi: http://dx.doi.org/10.1016/j.dss.2015.02.005)
Number of pages: 31 Posted: 06 Apr 2015
Justin Giboney, Susan Brown, Paul Benjamin Lowry and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, University of Arizona - Eller College of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 32 (521,028)

Abstract:

Loading...

User acceptance, explanations, cognitive fit, recommendations

152.

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce

Pacific Asia Conference on Information Systems (PACIS) 2013, Jeju Island, Korea, June 18-22.
Number of pages: 14 Posted: 30 Jun 2013
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 31 (526,142)

Abstract:

Loading...

trust, distrust, online behaviour, ambivalence, e-commerce, situational abnormality, situational normality

153.

Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable

Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS 2012), Maui, Hawaii, USA, January 4-7, pp. 4623-4632 (best paper nomination)
Number of pages: 11 Posted: 30 Jun 2013
Anthony Vance, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 29 (537,022)

Abstract:

Loading...

accountability, security, organizational security, least privilege, access, identifiability, evaluation, social presence

154.

A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China

International Conference on ICT Management for Global Competitiveness and Economic Growth in Emerging Economies (ICTM 2012), Wroclaw, Poland, September 17-18, pp. 101-120
Number of pages: 21 Posted: 30 Jun 2013
Wei Jie, Paul Benjamin Lowry and Stefan Seedorf
City University of Hong Kong (CityUHK), Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Mannheim - Institute of Computer Science and Business Informatics
Downloads 28 (548,534)

Abstract:

Loading...

innovation diffusion, assimilation, RFID technology, TOE framework, stage-based model

155.

What Signal is Your Inspection Team Sending to Each Other? Using a Shared Collaborative Interface to Improve Shared Cognition and Implicit Coordination in Error-Detection Teams

International Journal of Human-Computer Studies, Vol. 71(4), pp. 455-474 (doi: 10.1016/j.ijhcs.2012.11.004)
Number of pages: 57 Posted: 18 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Tom Roberts and Nicholas C. Romano
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Oklahoma State University-MSIS
Downloads 28 (542,779)

Abstract:

Loading...

Implicit Coordination, Implicit Coordination Theory, Shared Cognition, Signal Detection Theory, Collaborative Software, Error Detection, Explicit Coordination

156.

Why Students Engage in Cyber-Cheating Through a Collective Movement: A Case of Deviance and Collusion

Computers & Education (C&E), Vol. 125 (October), pp. 308-326
Number of pages: 40 Posted: 03 May 2018 Last Revised: 04 Aug 2018
University of Arkansas at Little Rock - Department of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arkansas at Little Rock, University of Arkansas - Little Rock and University of Central Oklahoma - College of Business
Downloads 27 (548,534)
Citation 1

Abstract:

Loading...

cyber-cheating, computer-mediated communication, pedagogical issues, social networking sites, qualitative

157.

Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA)

Forthcoming in ACIS 2016 JAIS Workshop Advances in Qualitative IS Research Methodologies, Sydney, Australia, November 30
Number of pages: 5 Posted: 31 Oct 2016
Robert Willison, Paul Benjamin Lowry and Richard Baskerville
University of Newcastle, Virginia Polytechnic Institute & State University - Pamplin College of Business and Georgia State University
Downloads 27 (548,534)

Abstract:

Loading...

security, organizational security, qualitative methods

158.

The Agent Bidding Habit and Use Model (ABHUM) and Its Validation in the Taobao Online Auction Context

Information & Management (I&M), Vol. 54(3), pp. 281-289, April 2017
Number of pages: 36 Posted: 30 Jul 2016 Last Revised: 24 Apr 2018
Xiling Cui, Nan Zhang and Paul Benjamin Lowry
Independent, Tsinghua University and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 27 (548,534)
Citation 1

Abstract:

Loading...

Bidding agents, Agent bidding, Online auctions, Habit, Taobao, E-commerce, China

159.

A Contingency Model of Bidding Strategies in Online Auctions in China

Pacific Asia Journal of the Association for Information Systems (PAJAIS), vol. 8(2), pp. 47–62
Number of pages: 27 Posted: 22 Jul 2016 Last Revised: 05 Sep 2016
Xiling Cui, Lai Law, Paul Benjamin Lowry and Qiuzhen Wang
Independent, Hong Kong Shue Yan University, Virginia Polytechnic Institute & State University - Pamplin College of Business and Zhejiang University - School of Management
Downloads 27 (548,534)
Citation 1

Abstract:

Loading...

Bidding strategies, Bidders, Online auctions, Qualitative research, China, Bidding motivations

160.

How Do Bidders’ Organism Reactions Mediate Auction Stimuli and Bidder Loyalty in Online Auctions? The Case of Taobao in China

Information & Management (I&M), vol. 53 (2016), pp. 609-624
Number of pages: 46 Posted: 01 Feb 2016 Last Revised: 28 Jul 2016
Xiling Cui, Vincent Lai and Paul Benjamin Lowry
Independent, The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 26 (554,481)
Citation 1

Abstract:

Loading...

S-O-R model, evolutionary S-O-R model, bidder loyalty, online auctions, organism

161.

Developing and Measuring IS Scales Using Item Response Theory

34th International Conference on Information Systems (ICIS 2013), Milan, Italy, December 15-18, pp. 1-16, 2013
Number of pages: 17 Posted: 30 Jun 2014 Last Revised: 07 Dec 2014
Thomas Rusch, Patrick Mair, Paul Benjamin Lowry and Horst Treiblmaier
Vienna University of Economics and Business, Harvard University - Department of Psychology, Virginia Polytechnic Institute & State University - Pamplin College of Business and MODUL University Vienna
Downloads 26 (554,481)

Abstract:

Loading...

Item Response Theory, Rasch Model, Partial Credit Model, Measurement, Hedonism, Hedonic Information Systems, Classical Test Theory

162.

Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment

Journal of Management Information Systems, Vol. 28, No. 1, pp. 201-234, 2011
Number of pages: 47 Posted: 15 Aug 2011 Last Revised: 12 Jun 2014
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona
Downloads 26 (554,481)

Abstract:

Loading...

credibility assessment, decision support systems, indirect cues elicitation, linguistic analysis, signal detection theory

163.

Information technology and organizational innovation: Harmonious information technology affordance and courage-based actualization

Journal of Strategic Information Systems (JSIS), vol. 29(1), March, Article 101596, pp. 1–23
Number of pages: 55 Posted: 30 Dec 2019 Last Revised: 04 May 2020
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 25 (560,728)
Citation 1

Abstract:

Loading...

IT affordance, innovation, matching fit, covariance fit, organizational courage, actualization

164.

Automated and Participative Decision Support in Computer-Aided Credibility Assessment

8th Annual Special Interest Group on Human-Computer Interaction 2009 Pre-ICIS Workshop, Scottsdale, December 2009
Number of pages: 6 Posted: 14 Oct 2009 Last Revised: 27 Jul 2013
Matthew Jensen, Paul Benjamin Lowry and Jeffrey L. Jenkins
University of Oklahoma - Michael F. Price College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona
Downloads 24 (567,100)

Abstract:

Loading...

Credibility Assessment, Signal Detection Theory, Linguistic Analysis, Indirect Cues Elicitation, Decision Support Systems

165.

Breaking Bad in Cyberspace: Understanding Why and How Black Hat Hackers Manage Their Nerves to Commit Their Virtual Crimes

Information Systems Frontiers (ISF) (accepted 28-Aug-2019)
Number of pages: 29 Posted: 11 Sep 2019
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 23 (573,397)

Abstract:

Loading...

Black hat hacker; security; criminology nerve management; general strain theory; routine activity theory (RAT)

166.

Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

Proceedings of the 16th Annual Americas Conference on Information Systems, Lima, Peru, August 12-15
Number of pages: 11 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
James V. Hansen, Paul Benjamin Lowry and Rayman Meservy
Brigham Young University - School of Accountancy, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 23 (573,397)

Abstract:

Loading...

Data mining, intrusion detection, pattern discovery, rule-induction algorithms, link analysis

167.

Digital Borders, Location Recognition, and Experience Attribution Within a Digital Geography

Journal of Management Information Systems (JMIS), vol. 36(2), pp. 418–449
Number of pages: 56 Posted: 21 Mar 2019 Last Revised: 25 Jun 2019
Brian Dunn, Dennis Galletta, Narayan Ramasubbu and Paul Benjamin Lowry
Utah State University - Department of Business Information Systems, University of Pittsburgh and Director, Katz Doctoral Program, University of Pittsburgh - Management Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 22 (579,919)

Abstract:

Loading...

digital borders, digital geography, online experience, attribution, experiment, space and place theory, memory, website design

168.

Does More Accessibility Lead to More Disclosure? Exploring the Influence of Information Accessibility on Self-Disclosure in Online Social Networks

Information Technology & People (IT&P) (accepted 28-July-2018)
Number of pages: 37 Posted: 14 Aug 2018
Shanshan Zhang, Ron Kwok, Paul Benjamin Lowry and Zhiying Liu
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Science and Technology of China (USTC)
Downloads 22 (579,919)

Abstract:

Loading...

Online social network (OSN), self-disclosure, information accessibility, social exchange beliefs

169.

Creating Automated Plans for Semantic Web Applications Through Planning as Model Checking

Expert Systems with Applications (ESWA), Vol. 47, No.1, 2009
Number of pages: 35 Posted: 24 Aug 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 22 (579,919)

Abstract:

Loading...

semantic web, model checking, formal methods, software engineering for Internet projects, artificial intelligence, agents, planning as model checking

170.

The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers’ Cognitive Gaps in IoT Settings

Hawaii International Conferences on Systems Sciences (HICSS-53), Maui, January 8–10
Number of pages: 12 Posted: 13 Dec 2019 Last Revised: 18 May 2020
Daeeun Choi, Paul Benjamin Lowry and G. Alan Wang
Virginia Tech, Virginia Polytechnic Institute & State University - Pamplin College of Business and Virginia Tech
Downloads 21 (586,461)

Abstract:

Loading...

privacy, Internet of Things

171.

Institutional Governance and Protection Motivation: Theoretical Insights into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World

Computers & Security (C&S), vol. 87 (November, 2019), article Article 101594
Number of pages: 42 Posted: 19 Aug 2019 Last Revised: 30 Nov 2019
Sadaf Hina, Dominic Dhanapal and Paul Benjamin Lowry
Universiti Teknologi Petronas, Universiti Teknologi Petronas and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 21 (586,461)
Citation 3

Abstract:

Loading...

Information security policy (ISP), Information security policy compliance (ISPC), behavior, protection motivation, institutional governance (IG), higher education institutions (HEIs), protection motivation theory (PMT), theory of planned behavior (TPB)

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web-Vendor Trust

Information & Management, vol. 51(5), pp. 579–594
Number of pages: 66 Posted: 26 Mar 2014 Last Revised: 19 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Georgia State University, University of Arizona and Brigham Young University - Department of Information Systems
Downloads 13 (665,799)

Abstract:

Loading...

Website design, trust, emotion, affect, affect infusion, Web site performance, Affect-Trust Infusion Model (ATIM)

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011, Shanghai, China, December 3, All Sprouts Content, vol. 11(136), paper 451.
Number of pages: 41 Posted: 30 Jun 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona, University of Arizona - Department of Management Information Systems and Georgia State University
Downloads 8 (705,169)

Abstract:

Loading...

trust, affect infusion, positive website performance, positive emotion, cognition, Affect-Trust Infusion Model, trust transference

173.

Reinventing Collaboration with Autonomous Technology-Based Agents

In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8-14, 2019. ISBN 978-1-7336325-0-8 Panels.
Number of pages: 7 Posted: 06 Jan 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, affiliation not provided to SSRN, University of British Columbia (UBC) - Sauder School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 20 (593,031)

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences

174.

Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention

Information & Management (I&M),vol. 57(July), Article 103235, pp. 1–15
Number of pages: 50 Posted: 13 Dec 2019 Last Revised: 24 Aug 2020
Dezhi Wu, Gregory D Moody, Jun Zhang and Paul Benjamin Lowry
University of South Carolina, University of Nevada, Las Vegas - College of Business, City University of Hong Kong and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 20 (593,031)

Abstract:

Loading...

Mobile device; mobile security; human–computer interaction(HCI); mobile applications (apps); perceived security; dual-task interference; mobile security notification (MSN)

175.

Does Opportunity Make the Thief? Abilities and Moral Disengagement in Illegal Downloading

Behaviour & Information Technology (BIT), vol. 38(12), pp. 1273-1289 (2019)
Number of pages: 54 Posted: 08 Mar 2019 Last Revised: 30 Nov 2019
University of Milano-Bicocca, University of Bergamo - Department of Human and Social Sciences, University of Milano-Bicocca, University of Milano-Bicocca and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 19 (599,762)

Abstract:

Loading...

piracy, digital piracy, illegal file sharing, copyright infringement, social cognitive theory (SCT), neutralisation, moral obligation, morality, theory of planned behaviour (TPB), moral disengagement, perceived behavioural control (PBC), self-efficacy, subjective norms

176.

Research Opinion: A Storyteller’s Guide to Problem-Based Learning for Information Systems Management Education

Information Systems Journal (ISJ), 29(5), pp. 1040–1057
Number of pages: 33 Posted: 17 Jan 2019 Last Revised: 09 Sep 2019
David Hull, Paul Benjamin Lowry, James Gaskin and Kristijan Mirkovski
City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School and City University of Hong Kong (CityUHK) - Department of Information Systems
Downloads 17 (612,880)
Citation 1

Abstract:

Loading...

Narrative animated video (NAV), storytelling, multimedia learning, motivation theory, theory-driven multimedia design, information systems (IS) research leadership, problem-based learning

177.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 17 (612,880)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy

178.

Investigation of Radio-Frequency Identification Assimilation Process in China: A Stage-Based Model Perspective

Electronic Journal of Information Systems in Developing Countries Vol. 57(4), 1-17
Number of pages: 18 Posted: 04 Jun 2013
Jie Wei, Stefan Seedorf and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 17 (612,880)

Abstract:

Loading...

Innovation assimilation, RFID technology, TOE framework, stage-based model, emerging economies

179.

A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ That Needs to Be Fostered in Information Security Practitioners and How This Can Be Accomplished

Computers & Security (C&S), vol. 92, May, Article 101761
Number of pages: 44 Posted: 13 Mar 2020 Last Revised: 04 May 2020
Bongsik Shin and Paul Benjamin Lowry
San Diego State University - College of Business Administration and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 16 (619,683)
Citation 1

Abstract:

Loading...

Security; Organizational security (OrgSec); human factors of security; cyberthreat intelligence (CTI); risk management; triarchic theory of intelligence (TTI); CTI capability model (CTI-CM); information security officer; CTI practitioner; CTI analyst

180.

Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior

Hawaii International Conference on Systems Sciences (HICSS 2015), Kauai, HI, January 5–8 (accepted 17-Aug-2014)
Number of pages: 10 Posted: 10 Dec 2014
Dezhi Wu, Paul Benjamin Lowry and Dongsong Zhang
University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Maryland, Baltimore County
Downloads 15 (626,668)

Abstract:

Loading...

181.

Visual Storytelling for Improving the Comprehension and Utility in Disseminating Information Systems Research: Evidence from a Quasi-Experiment

Information Systems Journal (ISJ), vol. 29(6), pp. 1153-1177 (2019)
Number of pages: 46 Posted: 08 Mar 2019 Last Revised: 30 Nov 2019
Kristijan Mirkovski, David Hull, James Gaskin and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, Brigham Young University - Marriott School and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 12 (648,182)
Citation 1

Abstract:

Loading...

visual storytelling, video stories, scholarly knowledge dissemination, cognitive learning theory, cognitive theory of multimedia learning, deep processing

182.

Explaining Opposing Compliance Motivations Towards Organizational Information Security Policies

46th Annual Hawaii International Conference on System Sciences (HICSS 2013), Mauii, Hawaii, USA, January 7-10
Number of pages: 11 Posted: 30 Jun 2013
Paul Benjamin Lowry and Gregory D Moody
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 9 (669,805)

Abstract:

Loading...

security, policy compliance, reactance, organizational security

183.

The Nonlinear Influence of Harmonious Information Technology Affordance on Organizational Innovation

Information Systems Journal (ISJ) (accepted 04-Oct-2020)
Number of pages: 59 Posted: 23 Nov 2020
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 8 (677,039)

Abstract:

Loading...

Organizational Innovation, Harmonious Information Technology Affordance (HITA), Nonlinearity, Quadratic Relationship, U-Shaped Curve

184.

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature

Journal of the Association for Information Systems (JAIS) (accepted 20-Oct-2020)
Number of pages: 89 Posted: 28 Dec 2020
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 7 (684,408)

Abstract:

Loading...

information security (ISec), security threats, fear appeals, construal level theory (CLT), protection motivation theory (PMT), fear-appeal design, argument nature, temporal distance, organizational security, behavioral security

185.

Patients’ Compliance Behavior in a Personalized Mobile Patient Education System (PMPES) Setting: Rational, Social, or Personal Choices?

International Journal of Medical Informatics (IJMI) (accepted 02-Oct-2020)
Number of pages: 46 Posted: 23 Nov 2020
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang and Rachida Parks
University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business, The University of North Carolina at Charlotte and University of Arkansas at Little Rock - Department of Management
Downloads 6 (691,708)

Abstract:

Loading...

Compliance, Adherence, Rational Choice Theory (RCT), Theory of Planned Behavior (TPB), mHealth, Cost-Benefit Analysis, Personalized Mobile Patient Education System (PMPES)

186.

The Effects of Bidder Factors on Online Bidding Strategies: A Motivation-Opportunity-Ability (MOA) Model

Decision Support Systems (DSS), vol. 138(November), Article 113397
Number of pages: 36 Posted: 23 Nov 2020
Xiling Cui, Vincent Lai, Paul Benjamin Lowry and Yang Lei
Independent, The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, Virginia Polytechnic Institute & State University - Pamplin College of Business and Southern University of Science and Technology
Downloads 5 (698,984)

Abstract:

Loading...

Online Auctions; Bidding Strategy; Risk Preference; E-Commerce; Motivation-Opportunity-Ability (MOA)

187.

The Influence of Role Stress on Self-Disclosure on Social Networking Sites: A Conservation of Resources Perspective

Information & Management (I&M), vol. 56(7), article 103147 (2019)
Number of pages: 49 Posted: 07 Mar 2019 Last Revised: 30 Nov 2019
Shanshan Zhang, Ron Kwok, Paul Benjamin Lowry, Zhiying Liu and Ji Wu
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Science and Technology of China (USTC) and National Sun Yat-sen University - College of Management
Downloads 4 (706,450)

Abstract:

Loading...

role stress, conservation of resources, self-presentation, motivation for relationship maintenance, self-disclosure

188.

Desperately Seeking the Artefacts and the Foundations of Native Theory in Gamification Research: Why Information Systems Researchers Can Play a Legitimate Role in this Discourse and How They Can Better Contribute

European Journal of Information Systems (EJIS), vol. 29(6) pp. 609–620
Number of pages: 76 Posted: 16 Dec 2020 Last Revised: 30 Dec 2020
Paul Benjamin Lowry, Stacie Petter and J. M. Leimeister
Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and University of St. Gallen
Downloads 2 (724,447)

Abstract:

Loading...

Gamification; information systems (IS); discourse; discursive thinking; IS–gamification discourse; artefacts of theory; gamification artefact; theory building; native theory; taxonomies; constructs

189.

'Human' in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks

Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5 (recipient of workshop’s “People’s Choice” award)
Posted: 01 Jan 2021
Dezhi Wu, Jun Zhang, Paul Benjamin Lowry and Gregory D Moody
University of South Carolina, School of Management, University of Science and Technology of China, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Inoculation theory, resiliency ratio, SETA, ISec, security training, phishing, attack messages

190.

Information Privacy Behavior in the Use of Facebook Apps: A Personality-Based Vulnerability Assessment

Heliyon, vol. 6(8), Article: e04714 (open access), 2020
Posted: 13 Oct 2020
Karl van der Schyff, Stephen Flowerday and Paul Benjamin Lowry
Rhodes University, Rhodes University and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

191.

Corporate Crisis Management on Social Media: A Morality Violations Perspective

Heliyon, vol. 6(7), Article: e04435, pp. 1–11 (open access), 2020
Posted: 13 Oct 2020
Bowen Zheng, Gongbing Bi, Hefu Liu and Paul Benjamin Lowry
Tsinghua University - School of Economics & Management, University of Science and Technology China, University of Science and Technology of China (USTC) - School of Management and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

192.

The Physical Internet as a New Supply Chain Paradigm: A Systematic Literature Review and a Comprehensive Framework

International Journal of Logistics Management (IJLM), vol. 31(2), pp. 239–287 (open access), 2020
Posted: 13 Oct 2020
MODUL University Vienna, City University of Hong Kong (CityUHK) - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and affiliation not provided to SSRN

Abstract:

Loading...

Physical Internet (PI), Systematic Literature Review (SLR), Citation Analysis, Thematic Analysis, Methodological Analysis, Logistics, Supply Chain Management (SCM)

193.

Interorganizational Cooperation and Supplier Performance in High-Technology Supply Chains

Heliyon, vol. 6(March), Article e03434, pp. 1–16, 2020
Posted: 01 Jun 2020
Neale Gilbert O'Connor, Paul Benjamin Lowry and Horst Treiblmaier
Monash University Malaysia, Virginia Polytechnic Institute & State University - Pamplin College of Business and MODUL University Vienna

Abstract:

Loading...

supply chain performance; interorganizational (IO) cooperation; relationship learning; buyer-supplier relationships; relationship marketing theory; social exchange theory; collaboration; electronics industry; global supply chain

194.

Enhancing Theoretical Contribution in Information Systems Research: The Case of Technology Adoption

27th European Conference on Information Systems (2019), Stockholm-Uppsala, Sweden, June 12–14 (accepted 28-Feb-2019)
Posted: 24 Jun 2019
Nik R. Hassan, Lars Mathiassen and Paul Benjamin Lowry
University of Minnesota - Duluth, Georgia State University - Center for Process Innovation (CEPRIN) and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

Information Systems Theory, Foucault, Contribution to Theory, Discursive Formation, Products of Theorizing, Novel Concepts

195.

How Gamified Fitness Features Influence the System Usage: A Field Experimental Approach

The 3rd Pre-ICIS Workshop on the Digitization of the Individual (DOTI), International Conference on Information Systems (ICIS 2018), San Francisco, December 12
Posted: 29 May 2019
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

gamification, storytelling, social interdependence theory, competition, cooperation

196.

Proposing the Core Contributor Withdrawal Theory (CCWT) to Understand Core Contributor Withdrawal from Online Peer-Production Communities

Internet Research, vol. 28(4), pp. 988–1028
Posted: 02 May 2018 Last Revised: 13 Oct 2018
City University of Hong Kong (CityUHK) - Department of Information Systems, City University of Hong Kong (CityUHK) - Department of Information Systems, University of North Carolina (UNC) at Greensboro, City University of Hong Kong (CityUHK) - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

197.

Using Multistage Competing Risks Approaches to Model Web Page Transitions

Internet Research (IR), vol. 27(3), pp. 650–669, 2017
Posted: 03 Oct 2016 Last Revised: 27 Aug 2017
Patrick Mair, Horst Treiblmaier and Paul Benjamin Lowry
Harvard University - Department of Psychology, MODUL University Vienna and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

Survival Analysis, Clickstream Analysis, E-Commerce, Online Retailing, Competing Risks Models, Dwell-Time Analysis, Hazard Models, Website Interaction

198.

Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context

Journal of Global Information Management, vol. 23(3), pp. 41–70
Posted: 18 Nov 2014 Last Revised: 05 Apr 2015
Kamel Rouibah, Paul Benjamin Lowry and Laila Al-Mutairi
Kuwait University - Department of Quantitative Methods & Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Kuwait University - School of Business

Abstract:

Loading...

E-commerce, business-to-consumer (B2C), IS success model, satisfaction, service quality, perceived value, information quality, system quality, service quality, Kuwait, the Arab world

199.

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

Journal of Management Information Systems, vol. 31(3), pp. 106–137, DOI: 10.1080/07421222.2014.995535).
Posted: 20 Jun 2014 Last Revised: 02 Jun 2015
Nathan Twyman, Paul Benjamin Lowry, Judee K. Burgoon and Jay F. Nunamaker
University of Arizona - Department of Management Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Autonomous scientifically controlled screening systems (ASCSS), Credibility assessment, Deception detection, Concealed information test (CIT), Orienting response, Defensive response, Automated screening kiosk (ASK), Eye tracking measures, Physical security, Design Science

200.

Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Posted: 30 Aug 2010
Anthony Vance, Gove N. Allen, Braden Molyneux and Paul Benjamin Lowry
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

accountability, identifiability, evaluation, IS security policies, computer abuse

201.

Evolutionary Development and Research on Internet-Based Collaborative Writing Tools and Processes to Enhance Ewriting in an Egovernment Setting

Decision Support Systems (DSS), Vol. 34, No. 3, pp. 229-252, 2002
Posted: 20 Jan 2006
Paul Benjamin Lowry, Conan Albrecht, Jay F. Nunamaker and James Lee
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)

Abstract:

Loading...

Collaborative writing, group writing, eWriting, eGovernment, eGov, digital government, GSS, collaboration, group work, facilitation, distributed work, self-sustaining writing teams, multi-methodological research, collaborative systems development

202.

Familiarity Effects on Trust with Mobile Computing Device Websites

11th International Conference on HCI, Las Vegas, July 22-27, 2005
Posted: 21 Feb 2005 Last Revised: 02 Jul 2014
Paul Benjamin Lowry, Tom Roberts and Bryce Caine
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Brigham Young University - School of Accountancy

Abstract:

Loading...

Familiarity, Web, websites, usability, HCI, logos, interfaces

203.

Biometrics: A Critical Consideration in Information Security Management

ENCYCLOPEDIA OF MULTIMEDAI TECHNOLOGY AND NETWORKS, Margherita Pagani, ed., Idea Group Inc., pp. 69-75, 2005
Posted: 21 Feb 2005
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

biometrics, security, fraud

204.

Making Money with Open-Source Software Business Initiatives

in Margherita Pagani, ed. Encyclopedia of Multimedia Technology and Networks, Idea Group Inc., pp. 555-561
Posted: 21 Feb 2005
Paul Benjamin Lowry
Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

OSS, open-source software, business models

205.

The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes

Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
Paul Benjamin Lowry and Dennis C. Wilson
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona

Abstract:

Loading...

GSS, collaborative software, systems analysis and design, JAD, CASE, data modeling

206.

MIS Legitimacy and the Proposition of a New, Multi-Dimensional Model of MIS

Annual Conference of the Southern Association for Information Systems, 2002
Posted: 14 Feb 2005 Last Revised: 28 Jul 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Eller College of Management, University of Arizona, University of Arizona - Eller College of Management and University of Arizona

Abstract:

Loading...

MIS, IS, academics, IS discipline

207.

Remind Me Later’ in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?

19th Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5
Jun Zhang, Dezhi Wu, Paul Benjamin Lowry and Gregory D Moody
School of Management, University of Science and Technology of China, University of South Carolina, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Mobile security notification, MSN, deferred coping, choice deferral, HCI, dual-task interference

Other Papers (1)

Total Downloads: 0
1.

Goals, Values, and Expectations of the AIS Family of Journals

Journal of the Association for Information Systems (JAIS), vol. 18(9), pp. 633–647
Posted: 03 Nov 2017
University of Central Florida, University of Oslo, University of Arizona - Eller College of Management, Indiana University - Kelley School of Business - Department of Operation & Decision Technologies, Governors State University - College of Business and Public Administration, University of Pittsburgh and Director, Katz Doctoral Program, National Sun Yat-sen University - College of Management, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Cologne - Faculty of Management, Economics and Social Sciences and University of Virginia

Abstract:

Loading...

AIS Journals, Journal Mission, Journal Review Processes, Journal Values, Replication, Open Science, Publication Ethics.