


default search action
Paul Benjamin Lowry
Person information
- affiliation: City University of Hong Kong, Department of Information Systems
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j141]Daeeun Daniel Choi
, Paul Benjamin Lowry
:
Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Inf. Manag. 61(1): 103876 (2024) - [j140]Xiaolin Li, Paul Benjamin Lowry
, Fujun Lai:
The influence of ERP-vendor contract compliance and transaction-specific investment on vendee trust: A signaling theory perspective. Inf. Manag. 61(2): 103923 (2024) - [j139]Shanshan Zhang
, Fengchun Huang
, Lingling Yu, Jeremy Fei Wang
, Paul Benjamin Lowry:
A dual-process model to explain self-disclosure on online social networking sites: examining the moderating effect of enjoyment. Internet Res. 34(4): 1456-1487 (2024) - [j138]Feng Xu
, Carol Hsu
, Tawei David Wang
, Paul Benjamin Lowry
:
The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation. Inf. Syst. J. 34(4): 1144-1174 (2024) - [j137]Yanli Jia, Libo Liu
, Paul Benjamin Lowry
:
How do consumers make behavioural decisions on social commerce platforms? The interaction effect between behaviour visibility and social needs. Inf. Syst. J. 34(5): 1703-1736 (2024) - [j136]Kristijan Mirkovski
, Kamel Rouibah
, Paul Benjamin Lowry, Joanna Paliszkiewicz, Marzena Ganc:
Cross-country determinants of citizens' e-government reuse intention: empirical evidence from Kuwait and Poland. Inf. Technol. People 37(4): 1864-1896 (2024) - [j135]Sutirtha Chatterjee, Suranjan Chakraborty, H. Kevin Fulk, Paul Benjamin Lowry:
The Role of Dissonant Relational Multiplexity in Information System Implementation Failures: Insights from a Grounded Theory Approach. J. Assoc. Inf. Syst. 25(5): 4 (2024) - [c40]Bryan I. Hammer, Andy Luse, Paul Benjamin Lowry:
Anchoring-and-Adjustment, Approach-Avoidance Disposition, and Information Sensitivity on Information Disclosure: A Longitudinally, Time-Ordered Experiment Using EEG in E-Commerce and Social Media. ECIS 2024 - 2023
- [j134]David M. Hull
, Sebastian Walter Schuetz
, Paul Benjamin Lowry
:
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Comput. Secur. 129: 103252 (2023) - [j133]Libo Liu, Kristijan Mirkovski
, Paul Benjamin Lowry
, Quan Vu:
"Do as I say but not as I do": Influence of political leaders' populist communication styles on public adherence in a crisis using the global case of COVID-19 movement restrictions. Data Inf. Manag. 7(2): 100039 (2023) - [j132]Eduardo D. Villacis Calderon, Tabitha L. James
, Paul Benjamin Lowry
:
How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective. Data Inf. Manag. 7(3): 100042 (2023) - [j131]Ghazwan Hassna
, Kamel Rouibah
, Paul Benjamin Lowry, Joanna Paliszkiewicz
, Magdalena Madra-Sawicka
:
The roles of user interface design and uncertainty avoidance in B2C ecommerce success: Using evidence from three national cultures. Electron. Commer. Res. Appl. 61: 101297 (2023) - [j130]Rachida Parks, Rolf T. Wigand, Paul Benjamin Lowry
:
Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework. Eur. J. Inf. Syst. 32(6): 1052-1069 (2023) - [j129]Robert M. Davison
, Paul Benjamin Lowry:
ISJ editorial: Addressing the implications of recent developments in journal impact factors. Inf. Syst. J. 33(3): 419-436 (2023) - [j128]Antonio Díaz-Andrade, Monideepa Tarafdar, Robert M. Davison
, Andrew M. Hardin, Angsana A. Techatassanasoontorn, Paul Benjamin Lowry, Sutirtha Chatterjee, Gerhard Schwabe
:
The importance of theory at the Information Systems Journal. Inf. Syst. J. 33(4): 693-702 (2023) - [j127]Le Wang
, Paul Benjamin Lowry
, Xin (Robert) Luo
, Han Li
:
Moving Consumers from Free to Fee in Platform-Based Markets: An Empirical Study of Multiplayer Online Battle Arena Games. Inf. Syst. Res. 34(1): 275-296 (2023) - [j126]A. J. Burns
, Tom L. Roberts
, Clay Posey
, Paul Benjamin Lowry
, Bryan Fuller
:
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Inf. Syst. Res. 34(1): 342-362 (2023) - [j125]Jun Zhang, Qiqi Jiang, Wenping Zhang, Lele Kang, Paul Benjamin Lowry, Zhang Xiong:
Explaining the Outcomes of Social Gamification: A Longitudinal Field Experiment. J. Manag. Inf. Syst. 40(2): 401-439 (2023) - [j124]Paul Benjamin Lowry, Junji Xiao, Jia Yuan:
How Lending Experience and Borrower Credit Influence Rational Herding Behavior in Peer-to-Peer Microloan Platform Markets. J. Manag. Inf. Syst. 40(3): 914-952 (2023) - [j123]Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran
, Nicholas James Brown
:
Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis. J. Manag. Inf. Syst. 40(4): 1099-1138 (2023) - 2022
- [j122]Tabitha L. James, Eduardo D. Villacis Calderon, France Bélanger, Paul Benjamin Lowry:
The mediating role of group dynamics in shaping received social support from active and passive use in online health communities. Inf. Manag. 59(3): 103606 (2022) - [j121]Milad Baghersad
, Christopher W. Zobel
, Paul Benjamin Lowry
, Sutirtha Chatterjee
:
The roles of prior experience and the location on the severity of supply chain disruptions. Int. J. Prod. Res. 60(16): 5051-5070 (2022) - [j120]Nik Rushdi Hassan, Paul Benjamin Lowry, Lars Mathiassen:
Useful Products in Information Systems Theorizing: A Discursive Formation Perspective. J. Assoc. Inf. Syst. 23(2): 7 (2022) - [j119]Tabitha L. James, France Bélanger, Paul Benjamin Lowry:
The Mediating Role of Fitness Technology Enablement of Psychological Need Satisfaction and Frustration on the Relationship between Goals for Fitness Technology Use and Use Outcomes. J. Assoc. Inf. Syst. 23(4): 4 (2022) - [j118]Xiling Cui, Qiang Zhou, Paul Benjamin Lowry, Yi Wang:
Do Enterprise Systems Necessarily Lead to Innovation? Identifying the Missing Links with A Moderated Mediation Model. Pac. Asia J. Assoc. Inf. Syst. 14(1): 5 (2022) - 2021
- [j117]Brian Kimball Dunn, Narayan Ramasubbu
, Matthew L. Jensen, Dennis F. Galletta, Paul Benjamin Lowry:
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes. AIS Trans. Hum. Comput. Interact. 13(2): 206-242 (2021) - [j116]Syed Emad Azhar Ali
, Fong-Woon Lai, P. D. D. Dominic, Nicholas James Brown
, Paul Benjamin Lowry
, Rao Faizan Ali:
Stock market reactions to favorable and unfavorable information security events: A systematic literature review. Comput. Secur. 110: 102451 (2021) - [j115]Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang, Rachida Parks:
Patients' compliance behavior in a personalized mobile patient education system (PMPES) setting: Rational, social, or personal choices? Int. J. Medical Informatics 145: 104295 (2021) - [j114]Mario Silic
, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Inf. Syst. Frontiers 23(2): 329-341 (2021) - [j113]Sutirtha Chatterjee
, Gregory D. Moody
, Paul Benjamin Lowry
, Suranjan Chakraborty, Andrew M. Hardin
:
The nonlinear influence of harmonious information technology affordance on organisational innovation. Inf. Syst. J. 31(2): 294-322 (2021) - [j112]Yan Chen
, Dennis F. Galletta
, Paul Benjamin Lowry
, Xin (Robert) Luo
, Gregory D. Moody, Robert Willison:
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Inf. Syst. Res. 32(3): 1043-1065 (2021) - [j111]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher:
Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature. J. Assoc. Inf. Syst. 22(5): 4 (2021) - 2020
- [j110]Bongsik Shin, Paul Benjamin Lowry
:
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability' that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 92: 101761 (2020) - [j109]Xiling Cui, Vincent S. Lai, Paul Benjamin Lowry, Yang Lei:
The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model. Decis. Support Syst. 138: 113397 (2020) - [j108]Paul Benjamin Lowry
, Stacie Petter
, Jan Marco Leimeister
:
Desperately seeking the artefacts and the foundations of native theory in gamification research: why information systems researchers can play a legitimate role in this discourse and how they can better contribute. Eur. J. Inf. Syst. 29(6): 609-620 (2020) - [j107]Dezhi Wu, Gregory D. Moody, Jun Zhang
, Paul Benjamin Lowry
:
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention. Inf. Manag. 57(5): 103235 (2020) - [j106]Isabella Seeber
, Lena Waizenegger
, Stefan Seidel
, Stefan Morana
, Izak Benbasat, Paul Benjamin Lowry:
Collaborating with technology-based autonomous agents. Internet Res. 30(1): 1-18 (2020) - [j105]Mario Silic
, Paul Benjamin Lowry:
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. J. Manag. Inf. Syst. 37(1): 129-161 (2020) - [j104]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher
:
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J. Manag. Inf. Syst. 37(3): 723-757 (2020) - [j103]Sutirtha Chatterjee
, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization. J. Strateg. Inf. Syst. 29(1): 101596 (2020) - [c39]Daeeun Daniel Choi, Paul Benjamin Lowry, Alan Wang:
The Design of Personal Privacy and Security Risk Scores for Minimizing Consumers' Cognitive Gaps in IoT Settings. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j102]Nadia Olivero
, Andrea Greco
, Anna Maria Annoni
, Patrizia Steca, Paul Benjamin Lowry
:
Does opportunity make the thief? Abilities and moral disengagement in illegal downloading. Behav. Inf. Technol. 38(12): 1273-1289 (2019) - [j101]Sadaf Hina
, Dhanapal Durai Dominic, Paul Benjamin Lowry
:
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. Comput. Secur. 87 (2019) - [j100]Frederik von Briel
, Christoph Schneider
, Paul Benjamin Lowry
:
Absorbing Knowledge from and with External Partners: The Role of Social Integration Mechanisms. Decis. Sci. 50(1): 7-45 (2019) - [j99]Shanshan Zhang
, Ron Chi-Wai Kwok, Paul Benjamin Lowry
, Zhiying Liu, Ji Wu:
The influence of role stress on self-disclosure on social networking sites: A conservation of resources perspective. Inf. Manag. 56(7) (2019) - [j98]John D'Arcy
, Paul Benjamin Lowry
:
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. Inf. Syst. J. 29(1): 43-69 (2019) - [j97]David M. Hull
, Paul Benjamin Lowry
, James E. Gaskin
, Kristijan Mirkovski:
A storyteller's guide to problem-based learning for information systems management education. Inf. Syst. J. 29(5): 1040-1057 (2019) - [j96]Kristijan Mirkovski
, James E. Gaskin
, David M. Hull
, Paul Benjamin Lowry
:
Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment. Inf. Syst. J. 29(6): 1153-1177 (2019) - [j95]A. J. Burns
, Tom L. Roberts
, Clay Posey, Paul Benjamin Lowry
:
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking. Inf. Syst. Res. 30(4): 1228-1247 (2019) - [j94]Shanshan Zhang
, Ron Chi-Wai Kwok, Paul Benjamin Lowry, Zhiying Liu:
Does more accessibility lead to more disclosure? Exploring the influence of information accessibility on self-disclosure in online social networks. Inf. Technol. People 32(3): 754-780 (2019) - [j93]Brian Kimball Dunn, Narayan Ramasubbu
, Dennis F. Galletta
, Paul Benjamin Lowry:
Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography. J. Manag. Inf. Syst. 36(2): 418-449 (2019) - [j92]Paul Benjamin Lowry
, Jun Zhang
, Gregory D. Moody
, Sutirtha Chatterjee
, Chuang Wang
, Tailai Wu
:
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism. J. Manag. Inf. Syst. 36(4): 1142-1178 (2019) - [c38]Nik Rushdi Hassan, Lars Mathiassen, Paul Benjamin Lowry:
Enhancing Theoretical Contribution in is Research: the Case of Technology Adoption. ECIS 2019 - [c37]Sutirtha Chatterjee, Suprateek Sarker, Gregory D. Moody, Paul Benjamin Lowry:
The Effect of CIO Virtues on CIO Role Effectiveness. HICSS 2019: 1-10 - 2018
- [j91]Horst Treiblmaier, Lisa-Maria Putz, Paul Benjamin Lowry:
Research Commentary: Setting a Definition, Context, and Theory-Based Research Agenda for the Gamification of Non-Gaming Applications. AIS Trans. Hum. Comput. Interact. 10(3): 1 (2018) - [j90]Rachida Parks, Paul Benjamin Lowry, Rolf T. Wigand, Nitin Agarwal, Therese L. Williams
:
Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion. Comput. Educ. 125: 308-326 (2018) - [j89]Philip Menard
, Merrill Warkentin
, Paul Benjamin Lowry:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput. Secur. 75: 147-166 (2018) - [j88]Robert Willison, Paul Benjamin Lowry:
Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. Data Base 49(SI): 81-102 (2018) - [j87]Ling Jiang, Kristijan Mirkovski
, Jeffrey D. Wall, Christian Wagner
, Paul Benjamin Lowry
:
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities. Internet Res. 28(4): 988-1028 (2018) - [j86]Chao-Min Chiu, Jack Shih-Chieh Hsu, Paul Benjamin Lowry, Ting-Peng Liang:
Solving the Interpretational-Confounding and Interpretational-Ambiguity Problems of Formative Construct Modeling in Behavioral Research: Proposing a Two-Stage Fixed-Weight Redundancy Approach. J. Assoc. Inf. Syst. 19(7): 4 (2018) - [j85]Robert Willison, Paul Benjamin Lowry, Raymond Paternoster:
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. J. Assoc. Inf. Syst. 19(12): 3 (2018) - [c36]Ghazwan Hassna, Paul Benjamin Lowry:
Big Data Capability, Customer Agility, and Organization Performance: A Dynamic Capability Perspective. AMCIS 2018 - 2017
- [j84]Carol Saunders, Susan A. Brown
, Bendik Bygstad, Alan R. Dennis, Carlos Ferran, Dennis F. Galletta
, Ting-Peng Liang, Paul Benjamin Lowry, Jan Recker, Suprateek Sarker:
Goals, Values, and Expectations of the AIS Family of Journals. Commun. Assoc. Inf. Syst. 41: 16 (2017) - [j83]Paul Benjamin Lowry
, Jun Zhang
, Tailai Wu:
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Comput. Hum. Behav. 68: 104-120 (2017) - [j82]A. J. Burns
, Clay Posey, Tom L. Roberts, Paul Benjamin Lowry:
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Comput. Hum. Behav. 68: 190-209 (2017) - [j81]Jie Wei, Stefan Seedorf, Paul Benjamin Lowry, Christian Thum, Thimo Schulze:
How increased social presence through co-browsing influences user engagement in collaborative online shopping. Electron. Commer. Res. Appl. 24: 84-99 (2017) - [j80]Rachida Parks, Heng Xu, Chao-Hsien Chu
, Paul Benjamin Lowry:
Examining the intended and unintended consequences of organisational privacy safeguards. Eur. J. Inf. Syst. 26(1): 37-65 (2017) - [j79]Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta
:
It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. Eur. J. Inf. Syst. 26(4): 379-413 (2017) - [j78]Paul Benjamin Lowry, Tamara Dinev, Robert Willison:
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. Eur. J. Inf. Syst. 26(6): 546-563 (2017) - [j77]Thomas Rusch
, Paul Benjamin Lowry
, Patrick Mair, Horst Treiblmaier
:
Breaking free from the limitations of classical test theory: Developing and measuring information systems scales using item response theory. Inf. Manag. 54(2): 189-203 (2017) - [j76]Xiling Cui, Nan Zhang, Paul Benjamin Lowry:
The agent bidding habit and use model (ABHUM) and its validation in the Taobao online auction context. Inf. Manag. 54(3): 281-291 (2017) - [j75]Patrick Mair, Horst Treiblmaier
, Paul Benjamin Lowry:
Using multistage competing risks approaches to model web page transitions. Internet Res. 27(3): 650-669 (2017) - [j74]Shuyuan Mary Ho
, Paul Benjamin Lowry, Merrill Warkentin
, Yanyun Yang, Jonathan M. Hollister
:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j73]Carol Saunders, Sue Brown
, Bendik Bygstad, Alan R. Dennis, Carlos Ferran, Dennis F. Galletta, Ting-Peng Liang, Paul Benjamin Lowry, Jan Recker, Suprateek Sarker:
Goals, Values, and Expectations of the AIS Family of Journals. J. Assoc. Inf. Syst. 18(9): 2 (2017) - [j72]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace
, Merrill Warkentin
:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - [j71]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee
:
Using IT Design to Prevent Cyberbullying. J. Manag. Inf. Syst. 34(3): 863-901 (2017) - [c35]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using the Control Balance Theory to Explain Social Media Deviance. HICSS 2017: 1-10 - 2016
- [j70]Mark J. Keith, Jeffry S. Babb, Christopher P. Furner, Amjad Abdullat, Paul Benjamin Lowry:
Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications. AIS Trans. Hum. Comput. Interact. 8(3): 3 (2016) - [j69]Kamel Rouibah
, Paul Benjamin Lowry, Yujong Hwang:
The effects of perceived enjoyment and perceived risks on trust formation and intentions to use online payment systems: New perspectives from an Arab country. Electron. Commer. Res. Appl. 19: 33-43 (2016) - [j68]Xiling Cui, Vincent S. Lai, Paul Benjamin Lowry:
How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China. Inf. Manag. 53(5): 609-624 (2016) - [j67]Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, Justin Scott Giboney:
Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Int. J. Hum. Comput. Stud. 91: 24-36 (2016) - [j66]Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Mikko T. Siponen:
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Inf. Syst. Res. 27(4): 962-986 (2016) - [j65]Kristijan Mirkovski
, Frederik von Briel
, Paul Benjamin Lowry:
Semantic Learning-Based Innovation Framework for Social Media. IT Prof. 18(6): 26-32 (2016) - [j64]Jeffrey D. Wall, Paul Benjamin Lowry, Jordan B. Barlow:
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess. J. Assoc. Inf. Syst. 17(1): 4 (2016) - [j63]James Eric Gaskin, Paul Benjamin Lowry, David M. Hull:
Leveraging Multimedia to Advance Science by Disseminating a Greater Variety of Scholarly Contributions in More Accessible Formats. J. Assoc. Inf. Syst. 17(6): 1 (2016) - [j62]Vincent Siu-king Lai, Fujun Lai, Paul Benjamin Lowry:
Technology Evaluation and Imitation: Do They Have Differential or Dichotomous Effects on ERP Adoption and Assimilation in China? J. Manag. Inf. Syst. 33(4): 1209-1251 (2016) - [j61]Paul Benjamin Lowry, David W. Wilson:
Creating agile organizations through IT: The influence of internal IT service perceptions on IT service quality and IT agility. J. Strateg. Inf. Syst. 25(3): 211-226 (2016) - [j60]Paul Benjamin Lowry, John D'Arcy, Bryan I. Hammer
, Gregory D. Moody:
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. J. Strateg. Inf. Syst. 25(3): 232-240 (2016) - [j59]Xiling Cui, Lai Kuen Law, Paul Benjamin Lowry, Qiuzhen Wang:
A Contingency Model of Bidding Strategies in Online Auctions in China. Pac. Asia J. Assoc. Inf. Syst. 8(2): 4 (2016) - [c34]Sebastian Walter Schütz, Paul Benjamin Lowry, Jason Bennett Thatcher:
Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations. PACIS 2016: 74 - [c33]Jun Zhang, Paul Benjamin Lowry:
Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance. PACIS 2016: 184 - 2015
- [j58]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett:
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example. Commun. Assoc. Inf. Syst. 36: 11 (2015) - [j57]Jinwei Cao, K. Asli Basoglu, Hong Sheng, Paul Benjamin Lowry:
A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research. Commun. Assoc. Inf. Syst. 36: 37 (2015) - [j56]Justin Scott Giboney, Susan A. Brown
, Paul Benjamin Lowry, Jay F. Nunamaker Jr.:
User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit. Decis. Support Syst. 72: 1-10 (2015) - [j55]Jie Wei, Paul Benjamin Lowry, Stefan Seedorf:
The assimilation of RFID technology by Chinese companies: A technology diffusion perspective. Inf. Manag. 52(6): 628-642 (2015) - [j54]Paul Benjamin Lowry, Clay Posey, Rebecca J. Bennett, Tom L. Roberts:
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust. Inf. Syst. J. 25(3): 193-273 (2015) - [j53]Paul Benjamin Lowry, Gregory D. Moody:
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Inf. Syst. J. 25(5): 433-463 (2015) - [j52]Mark J. Keith
, Jeffry S. Babb, Paul Benjamin Lowry, Christopher P. Furner, Amjad Abdullat:
The role of mobile-computing self-efficacy in consumer information disclosure. Inf. Syst. J. 25(6): 637-667 (2015) - [j51]Jack Shih-Chieh Hsu, Sheng-Pao Shih, Yu Wen Hung, Paul Benjamin Lowry:
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. Inf. Syst. Res. 26(2): 282-300 (2015) - [j50]Paul Benjamin Lowry, James Eric Gaskin, Gregory D. Moody:
Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. J. Assoc. Inf. Syst. 16(7): 3 (2015) - [j49]Kamel Rouibah
, Paul Benjamin Lowry, Laila Almutairi:
Dimensions of Business-to-Consumer (B2C) Systems Success in Kuwait: Testing a Modified DeLone and McLean IS Success Model in an E-Commerce Context. J. Glob. Inf. Manag. 23(3): 41-71 (2015) - [j48]Sutirtha Chatterjee
, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin
:
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation. J. Manag. Inf. Syst. 32(3): 158-196 (2015) - [j47]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry:
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets. J. Manag. Inf. Syst. 32(4): 179-214 (2015) - [j46]Anthony Vance
, Paul Benjamin Lowry, Dennis Eggett:
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations. MIS Q. 39(2): 345-366 (2015) - [j45]Scott R. Boss, Dennis F. Galletta
, Paul Benjamin Lowry, Gregory D. Moody, Peter Polak:
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Q. 39(4): 837-864 (2015) - [c32]Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang:
Patient Compliance Behavior in a Mobile Healthcare System: An Integration of Theories of Rational Choice and Planned Behavior. HICSS 2015: 2976-2984 - [c31]Nik Hassan, Paul Benjamin Lowry:
Seeking Middle-Range Theories in Information Systems Research. ICIS 2015 - [c30]Kristijan Mirkovski, Paul Benjamin Lowry, Frederik von Briel, Libo Liu:
The Role of Innovation Intermediaries in Collaborative Networks of Small and Medium-Sized Enterprises. PACIS 2015: 127 - [c29]Jun Zhang, Victor Dibia, Alexey Sodnomov, Paul Benjamin Lowry:
Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms. PACIS 2015: 140 - [c28]Xiling Cui, Qiang Zhou, Paul Benjamin Lowry:
The Influence of Information and Communication Technology and Knowledge Sharing on Balanced Open Innovation. PACIS 2015: 192 - 2014
- [j44]Gregory D. Moody, Dennis F. Galletta
, Paul Benjamin Lowry:
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior. Electron. Commer. Res. Appl. 13(4): 266-282 (2014) - [j43]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Ross T. Hightower:
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Inf. Manag. 51(5): 551-567 (2014) - [j42]Paul Benjamin Lowry, Nathan W. Twyman
, Matthew D. Pickard
, Jeffrey L. Jenkins
, Quang "Neo" Bui
:
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust. Inf. Manag. 51(5): 579-594 (2014) - [j41]Paul Benjamin Lowry, David W. Wilson, William L. Haig:
A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer Trust. Int. J. Hum. Comput. Interact. 30(1): 63-93 (2014) - [j40]Jeffrey L. Jenkins
, G. Mark Grimes, Jeffrey Gainer Proudfoot, Paul Benjamin Lowry:
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Inf. Technol. Dev. 20(2): 196-213 (2014) - [j39]Nathan W. Twyman
, Paul Benjamin Lowry, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. J. Manag. Inf. Syst. 31(3): 106-137 (2014) - [j38]Paul Benjamin Lowry, James E. Gaskin:
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It. IEEE Trans. Prof. Commun. 57(2): 123-146 (2014) - [c27]Mark J. Keith
, Jeffry S. Babb, Paul Benjamin Lowry:
A Longitudinal Study of Information Privacy on Mobile Devices. HICSS 2014: 3149-3158 - [c26]Mark J. Keith, Courtenay Maynes, Paul Benjamin Lowry, Jeffry S. Babb:
Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure. ICIS 2014 - [c25]Paul Benjamin Lowry, Dongsong Zhang, Dezhi Wu:
Understanding Patients' Compliance Behavior in a Mobile Healthcare System: The Role of Trust and Planned Behavior. ICIS 2014 - 2013
- [j37]Robert E. Crossler
, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin
, Richard L. Baskerville
:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j36]Jie Wei, Stefan Seedorf, Paul Benjamin Lowry:
Investigation of the Radio Frequency Identification Assimilation Process in China: A Stage-based Model Perspective. Electron. J. Inf. Syst. Dev. Ctries. 57(1): 1-17 (2013) - [j35]Paul Benjamin Lowry, Tom L. Roberts, Nicholas C. Romano Jr.:
What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams. Int. J. Hum. Comput. Stud. 71(4): 455-474 (2013) - [j34]Mark J. Keith
, Samuel C. Thompson, Joanne E. Hale, Paul Benjamin Lowry, Chapman Greer:
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. Int. J. Hum. Comput. Stud. 71(12): 1163-1173 (2013) - [j33]Paul Benjamin Lowry, James Eric Gaskin, Nathan W. Twyman
, Bryan I. Hammer
, Tom L. Roberts:
Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM). J. Assoc. Inf. Syst. 14(11): 2 (2013) - [j32]Anthony Vance
, Paul Benjamin Lowry, Dennis Eggett:
Using Accountability to Reduce Access Policy Violations in Information Systems. J. Manag. Inf. Syst. 29(4): 263-290 (2013) - [j31]Paul Benjamin Lowry, Gregory D. Moody, Dennis F. Galletta
, Anthony Vance
:
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. J. Manag. Inf. Syst. 30(1): 153-190 (2013) - [j30]Paul Benjamin Lowry, Gregory D. Moody, James E. Gaskin, Dennis F. Galletta
, Sean L. Humpherys, Jordan B. Barlow, David W. Wilson:
Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? MIS Q. 37(4): 993-1012 (2013) - [j29]Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, James F. Courtney:
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors. MIS Q. 37(4): 1189-1210 (2013) - [c24]Paul Benjamin Lowry, Greg D. Moody:
Explaining Opposing Compliance Motivations towards Organizational Information Security Policies. HICSS 2013: 2998-3007 - [c23]Thomas Rusch, Patrick Mair, Paul Benjamin Lowry, Horst Treiblmaier:
Developing and Measuring IS Scales Using Item Response Theory. ICIS 2013 - [c22]Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta:
Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce. PACIS 2013: 173 - 2012
- [j28]Paul Benjamin Lowry, Greg D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, Taylor Wells
:
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Assoc. Inf. Sci. Technol. 63(4): 755-776 (2012) - [c21]Anthony Vance
, Braden Molyneux, Paul Benjamin Lowry:
Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable. HICSS 2012: 4623-4632 - [c20]Paul Benjamin Lowry, Kamel Rouibah, Greg D. Moody, Mikko T. Siponen:
Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use. PACIS 2012: 147 - 2011
- [j27]Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan M. Schuetzler, Paul Benjamin Lowry, Anthony Vance
:
Overview and Guidance on Agile Development in Large Organizations. Commun. Assoc. Inf. Syst. 29: 2 (2011) - [j26]Paul Benjamin Lowry, Jinwei Cao, Andrea Everard:
Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. J. Manag. Inf. Syst. 27(4): 163-200 (2011) - [j25]Matthew L. Jensen, Paul Benjamin Lowry, Jeffrey L. Jenkins
:
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment. J. Manag. Inf. Syst. 28(1): 201-233 (2011) - [j24]Douglas L. Dean, Paul Benjamin Lowry, Sean L. Humpherys:
Profiling the Research Productivity of Tenured Information Systems Faculty at U.S. Institutions. MIS Q. 35(1): 1-15 (2011) - 2010
- [j23]Clay Posey, Paul Benjamin Lowry, Tom L. Roberts, T. Selwyn Ellis
:
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities. Eur. J. Inf. Syst. 19(2): 181-195 (2010) - [j22]Anthony Vance, Paul Benjamin Lowry, Jeffrey A. Ogden:
Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect. Int. J. Appl. Logist. 1(1): 48-66 (2010) - [j21]Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou, Xiaolan Fu:
Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups. Inf. Syst. J. 20(3): 297-315 (2010) - [j20]Matthew L. Jensen, Paul Benjamin Lowry, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. J. Manag. Inf. Syst. 27(1): 175-202 (2010) - [c19]Paul Benjamin Lowry, Justin Scott Giboney, Ryan M. Schuetzler
, Jacob Richardson, Tom Gregory, John Romney, Bonnie Brinton Anderson:
The Value of Distrust in Computer-Based Decision-Making Groups. HICSS 2010: 1-10
2000 – 2009
- 2009
- [j19]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry:
Creating automated plans for Semantic Web applications through planning as model checking. Expert Syst. Appl. 36(7): 10595-10603 (2009) - [j18]Paul Benjamin Lowry, Tom L. Roberts, Douglas L. Dean, George M. Marakas
:
Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation. J. Assoc. Inf. Syst. 10(3): 5 (2009) - [j17]Conan C. Albrecht, Marshall B. Romney, Paul Benjamin Lowry, Greg D. Moody:
The IS Core: An Integration of the Core IS Courses. J. Inf. Syst. Educ. 20(4): 451-468 (2009) - [j16]Paul Benjamin Lowry, Nicholas C. Romano Jr., Jeffrey L. Jenkins
, Randy W. Guthrie:
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups. J. Manag. Inf. Syst. 26(1): 155-195 (2009) - 2008
- [j15]Aaron Curtis, Taylor M. Wells
, Paul Benjamin Lowry, Trevor Higbee:
An Overview and Tutorial of the Repertory Grid Technique in Information Systems Research. Commun. Assoc. Inf. Syst. 23: 3 (2008) - [j14]Dongsong Zhang, Paul Benjamin Lowry:
Issues, Limitations, and Opportunities in Cross-Cultural Research on Collaborative Software in Information Systems. J. Glob. Inf. Manag. 16(1): 61-84 (2008) - [j13]Paul Benjamin Lowry, Anthony Vance
, Greg D. Moody, Bryan Beckman, Aaron Read:
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites. J. Manag. Inf. Syst. 24(4): 199-224 (2008) - 2007
- [j12]Gilbert G. Karuga, Paul Benjamin Lowry, Vernon J. Richardson:
Assessing the Impact of Premier Information Systems Research over Time. Commun. Assoc. Inf. Syst. 19: 7 (2007) - [j11]Paul Benjamin Lowry, Gilbert G. Karuga, Vernon J. Richardson:
Assessing Leading Institutions, Faculty, and Articles in Premier Information Systems Research Journals. Commun. Assoc. Inf. Syst. 20: 16 (2007) - [j10]James V. Hansen, Paul Benjamin Lowry, Rayman D. Meservy, Daniel M. McDonald:
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decis. Support Syst. 43(4): 1362-1374 (2007) - [j9]Dongsong Zhang, Paul Benjamin Lowry, Lina Zhou, Xiaolan Fu:
The Impact of Individualism - Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence. J. Manag. Inf. Syst. 23(4): 53-80 (2007) - [c18]Paul Benjamin Lowry, Tom L. Roberts, Trevor Higbee:
First Impressions with Websites: The Effect of the Familiarity and Credibility of Corporate Logos on Perceived Consumer Swift Trust of Websites. HCI (4) 2007: 77-85 - [c17]Dongsong Zhang, Doug Vogel, Paul Benjamin Lowry:
Minitack Introduction: Cross-cultural Issues in Collaboration Technology. HICSS 2007: 11 - [c16]Paul Benjamin Lowry, Dongsong Zhang, Lina Zhou, Xiaolan Fu:
The Impact of National Culture and Social Pr esence on Trust and Communication Quality within Collabor ative Groups. HICSS 2007: 12 - [c15]Paul Benjamin Lowry, Scott McCoy:
Interactive Digital Entertainment, Social Computing, and Lifestyle Computing. HICSS 2007: 159 - [c14]Greg D. Moody, Taylor Wells
, Paul Benjamin Lowry:
The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing. HICSS 2007: 160 - 2006
- [j8]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers
:
The application of model checking for securing e-commerce transactions. Commun. ACM 49(6): 97-101 (2006) - [j7]Paul Benjamin Lowry, Taylor M. Wells
, Greg D. Moody, Sean L. Humpherys, Degan Kettles:
Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management. Commun. Assoc. Inf. Syst. 17: 6 (2006) - [j6]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers
:
Standards and verification for fair-exchange and atomicity in e-commerce transactions. Inf. Sci. 176(8): 1045-1066 (2006) - [c13]Paul Benjamin Lowry, Nicholas C. Romano Jr., Randy W. Guthrie:
Explaining and Predicting Outcomes of Large Classrooms Using Audience Response Systems. HICSS 2006 - [c12]Paul Benjamin Lowry, Trent J. Spaulding, Taylor Wells
, Greg D. Moody, Kevin Moffit, Sebastian Madariaga:
A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction. HICSS 2006 - [c11]Tom L. Roberts, Paul Benjamin Lowry, Paul H. Cheney, Ross T. Hightower:
Improving Group Communication Outcomes with Collaborative Software: The Impact of Group Size, Media Richness, and Social Presence. HICSS 2006 - [c10]Dongsong Zhang, Paul Benjamin Lowry, Xiaolan Fu:
Culture and Media Effects on Group Decision Making under Majority Influence. HICSS 2006 - [c9]Dongsong Zhang, Doug Vogel, Paul Benjamin Lowry:
Minitrack Introduction. HICSS 2006 - 2005
- [j5]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers
:
Model checking for design and assurance of e-Business processes. Decis. Support Syst. 39(3): 333-344 (2005) - [j4]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers
:
Model checking for E-business control and assurance. IEEE Trans. Syst. Man Cybern. Part C 35(3): 445-450 (2005) - [c8]Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry:
Dependability Auditing with Model Checking. AMCIS 2005: 276 - [c7]Tom L. Roberts, Paul Benjamin Lowry, Nicholas C. Romano Jr.:
Improving Design Artifact Reviews with Group Support Systems and an Extension of Heuristic Evaluation Techniques. HICSS 2005 - 2004
- [j3]Paul Benjamin Lowry, Denton Romans, Aaron Curtis:
Global Journal Prestige and Supporting Disciplines: A Scientometric Study of Information Systems Journals. J. Assoc. Inf. Syst. 5(2): 1 (2004) - 2003
- [j2]Paul Benjamin Lowry, Conan C. Albrecht, Jay F. Nunamaker Jr., James D. Lee:
Evolutionary development and research on Internet-based collaborative writing tools and processes to enhance eWriting in an eGovernment setting. Decis. Support Syst. 34(3): 229-252 (2003) - [j1]Douglas L. Dean, Paul Benjamin Lowry:
Teaching Case: Consulting at the Laser ISP (LISP) Company: Using Excel Metrics Capabilities to Solve Semi-Structured Management Problems. J. Inf. Syst. Educ. 14(4): 353-360 (2003) - [c6]Paul Benjamin Lowry, Tom L. Roberts:
Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software. AMCIS 2003: 284 - [c5]Paul Benjamin Lowry, Denton Romans:
New Perspectives on Global Information Systems Journal Rankings and Reference Disciplines. AMCIS 2003: 367 - 2002
- [c4]Paul Benjamin Lowry, Jay F. Nunamaker Jr.:
Synchronous, Distributed Collaborative Writing for Policy Agenda Setting Using Collaboratus. HICSS 2002: 10 - [c3]Paul Benjamin Lowry, Conan C. Albrecht, James D. Lee, Jay F. Nunamaker Jr.:
Users Experiences in Collaborative Writing Using Collaboratus: An Internet-Based Collaborative Work. HICSS 2002: 21 - [c2]Paul Benjamin Lowry, Jay F. Nunamaker Jr.:
Using the ThinkLet Framework to Improve Distributed Collaborative Writing. HICSS (Addendum) 2002 - 2001
- [c1]Paul Benjamin Lowry:
XML Data Mediation and Collaboration: A Proposed Comprehensive Architecture and Query Requirements for using to Mediate Heterogeneous Data Sources and Targets. HICSS 2001
Coauthor Index
aka: Gregory D. Moody

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint