default search action
Paul Benjamin Lowry
Person information
- affiliation: City University of Hong Kong, Department of Information Systems
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j141]Daeeun Daniel Choi, Paul Benjamin Lowry:
Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Inf. Manag. 61(1): 103876 (2024) - [j140]Xiaolin Li, Paul Benjamin Lowry, Fujun Lai:
The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: A signaling theory perspective. Inf. Manag. 61(2): 103923 (2024) - [j139]Shanshan Zhang, Fengchun Huang, Lingling Yu, Jeremy Fei Wang, Paul Benjamin Lowry:
A dual-process model to explain self-disclosure on online social networking sites: examining the moderating effect of enjoyment. Internet Res. 34(4): 1456-1487 (2024) - [j138]Feng Xu, Carol Hsu, Tawei David Wang, Paul Benjamin Lowry:
The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation. Inf. Syst. J. 34(4): 1144-1174 (2024) - [j137]Yanli Jia, Libo Liu, Paul Benjamin Lowry:
How do consumers make behavioural decisions on social commerce platforms? The interaction effect between behaviour visibility and social needs. Inf. Syst. J. 34(5): 1703-1736 (2024) - [j136]Kristijan Mirkovski, Kamel Rouibah, Paul Benjamin Lowry, Joanna Paliszkiewicz, Marzena Ganc:
Cross-country determinants of citizens' e-government reuse intention: empirical evidence from Kuwait and Poland. Inf. Technol. People 37(4): 1864-1896 (2024) - [j135]Sutirtha Chatterjee, Suranjan Chakraborty, H. Kevin Fulk, Paul Benjamin Lowry:
The Role of Dissonant Relational Multiplexity in Information System Implementation Failures: Insights from a Grounded Theory Approach. J. Assoc. Inf. Syst. 25(5): 4 (2024) - [c40]Bryan I. Hammer, Andy Luse, Paul Benjamin Lowry:
Anchoring-and-Adjustment, Approach-Avoidance Disposition, and Information Sensitivity on Information Disclosure: A Longitudinally, Time-Ordered Experiment Using EEG in E-Commerce and Social Media. ECIS 2024 - 2023
- [j134]David M. Hull, Sebastian Walter Schuetz, Paul Benjamin Lowry:
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Comput. Secur. 129: 103252 (2023) - [j133]Libo Liu, Kristijan Mirkovski, Paul Benjamin Lowry, Quan Vu:
"Do as I say but not as I do": Influence of political leaders' populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions. Data Inf. Manag. 7(2): 100039 (2023) - [j132]Eduardo D. Villacis Calderon, Tabitha L. James, Paul Benjamin Lowry:
How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective. Data Inf. Manag. 7(3): 100042 (2023) - [j131]Ghazwan Hassna, Kamel Rouibah, Paul Benjamin Lowry, Joanna Paliszkiewicz, Magdalena Madra-Sawicka:
The roles of user interface design and uncertainty avoidance in B2C ecommerce success: Using evidence from three national cultures. Electron. Commer. Res. Appl. 61: 101297 (2023) - [j130]Rachida Parks, Rolf T. Wigand, Paul Benjamin Lowry:
Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework. Eur. J. Inf. Syst. 32(6): 1052-1069 (2023) - [j129]Robert M. Davison, Paul Benjamin Lowry:
ISJ editorial: Addressing the implications of recent developments in journal impact factors. Inf. Syst. J. 33(3): 419-436 (2023) - [j128]Antonio Díaz-Andrade, Monideepa Tarafdar, Robert M. Davison, Andrew M. Hardin, Angsana A. Techatassanasoontorn, Paul Benjamin Lowry, Sutirtha Chatterjee, Gerhard Schwabe:
The importance of theory at the Information Systems Journal. Inf. Syst. J. 33(4): 693-702 (2023) - [j127]Le Wang, Paul Benjamin Lowry, Xin (Robert) Luo, Han Li:
Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games. Inf. Syst. Res. 34(1): 275-296 (2023) - [j126]A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry, Bryan Fuller:
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Inf. Syst. Res. 34(1): 342-362 (2023) - [j125]Jun Zhang, Qiqi Jiang, Wenping Zhang, Lele Kang, Paul Benjamin Lowry, Zhang Xiong:
Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment. J. Manag. Inf. Syst. 40(2): 401-439 (2023) - [j124]Paul Benjamin Lowry, Junji Xiao, Jia Yuan:
How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets. J. Manag. Inf. Syst. 40(3): 914-952 (2023) - [j123]Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran, Nicholas James Brown:
Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis. J. Manag. Inf. Syst. 40(4): 1099-1138 (2023) - 2022
- [j122]Tabitha L. James, Eduardo D. Villacis Calderon, France Bélanger, Paul Benjamin Lowry:
The mediating role of group dynamics in shaping received social support from active and passive use in online health communities. Inf. Manag. 59(3): 103606 (2022) - [j121]Milad Baghersad, Christopher W. Zobel, Paul Benjamin Lowry, Sutirtha Chatterjee:
The roles of prior experience and the location on the severity of supply chain disruptions. Int. J. Prod. Res. 60(16): 5051-5070 (2022) - [j120]Nik Rushdi Hassan, Paul Benjamin Lowry, Lars Mathiassen:
Useful Products in Information Systems Theorizing: A Discursive Formation Perspective. J. Assoc. Inf. Syst. 23(2): 7 (2022) - [j119]Tabitha L. James, France Bélanger, Paul Benjamin Lowry:
The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes. J. Assoc. Inf. Syst. 23(4): 4 (2022) - [j118]Xiling Cui, Qiang Zhou, Paul Benjamin Lowry, Yi Wang:
Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model. Pac. Asia J. Assoc. Inf. Syst. 14(1): 5 (2022) - 2021
- [j117]Brian Kimball Dunn, Narayan Ramasubbu, Matthew L. Jensen, Dennis F. Galletta, Paul Benjamin Lowry:
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes. AIS Trans. Hum. Comput. Interact. 13(2): 206-242 (2021) - [j116]Syed Emad Azhar Ali, Fong-Woon Lai, P. D. D. Dominic, Nicholas James Brown, Paul Benjamin Lowry, Rao Faizan Ali:
Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Comput. Secur. 110: 102451 (2021) - [j115]Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang, Rachida Parks:
Patients' compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices? Int. J. Medical Informatics 145: 104295 (2021) - [j114]Mario Silic, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Inf. Syst. Frontiers 23(2): 329-341 (2021) - [j113]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
The nonlinear influence of harmonious information technology affordance on organisational innovation. Inf. Syst. J. 31(2): 294-322 (2021) - [j112]Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, Xin (Robert) Luo, Gregory D. Moody, Robert Willison:
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Inf. Syst. Res. 32(3): 1043-1065 (2021) - [j111]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher:
Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature. J. Assoc. Inf. Syst. 22(5): 4 (2021) - 2020
- [j110]Bongsik Shin, Paul Benjamin Lowry:
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability' that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 92: 101761 (2020) - [j109]Xiling Cui, Vincent S. Lai, Paul Benjamin Lowry, Yang Lei:
The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model. Decis. Support Syst. 138: 113397 (2020) - [j108]Paul Benjamin Lowry, Stacie Petter, Jan Marco Leimeister:
Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute. Eur. J. Inf. Syst. 29(6): 609-620 (2020) - [j107]Dezhi Wu, Gregory D. Moody, Jun Zhang, Paul Benjamin Lowry:
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention. Inf. Manag. 57(5): 103235 (2020) - [j106]Isabella Seeber, Lena Waizenegger, Stefan Seidel, Stefan Morana, Izak Benbasat, Paul Benjamin Lowry:
Collaborating with technology-based autonomous agents. Internet Res. 30(1): 1-18 (2020) - [j105]Mario Silic, Paul Benjamin Lowry:
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. J. Manag. Inf. Syst. 37(1): 129-161 (2020) - [j104]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher:
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J. Manag. Inf. Syst. 37(3): 723-757 (2020) - [j103]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization. J. Strateg. Inf. Syst. 29(1): 101596 (2020) - [c39]Daeeun Daniel Choi, Paul Benjamin Lowry, Alan Wang:
The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j102]Nadia Olivero, Andrea Greco, Anna Maria Annoni, Patrizia Steca, Paul Benjamin Lowry:
Does opportunity make the thief? Abilities and moral disengagement in illegal downloading. Behav. Inf. Technol. 38(12): 1273-1289 (2019) - [j101]Sadaf Hina, Dhanapal Durai Dominic, Paul Benjamin Lowry:
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. Comput. Secur. 87 (2019) - [j100]Frederik von Briel, Christoph Schneider, Paul Benjamin Lowry:
Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms. Decis. Sci. 50(1): 7-45 (2019) - [j99]Shanshan Zhang, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu, Ji Wu:
The influence of role stress on self-disclosure on social networking sites: A conservation of resources perspective. Inf. Manag. 56(7) (2019) - [j98]John D'Arcy, Paul Benjamin Lowry:
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. Inf. Syst. J. 29(1): 43-69 (2019) - [j97]David M. Hull, Paul Benjamin Lowry, James E. Gaskin, Kristijan Mirkovski:
A storyteller's guide to problem-based learning for information systems management education. Inf. Syst. J. 29(5): 1040-1057 (2019) - [j96]Kristijan Mirkovski, James E. Gaskin, David M. Hull, Paul Benjamin Lowry:
Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment. Inf. Syst. J. 29(6): 1153-1177 (2019) - [j95]A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry:
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking. Inf. Syst. Res. 30(4): 1228-1247 (2019) - [j94]Shanshan Zhang, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu:
Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. Inf. Technol. People 32(3): 754-780 (2019) - [j93]Brian Kimball Dunn, Narayan Ramasubbu, Dennis F. Galletta, Paul Benjamin Lowry:
Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography. J. Manag. Inf. Syst. 36(2): 418-449 (2019) - [j92]Paul Benjamin Lowry, Jun Zhang, Gregory D. Moody, Sutirtha Chatterjee, Chuang Wang, Tailai Wu:
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism. J. Manag. Inf. Syst. 36(4): 1142-1178 (2019) - [c38]Nik Rushdi Hassan, Lars Mathiassen, Paul Benjamin Lowry:
Enhancing Theoretical Contribution in is Research: the Case of Technology Adoption. ECIS 2019 - [c37]Sutirtha Chatterjee, Suprateek Sarker, Gregory D. Moody, Paul Benjamin Lowry:
The Effect of CIO Virtues on CIO Role Effectiveness. HICSS 2019: 1-10 - 2018
- [j91]Horst Treiblmaier, Lisa-Maria Putz, Paul Benjamin Lowry:
Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications. AIS Trans. Hum. Comput. Interact. 10(3): 1 (2018) - [j90]Rachida Parks, Paul Benjamin Lowry, Rolf T. Wigand, Nitin Agarwal, Therese L. Williams:
Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Comput. Educ. 125: 308-326 (2018) - [j89]Philip Menard, Merrill Warkentin, Paul Benjamin Lowry:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput. Secur. 75: 147-166 (2018) - [j88]Robert Willison, Paul Benjamin Lowry:
Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. Data Base 49(SI): 81-102 (2018) - [j87]Ling Jiang, Kristijan Mirkovski, Jeffrey D. Wall, Christian Wagner, Paul Benjamin Lowry:
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities. Internet Res. 28(4): 988-1028 (2018) - [j86]Chao-Min Chiu, Jack Shih-Chieh Hsu, Paul Benjamin Lowry, Ting-Peng Liang:
Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach. J. Assoc. Inf. Syst. 19(7): 4 (2018) - [j85]Robert Willison, Paul Benjamin Lowry, Raymond Paternoster:
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. J. Assoc. Inf. Syst. 19(12): 3 (2018) - [c36]Ghazwan Hassna, Paul Benjamin Lowry:
Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective. AMCIS 2018 - 2017
- [j84]Carol Saunders, Susan A. Brown, Bendik Bygstad, Alan R. Dennis, Carlos Ferran, Dennis F. Galletta, Ting-Peng Liang, Paul Benjamin Lowry, Jan Recker, Suprateek Sarker:
Goals, Values, and Expectations of the AIS Family of Journals. Commun. Assoc. Inf. Syst. 41: 16 (2017) - [j83]Paul Benjamin Lowry, Jun Zhang, Tailai Wu:
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Comput. Hum. Behav. 68: 104-120 (2017) - [j82]A. J. Burns, Clay Posey, Tom L. Roberts, Paul Benjamin Lowry:
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Comput. Hum. Behav. 68: 190-209 (2017) - [j81]Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum, Thimo Schulze:
How increased social presence through co-browsing influences user engagement in collaborative online shopping. Electron. Commer. Res. Appl. 24: 84-99 (2017) - [j80]Rachida Parks, Heng Xu, Chao-Hsien Chu, Paul Benjamin Lowry:
Examining the intended and unintended consequences of organisational privacy safeguards. Eur. J. Inf. Syst. 26(1): 37-65 (2017) - [j79]Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta:
It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. Eur. J. Inf. Syst. 26(4): 379-413 (2017) - [j78]Paul Benjamin Lowry, Tamara Dinev, Robert Willison:
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. Eur. J. Inf. Syst. 26(6): 546-563 (2017) - [j77]Thomas Rusch, Paul Benjamin Lowry, Patrick Mair, Horst Treiblmaier:
Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory. Inf. Manag. 54(2): 189-203 (2017) - [j76]Xiling Cui, Nan Zhang, Paul Benjamin Lowry:
The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context. Inf. Manag. 54(3): 281-291 (2017) - [j75]Patrick Mair, Horst Treiblmaier, Paul Benjamin Lowry:
Using multistage competing risks approaches to model web page transitions. Internet Res. 27(3): 650-669 (2017) - [j74]Shuyuan Mary Ho, Paul Benjamin Lowry, Merrill Warkentin, Yanyun Yang, Jonathan M. Hollister:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j73]Carol Saunders, Sue Brown, Bendik Bygstad, Alan R. Dennis, Carlos Ferran, Dennis F. Galletta, Ting-Peng Liang, Paul Benjamin Lowry, Jan Recker, Suprateek Sarker:
Goals, Values, and Expectations of the AIS Family of Journals. J. Assoc. Inf. Syst. 18(9): 2 (2017) - [j72]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - [j71]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using IT Design to Prevent Cyberbullying. J. Manag. Inf. Syst. 34(3): 863-901 (2017) - [c35]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using the Control Balance Theory to Explain Social Media Deviance. HICSS 2017: 1-10 - 2016
- [j70]Mark J. Keith, Jeffry S. Babb, Christopher P. Furner, Amjad Abdullat, Paul Benjamin Lowry:
Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications. AIS Trans. Hum. Comput. Interact. 8(3): 3 (2016) - [j69]Kamel Rouibah, Paul Benjamin Lowry, Yujong Hwang:
The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country. Electron. Commer. Res. Appl. 19: 33-43 (2016) - [j68]Xiling Cui, Vincent S. Lai, Paul Benjamin Lowry:
How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China. Inf. Manag. 53(5): 609-624 (2016) - [j67]Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, Justin Scott Giboney:
Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Int. J. Hum. Comput. Stud. 91: 24-36 (2016) - [j66]Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Mikko T. Siponen:
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Inf. Syst. Res. 27(4): 962-986 (2016) - [j65]Kristijan Mirkovski, Frederik von Briel, Paul Benjamin Lowry:
Semantic Learning-Based Innovation Framework for Social Media. IT Prof. 18(6): 26-32 (2016) - [j64]Jeffrey D. Wall, Paul Benjamin Lowry, Jordan B. Barlow:
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess. J. Assoc. Inf. Syst. 17(1): 4 (2016) - [j63]James Eric Gaskin, Paul Benjamin Lowry, David M. Hull:
Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats. J. Assoc. Inf. Syst. 17(6): 1 (2016) - [j62]Vincent Siu-king Lai, Fujun Lai, Paul Benjamin Lowry:
Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? J. Manag. Inf. Syst. 33(4): 1209-1251 (2016) - [j61]Paul Benjamin Lowry, David W. Wilson:
Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. J. Strateg. Inf. Syst. 25(3): 211-226 (2016) - [j60]Paul Benjamin Lowry, John D'Arcy, Bryan I. Hammer, Gregory D. Moody:
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. J. Strateg. Inf. Syst. 25(3): 232-240 (2016) - [j59]Xiling Cui, Lai Kuen Law, Paul Benjamin Lowry, Qiuzhen Wang:
A Contingency Model of Bidding Strategies in Online Auctions in China. Pac. Asia J. Assoc. Inf. Syst. 8(2): 4 (2016) - [c34]Sebastian Walter Schütz, Paul Benjamin Lowry, Jason Bennett Thatcher:
Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations. PACIS 2016: 74 - [c33]Jun Zhang, Paul Benjamin Lowry:
Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance. PACIS 2016: 184 - 2015
- [j58]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett:
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example. Commun. Assoc. Inf. Syst. 36: 11 (2015) - [j57]Jinwei Cao, K. Asli Basoglu, Hong Sheng, Paul Benjamin Lowry:
A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research. Commun. Assoc. Inf. Syst. 36: 37 (2015) - [j56]Justin Scott Giboney, Susan A. Brown, Paul Benjamin Lowry, Jay F. Nunamaker Jr.:
User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit. Decis. Support Syst. 72: 1-10 (2015) - [j55]Jie Wei, Paul Benjamin Lowry, Stefan Seedorf:
The assimilation of RFID technology by Chinese companies: A technology diffusion perspective. Inf. Manag. 52(6): 628-642 (2015) - [j54]Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, Tom L. Roberts:
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust. Inf. Syst. J. 25(3): 193-273 (2015) - [j53]Paul Benjamin Lowry, Gregory D. Moody:
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Inf. Syst. J. 25(5): 433-463 (2015) - [j52]Mark J. Keith, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, Amjad Abdullat:
The role of mobile-computing self-efficacy in consumer information disclosure. Inf. Syst. J. 25(6): 637-667 (2015) - [j51]Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, Paul Benjamin Lowry:
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. Inf. Syst. Res. 26(2): 282-300 (2015) - [j50]Paul Benjamin Lowry, James Eric Gaskin, Gregory D. Moody:
Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. J. Assoc. Inf. Syst. 16(7): 3 (2015) - [j49]Kamel Rouibah, Paul Benjamin Lowry, Laila Almutairi:
Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context. J. Glob. Inf. Manag. 23(3): 41-71 (2015) - [j48]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation. J. Manag. Inf. Syst. 32(3): 158-196 (2015) - [j47]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry:
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets. J. Manag. Inf. Syst. 32(4): 179-214 (2015) - [j46]Anthony Vance, Paul Benjamin Lowry, Dennis Eggett:
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations. MIS Q. 39(2): 345-366 (2015) - [j45]Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, Peter Polak:
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Q. 39(4): 837-864 (2015) - [c32]Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang