Research and Ph.D. student resources
Access to All of My Papers:
All working papers and accepted papers: on SSRN | Academia.edu | ResearchGate
Other Prof. Lowry Academic sites: ORCid | Linkedin | Scopus | Kudos
My open-access, public-domain publications
Yanli Jia, Libo Liu, and Paul Benjamin Lowry (2024). “How do consumers make behavioral decisions on social commerce platforms? The interaction effect between behavior visibility and social needs” Information Systems Journal (ISJ), https://doi.org/10.1111/isj.12508 (published under Creative Commons, Gold, free global open access).
Kristijian Mirkovski, Frederik von Briel, Paul Benjamin Lowry, and Libo Liu[PL1] (2024). “Achieving entrepreneurial growth despite resource and capability constraints: The role of service intermediaries,” Small Business Economics (SBE), Vol. 62(May), pp. 353–380 (doi: https://doi.org/10.1007/s11187-023-00777-z) (published under Creative Commons, Gold, free global open access).
Xiling “Celine” Cui, Yang Xuan, Paul Benjamin Lowry, and Jifan Ren (2024). “Enhancing information technology team creativity through knowledge sharing and motivational rewards: A self-determination perspective,” Data & Information Management (D&IM), Article: 100075 (in press 08--June-2024) (https://doi.org/10.1016/j.dim.2024.100075)
Antonio Diaz Andrade, Monideepa Tarafdar, Robert M. Davison, Andrew Hardin, Angsana A. Techatassanasoontorn, Paul Benjamin Lowry, Sutirtha Chatterjee, and Gerhard Schwabe (2023). “The importance of theory at the Information Systems Journal” Information Systems Journal (ISJ), vol. 33(4), 693–702 (doi https://doi.org/10.1111/isj.12437)
Robert M. Davison and Paul Benjamin Lowry (2023). “Addressing the implications of recent developments in journal impact factors,” Information Systems Journal (ISJ), vol. 33(3), 419-436 (doi: https://doi.org/10.1111/isj.12426).
Feng Xu, Carol Hsu, David Wang, and Paul Benjamin Lowry (2023). “The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation,” Information Systems Journal (ISJ), Vol. 34(4), 1144-1174, https://doi.org/10.1111/isj.12488
Eduardo D. Villacis-Calderon, Tabitha L. James, and Paul Benjamin Lowry (2023). “How Facebook’s newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective,” Data and Information Management (D&IM), vol. 7(3), Article: 100042 (doi: https://doi.org/10.1016/j.dim.2023.100042).
Libo Liu, Kristijan Mirkovski, Paul Benjamin Lowry, and Quan Vu (2023). “Do as I say but not as I do”: Influence of political leaders’ populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions, Data and Information Management (D&IM), vol. 7(2), Article: 100039 (https://doi.org/10.1016/j.dim.2023.100039).
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang, and Youyou Tao (2022). “Patient trust in physicians matters: The role of mobile patient education system and patient-physician communication in improving patient adherence behavior,” Journal of Medical Internet Research (JMIR), vol. 24(12), Article: e42941 (doi: https://doi.org/10.2196/42941) (published under Creative Commons, Gold, free global open access).
Horst Treiblmaier, Kristijan Mirkovski, Paul Benjamin Lowry, and Zach Zacharia (2020). “The physical Internet as a new supply chain paradigm: A systematic literature review and a comprehensive framework,” International Journal of Logistics Management (IJLM), vol. 31(2), pp. 239–287 (doi: https://doi.org/10.1108/IJLM-11-2018-0284) (published under Creative Commons, Gold, free global open access).
Karl van der Schyff, Stephen Flowerday, and Paul Benjamin Lowry (2020). “Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment,” Heliyon, vol. 6(8), Article: e04714. (doi: https://doi.org/10.1016/j.Heliyon.2020.e04714 (published under Creative Commons, Gold, free global open access).
Bowen Zheng, Gongbing Bi, Hefu Liu, and Paul Benjamin Lowry (2020). “Corporate crisis management on social media: A morality violations perspective,” Heliyon, vol. 6(7), Article: e04435, pp. 1–11 (doi: https://doi.org/10.1016/j.Heliyon.2020.e04435; final version is published under Creative Commons, Gold, free global open access).
Neale O’Conner, Paul Benjamin Lowry, and Horst Treiblmaier (2020). “Interorganizational cooperation and supplier performance in high-technology supply chains,” Heliyon, vol. 6(March), Article e03434, pp. 1–16 (doi: https://doi.org/10.1016/j.Heliyon.2020.e03434; final version is published under Creative Commons, Gold, free global open access).
Nik Rushdi Hassan, Lars Mathieson, and Paul Benjamin Lowry (2019). “The process of information systems theorizing as a discursive practice,” Journal of Information Technology (JIT), vol. 34(3), pp. 198-220 (doi: https://doi.org/10.1177/0268396219832004) (runner up for 2019 best paper award at JIT; free access from the publisher).
Robert Willison and Paul Benjamin Lowry (2018). “Disentangling the motivations for organizational insider computer abuse through the rational choice and life course perspectives,” SIGMIS Database: The DATA BASE for Advances in Information Systems, vol.49(April), 81–102 (doi: https://doi.org/10.1145/3210530.3210537) (open access).
Rachida Parks, Heng Xu, Chao-Hsien Chu, and Paul Benjamin Lowry (2017). “Examining the intended and unintended consequences of organisational privacy safeguards enactment in healthcare,” European Journal of Information Systems (EJIS), vol. 26(1), pp. 37–65 (doi: https://doi.org/10.1057/s41303-016-0001-6). October 19, 2018 received the Operational Research Society’s Stafford Beer Medal for the best paper published in the European Journal of Information Systems (EJIS) in 2017 (open from publisher).
Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, and Peter Polak (2015). “What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors,” MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864 (http://aisel.aisnet.org/misq/vol39/iss4/7/) (available from MISQ, past 5-year embargo).
Anthony Vance, Paul Benjamin Lowry, and Dennis Eggett (2015). “Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations,” MIS Quarterly (MISQ), vol. 39(2), pp. 345–366 (doi: https://doi.org/10.25300/MISQ/2015/39.2.04) (available from MISQ, past 5-year embargo).
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James Courtney (2013). “Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors,” MIS Quarterly (MISQ), vol. 37(4), pp. 1189-1210 (http://aisel.aisnet.org/misq/vol37/iss4/11/) (JSTOR stable: http://www.jstor.org/stable/43825787) (available from MISQ, past 5-year embargo).
Paul Benjamin Lowry, Gregory D. Moody, James Eric Gaskin, Dennis F. Galletta, Sean Humpherys, Jordan B. Barlow, and David W. Wilson (2013). “Evaluating journal quality and the Association for Information Systems Senior Scholars’ journal basket via bibliometric measures: Do expert journal assessments add value?“ MIS Quarterly (MISQ), vol. 37(4), 993–1012 (http://aisel.aisnet.org/misq/vol37/iss4/3/) (JSTOR stable: https://www.jstor.org/stable/43825779. Also, see YouTube video narrative of this paper at: http://www.youtube.com/watch?v=LZQIDkA-ke0&feature=youtu.be (available from MISQ, past 5-year embargo).
Douglas L. Dean, Paul Benjamin Lowry, and *Sean Humpherys (2011). “Profiling the research productivity of tenured information systems faculty at U.S. institutions,” MIS Quarterly (MISQ), vol. 35(1), pp. 1–15 (doi: https://doi.org/10.2307/23043486) (available from MISQ, past 5-year embargo).
Bonnie B. Anderson, James V. Hansen, Paul Benjamin Lowry, and Scott L. Summers (2006). “The application of model checking for securing e-commerce transactions,” Communications of the Association for Computing Machinery, vol. 49(6), pp. 97–101 (doi: https://doi.org/10.1145/1132469.1132474) (free access from the publisher).
Jie Wei, Stefan Seedorf, and Paul Benjamin Lowry (2013). “Investigation of radio-frequency identification assimilation process in China: A stage-based model perspective,” Electronic Journal of Information Systems in Developing Countries, vol. 57(4), 1–17 (doi: https://doi.org/10.1002/j.1681-4835.2013.tb00406.x) (free access from the publisher).
Douglas L. Dean and Paul Benjamin Lowry (2003). “Consulting at the Laser ISP (LISP) company: Using Excel™ metrics capabilities to solve unstructured management problems,” Journal of Information Systems Education, vol. 14(4), pp. 353–360 (full open access to article: https://jise.org/Volume14/n4/JISEv14n4p353.pdf).
My citations that are relevant to research in the Metaverse:
Le Wang, Paul Benjamin Lowry, Xin (Robert) Luo, and Han Li (2022). “Moving consumers from ‘free’ to ‘fee’: Addressing the vexing differentiation and fairness issues in the platform-based market of multiplayer online battle arena (MOBA) Games,“ Information Systems Research (ISR) (accepted 02-Mar-2022) (doi: https://doi.org/10.1287/isre.2022.1127).
Mario Silic and Paul Benjamin Lowry (2020). “Using design-science based gamification to improve organizational security training and compliance,” Journal of Management Information Systems (JMIS), vol. 37(1), pp. 129-161 (doi: https://doi.org/10.1080/07421222.2019.1705512).
Paul Benjamin Lowry, Stacie Petter, and Jan Marco Leimeister (2020). “Desperately seeking the artefacts and the foundations of native theory in gamification research: Why information systems researchers can play a legitimate role in this discourse and how they can better contribute,” European Journal of Information Systems (EJIS), vol. 29(6) pp. 609–620 (doi: https://doi.org/10.1080/0960085X.2020.1841574).
Isabella Seeber, Lena Waizenegger, Stefan Seidel, Stefan Morana, Izak Benbasat, and Paul Benjamin Lowry (2020). “Collaborating with technology-based autonomous agents: Issues and research opportunities,“ Internet Research, vol. 30(1) 1-18 (doi: https://doi.org/10.1108/INTR-12-2019-0503).
Brian Kimball Dunn, Dennis F. Galletta, Narayan Ramasubbu, and Paul Benjamin Lowry (2019). “Digital borders, location recognition, and experience attribution within a digital geography,” Journal of Management Information Systems (JMIS), vol. 36(2), pp. 418–449 (doi: https://doi.org/10.1080/07421222.2019.1598690).
David Michael Hull, Paul Benjamin Lowry, James Eric Gaskin, and Kristijan Mirkovski (2019). “A storyteller’s guide to problem-based learning for information systems management education,” Information Systems Journal (ISJ), vol. 29(5), pp. 1040–1057 (doi: https://doi.org/10.1111/isj.12234).
Paul Benjamin Lowry, Gregory D. Moody, and Sutirtha Chatterjee (2017). “Using IT design to prevent cyberbullying,” Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901 (doi: https://doi.org/10.1080/07421222.2017.1373012).
Jie “Sophia” Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum, and Thimo Schulz (2017). “How increased social presence through co-browsing influences user engagement in collaborative online shopping,” Electronic Commerce Research and Applications (ECRA), vol. 24(July-August), pp. 84–99 (doi: https://doi.org/10.1016/j.elerap.2017.07.002).
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, and Mikko Siponen (2016). “Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model,” Information Systems Research (ISR), vol. 27(4), pp. 962–986 (doi: https://doi.org/10.1287/isre.2016.0671).
Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, and Justin Scott Giboney (2016). “Application of expectancy violations theory to communication with and judgments about embodied agents during a decision-making task,” International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36 (doi: https://doi.org/10.1016/j.ijhcs.2016.02.002).
Paul Benjamin Lowry, James Eric Gaskin, and Gregory D. Moody (2015). “Proposing the multimotive information systems continuance model (MISC) to better explain end-user system evaluations and continuance intentions,” Journal of the Association for Information Systems (JAIS), vol. 16(7), pp. 515–579 (doi: https://doi.org/10.17705/1jais.00403).
Paul Benjamin Lowry, James Eric Gaskin, *Nathan W. Twyman, *Bryan Hammer, and Tom L. Roberts (2013). “Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM),” Journal of the Association for Information Systems (JAIS), vol. 14(11), 617–671 (doi: https://doi.org/10.17705/1jais.00347).
My theory-building related articles:
Antonio Diaz Andrade, Monideepa Tarafdar, Robert M. Davison, Andrew Hardin, Angsana A. Techatassanasoontorn, Paul Benjamin Lowry, Sutirtha Chatterjee, and Gerhard Schwabe (2023). “The importance of theory at the Information Systems Journal” Information Systems Journal (ISJ), vol. 33(4), 693–702 (doi https://doi.org/10.1111/isj.12437)
Nik Rushdi Hassan, Paul Benjamin Lowry, and Lars Mathiassen (2022). “Useful products in information systems theorizing: A discursive formation perspective,” Journal of the Association for Information Systems (JAIS), vol. 23(2), 418–446 (https://doi.org/10.17705/1jais.00730).
Paul Benjamin Lowry, Stacie Petter, and Jan Marco Leimeister (2020). “Desperately seeking the artefacts and the foundations of native theory in gamification research: Why information systems researchers can play a legitimate role in this discourse and how they can better contribute,” European Journal of Information Systems (EJIS), vol. 29(6) pp. 609–620 (doi: https://doi.org/10.1080/0960085X.2020.1841574).
Bongsik Shin and Paul Benjamin Lowry (2020). “A review and theoretical explanation of the ‘cyberthreat-intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished,” Computers & Security (C&S), vol. 92, May, Article 101761(doi: https://doi.org/10.1016/j.cose.2020.101761).
Nik Rushdi Hassan, Lars Mathieson, and Paul Benjamin Lowry (2019). “The process of information systems theorizing as a discursive practice,” Journal of Information Technology (JIT), vol. 34(3), pp. 198-220 (doi: https://doi.org/10.1177/0268396219832004) (runner up for 2019 best paper award at JIT).
Nik Rushdi Hassan, Lars Mathieson, and Paul Benjamin Lowry (2019), “Enhancing theoretical contribution in IS research: The case of technology adoption,” European Conference on Information Systems (ECIS 2019), Stockholm-Uppsala, Sweden, June 12–14
Robert Willison, Paul Benjamin Lowry, and Raymond Paternoster (2018). “A tale of two deterrents: Considering the role of absolute and restrictive deterrence in inspiring new directions in behavioral and organizational security,” Journal of the Association for Information Systems (JAIS), vol. 19(12), pp. 1187–1216 (doi: https://doi.org/10.17705/1jais.00524).
Lowry PB, Dinev T, Willison R (2017a) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26(6):546-56
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess,” Journal of the Association for Information Systems (JAIS), vol. 17(1), pp. 39–76 https://doi.org/10.17705/1jais.00420).
Nik Rushdi Hassan and Paul Benjamin Lowry (2015). “Seeking middle-range theories in information systems research,” International Conference on Information Systems (ICIS 2015), Fort Worth, TX, December 13–18, pp. 13–18 (ICIS best paper finalist).
Nik Rushdi Hassan, Lars Mathiassen, and Paul Benjamin Lowry (2021), “The process of information systems theorizing as a discursive practice,” in Nik Rushdi Hassan and Leslie P. Willcocks (eds.) Advancing Information Systems Theories: Rationale and Processes, Palgrave: MacMillan, pp. 161–217.
My working papers and guides to research:
005. Paul Benjamin Lowry (2022). "Baseline Word formatting styles for top information systems, management, and engineering journals," Working Paper, last updated July 14, 2022, Department of Business Information Technology, Pamplin College of Business, Virginia Tech, pp.
004. Paul Benjamin Lowry and Jason Thatcher (2020). “Update your assumptions: How Ph.D. students can achieve success during their Ph.D. program studies in a business field,” Decision Line, vol. 51(1), pp. 27–30
003. Paul Benjamin Lowry (2019). “An emerging scholar’s guide to more effective citation of sources and management of citations,” Working Paper, last updated April 05, 2019, Department of Business Information Technology, Pamplin College of Business, Virginia Tech, pp. 1–8.
002. Paul Benjamin Lowry (2018). “An emerging scholar’s guide to writing theory-based post-positivistic academic articles,” Working Paper, last updated November 17, 2018, Department of Business Information Technology, Pamplin College of Business, Virginia Tech, pp. 1–21.
001. Paul Benjamin Lowry (2018). “An emerging scholar’s guide to the leading international information systems and business analytics research resources and publication outlets,” Working Paper, last updated September 19, 2018, Department of Business Information Technology, Pamplin College of Business, Virginia Tech, pp. 1- 17.