Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM) PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts Journal of Association of Information Systems (JAIS) 14 (11), 617-671, 2012 | 700 | 2012 |
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities C Posey, PB Lowry, TL Roberts, TS Ellis European journal of information systems 19 (2), 181-195, 2010 | 625 | 2010 |
The impact of organizational commitment on insiders’ motivation to protect organizational information assets C Posey, TL Roberts, PB Lowry Journal of management information systems 32 (4), 179-214, 2015 | 489 | 2015 |
The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference? PB Lowry, TL Roberts, NC Romano Jr, PD Cheney, RT Hightower Small group research 37 (6), 631-661, 2006 | 386 | 2006 |
Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors C Posey, T Roberts, PB Lowry, B Bennett, J Courtney MIS Quarterly 37 (4), 1189-1210, 2013 | 304 | 2013 |
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders C Posey, TL Roberts, PB Lowry, RT Hightower Information & management 51 (5), 551-567, 2014 | 274 | 2014 |
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence … PB Lowry, C Posey, RBJ Bennett, TL Roberts Information Systems Journal 25 (3), 193-273, 2015 | 268 | 2015 |
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals AJ Burns, C Posey, TL Roberts, PB Lowry Computers in Human Behavior 68, 190-209, 2017 | 230 | 2017 |
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse C Posey, B Bennett, T Roberts, PB Lowry Journal of Information Systems Security 7 (1), 24-47, 2011 | 189 | 2011 |
Stock market trading rule discovery using technical charting heuristics W Leigh, N Modani, R Purvis, T Roberts Expert Systems with Applications 23 (2), 155-159, 2002 | 183 | 2002 |
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes C Posey, RJ Bennett, TL Roberts Computers & Security 30 (6-7), 486-497, 2011 | 153 | 2011 |
Factors that impact implementing a system development methodology TL Roberts, ML Gibson, KT Fields, RK Rainer IEEE Transactions on Software Engineering 24 (8), 640-649, 1998 | 115 | 1998 |
Information technology investment and firm performance: a meta-analysis JH Lim, VJ Richardson, TL Roberts 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 105 | 2004 |
The effects of information technology project complexity on group interaction TL Roberts, PH Cheney, PD Sweeney, RT Hightower Journal of Management Information Systems 21 (3), 223-247, 2004 | 101 | 2004 |
An evaluation of the impact of social presence through group size and the use of collaborative software on group member" voice" in face-to-face and computer-mediated task groups TL Roberts, PB Lowry, PD Sweeney IEEE Transactions on Professional Communication 49 (1), 28-43, 2006 | 100 | 2006 |
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking AJ Burns, TL Roberts, C Posey, PB Lowry Information Systems Research 30 (4), 1228-1247, 2019 | 92 | 2019 |
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney Decision Sciences 49 (6), 1187-1228, 2018 | 80 | 2018 |
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study RM Henry, GE McCray, RL Purvis, TL Roberts Information & Management 44 (6), 598-612, 2007 | 75 | 2007 |
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse PB Lowry, C Posey, TL Roberts, RJ Bennett Journal of Business Ethics 121, 385-401, 2014 | 73 | 2014 |
Trading with a stock chart heuristic W Leigh, CJ Frohlich, S Hornik, RL Purvis, TL Roberts IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007 | 62 | 2007 |