BibTeX records: Paul Benjamin Lowry

download as .bib file

@article{DBLP:journals/iam/ChoiL24,
  author       = {Daeeun Daniel Choi and
                  Paul Benjamin Lowry},
  title        = {Balancing the commitment to the common good and the protection of
                  personal privacy: Consumer adoption of sustainable, smart connected
                  cars},
  journal      = {Inf. Manag.},
  volume       = {61},
  number       = {1},
  pages        = {103876},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.im.2023.103876},
  doi          = {10.1016/J.IM.2023.103876},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/ChoiL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/LiLL24,
  author       = {Xiaolin Li and
                  Paul Benjamin Lowry and
                  Fujun Lai},
  title        = {The influence of ERP-vendor contract compliance and transaction-specific
                  investment on vendee trust: {A} signaling theory perspective},
  journal      = {Inf. Manag.},
  volume       = {61},
  number       = {2},
  pages        = {103923},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.im.2024.103923},
  doi          = {10.1016/J.IM.2024.103923},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/LiLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HullSL23,
  author       = {David M. Hull and
                  Sebastian Walter Schuetz and
                  Paul Benjamin Lowry},
  title        = {Tell me a story: The effects that narratives exert on meaningful-engagement
                  outcomes in antiphishing training},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103252},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103252},
  doi          = {10.1016/J.COSE.2023.103252},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HullSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dim/LiuMLV23,
  author       = {Libo Liu and
                  Kristijan Mirkovski and
                  Paul Benjamin Lowry and
                  Quan Vu},
  title        = {"Do as {I} say but not as {I} do": Influence of political
                  leaders' populist communication styles on public adherence in a crisis
                  using the global case of {COVID-19} movement restrictions},
  journal      = {Data Inf. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {100039},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dim.2023.100039},
  doi          = {10.1016/J.DIM.2023.100039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dim/LiuMLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dim/CalderonJL23,
  author       = {Eduardo D. Villacis Calderon and
                  Tabitha L. James and
                  Paul Benjamin Lowry},
  title        = {How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy:
                  An algorithmic fairness, accountability, and transparency {(FAT)}
                  perspective},
  journal      = {Data Inf. Manag.},
  volume       = {7},
  number       = {3},
  pages        = {100042},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dim.2023.100042},
  doi          = {10.1016/J.DIM.2023.100042},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dim/CalderonJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/HassnaRLPM23,
  author       = {Ghazwan Hassna and
                  Kamel Rouibah and
                  Paul Benjamin Lowry and
                  Joanna Paliszkiewicz and
                  Magdalena Madra{-}Sawicka},
  title        = {The roles of user interface design and uncertainty avoidance in {B2C}
                  ecommerce success: Using evidence from three national cultures},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {61},
  pages        = {101297},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.elerap.2023.101297},
  doi          = {10.1016/J.ELERAP.2023.101297},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/HassnaRLPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/ParksWL23,
  author       = {Rachida Parks and
                  Rolf T. Wigand and
                  Paul Benjamin Lowry},
  title        = {Balancing information privacy and operational utility in healthcare:
                  proposing a privacy impact assessment {(PIA)} framework},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {32},
  number       = {6},
  pages        = {1052--1069},
  year         = {2023},
  url          = {https://doi.org/10.1080/0960085x.2022.2103044},
  doi          = {10.1080/0960085X.2022.2103044},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/ParksWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/DavisonL23,
  author       = {Robert M. Davison and
                  Paul Benjamin Lowry},
  title        = {\emph{ISJ} editorial: Addressing the implications of recent developments
                  in journal impact factors},
  journal      = {Inf. Syst. J.},
  volume       = {33},
  number       = {3},
  pages        = {419--436},
  year         = {2023},
  url          = {https://doi.org/10.1111/isj.12426},
  doi          = {10.1111/ISJ.12426},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/DavisonL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/DiazAndradeTDHTLCS23,
  author       = {Antonio D{\'{\i}}az{-}Andrade and
                  Monideepa Tarafdar and
                  Robert M. Davison and
                  Andrew M. Hardin and
                  Angsana A. Techatassanasoontorn and
                  Paul Benjamin Lowry and
                  Sutirtha Chatterjee and
                  Gerhard Schwabe},
  title        = {The importance of theory at the \emph{Information Systems Journal}},
  journal      = {Inf. Syst. J.},
  volume       = {33},
  number       = {4},
  pages        = {693--702},
  year         = {2023},
  url          = {https://doi.org/10.1111/isj.12437},
  doi          = {10.1111/ISJ.12437},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/DiazAndradeTDHTLCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/WangLLL23,
  author       = {Le Wang and
                  Paul Benjamin Lowry and
                  Xin (Robert) Luo and
                  Han Li},
  title        = {Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical
                  Study of Multiplayer Online Battle Arena Games},
  journal      = {Inf. Syst. Res.},
  volume       = {34},
  number       = {1},
  pages        = {275--296},
  year         = {2023},
  url          = {https://doi.org/10.1287/isre.2022.1127},
  doi          = {10.1287/ISRE.2022.1127},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/WangLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/BurnsRPLF23,
  author       = {A. J. Burns and
                  Tom L. Roberts and
                  Clay Posey and
                  Paul Benjamin Lowry and
                  Bryan Fuller},
  title        = {Going Beyond Deterrence: {A} Middle-Range Theory of Motives and Controls
                  for Insider Computer Abuse},
  journal      = {Inf. Syst. Res.},
  volume       = {34},
  number       = {1},
  pages        = {342--362},
  year         = {2023},
  url          = {https://doi.org/10.1287/isre.2022.1133},
  doi          = {10.1287/ISRE.2022.1133},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isr/BurnsRPLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/ZhangJZKL023,
  author       = {Jun Zhang and
                  Qiqi Jiang and
                  Wenping Zhang and
                  Lele Kang and
                  Paul Benjamin Lowry and
                  Zhang Xiong},
  title        = {Explaining the Outcomes of Social Gamification: {A} Longitudinal Field
                  Experiment},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {40},
  number       = {2},
  pages        = {401--439},
  year         = {2023},
  url          = {http://www.jmis-web.org/articles/1617},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/ZhangJZKL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/JamesCBL22,
  author       = {Tabitha L. James and
                  Eduardo D. Villacis Calderon and
                  France B{\'{e}}langer and
                  Paul Benjamin Lowry},
  title        = {The mediating role of group dynamics in shaping received social support
                  from active and passive use in online health communities},
  journal      = {Inf. Manag.},
  volume       = {59},
  number       = {3},
  pages        = {103606},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.im.2022.103606},
  doi          = {10.1016/J.IM.2022.103606},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/JamesCBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpr/BaghersadZLC22,
  author       = {Milad Baghersad and
                  Christopher W. Zobel and
                  Paul Benjamin Lowry and
                  Sutirtha Chatterjee},
  title        = {The roles of prior experience and the location on the severity of
                  supply chain disruptions},
  journal      = {Int. J. Prod. Res.},
  volume       = {60},
  number       = {16},
  pages        = {5051--5070},
  year         = {2022},
  url          = {https://doi.org/10.1080/00207543.2021.1948136},
  doi          = {10.1080/00207543.2021.1948136},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpr/BaghersadZLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/HassanLM22,
  author       = {Nik Rushdi Hassan and
                  Paul Benjamin Lowry and
                  Lars Mathiassen},
  title        = {Useful Products in Information Systems Theorizing: {A} Discursive
                  Formation Perspective},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {7},
  year         = {2022},
  url          = {https://aisel.aisnet.org/jais/vol23/iss2/7},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jais/HassanLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/JamesBL22,
  author       = {Tabitha L. James and
                  France B{\'{e}}langer and
                  Paul Benjamin Lowry},
  title        = {The Mediating Role of Fitness Technology Enablement of Psychological
                  Need Satisfaction and Frustration on the Relationship between Goals
                  for Fitness Technology Use and Use Outcomes},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {23},
  number       = {4},
  pages        = {4},
  year         = {2022},
  url          = {https://aisel.aisnet.org/jais/vol23/iss4/4},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/JamesBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pajais/CuiZLW22,
  author       = {Xiling Cui and
                  Qiang Zhou and
                  Paul Benjamin Lowry and
                  Yi Wang},
  title        = {Do Enterprise Systems Necessarily Lead to Innovation? Identifying
                  the Missing Links with {A} Moderated Mediation Model},
  journal      = {Pac. Asia J. Assoc. Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {5},
  year         = {2022},
  url          = {https://aisel.aisnet.org/pajais/vol14/iss1/5},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pajais/CuiZLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aisthci/DunnRJGL21,
  author       = {Brian Kimball Dunn and
                  Narayan Ramasubbu and
                  Matthew L. Jensen and
                  Dennis F. Galletta and
                  Paul Benjamin Lowry},
  title        = {Efficiency and Exposure: Reconciling the Effects of Website Browsing
                  Behaviors for Non-transactional Outcomes},
  journal      = {{AIS} Trans. Hum. Comput. Interact.},
  volume       = {13},
  number       = {2},
  pages        = {206--242},
  year         = {2021},
  url          = {https://doi.org/10.17705/1thci.00148},
  doi          = {10.17705/1THCI.00148},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aisthci/DunnRJGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AliLDBLA21,
  author       = {Syed Emad Azhar Ali and
                  Fong{-}Woon Lai and
                  P. D. D. Dominic and
                  Nicholas James Brown and
                  Paul Benjamin Lowry and
                  Rao Faizan Ali},
  title        = {Stock market reactions to favorable and unfavorable information security
                  events: {A} systematic literature review},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102451},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102451},
  doi          = {10.1016/J.COSE.2021.102451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliLDBLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/WuLZP21,
  author       = {Dezhi Wu and
                  Paul Benjamin Lowry and
                  Dongsong Zhang and
                  Rachida Parks},
  title        = {Patients' compliance behavior in a personalized mobile patient education
                  system {(PMPES)} setting: Rational, social, or personal choices?},
  journal      = {Int. J. Medical Informatics},
  volume       = {145},
  pages        = {104295},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijmedinf.2020.104295},
  doi          = {10.1016/J.IJMEDINF.2020.104295},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/WuLZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SilicL21,
  author       = {Mario Silic and
                  Paul Benjamin Lowry},
  title        = {Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers
                  Manage their Nerves to Commit their Virtual Crimes},
  journal      = {Inf. Syst. Frontiers},
  volume       = {23},
  number       = {2},
  pages        = {329--341},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10796-019-09949-3},
  doi          = {10.1007/S10796-019-09949-3},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/SilicL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/ChatterjeeMLCH21,
  author       = {Sutirtha Chatterjee and
                  Gregory D. Moody and
                  Paul Benjamin Lowry and
                  Suranjan Chakraborty and
                  Andrew M. Hardin},
  title        = {The nonlinear influence of harmonious information technology affordance
                  on organisational innovation},
  journal      = {Inf. Syst. J.},
  volume       = {31},
  number       = {2},
  pages        = {294--322},
  year         = {2021},
  url          = {https://doi.org/10.1111/isj.12311},
  doi          = {10.1111/ISJ.12311},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/ChatterjeeMLCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/ChenGLLMW21,
  author       = {Yan Chen and
                  Dennis F. Galletta and
                  Paul Benjamin Lowry and
                  Xin (Robert) Luo and
                  Gregory D. Moody and
                  Robert Willison},
  title        = {Understanding Inconsistent Employee Compliance with Information Security
                  Policies Through the Lens of the Extended Parallel Process Model},
  journal      = {Inf. Syst. Res.},
  volume       = {32},
  number       = {3},
  pages        = {1043--1065},
  year         = {2021},
  url          = {https://doi.org/10.1287/isre.2021.1014},
  doi          = {10.1287/ISRE.2021.1014},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/ChenGLLMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SchutzLPT21,
  author       = {Sebastian Walter Sch{\"{u}}tz and
                  Paul Benjamin Lowry and
                  Daniel A. Pienta and
                  Jason Bennett Thatcher},
  title        = {Improving the Design of Information Security Messages by Leveraging
                  the Effects of Temporal Distance and Argument Nature},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {22},
  number       = {5},
  pages        = {4},
  year         = {2021},
  url          = {https://aisel.aisnet.org/jais/vol22/iss5/4},
  timestamp    = {Fri, 10 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/SchutzLPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShinL20,
  author       = {Bongsik Shin and
                  Paul Benjamin Lowry},
  title        = {A review and theoretical explanation of the 'Cyberthreat-Intelligence
                  {(CTI)} capability' that needs to be fostered in information security
                  practitioners and how this can be accomplished},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101761},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101761},
  doi          = {10.1016/J.COSE.2020.101761},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShinL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/CuiLLL20,
  author       = {Xiling Cui and
                  Vincent S. Lai and
                  Paul Benjamin Lowry and
                  Yang Lei},
  title        = {The effects of bidder factors on online bidding strategies: {A} motivation-opportunity-ability
                  {(MOA)} model},
  journal      = {Decis. Support Syst.},
  volume       = {138},
  pages        = {113397},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.dss.2020.113397},
  doi          = {10.1016/J.DSS.2020.113397},
  timestamp    = {Fri, 16 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/CuiLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/LowryPL20,
  author       = {Paul Benjamin Lowry and
                  Stacie Petter and
                  Jan Marco Leimeister},
  title        = {Desperately seeking the artefacts and the foundations of native theory
                  in gamification research: why information systems researchers can
                  play a legitimate role in this discourse and how they can better contribute},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {29},
  number       = {6},
  pages        = {609--620},
  year         = {2020},
  url          = {https://doi.org/10.1080/0960085X.2020.1841574},
  doi          = {10.1080/0960085X.2020.1841574},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/LowryPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/WuMZL20,
  author       = {Dezhi Wu and
                  Gregory D. Moody and
                  Jun Zhang and
                  Paul Benjamin Lowry},
  title        = {Effects of the design of mobile security notifications and mobile
                  app usability on users' security perceptions and continued use intention},
  journal      = {Inf. Manag.},
  volume       = {57},
  number       = {5},
  pages        = {103235},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.im.2019.103235},
  doi          = {10.1016/J.IM.2019.103235},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/WuMZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/SeeberWSMBL20,
  author       = {Isabella Seeber and
                  Lena Waizenegger and
                  Stefan Seidel and
                  Stefan Morana and
                  Izak Benbasat and
                  Paul Benjamin Lowry},
  title        = {Collaborating with technology-based autonomous agents},
  journal      = {Internet Res.},
  volume       = {30},
  number       = {1},
  pages        = {1--18},
  year         = {2020},
  url          = {https://doi.org/10.1108/INTR-12-2019-0503},
  doi          = {10.1108/INTR-12-2019-0503},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/SeeberWSMBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/SilicL20,
  author       = {Mario Silic and
                  Paul Benjamin Lowry},
  title        = {Using Design-Science Based Gamification to Improve Organizational
                  Security Training and Compliance},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {37},
  number       = {1},
  pages        = {129--161},
  year         = {2020},
  url          = {https://doi.org/10.1080/07421222.2019.1705512},
  doi          = {10.1080/07421222.2019.1705512},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/SilicL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/SchutzLPT20,
  author       = {Sebastian Walter Sch{\"{u}}tz and
                  Paul Benjamin Lowry and
                  Daniel A. Pienta and
                  Jason Bennett Thatcher},
  title        = {The Effectiveness of Abstract Versus Concrete Fear Appeals in Information
                  Security},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {37},
  number       = {3},
  pages        = {723--757},
  year         = {2020},
  url          = {https://doi.org/10.1080/07421222.2020.1790187},
  doi          = {10.1080/07421222.2020.1790187},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/SchutzLPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/ChatterjeeMLCH20,
  author       = {Sutirtha Chatterjee and
                  Gregory D. Moody and
                  Paul Benjamin Lowry and
                  Suranjan Chakraborty and
                  Andrew M. Hardin},
  title        = {Information Technology and organizational innovation: Harmonious information
                  technology affordance and courage-based actualization},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {29},
  number       = {1},
  pages        = {101596},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jsis.2020.101596},
  doi          = {10.1016/J.JSIS.2020.101596},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsis/ChatterjeeMLCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChoiLW20,
  author       = {Daeeun Daniel Choi and
                  Paul Benjamin Lowry and
                  Alan Wang},
  title        = {The Design of Personal Privacy and Security Risk Scores for Minimizing
                  Consumers' Cognitive Gaps in IoT Settings},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64366},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ChoiLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/OliveroGASL19,
  author       = {Nadia Olivero and
                  Andrea Greco and
                  Anna Maria Annoni and
                  Patrizia Steca and
                  Paul Benjamin Lowry},
  title        = {Does opportunity make the thief? Abilities and moral disengagement
                  in illegal downloading},
  journal      = {Behav. Inf. Technol.},
  volume       = {38},
  number       = {12},
  pages        = {1273--1289},
  year         = {2019},
  url          = {https://doi.org/10.1080/0144929X.2019.1583768},
  doi          = {10.1080/0144929X.2019.1583768},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/OliveroGASL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HinaDL19,
  author       = {Sadaf Hina and
                  Dhanapal Durai Dominic and
                  Paul Benjamin Lowry},
  title        = {Institutional governance and protection motivation: Theoretical insights
                  into shaping employees' security compliance behavior in higher education
                  institutions in the developing world},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101594},
  doi          = {10.1016/J.COSE.2019.101594},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HinaDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsj/BrielSL19,
  author       = {Frederik von Briel and
                  Christoph Schneider and
                  Paul Benjamin Lowry},
  title        = {Absorbing Knowledge from and with External Partners: The Role of Social
                  Integration Mechanisms},
  journal      = {Decis. Sci.},
  volume       = {50},
  number       = {1},
  pages        = {7--45},
  year         = {2019},
  url          = {https://doi.org/10.1111/deci.12314},
  doi          = {10.1111/DECI.12314},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsj/BrielSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/ZhangKLLW19,
  author       = {Shanshan Zhang and
                  Ron Chi{-}Wai Kwok and
                  Paul Benjamin Lowry and
                  Zhiying Liu and
                  Ji Wu},
  title        = {The influence of role stress on self-disclosure on social networking
                  sites: {A} conservation of resources perspective},
  journal      = {Inf. Manag.},
  volume       = {56},
  number       = {7},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.im.2019.02.002},
  doi          = {10.1016/J.IM.2019.02.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/ZhangKLLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/DArcyL19,
  author       = {John D'Arcy and
                  Paul Benjamin Lowry},
  title        = {Cognitive-affective drivers of employees' daily compliance with information
                  security policies: {A} multilevel, longitudinal study},
  journal      = {Inf. Syst. J.},
  volume       = {29},
  number       = {1},
  pages        = {43--69},
  year         = {2019},
  url          = {https://doi.org/10.1111/isj.12173},
  doi          = {10.1111/ISJ.12173},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/DArcyL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/HullLGM19,
  author       = {David M. Hull and
                  Paul Benjamin Lowry and
                  James E. Gaskin and
                  Kristijan Mirkovski},
  title        = {A storyteller's guide to problem-based learning for information systems
                  management education},
  journal      = {Inf. Syst. J.},
  volume       = {29},
  number       = {5},
  pages        = {1040--1057},
  year         = {2019},
  url          = {https://doi.org/10.1111/isj.12234},
  doi          = {10.1111/ISJ.12234},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/HullLGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/MirkovskiGHL19,
  author       = {Kristijan Mirkovski and
                  James E. Gaskin and
                  David M. Hull and
                  Paul Benjamin Lowry},
  title        = {Visual storytelling for improving the comprehension and utility in
                  disseminating information systems research: Evidence from a quasi-experiment},
  journal      = {Inf. Syst. J.},
  volume       = {29},
  number       = {6},
  pages        = {1153--1177},
  year         = {2019},
  url          = {https://doi.org/10.1111/isj.12240},
  doi          = {10.1111/ISJ.12240},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/MirkovskiGHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/BurnsRPL19,
  author       = {A. J. Burns and
                  Tom L. Roberts and
                  Clay Posey and
                  Paul Benjamin Lowry},
  title        = {The Adaptive Roles of Positive and Negative Emotions in Organizational
                  Insiders' Security-Based Precaution Taking},
  journal      = {Inf. Syst. Res.},
  volume       = {30},
  number       = {4},
  pages        = {1228--1247},
  year         = {2019},
  url          = {https://doi.org/10.1287/isre.2019.0860},
  doi          = {10.1287/ISRE.2019.0860},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/BurnsRPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itp/ZhangKLL19,
  author       = {Shanshan Zhang and
                  Ron Chi{-}Wai Kwok and
                  Paul Benjamin Lowry and
                  Zhiying Liu},
  title        = {Does more accessibility lead to more disclosure? Exploring the influence
                  of information accessibility on self-disclosure in online social networks},
  journal      = {Inf. Technol. People},
  volume       = {32},
  number       = {3},
  pages        = {754--780},
  year         = {2019},
  url          = {https://doi.org/10.1108/ITP-04-2017-0134},
  doi          = {10.1108/ITP-04-2017-0134},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itp/ZhangKLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/DunnRGL19,
  author       = {Brian Kimball Dunn and
                  Narayan Ramasubbu and
                  Dennis F. Galletta and
                  Paul Benjamin Lowry},
  title        = {Digital Borders, Location Recognition, and Experience Attribution
                  within a Digital Geography},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {36},
  number       = {2},
  pages        = {418--449},
  year         = {2019},
  url          = {https://doi.org/10.1080/07421222.2019.1598690},
  doi          = {10.1080/07421222.2019.1598690},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmis/DunnRGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryZMCWW19,
  author       = {Paul Benjamin Lowry and
                  Jun Zhang and
                  Gregory D. Moody and
                  Sutirtha Chatterjee and
                  Chuang Wang and
                  Tailai Wu},
  title        = {An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based
                  Opportunism},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {36},
  number       = {4},
  pages        = {1142--1178},
  year         = {2019},
  url          = {https://doi.org/10.1080/07421222.2019.1661090},
  doi          = {10.1080/07421222.2019.1661090},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryZMCWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/HassanML19,
  author       = {Nik Rushdi Hassan and
                  Lars Mathiassen and
                  Paul Benjamin Lowry},
  editor       = {Jan vom Brocke and
                  Shirley Gregor and
                  Oliver M{\"{u}}ller},
  title        = {Enhancing Theoretical Contribution in is Research: the Case of Technology
                  Adoption},
  booktitle    = {27th European Conference on Information Systems - Information Systems
                  for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden,
                  June 8-14, 2019},
  year         = {2019},
  url          = {https://aisel.aisnet.org/ecis2019\_rp/190},
  timestamp    = {Fri, 20 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/HassanML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ChatterjeeSML19,
  author       = {Sutirtha Chatterjee and
                  Suprateek Sarker and
                  Gregory D. Moody and
                  Paul Benjamin Lowry},
  editor       = {Tung Bui},
  title        = {The Effect of {CIO} Virtues on {CIO} Role Effectiveness},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/60082},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ChatterjeeSML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aisthci/TreiblmaierPL18,
  author       = {Horst Treiblmaier and
                  Lisa{-}Maria Putz and
                  Paul Benjamin Lowry},
  title        = {Research Commentary: Setting a Definition, Context, and Theory-Based
                  Research Agenda for the Gamification of Non-Gaming Applications},
  journal      = {{AIS} Trans. Hum. Comput. Interact.},
  volume       = {10},
  number       = {3},
  pages        = {1},
  year         = {2018},
  url          = {https://aisel.aisnet.org/thci/vol10/iss3/1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aisthci/TreiblmaierPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ce/ParksLWAW18,
  author       = {Rachida Parks and
                  Paul Benjamin Lowry and
                  Rolf T. Wigand and
                  Nitin Agarwal and
                  Therese L. Williams},
  title        = {Why students engage in cyber-cheating through a collective movement:
                  {A} case of deviance and collusion},
  journal      = {Comput. Educ.},
  volume       = {125},
  pages        = {308--326},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compedu.2018.04.003},
  doi          = {10.1016/J.COMPEDU.2018.04.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ce/ParksLWAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MenardWL18,
  author       = {Philip Menard and
                  Merrill Warkentin and
                  Paul Benjamin Lowry},
  title        = {The impact of collectivism and psychological ownership on protection
                  motivation: {A} cross-cultural examination},
  journal      = {Comput. Secur.},
  volume       = {75},
  pages        = {147--166},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.020},
  doi          = {10.1016/J.COSE.2018.01.020},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MenardWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/WillisonL18,
  author       = {Robert Willison and
                  Paul Benjamin Lowry},
  title        = {Disentangling the Motivations for Organizational Insider Computer
                  Abuse through the Rational Choice and Life Course Perspectives},
  journal      = {Data Base},
  volume       = {49},
  number       = {{SI}},
  pages        = {81--102},
  year         = {2018},
  url          = {https://doi.org/10.1145/3210530.3210537},
  doi          = {10.1145/3210530.3210537},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/WillisonL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/JiangMWWL18,
  author       = {Ling Jiang and
                  Kristijan Mirkovski and
                  Jeffrey D. Wall and
                  Christian Wagner and
                  Paul Benjamin Lowry},
  title        = {Proposing the core contributor withdrawal theory {(CCWT)} to understand
                  core contributor withdrawal from online peer-production communities},
  journal      = {Internet Res.},
  volume       = {28},
  number       = {4},
  pages        = {988--1028},
  year         = {2018},
  url          = {https://doi.org/10.1108/IntR-05-2017-0215},
  doi          = {10.1108/INTR-05-2017-0215},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/JiangMWWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/ChiuHLL18,
  author       = {Chao{-}Min Chiu and
                  Jack Shih{-}Chieh Hsu and
                  Paul Benjamin Lowry and
                  Ting{-}Peng Liang},
  title        = {Solving the Interpretational-Confounding and Interpretational-Ambiguity
                  Problems of Formative Construct Modeling in Behavioral Research: Proposing
                  a Two-Stage Fixed-Weight Redundancy Approach},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {19},
  number       = {7},
  pages        = {4},
  year         = {2018},
  url          = {https://aisel.aisnet.org/jais/vol19/iss7/4},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/ChiuHLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/WillisonLP18,
  author       = {Robert Willison and
                  Paul Benjamin Lowry and
                  Raymond Paternoster},
  title        = {A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive
                  Deterrence to Inspire New Directions in Behavioral and Organizational
                  Security Research},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {19},
  number       = {12},
  pages        = {3},
  year         = {2018},
  url          = {https://aisel.aisnet.org/jais/vol19/iss12/3},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/WillisonLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/HassnaL18,
  author       = {Ghazwan Hassna and
                  Paul Benjamin Lowry},
  title        = {Big Data Capability, Customer Agility, and Organization Performance:
                  {A} Dynamic Capability Perspective},
  booktitle    = {24th Americas Conference on Information Systems, {AMCIS} 2018, New
                  Orleans, LA, USA, August 16-18, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/amcis2018/DigitalAgility/Presentations/7},
  timestamp    = {Mon, 11 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/HassnaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/SaundersBBDFGLL17,
  author       = {Carol Saunders and
                  Susan A. Brown and
                  Bendik Bygstad and
                  Alan R. Dennis and
                  Carlos Ferran and
                  Dennis F. Galletta and
                  Ting{-}Peng Liang and
                  Paul Benjamin Lowry and
                  Jan Recker and
                  Suprateek Sarker},
  title        = {Goals, Values, and Expectations of the {AIS} Family of Journals},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {41},
  pages        = {16},
  year         = {2017},
  url          = {https://doi.org/10.17705/1cais.04116},
  doi          = {10.17705/1CAIS.04116},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cais/SaundersBBDFGLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/LowryZW17,
  author       = {Paul Benjamin Lowry and
                  Jun Zhang and
                  Tailai Wu},
  title        = {Nature or nurture? {A} meta-analysis of the factors that maximize
                  the prediction of digital piracy by using social cognitive theory
                  as a framework},
  journal      = {Comput. Hum. Behav.},
  volume       = {68},
  pages        = {104--120},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2016.11.015},
  doi          = {10.1016/J.CHB.2016.11.015},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/LowryZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/BurnsPRL17,
  author       = {A. J. Burns and
                  Clay Posey and
                  Tom L. Roberts and
                  Paul Benjamin Lowry},
  title        = {Examining the relationship of organizational insiders' psychological
                  capital with information security threat and coping appraisals},
  journal      = {Comput. Hum. Behav.},
  volume       = {68},
  pages        = {190--209},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.chb.2016.11.018},
  doi          = {10.1016/J.CHB.2016.11.018},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/BurnsPRL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/WeiSLTS17,
  author       = {Jie Wei and
                  Stefan Seedorf and
                  Paul Benjamin Lowry and
                  Christian Thum and
                  Thimo Schulze},
  title        = {How increased social presence through co-browsing influences user
                  engagement in collaborative online shopping},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {24},
  pages        = {84--99},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.elerap.2017.07.002},
  doi          = {10.1016/J.ELERAP.2017.07.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/WeiSLTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/ParksXCL17,
  author       = {Rachida Parks and
                  Heng Xu and
                  Chao{-}Hsien Chu and
                  Paul Benjamin Lowry},
  title        = {Examining the intended and unintended consequences of organisational
                  privacy safeguards},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {37--65},
  year         = {2017},
  url          = {https://doi.org/10.1057/s41303-016-0001-6},
  doi          = {10.1057/S41303-016-0001-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/ParksXCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/MoodyLG17,
  author       = {Gregory D. Moody and
                  Paul Benjamin Lowry and
                  Dennis F. Galletta},
  title        = {It's complicated: explaining the relationship between trust, distrust,
                  and ambivalence in online transaction relationships using polynomial
                  regression analysis and response surface analysis},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {26},
  number       = {4},
  pages        = {379--413},
  year         = {2017},
  url          = {https://doi.org/10.1057/s41303-016-0027-9},
  doi          = {10.1057/S41303-016-0027-9},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/MoodyLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/LowryDW17,
  author       = {Paul Benjamin Lowry and
                  Tamara Dinev and
                  Robert Willison},
  title        = {Why security and privacy research lies at the centre of the information
                  systems {(IS)} artefact: proposing a bold research agenda},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {26},
  number       = {6},
  pages        = {546--563},
  year         = {2017},
  url          = {https://doi.org/10.1057/s41303-017-0066-x},
  doi          = {10.1057/S41303-017-0066-X},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/LowryDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/RuschLMT17,
  author       = {Thomas Rusch and
                  Paul Benjamin Lowry and
                  Patrick Mair and
                  Horst Treiblmaier},
  title        = {Breaking free from the limitations of classical test theory: Developing
                  and measuring information systems scales using item response theory},
  journal      = {Inf. Manag.},
  volume       = {54},
  number       = {2},
  pages        = {189--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.im.2016.06.005},
  doi          = {10.1016/J.IM.2016.06.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/RuschLMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/CuiZL17,
  author       = {Xiling Cui and
                  Nan Zhang and
                  Paul Benjamin Lowry},
  title        = {The agent bidding habit and use model {(ABHUM)} and its validation
                  in the Taobao online auction context},
  journal      = {Inf. Manag.},
  volume       = {54},
  number       = {3},
  pages        = {281--291},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.im.2016.07.007},
  doi          = {10.1016/J.IM.2016.07.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/CuiZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/MairTL17,
  author       = {Patrick Mair and
                  Horst Treiblmaier and
                  Paul Benjamin Lowry},
  title        = {Using multistage competing risks approaches to model web page transitions},
  journal      = {Internet Res.},
  volume       = {27},
  number       = {3},
  pages        = {650--669},
  year         = {2017},
  url          = {https://doi.org/10.1108/IntR-06-2016-0167},
  doi          = {10.1108/INTR-06-2016-0167},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/MairTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/HoLWYH17,
  author       = {Shuyuan Mary Ho and
                  Paul Benjamin Lowry and
                  Merrill Warkentin and
                  Yanyun Yang and
                  Jonathan M. Hollister},
  title        = {Gender deception in asynchronous online communication: {A} path analysis},
  journal      = {Inf. Process. Manag.},
  volume       = {53},
  number       = {1},
  pages        = {21--41},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ipm.2016.06.004},
  doi          = {10.1016/J.IPM.2016.06.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/HoLWYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SaundersBBDFGLL17,
  author       = {Carol Saunders and
                  Sue Brown and
                  Bendik Bygstad and
                  Alan R. Dennis and
                  Carlos Ferran and
                  Dennis F. Galletta and
                  Ting{-}Peng Liang and
                  Paul Benjamin Lowry and
                  Jan Recker and
                  Suprateek Sarker},
  title        = {Goals, Values, and Expectations of the {AIS} Family of Journals},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {18},
  number       = {9},
  pages        = {2},
  year         = {2017},
  url          = {https://doi.org/10.17705/1jais.00468},
  doi          = {10.17705/1JAIS.00468},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jais/SaundersBBDFGLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/JamesLWW17,
  author       = {Tabitha L. James and
                  Paul Benjamin Lowry and
                  Linda G. Wallace and
                  Merrill Warkentin},
  title        = {The Effect of Belongingness on Obsessive-Compulsive Disorder in the
                  Use of Online Social Networks},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {2},
  pages        = {560--596},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1334496},
  doi          = {10.1080/07421222.2017.1334496},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/JamesLWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryMC17,
  author       = {Paul Benjamin Lowry and
                  Gregory D. Moody and
                  Sutirtha Chatterjee},
  title        = {Using {IT} Design to Prevent Cyberbullying},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {3},
  pages        = {863--901},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1373012},
  doi          = {10.1080/07421222.2017.1373012},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryMC17,
  author       = {Paul Benjamin Lowry and
                  Gregory D. Moody and
                  Sutirtha Chatterjee},
  editor       = {Tung Bui},
  title        = {Using the Control Balance Theory to Explain Social Media Deviance},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41427},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aisthci/KeithBFAL16,
  author       = {Mark J. Keith and
                  Jeffry S. Babb and
                  Christopher P. Furner and
                  Amjad Abdullat and
                  Paul Benjamin Lowry},
  title        = {Limited Information and Quick Decisions: Consumer Privacy Calculus
                  for Mobile Applications},
  journal      = {{AIS} Trans. Hum. Comput. Interact.},
  volume       = {8},
  number       = {3},
  pages        = {3},
  year         = {2016},
  url          = {https://aisel.aisnet.org/thci/vol8/iss3/3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aisthci/KeithBFAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/RouibahLH16,
  author       = {Kamel Rouibah and
                  Paul Benjamin Lowry and
                  Yujong Hwang},
  title        = {The effects of perceived enjoyment and perceived risks on trust formation
                  and intentions to use online payment systems: New perspectives from
                  an Arab country},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {19},
  pages        = {33--43},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.elerap.2016.07.001},
  doi          = {10.1016/J.ELERAP.2016.07.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/RouibahLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/CuiLL16,
  author       = {Xiling Cui and
                  Vincent S. Lai and
                  Paul Benjamin Lowry},
  title        = {How do bidders' organism reactions mediate auction stimuli and bidder
                  loyalty in online auctions? The case of Taobao in China},
  journal      = {Inf. Manag.},
  volume       = {53},
  number       = {5},
  pages        = {609--624},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.im.2016.01.005},
  doi          = {10.1016/J.IM.2016.01.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/CuiLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/BurgoonBLHMGG16,
  author       = {Judee K. Burgoon and
                  Joseph A. Bonito and
                  Paul Benjamin Lowry and
                  Sean L. Humpherys and
                  Gregory D. Moody and
                  James E. Gaskin and
                  Justin Scott Giboney},
  title        = {Application of Expectancy Violations Theory to communication with
                  and judgments about embodied agents during a decision-making task},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {91},
  pages        = {24--36},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijhcs.2016.02.002},
  doi          = {10.1016/J.IJHCS.2016.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/BurgoonBLHMGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/LowryZWS16,
  author       = {Paul Benjamin Lowry and
                  Jun Zhang and
                  Chuang Wang and
                  Mikko T. Siponen},
  title        = {Why Do Adults Engage in Cyberbullying on Social Media? An Integration
                  of Online Disinhibition and Deindividuation Effects with the Social
                  Structure and Social Learning Model},
  journal      = {Inf. Syst. Res.},
  volume       = {27},
  number       = {4},
  pages        = {962--986},
  year         = {2016},
  url          = {https://doi.org/10.1287/isre.2016.0671},
  doi          = {10.1287/ISRE.2016.0671},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/LowryZWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/MirkovskiBL16,
  author       = {Kristijan Mirkovski and
                  Frederik von Briel and
                  Paul Benjamin Lowry},
  title        = {Semantic Learning-Based Innovation Framework for Social Media},
  journal      = {{IT} Prof.},
  volume       = {18},
  number       = {6},
  pages        = {26--32},
  year         = {2016},
  url          = {https://doi.org/10.1109/MITP.2016.104},
  doi          = {10.1109/MITP.2016.104},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/MirkovskiBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/WallLB16,
  author       = {Jeffrey D. Wall and
                  Paul Benjamin Lowry and
                  Jordan B. Barlow},
  title        = {Organizational Violations of Externally Governed Privacy and Security
                  Rules: Explaining and Predicting Selective Violations under Conditions
                  of Strain and Excess},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {17},
  number       = {1},
  pages        = {4},
  year         = {2016},
  url          = {https://doi.org/10.17705/1jais.00420},
  doi          = {10.17705/1JAIS.00420},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/WallLB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/GaskinLH16,
  author       = {James Eric Gaskin and
                  Paul Benjamin Lowry and
                  David M. Hull},
  title        = {Leveraging Multimedia to Advance Science by Disseminating a Greater
                  Variety of Scholarly Contributions in More Accessible Formats},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {17},
  number       = {6},
  pages        = {1},
  year         = {2016},
  url          = {https://doi.org/10.17705/1jais.00430},
  doi          = {10.17705/1JAIS.00430},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/GaskinLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LaiLL16,
  author       = {Vincent Siu{-}king Lai and
                  Fujun Lai and
                  Paul Benjamin Lowry},
  title        = {Technology Evaluation and Imitation: Do They Have Differential or
                  Dichotomous Effects on {ERP} Adoption and Assimilation in China?},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {33},
  number       = {4},
  pages        = {1209--1251},
  year         = {2016},
  url          = {https://doi.org/10.1080/07421222.2016.1267534},
  doi          = {10.1080/07421222.2016.1267534},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LaiLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/LowryW16,
  author       = {Paul Benjamin Lowry and
                  David W. Wilson},
  title        = {Creating agile organizations through {IT:} The influence of internal
                  {IT} service perceptions on {IT} service quality and {IT} agility},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {25},
  number       = {3},
  pages        = {211--226},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jsis.2016.05.002},
  doi          = {10.1016/J.JSIS.2016.05.002},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsis/LowryW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsis/LowryDHM16,
  author       = {Paul Benjamin Lowry and
                  John D'Arcy and
                  Bryan I. Hammer and
                  Gregory D. Moody},
  title        = {"Cargo Cult" science in traditional organization and information
                  systems survey research: {A} case for using nontraditional methods
                  of data collection, including Mechanical Turk and online panels},
  journal      = {J. Strateg. Inf. Syst.},
  volume       = {25},
  number       = {3},
  pages        = {232--240},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jsis.2016.06.002},
  doi          = {10.1016/J.JSIS.2016.06.002},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsis/LowryDHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pajais/CuiLLW16,
  author       = {Xiling Cui and
                  Lai Kuen Law and
                  Paul Benjamin Lowry and
                  Qiuzhen Wang},
  title        = {A Contingency Model of Bidding Strategies in Online Auctions in China},
  journal      = {Pac. Asia J. Assoc. Inf. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {4},
  year         = {2016},
  url          = {https://aisel.aisnet.org/pajais/vol8/iss2/4},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pajais/CuiLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/SchutzLT16,
  author       = {Sebastian Walter Sch{\"{u}}tz and
                  Paul Benjamin Lowry and
                  Jason Bennett Thatcher},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {Defending against Spear Phishing: Motivating Users through Fear appeal
                  Manipulations},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {74},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/74},
  timestamp    = {Tue, 08 Nov 2016 09:28:09 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/SchutzLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/ZhangL16,
  author       = {Jun Zhang and
                  Paul Benjamin Lowry},
  editor       = {Ting{-}Peng Liang and
                  Shin{-}Yuan Hung and
                  Patrick Y. K. Chau and
                  She{-}I Chang},
  title        = {Designing Quantified-Self 2.0 Running Platform to Ensure Physical
                  Activity Maintenance: the Role of Achievement Goals and Achievement
                  Motivational Affordance},
  booktitle    = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016,
                  Chiayi, Taiwan, June 27 - July 1, 2016},
  pages        = {184},
  year         = {2016},
  url          = {http://aisel.aisnet.org/pacis2016/184},
  timestamp    = {Sun, 21 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/ZhangL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/PoseyRLB15,
  author       = {Clay Posey and
                  Tom L. Roberts and
                  Paul Benjamin Lowry and
                  Rebecca J. Bennett},
  title        = {Multiple Indicators and Multiple Causes {(MIMIC)} Models as a Mixed-Modeling
                  Technique: {A} Tutorial and an Annotated Example},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {36},
  pages        = {11},
  year         = {2015},
  url          = {https://doi.org/10.17705/1cais.03611},
  doi          = {10.17705/1CAIS.03611},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/PoseyRLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/CaoBSL15,
  author       = {Jinwei Cao and
                  K. Asli Basoglu and
                  Hong Sheng and
                  Paul Benjamin Lowry},
  title        = {A Systematic Review of Social Networks Research in Information Systems:
                  Building a Foundation for Exciting Future Research},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {36},
  pages        = {37},
  year         = {2015},
  url          = {https://doi.org/10.17705/1cais.03637},
  doi          = {10.17705/1CAIS.03637},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/CaoBSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/GiboneyBLN15,
  author       = {Justin Scott Giboney and
                  Susan A. Brown and
                  Paul Benjamin Lowry and
                  Jay F. Nunamaker Jr.},
  title        = {User acceptance of knowledge-based system recommendations: Explanations,
                  arguments, and fit},
  journal      = {Decis. Support Syst.},
  volume       = {72},
  pages        = {1--10},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dss.2015.02.005},
  doi          = {10.1016/J.DSS.2015.02.005},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/GiboneyBLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/WeiLS15,
  author       = {Jie Wei and
                  Paul Benjamin Lowry and
                  Stefan Seedorf},
  title        = {The assimilation of {RFID} technology by Chinese companies: {A} technology
                  diffusion perspective},
  journal      = {Inf. Manag.},
  volume       = {52},
  number       = {6},
  pages        = {628--642},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.im.2015.05.001},
  doi          = {10.1016/J.IM.2015.05.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/WeiLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LowryPBR15,
  author       = {Paul Benjamin Lowry and
                  Clay Posey and
                  Rebecca J. Bennett and
                  Tom L. Roberts},
  title        = {Leveraging fairness and reactance theories to deter reactive computer
                  abuse following enhanced organisational information security policies:
                  an empirical study of the influence of counterfactual reasoning and
                  organisational trust},
  journal      = {Inf. Syst. J.},
  volume       = {25},
  number       = {3},
  pages        = {193--273},
  year         = {2015},
  url          = {https://doi.org/10.1111/isj.12063},
  doi          = {10.1111/ISJ.12063},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/LowryPBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LowryM15,
  author       = {Paul Benjamin Lowry and
                  Gregory D. Moody},
  title        = {Proposing the control-reactance compliance model {(CRCM)} to explain
                  opposing motivations to comply with organisational information security
                  policies},
  journal      = {Inf. Syst. J.},
  volume       = {25},
  number       = {5},
  pages        = {433--463},
  year         = {2015},
  url          = {https://doi.org/10.1111/isj.12043},
  doi          = {10.1111/ISJ.12043},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/LowryM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/KeithBLFA15,
  author       = {Mark J. Keith and
                  Jeffry S. Babb and
                  Paul Benjamin Lowry and
                  Christopher P. Furner and
                  Amjad Abdullat},
  title        = {The role of mobile-computing self-efficacy in consumer information
                  disclosure},
  journal      = {Inf. Syst. J.},
  volume       = {25},
  number       = {6},
  pages        = {637--667},
  year         = {2015},
  url          = {https://doi.org/10.1111/isj.12082},
  doi          = {10.1111/ISJ.12082},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/KeithBLFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/HsuSHL15,
  author       = {Jack Shih{-}Chieh Hsu and
                  Sheng{-}Pao Shih and
                  Yu Wen Hung and
                  Paul Benjamin Lowry},
  title        = {The Role of Extra-Role Behaviors and Social Controls in Information
                  Security Policy Effectiveness},
  journal      = {Inf. Syst. Res.},
  volume       = {26},
  number       = {2},
  pages        = {282--300},
  year         = {2015},
  url          = {https://doi.org/10.1287/isre.2015.0569},
  doi          = {10.1287/ISRE.2015.0569},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/HsuSHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/LowryGM15,
  author       = {Paul Benjamin Lowry and
                  James Eric Gaskin and
                  Gregory D. Moody},
  title        = {Proposing the Multimotive Information Systems Continuance Model {(MISC)}
                  to Better Explain End-User System Evaluations and Continuance Intentions},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {16},
  number       = {7},
  pages        = {3},
  year         = {2015},
  url          = {https://doi.org/10.17705/1jais.00403},
  doi          = {10.17705/1JAIS.00403},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/LowryGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/RouibahLA15,
  author       = {Kamel Rouibah and
                  Paul Benjamin Lowry and
                  Laila Almutairi},
  title        = {Dimensions of Business-to-Consumer {(B2C)} Systems Success in Kuwait:
                  Testing a Modified DeLone and McLean {IS} Success Model in an E-Commerce
                  Context},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {23},
  number       = {3},
  pages        = {41--71},
  year         = {2015},
  url          = {https://doi.org/10.4018/JGIM.2015070103},
  doi          = {10.4018/JGIM.2015070103},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/RouibahLA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/ChatterjeeMLCH15,
  author       = {Sutirtha Chatterjee and
                  Gregory D. Moody and
                  Paul Benjamin Lowry and
                  Suranjan Chakraborty and
                  Andrew M. Hardin},
  title        = {Strategic Relevance of Organizational Virtues Enabled by Information
                  Technology in Organizational Innovation},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {32},
  number       = {3},
  pages        = {158--196},
  year         = {2015},
  url          = {https://doi.org/10.1080/07421222.2015.1099180},
  doi          = {10.1080/07421222.2015.1099180},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/ChatterjeeMLCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/PoseyRL15,
  author       = {Clay Posey and
                  Tom L. Roberts and
                  Paul Benjamin Lowry},
  title        = {The Impact of Organizational Commitment on Insiders' Motivation to
                  Protect Organizational Information Assets},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {32},
  number       = {4},
  pages        = {179--214},
  year         = {2015},
  url          = {https://doi.org/10.1080/07421222.2015.1138374},
  doi          = {10.1080/07421222.2015.1138374},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/PoseyRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/VanceLE15,
  author       = {Anthony Vance and
                  Paul Benjamin Lowry and
                  Dennis Eggett},
  title        = {Increasing Accountability Through User-Interface Design Artifacts:
                  {A} New Approach to Addressing the Problem of Access-Policy Violations},
  journal      = {{MIS} Q.},
  volume       = {39},
  number       = {2},
  pages        = {345--366},
  year         = {2015},
  url          = {https://doi.org/10.25300/misq/2015/39.2.04},
  doi          = {10.25300/MISQ/2015/39.2.04},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/VanceLE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/BossGLMP15,
  author       = {Scott R. Boss and
                  Dennis F. Galletta and
                  Paul Benjamin Lowry and
                  Gregory D. Moody and
                  Peter Polak},
  title        = {What Do Systems Users Have to Fear? Using Fear Appeals to Engender
                  Threats and Fear that Motivate Protective Security Behaviors},
  journal      = {{MIS} Q.},
  volume       = {39},
  number       = {4},
  pages        = {837--864},
  year         = {2015},
  url          = {https://doi.org/10.25300/misq/2015/39.4.5},
  doi          = {10.25300/MISQ/2015/39.4.5},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/BossGLMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WuLZ15,
  author       = {Dezhi Wu and
                  Paul Benjamin Lowry and
                  Dongsong Zhang},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Patient Compliance Behavior in a Mobile Healthcare System: An Integration
                  of Theories of Rational Choice and Planned Behavior},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {2976--2984},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.360},
  doi          = {10.1109/HICSS.2015.360},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WuLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/HassanL15,
  author       = {Nik Hassan and
                  Paul Benjamin Lowry},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {Seeking Middle-Range Theories in Information Systems Research},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/IStheory/1},
  timestamp    = {Wed, 09 Oct 2019 12:51:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/HassanL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MirkovskiLBL15,
  author       = {Kristijan Mirkovski and
                  Paul Benjamin Lowry and
                  Frederik von Briel and
                  Libo Liu},
  editor       = {Atreyi Kankanhalli and
                  Andrew Burton{-}Jones and
                  Thompson S. H. Teo},
  title        = {The Role of Innovation Intermediaries in Collaborative Networks of
                  Small and Medium-Sized Enterprises},
  booktitle    = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015,
                  Singapore, July 5-9, 2015},
  pages        = {127},
  year         = {2015},
  url          = {http://aisel.aisnet.org/pacis2015/127},
  timestamp    = {Fri, 10 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/MirkovskiLBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/ZhangDSL15,
  author       = {Jun Zhang and
                  Victor Dibia and
                  Alexey Sodnomov and
                  Paul Benjamin Lowry},
  editor       = {Atreyi Kankanhalli and
                  Andrew Burton{-}Jones and
                  Thompson S. H. Teo},
  title        = {Understanding the Disclosure of Private Healthcare Information within
                  Online Quantified Self 2.0 Platforms},
  booktitle    = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015,
                  Singapore, July 5-9, 2015},
  pages        = {140},
  year         = {2015},
  url          = {http://aisel.aisnet.org/pacis2015/140},
  timestamp    = {Sun, 21 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/ZhangDSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/CuiZL15,
  author       = {Xiling Cui and
                  Qiang Zhou and
                  Paul Benjamin Lowry},
  editor       = {Atreyi Kankanhalli and
                  Andrew Burton{-}Jones and
                  Thompson S. H. Teo},
  title        = {The Influence of Information and Communication Technology and Knowledge
                  Sharing on Balanced Open Innovation},
  booktitle    = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015,
                  Singapore, July 5-9, 2015},
  pages        = {192},
  year         = {2015},
  url          = {http://aisel.aisnet.org/pacis2015/192},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/CuiZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/MoodyGL14,
  author       = {Gregory D. Moody and
                  Dennis F. Galletta and
                  Paul Benjamin Lowry},
  title        = {When trust and distrust collide online: The engenderment and role
                  of consumer ambivalence in online consumer behavior},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {13},
  number       = {4},
  pages        = {266--282},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.elerap.2014.05.001},
  doi          = {10.1016/J.ELERAP.2014.05.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/MoodyGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/PoseyRLH14,
  author       = {Clay Posey and
                  Tom L. Roberts and
                  Paul Benjamin Lowry and
                  Ross T. Hightower},
  title        = {Bridging the divide: {A} qualitative comparison of information security
                  thought patterns between information security professionals and ordinary
                  organizational insiders},
  journal      = {Inf. Manag.},
  volume       = {51},
  number       = {5},
  pages        = {551--567},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.im.2014.03.009},
  doi          = {10.1016/J.IM.2014.03.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/PoseyRLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/LowryTPJB14,
  author       = {Paul Benjamin Lowry and
                  Nathan W. Twyman and
                  Matthew D. Pickard and
                  Jeffrey L. Jenkins and
                  Quang "Neo" Bui},
  title        = {Proposing the Affect-Trust Infusion Model {(ATIM)} to explain and
                  predict the influence of high and low affect infusion on Web vendor
                  trust},
  journal      = {Inf. Manag.},
  volume       = {51},
  number       = {5},
  pages        = {579--594},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.im.2014.03.005},
  doi          = {10.1016/J.IM.2014.03.005},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iam/LowryTPJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhci/LowryWH14,
  author       = {Paul Benjamin Lowry and
                  David W. Wilson and
                  William L. Haig},
  title        = {A Picture is Worth a Thousand Words: Source Credibility Theory Applied
                  to Logo and Website Design for Heightened Credibility and Consumer
                  Trust},
  journal      = {Int. J. Hum. Comput. Interact.},
  volume       = {30},
  number       = {1},
  pages        = {63--93},
  year         = {2014},
  url          = {https://doi.org/10.1080/10447318.2013.839899},
  doi          = {10.1080/10447318.2013.839899},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhci/LowryWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itd/JenkinsGPL14,
  author       = {Jeffrey L. Jenkins and
                  G. Mark Grimes and
                  Jeffrey Gainer Proudfoot and
                  Paul Benjamin Lowry},
  title        = {Improving Password Cybersecurity Through Inexpensive and Minimally
                  Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics
                  Monitoring and Just-in-Time Fear Appeals},
  journal      = {Inf. Technol. Dev.},
  volume       = {20},
  number       = {2},
  pages        = {196--213},
  year         = {2014},
  url          = {https://doi.org/10.1080/02681102.2013.814040},
  doi          = {10.1080/02681102.2013.814040},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itd/JenkinsGPL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/TwymanLBN14,
  author       = {Nathan W. Twyman and
                  Paul Benjamin Lowry and
                  Judee K. Burgoon and
                  Jay F. Nunamaker Jr.},
  title        = {Autonomous Scientifically Controlled Screening Systems for Detecting
                  Information Purposely Concealed by Individuals},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {31},
  number       = {3},
  pages        = {106--137},
  year         = {2014},
  url          = {https://doi.org/10.1080/07421222.2014.995535},
  doi          = {10.1080/07421222.2014.995535},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/TwymanLBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpc/LowryG14,
  author       = {Paul Benjamin Lowry and
                  James E. Gaskin},
  title        = {Partial Least Squares {(PLS)} Structural Equation Modeling {(SEM)}
                  for Building and Testing Behavioral Causal Theory: When to Choose
                  It and How to Use It},
  journal      = {{IEEE} Trans. Prof. Commun.},
  volume       = {57},
  number       = {2},
  pages        = {123--146},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPC.2014.2312452},
  doi          = {10.1109/TPC.2014.2312452},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpc/LowryG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KeithBL14,
  author       = {Mark J. Keith and
                  Jeffry S. Babb and
                  Paul Benjamin Lowry},
  title        = {A Longitudinal Study of Information Privacy on Mobile Devices},
  booktitle    = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
                  Waikoloa, HI, USA, January 6-9, 2014},
  pages        = {3149--3158},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HICSS.2014.391},
  doi          = {10.1109/HICSS.2014.391},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KeithBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/KeithMLB14,
  author       = {Mark J. Keith and
                  Courtenay Maynes and
                  Paul Benjamin Lowry and
                  Jeffry S. Babb},
  editor       = {Michael D. Myers and
                  Detmar W. Straub},
  title        = {Privacy fatigue: The effect of privacy control complexity on consumer
                  electronic information disclosure},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Building a Better World through Information Systems, {ICIS} 2014,
                  Auckland, New Zealand, December 14-17, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/icis2014/proceedings/ISSecurity/11},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/KeithMLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/LowryZW14,
  author       = {Paul Benjamin Lowry and
                  Dongsong Zhang and
                  Dezhi Wu},
  editor       = {Michael D. Myers and
                  Detmar W. Straub},
  title        = {Understanding Patients' Compliance Behavior in a Mobile Healthcare
                  System: The Role of Trust and Planned Behavior},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Building a Better World through Information Systems, {ICIS} 2014,
                  Auckland, New Zealand, December 14-17, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/icis2014/proceedings/ISHealthcare/2},
  timestamp    = {Tue, 24 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/LowryZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CrosslerJLHWB13,
  author       = {Robert E. Crossler and
                  Allen C. Johnston and
                  Paul Benjamin Lowry and
                  Qing Hu and
                  Merrill Warkentin and
                  Richard L. Baskerville},
  title        = {Future directions for behavioral information security research},
  journal      = {Comput. Secur.},
  volume       = {32},
  pages        = {90--101},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.09.010},
  doi          = {10.1016/J.COSE.2012.09.010},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CrosslerJLHWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisdc/WeiSL13,
  author       = {Jie Wei and
                  Stefan Seedorf and
                  Paul Benjamin Lowry},
  title        = {Investigation of the Radio Frequency Identification Assimilation Process
                  in China: {A} Stage-based Model Perspective},
  journal      = {Electron. J. Inf. Syst. Dev. Ctries.},
  volume       = {57},
  number       = {1},
  pages        = {1--17},
  year         = {2013},
  url          = {https://doi.org/10.1002/j.1681-4835.2013.tb00406.x},
  doi          = {10.1002/J.1681-4835.2013.TB00406.X},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisdc/WeiSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/LowryRR13,
  author       = {Paul Benjamin Lowry and
                  Tom L. Roberts and
                  Nicholas C. Romano Jr.},
  title        = {What signal is your inspection team sending to each other? Using a
                  shared collaborative interface to improve shared cognition and implicit
                  coordination in error-detection teams},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {71},
  number       = {4},
  pages        = {455--474},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijhcs.2012.11.004},
  doi          = {10.1016/J.IJHCS.2012.11.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/LowryRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/KeithTHLG13,
  author       = {Mark J. Keith and
                  Samuel C. Thompson and
                  Joanne E. Hale and
                  Paul Benjamin Lowry and
                  Chapman Greer},
  title        = {Information disclosure on mobile devices: Re-examining privacy calculus
                  with actual user behavior},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {71},
  number       = {12},
  pages        = {1163--1173},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijhcs.2013.08.016},
  doi          = {10.1016/J.IJHCS.2013.08.016},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmms/KeithTHLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/LowryGTHR13,
  author       = {Paul Benjamin Lowry and
                  James Eric Gaskin and
                  Nathan W. Twyman and
                  Bryan I. Hammer and
                  Tom L. Roberts},
  title        = {Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation
                  System Adoption Model {(HMSAM)}},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {14},
  number       = {11},
  pages        = {2},
  year         = {2013},
  url          = {https://doi.org/10.17705/1jais.00347},
  doi          = {10.17705/1JAIS.00347},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/LowryGTHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/VanceLE13,
  author       = {Anthony Vance and
                  Paul Benjamin Lowry and
                  Dennis Eggett},
  title        = {Using Accountability to Reduce Access Policy Violations in Information
                  Systems},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {29},
  number       = {4},
  pages        = {263--290},
  year         = {2013},
  url          = {https://doi.org/10.2753/mis0742-1222290410},
  doi          = {10.2753/MIS0742-1222290410},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/VanceLE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryMGV13,
  author       = {Paul Benjamin Lowry and
                  Gregory D. Moody and
                  Dennis F. Galletta and
                  Anthony Vance},
  title        = {The Drivers in the Use of Online Whistle-Blowing Reporting Systems},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {30},
  number       = {1},
  pages        = {153--190},
  year         = {2013},
  url          = {https://doi.org/10.2753/mis0742-1222300105},
  doi          = {10.2753/MIS0742-1222300105},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryMGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/LowryMGGHBW13,
  author       = {Paul Benjamin Lowry and
                  Gregory D. Moody and
                  James E. Gaskin and
                  Dennis F. Galletta and
                  Sean L. Humpherys and
                  Jordan B. Barlow and
                  David W. Wilson},
  title        = {Evaluating Journal Quality and the Association for Information Systems
                  Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert
                  Journal Assessments Add Value?},
  journal      = {{MIS} Q.},
  volume       = {37},
  number       = {4},
  pages        = {993--1012},
  year         = {2013},
  url          = {https://doi.org/10.25300/misq/2013/37.4.01},
  doi          = {10.25300/MISQ/2013/37.4.01},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/LowryMGGHBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/PoseyRLBC13,
  author       = {Clay Posey and
                  Tom L. Roberts and
                  Paul Benjamin Lowry and
                  Rebecca J. Bennett and
                  James F. Courtney},
  title        = {Insiders' Protection of Organizational Information Assets: Development
                  of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated
                  Behaviors},
  journal      = {{MIS} Q.},
  volume       = {37},
  number       = {4},
  pages        = {1189--1210},
  year         = {2013},
  url          = {https://doi.org/10.25300/misq/2013/37.4.09},
  doi          = {10.25300/MISQ/2013/37.4.09},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/PoseyRLBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryM13,
  author       = {Paul Benjamin Lowry and
                  Greg D. Moody},
  title        = {Explaining Opposing Compliance Motivations towards Organizational
                  Information Security Policies},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {2998--3007},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.5},
  doi          = {10.1109/HICSS.2013.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/RuschMLT13,
  author       = {Thomas Rusch and
                  Patrick Mair and
                  Paul Benjamin Lowry and
                  Horst Treiblmaier},
  editor       = {Richard L. Baskerville and
                  Michael Chau},
  title        = {Developing and Measuring {IS} Scales Using Item Response Theory},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/icis2013/proceedings/ResearchMethods/1},
  timestamp    = {Wed, 30 Oct 2019 17:01:36 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/RuschMLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MoodyLG13,
  author       = {Gregory D. Moody and
                  Paul Benjamin Lowry and
                  Dennis F. Galletta},
  editor       = {Jae{-}Nam Lee and
                  Ji{-}Ye Mao and
                  James Y. L. Thong},
  title        = {Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce},
  booktitle    = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013,
                  Jeju Island, Korea, June 18-22, 2013},
  pages        = {173},
  year         = {2013},
  url          = {http://aisel.aisnet.org/pacis2013/173},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/MoodyLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jasis/LowryMVJJW12,
  author       = {Paul Benjamin Lowry and
                  Greg D. Moody and
                  Anthony Vance and
                  Matthew L. Jensen and
                  Jeffrey L. Jenkins and
                  Taylor Wells},
  title        = {Using an elaboration likelihood approach to better understand the
                  persuasiveness of website privacy assurance cues for online consumers},
  journal      = {J. Assoc. Inf. Sci. Technol.},
  volume       = {63},
  number       = {4},
  pages        = {755--776},
  year         = {2012},
  url          = {https://doi.org/10.1002/asi.21705},
  doi          = {10.1002/ASI.21705},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jasis/LowryMVJJW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VanceML12,
  author       = {Anthony Vance and
                  Braden Molyneux and
                  Paul Benjamin Lowry},
  title        = {Reducing Unauthorized Access by Insiders through User Interface Design:
                  Making End Users Accountable},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {4623--4632},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.499},
  doi          = {10.1109/HICSS.2012.499},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VanceML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LowryRMS12,
  author       = {Paul Benjamin Lowry and
                  Kamel Rouibah and
                  Greg D. Moody and
                  Mikko T. Siponen},
  editor       = {Shan L. Pan and
                  Tru H. Cao},
  title        = {Towards {A} Cross-Cultural Model Of Online Whistle-Blowing Systems
                  Use},
  booktitle    = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012,
                  Ho Chi Minh City, Vietnam, 11-15 July 2012},
  pages        = {147},
  year         = {2012},
  url          = {http://aisel.aisnet.org/pacis2012/147},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/LowryRMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/BarlowGKWSLV11,
  author       = {Jordan B. Barlow and
                  Justin Scott Giboney and
                  Mark Jeffrey Keith and
                  David W. Wilson and
                  Ryan M. Schuetzler and
                  Paul Benjamin Lowry and
                  Anthony Vance},
  title        = {Overview and Guidance on Agile Development in Large Organizations},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {29},
  pages        = {2},
  year         = {2011},
  url          = {https://doi.org/10.17705/1cais.02902},
  doi          = {10.17705/1CAIS.02902},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/BarlowGKWSLV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryCE11,
  author       = {Paul Benjamin Lowry and
                  Jinwei Cao and
                  Andrea Everard},
  title        = {Privacy Concerns Versus Desire for Interpersonal Awareness in Driving
                  the Use of Self-Disclosure Technologies: The Case of Instant Messaging
                  in Two Cultures},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {27},
  number       = {4},
  pages        = {163--200},
  year         = {2011},
  url          = {https://doi.org/10.2753/mis0742-1222270406},
  doi          = {10.2753/MIS0742-1222270406},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryCE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/JensenLJ11,
  author       = {Matthew L. Jensen and
                  Paul Benjamin Lowry and
                  Jeffrey L. Jenkins},
  title        = {Effects of Automated and Participative Decision Support in Computer-Aided
                  Credibility Assessment},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {28},
  number       = {1},
  pages        = {201--233},
  year         = {2011},
  url          = {https://doi.org/10.2753/mis0742-1222280107},
  doi          = {10.2753/MIS0742-1222280107},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/JensenLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/DeanLH11,
  author       = {Douglas L. Dean and
                  Paul Benjamin Lowry and
                  Sean L. Humpherys},
  title        = {Profiling the Research Productivity of Tenured Information Systems
                  Faculty at {U.S.} Institutions},
  journal      = {{MIS} Q.},
  volume       = {35},
  number       = {1},
  pages        = {1--15},
  year         = {2011},
  url          = {http://misq.org/profiling-the-research-productivity-of-tenured-information-systems-faculty-at-u-s-institutions.html},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/DeanLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/PoseyLRE10,
  author       = {Clay Posey and
                  Paul Benjamin Lowry and
                  Tom L. Roberts and
                  T. Selwyn Ellis},
  title        = {Proposing the online community self-disclosure model: the case of
                  working professionals in France and the {U.K.} who use online communities},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {181--195},
  year         = {2010},
  url          = {https://doi.org/10.1057/ejis.2010.15},
  doi          = {10.1057/EJIS.2010.15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejis/PoseyLRE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijal/VanceLO10,
  author       = {Anthony Vance and
                  Paul Benjamin Lowry and
                  Jeffrey A. Ogden},
  title        = {Testing the Potential of {RFID} to Increase Supply-Chain Agility and
                  to Mitigate the Bullwhip Effect},
  journal      = {Int. J. Appl. Logist.},
  volume       = {1},
  number       = {1},
  pages        = {48--66},
  year         = {2010},
  url          = {https://doi.org/10.4018/jal.2010090204},
  doi          = {10.4018/JAL.2010090204},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijal/VanceLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/LowryZZF10,
  author       = {Paul Benjamin Lowry and
                  Dongsong Zhang and
                  Lina Zhou and
                  Xiaolan Fu},
  title        = {Effects of culture, social presence, and group composition on trust
                  in technology-supported decision-making groups},
  journal      = {Inf. Syst. J.},
  volume       = {20},
  number       = {3},
  pages        = {297--315},
  year         = {2010},
  url          = {https://doi.org/10.1111/j.1365-2575.2009.00334.x},
  doi          = {10.1111/J.1365-2575.2009.00334.X},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isj/LowryZZF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/JensenLBN10,
  author       = {Matthew L. Jensen and
                  Paul Benjamin Lowry and
                  Judee K. Burgoon and
                  Jay F. Nunamaker Jr.},
  title        = {Technology Dominance in Complex Decision Making: The Case of Aided
                  Credibility Assessment},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {175--202},
  year         = {2010},
  url          = {https://doi.org/10.2753/mis0742-1222270108},
  doi          = {10.2753/MIS0742-1222270108},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/JensenLBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryGSRGRA10,
  author       = {Paul Benjamin Lowry and
                  Justin Scott Giboney and
                  Ryan M. Schuetzler and
                  Jacob Richardson and
                  Tom Gregory and
                  John Romney and
                  Bonnie Brinton Anderson},
  title        = {The Value of Distrust in Computer-Based Decision-Making Groups},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.399},
  doi          = {10.1109/HICSS.2010.399},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryGSRGRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AndersonHL09,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry},
  title        = {Creating automated plans for Semantic Web applications through planning
                  as model checking},
  journal      = {Expert Syst. Appl.},
  volume       = {36},
  number       = {7},
  pages        = {10595--10603},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.eswa.2009.02.056},
  doi          = {10.1016/J.ESWA.2009.02.056},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AndersonHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/LowryRDM09,
  author       = {Paul Benjamin Lowry and
                  Tom L. Roberts and
                  Douglas L. Dean and
                  George M. Marakas},
  title        = {Toward Building Self-Sustaining Groups in PCR-based Tasks through
                  Implicit Coordination: The Case of Heuristic Evaluation},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {5},
  year         = {2009},
  url          = {https://doi.org/10.17705/1jais.00189},
  doi          = {10.17705/1JAIS.00189},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/LowryRDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/AlbrechtRLM09,
  author       = {Conan C. Albrecht and
                  Marshall B. Romney and
                  Paul Benjamin Lowry and
                  Greg D. Moody},
  title        = {The {IS} Core: An Integration of the Core {IS} Courses},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {20},
  number       = {4},
  pages        = {451--468},
  year         = {2009},
  url          = {https://jise.org/Volume20/n4/JISEv20n4p451.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/AlbrechtRLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryRJG09,
  author       = {Paul Benjamin Lowry and
                  Nicholas C. Romano Jr. and
                  Jeffrey L. Jenkins and
                  Randy W. Guthrie},
  title        = {The {CMC} Interactivity Model: How Interactivity Enhances Communication
                  Quality and Process Satisfaction in Lean-Media Groups},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {26},
  number       = {1},
  pages        = {155--195},
  year         = {2009},
  url          = {https://doi.org/10.2753/mis0742-1222260107},
  doi          = {10.2753/MIS0742-1222260107},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryRJG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/CurtisWLH08,
  author       = {Aaron Curtis and
                  Taylor M. Wells and
                  Paul Benjamin Lowry and
                  Trevor Higbee},
  title        = {An Overview and Tutorial of the Repertory Grid Technique in Information
                  Systems Research},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {23},
  pages        = {3},
  year         = {2008},
  url          = {https://doi.org/10.17705/1cais.02303},
  doi          = {10.17705/1CAIS.02303},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/CurtisWLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/ZhangL08,
  author       = {Dongsong Zhang and
                  Paul Benjamin Lowry},
  title        = {Issues, Limitations, and Opportunities in Cross-Cultural Research
                  on Collaborative Software in Information Systems},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {16},
  number       = {1},
  pages        = {61--84},
  year         = {2008},
  url          = {https://doi.org/10.4018/jgim.2008010103},
  doi          = {10.4018/JGIM.2008010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/ZhangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/LowryVMBR08,
  author       = {Paul Benjamin Lowry and
                  Anthony Vance and
                  Greg D. Moody and
                  Bryan Beckman and
                  Aaron Read},
  title        = {Explaining and Predicting the Impact of Branding Alliances and Web
                  Site Quality on Initial Consumer Trust of E-Commerce Web Sites},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {24},
  number       = {4},
  pages        = {199--224},
  year         = {2008},
  url          = {https://doi.org/10.2753/mis0742-1222240408},
  doi          = {10.2753/MIS0742-1222240408},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/LowryVMBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/KarugaLR07,
  author       = {Gilbert G. Karuga and
                  Paul Benjamin Lowry and
                  Vernon J. Richardson},
  title        = {Assessing the Impact of Premier Information Systems Research over
                  Time},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {19},
  pages        = {7},
  year         = {2007},
  url          = {https://doi.org/10.17705/1cais.01907},
  doi          = {10.17705/1CAIS.01907},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/KarugaLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/LowryKR07,
  author       = {Paul Benjamin Lowry and
                  Gilbert G. Karuga and
                  Vernon J. Richardson},
  title        = {Assessing Leading Institutions, Faculty, and Articles in Premier Information
                  Systems Research Journals},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {20},
  pages        = {16},
  year         = {2007},
  url          = {https://doi.org/10.17705/1cais.02016},
  doi          = {10.17705/1CAIS.02016},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/LowryKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/HansenLMM07,
  author       = {James V. Hansen and
                  Paul Benjamin Lowry and
                  Rayman D. Meservy and
                  Daniel M. McDonald},
  title        = {Genetic programming for prevention of cyberterrorism through dynamic
                  and evolving intrusion detection},
  journal      = {Decis. Support Syst.},
  volume       = {43},
  number       = {4},
  pages        = {1362--1374},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.dss.2006.04.004},
  doi          = {10.1016/J.DSS.2006.04.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/HansenLMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/ZhangLZF07,
  author       = {Dongsong Zhang and
                  Paul Benjamin Lowry and
                  Lina Zhou and
                  Xiaolan Fu},
  title        = {The Impact of Individualism - Collectivism, Social Presence, and Group
                  Diversity on Group Decision Making Under Majority Influence},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {23},
  number       = {4},
  pages        = {53--80},
  year         = {2007},
  url          = {http://www.jmis-web.org/articles/300},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/ZhangLZF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/LowryRH07,
  author       = {Paul Benjamin Lowry and
                  Tom L. Roberts and
                  Trevor Higbee},
  editor       = {Julie A. Jacko},
  title        = {First Impressions with Websites: The Effect of the Familiarity and
                  Credibility of Corporate Logos on Perceived Consumer Swift Trust of
                  Websites},
  booktitle    = {Human-Computer Interaction. {HCI} Applications and Services, 12th
                  International Conference, {HCI} International 2007, Beijing, China,
                  July 22-27, 2007, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4553},
  pages        = {77--85},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73111-5\_9},
  doi          = {10.1007/978-3-540-73111-5\_9},
  timestamp    = {Sun, 02 Jun 2019 21:16:47 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/LowryRH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ZhangVL07,
  author       = {Dongsong Zhang and
                  Doug Vogel and
                  Paul Benjamin Lowry},
  title        = {Minitack Introduction: Cross-cultural Issues in Collaboration Technology},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {11},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.344},
  doi          = {10.1109/HICSS.2007.344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ZhangVL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryZZF07,
  author       = {Paul Benjamin Lowry and
                  Dongsong Zhang and
                  Lina Zhou and
                  Xiaolan Fu},
  title        = {The Impact of National Culture and Social Pr esence on Trust and Communication
                  Quality within Collabor ative Groups},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {12},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.534},
  doi          = {10.1109/HICSS.2007.534},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryZZF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryM07,
  author       = {Paul Benjamin Lowry and
                  Scott McCoy},
  title        = {Interactive Digital Entertainment, Social Computing, and Lifestyle
                  Computing},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {159},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.284},
  doi          = {10.1109/HICSS.2007.284},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MoodyWL07,
  author       = {Greg D. Moody and
                  Taylor Wells and
                  Paul Benjamin Lowry},
  title        = {The Interactive Digital Entertainment {(IDE)} Unification Framework:
                  Creating a Taxonomy of {IDE} and Lifestyle Computing},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {160},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.546},
  doi          = {10.1109/HICSS.2007.546},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MoodyWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AndersonHLS06,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry and
                  Scott L. Summers},
  title        = {The application of model checking for securing e-commerce transactions},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {6},
  pages        = {97--101},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132469.1132474},
  doi          = {10.1145/1132469.1132474},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AndersonHLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/LowryWMHK06,
  author       = {Paul Benjamin Lowry and
                  Taylor M. Wells and
                  Greg D. Moody and
                  Sean L. Humpherys and
                  Degan Kettles},
  title        = {Online Payment Gateways Used to Facilitate E-Commerce Transactions
                  and Improve Risk Management},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {17},
  pages        = {6},
  year         = {2006},
  url          = {https://doi.org/10.17705/1cais.01706},
  doi          = {10.17705/1CAIS.01706},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/LowryWMHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AndersonHLS06,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry and
                  Scott L. Summers},
  title        = {Standards and verification for fair-exchange and atomicity in e-commerce
                  transactions},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {8},
  pages        = {1045--1066},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2005.01.016},
  doi          = {10.1016/J.INS.2005.01.016},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/AndersonHLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryRG06,
  author       = {Paul Benjamin Lowry and
                  Nicholas C. Romano Jr. and
                  Randy W. Guthrie},
  title        = {Explaining and Predicting Outcomes of Large Classrooms Using Audience
                  Response Systems},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.173},
  doi          = {10.1109/HICSS.2006.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryRG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowrySWMMM06,
  author       = {Paul Benjamin Lowry and
                  Trent J. Spaulding and
                  Taylor Wells and
                  Greg D. Moody and
                  Kevin Moffit and
                  Sebastian Madariaga},
  title        = {A Theoretical Model and Empirical Results Linking Website Interactivity
                  and Usability Satisfaction},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.33},
  doi          = {10.1109/HICSS.2006.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowrySWMMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/RobertsLCH06,
  author       = {Tom L. Roberts and
                  Paul Benjamin Lowry and
                  Paul H. Cheney and
                  Ross T. Hightower},
  title        = {Improving Group Communication Outcomes with Collaborative Software:
                  The Impact of Group Size, Media Richness, and Social Presence},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.217},
  doi          = {10.1109/HICSS.2006.217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/RobertsLCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ZhangLF06,
  author       = {Dongsong Zhang and
                  Paul Benjamin Lowry and
                  Xiaolan Fu},
  title        = {Culture and Media Effects on Group Decision Making under Majority
                  Influence},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.109},
  doi          = {10.1109/HICSS.2006.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ZhangLF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ZhangVL06,
  author       = {Dongsong Zhang and
                  Doug Vogel and
                  Paul Benjamin Lowry},
  title        = {Minitrack Introduction},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.301},
  doi          = {10.1109/HICSS.2006.301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ZhangVL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/AndersonHLS05,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry and
                  Scott L. Summers},
  title        = {Model checking for design and assurance of e-Business processes},
  journal      = {Decis. Support Syst.},
  volume       = {39},
  number       = {3},
  pages        = {333--344},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.dss.2003.12.001},
  doi          = {10.1016/J.DSS.2003.12.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/AndersonHLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/AndersonHLS05,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry and
                  Scott L. Summers},
  title        = {Model checking for E-business control and assurance},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {35},
  number       = {3},
  pages        = {445--450},
  year         = {2005},
  url          = {https://doi.org/10.1109/TSMCC.2004.843181},
  doi          = {10.1109/TSMCC.2004.843181},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/AndersonHLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/AndersonHL05,
  author       = {Bonnie Brinton Anderson and
                  James V. Hansen and
                  Paul Benjamin Lowry},
  editor       = {Deepak Khazanchi and
                  Ilze Zigurs},
  title        = {Dependability Auditing with Model Checking},
  booktitle    = {A Conference on a Human Scale. 11th Americas Conference on Information
                  Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005},
  pages        = {276},
  publisher    = {Association for Information Systems},
  year         = {2005},
  url          = {http://aisel.aisnet.org/amcis2005/276},
  timestamp    = {Fri, 06 Jan 2012 11:23:55 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/AndersonHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/RobertsLR05,
  author       = {Tom L. Roberts and
                  Paul Benjamin Lowry and
                  Nicholas C. Romano Jr.},
  title        = {Improving Design Artifact Reviews with Group Support Systems and an
                  Extension of Heuristic Evaluation Techniques},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.310},
  doi          = {10.1109/HICSS.2005.310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/RobertsLR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/LowryRC04,
  author       = {Paul Benjamin Lowry and
                  Denton Romans and
                  Aaron Curtis},
  title        = {Global Journal Prestige and Supporting Disciplines: {A} Scientometric
                  Study of Information Systems Journals},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {5},
  number       = {2},
  pages        = {1},
  year         = {2004},
  url          = {https://doi.org/10.17705/1jais.00045},
  doi          = {10.17705/1JAIS.00045},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/LowryRC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LowryANL03,
  author       = {Paul Benjamin Lowry and
                  Conan C. Albrecht and
                  Jay F. Nunamaker Jr. and
                  James D. Lee},
  title        = {Evolutionary development and research on Internet-based collaborative
                  writing tools and processes to enhance eWriting in an eGovernment
                  setting},
  journal      = {Decis. Support Syst.},
  volume       = {34},
  number       = {3},
  pages        = {229--252},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-9236(02)00119-7},
  doi          = {10.1016/S0167-9236(02)00119-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LowryANL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/DeanL03,
  author       = {Douglas L. Dean and
                  Paul Benjamin Lowry},
  title        = {\emph{Teaching Case}: Consulting at the Laser {ISP} {(LISP)} Company:
                  Using Excel Metrics Capabilities to Solve Semi-Structured Management
                  Problems},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {14},
  number       = {4},
  pages        = {353--360},
  year         = {2003},
  url          = {https://jise.org/Volume14/n4/JISEv14n4p353.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/DeanL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LowryR03,
  author       = {Paul Benjamin Lowry and
                  Tom L. Roberts},
  title        = {Improving the Usability Evaluation Technique, Heuristic Evaluation,
                  through the Use of Collaborative Software},
  booktitle    = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa,
                  FL, USA, August 4-6, 2003},
  pages        = {284},
  publisher    = {Association for Information Systems},
  year         = {2003},
  url          = {http://aisel.aisnet.org/amcis2003/284},
  timestamp    = {Mon, 09 Jan 2012 12:52:36 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/LowryR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LowryR03a,
  author       = {Paul Benjamin Lowry and
                  Denton Romans},
  title        = {New Perspectives on Global Information Systems Journal Rankings and
                  Reference Disciplines},
  booktitle    = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa,
                  FL, USA, August 4-6, 2003},
  pages        = {367},
  publisher    = {Association for Information Systems},
  year         = {2003},
  url          = {http://aisel.aisnet.org/amcis2003/367},
  timestamp    = {Mon, 09 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/LowryR03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryN02,
  author       = {Paul Benjamin Lowry and
                  Jay F. Nunamaker Jr.},
  title        = {Synchronous, Distributed Collaborative Writing for Policy Agenda Setting
                  Using Collaboratus},
  booktitle    = {35th Hawaii International Conference on System Sciences {(HICSS-35}
                  2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island,
                  HI, {USA}},
  pages        = {10},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/HICSS.2002.993860},
  doi          = {10.1109/HICSS.2002.993860},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryALN02,
  author       = {Paul Benjamin Lowry and
                  Conan C. Albrecht and
                  James D. Lee and
                  Jay F. Nunamaker Jr.},
  title        = {Users Experiences in Collaborative Writing Using Collaboratus: An
                  Internet-Based Collaborative Work},
  booktitle    = {35th Hawaii International Conference on System Sciences {(HICSS-35}
                  2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island,
                  HI, {USA}},
  pages        = {21},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/HICSS.2002.993879},
  doi          = {10.1109/HICSS.2002.993879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryALN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LowryN02a,
  author       = {Paul Benjamin Lowry and
                  Jay F. Nunamaker Jr.},
  title        = {Using the ThinkLet Framework to Improve Distributed Collaborative
                  Writing},
  booktitle    = {35th Hawaii International Conference on System Sciences {(HICSS-35}
                  2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/HICSS.2002.994539},
  doi          = {10.1109/HICSS.2002.994539},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LowryN02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Lowry01,
  author       = {Paul Benjamin Lowry},
  title        = {{XML} Data Mediation and Collaboration: {A} Proposed Comprehensive
                  Architecture and Query Requirements for using to Mediate Heterogeneous
                  Data Sources and Targets},
  booktitle    = {34th Annual Hawaii International Conference on System Sciences (HICSS-34),
                  January 3-6, 2001, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/HICSS.2001.927076},
  doi          = {10.1109/HICSS.2001.927076},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Lowry01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics