IS

Lowry, Paul Benjamin

Topic Weight Topic Terms
1.053 research journals journal information systems articles academic published business mis faculty discipline analysis publication management
0.983 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.918 human awareness conditions point access humans images accountability situational violations result reduce moderation gain people
0.879 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.658 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.634 model research data results study using theoretical influence findings theory support implications test collected tested
0.620 decision accuracy aid aids prediction experiment effects accurate support making preferences interaction judgment hybrid perceptual
0.552 model use theory technology intention information attitude acceptance behavioral behavior intentions research understanding systems continuance
0.458 organizational organizations effectiveness factors managers model associated context characteristics variables paper relationships level attention environmental
0.433 group gss support groups systems brainstorming research process electronic members results paper effects individual ebs
0.411 social networks influence presence interactions network media networking diffusion implications individuals people results exchange paper
0.354 communication media computer-mediated e-mail richness electronic cmc mail medium message performance convergence used communications messages
0.313 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.269 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.257 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given
0.250 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.247 privacy information concerns individuals personal disclosure protection concern consumers practices control data private calculus regulation
0.242 using subjects results study experiment did conducted task time used experienced use preference experimental presented
0.240 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.221 design artifacts alternative method artifact generation approaches alternatives tool science generate set promising requirements evaluation
0.220 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality
0.217 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.213 web site sites content usability page status pages metrics browsing design use web-based guidelines results
0.192 cultural culture differences cross-cultural states united status national cultures japanese studies japan influence comparison versus
0.183 differences analysis different similar study findings based significant highly groups popular samples comparison similarities non-is
0.178 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.158 capabilities capability firm firms performance resources business information technology firm's resource-based competitive it-enabled view study
0.157 online users active paper using increasingly informational user data internet overall little various understanding empirical
0.156 users end use professionals user organizations applications needs packages findings perform specialists technical computing direct
0.156 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.154 satisfaction information systems study characteristics data results using user related field survey empirical quality hypotheses
0.153 problems issues major involved legal future technological impact dealing efforts current lack challenges subsystem related
0.148 collaborative groups feedback group work collective individuals higher effects efficacy perceived tasks members environment writing
0.139 decision making decisions decision-making makers use quality improve performance managers process better results time managerial
0.127 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration
0.126 recommendations recommender systems preferences recommendation rating ratings preference improve users frame contextual using frames sensemaking
0.124 structure organization structures organizational centralized decentralized study organizations forms decentralization processing communication sharing cbis activities
0.119 motivation intrinsic theory social extrinsic expectancy motivations motivate usage enjoyment rewards consequences reciprocity organizational motivational
0.117 technologies technology new findings efficiency deployed common implications engineers conversion change transformational opportunity deployment make
0.115 systems information research theory implications practice discussed findings field paper practitioners role general important key
0.112 modeling models model business research paradigm components using representation extension logical set existing way aspects
0.111 financial crisis reporting report crises turnaround intelligence reports cash forecasting situations time status adequately weaknesses
0.110 data used develop multiple approaches collection based research classes aspect single literature profiles means crowd
0.106 commitment need practitioners studies potential role consider difficult models result importance influence researchers established conduct
0.103 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative
0.102 media social content user-generated ugc blogs study online traditional popularity suggest different discourse news making

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Moody, Gregory D. 4 Vance, Anthony 4 Galletta, Dennis F. 3 Eggett, Dennis 2
Jenkins, Jeffrey L. 2 Jensen, Matthew L. 2 Nunamaker, Jr., Jay F. 2 Posey, Clay 2
Barlow, Jordan B. 1 Bennett, Rebecca J. 1 BECKMAN, BRYAN 1 Burgoon, Judee K 1
Burgoon, Judee K. 1 Boss, Scott R. 1 Courtney, James F. 1 Cao, Jinwei 1
Chatterjee, Sutirtha 1 CHAKRABORTY, SURANJAN 1 Dean, Douglas L. 1 Everard, Andrea 1
FU, XIAOLAN 1 Gaskin, James 1 Guthrie, Randy W. 1 Humpherys, Sean L. 1
Hsu, Jack Shih-Chieh 1 Hung, Yu Wen 1 Hardin, Andrew 1 Jr., Nicholas C. Romano 1
MOODY, GREG 1 Polak, Peter 1 Roberts, Tom L. 1 READ, AARON 1
Roberts, Tom L 1 Shih, Sheng-Pao 1 Siponen, Mikko 1 Twyman, Nathan W 1
Wilson, David W. 1 Wang, Chuang 1 Zhang, Dongsong 1 Zhou, Lina 1
Zhang, Jun 1
credibility assessment 3 social presence 3 accountability theory 2 anonymity 2
deception detection 2 factorial survey method 2 identifiability 2 information security 2
Protection-motivated behaviors 2 protection motivation theory 2 scientometrics 2 trust 2
AIS Senior Scholars basket of journals 1 associative network model of memory 1 audience response systems 1 access policy violations 1
accountability 1 awareness 1 automated screening kiosk 1 autonomous scientifically controlled screening system 1
affordance 1 awareness of monitoring 1 Behavioral information security 1 brand awareness 1
brand image 1 branding alliance 1 behavioral security 1 behavior 1
Carnegie classification 1 composite ranking or rating 1 CMC 1 computer-mediated communication 1
culture 1 CMC interactivity model (CMCIM) 1 collaboration 1 credibility 1
computer abuse 1 concealed information test 1 cyberbullying 1 cyberstalking 1
cyberharassment 1 coping appraisal information security 1 coping 1 deception 1
decision aids 1 decision making 1 decision support systems 1 defensive response 1
design science 1 disinhibition 1 deindividuation 1 differential association 1
differential reinforcement 1 definition 1 expert opinion 1 e-commerce 1
evaluation 1 eye-tracking measures 1 extra-role behaviors 1 ethical organizations 1
expectation of evaluation 1 faculty productivity 1 formal control 1 fear appeals 1
group decision making 1 group decision systems 1 group diversity 1 h-index 1
human--computer interaction (HCI) 1 impact factor 1 Information systems journal rankings 1 information integration theory 1
Internet 1 interactivity 1 instant messaging 1 indirect cues elicitation 1
IT artifacts 1 IS security 1 in-role behaviors 1 information security policy 1
ISP 1 imitation 1 information technology affordances 1 information technology strategy 1
information security policy violations 1 intentions 1 journal quality 1 large groups 1
linguistic analysis 1 multidimensional scaling 1 majority influence 1 monitoring 1
MIMIC model 1 mediation 1 moderation 1 model comparison 1
nomologies for dissemination of scientific knowledge 1 neutralization 1 organizational failure 1 organizational governance 1
orienting response 1 organizations 1 organizational capabilities 1 organizational courage 1
organizational innovation 1 organizational justice 1 organizational memory affordance 1 organizational temperance 1
organizational virtues 1 organizational wisdom process management 1 organizational commitment 1 publication standards 1
publication benchmarks 1 privacy 1 physical security 1 risk 1
self-citation 1 SenS-6 1 SenS-8 1 self-disclosure 1
self-disclosure technologies 1 social computing technologies 1 social exchange theory 1 social control theory 1
SCT 1 security management 1 social control 1 social media 1
social media cyberbullying model 1 SMCBM 1 social structure and social learning model 1 SSSL model 1
social learning 1 social learning theory 1 SLT 1 security 1
structural equation modeling 1 system backups 1 Tenure standards 1 theory of diversity 1
theory of technology dominance 1 theory of reasoned action 1 threat appraisal 1 threat 1
ultra-lean interactive media 1 ultra-lean interactivity 1 user-interface design 1 unauthorized access 1
virtual teams 1 virtue ethics 1 Web site quality 1 whistle-blowing 1
whistle-blowing reporting systems 1

Articles (18)

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model (Information Systems Research, 2016)
Authors: Abstract:
    The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a massive global audience. Unfortunately, such ubiquitous communication can be also used for negative purposes such as cyberbullying, which is the focus of this paper. Previous research on cyberbullying, consisting of 135 articles, has improved the understanding of why individualsÑmostly adolescentsÑengage in cyberbullying. However, our study addresses two key gaps in this literature: (1) how the information technology (IT) artifact fosters/inhibits cyberbullying and (2) why people are socialized to engage in cyberbullying. To address these gaps, we propose the social media cyberbullying model (SMCBM), which modifies Akers' [Akers RL (2011) Social Learning and Social Structure: A General Theory of Crime and Deviance, 2nd ed. (Transaction Publishers, New Brunswick, NJ)] social structure and social learning model. Because Akers developed his model for crimes in the physical world, we add a rich conceptualization of anonymity composed of five subconstructs as a key social media structural variable in the SMCBM to account for the IT artifact. We tested the SMCBM with 1,003 adults who have engaged in cyberbullying. The empirical findings support the SMCBM. Heavy social media use combined with anonymity facilitates the social learning process of cyberbullying in social media in a way that fosters cyberbullying. Our results indicate new directions for cyberbullying research and implications for anticyberbullying practices.
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness (Information Systems Research, 2015)
Authors: Abstract:
    Although most behavioral security studies focus on organizational in-role behaviors such as information security policy (ISP) compliance, the role of organizational extra-role behaviorsÑsecurity behaviors that benefit organizations but are not specified in ISPsÑhas long been overlooked. This study examines (1) the consequences of organizational in-role and extra-role security behaviors on the effectiveness of ISPs and (2) the role of formal and social controls in enhancing in-role and extra-role security behaviors in organizations. We propose that both in-role security behaviors and extra-role security behaviors contribute to ISP effectiveness. Furthermore, based on social control theory, we hypothesize that social control can boost both in- and extra-role security behaviors. Data collected from practitionersÑincluding information systems (IS) managers and employees at many organizationsÑconfirmed most of our hypotheses. Survey data from IS managers substantiated the importance of extra-role behaviors in improving ISP effectiveness. Paired data, collected from managers and employees in the same organizations, indicated that formal control and social control individually and interactively enhance both in- and extra-role security behaviors. We conclude by discussing the implications of this research for academics and practitioners, along with compelling future research possibilities.
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation (Journal of Management Information Systems, 2015)
Authors: Abstract:
    The central theme of this paper is that information technology (IT) can serve to create ethical organizations endowed with virtuous characteristics, and that such ethical organizations can innovate better in today's dynamic market environment. Drawing on the notion of virtue ethics propounded by the Greek philosopher Aristotle, we theorize that core organizational IT affordances influence the development of organizational virtues, which in turn influence organizational improvisational capabilities and innovation. We propose the ÒIT-virtues-innovationÓ (IVI) model and test it using a cross-organizational survey of 250 employees from various organizations in the United States. Our findings largely support our proposal that IT affordances positively influence organizational virtues, which then influence organizational improvisational capabilities, thus improving organizational innovation. This paper contributes to the understanding of organizational innovation by articulating the strategic usefulness of IT-enabled organizational ethics, and it explains how IT-enabled ethical competence (virtues) influences strategic competence (improvisational capabilities and innovation). > >
The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them to do so remains limited. For example, most extant research relies on mere portions of protection motivation theory (PMT) and has focused on isolated behaviors, thus limiting the generalizability of findings to isolated issues, rather than addressing the global set of protective security behaviors. Here, we investigate the motivations surrounding this larger behavioral set by assessing maladaptive rewards, response costs, and fear alongside traditional PMT components. We extend PMT by showing that: (1) security education, training, and awareness (SETA) efforts help form appraisals; (2) PMT's applicability to organizational rather than personal contexts depends on insiders' organizational commitment levels; and (3) response costs provide the link between PMT's appraisals. We show in detail how organizational commitment is the mechanism through which organizational security threats become personally relevant to insiders and how SETA efforts influence many PMT-based components. > >
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations (MIS Quarterly, 2015)
Authors: Abstract:
    Access-policy violations are a growing problem with substantial costs for organizations. Although training programs and sanctions have been suggested as a means of reducing these violations, evidence shows the problem persists. It is thus imperative to identify additional ways to reduce access-policy violations, especially for systems providing broad access to data. We use accountability theory to develop four user-interface (UI) design artifacts that raise users' accountability perceptions within systems and in turn decrease access-policy violations. To test our model, we uniquely applied the scenario-based factorial survey method to various graphical manipulations of a records system containing sensitive information at a large organization with over 300 end users who use the system daily. We show that the UI design artifacts corresponding to four submanipulations of accountability can raise accountability and reduce access policy violation intentions. Our findings have several theoretical and practical implications for increasing accountability using UI design. Moreover, we are the first to extend the scenario-based factorial survey method to test design artifacts. This method provides the ability to use more design manipulations and to test with fewer users than is required in traditional experimentation and research on humanÐcomputer interaction. We also provide bootstrapping tests of mediation and moderation and demonstrate how to analyze fixed and random effects within the factorial survey method optimally.
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (MIS Quarterly, 2015)
Authors: Abstract:
    Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors.
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals (Journal of Management Information Systems, 2014)
Authors: Abstract:
    Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information would have high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortunately, this ideal has thus far been stymied by practical limitations and inadequate scientific control in current interviewing systems. This study proposes a new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), designed to detect individuals’ purposely hidden information about target topics of interest. These hidden topics of interest could cover a wide range, including knowledge of concealed weapons, privacy violations, fraudulent organizational behavior, organizational security policy violations, preemployment behavioral intentions, organizational insider threat, leakage of classified information, or even consumer product use information. ASCSS represent a systematic synthesis of structured interviewing, orienting theory, defensive response theory, noninvasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, we built a prototype automated screening kiosk system and configured it for a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive device. The positive results provide support for the proposition that ASCSS may afford more widespread application of credibility assessment screening systems.
Using Accountability to Reduce Access Policy Violations in Information Systems. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Access policy violations by organizational insiders are a major security concern for organizations because these violations commonly result in fraud, unauthorized disclosure, theft of intellectual property, and other abuses. Given the operational demands of dynamic organizations, current approaches to curbing access policy violations are insufficient. This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. We identify four system mechanisms that heighten an individual's perception of accountability: identifiability, awareness of logging, awareness of audit, and electronic presence. These accountability mechanisms substantially reduce intentions to commit access policy violations. These results not only point to several avenues for future research on access policy violations but also suggest highly practical design-artifact solutions that can be easily implemented with minimal impact on organizational insiders.
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Online whistle-blowing reporting systems (WBRS) have become increasingly prevalent channels for reporting organizational failures. The Sarbanes-Oxley Act and similar international laws now require firms to establish whistle-blowing (WB) procedures and WBRSs, increasing the importance of WB research and applications. Although the literature has addressed conventional WB behavior, it has not explained or measured the use of WBRSs in online contexts that could significantly alter elements of anonymity, trust, and risk for those using such reporting tools. This study proposes the WBRS model (WBRS-M). Using actual working professionals in an online experiment of hypothetical scenarios, we empirically tested the WBRS-M for reporting computer abuse and find that anonymity, trust, and risk are highly salient in the WBRS context. Our findings suggest that we have an improved WB model with increased explanatory power. Organizations can make WB less of a professional taboo by enhancing WBRS users' perceptions of trust and anonymity. We also demonstrate that anonymity means more than the mere lack of identification, which is not as important in this context as other elements of anonymity.
EVALUATING JOURNAL QUALITY AND THE ASSOCIATION FOR INFORMATION SYSTEMS SENIOR SCHOLARS' JOURNAL BASKET VIA BIBLIOMETRIC MEASURES: DO EXPERT JOURNAL ASSESSMENTS ADD VALUE? (MIS Quarterly, 2013)
Authors: Abstract:
    Information systems journal rankings and ratings help scholars focus their publishing efforts and are widely used surrogates for judging the quality of research. Over the years, numerous approaches have been used to rank IS journals, approaches such as citation metrics, school lists, acceptance rates, and expert assessments. However, the results of these approaches often conflict due to a host of validity concerns. In the current scientometric study, we make significant strides toward correcting for these limitations in the ranking of mainstream IS journals. We compare expert rankings to bibliometric measures such as the ISI Impact Factor™, the h-index, and social network analysis metrics. Among other findings, we conclude that bibliometric measures provide very similar results to expert-based methods in determining a tiered structure of IS journals, thereby suggesting that bibliometrics can be a complete, less expensive, and more efficient substitute for expert assessment. We also find strong support for seven of the eight journals in the Association for Information Systems Senior Scholars' "basket" of journals. A cluster analysis of our results indicates a two-tiered separation in the quality of the highest quality IS journals-with MIS Quarterly, Information Systems Research, and Journal of Management Information Systems belonging, in that order, to the highest A+ tier. Journal quality metrics fit nicely into the sociology of science literature and can be useful in models that attempt to explain how knowledge disseminates through scientific communities.
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS. (MIS Quarterly, 2013)
Authors: Abstract:
    Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting information resources rather than solely relying upon technology to provide this protection. Unfortunately, compared to negative insider behaviors, the extant literature provides sparse coverage of beneficial insider activities. The few beneficial activities in the literature represent only a small portion of the diverse collection of insiders' protective actions. This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Based on systematics, we propose a six-step methodology of qualitative and quantitative approaches to develop a taxonomy and theory of diversity for PMBs. These approaches integrate the classification techniques of multidimensional scaling (MDS), property fitting (ProFit), and cluster analyses. We leverage these techniques to identify and display how insiders collectively classify 67 unique PMBs and their homogeneous classes. Our taxonomy provides researchers and practitioners a comprehensive guide and common nomenclature for PMBs. Our methodology can be similarly used to create other theories of diversity.
Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Social computing technologies typically have multiple features that allow users to reveal their personal information to other users. Such self-disclosure (SD) behavior is generally considered positive and beneficial in interpersonal communication and relationships. Using a newly proposed model based on social exchange theory, this paper investigates and empirically validates the relationships between SD technology use and culture. In particular, we explore the effects of culture on information privacy concerns and the desire for online interpersonal awareness, which influence attitudes toward, intention to use, and actual use of SD technologies. Our model was tested using arguably the strongest social computing technology for online SD— instant messaging (IM)—with users from China and the United States. Our findings reveal that cross-cultural dimensions are significant predictors of information privacy concerns and desire for online awareness, which are, in turn, found to be predictors of attitude toward, intention to use, and actual use of IM. Overall, our proposed model is applicable to both cultures. Our findings enhance the theoretical understanding of the effects of culture and privacy concerns on SD technologies and provide practical suggestions for developers of SD technologies, such as adding additional control features to applications.
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Historically, inaccurate credibility assessments have resulted in tremendous costs to businesses and to society. Recent research offers unobtrusive credibility assessment aids as a solution; however, the accuracy of these decision aids is inadequate, and users often resist accepting the aids' recommendations. We follow the principles of signal detection theory to improve the accuracy of recommendations in computer-aided credibility assessment by combining automated and participatory decision support. We also leverage participation in decision-making theory to explain and predict an increased acceptance of assessment aid recommendations when perceptual cues are elicited from users. Based on these two theories, we design and test a hybrid decision aid to perform automated linguistic analysis and to elicit and analyze perceptual cues from an observer. Results from a laboratory experiment indicate that decision aids that use linguistic and perceptual cues offer more accurate recommendations than aids that use only one type of cue. Automatic analysis of linguistic cues improved both the decision aid's recommendations and the users' credibility assessment accuracy. Challenging the generalizability of past findings, the elicitation of perceptual cues did not improve the decision aid's recommendations or the users' assessment accuracy. Elicitation of perceptual cues, however, did improve user acceptance of the decision aid's recommendations. These findings provide guidance for future development of credibility assessment decision aids.
PROFILING THE RESEARCH PRODUCTIVITY OF TENURED INFORMATION SYSTEMS FACULTY AT U.S. INSTITUTIONS. (MIS Quarterly, 2011)
Authors: Abstract:
    How many articles in highly rated journals do Information Systems research faculty publish to earn tenure? Which journals are highly rated outlets? Tenure candidates, promotion and tenure committees, and those who are asked to write external letters are frequently called upon to answer such questions. When Dennis et al. (2006) examined all IS Ph.D. graduates entering academic careers, few faculty had published enough articles in 20 "elite" journals in six years to meet tenure research expectations at research-intensive schools. Our study builds on the dialog started by Dennis et al. In our study, we counted the number of journal articles at the point of tenure for faculty who earned tenure within five to seven years after their Ph.D. graduation date. We also examined the effect of acknowledging different sets of journals as highly rated on the publication rates of faculty who earned tenure. Specifically, we examined the effects of expanding on Dennis et al. by including MIS Quarterly, Information Systems Research, Journal of Management Information Systems, Journal of the AIS, Information Systems Journal, European Journal of Information Systems, Journal of Information Technology, and Journal of Strategic Information Systems in the journal basket. We also looked at the effect of acknowledging highly rated non-IS business journals and highly rated computer science and engineering journals. Finally, we present journal publication benchmarks based on these findings for different types of research institutions.
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. (Journal of Management Information Systems, 2010)
Authors: Abstract:
    The article presents the results of an experiment which involved novices and experts using a decision aid to detect deception in a law enforcement scenario. Both groups improved their assessment accuracy using the decision support system, but tended to ignore it when it contradicted them. The professionals often did not even look at the decision aid's reasons for contradicting them. The theory of technology dominance (TTD) is discussed in this context, and it is noted that the experiment's results contradicted TTD in two respects.
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups. (Journal of Management Information Systems, 2009)
Authors: Abstract:
    Process satisfaction is one important determinant of work group collaborative system adoption, continuance, and performance. We explicate the computer-mediated communication (CMC) interactivity model (CMCIM) to explain and predict how interactivity enhances communication quality that results in increased process satisfaction in CMC-supported work groups. We operationalize this model in the challenging context of very large groups using extremely lean CMC. We tested it with a rigorous field experiment and analyzed the results with the latest structural equation modeling techniques. Interactivity and communication quality dramatically improved for very large groups using highly lean CMC (audience response systems) over face-to- face groups. Moreover, CMC groups had fewer negative status effects and higher process satisfaction than face-to-face groups. The practical applications of lean CMC rival theoretical applications in importance because lean CMC is relatively inexpensive and requires minimal training and support compared to other media. The results may aid large global work group continuance, satisfaction, and performance in systems, product and strategy development, and other processes in which status effects and communication issues regularly have negative influences on outcomes.
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites. (Journal of Management Information Systems, 2008)
Authors: Abstract:
    Trust is a crucial factor in e-commerce. However, consumers are less likely to trust unknown Web sites. This study explores how less-familiar e-commerce Web sites can use branding alliances and Web site quality to increase the likelihood of initial consumer trust. We use the associative network model of memory to explain brand knowledge and to show how the mere exposure effect can be leveraged to improve a Web site's brand image. We also extend information integration theory to explain how branding alliances are able to increase initial trust and transfer positive effects to Web sites. Testing of our model shows that the most important constructs for increasing initial trust in our experimental context are branding and Web site quality. Finally, we discuss future research ideas, limitations, implications, and ideas for practitioners.
The Impact of Individualism--Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    Majority influence is the attempt by a majority of group members to impose their common position on group dissenters during group decision making. Because of globalization, the use of cross-cultural teams in group tasks is becoming increasingly common. The objective of this study was to investigate how national culture, social presence, and group diversity may affect majority influence in a group decision-making context. A total of 183 groups participated in a large-scale empirical experiment at multiple sites. The results show that the national culture of group minorities has a significant impact on majority influence and that the use of computer-mediated communication can reduce majority influence. The findings have both theoretical and practical implications for improving the outcome and the effectiveness of group decision making in cross-cultural environments.