Prof. Paul Benjamin Lowry
Title
Cited by
Cited by
Year
Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it
PB Lowry, J Gaskin
IEEE Transactions on Professional Communication 57 (2), 123-146, 2014
14912014
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90-101, 2013
7702013
Building a taxonomy and nomenclature of collaborative writing to improve interdisciplinary research and practice
PB Lowry, A Curtis, MR Lowry
International Journal of Business Communication 41 (1), 66-99, 2004
5332004
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak
MIS Quarterly 39 (4), 837-864, 2015
5092015
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19 (2), 181-195, 2010
4442010
Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
PB Lowry, A Vance, G Moody, B Beckman, A Read
Journal of Management Information Systems 24 (4), 199-224, 2008
4442008
Taking" Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).
PB Lowry, JE Gaskin, NW Twyman, B Hammer, TL Roberts
Journal of the Association for Information Systems 14 (11), 617-671, 2013
393*2013
Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures
PB Lowry, J Cao, A Everard
Journal of Management Information Systems 27 (4), 163-200, 2011
3812011
Bid together, buy together: On the efficacy of group-buying business models in Internet-based selling
RJ Kauffman, B Wang, PB Lowry, JO Cherrington, RR & Watson
The E-Business Handbook, 99-137, 2001
3222001
Global journal prestige and supporting disciplines: A scientometric study of information systems journals
PB Lowry, D Romans, A Curtis
Journal of the Association for Information Systems 5 (2), 29-80, 2004
2912004
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
MJ Keith, SC Thompson, J Hale, PB Lowry, C Greer
International journal of human-computer studies 71 (12), 1163-1173, 2013
2902013
The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference?
PB Lowry, TL Roberts, NC Romano Jr, PD Cheney, RT Hightower
Small Group Research 37 (6), 631-661, 2006
2792006
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
C Posey, TL Roberts, PB Lowry
Journal of Management Information Systems 32 (4), 179–214, 2015
2672015
Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations
A Vance, PB Lowry, D Eggett
MIS Quarterly (MISQ) 39 (2), 345-366, 2015
241*2015
Using Accountability to Reduce Access Policy Violations in Information Systems
A Vance, PB Lowry, D Eggett
Journal of Management Information Systems 29 (4), 263-290, 2013
2372013
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
2282016
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
2282009
Culture and media effects on group decision making under majority influence
D Zhang, PB Lowry, X Fu, Lina, B Adipat
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
226*2006
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
C Posey, TL Roberts, PB Lowry, J Courtney
MIS Quarterly 37 (4), 1189-1210, 2013
2172013
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies
PB Lowry, GD Moody
Information Systems Journal 25 (5), 433-463, 2015
1962015
The system can't perform the operation now. Try again later.
Articles 1–20