Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Paul Benjamin Lowry
@article{DBLP:journals/iam/ChoiL24, author = {Daeeun Daniel Choi and Paul Benjamin Lowry}, title = {Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars}, journal = {Inf. Manag.}, volume = {61}, number = {1}, pages = {103876}, year = {2024}, url = {https://doi.org/10.1016/j.im.2023.103876}, doi = {10.1016/J.IM.2023.103876}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/ChoiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/LiLL24, author = {Xiaolin Li and Paul Benjamin Lowry and Fujun Lai}, title = {The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: {A} signaling theory perspective}, journal = {Inf. Manag.}, volume = {61}, number = {2}, pages = {103923}, year = {2024}, url = {https://doi.org/10.1016/j.im.2024.103923}, doi = {10.1016/J.IM.2024.103923}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/LiLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HullSL23, author = {David M. Hull and Sebastian Walter Schuetz and Paul Benjamin Lowry}, title = {Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training}, journal = {Comput. Secur.}, volume = {129}, pages = {103252}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103252}, doi = {10.1016/J.COSE.2023.103252}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HullSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dim/LiuMLV23, author = {Libo Liu and Kristijan Mirkovski and Paul Benjamin Lowry and Quan Vu}, title = {"Do as {I} say but not as {I} do": Influence of political leaders' populist communication styles on public adherence in a crisis using the global case of {COVID-19} movement restrictions}, journal = {Data Inf. Manag.}, volume = {7}, number = {2}, pages = {100039}, year = {2023}, url = {https://doi.org/10.1016/j.dim.2023.100039}, doi = {10.1016/J.DIM.2023.100039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dim/LiuMLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dim/CalderonJL23, author = {Eduardo D. Villacis Calderon and Tabitha L. James and Paul Benjamin Lowry}, title = {How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency {(FAT)} perspective}, journal = {Data Inf. Manag.}, volume = {7}, number = {3}, pages = {100042}, year = {2023}, url = {https://doi.org/10.1016/j.dim.2023.100042}, doi = {10.1016/J.DIM.2023.100042}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dim/CalderonJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/HassnaRLPM23, author = {Ghazwan Hassna and Kamel Rouibah and Paul Benjamin Lowry and Joanna Paliszkiewicz and Magdalena Madra{-}Sawicka}, title = {The roles of user interface design and uncertainty avoidance in {B2C} ecommerce success: Using evidence from three national cultures}, journal = {Electron. Commer. Res. Appl.}, volume = {61}, pages = {101297}, year = {2023}, url = {https://doi.org/10.1016/j.elerap.2023.101297}, doi = {10.1016/J.ELERAP.2023.101297}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/HassnaRLPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/ParksWL23, author = {Rachida Parks and Rolf T. Wigand and Paul Benjamin Lowry}, title = {Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment {(PIA)} framework}, journal = {Eur. J. Inf. Syst.}, volume = {32}, number = {6}, pages = {1052--1069}, year = {2023}, url = {https://doi.org/10.1080/0960085x.2022.2103044}, doi = {10.1080/0960085X.2022.2103044}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/ParksWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/DavisonL23, author = {Robert M. Davison and Paul Benjamin Lowry}, title = {\emph{ISJ} editorial: Addressing the implications of recent developments in journal impact factors}, journal = {Inf. Syst. J.}, volume = {33}, number = {3}, pages = {419--436}, year = {2023}, url = {https://doi.org/10.1111/isj.12426}, doi = {10.1111/ISJ.12426}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/DavisonL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/DiazAndradeTDHTLCS23, author = {Antonio D{\'{\i}}az{-}Andrade and Monideepa Tarafdar and Robert M. Davison and Andrew M. Hardin and Angsana A. Techatassanasoontorn and Paul Benjamin Lowry and Sutirtha Chatterjee and Gerhard Schwabe}, title = {The importance of theory at the \emph{Information Systems Journal}}, journal = {Inf. Syst. J.}, volume = {33}, number = {4}, pages = {693--702}, year = {2023}, url = {https://doi.org/10.1111/isj.12437}, doi = {10.1111/ISJ.12437}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/DiazAndradeTDHTLCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/WangLLL23, author = {Le Wang and Paul Benjamin Lowry and Xin (Robert) Luo and Han Li}, title = {Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games}, journal = {Inf. Syst. Res.}, volume = {34}, number = {1}, pages = {275--296}, year = {2023}, url = {https://doi.org/10.1287/isre.2022.1127}, doi = {10.1287/ISRE.2022.1127}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/WangLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/BurnsRPLF23, author = {A. J. Burns and Tom L. Roberts and Clay Posey and Paul Benjamin Lowry and Bryan Fuller}, title = {Going Beyond Deterrence: {A} Middle-Range Theory of Motives and Controls for Insider Computer Abuse}, journal = {Inf. Syst. Res.}, volume = {34}, number = {1}, pages = {342--362}, year = {2023}, url = {https://doi.org/10.1287/isre.2022.1133}, doi = {10.1287/ISRE.2022.1133}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/BurnsRPLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/ZhangJZKL023, author = {Jun Zhang and Qiqi Jiang and Wenping Zhang and Lele Kang and Paul Benjamin Lowry and Zhang Xiong}, title = {Explaining the Outcomes of Social Gamification: {A} Longitudinal Field Experiment}, journal = {J. Manag. Inf. Syst.}, volume = {40}, number = {2}, pages = {401--439}, year = {2023}, url = {http://www.jmis-web.org/articles/1617}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/ZhangJZKL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/JamesCBL22, author = {Tabitha L. James and Eduardo D. Villacis Calderon and France B{\'{e}}langer and Paul Benjamin Lowry}, title = {The mediating role of group dynamics in shaping received social support from active and passive use in online health communities}, journal = {Inf. Manag.}, volume = {59}, number = {3}, pages = {103606}, year = {2022}, url = {https://doi.org/10.1016/j.im.2022.103606}, doi = {10.1016/J.IM.2022.103606}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/JamesCBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpr/BaghersadZLC22, author = {Milad Baghersad and Christopher W. Zobel and Paul Benjamin Lowry and Sutirtha Chatterjee}, title = {The roles of prior experience and the location on the severity of supply chain disruptions}, journal = {Int. J. Prod. Res.}, volume = {60}, number = {16}, pages = {5051--5070}, year = {2022}, url = {https://doi.org/10.1080/00207543.2021.1948136}, doi = {10.1080/00207543.2021.1948136}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpr/BaghersadZLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/HassanLM22, author = {Nik Rushdi Hassan and Paul Benjamin Lowry and Lars Mathiassen}, title = {Useful Products in Information Systems Theorizing: {A} Discursive Formation Perspective}, journal = {J. Assoc. Inf. Syst.}, volume = {23}, number = {2}, pages = {7}, year = {2022}, url = {https://aisel.aisnet.org/jais/vol23/iss2/7}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jais/HassanLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/JamesBL22, author = {Tabitha L. James and France B{\'{e}}langer and Paul Benjamin Lowry}, title = {The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes}, journal = {J. Assoc. Inf. Syst.}, volume = {23}, number = {4}, pages = {4}, year = {2022}, url = {https://aisel.aisnet.org/jais/vol23/iss4/4}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/JamesBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pajais/CuiZLW22, author = {Xiling Cui and Qiang Zhou and Paul Benjamin Lowry and Yi Wang}, title = {Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with {A} Moderated Mediation Model}, journal = {Pac. Asia J. Assoc. Inf. Syst.}, volume = {14}, number = {1}, pages = {5}, year = {2022}, url = {https://aisel.aisnet.org/pajais/vol14/iss1/5}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pajais/CuiZLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aisthci/DunnRJGL21, author = {Brian Kimball Dunn and Narayan Ramasubbu and Matthew L. Jensen and Dennis F. Galletta and Paul Benjamin Lowry}, title = {Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes}, journal = {{AIS} Trans. Hum. Comput. Interact.}, volume = {13}, number = {2}, pages = {206--242}, year = {2021}, url = {https://doi.org/10.17705/1thci.00148}, doi = {10.17705/1THCI.00148}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aisthci/DunnRJGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AliLDBLA21, author = {Syed Emad Azhar Ali and Fong{-}Woon Lai and P. D. D. Dominic and Nicholas James Brown and Paul Benjamin Lowry and Rao Faizan Ali}, title = {Stock market reactions to favorable and unfavorable information security events: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {110}, pages = {102451}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102451}, doi = {10.1016/J.COSE.2021.102451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliLDBLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/WuLZP21, author = {Dezhi Wu and Paul Benjamin Lowry and Dongsong Zhang and Rachida Parks}, title = {Patients' compliance behavior in a personalized mobile patient education system {(PMPES)} setting: Rational, social, or personal choices?}, journal = {Int. J. Medical Informatics}, volume = {145}, pages = {104295}, year = {2021}, url = {https://doi.org/10.1016/j.ijmedinf.2020.104295}, doi = {10.1016/J.IJMEDINF.2020.104295}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/WuLZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SilicL21, author = {Mario Silic and Paul Benjamin Lowry}, title = {Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes}, journal = {Inf. Syst. Frontiers}, volume = {23}, number = {2}, pages = {329--341}, year = {2021}, url = {https://doi.org/10.1007/s10796-019-09949-3}, doi = {10.1007/S10796-019-09949-3}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/SilicL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/ChatterjeeMLCH21, author = {Sutirtha Chatterjee and Gregory D. Moody and Paul Benjamin Lowry and Suranjan Chakraborty and Andrew M. Hardin}, title = {The nonlinear influence of harmonious information technology affordance on organisational innovation}, journal = {Inf. Syst. J.}, volume = {31}, number = {2}, pages = {294--322}, year = {2021}, url = {https://doi.org/10.1111/isj.12311}, doi = {10.1111/ISJ.12311}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/ChatterjeeMLCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/ChenGLLMW21, author = {Yan Chen and Dennis F. Galletta and Paul Benjamin Lowry and Xin (Robert) Luo and Gregory D. Moody and Robert Willison}, title = {Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model}, journal = {Inf. Syst. Res.}, volume = {32}, number = {3}, pages = {1043--1065}, year = {2021}, url = {https://doi.org/10.1287/isre.2021.1014}, doi = {10.1287/ISRE.2021.1014}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/ChenGLLMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SchutzLPT21, author = {Sebastian Walter Sch{\"{u}}tz and Paul Benjamin Lowry and Daniel A. Pienta and Jason Bennett Thatcher}, title = {Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature}, journal = {J. Assoc. Inf. Syst.}, volume = {22}, number = {5}, pages = {4}, year = {2021}, url = {https://aisel.aisnet.org/jais/vol22/iss5/4}, timestamp = {Fri, 10 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/SchutzLPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShinL20, author = {Bongsik Shin and Paul Benjamin Lowry}, title = {A review and theoretical explanation of the 'Cyberthreat-Intelligence {(CTI)} capability' that needs to be fostered in information security practitioners and how this can be accomplished}, journal = {Comput. Secur.}, volume = {92}, pages = {101761}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101761}, doi = {10.1016/J.COSE.2020.101761}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShinL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/CuiLLL20, author = {Xiling Cui and Vincent S. Lai and Paul Benjamin Lowry and Yang Lei}, title = {The effects of bidder factors on online bidding strategies: {A} motivation-opportunity-ability {(MOA)} model}, journal = {Decis. Support Syst.}, volume = {138}, pages = {113397}, year = {2020}, url = {https://doi.org/10.1016/j.dss.2020.113397}, doi = {10.1016/J.DSS.2020.113397}, timestamp = {Fri, 16 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/CuiLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/LowryPL20, author = {Paul Benjamin Lowry and Stacie Petter and Jan Marco Leimeister}, title = {Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute}, journal = {Eur. J. Inf. Syst.}, volume = {29}, number = {6}, pages = {609--620}, year = {2020}, url = {https://doi.org/10.1080/0960085X.2020.1841574}, doi = {10.1080/0960085X.2020.1841574}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/LowryPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/WuMZL20, author = {Dezhi Wu and Gregory D. Moody and Jun Zhang and Paul Benjamin Lowry}, title = {Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention}, journal = {Inf. Manag.}, volume = {57}, number = {5}, pages = {103235}, year = {2020}, url = {https://doi.org/10.1016/j.im.2019.103235}, doi = {10.1016/J.IM.2019.103235}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/WuMZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/SeeberWSMBL20, author = {Isabella Seeber and Lena Waizenegger and Stefan Seidel and Stefan Morana and Izak Benbasat and Paul Benjamin Lowry}, title = {Collaborating with technology-based autonomous agents}, journal = {Internet Res.}, volume = {30}, number = {1}, pages = {1--18}, year = {2020}, url = {https://doi.org/10.1108/INTR-12-2019-0503}, doi = {10.1108/INTR-12-2019-0503}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/SeeberWSMBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/SilicL20, author = {Mario Silic and Paul Benjamin Lowry}, title = {Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance}, journal = {J. Manag. Inf. Syst.}, volume = {37}, number = {1}, pages = {129--161}, year = {2020}, url = {https://doi.org/10.1080/07421222.2019.1705512}, doi = {10.1080/07421222.2019.1705512}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/SilicL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/SchutzLPT20, author = {Sebastian Walter Sch{\"{u}}tz and Paul Benjamin Lowry and Daniel A. Pienta and Jason Bennett Thatcher}, title = {The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security}, journal = {J. Manag. Inf. Syst.}, volume = {37}, number = {3}, pages = {723--757}, year = {2020}, url = {https://doi.org/10.1080/07421222.2020.1790187}, doi = {10.1080/07421222.2020.1790187}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/SchutzLPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/ChatterjeeMLCH20, author = {Sutirtha Chatterjee and Gregory D. Moody and Paul Benjamin Lowry and Suranjan Chakraborty and Andrew M. Hardin}, title = {Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization}, journal = {J. Strateg. Inf. Syst.}, volume = {29}, number = {1}, pages = {101596}, year = {2020}, url = {https://doi.org/10.1016/j.jsis.2020.101596}, doi = {10.1016/J.JSIS.2020.101596}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsis/ChatterjeeMLCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChoiLW20, author = {Daeeun Daniel Choi and Paul Benjamin Lowry and Alan Wang}, title = {The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64366}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ChoiLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/OliveroGASL19, author = {Nadia Olivero and Andrea Greco and Anna Maria Annoni and Patrizia Steca and Paul Benjamin Lowry}, title = {Does opportunity make the thief? Abilities and moral disengagement in illegal downloading}, journal = {Behav. Inf. Technol.}, volume = {38}, number = {12}, pages = {1273--1289}, year = {2019}, url = {https://doi.org/10.1080/0144929X.2019.1583768}, doi = {10.1080/0144929X.2019.1583768}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/OliveroGASL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HinaDL19, author = {Sadaf Hina and Dhanapal Durai Dominic and Paul Benjamin Lowry}, title = {Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101594}, doi = {10.1016/J.COSE.2019.101594}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HinaDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsj/BrielSL19, author = {Frederik von Briel and Christoph Schneider and Paul Benjamin Lowry}, title = {Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms}, journal = {Decis. Sci.}, volume = {50}, number = {1}, pages = {7--45}, year = {2019}, url = {https://doi.org/10.1111/deci.12314}, doi = {10.1111/DECI.12314}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsj/BrielSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/ZhangKLLW19, author = {Shanshan Zhang and Ron Chi{-}Wai Kwok and Paul Benjamin Lowry and Zhiying Liu and Ji Wu}, title = {The influence of role stress on self-disclosure on social networking sites: {A} conservation of resources perspective}, journal = {Inf. Manag.}, volume = {56}, number = {7}, year = {2019}, url = {https://doi.org/10.1016/j.im.2019.02.002}, doi = {10.1016/J.IM.2019.02.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/ZhangKLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/DArcyL19, author = {John D'Arcy and Paul Benjamin Lowry}, title = {Cognitive-affective drivers of employees' daily compliance with information security policies: {A} multilevel, longitudinal study}, journal = {Inf. Syst. J.}, volume = {29}, number = {1}, pages = {43--69}, year = {2019}, url = {https://doi.org/10.1111/isj.12173}, doi = {10.1111/ISJ.12173}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/DArcyL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/HullLGM19, author = {David M. Hull and Paul Benjamin Lowry and James E. Gaskin and Kristijan Mirkovski}, title = {A storyteller's guide to problem-based learning for information systems management education}, journal = {Inf. Syst. J.}, volume = {29}, number = {5}, pages = {1040--1057}, year = {2019}, url = {https://doi.org/10.1111/isj.12234}, doi = {10.1111/ISJ.12234}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/HullLGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/MirkovskiGHL19, author = {Kristijan Mirkovski and James E. Gaskin and David M. Hull and Paul Benjamin Lowry}, title = {Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment}, journal = {Inf. Syst. J.}, volume = {29}, number = {6}, pages = {1153--1177}, year = {2019}, url = {https://doi.org/10.1111/isj.12240}, doi = {10.1111/ISJ.12240}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/MirkovskiGHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/BurnsRPL19, author = {A. J. Burns and Tom L. Roberts and Clay Posey and Paul Benjamin Lowry}, title = {The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking}, journal = {Inf. Syst. Res.}, volume = {30}, number = {4}, pages = {1228--1247}, year = {2019}, url = {https://doi.org/10.1287/isre.2019.0860}, doi = {10.1287/ISRE.2019.0860}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/BurnsRPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itp/ZhangKLL19, author = {Shanshan Zhang and Ron Chi{-}Wai Kwok and Paul Benjamin Lowry and Zhiying Liu}, title = {Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks}, journal = {Inf. Technol. People}, volume = {32}, number = {3}, pages = {754--780}, year = {2019}, url = {https://doi.org/10.1108/ITP-04-2017-0134}, doi = {10.1108/ITP-04-2017-0134}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itp/ZhangKLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/DunnRGL19, author = {Brian Kimball Dunn and Narayan Ramasubbu and Dennis F. Galletta and Paul Benjamin Lowry}, title = {Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography}, journal = {J. Manag. Inf. Syst.}, volume = {36}, number = {2}, pages = {418--449}, year = {2019}, url = {https://doi.org/10.1080/07421222.2019.1598690}, doi = {10.1080/07421222.2019.1598690}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmis/DunnRGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryZMCWW19, author = {Paul Benjamin Lowry and Jun Zhang and Gregory D. Moody and Sutirtha Chatterjee and Chuang Wang and Tailai Wu}, title = {An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism}, journal = {J. Manag. Inf. Syst.}, volume = {36}, number = {4}, pages = {1142--1178}, year = {2019}, url = {https://doi.org/10.1080/07421222.2019.1661090}, doi = {10.1080/07421222.2019.1661090}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryZMCWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/HassanML19, author = {Nik Rushdi Hassan and Lars Mathiassen and Paul Benjamin Lowry}, editor = {Jan vom Brocke and Shirley Gregor and Oliver M{\"{u}}ller}, title = {Enhancing Theoretical Contribution in is Research: the Case of Technology Adoption}, booktitle = {27th European Conference on Information Systems - Information Systems for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019}, year = {2019}, url = {https://aisel.aisnet.org/ecis2019\_rp/190}, timestamp = {Fri, 20 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecis/HassanML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ChatterjeeSML19, author = {Sutirtha Chatterjee and Suprateek Sarker and Gregory D. Moody and Paul Benjamin Lowry}, editor = {Tung Bui}, title = {The Effect of {CIO} Virtues on {CIO} Role Effectiveness}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/60082}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ChatterjeeSML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aisthci/TreiblmaierPL18, author = {Horst Treiblmaier and Lisa{-}Maria Putz and Paul Benjamin Lowry}, title = {Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications}, journal = {{AIS} Trans. Hum. Comput. Interact.}, volume = {10}, number = {3}, pages = {1}, year = {2018}, url = {https://aisel.aisnet.org/thci/vol10/iss3/1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aisthci/TreiblmaierPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ce/ParksLWAW18, author = {Rachida Parks and Paul Benjamin Lowry and Rolf T. Wigand and Nitin Agarwal and Therese L. Williams}, title = {Why students engage in cyber-cheating through a collective movement: {A} case of deviance and collusion}, journal = {Comput. Educ.}, volume = {125}, pages = {308--326}, year = {2018}, url = {https://doi.org/10.1016/j.compedu.2018.04.003}, doi = {10.1016/J.COMPEDU.2018.04.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ce/ParksLWAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MenardWL18, author = {Philip Menard and Merrill Warkentin and Paul Benjamin Lowry}, title = {The impact of collectivism and psychological ownership on protection motivation: {A} cross-cultural examination}, journal = {Comput. Secur.}, volume = {75}, pages = {147--166}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.020}, doi = {10.1016/J.COSE.2018.01.020}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MenardWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/WillisonL18, author = {Robert Willison and Paul Benjamin Lowry}, title = {Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives}, journal = {Data Base}, volume = {49}, number = {{SI}}, pages = {81--102}, year = {2018}, url = {https://doi.org/10.1145/3210530.3210537}, doi = {10.1145/3210530.3210537}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/WillisonL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/JiangMWWL18, author = {Ling Jiang and Kristijan Mirkovski and Jeffrey D. Wall and Christian Wagner and Paul Benjamin Lowry}, title = {Proposing the core contributor withdrawal theory {(CCWT)} to understand core contributor withdrawal from online peer-production communities}, journal = {Internet Res.}, volume = {28}, number = {4}, pages = {988--1028}, year = {2018}, url = {https://doi.org/10.1108/IntR-05-2017-0215}, doi = {10.1108/INTR-05-2017-0215}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/JiangMWWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/ChiuHLL18, author = {Chao{-}Min Chiu and Jack Shih{-}Chieh Hsu and Paul Benjamin Lowry and Ting{-}Peng Liang}, title = {Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach}, journal = {J. Assoc. Inf. Syst.}, volume = {19}, number = {7}, pages = {4}, year = {2018}, url = {https://aisel.aisnet.org/jais/vol19/iss7/4}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/ChiuHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/WillisonLP18, author = {Robert Willison and Paul Benjamin Lowry and Raymond Paternoster}, title = {A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research}, journal = {J. Assoc. Inf. Syst.}, volume = {19}, number = {12}, pages = {3}, year = {2018}, url = {https://aisel.aisnet.org/jais/vol19/iss12/3}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/WillisonLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/HassnaL18, author = {Ghazwan Hassna and Paul Benjamin Lowry}, title = {Big Data Capability, Customer Agility, and Organization Performance: {A} Dynamic Capability Perspective}, booktitle = {24th Americas Conference on Information Systems, {AMCIS} 2018, New Orleans, LA, USA, August 16-18, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/amcis2018/DigitalAgility/Presentations/7}, timestamp = {Mon, 11 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/HassnaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/SaundersBBDFGLL17, author = {Carol Saunders and Susan A. Brown and Bendik Bygstad and Alan R. Dennis and Carlos Ferran and Dennis F. Galletta and Ting{-}Peng Liang and Paul Benjamin Lowry and Jan Recker and Suprateek Sarker}, title = {Goals, Values, and Expectations of the {AIS} Family of Journals}, journal = {Commun. Assoc. Inf. Syst.}, volume = {41}, pages = {16}, year = {2017}, url = {https://doi.org/10.17705/1cais.04116}, doi = {10.17705/1CAIS.04116}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/SaundersBBDFGLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/LowryZW17, author = {Paul Benjamin Lowry and Jun Zhang and Tailai Wu}, title = {Nature or nurture? {A} meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework}, journal = {Comput. Hum. Behav.}, volume = {68}, pages = {104--120}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2016.11.015}, doi = {10.1016/J.CHB.2016.11.015}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/LowryZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/BurnsPRL17, author = {A. J. Burns and Clay Posey and Tom L. Roberts and Paul Benjamin Lowry}, title = {Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals}, journal = {Comput. Hum. Behav.}, volume = {68}, pages = {190--209}, year = {2017}, url = {https://doi.org/10.1016/j.chb.2016.11.018}, doi = {10.1016/J.CHB.2016.11.018}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/BurnsPRL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/WeiSLTS17, author = {Jie Wei and Stefan Seedorf and Paul Benjamin Lowry and Christian Thum and Thimo Schulze}, title = {How increased social presence through co-browsing influences user engagement in collaborative online shopping}, journal = {Electron. Commer. Res. Appl.}, volume = {24}, pages = {84--99}, year = {2017}, url = {https://doi.org/10.1016/j.elerap.2017.07.002}, doi = {10.1016/J.ELERAP.2017.07.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/WeiSLTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/ParksXCL17, author = {Rachida Parks and Heng Xu and Chao{-}Hsien Chu and Paul Benjamin Lowry}, title = {Examining the intended and unintended consequences of organisational privacy safeguards}, journal = {Eur. J. Inf. Syst.}, volume = {26}, number = {1}, pages = {37--65}, year = {2017}, url = {https://doi.org/10.1057/s41303-016-0001-6}, doi = {10.1057/S41303-016-0001-6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/ParksXCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MoodyLG17, author = {Gregory D. Moody and Paul Benjamin Lowry and Dennis F. Galletta}, title = {It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis}, journal = {Eur. J. Inf. Syst.}, volume = {26}, number = {4}, pages = {379--413}, year = {2017}, url = {https://doi.org/10.1057/s41303-016-0027-9}, doi = {10.1057/S41303-016-0027-9}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MoodyLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/LowryDW17, author = {Paul Benjamin Lowry and Tamara Dinev and Robert Willison}, title = {Why security and privacy research lies at the centre of the information systems {(IS)} artefact: proposing a bold research agenda}, journal = {Eur. J. Inf. Syst.}, volume = {26}, number = {6}, pages = {546--563}, year = {2017}, url = {https://doi.org/10.1057/s41303-017-0066-x}, doi = {10.1057/S41303-017-0066-X}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/LowryDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/RuschLMT17, author = {Thomas Rusch and Paul Benjamin Lowry and Patrick Mair and Horst Treiblmaier}, title = {Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory}, journal = {Inf. Manag.}, volume = {54}, number = {2}, pages = {189--203}, year = {2017}, url = {https://doi.org/10.1016/j.im.2016.06.005}, doi = {10.1016/J.IM.2016.06.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/RuschLMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/CuiZL17, author = {Xiling Cui and Nan Zhang and Paul Benjamin Lowry}, title = {The agent bidding habit and use model {(ABHUM)} and its validation in the Taobao online auction context}, journal = {Inf. Manag.}, volume = {54}, number = {3}, pages = {281--291}, year = {2017}, url = {https://doi.org/10.1016/j.im.2016.07.007}, doi = {10.1016/J.IM.2016.07.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/CuiZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/MairTL17, author = {Patrick Mair and Horst Treiblmaier and Paul Benjamin Lowry}, title = {Using multistage competing risks approaches to model web page transitions}, journal = {Internet Res.}, volume = {27}, number = {3}, pages = {650--669}, year = {2017}, url = {https://doi.org/10.1108/IntR-06-2016-0167}, doi = {10.1108/INTR-06-2016-0167}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/MairTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/HoLWYH17, author = {Shuyuan Mary Ho and Paul Benjamin Lowry and Merrill Warkentin and Yanyun Yang and Jonathan M. Hollister}, title = {Gender deception in asynchronous online communication: {A} path analysis}, journal = {Inf. Process. Manag.}, volume = {53}, number = {1}, pages = {21--41}, year = {2017}, url = {https://doi.org/10.1016/j.ipm.2016.06.004}, doi = {10.1016/J.IPM.2016.06.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/HoLWYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SaundersBBDFGLL17, author = {Carol Saunders and Sue Brown and Bendik Bygstad and Alan R. Dennis and Carlos Ferran and Dennis F. Galletta and Ting{-}Peng Liang and Paul Benjamin Lowry and Jan Recker and Suprateek Sarker}, title = {Goals, Values, and Expectations of the {AIS} Family of Journals}, journal = {J. Assoc. Inf. Syst.}, volume = {18}, number = {9}, pages = {2}, year = {2017}, url = {https://doi.org/10.17705/1jais.00468}, doi = {10.17705/1JAIS.00468}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jais/SaundersBBDFGLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/JamesLWW17, author = {Tabitha L. James and Paul Benjamin Lowry and Linda G. Wallace and Merrill Warkentin}, title = {The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {2}, pages = {560--596}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1334496}, doi = {10.1080/07421222.2017.1334496}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/JamesLWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryMC17, author = {Paul Benjamin Lowry and Gregory D. Moody and Sutirtha Chatterjee}, title = {Using {IT} Design to Prevent Cyberbullying}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {3}, pages = {863--901}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1373012}, doi = {10.1080/07421222.2017.1373012}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryMC17, author = {Paul Benjamin Lowry and Gregory D. Moody and Sutirtha Chatterjee}, editor = {Tung Bui}, title = {Using the Control Balance Theory to Explain Social Media Deviance}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41427}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/LowryMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aisthci/KeithBFAL16, author = {Mark J. Keith and Jeffry S. Babb and Christopher P. Furner and Amjad Abdullat and Paul Benjamin Lowry}, title = {Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications}, journal = {{AIS} Trans. Hum. Comput. Interact.}, volume = {8}, number = {3}, pages = {3}, year = {2016}, url = {https://aisel.aisnet.org/thci/vol8/iss3/3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aisthci/KeithBFAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/RouibahLH16, author = {Kamel Rouibah and Paul Benjamin Lowry and Yujong Hwang}, title = {The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country}, journal = {Electron. Commer. Res. Appl.}, volume = {19}, pages = {33--43}, year = {2016}, url = {https://doi.org/10.1016/j.elerap.2016.07.001}, doi = {10.1016/J.ELERAP.2016.07.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/RouibahLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/CuiLL16, author = {Xiling Cui and Vincent S. Lai and Paul Benjamin Lowry}, title = {How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China}, journal = {Inf. Manag.}, volume = {53}, number = {5}, pages = {609--624}, year = {2016}, url = {https://doi.org/10.1016/j.im.2016.01.005}, doi = {10.1016/J.IM.2016.01.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/CuiLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/BurgoonBLHMGG16, author = {Judee K. Burgoon and Joseph A. Bonito and Paul Benjamin Lowry and Sean L. Humpherys and Gregory D. Moody and James E. Gaskin and Justin Scott Giboney}, title = {Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task}, journal = {Int. J. Hum. Comput. Stud.}, volume = {91}, pages = {24--36}, year = {2016}, url = {https://doi.org/10.1016/j.ijhcs.2016.02.002}, doi = {10.1016/J.IJHCS.2016.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/BurgoonBLHMGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/LowryZWS16, author = {Paul Benjamin Lowry and Jun Zhang and Chuang Wang and Mikko T. Siponen}, title = {Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model}, journal = {Inf. Syst. Res.}, volume = {27}, number = {4}, pages = {962--986}, year = {2016}, url = {https://doi.org/10.1287/isre.2016.0671}, doi = {10.1287/ISRE.2016.0671}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/LowryZWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/MirkovskiBL16, author = {Kristijan Mirkovski and Frederik von Briel and Paul Benjamin Lowry}, title = {Semantic Learning-Based Innovation Framework for Social Media}, journal = {{IT} Prof.}, volume = {18}, number = {6}, pages = {26--32}, year = {2016}, url = {https://doi.org/10.1109/MITP.2016.104}, doi = {10.1109/MITP.2016.104}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/MirkovskiBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/WallLB16, author = {Jeffrey D. Wall and Paul Benjamin Lowry and Jordan B. Barlow}, title = {Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess}, journal = {J. Assoc. Inf. Syst.}, volume = {17}, number = {1}, pages = {4}, year = {2016}, url = {https://doi.org/10.17705/1jais.00420}, doi = {10.17705/1JAIS.00420}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/WallLB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/GaskinLH16, author = {James Eric Gaskin and Paul Benjamin Lowry and David M. Hull}, title = {Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats}, journal = {J. Assoc. Inf. Syst.}, volume = {17}, number = {6}, pages = {1}, year = {2016}, url = {https://doi.org/10.17705/1jais.00430}, doi = {10.17705/1JAIS.00430}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/GaskinLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LaiLL16, author = {Vincent Siu{-}king Lai and Fujun Lai and Paul Benjamin Lowry}, title = {Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on {ERP} Adoption and Assimilation in China?}, journal = {J. Manag. Inf. Syst.}, volume = {33}, number = {4}, pages = {1209--1251}, year = {2016}, url = {https://doi.org/10.1080/07421222.2016.1267534}, doi = {10.1080/07421222.2016.1267534}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LaiLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/LowryW16, author = {Paul Benjamin Lowry and David W. Wilson}, title = {Creating agile organizations through {IT:} The influence of internal {IT} service perceptions on {IT} service quality and {IT} agility}, journal = {J. Strateg. Inf. Syst.}, volume = {25}, number = {3}, pages = {211--226}, year = {2016}, url = {https://doi.org/10.1016/j.jsis.2016.05.002}, doi = {10.1016/J.JSIS.2016.05.002}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsis/LowryW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsis/LowryDHM16, author = {Paul Benjamin Lowry and John D'Arcy and Bryan I. Hammer and Gregory D. Moody}, title = {"Cargo Cult" science in traditional organization and information systems survey research: {A} case for using nontraditional methods of data collection, including Mechanical Turk and online panels}, journal = {J. Strateg. Inf. Syst.}, volume = {25}, number = {3}, pages = {232--240}, year = {2016}, url = {https://doi.org/10.1016/j.jsis.2016.06.002}, doi = {10.1016/J.JSIS.2016.06.002}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsis/LowryDHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pajais/CuiLLW16, author = {Xiling Cui and Lai Kuen Law and Paul Benjamin Lowry and Qiuzhen Wang}, title = {A Contingency Model of Bidding Strategies in Online Auctions in China}, journal = {Pac. Asia J. Assoc. Inf. Syst.}, volume = {8}, number = {2}, pages = {4}, year = {2016}, url = {https://aisel.aisnet.org/pajais/vol8/iss2/4}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pajais/CuiLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/SchutzLT16, author = {Sebastian Walter Sch{\"{u}}tz and Paul Benjamin Lowry and Jason Bennett Thatcher}, editor = {Ting{-}Peng Liang and Shin{-}Yuan Hung and Patrick Y. K. Chau and She{-}I Chang}, title = {Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations}, booktitle = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016, Chiayi, Taiwan, June 27 - July 1, 2016}, pages = {74}, year = {2016}, url = {http://aisel.aisnet.org/pacis2016/74}, timestamp = {Tue, 08 Nov 2016 09:28:09 +0100}, biburl = {https://dblp.org/rec/conf/pacis/SchutzLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/ZhangL16, author = {Jun Zhang and Paul Benjamin Lowry}, editor = {Ting{-}Peng Liang and Shin{-}Yuan Hung and Patrick Y. K. Chau and She{-}I Chang}, title = {Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance}, booktitle = {20th Pacific Asia Conference on Information Systems, {PACIS} 2016, Chiayi, Taiwan, June 27 - July 1, 2016}, pages = {184}, year = {2016}, url = {http://aisel.aisnet.org/pacis2016/184}, timestamp = {Sun, 21 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/ZhangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/PoseyRLB15, author = {Clay Posey and Tom L. Roberts and Paul Benjamin Lowry and Rebecca J. Bennett}, title = {Multiple Indicators and Multiple Causes {(MIMIC)} Models as a Mixed-Modeling Technique: {A} Tutorial and an Annotated Example}, journal = {Commun. Assoc. Inf. Syst.}, volume = {36}, pages = {11}, year = {2015}, url = {https://doi.org/10.17705/1cais.03611}, doi = {10.17705/1CAIS.03611}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/PoseyRLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/CaoBSL15, author = {Jinwei Cao and K. Asli Basoglu and Hong Sheng and Paul Benjamin Lowry}, title = {A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research}, journal = {Commun. Assoc. Inf. Syst.}, volume = {36}, pages = {37}, year = {2015}, url = {https://doi.org/10.17705/1cais.03637}, doi = {10.17705/1CAIS.03637}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/CaoBSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/GiboneyBLN15, author = {Justin Scott Giboney and Susan A. Brown and Paul Benjamin Lowry and Jay F. Nunamaker Jr.}, title = {User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit}, journal = {Decis. Support Syst.}, volume = {72}, pages = {1--10}, year = {2015}, url = {https://doi.org/10.1016/j.dss.2015.02.005}, doi = {10.1016/J.DSS.2015.02.005}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/GiboneyBLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/WeiLS15, author = {Jie Wei and Paul Benjamin Lowry and Stefan Seedorf}, title = {The assimilation of {RFID} technology by Chinese companies: {A} technology diffusion perspective}, journal = {Inf. Manag.}, volume = {52}, number = {6}, pages = {628--642}, year = {2015}, url = {https://doi.org/10.1016/j.im.2015.05.001}, doi = {10.1016/J.IM.2015.05.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/WeiLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/LowryPBR15, author = {Paul Benjamin Lowry and Clay Posey and Rebecca J. Bennett and Tom L. Roberts}, title = {Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust}, journal = {Inf. Syst. J.}, volume = {25}, number = {3}, pages = {193--273}, year = {2015}, url = {https://doi.org/10.1111/isj.12063}, doi = {10.1111/ISJ.12063}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/LowryPBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/LowryM15, author = {Paul Benjamin Lowry and Gregory D. Moody}, title = {Proposing the control-reactance compliance model {(CRCM)} to explain opposing motivations to comply with organisational information security policies}, journal = {Inf. Syst. J.}, volume = {25}, number = {5}, pages = {433--463}, year = {2015}, url = {https://doi.org/10.1111/isj.12043}, doi = {10.1111/ISJ.12043}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/LowryM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/KeithBLFA15, author = {Mark J. Keith and Jeffry S. Babb and Paul Benjamin Lowry and Christopher P. Furner and Amjad Abdullat}, title = {The role of mobile-computing self-efficacy in consumer information disclosure}, journal = {Inf. Syst. J.}, volume = {25}, number = {6}, pages = {637--667}, year = {2015}, url = {https://doi.org/10.1111/isj.12082}, doi = {10.1111/ISJ.12082}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/KeithBLFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/HsuSHL15, author = {Jack Shih{-}Chieh Hsu and Sheng{-}Pao Shih and Yu Wen Hung and Paul Benjamin Lowry}, title = {The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness}, journal = {Inf. Syst. Res.}, volume = {26}, number = {2}, pages = {282--300}, year = {2015}, url = {https://doi.org/10.1287/isre.2015.0569}, doi = {10.1287/ISRE.2015.0569}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/HsuSHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LowryGM15, author = {Paul Benjamin Lowry and James Eric Gaskin and Gregory D. Moody}, title = {Proposing the Multimotive Information Systems Continuance Model {(MISC)} to Better Explain End-User System Evaluations and Continuance Intentions}, journal = {J. Assoc. Inf. Syst.}, volume = {16}, number = {7}, pages = {3}, year = {2015}, url = {https://doi.org/10.17705/1jais.00403}, doi = {10.17705/1JAIS.00403}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/LowryGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/RouibahLA15, author = {Kamel Rouibah and Paul Benjamin Lowry and Laila Almutairi}, title = {Dimensions of Business-to-Consumer {(B2C)} Systems Success in Kuwait: Testing a Modified DeLone and McLean {IS} Success Model in an E-Commerce Context}, journal = {J. Glob. Inf. Manag.}, volume = {23}, number = {3}, pages = {41--71}, year = {2015}, url = {https://doi.org/10.4018/JGIM.2015070103}, doi = {10.4018/JGIM.2015070103}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/RouibahLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/ChatterjeeMLCH15, author = {Sutirtha Chatterjee and Gregory D. Moody and Paul Benjamin Lowry and Suranjan Chakraborty and Andrew M. Hardin}, title = {Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation}, journal = {J. Manag. Inf. Syst.}, volume = {32}, number = {3}, pages = {158--196}, year = {2015}, url = {https://doi.org/10.1080/07421222.2015.1099180}, doi = {10.1080/07421222.2015.1099180}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/ChatterjeeMLCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/PoseyRL15, author = {Clay Posey and Tom L. Roberts and Paul Benjamin Lowry}, title = {The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets}, journal = {J. Manag. Inf. Syst.}, volume = {32}, number = {4}, pages = {179--214}, year = {2015}, url = {https://doi.org/10.1080/07421222.2015.1138374}, doi = {10.1080/07421222.2015.1138374}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/PoseyRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/VanceLE15, author = {Anthony Vance and Paul Benjamin Lowry and Dennis Eggett}, title = {Increasing Accountability Through User-Interface Design Artifacts: {A} New Approach to Addressing the Problem of Access-Policy Violations}, journal = {{MIS} Q.}, volume = {39}, number = {2}, pages = {345--366}, year = {2015}, url = {https://doi.org/10.25300/misq/2015/39.2.04}, doi = {10.25300/MISQ/2015/39.2.04}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/VanceLE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/BossGLMP15, author = {Scott R. Boss and Dennis F. Galletta and Paul Benjamin Lowry and Gregory D. Moody and Peter Polak}, title = {What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors}, journal = {{MIS} Q.}, volume = {39}, number = {4}, pages = {837--864}, year = {2015}, url = {https://doi.org/10.25300/misq/2015/39.4.5}, doi = {10.25300/MISQ/2015/39.4.5}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/BossGLMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WuLZ15, author = {Dezhi Wu and Paul Benjamin Lowry and Dongsong Zhang}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {2976--2984}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.360}, doi = {10.1109/HICSS.2015.360}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WuLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/HassanL15, author = {Nik Hassan and Paul Benjamin Lowry}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {Seeking Middle-Range Theories in Information Systems Research}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/IStheory/1}, timestamp = {Wed, 09 Oct 2019 12:51:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/HassanL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MirkovskiLBL15, author = {Kristijan Mirkovski and Paul Benjamin Lowry and Frederik von Briel and Libo Liu}, editor = {Atreyi Kankanhalli and Andrew Burton{-}Jones and Thompson S. H. Teo}, title = {The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises}, booktitle = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015, Singapore, July 5-9, 2015}, pages = {127}, year = {2015}, url = {http://aisel.aisnet.org/pacis2015/127}, timestamp = {Fri, 10 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/MirkovskiLBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/ZhangDSL15, author = {Jun Zhang and Victor Dibia and Alexey Sodnomov and Paul Benjamin Lowry}, editor = {Atreyi Kankanhalli and Andrew Burton{-}Jones and Thompson S. H. Teo}, title = {Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms}, booktitle = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015, Singapore, July 5-9, 2015}, pages = {140}, year = {2015}, url = {http://aisel.aisnet.org/pacis2015/140}, timestamp = {Sun, 21 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/ZhangDSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/CuiZL15, author = {Xiling Cui and Qiang Zhou and Paul Benjamin Lowry}, editor = {Atreyi Kankanhalli and Andrew Burton{-}Jones and Thompson S. H. Teo}, title = {The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation}, booktitle = {19th Pacific Asia Conference on Information Systems, {PACIS} 2015, Singapore, July 5-9, 2015}, pages = {192}, year = {2015}, url = {http://aisel.aisnet.org/pacis2015/192}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pacis/CuiZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/MoodyGL14, author = {Gregory D. Moody and Dennis F. Galletta and Paul Benjamin Lowry}, title = {When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior}, journal = {Electron. Commer. Res. Appl.}, volume = {13}, number = {4}, pages = {266--282}, year = {2014}, url = {https://doi.org/10.1016/j.elerap.2014.05.001}, doi = {10.1016/J.ELERAP.2014.05.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/MoodyGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/PoseyRLH14, author = {Clay Posey and Tom L. Roberts and Paul Benjamin Lowry and Ross T. Hightower}, title = {Bridging the divide: {A} qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders}, journal = {Inf. Manag.}, volume = {51}, number = {5}, pages = {551--567}, year = {2014}, url = {https://doi.org/10.1016/j.im.2014.03.009}, doi = {10.1016/J.IM.2014.03.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/PoseyRLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/LowryTPJB14, author = {Paul Benjamin Lowry and Nathan W. Twyman and Matthew D. Pickard and Jeffrey L. Jenkins and Quang "Neo" Bui}, title = {Proposing the Affect-Trust Infusion Model {(ATIM)} to explain and predict the influence of high and low affect infusion on Web vendor trust}, journal = {Inf. Manag.}, volume = {51}, number = {5}, pages = {579--594}, year = {2014}, url = {https://doi.org/10.1016/j.im.2014.03.005}, doi = {10.1016/J.IM.2014.03.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iam/LowryTPJB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhci/LowryWH14, author = {Paul Benjamin Lowry and David W. Wilson and William L. Haig}, title = {A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust}, journal = {Int. J. Hum. Comput. Interact.}, volume = {30}, number = {1}, pages = {63--93}, year = {2014}, url = {https://doi.org/10.1080/10447318.2013.839899}, doi = {10.1080/10447318.2013.839899}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhci/LowryWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itd/JenkinsGPL14, author = {Jeffrey L. Jenkins and G. Mark Grimes and Jeffrey Gainer Proudfoot and Paul Benjamin Lowry}, title = {Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals}, journal = {Inf. Technol. Dev.}, volume = {20}, number = {2}, pages = {196--213}, year = {2014}, url = {https://doi.org/10.1080/02681102.2013.814040}, doi = {10.1080/02681102.2013.814040}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itd/JenkinsGPL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/TwymanLBN14, author = {Nathan W. Twyman and Paul Benjamin Lowry and Judee K. Burgoon and Jay F. Nunamaker Jr.}, title = {Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals}, journal = {J. Manag. Inf. Syst.}, volume = {31}, number = {3}, pages = {106--137}, year = {2014}, url = {https://doi.org/10.1080/07421222.2014.995535}, doi = {10.1080/07421222.2014.995535}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/TwymanLBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpc/LowryG14, author = {Paul Benjamin Lowry and James E. Gaskin}, title = {Partial Least Squares {(PLS)} Structural Equation Modeling {(SEM)} for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It}, journal = {{IEEE} Trans. Prof. Commun.}, volume = {57}, number = {2}, pages = {123--146}, year = {2014}, url = {https://doi.org/10.1109/TPC.2014.2312452}, doi = {10.1109/TPC.2014.2312452}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpc/LowryG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KeithBL14, author = {Mark J. Keith and Jeffry S. Babb and Paul Benjamin Lowry}, title = {A Longitudinal Study of Information Privacy on Mobile Devices}, booktitle = {47th Hawaii International Conference on System Sciences, {HICSS} 2014, Waikoloa, HI, USA, January 6-9, 2014}, pages = {3149--3158}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HICSS.2014.391}, doi = {10.1109/HICSS.2014.391}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KeithBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/KeithMLB14, author = {Mark J. Keith and Courtenay Maynes and Paul Benjamin Lowry and Jeffry S. Babb}, editor = {Michael D. Myers and Detmar W. Straub}, title = {Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure}, booktitle = {Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, {ICIS} 2014, Auckland, New Zealand, December 14-17, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/icis2014/proceedings/ISSecurity/11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/KeithMLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/LowryZW14, author = {Paul Benjamin Lowry and Dongsong Zhang and Dezhi Wu}, editor = {Michael D. Myers and Detmar W. Straub}, title = {Understanding Patients' Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior}, booktitle = {Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, {ICIS} 2014, Auckland, New Zealand, December 14-17, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/icis2014/proceedings/ISHealthcare/2}, timestamp = {Tue, 24 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/LowryZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CrosslerJLHWB13, author = {Robert E. Crossler and Allen C. Johnston and Paul Benjamin Lowry and Qing Hu and Merrill Warkentin and Richard L. Baskerville}, title = {Future directions for behavioral information security research}, journal = {Comput. Secur.}, volume = {32}, pages = {90--101}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.09.010}, doi = {10.1016/J.COSE.2012.09.010}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CrosslerJLHWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisdc/WeiSL13, author = {Jie Wei and Stefan Seedorf and Paul Benjamin Lowry}, title = {Investigation of the Radio Frequency Identification Assimilation Process in China: {A} Stage-based Model Perspective}, journal = {Electron. J. Inf. Syst. Dev. Ctries.}, volume = {57}, number = {1}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.1002/j.1681-4835.2013.tb00406.x}, doi = {10.1002/J.1681-4835.2013.TB00406.X}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisdc/WeiSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/LowryRR13, author = {Paul Benjamin Lowry and Tom L. Roberts and Nicholas C. Romano Jr.}, title = {What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams}, journal = {Int. J. Hum. Comput. Stud.}, volume = {71}, number = {4}, pages = {455--474}, year = {2013}, url = {https://doi.org/10.1016/j.ijhcs.2012.11.004}, doi = {10.1016/J.IJHCS.2012.11.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/LowryRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/KeithTHLG13, author = {Mark J. Keith and Samuel C. Thompson and Joanne E. Hale and Paul Benjamin Lowry and Chapman Greer}, title = {Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior}, journal = {Int. J. Hum. Comput. Stud.}, volume = {71}, number = {12}, pages = {1163--1173}, year = {2013}, url = {https://doi.org/10.1016/j.ijhcs.2013.08.016}, doi = {10.1016/J.IJHCS.2013.08.016}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmms/KeithTHLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LowryGTHR13, author = {Paul Benjamin Lowry and James Eric Gaskin and Nathan W. Twyman and Bryan I. Hammer and Tom L. Roberts}, title = {Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model {(HMSAM)}}, journal = {J. Assoc. Inf. Syst.}, volume = {14}, number = {11}, pages = {2}, year = {2013}, url = {https://doi.org/10.17705/1jais.00347}, doi = {10.17705/1JAIS.00347}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/LowryGTHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/VanceLE13, author = {Anthony Vance and Paul Benjamin Lowry and Dennis Eggett}, title = {Using Accountability to Reduce Access Policy Violations in Information Systems}, journal = {J. Manag. Inf. Syst.}, volume = {29}, number = {4}, pages = {263--290}, year = {2013}, url = {https://doi.org/10.2753/mis0742-1222290410}, doi = {10.2753/MIS0742-1222290410}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/VanceLE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryMGV13, author = {Paul Benjamin Lowry and Gregory D. Moody and Dennis F. Galletta and Anthony Vance}, title = {The Drivers in the Use of Online Whistle-Blowing Reporting Systems}, journal = {J. Manag. Inf. Syst.}, volume = {30}, number = {1}, pages = {153--190}, year = {2013}, url = {https://doi.org/10.2753/mis0742-1222300105}, doi = {10.2753/MIS0742-1222300105}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryMGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/LowryMGGHBW13, author = {Paul Benjamin Lowry and Gregory D. Moody and James E. Gaskin and Dennis F. Galletta and Sean L. Humpherys and Jordan B. Barlow and David W. Wilson}, title = {Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?}, journal = {{MIS} Q.}, volume = {37}, number = {4}, pages = {993--1012}, year = {2013}, url = {https://doi.org/10.25300/misq/2013/37.4.01}, doi = {10.25300/MISQ/2013/37.4.01}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/LowryMGGHBW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/PoseyRLBC13, author = {Clay Posey and Tom L. Roberts and Paul Benjamin Lowry and Rebecca J. Bennett and James F. Courtney}, title = {Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors}, journal = {{MIS} Q.}, volume = {37}, number = {4}, pages = {1189--1210}, year = {2013}, url = {https://doi.org/10.25300/misq/2013/37.4.09}, doi = {10.25300/MISQ/2013/37.4.09}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/PoseyRLBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryM13, author = {Paul Benjamin Lowry and Greg D. Moody}, title = {Explaining Opposing Compliance Motivations towards Organizational Information Security Policies}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {2998--3007}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.5}, doi = {10.1109/HICSS.2013.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/RuschMLT13, author = {Thomas Rusch and Patrick Mair and Paul Benjamin Lowry and Horst Treiblmaier}, editor = {Richard L. Baskerville and Michael Chau}, title = {Developing and Measuring {IS} Scales Using Item Response Theory}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2013, Milano, Italy, December 15-18, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/icis2013/proceedings/ResearchMethods/1}, timestamp = {Wed, 30 Oct 2019 17:01:36 +0100}, biburl = {https://dblp.org/rec/conf/icis/RuschMLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MoodyLG13, author = {Gregory D. Moody and Paul Benjamin Lowry and Dennis F. Galletta}, editor = {Jae{-}Nam Lee and Ji{-}Ye Mao and James Y. L. Thong}, title = {Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce}, booktitle = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013, Jeju Island, Korea, June 18-22, 2013}, pages = {173}, year = {2013}, url = {http://aisel.aisnet.org/pacis2013/173}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/MoodyLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jasis/LowryMVJJW12, author = {Paul Benjamin Lowry and Greg D. Moody and Anthony Vance and Matthew L. Jensen and Jeffrey L. Jenkins and Taylor Wells}, title = {Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers}, journal = {J. Assoc. Inf. Sci. Technol.}, volume = {63}, number = {4}, pages = {755--776}, year = {2012}, url = {https://doi.org/10.1002/asi.21705}, doi = {10.1002/ASI.21705}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jasis/LowryMVJJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VanceML12, author = {Anthony Vance and Braden Molyneux and Paul Benjamin Lowry}, title = {Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {4623--4632}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.499}, doi = {10.1109/HICSS.2012.499}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VanceML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LowryRMS12, author = {Paul Benjamin Lowry and Kamel Rouibah and Greg D. Moody and Mikko T. Siponen}, editor = {Shan L. Pan and Tru H. Cao}, title = {Towards {A} Cross-Cultural Model Of Online Whistle-Blowing Systems Use}, booktitle = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012, Ho Chi Minh City, Vietnam, 11-15 July 2012}, pages = {147}, year = {2012}, url = {http://aisel.aisnet.org/pacis2012/147}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/LowryRMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/BarlowGKWSLV11, author = {Jordan B. Barlow and Justin Scott Giboney and Mark Jeffrey Keith and David W. Wilson and Ryan M. Schuetzler and Paul Benjamin Lowry and Anthony Vance}, title = {Overview and Guidance on Agile Development in Large Organizations}, journal = {Commun. Assoc. Inf. Syst.}, volume = {29}, pages = {2}, year = {2011}, url = {https://doi.org/10.17705/1cais.02902}, doi = {10.17705/1CAIS.02902}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/BarlowGKWSLV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryCE11, author = {Paul Benjamin Lowry and Jinwei Cao and Andrea Everard}, title = {Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures}, journal = {J. Manag. Inf. Syst.}, volume = {27}, number = {4}, pages = {163--200}, year = {2011}, url = {https://doi.org/10.2753/mis0742-1222270406}, doi = {10.2753/MIS0742-1222270406}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryCE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/JensenLJ11, author = {Matthew L. Jensen and Paul Benjamin Lowry and Jeffrey L. Jenkins}, title = {Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment}, journal = {J. Manag. Inf. Syst.}, volume = {28}, number = {1}, pages = {201--233}, year = {2011}, url = {https://doi.org/10.2753/mis0742-1222280107}, doi = {10.2753/MIS0742-1222280107}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/JensenLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/DeanLH11, author = {Douglas L. Dean and Paul Benjamin Lowry and Sean L. Humpherys}, title = {Profiling the Research Productivity of Tenured Information Systems Faculty at {U.S.} Institutions}, journal = {{MIS} Q.}, volume = {35}, number = {1}, pages = {1--15}, year = {2011}, url = {http://misq.org/profiling-the-research-productivity-of-tenured-information-systems-faculty-at-u-s-institutions.html}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/misq/DeanLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/PoseyLRE10, author = {Clay Posey and Paul Benjamin Lowry and Tom L. Roberts and T. Selwyn Ellis}, title = {Proposing the online community self-disclosure model: the case of working professionals in France and the {U.K.} who use online communities}, journal = {Eur. J. Inf. Syst.}, volume = {19}, number = {2}, pages = {181--195}, year = {2010}, url = {https://doi.org/10.1057/ejis.2010.15}, doi = {10.1057/EJIS.2010.15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/PoseyLRE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijal/VanceLO10, author = {Anthony Vance and Paul Benjamin Lowry and Jeffrey A. Ogden}, title = {Testing the Potential of {RFID} to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect}, journal = {Int. J. Appl. Logist.}, volume = {1}, number = {1}, pages = {48--66}, year = {2010}, url = {https://doi.org/10.4018/jal.2010090204}, doi = {10.4018/JAL.2010090204}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijal/VanceLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/LowryZZF10, author = {Paul Benjamin Lowry and Dongsong Zhang and Lina Zhou and Xiaolan Fu}, title = {Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups}, journal = {Inf. Syst. J.}, volume = {20}, number = {3}, pages = {297--315}, year = {2010}, url = {https://doi.org/10.1111/j.1365-2575.2009.00334.x}, doi = {10.1111/J.1365-2575.2009.00334.X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isj/LowryZZF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/JensenLBN10, author = {Matthew L. Jensen and Paul Benjamin Lowry and Judee K. Burgoon and Jay F. Nunamaker Jr.}, title = {Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment}, journal = {J. Manag. Inf. Syst.}, volume = {27}, number = {1}, pages = {175--202}, year = {2010}, url = {https://doi.org/10.2753/mis0742-1222270108}, doi = {10.2753/MIS0742-1222270108}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/JensenLBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryGSRGRA10, author = {Paul Benjamin Lowry and Justin Scott Giboney and Ryan M. Schuetzler and Jacob Richardson and Tom Gregory and John Romney and Bonnie Brinton Anderson}, title = {The Value of Distrust in Computer-Based Decision-Making Groups}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.399}, doi = {10.1109/HICSS.2010.399}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryGSRGRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AndersonHL09, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry}, title = {Creating automated plans for Semantic Web applications through planning as model checking}, journal = {Expert Syst. Appl.}, volume = {36}, number = {7}, pages = {10595--10603}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2009.02.056}, doi = {10.1016/J.ESWA.2009.02.056}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AndersonHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LowryRDM09, author = {Paul Benjamin Lowry and Tom L. Roberts and Douglas L. Dean and George M. Marakas}, title = {Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation}, journal = {J. Assoc. Inf. Syst.}, volume = {10}, number = {3}, pages = {5}, year = {2009}, url = {https://doi.org/10.17705/1jais.00189}, doi = {10.17705/1JAIS.00189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/LowryRDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/AlbrechtRLM09, author = {Conan C. Albrecht and Marshall B. Romney and Paul Benjamin Lowry and Greg D. Moody}, title = {The {IS} Core: An Integration of the Core {IS} Courses}, journal = {J. Inf. Syst. Educ.}, volume = {20}, number = {4}, pages = {451--468}, year = {2009}, url = {https://jise.org/Volume20/n4/JISEv20n4p451.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/AlbrechtRLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryRJG09, author = {Paul Benjamin Lowry and Nicholas C. Romano Jr. and Jeffrey L. Jenkins and Randy W. Guthrie}, title = {The {CMC} Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups}, journal = {J. Manag. Inf. Syst.}, volume = {26}, number = {1}, pages = {155--195}, year = {2009}, url = {https://doi.org/10.2753/mis0742-1222260107}, doi = {10.2753/MIS0742-1222260107}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryRJG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/CurtisWLH08, author = {Aaron Curtis and Taylor M. Wells and Paul Benjamin Lowry and Trevor Higbee}, title = {An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research}, journal = {Commun. Assoc. Inf. Syst.}, volume = {23}, pages = {3}, year = {2008}, url = {https://doi.org/10.17705/1cais.02303}, doi = {10.17705/1CAIS.02303}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/CurtisWLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/ZhangL08, author = {Dongsong Zhang and Paul Benjamin Lowry}, title = {Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems}, journal = {J. Glob. Inf. Manag.}, volume = {16}, number = {1}, pages = {61--84}, year = {2008}, url = {https://doi.org/10.4018/jgim.2008010103}, doi = {10.4018/JGIM.2008010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/ZhangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/LowryVMBR08, author = {Paul Benjamin Lowry and Anthony Vance and Greg D. Moody and Bryan Beckman and Aaron Read}, title = {Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites}, journal = {J. Manag. Inf. Syst.}, volume = {24}, number = {4}, pages = {199--224}, year = {2008}, url = {https://doi.org/10.2753/mis0742-1222240408}, doi = {10.2753/MIS0742-1222240408}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/LowryVMBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/KarugaLR07, author = {Gilbert G. Karuga and Paul Benjamin Lowry and Vernon J. Richardson}, title = {Assessing the Impact of Premier Information Systems Research over Time}, journal = {Commun. Assoc. Inf. Syst.}, volume = {19}, pages = {7}, year = {2007}, url = {https://doi.org/10.17705/1cais.01907}, doi = {10.17705/1CAIS.01907}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/KarugaLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/LowryKR07, author = {Paul Benjamin Lowry and Gilbert G. Karuga and Vernon J. Richardson}, title = {Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals}, journal = {Commun. Assoc. Inf. Syst.}, volume = {20}, pages = {16}, year = {2007}, url = {https://doi.org/10.17705/1cais.02016}, doi = {10.17705/1CAIS.02016}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/LowryKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/HansenLMM07, author = {James V. Hansen and Paul Benjamin Lowry and Rayman D. Meservy and Daniel M. McDonald}, title = {Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection}, journal = {Decis. Support Syst.}, volume = {43}, number = {4}, pages = {1362--1374}, year = {2007}, url = {https://doi.org/10.1016/j.dss.2006.04.004}, doi = {10.1016/J.DSS.2006.04.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/HansenLMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/ZhangLZF07, author = {Dongsong Zhang and Paul Benjamin Lowry and Lina Zhou and Xiaolan Fu}, title = {The Impact of Individualism - Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence}, journal = {J. Manag. Inf. Syst.}, volume = {23}, number = {4}, pages = {53--80}, year = {2007}, url = {http://www.jmis-web.org/articles/300}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/ZhangLZF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/LowryRH07, author = {Paul Benjamin Lowry and Tom L. Roberts and Trevor Higbee}, editor = {Julie A. Jacko}, title = {First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites}, booktitle = {Human-Computer Interaction. {HCI} Applications and Services, 12th International Conference, {HCI} International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {4553}, pages = {77--85}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73111-5\_9}, doi = {10.1007/978-3-540-73111-5\_9}, timestamp = {Sun, 02 Jun 2019 21:16:47 +0200}, biburl = {https://dblp.org/rec/conf/hci/LowryRH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ZhangVL07, author = {Dongsong Zhang and Doug Vogel and Paul Benjamin Lowry}, title = {Minitack Introduction: Cross-cultural Issues in Collaboration Technology}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {11}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.344}, doi = {10.1109/HICSS.2007.344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ZhangVL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryZZF07, author = {Paul Benjamin Lowry and Dongsong Zhang and Lina Zhou and Xiaolan Fu}, title = {The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {12}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.534}, doi = {10.1109/HICSS.2007.534}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryZZF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryM07, author = {Paul Benjamin Lowry and Scott McCoy}, title = {Interactive Digital Entertainment, Social Computing, and Lifestyle Computing}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {159}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.284}, doi = {10.1109/HICSS.2007.284}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MoodyWL07, author = {Greg D. Moody and Taylor Wells and Paul Benjamin Lowry}, title = {The Interactive Digital Entertainment {(IDE)} Unification Framework: Creating a Taxonomy of {IDE} and Lifestyle Computing}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {160}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.546}, doi = {10.1109/HICSS.2007.546}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MoodyWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AndersonHLS06, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry and Scott L. Summers}, title = {The application of model checking for securing e-commerce transactions}, journal = {Commun. {ACM}}, volume = {49}, number = {6}, pages = {97--101}, year = {2006}, url = {https://doi.org/10.1145/1132469.1132474}, doi = {10.1145/1132469.1132474}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AndersonHLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/LowryWMHK06, author = {Paul Benjamin Lowry and Taylor M. Wells and Greg D. Moody and Sean L. Humpherys and Degan Kettles}, title = {Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management}, journal = {Commun. Assoc. Inf. Syst.}, volume = {17}, pages = {6}, year = {2006}, url = {https://doi.org/10.17705/1cais.01706}, doi = {10.17705/1CAIS.01706}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/LowryWMHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AndersonHLS06, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry and Scott L. Summers}, title = {Standards and verification for fair-exchange and atomicity in e-commerce transactions}, journal = {Inf. Sci.}, volume = {176}, number = {8}, pages = {1045--1066}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2005.01.016}, doi = {10.1016/J.INS.2005.01.016}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/AndersonHLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryRG06, author = {Paul Benjamin Lowry and Nicholas C. Romano Jr. and Randy W. Guthrie}, title = {Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.173}, doi = {10.1109/HICSS.2006.173}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryRG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowrySWMMM06, author = {Paul Benjamin Lowry and Trent J. Spaulding and Taylor Wells and Greg D. Moody and Kevin Moffit and Sebastian Madariaga}, title = {A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.33}, doi = {10.1109/HICSS.2006.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowrySWMMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/RobertsLCH06, author = {Tom L. Roberts and Paul Benjamin Lowry and Paul H. Cheney and Ross T. Hightower}, title = {Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.217}, doi = {10.1109/HICSS.2006.217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/RobertsLCH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ZhangLF06, author = {Dongsong Zhang and Paul Benjamin Lowry and Xiaolan Fu}, title = {Culture and Media Effects on Group Decision Making under Majority Influence}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.109}, doi = {10.1109/HICSS.2006.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ZhangLF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ZhangVL06, author = {Dongsong Zhang and Doug Vogel and Paul Benjamin Lowry}, title = {Minitrack Introduction}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.301}, doi = {10.1109/HICSS.2006.301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ZhangVL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/AndersonHLS05, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry and Scott L. Summers}, title = {Model checking for design and assurance of e-Business processes}, journal = {Decis. Support Syst.}, volume = {39}, number = {3}, pages = {333--344}, year = {2005}, url = {https://doi.org/10.1016/j.dss.2003.12.001}, doi = {10.1016/J.DSS.2003.12.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/AndersonHLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/AndersonHLS05, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry and Scott L. Summers}, title = {Model checking for E-business control and assurance}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {35}, number = {3}, pages = {445--450}, year = {2005}, url = {https://doi.org/10.1109/TSMCC.2004.843181}, doi = {10.1109/TSMCC.2004.843181}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/AndersonHLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/AndersonHL05, author = {Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry}, editor = {Deepak Khazanchi and Ilze Zigurs}, title = {Dependability Auditing with Model Checking}, booktitle = {A Conference on a Human Scale. 11th Americas Conference on Information Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005}, pages = {276}, publisher = {Association for Information Systems}, year = {2005}, url = {http://aisel.aisnet.org/amcis2005/276}, timestamp = {Fri, 06 Jan 2012 11:23:55 +0100}, biburl = {https://dblp.org/rec/conf/amcis/AndersonHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/RobertsLR05, author = {Tom L. Roberts and Paul Benjamin Lowry and Nicholas C. Romano Jr.}, title = {Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.310}, doi = {10.1109/HICSS.2005.310}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/RobertsLR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/LowryRC04, author = {Paul Benjamin Lowry and Denton Romans and Aaron Curtis}, title = {Global Journal Prestige and Supporting Disciplines: {A} Scientometric Study of Information Systems Journals}, journal = {J. Assoc. Inf. Syst.}, volume = {5}, number = {2}, pages = {1}, year = {2004}, url = {https://doi.org/10.17705/1jais.00045}, doi = {10.17705/1JAIS.00045}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/LowryRC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LowryANL03, author = {Paul Benjamin Lowry and Conan C. Albrecht and Jay F. Nunamaker Jr. and James D. Lee}, title = {Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting}, journal = {Decis. Support Syst.}, volume = {34}, number = {3}, pages = {229--252}, year = {2003}, url = {https://doi.org/10.1016/S0167-9236(02)00119-7}, doi = {10.1016/S0167-9236(02)00119-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LowryANL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/DeanL03, author = {Douglas L. Dean and Paul Benjamin Lowry}, title = {\emph{Teaching Case}: Consulting at the Laser {ISP} {(LISP)} Company: Using Excel Metrics Capabilities to Solve Semi-Structured Management Problems}, journal = {J. Inf. Syst. Educ.}, volume = {14}, number = {4}, pages = {353--360}, year = {2003}, url = {https://jise.org/Volume14/n4/JISEv14n4p353.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/DeanL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LowryR03, author = {Paul Benjamin Lowry and Tom L. Roberts}, title = {Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software}, booktitle = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa, FL, USA, August 4-6, 2003}, pages = {284}, publisher = {Association for Information Systems}, year = {2003}, url = {http://aisel.aisnet.org/amcis2003/284}, timestamp = {Mon, 09 Jan 2012 12:52:36 +0100}, biburl = {https://dblp.org/rec/conf/amcis/LowryR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LowryR03a, author = {Paul Benjamin Lowry and Denton Romans}, title = {New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines}, booktitle = {9th Americas Conference on Information Systems, {AMCIS} 2003, Tampa, FL, USA, August 4-6, 2003}, pages = {367}, publisher = {Association for Information Systems}, year = {2003}, url = {http://aisel.aisnet.org/amcis2003/367}, timestamp = {Mon, 09 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcis/LowryR03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryN02, author = {Paul Benjamin Lowry and Jay F. Nunamaker Jr.}, title = {Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus}, booktitle = {35th Hawaii International Conference on System Sciences {(HICSS-35} 2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, {USA}}, pages = {10}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/HICSS.2002.993860}, doi = {10.1109/HICSS.2002.993860}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryALN02, author = {Paul Benjamin Lowry and Conan C. Albrecht and James D. Lee and Jay F. Nunamaker Jr.}, title = {Users Experiences in Collaborative Writing Using Collaboratus: An Internet-Based Collaborative Work}, booktitle = {35th Hawaii International Conference on System Sciences {(HICSS-35} 2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, {USA}}, pages = {21}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/HICSS.2002.993879}, doi = {10.1109/HICSS.2002.993879}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryALN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LowryN02a, author = {Paul Benjamin Lowry and Jay F. Nunamaker Jr.}, title = {Using the ThinkLet Framework to Improve Distributed Collaborative Writing}, booktitle = {35th Hawaii International Conference on System Sciences {(HICSS-35} 2002), {CD-ROM} / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/HICSS.2002.994539}, doi = {10.1109/HICSS.2002.994539}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LowryN02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Lowry01, author = {Paul Benjamin Lowry}, title = {{XML} Data Mediation and Collaboration: {A} Proposed Comprehensive Architecture and Query Requirements for using to Mediate Heterogeneous Data Sources and Targets}, booktitle = {34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/HICSS.2001.927076}, doi = {10.1109/HICSS.2001.927076}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Lowry01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.