Paul Benjamin Lowry

Virginia Tech - Pamplin College of Business

1016 Pamplin Hall

Blacksburg, VA 24061

United States

SCHOLARLY PAPERS

237

DOWNLOADS
Rank 766

SSRN RANKINGS

Top 766

in Total Papers Downloads

52,541

SSRN CITATIONS
Rank 1,484

SSRN RANKINGS

Top 1,484

in Total Papers Citations

471

CROSSREF CITATIONS

598

Scholarly Papers (237)

1.

Taking ‘Fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Journal of the Association for Information Systems, vol. 14(11), 617-671
Number of pages: 56 Posted: 18 Nov 2012 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, James Gaskin, Nathan Twyman, Bryan Hammer and Tom Roberts
Virginia Tech - Pamplin College of Business, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Arkansas - Department of Information Systems and University of Kansas - School of Business
Downloads 4,136 (4,539)
Citation 2

Abstract:

Loading...

Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation

2.

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management

Communications of the Association for Information Systems (CAIS), Vol. 17, No. 6, pp. 1-48, 2006
Number of pages: 49 Posted: 03 Feb 2006 Last Revised: 25 Aug 2009
Virginia Tech - Pamplin College of Business, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and My eBiz
Downloads 3,681 (5,566)
Citation 1

Abstract:

Loading...

online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education

3.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 3,517 (5,960)
Citation 15

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

4.

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Number of pages: 71 Posted: 18 May 2015 Last Revised: 27 Nov 2017
Bentley University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and Florida International University (FIU)
Downloads 1,374 (26,033)
Citation 6

Abstract:

Loading...

Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior

5.

Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Journal of the Association for Information Systems, vol. 16(7), pp. 515-579
Number of pages: 81 Posted: 08 Dec 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry, James Gaskin and Gregory D Moody
Virginia Tech - Pamplin College of Business, Brigham Young University - Marriott School and University of Nevada, Las Vegas - College of Business
Downloads 1,370 (26,216)
Citation 4

Abstract:

Loading...

Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit

6.

Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 42 Posted: 23 Nov 2014 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Tailai Wu and Mikko Siponen
Virginia Tech - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems and University of Oulu
Downloads 1,298 (28,379)

Abstract:

Loading...

Stalking, Cyberstalking, Shame, Neutralization, Self-control, Rational choice theory, Social learning theory of crime, Emotional theory of stalking, Self-control theory, Social media, Deviance

7.

Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

Journal of the Association for Information Systems (JAIS), Vol. 5, No. 2, pp. 29-80, 2004
Number of pages: 51 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Denton Romans and Aaron Mosiah Curtis
Virginia Tech - Pamplin College of Business, PricewaterhouseCoopers LLP and Brigham Young University Hawaii
Downloads 1,211 (31,334)

Abstract:

Loading...

Information Systems, Journal Rankings, Journal Quality, Research Journals, Practitioner Journals, Reference Disciplines, Supporting Disciplines, Tenure, Academic Promotion, Management Information Systems, Computer Information Systems

8.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 1,117 (35,147)
Citation 4

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

9.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Tech - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 1,080 (36,900)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

10.

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning (SSSL) Model

Information Systems Research (ISR), vol. 27(4), pp. 962–986
Number of pages: 111 Posted: 26 Aug 2016 Last Revised: 29 Dec 2016
Paul Benjamin Lowry, Jun Zhang, Chuang Wang and Mikko Siponen
Virginia Tech - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems, City University of Hong Kong (CityU) - Department of Information Systems and University of Oulu
Downloads 1,050 (38,454)
Citation 16

Abstract:

Loading...

cyberbullying, cyberstalking, cyberharassment, social media, social media cyberbullying model (SMCBM), neutralization, anonymity, disinhibition, deindividuation, differential association, differential reinforcement, definition, imitation, social structure and social learning (SSSL) model, social lea

11.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
Clay Posey, Becky Bennett, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Tech - Pamplin College of Business
Downloads 885 (48,801)
Citation 2

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

12.

A Taxonomy of Collaborative Writing to Improve Empirical Research, Writing Practice, and Tool Development

International Journal of Business Communication, Vol. 41, No. 1, pp. 66-99, 2004
Number of pages: 59 Posted: 14 Feb 2005 Last Revised: 04 May 2020
Paul Benjamin Lowry, Aaron Mosiah Curtis and Michelle Rene Lowry
Virginia Tech - Pamplin College of Business, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 878 (49,368)

Abstract:

Loading...

collaborative writing, taxonomy, collaboration, group awareness, collaborative writing software

13.

Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications

Association for Information Systems Transactions on Human-Computer Interaction (THCI), vol. 10(3), pp. 129–163
Number of pages: 36 Posted: 15 Jul 2018 Last Revised: 09 Jan 2019
Horst Treiblmaier, Lisa-maria Putz and Paul Benjamin Lowry
MODUL University Vienna, Upper Austria - University of Applied Sciences Upper Austria and Virginia Tech - Pamplin College of Business
Downloads 871 (50,062)
Citation 5

Abstract:

Loading...

Gamification, Gamification Definition, Gamification Domain, Research Agenda, Theory Building, Theories in IS Research, Attitudinal Change, Behavioral Change, Nomological Network

14.

The Impact of Individualism-Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence

Journal of Management Information Systems (JMIS), Vol. 23, No. 4, pp. 53-80, 2007
Number of pages: 42 Posted: 31 May 2007 Last Revised: 25 Aug 2009
Dongsong Zhang, Paul Benjamin Lowry, Lina Zhou and Xiaolan Fu
University of Maryland, Baltimore County, Virginia Tech - Pamplin College of Business, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 852 (51,489)
Citation 5

Abstract:

Loading...

Majority influence, culture, social presence, computer-mediated communication (CMC), group diversity, virtual teams

15.

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?

MIS Quarterly Vol. 37(4), 993–1012
Number of pages: 63 Posted: 09 Dec 2012 Last Revised: 08 Jan 2018
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School, University of Pittsburgh and Director, Katz Doctoral Program, Brigham Young University - Department of Information Systems, California State University, Fullerton - Mihaylo College of Business & Economics and University of Arizona - Department of Management Information Systems
Downloads 799 (56,073)
Citation 7

Abstract:

Loading...

Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle

16.

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess

Journal of the Association for Information Systems, vol. 17(1), pp. 39–76 ISSN: 1536-9323
Number of pages: 66 Posted: 28 May 2015 Last Revised: 26 Jan 2016
Jeffrey Wall, Paul Benjamin Lowry and Jordan B. Barlow
University of North Carolina (UNC) at Greensboro, Virginia Tech - Pamplin College of Business and California State University, Fullerton - Mihaylo College of Business & Economics
Downloads 735 (62,768)
Citation 3

Abstract:

Loading...

selective organizational information privacy and security violations model (SOIPSVM), privacy, security, theory building, organizational privacy, organizational security, rule violations, policy violations, information abuse, SOIPSVM, PCI DSS, HIPPA, selective organizational rule violations model

17.

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust

International Journal of Human-Computer Interaction, vol. 30(1), pp. 63-93
Number of pages: 77 Posted: 05 Jun 2013 Last Revised: 01 Apr 2014
Paul Benjamin Lowry, David Wilson and Bill Haig
Virginia Tech - Pamplin College of Business, University of Arizona - Department of Management Information Systems and Powerlogos Design
Downloads 655 (72,798)
Citation 5

Abstract:

Loading...

e-commerce, internet retailing, logos, credibility, surface credibility, logo design, branding, website design, trust, distrust, online consumers, online marketing, e-commerce, source credibility theory

18.

A Systematic Review of Social Networking Research in Information Systems

Communications of the Association for Information Systems, vol. 36(1)
Number of pages: 41 Posted: 18 Nov 2014 Last Revised: 31 Jul 2015
Jinwei Cao, Kamile Basoglu, Hong Sheng and Paul Benjamin Lowry
University of Delaware - Accounting & MIS, University of Delaware - Accounting & MIS, Missouri University of Science and Technology - Department of Business and Information Technology and Virginia Tech - Pamplin College of Business
Downloads 653 (73,100)

Abstract:

Loading...

social networking (SN); social networking applications (SNAs); social media; literature review; systematic review; social networks; social network analysis; social computing; information systems (IS)

19.

Conceptualizing the Physical Internet: Literature Review, Implications and Directions for Future Research

11th CSCMP Annual European Research Seminar, Vienna, Austria, May 12–May 13
Number of pages: 19 Posted: 31 Oct 2016
Horst Treiblmaier, Kristijan Mirkovski and Paul Benjamin Lowry
MODUL University Vienna, City University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 591 (82,684)
Citation 1

Abstract:

Loading...

Physical Internet (PI), systematic literature review, supply chain management (SCM)

20.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 577 (85,302)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

21.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, James Courtney and Becky Bennett
University of Central Florida, University of Kansas - School of Business, Virginia Tech - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 554 (89,781)
Citation 2

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2016), Dublin, The Republic of Ireland, December 10
Number of pages: 31 Posted: 31 Oct 2016
Ghazwan Hassna, Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 433 (119,622)

Abstract:

Loading...

Big data capability, customer agility, organization competitiveness

Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective

Proceedings of the 24th Annual Americas Conference on Information Systems (AMCIS 2018), New Orleans, August 16–18
Number of pages: 14 Posted: 21 May 2018
Ghazwan Hassna, Ghazwan Hassna and Paul Benjamin Lowry
Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 62 (633,922)

Abstract:

Loading...

Big data, big data capability, theory building, IT agility, dynamic capability theory

23.

Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17, best paper nomination (accepted 27-July-2014)
Number of pages: 19 Posted: 23 Nov 2014
Mark J. Keith, Courtenay Maynes, Paul Benjamin Lowry and Jeffry Babb
Brigham Young University - Marriott School, Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and West Texas A&M University
Downloads 475 (108,393)

Abstract:

Loading...

privacy fatigue, information privacy, privacy controls, information disclosure, feature fatigue, field experiment

24.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Tech - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 414 (127,379)
Citation 3

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

25.

Why Security and Privacy Research Lies at the Centre of the Information Systems (IS) Artefact: Proposing a Bold Research Agenda

European Journal of Information Systems (EJIS), vol. 26(6) pp. 546–563
Number of pages: 36 Posted: 02 Oct 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Tamara Dinev and Robert Willison
Virginia Tech - Pamplin College of Business, Florida Atlantic University - School of Accounting and University of Newcastle
Downloads 395 (134,347)
Citation 11

Abstract:

Loading...

Security, privacy, information technology (IT) artefact, information systems (IS) artefact, future research, online platforms, the Internet of things (IoT), big data, deterrence theory (DT), rational choice theory (RCT)

26.

Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It

IEEE Transactions on Professional Communication, vol. 57(2), pp. 123–146
Number of pages: 57 Posted: 19 Mar 2014 Last Revised: 08 Jun 2014
Paul Benjamin Lowry and James Gaskin
Virginia Tech - Pamplin College of Business and Brigham Young University - Marriott School
Downloads 387 (137,480)
Citation 12

Abstract:

Loading...

Theory building; partial least squares (PLS); structural equation modeling (SEM); causal inquiry; first-generation statistical techniques; second-generation statistical techniques

27.

Genetic Programming for Prevention of Cyberterrorism Through Dynamic and Evolving Intrusion Detection

Decision Support Systems (DSS), Vol. 43, No. 4, pp. 1362-1374
Number of pages: 32 Posted: 26 Jan 2006 Last Revised: 11 Apr 2015
James V. Hansen, Paul Benjamin Lowry, Rayman Meservy and Dan McDonald
Brigham Young University - School of Accountancy, Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems and University of Arizona - Eller College of Management
Downloads 367 (145,855)

Abstract:

Loading...

terrorism, cyberterrorism, intrusion detection, genetic programming

28.

Defending Against Spear-Phishing: Motivating Users Through Fear Appeal Manipulations

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 12 Posted: 31 Oct 2016
Sebastian Schuetz, Paul Benjamin Lowry and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Tech - Pamplin College of Business and affiliation not provided to SSRN
Downloads 366 (146,283)

Abstract:

Loading...

Security, Spear-phishing, Training, Fear Appeals, Protection Motivation Theory, Construal Level Theory

29.

Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals

Communications of the Association for Information Systems (CAIS), Vol. 20, No. 16, pp. 142-203, 2007
Number of pages: 64 Posted: 19 Oct 2007 Last Revised: 01 Sep 2014
Paul Benjamin Lowry, Gilbert G. Karuga and Vernon J. Richardson
Virginia Tech - Pamplin College of Business, University of Kansas and University of Arkansas at Fayetteville
Downloads 365 (146,735)
Citation 2

Abstract:

Loading...

research productivity, citation analysis, scientometrics, bibliometrics, information systems

30.

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems

Journal of Global Information Management (JGIM), Vol. 16, No. 1, pp. 61-92, 2008
Number of pages: 50 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Dongsong Zhang and Paul Benjamin Lowry
University of Maryland, Baltimore County and Virginia Tech - Pamplin College of Business
Downloads 352 (152,601)

Abstract:

Loading...

culture, cross-cultural groups, collaboration, collaborative software, group support systems, distributed teams

31.

An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research

Communications of the Association for Information Systems (CAIS), Vol. 23, No. 3, pp. 37-62, 2008
Number of pages: 30 Posted: 04 Nov 2008 Last Revised: 25 Aug 2009
Brigham Young University Hawaii, California State University, East Bay, affiliation not provided to SSRN and Virginia Tech - Pamplin College of Business
Downloads 348 (154,514)

Abstract:

Loading...

repertory grid, repgrid, personal construct theory, cognitive mapping

32.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Anthony Vance, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 340 (158,467)
Citation 3

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

33.

Privacy Concerns versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures

Journal of Management Information Systems, Vol. 27(4), pp. 163–200 (doi: 10.2753/MIS0742-1222270406), 2011
Number of pages: 66 Posted: 30 Aug 2010 Last Revised: 10 Aug 2014
Paul Benjamin Lowry, Jinwei Cao and Andrea Everard
Virginia Tech - Pamplin College of Business, University of Delaware - Accounting & MIS and University of Delaware - Accounting & MIS
Downloads 336 (160,502)
Citation 14

Abstract:

Loading...

34.

The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications

Number of pages: 66 Posted: 30 Jun 2013
Brigham Young University - Marriott School, West Texas A&M University, Virginia Tech - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 308 (176,078)
Citation 3

Abstract:

Loading...

location-based services, mobile computing, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, privacy

35.

The Effects of Perceived Enjoyment and Perceived Risks on Trust Formation and Intentions to Use Online Payment Systems: New Perspectives from an Arab Country

Electronic Commerce Research and Applications (ECRA), vol. 19(3), pp. 33–43
Number of pages: 47 Posted: 22 Jul 2016 Last Revised: 29 Dec 2016
Kamel Rouibah, Paul Benjamin Lowry and Yujong Hwang
Department of Communication Disorders Sciences - Department of Quantitative Methods & Information Systems, Virginia Tech - Pamplin College of Business and DePaul University
Downloads 302 (179,780)
Citation 1

Abstract:

Loading...

online payment, customer trust, perceived enjoyment, familiarity, propensity to trust, third-party seals, personal innovativeness, risk, intention to adopt, Kuwait

36.

The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?

Small Group Research (SGR), Vol. 37, No. 6, pp. 631-661, 2006
Number of pages: 39 Posted: 11 Sep 2006 Last Revised: 25 Aug 2009
Virginia Tech - Pamplin College of Business, University of Kansas - School of Business, Oklahoma State University-MSIS, University of Central Florida and University of Central Florida
Downloads 300 (181,047)
Citation 3

Abstract:

Loading...

Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)

37.

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Information Systems Research, vol. 26(2), pp. 282-300
Number of pages: 39 Posted: 19 Jan 2015 Last Revised: 25 Oct 2015
Jack Hsu, Sheng-Pao Shih, Yu Hung and Paul Benjamin Lowry
Tamkang University, Tamkang University, Tamkang University and Virginia Tech - Pamplin College of Business
Downloads 298 (182,286)
Citation 8

Abstract:

Loading...

IS security; behavioral security; in-role behaviors; extra-role behaviors; social control theory (SCT); security management; information security policy (ISP); formal control; social control; organizations

38.

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

“A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security,” Journal of the Association for Information Systems (JAIS), vol. 19(12), pp. 1187-1216, 2018
Number of pages: 48 Posted: 17 Jan 2018 Last Revised: 09 Jan 2019
Robert Willison, Paul Benjamin Lowry and Ray Paternoster
University of Newcastle, Virginia Tech - Pamplin College of Business and University of Maryland - Department of Criminology & Criminal Justice
Downloads 286 (190,275)
Citation 8

Abstract:

Loading...

computer abuse, internal computer abuse (ICA), deterrence theory (DT), rational choice theory (RCT), absolute deterrence, restrictive deterrence, security, behavioral security, organizational security, information security policies (ISPs), compliance violations, criminal behavior

39.

Seeking Middle-Range Theories in Information Systems Research

International Conference on Information Systems (ICIS 2015), Fort Worth, TX, December 13-18 (accepted September 16, 2015)
Number of pages: 20 Posted: 21 Oct 2015
Nik R. Hassan and Paul Benjamin Lowry
University of Minnesota - Duluth and Virginia Tech - Pamplin College of Business
Downloads 286 (191,662)
Citation 1

Abstract:

Loading...

Information systems theory, middle-range theory, grand theory, concepts, propositions, theory construction

40.

How Does Information Technology Capability Enable Digital Transformation? Considering the Mediating Roles of Agility

JAIS Theory Development Workshop, International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 41 Posted: 31 Oct 2016
IBM Research, Nanjing University - School of Information Management, Hawaii Pacific University - College of BusinessCity University of Hong Kong (CityU) - Department of Information Systems, Independent and Virginia Tech - Pamplin College of Business
Downloads 285 (191,012)

Abstract:

Loading...

Digital transformation, IT capability, Agility, Transformational leadership, Case studies, IT innovation, Strategy

41.

Model Checking for E-Commerce Control and Assurance

IEEE Transactions on Systems, Man, and Cybernetics: Part C (IEEETSMCC), Vol. 35, No. 3, pp. 445-450, 2005
Number of pages: 7 Posted: 02 Aug 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Tech - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 283 (192,338)

Abstract:

Loading...

e-business, model checking, atomicity, process and communication protocols, data typing

42.

Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications

AIS Transactions on Human-Computer Interaction (THCI), vol. 8(3), pp. 88–130 (2016)
Number of pages: 44 Posted: 20 Sep 2016 Last Revised: 04 Oct 2016
Brigham Young University - Marriott School, West Texas A&M University, West Texas A&M University, West Texas A&M University and Virginia Tech - Pamplin College of Business
Downloads 281 (193,780)
Citation 3

Abstract:

Loading...

Mobile applications, location-based services, network effects, privacy assurance, electronic commerce, information cascades, privacy seals, privacy calculus, information privacy

43.

Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy that are Necessary for Business-to-Business Electronic Marketplace Survival

Supply Chain Forum: An International Journal, Vol. 9, No. 1, pp. 92-110, 2008
Number of pages: 53 Posted: 01 Sep 2009
Government of the United States of America - Institute of Technology, Virginia Tech - Pamplin College of Business, Colorado State University, Fort Collins - Department of Management and Arizona State University (ASU) - Supply Chain Management
Downloads 280 (194,503)

Abstract:

Loading...

electronic markets, business-to-business marketplaces, supply-chain strategy, strategy

44.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
Clay Posey, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, University of Kansas - School of Business and Virginia Tech - Pamplin College of Business
Downloads 273 (199,561)
Citation 19

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

45.

An Emerging Scholar's Guide to More Effective Citation of Sources and Management of Citations

Number of pages: 8 Posted: 22 Apr 2019
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 271 (201,081)

Abstract:

Loading...

citations, writing, citation managers, Ph.D. students

46.

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 10 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 264 (206,356)

Abstract:

Loading...

interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations

47.

Moving Consumers from ‘Free’ to ‘Fee’ in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Area (MOBA) Games

Information Systems Research (ISR), vol. 34(1), 275-296 (2022)
Number of pages: 77 Posted: 04 Apr 2022 Last Revised: 27 Apr 2023
Wang Le, Paul Benjamin Lowry, Xin (Robet) Luo and Han Li
School of Management, Xi’an Jiaotong University, Virginia Tech - Pamplin College of Business, University of New Mexico - Robert O. Anderson Schools of Management and affiliation not provided to SSRN
Downloads 256 (212,809)
Citation 4

Abstract:

Loading...

Freemium markets; vertical differentiation; horizontal differentiation; fairness; consumption values theory; longitudinal experiment; difference-in-difference model.

48.

Future Directions for Behavioral Information Security Research

Computers & Security, Vol. 32(1), pp. 90-101 (doi:10.1016/j.cose.2012.09.010)
Number of pages: 38 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Washington State University - Department of Management, Information Systems, and Entrepreneurship (MISE), University of Alabama at Birmingham - Department of Accounting and Information Systems, Virginia Tech - Pamplin College of Business, Zicklin School of Business, Baruch College - The City University of New York, Mississippi State University - Department of Management and Information Systems and Georgia State University
Downloads 252 (216,119)
Citation 6

Abstract:

Loading...

Information Security, Future Research, Behavioral Information Security, Research Challenges, Deviant Security Behavior

49.

Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2203-2211
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Tom Roberts
Virginia Tech - Pamplin College of Business and University of Kansas - School of Business
Downloads 249 (218,742)
Citation 4

Abstract:

Loading...

Heuristic evaluation, collaborative software, usability, HCI, distributed work

50.

Model Checking for Design and Assurance of E-Business Processes

Decision Support Systems (DSS), Vol. 39, No. 3, pp. 333-344, 2005
Number of pages: 29 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Tech - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 246 (221,255)

Abstract:

Loading...

e-Business, Model checking, Money atomicity, Goods atomicity, Valid receipt, Process and communication protocols

51.

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance

Journal of Management Information Systems (JMIS), vol. 37(1), pp. 129-161
Number of pages: 76 Posted: 07 Aug 2019 Last Revised: 04 May 2020
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Tech - Pamplin College of Business
Downloads 244 (223,051)
Citation 3

Abstract:

Loading...

gamification; design science research (DSR); hedonic-motivation system adoption model (HMSAM); immersion; flow; security compliance; security education, training, and awareness (SETA)

52.

An Emerging Scholar’s Guide to Writing Theory-Based Post-Positivistic Academic Articles

Number of pages: 21 Posted: 11 Dec 2018
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 241 (225,815)

Abstract:

Loading...

scholarship, publishing, research articles, writing, post-postivism, theory building

53.

New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2801-2812, 2003
Number of pages: 13 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Denton Romans
Virginia Tech - Pamplin College of Business and PricewaterhouseCoopers LLP
Downloads 239 (227,676)

Abstract:

Loading...

IS journal rankings, academics, scientometrics

54.

Useful Products in Information Systems Theorizing: A Discursive Formation Perspective

Journal of the Association for Information Systems (JAIS), vol. 23 (2), 418–446
Number of pages: 58 Posted: 13 Jul 2021 Last Revised: 15 Mar 2022
Nik R. Hassan, Paul Benjamin Lowry and Lars Mathiassen
University of Minnesota - Duluth, Virginia Tech - Pamplin College of Business and Georgia State University - Center for Process Innovation (CEPRIN)
Downloads 227 (239,152)
Citation 2

Abstract:

Loading...

Information Systems (IS) theory, theorizing, discursive formation, question, paradigm, law, framework, myth, analogy, metaphor, model, concept, construct, hypothesis, statement, media richness theory

55.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Anthony Vance, Paul Benjamin Lowry and Jeffrey A. Ogden
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Government of the United States of America - Institute of Technology
Downloads 208 (259,482)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

56.

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

Journal of Management Information Systems (JMIS), vol. 34(2), pp. 560–596
Number of pages: 64 Posted: 17 Apr 2017 Last Revised: 27 Nov 2017
Virginia Tech - Pamplin College of Business, Virginia Tech - Pamplin College of Business, Virginia Tech - Pamplin College of Business and Mississippi State University - Department of Management and Information Systems
Downloads 202 (266,532)
Citation 1

Abstract:

Loading...

Online Social Networks (OSNs), OSN Obsessive-Compulsive Disorder, OSN Addiction, OSN Belongingness, Need-To-Belong Theory, Uses and Gratifications Theory, Facebook

57.

Using Internet-Based, Distributed Collaborative Writing Tools to Improve Coordination and Group Awareness in Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003
Number of pages: 22 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Tech - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 200 (269,000)
Citation 1

Abstract:

Loading...

Collaborative writing (CW), distributed work, group awareness, group support systems, group writing, media richness theory

58.

Culture and Media Effects on Group Decision Making Under Majority Influence

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Dongsong Zhang, Paul Benjamin Lowry, Xiaolan Fu, Lina Zhou and Boonlit Adipat
University of Maryland, Baltimore County, Virginia Tech - Pamplin College of Business, Chinese Academy of Sciences (CAS) - Institute of Psychology, University of Maryland, Baltimore County and University of Maryland, Baltimore County
Downloads 199 (270,212)

Abstract:

Loading...

59.

Improving Password Cyber-Security Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals

Information Technology for Development, vol. 20(2), pp. 196–213
Number of pages: 31 Posted: 12 Jul 2013 Last Revised: 08 Jun 2014
University of Arizona, University of Arizona - Department of Management Information Systems, University of Arizona - Department of Management Information Systems and Virginia Tech - Pamplin College of Business
Downloads 195 (275,199)
Citation 1

Abstract:

Loading...

password reuse, keystroke dynamics, protection motivation theory, just-in-time fear appeals, support vector machine, cyber-security, developing countries

60.

Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations

Small Group Research (SGR), Vol. 38, No. 1, pp. 3-11, 2007
Number of pages: 16 Posted: 29 Mar 2007 Last Revised: 25 Aug 2009
Nicholas C. Romano, Paul Benjamin Lowry and Tom Roberts
Oklahoma State University-MSIS, Virginia Tech - Pamplin College of Business and University of Kansas - School of Business
Downloads 189 (283,015)
Citation 1

Abstract:

Loading...

collaboration, small groups, virtual teams

61.

The Role of Mobile-Computing Self-Efficacy in Consumer Information Disclosure

Information Systems Journal (ISJ), vol. 25(4), pp. 637–667 (doi: 10.1287/isre.2015.0569)
Number of pages: 66 Posted: 12 May 2015 Last Revised: 21 Oct 2015
Brigham Young University - Marriott School, West Texas A&M University, Virginia Tech - Pamplin College of Business, West Texas A&M University and West Texas A&M University
Downloads 188 (284,319)
Citation 3

Abstract:

Loading...

Mobile-Computing Self-Efficacy, Location-Based Services, Trust, Perceived Risk, Privacy Calculus, Mobile Apps, Smartphones

62.

A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals

IEEE Transactions on Professional Communication (IEEETPC), Vol. 50, No. 4, pp. 352-378, 2007
Number of pages: 28 Posted: 19 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Sean Humphreys, Jason Malwitz and Joshua Nix
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 187 (287,085)

Abstract:

Loading...

Business communication, journal influence, journal quality, journal rankings, journal survey, professional communication, scientometrics, technical communication, technology-based communication

63.

Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions

MIS Quarterly, Vol. 35(1), pp. 1–15 (ISSN- 0276-7783), 2011
Number of pages: 48 Posted: 02 Mar 2010 Last Revised: 30 Jun 2013
Douglas L. Dean, Paul Benjamin Lowry and Sean Humphreys
Brigham Young University - Information Systems Department, Virginia Tech - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 184 (289,893)

Abstract:

Loading...

Tenure standards, publication standards, publication benchmarks, faculty productivity, scientometrics, Carnegie Classification

64.

Understanding Patients’ Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior

International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17
Number of pages: 15 Posted: 23 Nov 2014
Paul Benjamin Lowry, Dongsong Zhang and Dezhi Wu
Virginia Tech - Pamplin College of Business, University of Maryland, Baltimore County and University of South Carolina
Downloads 183 (291,319)

Abstract:

Loading...

healthcare, mobile healthcare system, patient compliance, trust, patient-doctor communication, patient planned behavior

65.

The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes

Journal of the Association for Information Systems (JAIS), vol. 23(4), 913–965
Number of pages: 80 Posted: 02 Nov 2021 Last Revised: 02 Sep 2022
Tabitha James, France Belanger and Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business, Virginia Tech and Virginia Tech - Pamplin College of Business
Downloads 178 (298,459)

Abstract:

Loading...

continuance; fitness technologies; self-determination model of health behavior (SDMHB); self-determination theory (SDT); basic psychological needs (BPNs) theory; causality orientations theory; exercise goals; subjective vitality

66.

An Emerging Scholar’s Guide to the Leading International Information Systems and Business Analytics Research Resources and Publication Outlets

Number of pages: 17 Posted: 26 Mar 2020
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 178 (298,459)

Abstract:

Loading...

Information Systems, Analytics, Journal Rankings, Scientometrics, Tenure and Promotion

67.

It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis

European Journal of Information Systems (EJIS) vol. 26(4), pp. 379-413, 2015
Number of pages: 74 Posted: 23 Aug 2015 Last Revised: 27 Aug 2017
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 177 (299,914)
Citation 4

Abstract:

Loading...

Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer

68.

Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior

International Journal of Human-Computer Studies, vol. 71(12), pp. 1163-1173
Number of pages: 48 Posted: 10 Sep 2013 Last Revised: 01 Apr 2014
Brigham Young University - Marriott School, University of Alabama - Department of Information Systems, Statistics, and Management Science, University of Alabama - Department of Information Systems, Statistics, and Management Science, Virginia Tech - Pamplin College of Business and University of Alabama - Department of Information Systems, Statistics, and Management Science
Downloads 176 (301,368)
Citation 1

Abstract:

Loading...

information privacy, information disclosure, location data, mobile devices, experimental methodology, privacy calculus

69.

Creating Agile Organizations Through IT: The Influence of Internal IT Service Perceptions on IT Service Quality and IT Agility

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 211–226
Number of pages: 51 Posted: 31 May 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry and David Wilson
Virginia Tech - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 172 (307,434)
Citation 1

Abstract:

Loading...

IT service climate, internal IT service perceptions, IT service quality, IT agility, construct distinctiveness, IT strategy

70.

Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use

Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
Number of pages: 10 Posted: 30 Jun 2013 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, Kamel Rouibah, Gregory D Moody and Mikko Siponen
Virginia Tech - Pamplin College of Business, Department of Communication Disorders Sciences - Department of Quantitative Methods & Information Systems, University of Nevada, Las Vegas - College of Business and University of Oulu
Downloads 170 (310,566)

Abstract:

Loading...

whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons

71.

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best-paper nomination), pp. 72-76, Montréal, December 8, 2007
Number of pages: 7 Posted: 07 Oct 2009
Virginia Tech - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, Hitachi Consulting and University of Kansas - School of Business
Downloads 169 (312,202)
Citation 5

Abstract:

Loading...

Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli

72.

Examining the Intended and Unintended Consequences of Organisational Privacy Safeguards Enactment in Healthcare

European Journal of Information Systems (EJIS), 2017, vol. 26(1), pp. 37–65
Number of pages: 51 Posted: 11 May 2016 Last Revised: 24 Apr 2018
Rachida Parks, Heng Xu, Chao-Hsien Chu and Paul Benjamin Lowry
University of Arkansas at Little Rock - Department of Management, Pennsylvania State University - College of Information Sciences & Technology, Pennsylvania State University - College of Information Sciences & Technology and Virginia Tech - Pamplin College of Business
Downloads 168 (313,736)
Citation 3

Abstract:

Loading...

Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework

73.

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence

39th Annual Hawai'i International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Kauai, Hawaii, January 4-7, 2006 (doi: 10.1109/HICSS.2006.217).
Number of pages: 9 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Tom Roberts, Paul Benjamin Lowry, Paul Cheney and Ross Hightower
University of Kansas - School of Business, Virginia Tech - Pamplin College of Business, University of Central Florida and University of Central Florida
Downloads 163 (321,999)

Abstract:

Loading...

communication, collaborative software, GSS, media richness, social presence, group size

74.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 161 (325,396)
Citation 3

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

75.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
Clay Posey, Paul Benjamin Lowry, Tom Roberts and Selwyn Ellis
University of Central Florida, Virginia Tech - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 157 (332,393)
Citation 32

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

76.

The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises,

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 19 Posted: 22 May 2015
Kristijan Mirkovski, Paul Benjamin Lowry, Frederik von Briel and Libo Liu
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Tech - Pamplin College of Business, UQ Business School and Swinburne University of Technology - Faculty of Business and Enterprise
Downloads 153 (339,679)

Abstract:

Loading...

Innovation intermediaries, open innovation, collaborative networks, SMEs, wine industry

77.

An Evaluation of the Impact of Social Presence through Group Size and the Use of Collaborative Software on Group Member 'Voice' in Face-to-Face and Computer-Mediated Task Groups

IEEE Transactions on Professional Communication (IEEETPC), Vol. 49, No. 1, pp. 28-43, 2006
Number of pages: 17 Posted: 20 Jan 2006 Last Revised: 01 Sep 2009
Tom Roberts, Paul Benjamin Lowry and Paul Sweeney
University of Kansas - School of Business, Virginia Tech - Pamplin College of Business and University of Dayton - School of Business Department of Management
Downloads 151 (345,118)
Citation 1

Abstract:

Loading...

Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration

78.

The Value of Distrust in Computer-Based Decision-Making Groups

43rd Annual Hawaii International Conference on System Sciences, Hawaii, January 5-8, 2010
Number of pages: 12 Posted: 14 Oct 2009
Virginia Tech - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Georgia State University - Department of Computer Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - School of Accountancy
Downloads 149 (347,008)

Abstract:

Loading...

distrust, decision-making, groups, teams, collaboration, trust, CMC

79.

The Application of Model Checking for Securing E-Commerce Transactions

Communications of the Association for Computing Machinery (CACM), Vol. 49, No. 6, pp. 97-101, 2006
Number of pages: 11 Posted: 26 Jan 2006 Last Revised: 25 Aug 2009
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Tech - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 148 (348,898)

Abstract:

Loading...

model checking, e-commerce, security, money atomicity, goods atomicity, validated receipt

80.

Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 16 Posted: 21 May 2015
Jun Zhang, Victor Dibia, Alexey Sodnomov and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, IBM Research, City University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 142 (360,714)

Abstract:

Loading...

Wearables, Quantified Self 2.0, Self-disclosure, Healthcare Online Communities, Self-Presentation Theory, Hierarchical Linear Modelling  

81.

Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment

Journal of Management Information Systems (JMIS) 40(2):401-439
Number of pages: 72 Posted: 14 Feb 2023 Last Revised: 10 Jul 2023
Wuhan University - School of Information Management, Copenhagen Business School, Renmin University of China, Nanjing University - School of Information Management, Virginia Tech - Pamplin College of Business and Beijing Jiao Tong University
Downloads 140 (364,690)

Abstract:

Loading...

fitness mobile application, social gamification, interpersonal competition, intergroup competition, cooperation, coopetition, social interaction mechanisms (SIMs), field experiment, game engagement, daily steps

82.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 140 (364,690)

Abstract:

Loading...

83.

The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups

Journal of Management Information Systems, vol. 26(1), pp. 155–196 (doi: 10.2753/MIS0742-1222260107).
Number of pages: 61 Posted: 25 Aug 2009 Last Revised: 30 Jun 2013
Virginia Tech - Pamplin College of Business, Oklahoma State University-MSIS, University of Arizona and California State Polytechnic University, Pomona
Downloads 138 (368,850)

Abstract:

Loading...

Ultra-lean interactive media (ULIM), Audience response systems (ARS), Human Computer Interaction (HCI), collaboration, large groups, interactivity, ultra-lean interactivity, CMC Interactivity Model (CMCIM)

84.

Standards and Verification for Fair-Exchange and Atomicity in E-Commerce Transactions

Information Sciences, Vol. 176, pp. 1045-1066, 2006
Number of pages: 28 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy, Virginia Tech - Pamplin College of Business and Brigham Young University - School of Accountancy
Downloads 138 (368,850)

Abstract:

Loading...

e-Business, e-commerce, protocols, model checking, money atomicity, goods atomicity, valid receipt, standards enforcement

85.

Using it Design to Prevent Cyberbullying

Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901
Number of pages: 64 Posted: 19 Jun 2017 Last Revised: 27 Nov 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 136 (372,963)
Citation 4

Abstract:

Loading...

Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure

86.

Consulting at the Laser ISP (LISP) Company: Using Excel(TM) Metrics Capabilities to Solve Unstructured, Management Problems

Journal of Information System Education (JISE), Vol. 14, No. 4, pp. 353-359, 2003
Number of pages: 8 Posted: 14 Feb 2005 Last Revised: 05 Nov 2014
Douglas L. Dean and Paul Benjamin Lowry
Brigham Young University - Information Systems Department and Virginia Tech - Pamplin College of Business
Downloads 136 (372,963)

Abstract:

Loading...

Excel, metrics, management consulting, internet service providers, help desk, Information Systems, customer service

87.

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature

Journal of the Association for Information Systems (JAIS), vol. 22(5), pp. 1376–1428
Number of pages: 89 Posted: 28 Dec 2020 Last Revised: 02 Sep 2022
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Tech - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 135 (377,285)

Abstract:

Loading...

information security (ISec), security threats, fear appeals, construal level theory (CLT), protection motivation theory (PMT), fear-appeal design, argument nature, temporal distance, organizational security, behavioral security

88.

Users Experiences in Collaborative Writing Using Collaboratus, an Internet-Based Collaborative Work

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 244-253 (doi: 10.1109/HICSS.2002.993879)
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry, Conan Albrecht, James Lee and Jay F. Nunamaker
Virginia Tech - Pamplin College of Business, Brigham Young University - School of Accountancy, University of Arizona - Center for the Management of Information (CMI) and University of Arizona - Center for the Management of Information (CMI)
Downloads 135 (375,096)
Citation 2

Abstract:

Loading...

Collaborative writing, user experiences, collaboration, group work

Assessing the Impact of Premier Information Systems Research Over Time

Communications of the AIS (CAIS), Vol. 19, pp. 115-131, March 2007
Number of pages: 19 Posted: 29 Mar 2007 Last Revised: 03 Aug 2014
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Tech - Pamplin College of Business and University of Arkansas at Fayetteville
Downloads 134 (378,192)

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems, IS field

Assessing the Impact of Premier Information Systems Research Over Time

Posted: 14 Nov 2005
Gilbert G. Karuga, Paul Benjamin Lowry and Vernon J. Richardson
University of Kansas, Virginia Tech - Pamplin College of Business and University of Arkansas at Fayetteville

Abstract:

Loading...

Citation analysis, IT artifact, scientometrics, bibliometrics, information systems field, journal influence

90.

Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: The Role of Achievement Goals and Achievement Motivational Affordance

20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, June 27–July 1
Number of pages: 11 Posted: 02 Jul 2018
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 133 (379,421)

Abstract:

Loading...

wearable device, quantified-self, running platforms, physical activity maintenance, motivational affordance, achievement goal, mastery goal, performance goal

91.

Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 193-200, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 02 Aug 2014
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 132 (381,589)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work, design

92.

The Impact of Process Structure on Novice, Internet-Based, Asynchronous-Distributed Collaborative Writing Teams

IEEE Transactions on Professional Communication (IEEETPC), Vol. 48, No. 4, pp. 341-364, 2005
Number of pages: 25 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Virginia Tech - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 127 (393,220)

Abstract:

Loading...

distributed group work, collaborative writing, process structure, collaboration, Internet-based

93.

Understanding Contributor Withdrawal from Online Communities: The Role of Cognitive Dissonance and Emotional Change

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the 2013 International Conference on Systems Sciences (ICIS 2013), Milan, Italy, December 15
Number of pages: 33 Posted: 23 Nov 2014
Ling Jiang, Paul Benjamin Lowry and Christian Wagner
York University, Virginia Tech - Pamplin College of Business and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 126 (397,947)

Abstract:

Loading...

Contributor withdrawal, cognitive dissonance, emotional change, sense-making, online communities

94.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Paul Benjamin Lowry, Gregory D Moody, Dennis Galletta and Anthony Vance
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 124 (400,394)
Citation 2

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

95.

Breaking Bad in Cyberspace: Understanding Why and How Black Hat Hackers Manage Their Nerves to Commit Their Virtual Crimes

Information Systems Frontiers (ISF), vol. 23 (April), pp. 329-341
Number of pages: 29 Posted: 11 Sep 2019 Last Revised: 12 Jul 2021
Mario Silic and Paul Benjamin Lowry
Swiss School of Business and Management (SSBM) and Virginia Tech - Pamplin College of Business
Downloads 122 (405,246)

Abstract:

Loading...

Black hat hacker; security; criminology nerve management; general strain theory; routine activity theory (RAT)

96.

Proposing the Hedonic Affect Model (HAM) to Explain How Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use

Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences, Paris, France, December 13. All Sprouts Content, vol. 8(24), paper 230, pp. 1-51
Number of pages: 59 Posted: 30 Jun 2013
Virginia Tech - Pamplin College of Business, University of Arizona, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, University of Arizona - Department of Management Information Systems and University of Arkansas
Downloads 122 (405,246)
Citation 1

Abstract:

Loading...

affect, expectations disconfirmation, stimulus, attention, perceived affective quality, hedonic systems

97.

Understanding Inconsistent Employee Compliance with Information Security Policies through the Lens of the Extended Parallel Process Model

Information Systems Research (ISR), vol. 32(3), pp. 1043–1065, 2021
Number of pages: 85 Posted: 22 Mar 2021 Last Revised: 01 Nov 2021
Florida International University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Tech - Pamplin College of Business, University of New Mexico - Robert O. Anderson Schools of Management, UNLV and Xi'an Jiaotong University (XJTU)
Downloads 118 (415,328)
Citation 2

Abstract:

Loading...

Information security (ISec), extended parallel processing model (EPPM), protection motivation theory (PMT), organizational security

98.

Application of Expectancy Violations Theory to Communication with and Judgments About Embodied Agents During a Decision-Making Task

International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36, Forthcoming
Number of pages: 47 Posted: 15 Feb 2016 Last Revised: 09 May 2016
University of Arizona - Eller College of Management, University of Arizona, Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School and University of Arizona - Department of Management Information Systems
Downloads 118 (415,328)
Citation 2

Abstract:

Loading...

Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making

99.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry and Ross Hightower
University of Central Florida, University of Kansas - School of Business, Virginia Tech - Pamplin College of Business and University of Central Florida
Downloads 118 (415,328)
Citation 7

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

100.

Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

Journal of Management Information Systems (JMIS), vol. 40(4) 1099-1138
Number of pages: 138 Posted: 24 Apr 2023 Last Revised: 30 Jan 2024
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, SUNY at Binghamton - School of Management and Virginia Polytechnic Institute & State University, Department of Business Information Technology
Downloads 117 (418,019)

Abstract:

Loading...

security, information security management (ISM), two-stage meta-analytic structural equation modeling (TSSEM), protection motivation theory (PMT), extended parallel process model (EPPM)

101.

Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)

Number of pages: 42 Posted: 30 Jun 2013
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Tech - Pamplin College of Business
Downloads 115 (423,331)
Citation 3

Abstract:

Loading...

trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)

102.

Effects of Culture, Social Presence, and Group Composition on Trust in Technology-Supported Decision-Making Groups

Information Systems Journal (ISJ), Vol. 20, No. 3, pp. 297-315
Number of pages: 30 Posted: 25 Aug 2009 Last Revised: 05 Aug 2014
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Tech - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 115 (423,331)
Citation 1

Abstract:

Loading...

103.

Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2172-2179, 2002
Number of pages: 9 Posted: 14 Feb 2005 Last Revised: 27 Jul 2014
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 115 (423,331)
Citation 1

Abstract:

Loading...

Collaborative writing, group work, Collaboratus, distributed work

104.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), vol. 30(4), pp. 1228–1247 (2019)
Number of pages: 46 Posted: 21 Mar 2019 Last Revised: 02 Jan 2020
AJ Burns, Tom Roberts, Clay Posey and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida and Virginia Tech - Pamplin College of Business
Downloads 114 (426,069)
Citation 8

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

105.

Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies

Information Systems Journal, vol. 25(5), pp. 433-463 (2015)
Number of pages: 51 Posted: 09 Jun 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry and Gregory D Moody
Virginia Tech - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 113 (428,865)
Citation 6

Abstract:

Loading...

Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects

106.

Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions

Proceedings of the Dewald Roode Workshop in Information Systems Security 2018, IFIP WG 8.11 / 11.13, Cape Town, South Africa, June 14–15
Number of pages: 32 Posted: 21 May 2018
Kennedy Njenga and Paul Benjamin Lowry
University of Johannesburg and Virginia Tech - Pamplin College of Business
Downloads 112 (431,625)
Citation 1

Abstract:

Loading...

Information System (IS) Security, Information Security Policy (ISP), Violations, Grounded Theory

107.

Using the Thinklet Framework to Improve Distributed Collaborative Writing

35th Annual Hawaii International Conference on System Sciences, Hawaii, January 7-10, pp. 4051-4060 (doi: 10.1109/HICSS.2002.994539).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Tech - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 112 (431,625)

Abstract:

Loading...

Thinklets, collaborative writing, collaboration, facilitation, group work

108.

Collaborating with Technology-Based Autonomous Agents: Issues and Research Opportunities

“Collaborating with technology-based autonomous agents: Issues and research opportunities,” Internet Research, vol. 30(1) 1-18
Number of pages: 24 Posted: 09 Jan 2020 Last Revised: 18 May 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, Saarland University, University of British Columbia (UBC) - Sauder School of Business and Virginia Tech - Pamplin College of Business
Downloads 111 (434,418)
Citation 3

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences.

109.

The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences (ICIS 2015), Fort Worth, TX, December 13–18
Number of pages: 38 Posted: 31 Oct 2016
Jun Zhang and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 111 (434,418)

Abstract:

Loading...

wearable device, quantified-self 2.0 platforms, health behavior maintenance, motivational affordance, self-efficacy

110.

The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing

40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Big Island, Hawaii, January 3-6, 2007 (doi: 10.1109/HICSS.2007.546))
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 06 Oct 2009
Gregory D Moody, Taylor Michael Wells and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, California State University, East Bay and Virginia Tech - Pamplin College of Business
Downloads 110 (437,280)

Abstract:

Loading...

interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE

111.

The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation

19th Pacific Asia Conference on Information Systems (PACIS 2015), Singapore, July 5–9
Number of pages: 10 Posted: 22 May 2015
Xiling Cui, Qiang Zhou and Paul Benjamin Lowry
Independent, Independent and Virginia Tech - Pamplin College of Business
Downloads 109 (443,173)

Abstract:

Loading...

information and communication technology, knowledge sharing, in-role, extra-role, open innovation.

112.

Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation

Journal of the Association for Information Systems (JAIS), Vol. 10, No. 3, pp. 170-195.
Number of pages: 28 Posted: 21 Oct 2007 Last Revised: 25 Aug 2009
Paul Benjamin Lowry, Tom Roberts, Douglas L. Dean and George M Marakas
Virginia Tech - Pamplin College of Business, University of Kansas - School of Business, Brigham Young University - Information Systems Department and Florida International University (FIU)
Downloads 109 (440,199)

Abstract:

Loading...

Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software

113.

Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 104–120
Number of pages: 83 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Paul Benjamin Lowry, Jun Zhang and Tailai Wu
Virginia Tech - Pamplin College of Business, City University of Hong Kong (CityU) - Department of Information Systems and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 108 (446,185)
Citation 3

Abstract:

Loading...

Digital Piracy, Piracy, Meta-Analysis, Literature Review, Social Cognitive Theory (SCT), Theory Building, Illegal File Sharing, Copyright Infringement, Neutralization, Sanctions, Morality, Costs, Benefits, Risks, Social Influence, Perceived Behavioral Control (PBC), Self-Efficacy

114.

The Process of Information Systems Theorizing as a Discursive Practice

Journal of Information Technology (JIT), vol. 34(3), pp. 198-220 (2019)
Number of pages: 57 Posted: 04 Feb 2019 Last Revised: 04 May 2020
Nik R. Hassan, Lars Mathiassen and Paul Benjamin Lowry
University of Minnesota - Duluth, Georgia State University - Center for Process Innovation (CEPRIN) and Virginia Tech - Pamplin College of Business
Downloads 107 (446,185)
Citation 4

Abstract:

Loading...

Information systems theory, theorizing, research methods, discursive practices, problematizing, paradigms, analogies, metaphors, myths, models and concepts

115.

Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study

Information Systems Journal (ISJ), vol. 29(1), pp. 43-69, 2019
Number of pages: 60 Posted: 23 Oct 2017 Last Revised: 09 Jan 2019
John D'Arcy and Paul Benjamin Lowry
University of Delaware - Alfred Lerner College of Business and Economics and Virginia Tech - Pamplin College of Business
Downloads 106 (449,218)

Abstract:

Loading...

Compliance, Information Security Policies (ISPs), Security, Organisational Security, ISP Compliance, Rational Choice Theory (RCT), Affect, Mood, Mood States, Morality, Multilevel Analysis, Organisational Compliance, Theory of Planned Behaviour (TPB), Organisational Citizenship Behaviours (OCBs)

116.

Using the Control Balance Theory to Explain Social Media Deviance

Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI, January 4–7, pp. 2253–2262
Number of pages: 11 Posted: 31 Oct 2016 Last Revised: 13 Mar 2017
Paul Benjamin Lowry, Gregory D Moody and Sutirtha Chatterjee
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 106 (449,218)

Abstract:

Loading...

117.

Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats

Journal of the Association for Information Systems (JAIS), Vol. 17(6) pp. 413-434, Forthcoming
Number of pages: 36 Posted: 26 Jan 2016 Last Revised: 28 Jun 2016
James Gaskin, Paul Benjamin Lowry and David Hull
Brigham Young University - Marriott School, Virginia Tech - Pamplin College of Business and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 105 (452,233)
Citation 2

Abstract:

Loading...

Communication media, research dissemination, knowledge dissemination, scholarship, academic publishing, video media, multimedia instruction

118.

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Journal of Management Information Systems (JMIS), vol. 32(3), pp. 1–39 (doi: 10.1080/07421222.2015.1099180)
Number of pages: 53 Posted: 08 Aug 2015 Last Revised: 21 Oct 2015
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 105 (452,233)
Citation 3

Abstract:

Loading...

Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance

119.

Information technology and organizational innovation: Harmonious information technology affordance and courage-based actualization

Journal of Strategic Information Systems (JSIS), vol. 29(1), March, Article 101596, pp. 1–23
Number of pages: 55 Posted: 30 Dec 2019 Last Revised: 04 May 2020
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 100 (468,125)
Citation 2

Abstract:

Loading...

IT affordance, innovation, matching fit, covariance fit, organizational courage, actualization

120.

Xml Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for Using Xml to Mediate Heterogeneous Data Sources and Targets

34th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6, 2001, pp. 2535-2543 (doi: 10.1109/HICSS.2001.9270
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 100 (468,125)

Abstract:

Loading...

XML, data mediation, collaboration, heterogeonous data

121.

Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach

Journal of the Association for Information Systems (JAIS), vol. 19(7), pp. 618-671
Number of pages: 72 Posted: 17 Aug 2017 Last Revised: 13 Oct 2018
Jack Hsu, Chao-Min Chiu, Paul Benjamin Lowry and T.P. Liang
Tamkang University, National Sun Yat-sen University, Virginia Tech - Pamplin College of Business and National Sun Yat-sen University - College of Management
Downloads 99 (471,295)

Abstract:

Loading...

Formative Measurement, Fixed-Weight Redundancy Model (FWRM), Free-Estimation Model, Interpretational Confounding, Interpretational Ambiguity, MIMIC Model, Structural Equation Modeling (SEM), Partial Least Squares (PLS)

122.

Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China?

Journal of Management Information Systems (JMIS), vol. 33(4) 1209–1251
Number of pages: 61 Posted: 02 Nov 2016 Last Revised: 27 Feb 2017
Vincent Lai, Fujun Lai and Paul Benjamin Lowry
The Chinese University of Hong Kong (CUHK) - Department of Decision Sciences & Managerial Economics, University of Southern Mississippi - College of Business Administration and Virginia Tech - Pamplin College of Business
Downloads 94 (487,572)
Citation 3

Abstract:

Loading...

Enterprise resource planning system (ERP), ERP assimilation, technology evaluation, technology imitation, diffusion of innovation (DOI) theory, China, adoption, assimilation

123.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Paul Benjamin Lowry, Clay Posey, Becky Bennett and Tom Roberts
Virginia Tech - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 94 (487,572)
Citation 6

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

124.

Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Journal of Management Information Systems (JMIS), Vol. 27, No. 1, pp. 181-207
Number of pages: 42 Posted: 24 Aug 2009 Last Revised: 27 Jul 2013
University of Oklahoma - Michael F. Price College of Business, Virginia Tech - Pamplin College of Business, University of Arizona - Eller College of Management and University of Arizona - Center for the Management of Information (CMI)
Downloads 94 (487,572)
Citation 1

Abstract:

Loading...

125.

The Effect of CIO Virtues on CIO Role Effectiveness

52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11
Number of pages: 10 Posted: 30 Oct 2018
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Virginia, University of Nevada, Las Vegas - College of Business and Virginia Tech - Pamplin College of Business
Downloads 93 (490,855)

Abstract:

Loading...

Virtues, Ethics, Organizational Leadership, Role Effectiveness, CIO, Information Technology, Executives

126.

The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination

Computers & Security, vol. 75(June), pp. 147-166, 2018
Number of pages: 42 Posted: 06 Feb 2018 Last Revised: 30 Jun 2018
Phillip Menard, Merrill Warkentin and Paul Benjamin Lowry
University of South Alabama, Mississippi State University - Department of Management and Information Systems and Virginia Tech - Pamplin College of Business
Downloads 93 (490,855)
Citation 7

Abstract:

Loading...

protection motivation theory (PMT), psychological ownership, collectivism, individualism, information security behavior

127.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Anthony Vance, Braden Molyneux, Paul Benjamin Lowry and Dennis L. Eggett
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 91 (497,641)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

128.

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites

HUMAN-COMPUTER INTERACTION, pp. 77-85, J. Jacko, ed., CRC, 2007, 12th International Conference on HCI, Beijing, Part 4, pp. 77-85, July 22-27, 2007
Number of pages: 10 Posted: 27 Sep 2009
Paul Benjamin Lowry, Tom Roberts and Trevor Higbee
Virginia Tech - Pamplin College of Business, University of Kansas - School of Business and affiliation not provided to SSRN
Downloads 91 (497,641)

Abstract:

Loading...

trust, mere-exposure effect, familiarity, logos, swift trust, websites

129.

When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior

Electronic Commerce Research and Applications, vol. 13(4), pp. 266-282
Number of pages: 55 Posted: 09 Jun 2014 Last Revised: 05 Apr 2015
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Tech - Pamplin College of Business
Downloads 90 (501,100)
Citation 1

Abstract:

Loading...

Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle

130.

Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7
Number of pages: 11 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Nicholas C. Romano and Randy Guthrie
Virginia Tech - Pamplin College of Business, Oklahoma State University-MSIS and California State Polytechnic University, Pomona
Downloads 90 (501,100)

Abstract:

Loading...

ARS, audience response systems, large classrooms, education, interactivity, communication, status effects, satisfaction, active learning

131.

Gender deception in asynchronous online communication: A path analysis

Information Processing & Management (IP&M), vol. 53(1), pp. 21–41
Number of pages: 49 Posted: 13 Jun 2016 Last Revised: 13 Mar 2017
Florida State University, Virginia Tech - Pamplin College of Business, Mississippi State University - Department of Management and Information Systems, Florida State University and Florida State University, Students
Downloads 85 (519,205)

Abstract:

Loading...

Human Computer Interaction, Computer-Mediated Communication, Human Information Behavior, Gender, Deception, Online Game

132.

Stock Market Reactions to Favorable and Unfavorable Information Security Events: A Systematic Literature Review

Computers & Security (C&S), vol. 110 (November), article: 102451
Number of pages: 65 Posted: 30 Sep 2021 Last Revised: 01 Nov 2021
Universiti Teknologi Petronas, Universiti Teknologi Petronas, Universiti Teknologi Petronas, Virginia Tech - Pamplin College of Business, Virginia Polytechnic Institute & State University, Department of Business Information Technology and Universiti Teknologi Petronas
Downloads 84 (522,944)
Citation 2

Abstract:

Loading...

Event study methodology (ESM), information security (ISec) breaches, systematic literature review (SLR), ISec events, ISec investments, efficient market hypothesis, contingency factors, abnormal returns

133.

Factors that Influence Interorganizational Use of Information and Communications Technology in Relationship-Based Supply Chains: Evidence from the Macedonian and American Wine Industries

Supply Chain Management: An International Journal (SCM), Vol., 21(3), 1-31, 2016, DOI: 10.1108/SCM-08-2015-0343
Number of pages: 37 Posted: 27 Nov 2015 Last Revised: 28 Jun 2016
Kristijan Mirkovski and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 84 (522,944)

Abstract:

Loading...

Supply chain integration, Developed economies, Developing economies, ICT use, SMEs, Wine industry.

134.

The 'Voice Effect' in Groups

The Second Annual Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS), Seattle, December 12-13, pp. 42-46
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts and Paul Benjamin Lowry
University of Kansas - School of Business and Virginia Tech - Pamplin College of Business
Downloads 84 (522,944)

Abstract:

Loading...

Human Computer Interaction, voice effect, collaboration

135.

The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers’ Cognitive Gaps in IoT Settings

Hawaii International Conferences on Systems Sciences (HICSS-53), Maui, January 8–10, pp. 5076–5085
Number of pages: 12 Posted: 13 Dec 2019 Last Revised: 12 Jul 2021
Daniel Choi, Paul Benjamin Lowry and G. Alan Wang
CSUN, Virginia Tech - Pamplin College of Business and Virginia Tech
Downloads 83 (526,794)

Abstract:

Loading...

privacy, Internet of Things

136.

Reinventing Collaboration with Autonomous Technology-Based Agents

In Proceedings of the 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8-14, 2019. ISBN 978-1-7336325-0-8 Panels.
Number of pages: 7 Posted: 06 Jan 2020
University of Innsbruck - Department of Information Systems, Auckland University of Technology - Faculty of Business & Law, Hochschule Liechtenstein, affiliation not provided to SSRN, University of British Columbia (UBC) - Sauder School of Business and Virginia Tech - Pamplin College of Business
Downloads 82 (530,668)

Abstract:

Loading...

Autonomous technology-based agents, biases, collaboration, decision making, emotions, knowledge and learning, unintended consequences

137.

How Increased Social Presence Through Co-Browsing Influences User Engagement in Collaborative Online Shopping

Electronic Commerce Research and Applications (ECRA), vol. 24, (July-August 2017), pp. 84-99
Number of pages: 49 Posted: 07 Jul 2017 Last Revised: 02 Sep 2017
Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum and Thimo Schulze
City University of Hong Kong (CityU) - Department of Information Systems, University of Mannheim - Institute of Computer Science and Business Informatics, Virginia Tech - Pamplin College of Business, Synchronite GmbH and Independent
Downloads 82 (530,668)
Citation 1

Abstract:

Loading...

Collaboration; user engagement; social presence; co-presence; e-commerce; social presence theory; online shopping; co-browsing

138.

Dependability Auditing with Model Checking

11th Annual Americas Conference on Information Systems, Omaha, August 11-14, pp. 3147-3156
Number of pages: 11 Posted: 26 Apr 2005 Last Revised: 06 Oct 2009
Bonnie Anderson, James V. Hansen and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, Brigham Young University - School of Accountancy and Virginia Tech - Pamplin College of Business
Downloads 81 (534,555)

Abstract:

Loading...

Model checking, e-processes, web services, electronic contracting, dependability auditing

139.

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques

38th Annual Hawaii International Conference on System Sciences, Hawaii, 2005, January 3-6, pp. 1-10 (doi: 10.1109/HICSS.2005.310).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts, Paul Benjamin Lowry and Nicholas C. Romano
University of Kansas - School of Business, Virginia Tech - Pamplin College of Business and Oklahoma State University-MSIS
Downloads 81 (534,555)

Abstract:

Loading...

Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups

140.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
Clay Posey, Tom Roberts, Paul Benjamin Lowry, Becky Bennett and James Courtney
University of Central Florida, University of Kansas - School of Business, Virginia Tech - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 79 (542,517)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

141.

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security

Journal of Management Information Systems (JMIS), vol. 37(3), pp. 723-757
Number of pages: 62 Posted: 11 Jun 2020 Last Revised: 08 Nov 2021
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta and Jason Thatcher
City University of Hong Kong (CityU) - Department of Information Systems, Virginia Tech - Pamplin College of Business, Baylor University - Department of Information Systems and affiliation not provided to SSRN
Downloads 78 (546,571)
Citation 1

Abstract:

Loading...

Information security (ISec) threats, fear appeals, protection motivation theory (PMT), construal-level theory (CLT), concrete, abstract

142.

Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups

8th Annual Americas Conference on Information Systems, Dallas, August 9-11, pp. 2180-2185, 2002
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 01 Oct 2014
Paul Benjamin Lowry
Virginia Tech - Pamplin College of Business
Downloads 78 (546,571)

Abstract:

Loading...

Proximity, collaborative writing, distributed groups, group work

143.

Creating Hybrid Distributed Learning Environments by Implementing Distributed Collaborative Writing in Traditional Educational Environments

IEEE Transactions on Professional Communication (IEEETPC), Vol. 47, No. 3, pp. 171-189, 2004
Number of pages: 20 Posted: 14 Feb 2005 Last Revised: 25 Aug 2009
Virginia Tech - Pamplin College of Business, University of Arizona - Center for the Management of Information (CMI), University of Arizona - Eller College of Management, Brigham Young University Hawaii and Brigham Young University - School of Accountancy
Downloads 78 (546,571)

Abstract:

Loading...

Collaborative tools, collaborative writing (CW), distributed education, distributed work, group writing, hybrid distributed education

144.

Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention

Information & Management (I&M),vol. 57(July), Article 103235, pp. 1–15
Number of pages: 50 Posted: 13 Dec 2019 Last Revised: 24 Aug 2020
Dezhi Wu, Gregory D Moody, Jun Zhang and Paul Benjamin Lowry
University of South Carolina, University of Nevada, Las Vegas - College of Business, City University of Hong Kong and Virginia Tech - Pamplin College of Business
Downloads 77 (550,552)
Citation 2

Abstract:

Loading...

Mobile device; mobile security; human–computer interaction(HCI); mobile applications (apps); perceived security; dual-task interference; mobile security notification (MSN)

145.

Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

Group Decision and Negotiation, vol. 24(4), pp.723-752
Number of pages: 54 Posted: 25 Aug 2014 Last Revised: 31 Jul 2015
Paul Benjamin Lowry, Ryan M. Schuetzler, Justin Giboney and Tom Gregory
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Arizona - Department of Management Information Systems and Georgia State University - Department of Computer Information Systems
Downloads 77 (550,552)
Citation 1

Abstract:

Loading...

Trust, distrust, groups, virtual teams, tasks, team performance, decision making, decision quality, collaboration

146.

A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ That Needs to Be Fostered in Information Security Practitioners and How This Can Be Accomplished

Computers & Security (C&S), vol. 92, May, Article 101761
Number of pages: 44 Posted: 13 Mar 2020 Last Revised: 04 May 2020
Bongsik Shin and Paul Benjamin Lowry
San Diego State University - College of Business Administration and Virginia Tech - Pamplin College of Business
Downloads 76 (554,552)
Citation 6

Abstract:

Loading...

Security; Organizational security (OrgSec); human factors of security; cyberthreat intelligence (CTI); risk management; triarchic theory of intelligence (TTI); CTI capability model (CTI-CM); information security officer; CTI practitioner; CTI analyst

147.

How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets

Paul Benjamin Lowry, Junji Xiao, and *Jia Yuan (2023). “How lending experience and borrower credit influence rational herding behavior in peer-to-peer microloan platform markets,” Journal of Management Information Systems (JMIS) (accepted 07-Mar-20
Number of pages: 55 Posted: 15 Mar 2023
Paul Benjamin Lowry, Junji Xiao and Jia Yuan
Virginia Tech - Pamplin College of Business, Lingnan University and University of Macau
Downloads 75 (558,753)

Abstract:

Loading...

Peer-to-peer transactions, microloans, herding behavior, information asymmetry, platforms

148.

Social Media Use for Open Innovation Initiatives: Proposing the Semantic Learning-Based Innovation Framework (SLBIF)

IT Professional, vol. 18(6), pp. 26–32
Number of pages: 10 Posted: 28 Jul 2016 Last Revised: 27 Feb 2017
Kristijan Mirkovski, Frederik von Briel and Paul Benjamin Lowry
City University of Hong Kong (CityU) - Department of Information Systems, UQ Business School and Virginia Tech - Pamplin College of Business
Downloads 75 (558,753)

Abstract:

Loading...

Open Innovation, Semantic Learning, Big Data, Social Media, Small and Medium Sized Enterprises

149.

Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger

MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, pp. 1-40
Number of pages: 42 Posted: 30 Jun 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 75 (558,753)

Abstract:

Loading...

control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, organizational mandatoriness, threat to freedom, boomerang effects, anger

150.

An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism

Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019)
Number of pages: 78 Posted: 05 Aug 2019 Last Revised: 28 Oct 2019
Virginia Tech - Pamplin College of Business, School of Management, University of Science and Technology of China, University of Nevada, Las Vegas - College of Business, University of Nevada, Las Vegas - Center for Entrepreneurship, City University of Hong Kong (CityU) - Department of Information Systems and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 73 (567,433)
Citation 2

Abstract:

Loading...

Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon

151.

Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus, an Internet-Based Collaboration Tool

IEEE Transactions on Professional Communication (IEEETPC), Vol. 46, No. 4, pp. 277-297, 2003 (doi: 10.1109/tpc.2003.819650).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Jay F. Nunamaker
Virginia Tech - Pamplin College of Business and University of Arizona - Center for the Management of Information (CMI)
Downloads 70 (580,429)

Abstract:

Loading...

Collaborative writing, group work, Collaboratus

152.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 68 (589,387)
Citation 1

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

153.

The IS Core: An Integration of the Core IS Courses

Number of pages: 20 Posted: 31 Aug 2009
Conan Albrecht, Gregory D Moody, Marshall Romney and Paul Benjamin Lowry
Brigham Young University - School of Accountancy, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 67 (594,078)

Abstract:

Loading...

: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum

154.

‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 232–240
Number of pages: 21 Posted: 29 Jun 2016 Last Revised: 05 Sep 2016
Paul Benjamin Lowry, John D'Arcy, Bryan Hammer and Gregory D Moody
Virginia Tech - Pamplin College of Business, University of Delaware - Alfred Lerner College of Business and Economics, University of Oklahoma - Division of Management Information Systems (MIS) and University of Nevada, Las Vegas - College of Business
Downloads 66 (598,700)
Citation 9

Abstract:

Loading...

Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research

155.

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

Journal of Information Privacy and Security, vol. 9(4), pp. 52-79, 2013
Number of pages: 29 Posted: 26 Mar 2014 Last Revised: 28 Mar 2014
Jeffrey Wall, Prashant Palvia and Paul Benjamin Lowry
University of North Carolina (UNC) at Greensboro, University of North Carolina (UNC) at Greensboro - Bryan School of Business & Economics and Virginia Tech - Pamplin College of Business
Downloads 66 (598,700)
Citation 1

Abstract:

Loading...

Self-determination, reactance, efficacy, information security policy

156.

Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals’ Intent to Comply with New IT Security Policies

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 40 Posted: 30 Aug 2010 Last Revised: 27 Jul 2013
Paul Benjamin Lowry, Noelle Teh, Braden Molyneux and Son Ngoc Bui
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 65 (603,309)

Abstract:

Loading...

Control theory, controls, reactance theory, reactance, IT security policies, policy compliance, mandatoriness, anger

157.

Breaking Free from the Limitations of Classical Test Theory: Developing and Measuring Information Systems Scales Using Item Response Theory

Information & Management (I&M), vol. 54(2), pp. 189–203
Number of pages: 46 Posted: 09 Jun 2016 Last Revised: 27 Feb 2017
Thomas Rusch, Paul Benjamin Lowry, Patrick Mair and Horst Treiblmaier
Vienna University of Economics and Business, Virginia Tech - Pamplin College of Business, Harvard University - Department of Psychology and MODUL University Vienna
Downloads 64 (608,105)

Abstract:

Loading...

Item Response Theory, Classical Test Theory, Scale Development, Rasch Model, Measurement, Measures, Hedonism, Reliability, Hedonic IS

158.

Why Do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM)

Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences 2011 Shanghai, China, December 3, All Sprouts Content, vol. 11(138), paper 453
Number of pages: 51 Posted: 30 Jun 2013
Paul Benjamin Lowry, Jeffrey Wall and James Selfridge
Virginia Tech - Pamplin College of Business, University of North Carolina (UNC) at Greensboro and Brigham Young University
Downloads 64 (608,105)

Abstract:

Loading...

HIPPA, privacy violations, organizations, organizational violations, privacy regulations, privacy policies, healthcare, IT policies

159.

The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups

40th Annual Hawaii International Conference on System Sciences, Hawaii, January 3-6
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 30 Sep 2009
Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou and Xiaolan Fu
Virginia Tech - Pamplin College of Business, University of Maryland, Baltimore County, University of Maryland, Baltimore County and Chinese Academy of Sciences (CAS) - Institute of Psychology
Downloads 64 (608,105)
Citation 5

Abstract:

Loading...

trust, culture, GSS, collaborative software, individualism, collectivism

160.

Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse

Information Systems Research (ISR), vol. 34(1), 342-362
Number of pages: 64 Posted: 12 Apr 2022 Last Revised: 27 Apr 2023
AJ Burns, Tom Roberts, Clay Posey, Paul Benjamin Lowry and Bryan Fuller
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida, Virginia Tech - Pamplin College of Business and Louisiana Tech University
Downloads 62 (617,955)

Abstract:

Loading...

Security; organizational security; information security; insider computer abuse (ICA); self-control theory; deterrence theory (DT); instrumental motives; expressive motives

161.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
AJ Burns, Clay Posey, Tom Roberts and Paul Benjamin Lowry
Baylor University - Department of Information Systems, University of Central Florida, University of Kansas - School of Business and Virginia Tech - Pamplin College of Business
Downloads 62 (617,955)
Citation 5

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

162.

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms

Decision Sciences Journal (DSJ), vol. 50(1), pp. 7–45 (2018)
Number of pages: 50 Posted: 04 Mar 2018 Last Revised: 28 May 2019
Frederik von Briel, Christoph Schneider and Paul Benjamin Lowry
UQ Business School, University of Navarra, IESE Business School and Virginia Tech - Pamplin College of Business
Downloads 57 (643,829)

Abstract:

Loading...

Innovation, Absorptive Capacity, Social Integration, External Partners, Organizational Capabilities, Knowledge Absorption, Collaboration, Mechanisms

163.

Why Students Engage in Cyber-Cheating Through a Collective Movement: A Case of Deviance and Collusion

Computers & Education (C&E), Vol. 125 (October), pp. 308-326
Number of pages: 40 Posted: 03 May 2018 Last Revised: 04 Aug 2018
University of Arkansas at Little Rock - Department of Management, Virginia Tech - Pamplin College of Business, University of Arkansas at Little Rock, University of Arkansas - Little Rock and University of Central Oklahoma - College of Business
Downloads 56 (649,285)
Citation 1

Abstract:

Loading...

cyber-cheating, computer-mediated communication, pedagogical issues, social networking sites, qualitative

164.

A Contingency Model of Bidding Strategies in Online Auctions in China

Pacific Asia Journal of the Association for Information Systems (PAJAIS), vol. 8(2), pp. 47–62
Number of pages: 27 Posted: 22 Jul 2016 Last Revised: 05 Sep 2016
Xiling Cui, Lai Law, Paul Benjamin Lowry and Qiuzhen Wang
Independent, Hong Kong Shue Yan University, Virginia Tech - Pamplin College of Business and Zhejiang University - School of Management
Downloads 55 (654,772)
Citation 1

Abstract:

Loading...

Bidding strategies, Bidders, Online auctions, Qualitative research, China, Bidding motivations

165.

A Longitudinal Study of Information Privacy on Mobile Devices

47th Hawaiian International Conference on Systems Sciences (HICSS 2014), Big Island, Hawaii, January 6–9, 3149-3158
Number of pages: 11 Posted: 11 Sep 2013 Last Revised: 23 Nov 2014
Mark J. Keith, Jeffry Babb and Paul Benjamin Lowry
Brigham Young University - Marriott School, West Texas A&M University and Virginia Tech - Pamplin College of Business
Downloads 55 (654,772)

Abstract:

Loading...

mobile computing, mobile commerce, self-disclosure, privacy, privacy calculus

166.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Paul Benjamin Lowry, Clay Posey, Tom Roberts and Becky Bennett
Virginia Tech - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 55 (654,772)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism