Search Results - "Roberts, Tom L."
-
1
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets
Published in Journal of management information systems (01-01-2015)“…Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them to do so remains limited. For example,…”
Get full text
Journal Article -
2
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
Published in Computers in human behavior (01-03-2017)“…Practitioners and researchers alike recognize the positive influence insiders' behavior can have on information systems (IS) security. This awareness has…”
Get full text
Journal Article -
3
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Published in Information systems journal (Oxford, England) (01-05-2015)“…Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may…”
Get full text
Journal Article -
4
Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)
Published in Journal of the Association for Information Systems (01-11-2013)“…Hedonic-motivation systems (HMS) -- systems used primarily to fulfill users' intrinsic motivations -- are the elephant in the room for IS research. Growth in…”
Get full text
Journal Article -
5
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Published in MIS quarterly (01-12-2013)“…Protecting information from a variety of security threats is a daunting organizational activity. Organization managers must recognize the roles that…”
Get full text
Journal Article -
6
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Published in Information & management (01-07-2014)“…Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails…”
Get full text
Journal Article -
7
Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity
Published in Information systems frontiers (01-04-2021)“…The protection of organizational information and information systems (IS) is a socio-technical issue and requires insiders take on a more proactive set of…”
Get full text
Journal Article -
8
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts
Published in Decision sciences (01-12-2018)“…ABSTRACT In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to…”
Get full text
Journal Article -
9
Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
Published in Journal of business ethics (01-05-2014)“…Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization's information assets leads to costly damage to an organization's…”
Get full text
Journal Article -
10
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
Published in Computers & security (01-09-2011)“…Employees can have a profound, detrimental influence on information security that costs organizations billions of U.S. dollars annually. As a result,…”
Get full text
Journal Article -
11
Organizational information security as a complex adaptive system: insights from three agent-based models
Published in Information systems frontiers (01-06-2017)“…The management of information security can be conceptualized as a complex adaptive system because the actions of both insiders and outsiders co-evolve with the…”
Get full text
Journal Article -
12
The Impact of Group Size and Social Presence on Small-Group Communication: Does Computer-Mediated Communication Make a Difference?
Published in Small group research (01-12-2006)“…This study evaluates the impact of varying group size and social presence on small-group communication. It compares key communication factors—faceto-face (FtF)…”
Get full text
Journal Article -
13
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example
Published in Communications of the Association for Information Systems (2015)“…Formative modeling of latent constructs has produced great interest and discussion among scholars in recent years. However, confusion exists surrounding…”
Get full text
Journal Article -
14
What signal is your inspection team sending to each other? Using a shared collaborative interface to improve shared cognition and implicit coordination in error-detection teams
Published in International journal of human-computer studies (01-04-2013)“…Coordination theory, created in a collaborative HCI context, has long emphasized the importance of implicit coordination. Such coordination is possible through…”
Get full text
Journal Article -
15
Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…Organizational success in the digital age is largely dependent upon the ability to collect, manage, and transfer proprietary information. Given this knowledge…”
Get full text
Conference Proceeding Journal Article -
16
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study
Published in Information & management (01-09-2007)“…Project management is vital to the effective application of organizational resources to competing demands within and across projects. The effective application…”
Get full text
Journal Article -
17
Toward Building Self-Sustaining Groups in PCR-based Tasks through Implicit Coordination: The Case of Heuristic Evaluation
Published in Journal of the Association for Information Systems (01-03-2009)“…Usability flaws found in the later stages of the software development process can be extremely costly to resolve. Accordingly, usability evaluation (UE) is an…”
Get full text
Journal Article -
18
The Effects of Information Technology Project Complexity on Group Interaction
Published in Journal of management information systems (01-12-2004)“…This study investigates the effect of varying project complexity on the group interaction processes of small information technology (IT) project teams. The…”
Get full text
Journal Article -
19
Technology-Supported Small Group Interaction: Extending a Tradition of Leading Research for Virtual Teams and Global Organizations
Published in Small group research (01-02-2007)“…Introduction to the current special issue, focusing on technology-supported small group interaction. The goal of the issue is to increase interdisciplinary…”
Get full text
Journal Article -
20
An evaluation of the impact of social presence through Group size and the use of collaborative software on Group member "Voice" in face-to-face and computer-mediated task Groups
Published in IEEE transactions on professional communication (01-03-2006)“…Firms that are trying to stay competitive in the current business environment often require the use of groups. The popularity of group work is tied to the…”
Get full text
Journal Article