Follow
Tom L. Roberts
Tom L. Roberts
Verified email at uttyler.edu
Title
Cited by
Cited by
Year
Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM)
PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts
Journal of Association of Information Systems (JAIS) 14 (11), 617-671, 2012
632*2012
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19 (2), 181-195, 2010
5892010
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
C Posey, TL Roberts, PB Lowry
Journal of Management Information Systems 32 (4), 179-214, 2015
4272015
The impact of group size and social presence on small-group communication: Does computer-mediated communication make a difference?
PB Lowry, TL Roberts, NC Romano Jr, PD Cheney, RT Hightower
Small Group Research 37 (6), 631-661, 2006
3632006
Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
C Posey, T Roberts, PB Lowry, B Bennett, J Courtney
MIS Quarterly 37 (4), 1189-1210, 2013
2822013
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
C Posey, TL Roberts, PB Lowry, RT Hightower
Information & management 51 (5), 551-567, 2014
2582014
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence …
PB Lowry, C Posey, RBJ Bennett, TL Roberts
Information Systems Journal 25 (3), 193-273, 2015
2402015
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
AJ Burns, C Posey, TL Roberts, PB Lowry
Computers in Human Behavior 68, 190-209, 2017
1972017
Stock market trading rule discovery using technical charting heuristics
W Leigh, N Modani, R Purvis, T Roberts
Expert Systems with Applications 23 (2), 155-159, 2002
1802002
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
C Posey, B Bennett, T Roberts, PB Lowry
Journal of Information Systems Security 7 (1), 24-47, 2011
1762011
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
C Posey, RJ Bennett, TL Roberts
Computers & Security 30 (6-7), 486-497, 2011
1482011
Factors that impact implementing a system development methodology
TL Roberts, ML Gibson, KT Fields, RK Rainer
IEEE Transactions on Software Engineering 24 (8), 640-649, 1998
1101998
Information technology investment and firm performance: a meta-analysis
JH Lim, VJ Richardson, TL Roberts
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
1042004
An evaluation of the impact of social presence through group size and the use of collaborative software on group member" voice" in face-to-face and computer-mediated task groups
TL Roberts, PB Lowry, PD Sweeney
IEEE Transactions on Professional Communication 49 (1), 28-43, 2006
1002006
The effects of information technology project complexity on group interaction
TL Roberts, PH Cheney, PD Sweeney, RT Hightower
Journal of Management Information Systems 21 (3), 223-247, 2004
1002004
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking
AJ Burns, TL Roberts, C Posey, PB Lowry
Information Systems Research 30 (4), 1228-1247, 2019
762019
Exploiting organizational knowledge in developing IS project cost and schedule estimates: An empirical study
RM Henry, GE McCray, RL Purvis, TL Roberts
Information & Management 44 (6), 598-612, 2007
742007
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
Decision Sciences 49 (6), 1187-1228, 2018
692018
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse
PB Lowry, C Posey, TL Roberts, RJ Bennett
Journal of Business Ethics 121, 385-401, 2014
692014
Trading with a stock chart heuristic
W Leigh, CJ Frohlich, S Hornik, RL Purvis, TL Roberts
IEEE transactions on systems, man, and cybernetics-Part A: Systems and …, 2007
552007
The system can't perform the operation now. Try again later.
Articles 1–20