Tom Roberts

University of Kansas - School of Business

1300 Sunnyside Avenue

Lawrence, KS 66045

United States

SCHOLARLY PAPERS

26

DOWNLOADS
Rank 8,096

SSRN RANKINGS

Top 8,096

in Total Papers Downloads

6,316

SSRN CITATIONS
Rank 6,410

SSRN RANKINGS

Top 6,410

in Total Papers Citations

53

CROSSREF CITATIONS

141

Scholarly Papers (26)

1.

Taking ‘Fun and Games’ Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Journal of the Association for Information Systems, vol. 14(11), 617-671
Number of pages: 56 Posted: 18 Nov 2012 Last Revised: 01 Apr 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Arkansas - Department of Information Systems and University of Kansas - School of Business
Downloads 2,116 (7,783)
Citation 1

Abstract:

Loading...

Hedonic-motivation system adoption model (HMSAM), technology acceptance model, cognitive absorption, immersion, hedonic-motivation systems, utilitarian-motivation systems, mixed-motivation systems, gaming, intrinsic motivation, extrinsic motivation

2.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 865 (30,819)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

3.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 487 (65,751)

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

4.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 384 (87,066)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

5.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 350 (96,859)

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

6.

The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?

Small Group Research (SGR), Vol. 37, No. 6, pp. 631-661, 2006
Number of pages: 39 Posted: 11 Sep 2006 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Oklahoma State University-MSIS, University of Central Florida and University of Central Florida
Downloads 269 (128,804)
Citation 2

Abstract:

Loading...

Computer-mediated communication (CMC), small-group communication, virtual teams, social presence, social presence theory (SPT), and heuristic evaluation (HE)

7.

Improving the Usability Evaluation Technique, Heuristic Evaluation, Through the Use of Collaborative Software

9th Annual Americas Conference on Information Systems, Tampa, August 4-5, pp. 2203-2211
Number of pages: 10 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Paul Benjamin Lowry and Tom Roberts
Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 227 (152,430)
Citation 3

Abstract:

Loading...

Heuristic evaluation, collaborative software, usability, HCI, distributed work

8.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
Clay Posey, Tom Roberts and Paul Benjamin Lowry
University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 200 (171,804)
Citation 6

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

9.

Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations

Small Group Research (SGR), Vol. 38, No. 1, pp. 3-11, 2007
Number of pages: 16 Posted: 29 Mar 2007 Last Revised: 25 Aug 2009
Oklahoma State University-MSIS, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Kansas - School of Business
Downloads 177 (191,759)
Citation 1

Abstract:

Loading...

collaboration, small groups, virtual teams

10.

Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence

39th Annual Hawai'i International Conference on System Sciences (HICSS), Collaboration Systems and Technology Track, Kauai, Hawaii, January 4-7, 2006 (doi: 10.1109/HICSS.2006.217).
Number of pages: 9 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida and University of Central Florida
Downloads 153 (217,078)

Abstract:

Loading...

communication, collaborative software, GSS, media richness, social presence, group size

11.

An Evaluation of the Impact of Social Presence through Group Size and the Use of Collaborative Software on Group Member 'Voice' in Face-to-Face and Computer-Mediated Task Groups

IEEE Transactions on Professional Communication (IEEETPC), Vol. 49, No. 1, pp. 28-43, 2006
Number of pages: 17 Posted: 20 Jan 2006 Last Revised: 01 Sep 2009
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Dayton - School of Business Department of Management
Downloads 132 (244,391)
Citation 1

Abstract:

Loading...

Collaborative software, instrumental voice, value-expressive voice, virtual groups, voice effect, collaboration

12.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 107 (284,860)
Citation 27

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

13.

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best-paper nomination), pp. 72-76, Montréal, December 8, 2007
Number of pages: 7 Posted: 07 Oct 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arkansas - Department of Information Systems, Hitachi Consulting and University of Kansas - School of Business
Downloads 107 (284,860)
Citation 5

Abstract:

Loading...

Technology acceptance model (TAM), immersion, enjoyment, interactivity, curiosity, hedonic, utilitarian, gaming, adoption, behavioral intention to use, perceived ease-of-use, control, interactivity-stimulus-attention model (ISAM), flow, attention, stimuli

14.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), vol. 30(4), pp. 1228–1247 (2019)
Number of pages: 46 Posted: 21 Mar 2019 Last Revised: 02 Jan 2020
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 94 (310,438)
Citation 2

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

15.

Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation

Journal of the Association for Information Systems (JAIS), Vol. 10, No. 3, pp. 170-195.
Number of pages: 28 Posted: 21 Oct 2007 Last Revised: 25 Aug 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business, Brigham Young University - Information Systems Department and Florida International University (FIU)
Downloads 90 (319,057)

Abstract:

Loading...

Heuristic evaluation, collaboration engineering, virtual groups, virtual teams, group size, usability evaluation, human-computer interaction, thinkLets, collaboration, collaborative software

16.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Central Florida
Downloads 82 (337,876)
Citation 5

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

17.

First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites

HUMAN-COMPUTER INTERACTION, pp. 77-85, J. Jacko, ed., CRC, 2007, 12th International Conference on HCI, Beijing, Part 4, pp. 77-85, July 22-27, 2007
Number of pages: 10 Posted: 27 Sep 2009
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and affiliation not provided to SSRN
Downloads 75 (355,902)

Abstract:

Loading...

trust, mere-exposure effect, familiarity, logos, swift trust, websites

18.

The 'Voice Effect' in Groups

The Second Annual Workshop on HCI Research in MIS, International Conference on Information Systems (ICIS), Seattle, December 12-13, pp. 42-46
Number of pages: 7 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
Tom Roberts and Paul Benjamin Lowry
University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 75 (355,902)

Abstract:

Loading...

Human Computer Interaction, voice effect, collaboration

19.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 72 (364,041)
Citation 4

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

20.

Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques

38th Annual Hawaii International Conference on System Sciences, Hawaii, 2005, January 3-6, pp. 1-10 (doi: 10.1109/HICSS.2005.310).
Number of pages: 11 Posted: 14 Feb 2005 Last Revised: 06 Oct 2009
University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Oklahoma State University-MSIS
Downloads 66 (381,445)

Abstract:

Loading...

Heuristic evaluation, HFDF, GSS, collaborative software, distributed groups

21.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 60 (400,323)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

22.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Baylor University - Department of Information Systems, University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 43 (463,134)
Citation 3

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

23.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 40 (475,950)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

24.

What Signal is Your Inspection Team Sending to Each Other? Using a Shared Collaborative Interface to Improve Shared Cognition and Implicit Coordination in Error-Detection Teams

International Journal of Human-Computer Studies, Vol. 71(4), pp. 455-474 (doi: 10.1016/j.ijhcs.2012.11.004)
Number of pages: 57 Posted: 18 Nov 2012 Last Revised: 09 Sep 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Oklahoma State University-MSIS
Downloads 28 (534,999)

Abstract:

Loading...

Implicit Coordination, Implicit Coordination Theory, Shared Cognition, Signal Detection Theory, Collaborative Software, Error Detection, Explicit Coordination

25.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 17 (604,641)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy

26.

Familiarity Effects on Trust with Mobile Computing Device Websites

11th International Conference on HCI, Las Vegas, July 22-27, 2005
Posted: 21 Feb 2005 Last Revised: 02 Jul 2014
Paul Benjamin Lowry, Tom Roberts and Bryce Caine
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Brigham Young University - School of Accountancy

Abstract:

Loading...

Familiarity, Web, websites, usability, HCI, logos, interfaces