Paul Benjamin Lowry
#156,226
Most Influential Person Now
Researcher
Paul Benjamin Lowry's AcademicInfluence.com Rankings
Download Badge
Communications
Paul Benjamin Lowry's Degrees
- PhD Information Systems University of South Florida
- Masters Information Systems University of South Florida
- Bachelors Computer Science University of Central Florida
Similar Degrees You Can Earn
Why Is Paul Benjamin Lowry Influential?
(Suggest an Edit or Addition)Paul Benjamin Lowry's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It (2014) (1237)
- Future directions for behavioral information security research (2013) (611)
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (2015) (419)
- Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities (2010) (395)
- Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites (2007) (353)
- Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures (2011) (337)
- Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice (2004) (320)
- Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM) (2012) (319)
- Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals (2004) (286)
- Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior (2013) (273)
- Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model (2016) (229)
- The Impact of Group Size and Social Presence on Small-Group Communication (2006) (216)
- The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets (2015) (213)
- "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels (2016) (212)
- The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups (2009) (207)
- Using Accountability to Reduce Access Policy Violations in Information Systems (2013) (202)
- Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations (2015) (202)
- The Impact of Individualism—Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence (2007) (183)
- Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors (2013) (183)
- Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? (2013) (179)
- Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups (2010) (178)
- Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies (2015) (177)
- A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust (2014) (166)
- The Effects of Perceived Enjoyment and Perceived Risks on Trust Formation and Intentions to Use Online Payment Systems: New Perspectives from an Arab Country (2016) (160)
- The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness (2015) (155)
- Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust (2015) (146)
- Overview and Guidance on Agile Development in Large Organizations (2011) (140)
- Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders (2014) (136)
- Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda (2017) (133)
- Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions (2015) (131)
- Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers (2012) (131)
- Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions (2011) (112)
- Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals (2007) (109)
- The role of mobile‐computing self‐efficacy in consumer information disclosure (2015) (107)
- Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework (2017) (106)
- Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study (2019) (106)
- Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals (2017) (105)
- When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse (2011) (105)
- The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks (2017) (98)
- The Drivers in the Use of Online Whistle-Blowing Reporting Systems (2013) (94)
- When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior (2014) (92)
- Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection (2007) (91)
- Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility (2016) (88)
- Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals (2014) (84)
- Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation (2015) (78)
- Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment (2010) (76)
- The Impact of Collectivism and Psychological Ownership on Protection Motivation: A Cross-Cultural Examination (2018) (76)
- Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance (2020) (76)
- The Assimilation of RFID Technology by Chinese Companies: A Technology Diffusion Perspective (2015) (71)
- Using Internet-based, distributed collaborative writing tools to improve coordination and group awareness in writing teams (2003) (69)
- User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit--Research in Progress (2012) (63)
- An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research (2008) (62)
- Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess (2015) (62)
- Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy (2013) (61)
- An evaluation of the impact of social presence through Group size and the use of collaborative software on Group member "Voice" in face-to-face and computer-mediated task Groups (2006) (60)
- Using IT Design to Prevent Cyberbullying (2017) (59)
- A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction (2006) (58)
- It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis (2017) (57)
- A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals (2007) (57)
- Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals (2014) (53)
- Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization (2020) (52)
- Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment (2009) (51)
- Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task (2016) (50)
- Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications (2018) (49)
- The impact of process structure on novice, virtual collaborative writing teams (2005) (48)
- Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems (2008) (48)
- Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world (2019) (45)
- Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse (2014) (45)
- Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting (2003) (43)
- Examining the intended and unintended consequences of organisational privacy safeguards (2016) (43)
- The physical internet as a new supply chain paradigm: a systematic literature review and a comprehensive framework (2020) (43)
- Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications (2016) (43)
- The e-business handbook (2001) (41)
- Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? (2016) (39)
- Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making (2015) (38)
- A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface (2015) (38)
- Model checking for design and assurance of e-Business processes (2005) (38)
- Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory (2017) (38)
- The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking (2019) (36)
- Factors that Influence Interorganizational Use of Information and Communications Technology in Relationship-Based Supply Chains: Evidence from the Macedonian and American Wine Industries (2016) (35)
- Toward Building Self-Sustaining Groups in PCR-Based Tasks Through Implicit Coordination: The Case of Heuristic Evaluation (2009) (34)
- Seeking Middle-Range Theories in Information Systems Research (2015) (34)
- A Longitudinal Study of Information Privacy on Mobile Devices (2013) (34)
- Assessing the Impact of Premier Information Systems Research over Time (2007) (33)
- A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research (2015) (32)
- Model checking for E-business control and assurance (2005) (31)
- A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research (2018) (31)
- Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context (2015) (31)
- What Do Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (2015) (31)
- Collaborating with technology-based autonomous agents (2020) (30)
- How Do Bidders’ Organism Reactions Mediate Auction Stimuli and Bidder Loyalty in Online Auctions? The Case of Taobao in China (2016) (30)
- An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism (2019) (30)
- The process of information systems theorizing as a discursive practice (2019) (29)
- Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example (2014) (29)
- Privacy Fatigue: The Effect of Privacy Control Complexity on Consumer Electronic Information Disclosure (2014) (29)
- A Taxonomy of Collaborative Writing to Improve Empirical Research, Writing Practice, and Tool Development (2004) (28)
- The influence of role stress on self-disclosure on social networking sites: A conservation of resources perspective (2019) (28)
- A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) Capability’ That Needs to Be Fostered in Information Security Practitioners and How This Can Be Accomplished (2020) (27)
- Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management (2006) (27)
- Conceptualizing the Physical Internet: Literature Review, Implications and Directions for Future Research (2016) (26)
- The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security (2020) (26)
- How Increased Social Presence Through Co-Browsing Influences User Engagement in Collaborative Online Shopping (2017) (26)
- Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms (2018) (25)
- A Systematic Review of Social Networking Research in Information Systems (2015) (25)
- Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model (2021) (24)
- Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations (2011) (24)
- Users' experiences in collaborative writing using Collaboratus, an Internet-based collaborative work (2002) (24)
- The application of model checking for securing e-commerce transactions (2006) (23)
- Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust (2011) (22)
- Interorganizational cooperation and supplier performance in high-technology supply chains (2020) (22)
- Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention (2020) (21)
- Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion (2018) (20)
- The nonlinear influence of harmonious information technology affordance on organisational innovation (2020) (20)
- Standards and verification for fair-exchange and atomicity in e-commerce transactions (2006) (18)
- Does More Accessibility Lead to More Disclosure? Exploring the Influence of Information Accessibility on Self-Disclosure in Online Social Networks (2018) (18)
- Stock Market Reactions to Favorable and Unfavorable Information Security Events: A Systematic Literature Review (2021) (17)
- What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams (2013) (15)
- Collaborating with Technology-Based Autonomous Agents: Issues and Research Opportunities (2019) (15)
- Creating hybrid distributed learning environments by implementing distributed collaborative writing in traditional educational settings (2004) (15)
- XML data mediation and collaboration: a proposed comprehensive architecture and query requirements for using XML to mediate heterogeneous data sources and targets (2001) (15)
- The Agent Bidding Habit and Use Model (ABHUM) and Its Validation in the Taobao Online Auction Context (2017) (14)
- Gender deception in asynchronous online communication: A path analysis (2017) (14)
- The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups (2007) (14)
- Synchronous, distributed collaborative writing for policy agenda setting using Collaboratus, an Internet-based collaboration tool (2002) (14)
- Proposing the Hedonic Affect Model (HAM) to Explain How Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use (2013) (13)
- Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations (2016) (13)
- Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect (2010) (13)
- A storyteller's guide to problem‐based learning for information systems management education (2019) (13)
- Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats (2016) (12)
- Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM) (2013) (12)
- Using the thinkLet framework to improve distributed collaborative writing (2002) (12)
- First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites (2007) (12)
- The Impact of Process Structure on Novice, Internet-Based, Asynchronous-Distributed Collaborative Writing Teams (2005) (12)
- Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems (2007) (11)
- Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance (2016) (11)
- Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment (2020) (11)
- Does opportunity make the thief? Abilities and moral disengagement in illegal downloading (2019) (11)
- Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective (2016) (11)
- Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms (2015) (10)
- Patterns in Collaboration (2015) (10)
- The Effects of Bidder Factors on Online Bidding Strategies: A Motivation-Opportunity-Ability (MOA) Model (2020) (10)
- The Impact of National Culture and Social Presence on Trust and Communication Quality within Collaborative Groups (2007) (10)
- Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software (2005) (10)
- Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes (2019) (9)
- The Roles of Privacy Assurance, Network Effects, and Information Cascades in the Adoption of and Willingness to Pay for Location-Based Services with Mobile Applications (2013) (9)
- Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives (2018) (9)
- Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations (2015) (9)
- Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute (2020) (9)
- Research on Process Structure for Distributed, Asynchronous Collaborative Writing Groups (2002) (9)
- Semantic Learning-Based Innovation Framework for Social Media (2016) (8)
- Improving distributed collaborative writing over the internet using enhanced processes, proximity choices and a java-based collaborative writing tool (2002) (8)
- Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable (2012) (7)
- The roles of prior experience and the location on the severity of supply chain disruptions (2021) (7)
- Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence (2006) (7)
- Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities (2018) (7)
- Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi‐experiment (2019) (7)
- The IS Core: An Integration of the Core IS Courses (2009) (6)
- Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems (2006) (6)
- Patients' compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices? (2020) (6)
- Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning (2013) (6)
- The mediating role of group dynamics in shaping received social support from active and passive use in online health communities (2022) (6)
- Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Area Games (2022) (6)
- Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals’ Intent to Comply with New IT Security Policies (2010) (6)
- Familiarity Effects on Trust with Mobile Computing Device Websites (2005) (5)
- Creating automated plans for Semantic Web applications through planning as model checking (2009) (5)
- Useful Products in Information Systems Theorizing: A Discursive Formation Perspective (2022) (5)
- Revisiting Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems: A Critical Literature Update (2010) (5)
- The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises, (2015) (5)
- Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature (2020) (5)
- The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing (2007) (5)
- Technology-Supported Small Group Interaction (2007) (5)
- Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior (2015) (4)
- Investigation of the Radio Frequency Identification Assimilation Process in China: A Stage‐based Model Perspective (2013) (4)
- Goals, Values, and Expectations of the AIS Family of Journals (2017) (4)
- Explaining Opposing Compliance Motivations towards Organizational Information Security Policies (2013) (4)
- Understanding Patients’ Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior (2014) (4)
- Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach (2017) (4)
- Model Checking for E-Commerce Control and Assurance (2005) (4)
- MIS Legitimacy and the Proposition of a New, Multi-Dimensional Model of MIS (2002) (4)
- The effect of familiar logos on trust of websites designed for small user interfaces (2005) (4)
- Research on Proximity Choices for Distributed, Asynchronous Collaborative Writing Groups (2002) (4)
- Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques (2005) (3)
- Culture and Media Effects on Group Decision Making under Majority Influence (2006) (3)
- Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography (2019) (3)
- An Emerging Scholar’s Guide to the Leading International Information Systems and Business Analytics Research Resources and Publication Outlets (2018) (3)
- Corporate crisis management on social media: A morality violations perspective (2020) (3)
- Biometrics: A Critical Consideration in Information Security Management (2005) (3)
- Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use (2012) (3)
- Explaining the Key Elements of Information Systems-Based Supply-Chain Strategy That Are Necessary for Business-to-Business Electronic Marketplace Survival (2008) (3)
- Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce (2013) (2)
- Minitack Introduction: Cross-cultural Issues in Collaboration Technology (2007) (2)
- A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features (2011) (2)
- The Value of Distrust in Computer-Based Decision-Making Groups (2010) (2)
- Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors (2010) (2)
- How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse (2010) (2)
- How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems (2013) (2)
- A Stage-Based Model for RFID Assimilation Processes by Supply Chain Participants in China (2012) (2)
- New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines (2005) (2)
- Does Computer-Mediated Communication Make The Impact of Group Size and Social Presence on Small-Group (2006) (1)
- Making money with open-source software business initiatives (2005) (1)
- Actualizing Information Technology Affordance for Organizational Innovation: The Role of Organizational Courage (2019) (1)
- Lie to Me: A Multifactorial Analysis of Gender Deception in Asynchronous Online Communication (2016) (1)
- The Effect of CIO Virtues on CIO Role Effectiveness (2018) (1)
- Consulting at the Laser ISP (LISP) Company: Using Excel(TM) Metrics Capabilities to Solve Unstructured, Management Problems (2005) (1)
- How Does Information Technology Capability Enable Digital Transformation? Considering the Mediating Roles of Agility (2014) (1)
- Using the Control Balance Theory to Explain Social Media Deviance (2017) (1)
- The Nonlinear Influence of Harmonious Information Technology Affordance on Organizational Innovation (2020) (1)
- Social Media Use for Open Innovation Initiatives: Proposing the Semantic Learning-Based Innovation Framework (SLBIF) (2016) (1)
- Educational disruption & rising faculty expectations (2020) (1)
- The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes (2022) (1)
- Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable (2013) (1)
- Why Do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM) (2011) (1)
- Towards a Cross-Cultural Model of Whistle-Blowing Systems Use (2012) (1)
- The Process of Information Systems Theorizing as a Discursive Practice* (2021) (1)
- Developing and Measuring IS Scales Using Item Response Theory (2013) (1)
- The Role of Three Forms of Self-Efficacy in Improving Longitudinal Health Performance: Designing a Quantified-Self 2.0 Health Community with a Motivational Affordance Perspective (2015) (1)
- Using multistage competing risks approaches to model web page transitions (2017) (1)
- Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model (2022) (1)
- A Contingency Model of Bidding Strategies in Online Auctions in China (2016) (1)
- Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks (2020) (1)
- Enhancing Theoretical Contribution in is Research: the Case of Technology Adoption (2019) (1)
- Design Requirements for Collaborative Writing Tools for Distributed Work Over the Internet (2002) (1)
- Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes (2021) (1)
- The 'Voice Effect' in Groups (2005) (1)
- TAXONOMY BUILDING A TAXONOMY AND NOMENCLATURE OF COLLABORATIVE WRITING TO IMPROVE INTERDISCIPLINARY RESEARCH AND PRACTICE (2003) (0)
- Minitrack Introduction (2008) (0)
- Information Security Policy Compliance Survey (2016) (0)
- The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation (2015) (0)
- Patients’ Compliance Behavior in a Personalized Mobile Patient Education System (PMPES) Setting: Rational, Social, or Personal Choices? (2020) (0)
- Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse (2022) (0)
- Understanding Contributor Withdrawal from Online Communities: The Role of Cognitive Dissonance and Emotional Change (2014) (0)
- Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment (2023) (0)
- Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making (2014) (0)
- The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers’ Cognitive Gaps in IoT Settings (2020) (0)
- XML, A Collaborative Enabler of E-Business through the Mediation of Heterogeneous Data between Trading Partners (2001) (0)
- Teaching Case: Consulting at the Laser ISP (LISP) Company: Using Excel Metrics Capabilities to Solve Semi-Structured Management Problems (2003) (0)
- “Do as I say but not as I do”: Influence of political leaders’ populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions (2023) (0)
- Security and Usability in Mobile App Continued Use Intention--Model (2021) (0)
- ISJ editorial: Addressing the implications of recent developments in journal impact factors (2023) (0)
- Examining the Past to Learn about the Future: Applying Secondary Data for the Qualitative Study of Internal Computer Abuse (ICA) (2016) (0)
- BYU ScholarsArchive BYU ScholarsArchive Data Mining of Forensic Association Rules Data Mining of Forensic Association Rules (2022) (0)
- Making Money with Open-Source Business Initiatives (2005) (0)
- Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations (2010) (0)
- Introduction to interactive digital entertainment, social computing, and lifestyle computing minitrack (2008) (0)
- The Potential of Group Support Systems (Gss) to Enhance Systems Analysis and Design Processes and Outcomes (2000) (0)
- The importance of theory at the Information Systems Journal (2023) (0)
- Gamified Double-edged Sword: Exploring the Different Social Comparison Motives of Mobile Fitness App Users - Research in Progress (2018) (0)
- Brainstorm on new functionalities for future Group Support Systems (2008) (0)
- DESIGN REQUIREMENTS FOR COLLABORATIVE WRITINGTOOLS THAT SUPPORT DISTRIBUTED,INTERNET-BASED WORK (2002) (0)
- Data Mining of Forensic Association Rules (2003) (0)
- “Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior? (2020) (0)
- The Impact of National Cultur e and Social Pr esence on Tr ust and Communication Quality within Collabor ative Gr oups (2007) (0)
- Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework (2022) (0)
- Interactive Digital Entertainment, Social Computing, and Lifestyle Computing (2007) (0)
- Proposing the agent bidding habit and use model (ABHUM) to explain user-to-agent bidding behaviour in online auctions (2016) (0)
- AIS Electronic Library (AISeL) The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises (2017) (0)
- Be Careful What You Wish For: Proposing the IT Policy Control-Reactance Model (ITPCRM) to Predict Professionals’ Intent to Comply with New IT Security Policies Along with Their Resulting Anger (2013) (0)
- How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets (2023) (0)
- Cross-cultural issues in collaboration technology (2006) (0)
- The Efficiency–Exposure Paradox: Reconciling the Conflicting Effects of Measured Website Browsing Behaviors for Non-Transactional Outcomes (2021) (0)
- Tell Me A Story: The Effects That Narratives Exert on Meaningful-Engagement Outcomes in Antiphishing Training (2023) (0)
- Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations (2017) (0)
- Proposing the Agent Bidding Habit and Use Model (ABHUM) to Help Explain User Agent Bidding Behaviour in Online Auctions (2016) (0)
- Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse (2013) (0)
- Enhancing theoretical contribution in information systems research: The case of technology adoption (2020) (0)
- Manufacturer's Reply (1998) (0)
- An Emerging Scholar's Guide to More Effective Citation of Sources and Management of Citations (2019) (0)
- Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis (2023) (0)
- Dependability Auditing with Model Checking (2005) (0)
- Patient Trust in Physicians Matters—Understanding the Role of a Mobile Patient Education System and Patient-Physician Communication in Improving Patient Adherence Behavior: Field Study (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Paul Benjamin Lowry?
Paul Benjamin Lowry is affiliated with the following schools:
