Prof. Paul Benjamin Lowry
Cited by
Cited by
Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it
PB Lowry, J Gaskin
IEEE Transactions on Professional Communication 57 (2), 123-146, 2014
Future Directions for Behavioral Information Security Research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32 (1), 90-101, 2013
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak
MIS Quarterly 39 (4), 837-864, 2015
Building a taxonomy and nomenclature of collaborative writing to improve interdisciplinary research and practice
PB Lowry, A Curtis, MR Lowry
International Journal of Business Communication 41 (1), 66-99, 2004
Taking" Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM).
PB Lowry, JE Gaskin, NW Twyman, B Hammer, TL Roberts
Journal of the Association for Information Systems 14 (11), 617-671, 2013
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19 (2), 181-195, 2010
Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
PB Lowry, A Vance, G Moody, B Beckman, A Read
Journal of Management Information Systems 24 (4), 199-224, 2008
Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures
PB Lowry, J Cao, A Everard
Journal of management information systems 27 (4), 163-200, 2011
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
MJ Keith, SC Thompson, J Hale, PB Lowry, C Greer
International journal of human-computer studies 71 (12), 1163-1173, 2013
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
C Posey, TL Roberts, PB Lowry
Journal of Management Information Systems 32 (4), 179–214, 2015
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model
PB Lowry, J Zhang, C Wang, M Siponen
Information Systems Research 27 (4), 962-986, 2016
Bid together, buy together: On the efficacy of group-buying business models in Internet-based selling
RJ Kauffman, B Wang, PB Lowry, JO Cherrington, RR & Watson
The E-Business Handbook, 99-137, 2001
The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference?
PB Lowry, TL Roberts, NC Romano Jr, PD Cheney, RT Hightower
Small Group Research 37 (6), 631-661, 2006
Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations
A Vance, PB Lowry, D Eggett
MIS Quarterly (MISQ) 39 (2), 345-366, 2015
Global journal prestige and supporting disciplines: A scientometric study of information systems journals
PB Lowry, D Romans, A Curtis
Journal of the Association for Information Systems 5 (2), 29-80, 2004
‘Cargo Cult’ science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk …
PB Lowry, J D’Arcy, B Hammer, GD Moody
Journal of Strategic Information Systems 25 (3), 232-240, 2016
The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country
K Rouibah, PB Lowry, Y Hwang
Electronic Commerce Research and Applications 19 (3), 33-43, 2016
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
Using Accountability to Reduce Access Policy Violations in Information Systems
A Vance, PB Lowry, D Eggett
Journal of Management Information Systems 29 (4), 263-290, 2013
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
C Posey, TL Roberts, PB Lowry, J Courtney
MIS Quarterly 37 (4), 1189-1210, 2013
The system can't perform the operation now. Try again later.
Articles 1–20