Advanced search

Authors whose works are in public domain in at least one jurisdiction

List of works by Paul Benjamin Lowry

A Longitudinal Study of Information Privacy on Mobile Devices

A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust

article

A Scientometric Study of the Perceived Quality of Business and Technical Communication Journals

article by Paul Benjamin Lowry et al published December 2007 in IEEE Transactions on Professional Communication

A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished

scientific article published in 2020

A storyteller's guide to problem‐based learning for information systems management education

scientific article published in 2019

Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms

Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

article published in 2014

Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory

Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders

Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy

scientific article

Corporate crisis management on social media: A morality violations perspective

scientific article published on 20 July 2020

Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility

scientific article published in October 2016

Creating automated plans for Semantic Web applications through planning as model checking

Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait

Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment

Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups

article

Enhancing team creativity among information technology professionals through knowledge sharing and motivational rewards: A self-determination perspective

scientific article published in 2024

Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting

article

Examining the intended and unintended consequences of organisational privacy safeguards

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals

Explaining Opposing Compliance Motivations towards Organizational Information Security Policies

Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites

article by Paul Benjamin Lowry et al published April 2008 in Journal of Management Information Systems

Factors that influence interorganizational use of information and communications technology in relationship-based supply chains: evidence from the Macedonian and American wine industries

article

Future directions for behavioral information security research

article

Gender deception in asynchronous online communication: A path analysis

Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection

article published in 2007

Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals

How do bidders’ organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China

article

How increased social presence through co-browsing influences user engagement in collaborative online shopping

Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals

article

Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior

Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment

scientific article published on 20 August 2020

Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world

scientific article published in 2019

Interactive Digital Entertainment, Social Computing, and Lifestyle Computing

Interorganizational cooperation and supplier performance in high-technology supply chains

scientific article published on 18 March 2020

Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making

article by Paul Benjamin Lowry et al published 27 August 2014 in Group Decision and Negotiation

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems

It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis

article by Gregory D. Moody et al published July 2017 in European Journal of Information Systems

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust

article by Paul Benjamin Lowry et al published 24 February 2015 in Information Systems Journal

Minitack Introduction: Cross-cultural Issues in Collaboration Technology

Model checking for design and assurance of e-Business processes

article

Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework

article published in 2017

Overview and Guidance on Agile Development in Large Organizations

Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It

article

Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior

article

Patients' compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices?

scientific article published on 23 October 2020

Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures

article

Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust

article

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies

article

Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities

Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities

article

Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable

Stock market reactions to favorable and unfavorable information security events: A systematic literature review

scientific article published in 2021

Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

scientific article published in November 2013

Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment

Technology-Supported Small Group Interaction

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups

article

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

The Impact of Group Size and Social Presence on Small-Group Communication

article by Paul Benjamin Lowry et al published December 2006 in Small Group Research

The Impact of Individualism—Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence

The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups

article

The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context

The application of model checking for securing e-commerce transactions

article

The assimilation of RFID technology by Chinese companies: A technology diffusion perspective

article

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination

scientific article

The role of mobile-computing self-efficacy in consumer information disclosure

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model

scientific article

User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit

Using Accountability to Reduce Access Policy Violations in Information Systems

Using IT Design to Prevent Cyberbullying

Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers

article by Paul Benjamin Lowry et al published 6 December 2011 in Journal of the Association for Information Science and Technology

Using multistage competing risks approaches to model web page transitions

article

Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations

article by Anthony Vance et al published July 2017 in Security Journal

What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams

When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior

article by Gregory D. Moody et al published July 2014 in Electronic Commerce Research and Applications

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model

article

“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels