팔로우
Tom L. Roberts
Tom L. Roberts
uttyler.edu의 이메일 확인됨
제목
인용
인용
연도
Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM)
PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts
Journal of Association of Information Systems (JAIS) 14 (11), 617-671, 2012
7002012
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19 (2), 181-195, 2010
6252010
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
C Posey, TL Roberts, PB Lowry
Journal of management information systems 32 (4), 179-214, 2015
4892015
The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference?
PB Lowry, TL Roberts, NC Romano Jr, PD Cheney, RT Hightower
Small group research 37 (6), 631-661, 2006
3862006
Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
C Posey, T Roberts, PB Lowry, B Bennett, J Courtney
MIS Quarterly 37 (4), 1189-1210, 2013
3042013
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
C Posey, TL Roberts, PB Lowry, RT Hightower
Information & management 51 (5), 551-567, 2014
2742014
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence …
PB Lowry, C Posey, RBJ Bennett, TL Roberts
Information Systems Journal 25 (3), 193-273, 2015
2682015
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
AJ Burns, C Posey, TL Roberts, PB Lowry
Computers in Human Behavior 68, 190-209, 2017
2302017
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
C Posey, B Bennett, T Roberts, PB Lowry
Journal of Information Systems Security 7 (1), 24-47, 2011
1892011
Stock market trading rule discovery using technical charting heuristics
W Leigh, N Modani, R Purvis, T Roberts
Expert Systems with Applications 23 (2), 155-159, 2002
1832002
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
C Posey, RJ Bennett, TL Roberts
Computers & Security 30 (6-7), 486-497, 2011
1532011
Factors that impact implementing a system development methodology
TL Roberts, ML Gibson, KT Fields, RK Rainer
IEEE Transactions on Software Engineering 24 (8), 640-649, 1998
1151998
Information technology investment and firm performance: a meta-analysis
JH Lim, VJ Richardson, TL Roberts
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
1052004
The effects of information technology project complexity on group interaction
TL Roberts, PH Cheney, PD Sweeney, RT Hightower
Journal of Management Information Systems 21 (3), 223-247, 2004
1012004
An evaluation of the impact of social presence through group size and the use of collaborative software on group member" voice" in face-to-face and computer-mediated task groups
TL Roberts, PB Lowry, PD Sweeney
IEEE Transactions on Professional Communication 49 (1), 28-43, 2006
1002006
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking
AJ Burns, TL Roberts, C Posey, PB Lowry
Information Systems Research 30 (4), 1228-1247, 2019
922019
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
Decision Sciences 49 (6), 1187-1228, 2018
802018
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study
RM Henry, GE McCray, RL Purvis, TL Roberts
Information & Management 44 (6), 598-612, 2007
752007
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse
PB Lowry, C Posey, TL Roberts, RJ Bennett
Journal of Business Ethics 121, 385-401, 2014
732014
Trading with a stock chart heuristic
W Leigh, CJ Frohlich, S Hornik, RL Purvis, TL Roberts
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007
622007
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20